[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <fd2cf028-bd83-57ff-7e6d-ef3ee11852a1@redhat.com>
Date: Wed, 2 Nov 2022 14:40:18 +0100
From: Paolo Bonzini <pbonzini@...hat.com>
To: Borislav Petkov <bp@...en8.de>,
Maxim Levitsky <mlevitsk@...hat.com>
Cc: linux-kernel@...r.kernel.org, kvm@...r.kernel.org,
Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>,
Ingo Molnar <mingo@...hat.com>,
Josh Poimboeuf <jpoimboe@...nel.org>,
Namhyung Kim <namhyung@...nel.org>,
Tony Luck <tony.luck@...el.com>,
"H. Peter Anvin" <hpa@...or.com>,
Arnaldo Carvalho de Melo <acme@...nel.org>,
Thomas Gleixner <tglx@...utronix.de>,
Alexander Shishkin <alexander.shishkin@...ux.intel.com>,
Tim Chen <tim.c.chen@...ux.intel.com>,
"David S. Miller" <davem@...emloft.net>,
Dave Hansen <dave.hansen@...ux.intel.com>,
"Chang S. Bae" <chang.seok.bae@...el.com>,
Jane Malalane <jane.malalane@...rix.com>,
Kees Cook <keescook@...omium.org>,
Kan Liang <kan.liang@...ux.intel.com>,
Peter Zijlstra <peterz@...radead.org>,
"maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)" <x86@...nel.org>,
Herbert Xu <herbert@...dor.apana.org.au>,
Jiri Olsa <jolsa@...nel.org>,
Mark Rutland <mark.rutland@....com>,
linux-perf-users@...r.kernel.org,
"open list:CRYPTO API" <linux-crypto@...r.kernel.org>
Subject: Re: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap
instead of clear_cpu_cap
On 10/20/22 10:59, Borislav Petkov wrote:
> On Wed, Sep 28, 2022 at 01:49:34PM +0300, Maxim Levitsky wrote:
>> Patch 5 is the main fix - it makes the kernel to be tolerant to a
>> broken CPUID config (coming hopefully from hypervisor), where you have
>> a feature (AVX2 in my case) but not a feature on which this feature
>> depends (AVX).
>
> I really really don't like it when people are fixing the wrong thing.
>
> Why does the kernel need to get fixed when something else can't get its
> CPUID dependencies straight? I don't even want to know why something
> would set AVX2 without AVX?!?!
Users do so because they just "disable AVX" (e.g. in QEMU -cpu
host,-avx) and that removes the AVX bit. Userspace didn't bother to
implement the whole set of CPUID bit dependencies for AVX because:
1) Intel is adding AVX features every other week and probably half the
time people would forget to add the dependency
2) anyway you absolutely need to check XCR0 before using AVX, which in
the kernel is done using cpu_has_xfeatures(XFEATURE_MASK_YMM), and
userspace *does* remove the XSAVE state from 0Dh leaf if you remove AVX.
(2) in particular holds even on bare metal. The kernel bug here is that
X86_FEATURE_AVX only tells you if the instructions are _present_, not if
they are _usable_. Indeed, the XCR0 check is present for all other
files in arch/x86/crypto, either instead or in addition to
boot_cpu_has(X86_FEATURE_AVX).
Maxim had sent a patch about a year ago to do it in aesni-intel-glue.c
but Dave told him to fix the dependencies instead
(https://lore.kernel.org/all/20211103124614.499580-1-mlevitsk@redhat.com/).
What do you think of applying that patch instead?
Thanks,
Paolo
Powered by blists - more mailing lists