Received: by 2002:ac0:e34a:0:0:0:0:0 with SMTP id g10csp188387imn; Wed, 27 Jul 2022 03:40:22 -0700 (PDT) X-Google-Smtp-Source: AGRyM1uXsWBHdMdS6CsHAXOee0KQb4jjXxSm6SxyUod1LdlU4BCpc4NSSQT32+Zl17ZqR3FMBEyY X-Received: by 2002:a17:902:cf4c:b0:16d:1175:9ed0 with SMTP id e12-20020a170902cf4c00b0016d11759ed0mr21562085plg.66.1658918421755; Wed, 27 Jul 2022 03:40:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658918421; cv=none; d=google.com; s=arc-20160816; b=EIADKBZtebxZstkZwk7g/jVJ3QhSaK3OMeFZ6xivFx/rT4qV5A43bFB9D8lWNXqfDt frlLLOQcCYTUc1xlwDVkVYjbkUJiYSLnN4Dz4hbsqkGtZw6ie+XX7NV1B4kMmNHOkjc8 7XHie80FDraQALdPF06f++gEzaCsyYu66oKOm91ZpV0357irtFH3vurlXYK69doAqEl5 4EXv7zupTjPfWkX4aWyXzzXEy8ll6+kEslmmkTni6VG+nP4h9NMMDztY7+w4iRELm43O SrcWlC3T6hqtP2JuTXE24iK0n3TD4BU8Cg2QnZWWj0RNtp4ey1YClCuM6dnLaylUe2hQ MJ2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=xJ74GF4mlhYqy+2/HrHGfYCLzmw6cTg2nUt/Z8f593o=; b=jfVM2HQwGEngQRfQYfcY94kgcyTfP2anLvKDJBh1Cs2BFtEpNCBvjGMrUAJivlJzz/ a4cSRU+pwUVg4s/xhQbV/ecvFUEVlSM25PKhf221Rjf2Fx+I1ChCe+BRE9ilC/Ko5eN9 LFYt7KH3L9LYJ6IqXOthkqxlo2SfjU1GHOJsKwEo4O/Kp3PEt0oaFeu5QvkcClNnuf6s X/HTgRG4cF/EkouQ3l99WTjRsvyYyiRskS2gji7MPjdzi0p28ubiOrCTrA/ydCJzuuNL aaabtoPHbIfXdtPvj0FfXSZpQRQevSpgG7tDB3ubXrOaqJq62eWfYO+6VRR1Gj6OHwIu P6UQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=BSwAnnE5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s15-20020a632c0f000000b004199ede8011si20189146pgs.846.2022.07.27.03.40.06; Wed, 27 Jul 2022 03:40:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=BSwAnnE5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231252AbiG0KXA (ORCPT + 99 others); Wed, 27 Jul 2022 06:23:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57368 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229594AbiG0KW4 (ORCPT ); Wed, 27 Jul 2022 06:22:56 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 86EBB357EB for ; Wed, 27 Jul 2022 03:22:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1658917374; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=xJ74GF4mlhYqy+2/HrHGfYCLzmw6cTg2nUt/Z8f593o=; b=BSwAnnE571nOizAI6FPb9mMNR+/5XUw0sCDJVx7jgJ/RSfl7FunmW11g7iG2E0BtfZFfYZ fitQu9kmXEwoFMlX+201UFXkkcZthJkM7cjNimnP9gSj2cwjWY+xyUs68kG117o/1yHxBP 7m4C76zbxTg/esfxzIOzZSdHrql+n6s= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-152-jLVwplDrOyiBnwEvMA7seg-1; Wed, 27 Jul 2022 06:22:51 -0400 X-MC-Unique: jLVwplDrOyiBnwEvMA7seg-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id F0A71801585; Wed, 27 Jul 2022 10:22:50 +0000 (UTC) Received: from starship (unknown [10.40.192.46]) by smtp.corp.redhat.com (Postfix) with ESMTP id 2F22A1121314; Wed, 27 Jul 2022 10:22:48 +0000 (UTC) Message-ID: <20dcddad9f6c8384c49f9d8ec95a826df35fc92d.camel@redhat.com> Subject: Re: [PATCH] KVM: x86: enable TDP MMU by default From: Maxim Levitsky To: Paolo Bonzini , Stoiko Ivanov Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, bgardon@google.com, Jim Mattson Date: Wed, 27 Jul 2022 13:22:48 +0300 In-Reply-To: References: <20210726163106.1433600-1-pbonzini@redhat.com> <20220726165748.76db5284@rosa.proxmox.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.5 (3.36.5-2.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 X-Spam-Status: No, score=-2.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2022-07-26 at 17:43 +0200, Paolo Bonzini wrote: > On 7/26/22 16:57, Stoiko Ivanov wrote: > > Hi, > > > > Proxmox[0] recently switched to the 5.15 kernel series (based on the one > > for Ubuntu 22.04), which includes this commit. > > While it's working well on most installations, we have a few users who > > reported that some of their guests shutdown with > > `KVM: entry failed, hardware error 0x80000021` being logged under certain > > conditions and environments[1]: > > * The issue is not deterministically reproducible, and only happens > > eventually with certain loads (e.g. we have only one system in our > > office which exhibits the issue - and this only by repeatedly installing > > Windows 2k22 ~ one out of 10 installs will cause the guest-crash) > > * While most reports are referring to (newer) Windows guests, some users > > run into the issue with Linux VMs as well > > * The affected systems are from a quite wide range - our affected machine > > is an old IvyBridge Xeon with outdated BIOS (an equivalent system with > > the latest available BIOS is not affected), but we have > > reports of all kind of Intel CPUs (up to an i5-12400). It seems AMD CPUs > > are not affected. > > > > Disabling tdp_mmu seems to mitigate the issue, but I still thought you > > might want to know that in some cases tdp_mmu causes problems, or that you > > even might have an idea of how to fix the issue without explicitly > > disabling tdp_mmu? > > If you don't need secure boot, you can try disabling SMM. It should not > be related to TDP MMU, but the logs (thanks!) point at an SMM entry (RIP > = 0x8000, CS base=0x7ffc2000). No doubt about it. It is the issue. > > This is likely to be fixed by > https://lore.kernel.org/kvm/20220621150902.46126-1-mlevitsk@redhat.com/. Speaking of my patch series, anything I should do to move that thing forward? My approach to preserve the interrupt shadow in SMRAM doesn't seem to be accepted, so what you think I should do? Best regards, Maxim Levitsky > > Paolo >