From: Sean Christopherson <seanjc@google.com>
To: Mario Limonciello <superm1@kernel.org>
Cc: Maxim Levitsky <mlevitsk@redhat.com>,
Borislav Petkov <bp@alien8.de>,
Thomas Gleixner <tglx@linutronix.de>,
Ingo Molnar <mingo@redhat.com>,
Dave Hansen <dave.hansen@linux.intel.com>,
"maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)"
<x86@kernel.org>, "H . Peter Anvin" <hpa@zytor.com>,
Nikolay Borisov <nik.borisov@suse.com>,
Tom Lendacky <thomas.lendacky@amd.com>,
Brijesh Singh <brijesh.singh@amd.com>,
"open list:X86 ARCHITECTURE (32-BIT AND 64-BIT)"
<linux-kernel@vger.kernel.org>,
Mario Limonciello <mario.limonciello@amd.com>,
kvm@vger.kernel.org
Subject: Re: [PATCH] x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client
Date: Wed, 6 Nov 2024 08:11:08 -0800 [thread overview]
Message-ID: <ZyuVHJ9K51tOkOMM@google.com> (raw)
In-Reply-To: <65fdc558-21e9-4311-b2b0-8b35131c7aac@kernel.org>
On Wed, Nov 06, 2024, Mario Limonciello wrote:
> On 11/6/2024 09:48, Maxim Levitsky wrote:
> > On Wed, 2024-11-06 at 07:15 -0800, Sean Christopherson wrote:
> > > On Wed, Nov 06, 2024, Mario Limonciello wrote:
> > > > On 11/6/2024 09:03, Sean Christopherson wrote:
...
> > > > > > diff --git a/arch/x86/kernel/cpu/amd.c b/arch/x86/kernel/cpu/amd.c
> > > > > > index 015971adadfc7..ecd42c2b3242e 100644
> > > > > > --- a/arch/x86/kernel/cpu/amd.c
> > > > > > +++ b/arch/x86/kernel/cpu/amd.c
> > > > > > @@ -924,6 +924,17 @@ static void init_amd_zen4(struct cpuinfo_x86 *c)
> > > > > > {
> > > > > > if (!cpu_has(c, X86_FEATURE_HYPERVISOR))
> > > > > > msr_set_bit(MSR_ZEN4_BP_CFG, MSR_ZEN4_BP_CFG_SHARED_BTB_FIX_BIT);
> > > > > > +
> > > > > > + /*
> > > > > > + * These Zen4 SoCs advertise support for virtualized VMLOAD/VMSAVE
> > > > > > + * in some BIOS versions but they can lead to random host reboots.
> > > > >
> > > > > Uh, CPU bug? Erratum?
> > > >
> > > > BIOS bug. Those shouldn't have been advertised.
> >
> > Hi!
> >
> > My question is, why would AMD drop support intentionally for VLS on client machines?
> >
> > I understand that there might be a errata, and I don't object disabling the
> > feature because of this.
> >
> > But hearing that 'These instructions aren't intended to be advertised' means that
> > AMD intends to stop supporting virtualization on client systems or at least partially
> > do so.
>
> Don't read into it too far. It's just a BIOS problem with those
> instructions "specifically" on the processors indicated here. Other
> processors (for example Zen 5 client processors) do correctly advertise
> support where applicable.
>
> When they launched those bits weren't supposed to be set to indicate
> support, but BIOS did set them.
As you quite clearly call out below, this isn't simply a BIOS problem.
> > That worries me. So far AMD was much better that Intel supporting most of the
> > features across all of the systems which is very helpful in various scenarios,
> > and this is very appreciated by the community.
> >
> > Speaking strictly personally here, as a AMD fan.
> >
> > Best regards,> Maxim Levitsky
> >
> >
> > >
> > > Why not? "but they can lead to random host reboots" is a description of the
> > > symptom, not an explanation for why KVM is unable to use a feature that is
> > > apparently support by the CPU.
> > >
> > > And if the CPU doesn't actually support virtualized VMLOAD/VMSAVE, then this is
> > > a much bigger problem, because it means KVM is effectively giving the guest read
> > > and write access to all of host memory.
> > >
> >
> >
>
> I'm gathering that what supported means to you and what it means to me are
> different things.
Yes. And the distinction matters greatly in this case, because "VMLOAD/VMSAVE
in the guest are broken" is *very* different than "VMLOAD/VMSAVE in the guest
actually operate on SPAs, not GPAs".
> "Architecturally" the instructions for virtualized VMLOAD/VMSAVE exist.
Which means they're supported, but broken.
> There are problems with them on these processors, and for that reason the
> BIOS was not supposed to set those bits but it did.
In other words, this a CPU bug. The kernel comment absolutely needs to reflect
that. Passing this off as BIOS going rogue is misleading and confusing.
next prev parent reply other threads:[~2024-11-06 16:11 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-11-05 16:02 [PATCH] x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client Mario Limonciello
2024-11-06 15:03 ` Sean Christopherson
2024-11-06 15:04 ` Mario Limonciello
2024-11-06 15:15 ` Sean Christopherson
2024-11-06 15:48 ` Maxim Levitsky
2024-11-06 15:58 ` Mario Limonciello
2024-11-06 16:11 ` Sean Christopherson [this message]
2024-11-06 16:13 ` Maxim Levitsky
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ZyuVHJ9K51tOkOMM@google.com \
--to=seanjc@google.com \
--cc=bp@alien8.de \
--cc=brijesh.singh@amd.com \
--cc=dave.hansen@linux.intel.com \
--cc=hpa@zytor.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mario.limonciello@amd.com \
--cc=mingo@redhat.com \
--cc=mlevitsk@redhat.com \
--cc=nik.borisov@suse.com \
--cc=superm1@kernel.org \
--cc=tglx@linutronix.de \
--cc=thomas.lendacky@amd.com \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox