Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1760121Ab2FGIVE (ORCPT ); Thu, 7 Jun 2012 04:21:04 -0400 Received: from [216.32.181.182] ([216.32.181.182]:5033 "EHLO ch1outboundpool.messaging.microsoft.com" rhost-flags-FAIL-FAIL-OK-OK) by vger.kernel.org with ESMTP id S1752351Ab2FGIUy (ORCPT ); Thu, 7 Jun 2012 04:20:54 -0400 X-Forefront-Antispam-Report: CIP:163.181.249.109;KIP:(null);UIP:(null);IPV:NLI;H:ausb3twp02.amd.com;RD:none;EFVD:NLI X-SpamScore: -11 X-BigFish: VPS-11(zzbb2dI9371I1432N98dKzz1202hzz8275bh8275dhz2dh668h839hd25he5bhf0ah) X-WSS-ID: 0M58N4Q-02-3Y3-02 X-M-MSG: Message-ID: <4FD063F0.3060301@amd.com> Date: Thu, 7 Jun 2012 10:18:56 +0200 From: Andre Przywara User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:11.0) Gecko/20120404 Thunderbird/11.0.1 MIME-Version: 1.0 To: Greg KH CC: Borislav Petkov , "H. Peter Anvin" , Konrad Rzeszutek Wilk , Jacob Shin , , , LKML , Jan Beulich , Ingo Molnar , Thomas Gleixner , Andreas Herrmann , Subject: Re: [PATCH 3/4] x86, AMD: Fix crash as Xen Dom0 on AMD Trinity systems References: <1338562358-28182-1-git-send-email-bp@amd64.org> <1338562358-28182-4-git-send-email-bp@amd64.org> <4FCFD2EE.8060508@zytor.com> <20120607072159.GB9856@aftab.osrc.amd.com> <4FD05CED.60905@amd.com> <20120607080833.GA23186@kroah.com> In-Reply-To: <20120607080833.GA23186@kroah.com> Content-Type: text/plain; charset="ISO-8859-1"; format=flowed Content-Transfer-Encoding: 7bit X-OriginatorOrg: amd.com Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3235 Lines: 82 On 06/07/2012 10:08 AM, Greg KH wrote: > On Thu, Jun 07, 2012 at 09:49:01AM +0200, Andre Przywara wrote: >> On 06/07/2012 09:21 AM, Borislav Petkov wrote: >>> On Wed, Jun 06, 2012 at 03:00:14PM -0700, H. Peter Anvin wrote: >>>> On 06/01/2012 07:52 AM, Borislav Petkov wrote: >>>>> From: Andre Przywara >>>>> >>>>> f7f286a910221 ("x86/amd: Re-enable CPU topology extensions in case BIOS >>>>> has disabled it") wrongfully added code which used the AMD-specific >>>>> {rd,wr}msr variants for no real reason. >>>>> >>>>> This caused boot panics on xen which wasn't initializing the >>>>> {rd,wr}msr_safe_regs pv_ops members properly. >>>>> >>>>> This, in turn, caused a heated discussion leading to us reviewing all >>>>> uses of the AMD-specific variants and removing them where unneeded >>>>> (almost everywhere except an obscure K8 BIOS fix, see 6b0f43ddfa358). >>>>> >>>>> Finally, this patch switches to the standard {rd,wr}msr*_safe* variants >>>>> which should've been used in the first place anyway and avoided unneeded >>>>> excitation with xen. >>>>> >>>>> Signed-off-by: Andre Przywara >>>>> Cc: Andreas Herrmann >>>>> Cc: stable@vger.kernel.org # 3.4+ >>>>> Link: >>>>> [Boris: correct and expand commit message] >>>>> Signed-off-by: Borislav Petkov >>>> >>>> Why -stable? I though we had agreed that we didn't have an active >>>> problem (unclean hack, yes, but not an active problem) in 3.4/3.5 as it >>>> currently sits? >> >> This is probably a leftover from the original patch, before Konrad's >> patch got committed. >> >>> Yes, AFAICT, we need at least one fix for 3.4 where the original patch >>> f7f286a910221 broke xen. >>> >>> So either this one or 1ab46fd319bc should be backported to stable, if >>> I'm not mistaken. If the second, I'll drop the stable tag from this one >>> and resend. >>> >>> Konrad, what do you want wrt xen paravirt nullptr breakage for >>> 3.4-stable? >> >> Greg just sent out the review mail for 1ab46fd319bc, so we can drop >> the stable tag from this one. >> >> Regards, >> Andre. > > What? So I don't need to do anything? > > Totally confused, Sorry for that. To fix the issue, we need only one of those patches. Mine ("Fix crash as Xen Dom0 on AMD Trinity systems", removing "_amd" from the rd/wrmsr calls) was sent out earlier, so I added the stable tag. A bit later Konrad sent his patch (1ab46fd319bc, initializing the forgotten PVOPS members), which hpa took (dropping mine). So this fix is in 3.5-rc1 and should also be in -stable. Now for making things smoother Boris sent out mine again - for 3.6 - and more or less accidentally kept the stable tag in it. Long story short: everything is fine, just apply the one you sent the review message for. HTH, Andre. -- Andre Przywara AMD-Operating System Research Center (OSRC), Dresden, Germany -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/