On 1/4/19 9:47 AM, Borislav Petkov wrote: > On Fri, Jan 04, 2019 at 01:41:25PM +0100, Paul Menzel wrote: >> Dear Linux folks, >> >> >> On 01/03/19 22:45, Paul Menzel wrote: >> >>> On the server board Asus KGPE-D16 with AMD Opteron 6278 processor updating >>> the microcode update in the firmware from 0x0600062e to 0x0600063e seems to >>> cause a general protection fault with Linux 4.14.87 and 4.20-rc7. >>> >>>> 46.859: [ 7.573240] microcode: CPU31: patch_level=0x0600063e >>>> 46.859: [ 7.578507] microcode: Microcode Update Driver: v2.2. >>>> 46.860: [ 7.578539] sched_clock: Marking stable (6510054745, >>>> 1068444659)->(7999876773, -421377369) >>>> 46.860: [ 7.593013] registered taskstats version 1 >>>> 46.861: [ 7.598091] rtc_cmos 00:00: setting system clock to 2000-01-01 >>>> 08:01:51 UTC (946713711) >>>> 46.862: [ 7.606575] ALSA device list: >>>> 46.862: [ 7.609802] No soundcards found. >>>> 46.865: [ 7.615887] Freeing unused kernel image memory: 1564K >>>> 46.871: [ 7.627073] Write protecting the kernel read-only data: 20480k >>>> 46.872: [ 7.634366] Freeing unused kernel image memory: 2016K >>>> 46.873: [ 7.640297] Freeing unused kernel image memory: 584K >>>> 46.874: [ 7.645521] Run /init as init process >>>> 46.877: [ 7.652262] general protection fault: 0000 [#1] SMP NOPTI >>>> 46.877: [ 7.657931] CPU: 18 PID: 0 Comm: swapper/18 Not tainted >>>> 4.20.0-rc7.mx64.237 #1 >>>> 46.877: [ 7.665514] Hardware name: ASUS KGPE-D16/KGPE-D16, BIOS >>>> 4.9-103-g637bef2037 01/02/2019 >>>> 46.878: [ 7.673804] RIP: 0010:switch_mm_irqs_off+0xb2/0x640 >>>> 46.878: [ 7.678948] Code: 48 c1 ef 09 83 e7 01 48 09 c7 65 48 8b 05 8e >>>> 34 fc 7e 48 39 c7 74 15 48 09 f8 a8 01 74 0e b9 49 00 00 00 b8 01 00 00 00 >>>> 31 d2 <0f> 30 65 48 89 3d 6c 34 fc 7e 8b 05 9a ef a7 01 85 c0 0f 8f 41 04 >>>> 46.879: [ 7.698394] RSP: 0018:ffffc90006343e20 EFLAGS: 00010046 >>>> 46.879: [ 7.703844] RAX: 0000000000000001 RBX: ffff88981ca0b800 RCX: >>>> 0000000000000049 >>>> 46.879: [ 7.711238] RDX: 0000000000000000 RSI: ffff88981b87cf80 RDI: >>>> ffff88981ca0b800 >>>> 46.880: [ 7.718665] RBP: ffffc90006343e70 R08: 00000001c81bec00 R09: >>>> 0000000000000000 >>>> 46.880: [ 7.726092] R10: ffffc90006343e88 R11: 0000000000000000 R12: >>>> ffffffff82479b40 >>>> 46.880: [ 7.733494] R13: 0000000000000000 R14: 0000000000000012 R15: >>>> ffff88981dd50080 >>>> 46.881: [ 7.740853] FS: 0000000000000000(0000) >>>> GS:ffff88981fa80000(0000) knlGS:0000000000000000 >>>> 46.881: [ 7.749318] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >>>> 46.881: [ 7.755281] CR2: 0000000000000000 CR3: 000000000240a000 CR4: >>>> 00000000000406e0 >>>> 46.881: [ 7.762761] Call Trace: >>>> 46.881: [ 7.765369] ? __schedule+0x1b9/0x7b0 >>>> 46.882: [ 7.769253] __schedule+0x1b9/0x7b0 >>>> 46.882: [ 7.772930] schedule_idle+0x1e/0x40 >>>> 46.882: [ 7.776744] do_idle+0x146/0x200 >>>> 46.882: [ 7.780181] cpu_startup_entry+0x19/0x20 >>>> 46.883: [ 7.784274] start_secondary+0x183/0x1b0 >>>> 46.883: [ 7.788409] secondary_startup_64+0xa4/0xb0 >>>> 46.883: [ 7.792766] Modules linked in: >>>> 46.883: [ 7.796105] ---[ end trace a423e363fe1ecf67 ]--- >>>> 46.884: [ 7.800939] RIP: 0010:switch_mm_irqs_off+0xb2/0x640 >>>> 46.884: [ 7.806048] Code: 48 c1 ef 09 83 e7 01 48 09 c7 65 48 8b 05 8e >>>> 34 fc 7e 48 39 c7 74 15 48 09 f8 a8 01 74 0e b9 49 00 00 00 b8 01 00 00 00 >>>> 31 d2 <0f> 30 65 48 89 3d 6c 34 fc 7e 8b 05 9a ef a7 01 85 c0 0f 8f 41 04 >>>> 46.884: [ 7.825440] RSP: 0018:ffffc90006343e20 EFLAGS: 00010046 >>>> 46.885: [ 7.830855] RAX: 0000000000000001 RBX: ffff88981ca0b800 RCX: >>>> 0000000000000049 >>>> 46.885: [ 7.838230] RDX: 0000000000000000 RSI: ffff88981b87cf80 RDI: >>>> ffff88981ca0b800 >>>> 46.885: [ 7.845614] RBP: ffffc90006343e70 R08: 00000001c81bec00 R09: >>>> 0000000000000000 >>>> 46.886: [ 7.853047] R10: ffffc90006343e88 R11: 0000000000000000 R12: >>>> ffffffff82479b40 >>>> 46.886: [ 7.860427] R13: 0000000000000000 R14: 0000000000000012 R15: >>>> ffff88981dd50080 >>>> 46.886: [ 7.867862] FS: 0000000000000000(0000) >>>> GS:ffff88981fa80000(0000) knlGS:0000000000000000 >>>> 46.886: [ 7.876320] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >>>> 46.887: [ 7.882351] CR2: 0000000000000000 CR3: 000000000240a000 CR4: >>>> 00000000000406e0 >>>> 46.887: [ 7.889746] Kernel panic - not syncing: Attempted to kill the >>>> idle task! >>>> 46.888: [ 7.896907] Kernel Offset: disabled >>>> 46.888: [ 7.900558] ---[ end Kernel panic - not syncing: Attempted to >>>> kill the idle task! ]--- >>> >>> Please find the whole log, including the coreboot messages, attached. The >>> time stamps in the beginning are from the script `readserial.py` from the >>> SeaBIOS repository. >>> >>> Do you have an idea what is going on, and how to fix it? >> >> Decoding the code, give the output below. >> >> ``` >> $ scripts/decodecode < /dev/shm/test.log >> [ 7.806048] Code: 48 c1 ef 09 83 e7 01 48 09 c7 65 48 8b 05 8e 34 fc 7e 48 >> 39 c7 74 15 48 09 f8 a8 01 74 0e b9 49 00 00 00 b8 01 00 00 00 31 d2 <0f> 30 >> 65 48 89 3d 6c 34 fc 7e 8b 05 9a ef a7 01 85 c0 0f 8f 41 04 >> All code >> ======== >> 0: 48 c1 ef 09 shr $0x9,%rdi >> 4: 83 e7 01 and $0x1,%edi >> 7: 48 09 c7 or %rax,%rdi >> a: 65 48 8b 05 8e 34 fc mov %gs:0x7efc348e(%rip),%rax >> # 0x7efc34a0 >> 11: 7e >> 12: 48 39 c7 cmp %rax,%rdi >> 15: 74 15 je 0x2c >> 17: 48 09 f8 or %rdi,%rax >> 1a: a8 01 test $0x1,%al >> 1c: 74 0e je 0x2c >> 1e: b9 49 00 00 00 mov $0x49,%ecx >> 23: b8 01 00 00 00 mov $0x1,%eax >> 28: 31 d2 xor %edx,%edx >> 2a:* 0f 30 wrmsr <-- trapping instruction >> 2c: 65 48 89 3d 6c 34 fc mov %rdi,%gs:0x7efc346c(%rip) >> # 0x7efc34a0 >> 33: 7e >> 34: 8b 05 9a ef a7 01 mov 0x1a7ef9a(%rip),%eax # >> 0x1a7efd4 >> 3a: 85 c0 test %eax,%eax >> 3c: 0f .byte 0xf >> 3d: 8f 41 04 popq 0x4(%rcx) >> >> Code starting with the faulting instruction >> =========================================== >> 0: 0f 30 wrmsr >> 2: 65 48 89 3d 6c 34 fc mov %rdi,%gs:0x7efc346c(%rip) >> # 0x7efc3476 >> 9: 7e >> a: 8b 05 9a ef a7 01 mov 0x1a7ef9a(%rip),%eax # >> 0x1a7efaa >> 10: 85 c0 test %eax,%eax >> 12: 0f .byte 0xf >> 13: 8f 41 04 popq 0x4(%rcx) >> ``` >> >> So the problem is with the instruction *wrmsr* [1]. >> >> The content of ECX, which according to [1] is written to, is not >> in the logs though, as far as I can see. > > Of course it is: > >> 1e: b9 49 00 00 00 mov $0x49,%ecx > > which is strange. > > Tom, is patch_level=0x0600063e on BD supposed to #GP when writing > MSR_IA32_PRED_CMD...
No, that patch level should be good for writing that MSR as far as I'm aware. Just to be clear, was the ucode updated through the BIOS/firmware or on Linux boot through the firmware loader? And I saw Jiri's request for more info, so I'll look for that, also. Thanks, Tom > > Thx. >