From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id B3CDFC433F5 for ; Wed, 16 Feb 2022 10:05:38 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232698AbiBPKFs (ORCPT ); Wed, 16 Feb 2022 05:05:48 -0500 Received: from gmail-smtp-in.l.google.com ([23.128.96.19]:38898 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232692AbiBPKFs (ORCPT ); Wed, 16 Feb 2022 05:05:48 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8A5A79DD4F; Wed, 16 Feb 2022 02:05:36 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 46F37B81E5F; Wed, 16 Feb 2022 10:05:35 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 65305C004E1; Wed, 16 Feb 2022 10:05:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1645005934; bh=2J7xwzqTHWSDu2LH2Tt6SfS/J8p3zgSgjxdggOct+0A=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Z4pivZNnjcWwH5gWkuZPpjR0L6KEqfJdR6PwK5kDhXQ8A3vR5/OYVmdZ1WCbQaA49 dQjJ1epwQ1D/MLUj1C8LE5hNAcDDyhq3VNC/2vtvIhUf7E9R7IbtvQJa11JxX1sV34 02B6PA4yjOIesDlOX37gQ6sdKQwFVe8vESYTHhxQ= Date: Wed, 16 Feb 2022 11:05:31 +0100 From: Greg KH To: Brian Geffon Cc: Dave Hansen , Thomas Gleixner , Willis Kung , Guenter Roeck , Borislav Petkov , Andy Lutomirski , "# v4 . 10+" , the arch/x86 maintainers , LKML Subject: Re: [PATCH stable 5.4,5.10] x86/fpu: Correct pkru/xstate inconsistency Message-ID: References: <543efc25-9b99-53cd-e305-d8b4d917b64b@intel.com> <20220215192233.8717-1-bgeffon@google.com> <066c9f4b-b0a3-9343-9db9-1c1c7303da6f@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org On Tue, Feb 15, 2022 at 09:01:54PM -0500, Brian Geffon wrote: > On Tue, Feb 15, 2022 at 4:42 PM Dave Hansen wrote: > > > > On 2/15/22 13:32, Brian Geffon wrote: > > >> How was this tested, and what do the maintainers of this subsystem > > >> think? And will you be around to fix the bugs in this when they are > > >> found? > > > This has been trivial to reproduce, I've used a small repro which I've > > > put here: https://gist.github.com/bgaff/9f8cbfc8dd22e60f9492e4f0aff8f04f > > > , I also was able to reproduce this using the protection_keys self > > > tests on a 11th Gen Core i5-1135G7. > > > > I've got an i7-1165G7, but I'm not seeing any failures on a > > 5.11 distro kernel. > > > > Hi Dave, > I suspect the reason you're not seeing it is toolchain related, I'm > building with clang 14.0.0 and it produces the sequence of > instructions which use the cached value. Let me know if there is > anything I can do to help you investigate this further. Do older versions of clang have this problem? thanks, greg k-h