Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp2122505rwb; Fri, 2 Dec 2022 05:56:38 -0800 (PST) X-Google-Smtp-Source: AA0mqf7WhcWZPXrd7nMK/RyWLyG4c2xJDmovtvNncBdV4vTKx3jWBXVBSgjsnt2J9fyrOCb6hiiR X-Received: by 2002:a17:906:fa98:b0:7c0:a8ff:3380 with SMTP id lt24-20020a170906fa9800b007c0a8ff3380mr8418662ejb.92.1669989398124; Fri, 02 Dec 2022 05:56:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669989398; cv=none; d=google.com; s=arc-20160816; b=VVkvZoJcO2YvxuoDdX70TKru1UkEWyrhKQ9OAK04esfaQwHb35tLJezEvGDomcyXfN wAkEzetlEw7wlITORe6R5iJbdyYNv9GWl01BgFYth/9W7xn1/Sr8lyxcadyeynunaaH6 HJrW6/V5ux0Znvbb+O95CXPDXZXPbOfM9t+A0C5YzV0nXODqRlWFA9iG7eCkbbO+LTkC eTPP1HssQ0d01LBj5S44r++C3YkhMKCM07ROw1j3R8A6xlvk5OejXk66KtNY7VDMX44F zA0HySCxMsEWl7IVOy85/IaSRKd3WWt/1qBZEVp+w+If3QBhDykkYNtFk8A9crNw/dGH nuGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:feedback-id :dkim-signature:dkim-signature; bh=nnH2aCJND8jeSVoTp/sLLPIwU0GcEcoqylwasYtGMK0=; b=Tl1ajNio/5OTJssac1rfsoSBW4PND+aNskpxOIaFvUQCd/2/Ud3HzuazaAkQ/n1tWL b8UvaKEItIw1A84cIUIKWYW2kTFbDu/oEFAKP75mETlL9oh8ztE0EpsyDR9/RhMzhO/v SjDb9thK65/3XJzZYeMRvgMng7HlXmq7mjjnmPIRnd/bWxvNh+k5CzjLRdHc2+TCsl8R A/E8QVzLeANljEBn3Arnw3TMQ86F7q1DbyW8GcFCoTmcz8kpUJgYzQkQF4VVknDWWAC3 xRiaEsalmOriN6/Map5AaNnHfFlq2TXOoOZBLjPoZ3kyIf2WFB1DIHeEX5u2e7yvk+T0 YJtw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@shutemov.name header.s=fm3 header.b=vPcmXRbn; dkim=pass header.i=@messagingengine.com header.s=fm1 header.b=l8H95D3q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ne36-20020a1709077ba400b007ae76a4e35fsi2767161ejc.5.2022.12.02.05.56.17; Fri, 02 Dec 2022 05:56:38 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@shutemov.name header.s=fm3 header.b=vPcmXRbn; dkim=pass header.i=@messagingengine.com header.s=fm1 header.b=l8H95D3q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233426AbiLBN1M (ORCPT + 83 others); Fri, 2 Dec 2022 08:27:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56488 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231929AbiLBN1K (ORCPT ); Fri, 2 Dec 2022 08:27:10 -0500 Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3FAEF83E95 for ; Fri, 2 Dec 2022 05:27:07 -0800 (PST) Received: from compute2.internal (compute2.nyi.internal [10.202.2.46]) by mailout.nyi.internal (Postfix) with ESMTP id 6DA935C00DE; Fri, 2 Dec 2022 08:27:06 -0500 (EST) Received: from mailfrontend1 ([10.202.2.162]) by compute2.internal (MEProxy); Fri, 02 Dec 2022 08:27:06 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=shutemov.name; h=cc:cc:content-type:date:date:from:from:in-reply-to :in-reply-to:message-id:mime-version:references:reply-to:sender :subject:subject:to:to; s=fm3; t=1669987626; x=1670074026; bh=nn H2aCJND8jeSVoTp/sLLPIwU0GcEcoqylwasYtGMK0=; b=vPcmXRbnU4666E/as6 EEysrh54PYRraOm54SuaJGlaHJih702gtrVzqc8tTpP9e0iIBmpCOuNUt1jiSqDW 5llT3N5cO3+AzQzvKVaupxFZ0FZstbZJevzs7CmLoTu/wRusI9wbnLFRPS+Zl7bb 4+W9fzEy9LihlXTi3Vhadad0TvSlo9AeIaqRZohvBH9NIg93duBL25jwD3JSDPvI bAEY68ciICntwBv9YDoawbEfQlYm1zxnE2updXcObxtyjXLWD4yoMA9EZTe2Ntde /Wc9HUYYFkLvlLAVnd03CFPB0QwOruQPtueKLGWVKEZWMLJc6evAENb18dJ0qusS FQxg== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-type:date:date:feedback-id :feedback-id:from:from:in-reply-to:in-reply-to:message-id :mime-version:references:reply-to:sender:subject:subject:to:to :x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm1; t=1669987626; x=1670074026; bh=nnH2aCJND8jeSVoTp/sLLPIwU0Gc EcoqylwasYtGMK0=; b=l8H95D3qVNTMxEA4awNIIFpPHFuhM5LPGxsMis65DbKl Dqp4O16nZKb9PlHMdhKPNScSHHoY+pCyKMAKg2NGxXNbGgAwpsUfl7nglQ8w4uP+ S328IzhfxYiYOa3cn8dz3PAXJQIGLQNbjYUDSQ5K5H+7HkJlEfacRbFFJqR3kdqC WpAiKb1KKs6P9Cw8TI2H00lq5lVO9/nTtNwAg/LTD2/XaYUxs5R4QU0VkvvNFtj/ 0ViL2eJR2jc7VbfQi/TwiaUl5UjVPH6C8PaN8KW9UOxza9Ju3gAw6K/VbCpeaYdL j4XMMvufq27UUpslLBFai3Zgl/PKM7AzyOZcjnb/tg== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvhedrtdekgddvkecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenuc fjughrpeffhffvvefukfhfgggtuggjsehttddttddttddvnecuhfhrohhmpedfmfhirhhi lhhlucetrdcuufhhuhhtvghmohhvfdcuoehkihhrihhllhesshhhuhhtvghmohhvrdhnrg hmvgeqnecuggftrfgrthhtvghrnhepfeeileeffeeiteeljeekheetieehhffhfeeuheel tdetgfeuvddvffegvdelhfdunecuffhomhgrihhnpehinhhtvghlrdgtohhmnecuvehluh hsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomhepkhhirhhilhhlsehs hhhuthgvmhhovhdrnhgrmhgv X-ME-Proxy: Feedback-ID: ie3994620:Fastmail Received: by mail.messagingengine.com (Postfix) with ESMTPA; Fri, 2 Dec 2022 08:27:04 -0500 (EST) Received: by box.shutemov.name (Postfix, from userid 1000) id EC5B210975F; Fri, 2 Dec 2022 16:27:01 +0300 (+03) Date: Fri, 2 Dec 2022 16:27:01 +0300 From: "Kirill A. Shutemov" To: Juergen Gross Cc: linux-kernel@vger.kernel.org, x86@kernel.org, Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , Andy Lutomirski , Peter Zijlstra Subject: Re: [PATCH v5 13/16] x86: decouple PAT and MTRR handling Message-ID: <20221202132701.ymcp7a2yv3st33so@box.shutemov.name> References: <20221102074713.21493-1-jgross@suse.com> <20221102074713.21493-14-jgross@suse.com> <20221201162639.omlr5ff55go7uhlf@box.shutemov.name> <6d642051-31d8-81d5-f379-568360c5cb60@suse.com> <20221201235753.ybfc7gkgj7hlfkru@box.shutemov.name> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Dec 02, 2022 at 06:56:47AM +0100, Juergen Gross wrote: > On 02.12.22 00:57, Kirill A. Shutemov wrote: > > On Thu, Dec 01, 2022 at 05:33:28PM +0100, Juergen Gross wrote: > > > On 01.12.22 17:26, Kirill A. Shutemov wrote: > > > > On Wed, Nov 02, 2022 at 08:47:10AM +0100, Juergen Gross wrote: > > > > > Today PAT is usable only with MTRR being active, with some nasty tweaks > > > > > to make PAT usable when running as Xen PV guest, which doesn't support > > > > > MTRR. > > > > > > > > > > The reason for this coupling is, that both, PAT MSR changes and MTRR > > > > > changes, require a similar sequence and so full PAT support was added > > > > > using the already available MTRR handling. > > > > > > > > > > Xen PV PAT handling can work without MTRR, as it just needs to consume > > > > > the PAT MSR setting done by the hypervisor without the ability and need > > > > > to change it. This in turn has resulted in a convoluted initialization > > > > > sequence and wrong decisions regarding cache mode availability due to > > > > > misguiding PAT availability flags. > > > > > > > > > > Fix all of that by allowing to use PAT without MTRR and by reworking > > > > > the current PAT initialization sequence to match better with the newly > > > > > introduced generic cache initialization. > > > > > > > > > > This removes the need of the recently added pat_force_disabled flag, so > > > > > remove the remnants of the patch adding it. > > > > > > > > > > Signed-off-by: Juergen Gross > > > > > > > > This patch breaks boot for TDX guest. > > > > > > > > Kernel now tries to set CR0.CD which is forbidden in TDX guest[1] and > > > > causes #VE: > > > > > > > > tdx: Unexpected #VE: 28 > > > > VE fault: 0000 [#1] PREEMPT SMP NOPTI > > > > CPU: 0 PID: 0 Comm: swapper Not tainted 6.1.0-rc1-00015-gadfe7512e1d0 #2646 > > > > Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 > > > > RIP: 0010:native_write_cr0 (arch/x86/kernel/cpu/common.c:427) > > > > Call Trace: > > > > > > > > ? cache_disable (arch/x86/include/asm/cpufeature.h:173 arch/x86/kernel/cpu/cacheinfo.c:1085) > > > > ? cache_cpu_init (arch/x86/kernel/cpu/cacheinfo.c:1132 (discriminator 3)) > > > > ? setup_arch (arch/x86/kernel/setup.c:1079) > > > > ? start_kernel (init/main.c:279 (discriminator 3) init/main.c:477 (discriminator 3) init/main.c:960 (discriminator 3)) > > > > ? load_ucode_bsp (arch/x86/kernel/cpu/microcode/core.c:155) > > > > ? secondary_startup_64_no_verify (arch/x86/kernel/head_64.S:358) > > > > > > > > > > > > Any suggestion how to fix it? > > > > > > > > [1] Section 10.6.1. "CR0", https://cdrdv2.intel.com/v1/dl/getContent/733568 > > > > > > What was the solution before? > > > > > > I guess MTRR was disabled, so there was no PAT, too? > > > > Right: > > > > Linus' tree: > > > > [ 0.002589] last_pfn = 0x480000 max_arch_pfn = 0x10000000000 > > [ 0.003976] Disabled > > [ 0.004452] x86/PAT: MTRRs disabled, skipping PAT initialization too. > > [ 0.005856] CPU MTRRs all blank - virtualized system. > > [ 0.006915] x86/PAT: Configuration [0-7]: WB WT UC- UC WB WT UC- UC > > > > tip/master: > > > > [ 0.003443] last_pfn = 0x20b8e max_arch_pfn = 0x10000000000 > > [ 0.005220] Disabled > > [ 0.005818] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT > > [ 0.007752] tdx: Unexpected #VE: 28 > > > > The dangling "Disabled" comes mtrr_bp_init(). > > > > > > > If this is the case, you can go the same route as Xen PV guests do. > > > > Any reason X86_FEATURE_HYPERVISOR cannot be used instead of > > X86_FEATURE_XENPV there? > > > > Do we have any virtualized platform that supports it? > > Yes, of course. Any hardware virtualized guest should be able to use it, > obviously TDX guests are the first ones not being able to do so. > > And above dmesg snipplets are showing rather nicely that not disabling > PAT completely should be a benefit for TDX guests, as all caching modes > would be usable (the PAT MSR seems to be initialized quite fine). > > Instead of X86_FEATURE_XENPV we could introduce something like > X86_FEATURE_PAT_READONLY, which could be set for Xen PV guests and for > TDX guests. Technically, the MSR is writable on TDX. But it seems there's no way to properly change it, following the protocol of changing on MP systems. Although, I don't quite follow what role cache disabling playing on system with self-snoop support. Hm? -- Kiryl Shutsemau / Kirill A. Shutemov