Received: by 2002:a05:6512:3d0e:0:0:0:0 with SMTP id d14csp56377lfv; Tue, 12 Apr 2022 17:07:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzeLzfvdeKzOw96rVtziqrA0SKeD1VO0I1TLWF4mSE3McYlVZoE5VRjqco1F6qT6HyRY8b/ X-Received: by 2002:a17:902:c104:b0:158:8b31:781b with SMTP id 4-20020a170902c10400b001588b31781bmr5060615pli.67.1649808428677; Tue, 12 Apr 2022 17:07:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649808428; cv=none; d=google.com; s=arc-20160816; b=fS6eNDRMKBqDSrS216lsc8/zG8rXk9kwy7gIonlUbUXcbnqzBeuaDUzUmHctgjJiwx kj+VjVJ7//nTsIAYlXhZ02o/dXRSBtM5ul2torBPhYG+935aYn5bWp4iXooOL0y+RlCw i3O+chBq49r9BZcm7HZviN0shdGqwMQA/0Cx4eKSctncX2UgPF2jdkq/8FvrnnUiIqVw 3es1WuaYsVvwmYwygpJv/MuBxRWPIZyAfZHOvEuoW7v8JcTc7npGZfIJjIzkrIPRc5u3 oJ3IgJnookw5jeQ0KeV15PfJTJmpfgtSteT+FyO+sm31WXUFLlK4zmJp6zC34LE/mhpo r0dw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Mh+ZHN90ZxeVYmF5DA9NKkLEQqdz8R34Tfe3OhwJ5KI=; b=kzLcxYq/+J1ugZeQnXsrlRDEjSb5QE02PyT6t3dtQ9FYR4EahwkbBUJMkrpGamgp7U 2YcYFl914kvUTihpzRujRDegQywHrLVaRopD/6uX6GQDdcf0QXJN+/tyxscHvTtQ1JOk pAypitnEMYG06sR6tEMalPdyZMXUUl0D6gREju/bJHZblvYOChOPykb2xJOTeJ1K/q2v 7qs7VNd4NBJCv6X4c7VR670CYK/2GJetwzZsEdChLr7OWRqDNRuW/BmExEcD6cIgSpnf ojPCO4FJ3XIr4k2QOms4AeYTC9xwUdnqgwkA+adSIsG8NZhCKK4XIQDGsfyRsLNwk5Eb aatA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=KSDBD8iY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id n12-20020a170902d2cc00b00153b2d16429si813305plc.49.2022.04.12.17.07.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Apr 2022 17:07:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=KSDBD8iY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (out1.vger.email [IPv6:2620:137:e000::1:20]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id D98D7154480; Tue, 12 Apr 2022 15:04:07 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229663AbiDLVYi (ORCPT + 99 others); Tue, 12 Apr 2022 17:24:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57826 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229455AbiDLVYf (ORCPT ); Tue, 12 Apr 2022 17:24:35 -0400 Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 23D0218114F; Tue, 12 Apr 2022 14:05:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1649797537; x=1681333537; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=BHLbe/RoUopliJXw7PZpTsR/hL9ogzQTYddN+kx+atU=; b=KSDBD8iYzCqN0x5BreM7rl7BmaJucB/khEuSIT0O2+sKfLIOtNURroMp bQHgDtDdXl42OAMFtkpdMGbpEbl03hzlKod9hWZ8ltuPBRgaVkjtVrzd3 morhyAleYJ+A3lNyxYaY7ia0rHEgrK0aRxQClhLaW2LUQY4TQUOtCOZ3/ XldR5ldXOKdBMiE6AJWBsJ8gEY+tjt0wyZurIRCD3/fZ6mGF72zT3euSz T+KozsHjkg1i9y5uDnqLcFQobc7xog19ZtoWSK/cR4yRZD7/2PzaLixPH 9ZhzaSV6JLrRRW52HQwhdJCUp5e9hnS9fjiRtZ/J1kqZePT/5UURnFAoP w==; X-IronPort-AV: E=McAfee;i="6400,9594,10315"; a="260098619" X-IronPort-AV: E=Sophos;i="5.90,254,1643702400"; d="scan'208";a="260098619" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Apr 2022 13:54:14 -0700 X-IronPort-AV: E=Sophos;i="5.90,254,1643702400"; d="scan'208";a="644899572" Received: from lpfafma-mobl.amr.corp.intel.com (HELO guptapa-desk) ([10.209.17.36]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Apr 2022 13:54:13 -0700 Date: Tue, 12 Apr 2022 13:54:11 -0700 From: Pawan Gupta To: Jon Kohler Cc: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Andi Kleen , Tony Luck , linux-kernel@vger.kernel.org, dave.hansen@intel.com, Borislav Petkov , Neelima Krishnan , "kvm @ vger . kernel . org" Subject: Re: [PATCH v2] x86/tsx: fix KVM guest live migration for tsx=on Message-ID: <20220412205411.m7n2gnon3ai7wobm@guptapa-desk> References: <20220411180131.5054-1-jon@nutanix.com> <20220411200703.48654-1-jon@nutanix.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Disposition: inline In-Reply-To: <20220411200703.48654-1-jon@nutanix.com> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Apr 11, 2022 at 04:07:01PM -0400, Jon Kohler wrote: >Move automatic disablement for TSX microcode deprecation from tsx_init() to >x86_get_tsx_auto_mode(), such that systems with tsx=on will continue to >see the TSX CPU features (HLE, RTM) even on updated microcode. > >KVM live migration could be possibly be broken in 5.14+ commit 293649307ef9 >("x86/tsx: Clear CPUID bits when TSX always force aborts"). Consider the >following scenario: > >1. KVM hosts clustered in a live migration capable setup. >2. KVM guests have TSX CPU features HLE and/or RTM presented. >3. One of the three maintenance events occur: >3a. An existing host running kernel >= 5.14 in the pool updated with the > new microcode. >3b. A new host running kernel >= 5.14 is commissioned that already has the > microcode update preloaded. >3c. All hosts are running kernel < 5.14 with microcode update already > loaded and one existing host gets updated to kernel >= 5.14. >4. After maintenance event, the impacted host will not have HLE and RTM > exposed, and live migrations with guests with TSX features might not > migrate. Which part was this reproduced on? AFAIK server parts(except for some Intel Xeon E3s) did not get such microcode update. Thanks, Pawan