Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3398469pxf; Mon, 22 Mar 2021 05:39:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJway4QKBJpyPoyglWRcQpj7OvAcq0eLR2G5YI/xWPpZ9Mcv2PGUb2yOHIQxNdZIKTX5zpvR X-Received: by 2002:a17:906:4d44:: with SMTP id b4mr19239739ejv.338.1616416758902; Mon, 22 Mar 2021 05:39:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616416758; cv=none; d=google.com; s=arc-20160816; b=yfhEfsgtz4ana4FNoCZaKvOOcRWw5JcOiWRxo9XRKCFPpR486kSEkBsF9mhT7PSaM+ xBI0mBHXfY2YfnlAUFb+uMi0P8LCaj4RXm2rrDD9NQnwuOXhV3aug43JEEix4ObcPlgQ 4qgBjLlNisNx18ZZgFQoZXqd0BP2Wf/6VpMvopzJKTEDVEELaaJGnwKH9O4QwtVbiRr4 nS7qhnLL399xyLSTAFj/z7gVjMP8rUr7Dr1XJEdhvRTUvUhV4UJ1tV9IO3e5gkHzRVKN 7Fz46mXgVH3rwzjSKj3V14DkAkmnwDDTY0BHjbTXsuWSVvfgGSkCjiWCWpD+j1u865q0 XCHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=aLa7BlmApm6YjB8AO5C4KsYapQ07VNe4BvNH7Y/rwXI=; b=yfGjbRvHsknc+nBtDgOYzTMXso71lGZSwGeFry2xgme7WEBEFOOITmnoSPjKt5HJvJ ETdelH4FiEKldiDIiNPcj59Mq3+ns555NRcAm/HlXyliCPvsx58rTgLhdaQzti/Y/Mw0 Wq3FoI/GZiXoqxnp7XvH9invLyk6YosYMCBK++XqHsUyipdgaM/ZB7S96icLybhBTTMc JG9ag9M7MpTthc60UcUYftX+qhJtSh2Q1k9L6932CcdO36aT4AFNpmD36x0JzWPlGYDQ woOqFGSk7wnt9mvOvHmePNH3QbTwTp3te9Nx43J0zg6SoD1IleqmokjBMynrjuEvpfBJ UVqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=IVk5nmZJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qh20si10124942ejb.749.2021.03.22.05.38.56; Mon, 22 Mar 2021 05:39:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=IVk5nmZJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230133AbhCVMiG (ORCPT + 99 others); Mon, 22 Mar 2021 08:38:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:55578 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231249AbhCVMdq (ORCPT ); Mon, 22 Mar 2021 08:33:46 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 24D8261994; Mon, 22 Mar 2021 12:33:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1616416426; bh=v4XfaQ+VVld4ZypjRKg4RWwYTcVKS/v7eucXo/Qgrbs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=IVk5nmZJCgdIU23gXwsRqpKgNBRIffFLW8LKrMuZSeHYJIBu0p2cgJTXgKicDrsYK r49sWo+S0Uv1nF/XbrX4Y/laSGCqvoX8Hu6ka9e5PbEM/pOTfgbIkqOVE1q0LN8A3m O9+aex+wlJ9lswKpK4fr4bCmZ9xpSP7BlUwOGy50= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vince Weaver , Kan Liang , "Peter Zijlstra (Intel)" Subject: [PATCH 5.11 101/120] perf/x86/intel: Fix unchecked MSR access error caused by VLBR_EVENT Date: Mon, 22 Mar 2021 13:28:04 +0100 Message-Id: <20210322121933.053989152@linuxfoundation.org> X-Mailer: git-send-email 2.31.0 In-Reply-To: <20210322121929.669628946@linuxfoundation.org> References: <20210322121929.669628946@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kan Liang commit 2dc0572f2cef87425147658698dce2600b799bd3 upstream. On a Haswell machine, the perf_fuzzer managed to trigger this message: [117248.075892] unchecked MSR access error: WRMSR to 0x3f1 (tried to write 0x0400000000000000) at rIP: 0xffffffff8106e4f4 (native_write_msr+0x4/0x20) [117248.089957] Call Trace: [117248.092685] intel_pmu_pebs_enable_all+0x31/0x40 [117248.097737] intel_pmu_enable_all+0xa/0x10 [117248.102210] __perf_event_task_sched_in+0x2df/0x2f0 [117248.107511] finish_task_switch.isra.0+0x15f/0x280 [117248.112765] schedule_tail+0xc/0x40 [117248.116562] ret_from_fork+0x8/0x30 A fake event called VLBR_EVENT may use the bit 58 of the PEBS_ENABLE, if the precise_ip is set. The bit 58 is reserved by the HW. Accessing the bit causes the unchecked MSR access error. The fake event doesn't support PEBS. The case should be rejected. Fixes: 097e4311cda9 ("perf/x86: Add constraint to create guest LBR event without hw counter") Reported-by: Vince Weaver Signed-off-by: Kan Liang Signed-off-by: Peter Zijlstra (Intel) Cc: stable@vger.kernel.org Link: https://lkml.kernel.org/r/1615555298-140216-2-git-send-email-kan.liang@linux.intel.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/events/intel/core.c | 3 +++ 1 file changed, 3 insertions(+) --- a/arch/x86/events/intel/core.c +++ b/arch/x86/events/intel/core.c @@ -3575,6 +3575,9 @@ static int intel_pmu_hw_config(struct pe return ret; if (event->attr.precise_ip) { + if ((event->attr.config & INTEL_ARCH_EVENT_MASK) == INTEL_FIXED_VLBR_EVENT) + return -EINVAL; + if (!(event->attr.freq || (event->attr.wakeup_events && !event->attr.watermark))) { event->hw.flags |= PERF_X86_EVENT_AUTO_RELOAD; if (!(event->attr.sample_type &