Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3408779pxf; Mon, 22 Mar 2021 05:55:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyg0Fnp2a4UE51hvC3v4sET6QB8ezf54R+IX6zdbNL7DqdRioEl0bKkQaND6S/wdKvejaLe X-Received: by 2002:aa7:c1d5:: with SMTP id d21mr24946440edp.167.1616417755359; Mon, 22 Mar 2021 05:55:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616417755; cv=none; d=google.com; s=arc-20160816; b=zP1IS9QlqV5P3TO4SMa6+GzWu8xjfl+TjAJD/L2eCD4sfRs3CKQYereYe4/VFX/ZjV Dcwi7tH9hfJQwTzI4H8Kdj03oY1wU3D4fio2cuogppo/GvNSshi5/P0Zupnb7fpdp1iq sPJmkyc5+pJwbiPoCj6EtSAnEJCC9C1veDU0KF+8NEQ589JWxfvJg2/EfsQSePt0RRC9 ErF8OVzwRhYk7Is17tODYzS9A8T06BdgM3FGn3blOaaosfa6SKeK9YIVJXE1JF0Q4AE6 3AV/KyxjJfeEGHc/5nMrC/cFub253OX1F1aBYv8D2o3YvYlPTEC3S/pPtwbZvYrx18ws p1oQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ztPNBIfnfAJgV0KLRvZIxMSySeJ0LwE8CozuiICuxr0=; b=tSSMDQZQsktgPN0ZDZOEIb0+HHvdp6CezB6hiJVPLVNB0D1Z2UH5/Q+dHrkzaSXoL9 PNGOvnB4sEKOxtW7F4TB5UJYH3PzvQVRFP8T844jhoZAvatPHwYjigTdMa87TtcPQ3us Q+jJH5CksiyHrO7By7AhBRxjyQk2l6eZOvcHl6aH6rYtKDhtELN9AVyMAkcdce2ujref re1uqc2LiDuqcpG+gdtMkdVcKN+JIHXOZfM73Ypu263uUBWmI6He5TMO4JpeVp8goScH +4YUY3Mu6Fh1pPIrwQzuQIG84cC8FK/BBEzbQOgejlw0eG9oNH6edbAZuHorsqyO/RZb /vvA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=EtUipxiR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cx24si11509012edb.541.2021.03.22.05.55.32; Mon, 22 Mar 2021 05:55:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=EtUipxiR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232634AbhCVMwh (ORCPT + 99 others); Mon, 22 Mar 2021 08:52:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:36008 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232521AbhCVMmq (ORCPT ); Mon, 22 Mar 2021 08:42:46 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 8A891619B6; Mon, 22 Mar 2021 12:40:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1616416835; bh=hbIgt19IBV9LMeLYRgLcF9U819AFktoNC+UNDW3kUVg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=EtUipxiR6OtLuTuTHC8UbreYIi8emWBc4qZRtPVRUdPWlvNCqW+ylJPzcrHm8n4PE TLI78pi0AwlVD3sK3sZ5EOlHjB5pOIe/4S0rZfgGW1dQdaO+MotzMZHpSFuG2mH069 Dztq99vfcDwZ7sgm/R4CAB+uwAgg8NPK+1GNh5E4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vince Weaver , Kan Liang , "Peter Zijlstra (Intel)" Subject: [PATCH 5.10 139/157] perf/x86/intel: Fix unchecked MSR access error caused by VLBR_EVENT Date: Mon, 22 Mar 2021 13:28:16 +0100 Message-Id: <20210322121938.160000191@linuxfoundation.org> X-Mailer: git-send-email 2.31.0 In-Reply-To: <20210322121933.746237845@linuxfoundation.org> References: <20210322121933.746237845@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kan Liang commit 2dc0572f2cef87425147658698dce2600b799bd3 upstream. On a Haswell machine, the perf_fuzzer managed to trigger this message: [117248.075892] unchecked MSR access error: WRMSR to 0x3f1 (tried to write 0x0400000000000000) at rIP: 0xffffffff8106e4f4 (native_write_msr+0x4/0x20) [117248.089957] Call Trace: [117248.092685] intel_pmu_pebs_enable_all+0x31/0x40 [117248.097737] intel_pmu_enable_all+0xa/0x10 [117248.102210] __perf_event_task_sched_in+0x2df/0x2f0 [117248.107511] finish_task_switch.isra.0+0x15f/0x280 [117248.112765] schedule_tail+0xc/0x40 [117248.116562] ret_from_fork+0x8/0x30 A fake event called VLBR_EVENT may use the bit 58 of the PEBS_ENABLE, if the precise_ip is set. The bit 58 is reserved by the HW. Accessing the bit causes the unchecked MSR access error. The fake event doesn't support PEBS. The case should be rejected. Fixes: 097e4311cda9 ("perf/x86: Add constraint to create guest LBR event without hw counter") Reported-by: Vince Weaver Signed-off-by: Kan Liang Signed-off-by: Peter Zijlstra (Intel) Cc: stable@vger.kernel.org Link: https://lkml.kernel.org/r/1615555298-140216-2-git-send-email-kan.liang@linux.intel.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/events/intel/core.c | 3 +++ 1 file changed, 3 insertions(+) --- a/arch/x86/events/intel/core.c +++ b/arch/x86/events/intel/core.c @@ -3562,6 +3562,9 @@ static int intel_pmu_hw_config(struct pe return ret; if (event->attr.precise_ip) { + if ((event->attr.config & INTEL_ARCH_EVENT_MASK) == INTEL_FIXED_VLBR_EVENT) + return -EINVAL; + if (!(event->attr.freq || (event->attr.wakeup_events && !event->attr.watermark))) { event->hw.flags |= PERF_X86_EVENT_AUTO_RELOAD; if (!(event->attr.sample_type &