Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1470789pxa; Thu, 20 Aug 2020 12:07:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwdV+QYrDhBOgnEf1FNUrg+T92x+18LG1PUBcCMjAAZaCy+9RsQKIOIO3riRQlc7tLE10Xm X-Received: by 2002:a17:906:78e:: with SMTP id l14mr98377ejc.67.1597950458594; Thu, 20 Aug 2020 12:07:38 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1597950458; cv=pass; d=google.com; s=arc-20160816; b=kG5kVkYUQGDxw8oHFadMg1VNY7KUinLpFKhEqtlwe5z4li3sBUGLmXQvyPHcJq4Lav QTUo5sok+n9plRBOQNLrxvVlmYsn92TblUhk6KlRda/UO8q2p8owhb5PIa0eYvbzLgmP 7H/oRDG1iw5athyzFdVK0Diqbtvh+ru2rvgmHKhfyvwuuZr0DbCzBTO+dHR8eZPm/+3h lFzyYAgvYZEn+CI77H9hbOvSaZHyTYoC2glu5QQ8i5FyxL7cPcgCN+qf/Zdh6L6K79Qt G9vW44B5ZlH59SuuB5bmnNB6LOCxUP+OxYOOe+10rji7H7bNkFvjuxGfkx3a9h2iG0eQ HxPQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:in-reply-to:user-agent:date:message-id:references :cc:to:from:subject:dkim-signature; bh=yJKqiACWbYIbJygdkWXo/QqaPnEU6xvMQ0IE9eqKDGQ=; b=sVZfV9e/5hUHIen4Cf9liiwhoxtvfMQu8uKRDY65KnadJYyrlKoBqEbC6/0Tuwffwu 6XBiGz20PHbvEk6Y5vr16/vGDEa8moFFow2kLr95elzmtVzK37lzhV0PygKYkb4iZK+U o+uhGutozorVwirfcxIvuqHCCX2ralMn5EfBqMXudURh2Todgz5SBB5ruZUZmZYSnbeJ dakzOUgzcutGB49NsakfeCQjN6aPUwTyoOF8j75glvjeFTrpGDfbDecBEEDIScFXIoYc GPlaxUDENbXvrqpFDFLkRbfIKFZHpX4Sj/m2Jrg7zjd4lIKK7d0Dx0BvIvrMPCjbFI7g 3ahg== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@amdcloud.onmicrosoft.com header.s=selector2-amdcloud-onmicrosoft-com header.b="hBNkqa/n"; arc=pass (i=1 spf=pass spfdomain=amd.com dkim=pass dkdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d8si1667466ejr.464.2020.08.20.12.07.15; Thu, 20 Aug 2020 12:07:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@amdcloud.onmicrosoft.com header.s=selector2-amdcloud-onmicrosoft-com header.b="hBNkqa/n"; arc=pass (i=1 spf=pass spfdomain=amd.com dkim=pass dkdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726835AbgHTTEs (ORCPT + 99 others); Thu, 20 Aug 2020 15:04:48 -0400 Received: from mail-eopbgr760058.outbound.protection.outlook.com ([40.107.76.58]:2044 "EHLO NAM02-CY1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725819AbgHTTEq (ORCPT ); Thu, 20 Aug 2020 15:04:46 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=bQxmdM23O7Y8+tRu+hxGXEy2GIJuUV2HAG9q4JJgyZW89HG6CAsiFmWBkKyQUWclrWKsp/bvPC6gYefvLNuO33CPqozgmW+4oX23xS2znvb1pBH62m9mvWfdooYJTJr8t8avmIaIsDTDEJF1bALcB2hkit1xmm/gZjUMUU6BwkY3ymUQzmN2rP07EjZcgSJj+eQHHfi4xsw6wumyKmps4FyJeOc6X3P0eSKmeEzPFMN1rcXCkciq9b6LF9sQoHVDd/DY2LL9edCG7t2eMkoEQZDw7CnLr3NEzodHyt3eLBXRfm4nS7+jIHQWCCmzmP9+xDD1AGbhsGGZum3yZ4CeBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=yJKqiACWbYIbJygdkWXo/QqaPnEU6xvMQ0IE9eqKDGQ=; b=fmQZGKIhVf5VVjuCXc2wyu3OANWvEM34wnCzIzhpRN5VZZPAvRWJZ951oiJ9R75k/dutkZvINIEXJdjGaadSmqJuzsy6niwd1xQ9TYvxQ/TZvxSL9OXJHPNtIJ9NMCGXIAw1QYxJBEVQ2GFfJyA+0HFLNJ5c+R+2QMLPvavHqRltclSCSNfhDPZL6iA6Xq6VMMXIOcAfKMdZuWKPccQQfYEW+3WQr01NrOntkeG9Tb8qpud8LyubdUQ7oZ2UoxPifh181KcHps7G5jdlODtKA862B+I1P3QFXC93qwZmfM3sUZpUPbF31d36Di4O7+ZfL0oA0Hf5fUi2izfhXQdTuA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector2-amdcloud-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=yJKqiACWbYIbJygdkWXo/QqaPnEU6xvMQ0IE9eqKDGQ=; b=hBNkqa/n03E5gRvMsqn9Bum3lpTPX1Hf/9ofnyTlNLgD+Xl8Cn2qufdPqJBkJhCGTzVDehn+9Ije6ZHXei76963Opz5VcLxA1ps4+4CuK0iyRf6TO4Aju4SWbThMaNwV52F1YCFQIj/czTfH8YI80wLwnrU45us7VHz3b5hXl8k= Authentication-Results: kernel.org; dkim=none (message not signed) header.d=none;kernel.org; dmarc=none action=none header.from=amd.com; Received: from DM5PR12MB1355.namprd12.prod.outlook.com (2603:10b6:3:6e::7) by DM5PR12MB1259.namprd12.prod.outlook.com (2603:10b6:3:75::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3305.25; Thu, 20 Aug 2020 19:04:44 +0000 Received: from DM5PR12MB1355.namprd12.prod.outlook.com ([fe80::299a:8ed2:23fc:6346]) by DM5PR12MB1355.namprd12.prod.outlook.com ([fe80::299a:8ed2:23fc:6346%3]) with mapi id 15.20.3305.026; Thu, 20 Aug 2020 19:04:44 +0000 Subject: Re: FSGSBASE causing panic on 5.9-rc1 From: Tom Lendacky To: Jim Mattson Cc: Andy Lutomirski , Sean Christopherson , Joerg Roedel , Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Linux Kernel Mailing List , X86 ML , "Chang S. Bae" , Thomas Gleixner , Sasha Levin , Borislav Petkov , Peter Zijlstra , Ingo Molnar References: <39d57e4d-5db4-f536-6f5e-6b0414c0dccc@amd.com> <7dedb0ab-56a6-5d96-577b-21ab1ecdad24@amd.com> <20200820151049.GA26595@sjchrist-ice> <362f5a45-b808-25ad-b99b-449e05717c4a@amd.com> <45e16c5c-ce99-33da-99c8-ea52ef0945db@amd.com> <68478297-ff21-fa38-a37b-2e1e515fdc5e@amd.com> <50e7c7f6-d212-4e90-09b7-2c568087084e@amd.com> Message-ID: Date: Thu, 20 Aug 2020 14:04:41 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 In-Reply-To: <50e7c7f6-d212-4e90-09b7-2c568087084e@amd.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-ClientProxiedBy: SN4PR0201CA0056.namprd02.prod.outlook.com (2603:10b6:803:20::18) To DM5PR12MB1355.namprd12.prod.outlook.com (2603:10b6:3:6e::7) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from 255.255.255.255 (255.255.255.255) by SN4PR0201CA0056.namprd02.prod.outlook.com (2603:10b6:803:20::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3305.24 via Frontend Transport; Thu, 20 Aug 2020 19:04:42 +0000 X-Originating-IP: [67.79.209.213] X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 7e17d05f-e353-4bbb-ed3f-08d8453be60a X-MS-TrafficTypeDiagnostic: DM5PR12MB1259: X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:6790; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: Oux8Q+VzeF2mNWoxQtUYT4WRKoSceSq8yECyLE2uIR+D6Hvky/R+qejsr20dP1jtvdjf9XDhZZjhPmISbfWLUcg02sCQvXkMhhYAOGKwdqCt2rf0U2cdaWfyJ/t9M2m7BVQiBK/iMD1KoRJu9yLCkfMwJcw+NRZ+ax8RyPy8sFlzcCfvgKiAzVEkAKNH2c255QqOM0ho/hcx7EtwtW2Wb6Ju0Cjxg57ougwwsnNei/EUOIprxMo+v72cvjYKeB4CM3GZyCWQp/de5qmyNOg3BsjI/ceHMjVNiiJFpDSMzT2gpQ4nN0NSuE5xZLArljUBQLJHzFc5mM0ygpAUdya7YZJa7KvMeMBPXu3my13ZxQ5ccqW8Og6LDH6T0nzJiX+VYaalOC92D4TzFRo+fpES88new/n/1lxXuZNCZUDQ5/8= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR12MB1355.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(39860400002)(376002)(366004)(346002)(136003)(396003)(31696002)(110011004)(7416002)(8676002)(86362001)(316002)(83380400001)(186003)(26005)(5660300002)(52116002)(6486002)(478600001)(2906002)(53546011)(4326008)(6916009)(2616005)(956004)(66946007)(36756003)(8936002)(16576012)(66556008)(31686004)(66476007)(54906003)(43740500002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: 7e17d05f-e353-4bbb-ed3f-08d8453be60a X-MS-Exchange-CrossTenant-AuthSource: DM5PR12MB1355.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Aug 2020 19:04:43.9227 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: zCJWsxnyU21sRmusC4GhYZdCJqBpyx2B7JMdeunAlXxz+OICnlGEUbbi1IhYa1kkpToAj1NjfrTrgiy2Ww3szQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR12MB1259 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/20/20 1:41 PM, Tom Lendacky wrote: > On 8/20/20 1:39 PM, Jim Mattson wrote: >> On Thu, Aug 20, 2020 at 11:38 AM Jim Mattson wrote: >>> >>> On Thu, Aug 20, 2020 at 11:34 AM Tom Lendacky >>> wrote: >>>> >>>> >>>> Bisecting with unsafe_fsgsbase identified: >>>> >>>> c82965f9e530 ("x86/entry/64: Handle FSGSBASE enabled paranoid >>>> entry/exit") >>>> >>>> But I'm thinking that could be because it starts using GET_PERCPU_BASE, >>>> which on Rome would use RDPID. So is SVM restoring TSC_AUX_MSR too late? >>>> That would explain why I don't see the issue on Naples, which doesn't >>>> support RDPID. >>> >>> It looks to me like SVM loads the guest TSC_AUX from vcpu_load to >>> vcpu_put, with this comment: >>> >>> /* This assumes that the kernel never uses MSR_TSC_AUX */ >>> if (static_cpu_has(X86_FEATURE_RDTSCP)) >>>          wrmsrl(MSR_TSC_AUX, svm->tsc_aux); >> >> Correction: It never restores TSC_AUX, AFAICT. > > It does, it's in the host_save_user_msrs array. I added a quick hack to save TSC_AUX to a new variable in the SVM struct and then restore it right after VMEXIT (just after where GS is restored in svm_vcpu_enter_exit()) and my guest is no longer crashing. Thanks, Tom > > Thanks, > Tom > >>