mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-26 04:25:27 +08:00
88afbb21d4
- Ensure that the WBINVD in stop_this_cpu() has been completed before the control CPU proceedes. stop_this_cpu() is used for kexec(), reboot and shutdown to park the APs in a HLT loop. The control CPU sends an IPI to the APs and waits for their CPU online bits to be cleared. Once they all are marked "offline" it proceeds. But stop_this_cpu() clears the CPU online bit before issuing WBINVD, which means there is no guarantee that the AP has reached the HLT loop. This was reported to cause intermittent reboot/shutdown failures due to some dubious interaction with the firmware. This is not only a problem of WBINVD. The code to actually "stop" the CPU which runs between clearing the online bit and reaching the HLT loop can cause large enough delays on its own (think virtualization). That's especially dangerous for kexec() as kexec() expects that all APs are in a safe state and not executing code while the boot CPU jumps to the new kernel. There are more issues vs. kexec() which are addressed separately. Cure this by implementing an explicit synchronization point right before the AP reaches HLT. This guarantees that the AP has completed the full stop proceedure. - Fix the condition for WBINVD in stop_this_cpu(). The WBINVD in stop_this_cpu() is required for ensuring that when switching to or from memory encryption no dirty data is left in the cache lines which might cause a write back in the wrong more later. This checks CPUID directly because the feature bit might have been cleared due to a command line option. But that CPUID check accesses leaf 0x8000001f::EAX unconditionally. Intel CPUs return the content of the highest supported leaf when a non-existing leaf is read, while AMD CPUs return all zeros for unsupported leafs. So the result of the test on Intel CPUs is lottery and on AMD its just correct by chance. While harmless it's incorrect and causes the conditional wbinvd() to be issued where not required, which caused the above issue to be unearthed. - Make kexec() robust against AP code execution Ashok observed triple faults when doing kexec() on a system which had been booted with "nosmt". It turned out that the SMT siblings which had been brought up partially are parked in mwait_play_dead() to enable power savings. mwait_play_dead() is monitoring the thread flags of the AP's idle task, which has been chosen as it's unlikely to be written to. But kexec() can overwrite the previous kernel text and data including page tables etc. When it overwrites the cache lines monitored by an AP that AP resumes execution after the MWAIT on eventually overwritten text, stack and page tables, which obviously might end up in a triple fault easily. Make this more robust in several steps: 1) Use an explicit per CPU cache line for monitoring. 2) Write a command to these cache lines to kick APs out of MWAIT before proceeding with kexec(), shutdown or reboot. The APs confirm the wakeup by writing status back and then enter a HLT loop. 3) If the system uses INIT/INIT/STARTUP for AP bringup, park the APs in INIT state. HLT is not a guarantee that an AP won't wake up and resume execution. HLT is woken up by NMI and SMI. SMI puts the CPU back into HLT (+/- firmware bugs), but NMI is delivered to the CPU which executes the NMI handler. Same issue as the MWAIT scenario described above. Sending an INIT/INIT sequence to the APs puts them into wait for STARTUP state, which is safe against NMI. There is still an issue remaining which can't be fixed: #MCE If the AP sits in HLT and receives a broadcast #MCE it will try to handle it with the obvious consequences. INIT/INIT clears CR4.MCE in the AP which will cause a broadcast #MCE to shut down the machine. So there is a choice between fire (HLT) and frying pan (INIT). Frying pan has been chosen as it's at least preventing the NMI issue. On systems which are not using INIT/INIT/STARTUP there is not much which can be done right now, but at least the obvious and easy to trigger MWAIT issue has been addressed. -----BEGIN PGP SIGNATURE----- iQJHBAABCgAxFiEEQp8+kY+LLUocC4bMphj1TA10mKEFAmSZfpQTHHRnbHhAbGlu dXRyb25peC5kZQAKCRCmGPVMDXSYoeZpD/9gSJN2qtGqoOgE8bWAenEeqppmBGFE EAhuhsvN1qG9JosUFo4KzxsGD/aWt2P6XglBDrGti8mFNol67jutmwWklntL3/ZR m8D6D+Pl7/CaDgACDTDbrnVC3lOGyMhD301yJrnBigS/SEoHeHI9UtadbHukuLQj TlKt5KtAnap15bE6QL846cDIptB9SjYLLPULo3i4azXEis/l6eAkffwAR6dmKlBh 2RbhLK1xPPG9nqWYjqZXnex09acKwD9xY9xHj4+GampV4UqHJRWfW0YtFs5ENi01 r3FVCdKEcvMkUw0zh0IAviBRs2vCI/R3YSfEc7P0264yn5WzMhAT+OGCovNjByiW sB4Iqa+Yf6aoBWwux6W4d22xu7uYhmFk/jiLyRZJPW/gvGZCZATT/x/T2hRoaYA8 3S0Rs7n/gbfvynQETgniifuM0bXRW0lEJAmn840GwyVQwlpDEPBJSwW4El49kbkc +dHxnmpMCfnBxfVLS1YDd4WOmkWBeECNcW330FShlQQ8mM3UG31+Q8Jc55Ze9SW0 w1h+IgIOHlA0DpQUUM8DJTSuxFx2piQsZxjOtzd70+BiKZpCsHqVLIp4qfnf+/GO gyP0cCQLbafpABbV9uVy8A/qgUGi0Qii0GJfCTy0OdmU+JX3C2C/gsM3uN0g3qAj vUhkuCXEGL5k1w== =KgZ0 -----END PGP SIGNATURE----- Merge tag 'x86-core-2023-06-26' of ssh://gitolite.kernel.org/pub/scm/linux/kernel/git/tip/tip Pull x86 core updates from Thomas Gleixner: "A set of fixes for kexec(), reboot and shutdown issues: - Ensure that the WBINVD in stop_this_cpu() has been completed before the control CPU proceedes. stop_this_cpu() is used for kexec(), reboot and shutdown to park the APs in a HLT loop. The control CPU sends an IPI to the APs and waits for their CPU online bits to be cleared. Once they all are marked "offline" it proceeds. But stop_this_cpu() clears the CPU online bit before issuing WBINVD, which means there is no guarantee that the AP has reached the HLT loop. This was reported to cause intermittent reboot/shutdown failures due to some dubious interaction with the firmware. This is not only a problem of WBINVD. The code to actually "stop" the CPU which runs between clearing the online bit and reaching the HLT loop can cause large enough delays on its own (think virtualization). That's especially dangerous for kexec() as kexec() expects that all APs are in a safe state and not executing code while the boot CPU jumps to the new kernel. There are more issues vs kexec() which are addressed separately. Cure this by implementing an explicit synchronization point right before the AP reaches HLT. This guarantees that the AP has completed the full stop proceedure. - Fix the condition for WBINVD in stop_this_cpu(). The WBINVD in stop_this_cpu() is required for ensuring that when switching to or from memory encryption no dirty data is left in the cache lines which might cause a write back in the wrong more later. This checks CPUID directly because the feature bit might have been cleared due to a command line option. But that CPUID check accesses leaf 0x8000001f::EAX unconditionally. Intel CPUs return the content of the highest supported leaf when a non-existing leaf is read, while AMD CPUs return all zeros for unsupported leafs. So the result of the test on Intel CPUs is lottery and on AMD its just correct by chance. While harmless it's incorrect and causes the conditional wbinvd() to be issued where not required, which caused the above issue to be unearthed. - Make kexec() robust against AP code execution Ashok observed triple faults when doing kexec() on a system which had been booted with "nosmt". It turned out that the SMT siblings which had been brought up partially are parked in mwait_play_dead() to enable power savings. mwait_play_dead() is monitoring the thread flags of the AP's idle task, which has been chosen as it's unlikely to be written to. But kexec() can overwrite the previous kernel text and data including page tables etc. When it overwrites the cache lines monitored by an AP that AP resumes execution after the MWAIT on eventually overwritten text, stack and page tables, which obviously might end up in a triple fault easily. Make this more robust in several steps: 1) Use an explicit per CPU cache line for monitoring. 2) Write a command to these cache lines to kick APs out of MWAIT before proceeding with kexec(), shutdown or reboot. The APs confirm the wakeup by writing status back and then enter a HLT loop. 3) If the system uses INIT/INIT/STARTUP for AP bringup, park the APs in INIT state. HLT is not a guarantee that an AP won't wake up and resume execution. HLT is woken up by NMI and SMI. SMI puts the CPU back into HLT (+/- firmware bugs), but NMI is delivered to the CPU which executes the NMI handler. Same issue as the MWAIT scenario described above. Sending an INIT/INIT sequence to the APs puts them into wait for STARTUP state, which is safe against NMI. There is still an issue remaining which can't be fixed: #MCE If the AP sits in HLT and receives a broadcast #MCE it will try to handle it with the obvious consequences. INIT/INIT clears CR4.MCE in the AP which will cause a broadcast #MCE to shut down the machine. So there is a choice between fire (HLT) and frying pan (INIT). Frying pan has been chosen as it's at least preventing the NMI issue. On systems which are not using INIT/INIT/STARTUP there is not much which can be done right now, but at least the obvious and easy to trigger MWAIT issue has been addressed" * tag 'x86-core-2023-06-26' of ssh://gitolite.kernel.org/pub/scm/linux/kernel/git/tip/tip: x86/smp: Put CPUs into INIT on shutdown if possible x86/smp: Split sending INIT IPI out into a helper function x86/smp: Cure kexec() vs. mwait_play_dead() breakage x86/smp: Use dedicated cache-line for mwait_play_dead() x86/smp: Remove pointless wmb()s from native_stop_other_cpus() x86/smp: Dont access non-existing CPUID leaf x86/smp: Make stop_other_cpus() more robust
323 lines
9.8 KiB
C
323 lines
9.8 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
/*
|
|
* Intel SMP support routines.
|
|
*
|
|
* (c) 1995 Alan Cox, Building #3 <alan@lxorguk.ukuu.org.uk>
|
|
* (c) 1998-99, 2000, 2009 Ingo Molnar <mingo@redhat.com>
|
|
* (c) 2002,2003 Andi Kleen, SuSE Labs.
|
|
*
|
|
* i386 and x86_64 integration by Glauber Costa <gcosta@redhat.com>
|
|
*/
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/mm.h>
|
|
#include <linux/delay.h>
|
|
#include <linux/spinlock.h>
|
|
#include <linux/export.h>
|
|
#include <linux/kernel_stat.h>
|
|
#include <linux/mc146818rtc.h>
|
|
#include <linux/cache.h>
|
|
#include <linux/interrupt.h>
|
|
#include <linux/cpu.h>
|
|
#include <linux/gfp.h>
|
|
#include <linux/kexec.h>
|
|
|
|
#include <asm/mtrr.h>
|
|
#include <asm/tlbflush.h>
|
|
#include <asm/mmu_context.h>
|
|
#include <asm/proto.h>
|
|
#include <asm/apic.h>
|
|
#include <asm/cpu.h>
|
|
#include <asm/idtentry.h>
|
|
#include <asm/nmi.h>
|
|
#include <asm/mce.h>
|
|
#include <asm/trace/irq_vectors.h>
|
|
#include <asm/kexec.h>
|
|
#include <asm/reboot.h>
|
|
|
|
/*
|
|
* Some notes on x86 processor bugs affecting SMP operation:
|
|
*
|
|
* Pentium, Pentium Pro, II, III (and all CPUs) have bugs.
|
|
* The Linux implications for SMP are handled as follows:
|
|
*
|
|
* Pentium III / [Xeon]
|
|
* None of the E1AP-E3AP errata are visible to the user.
|
|
*
|
|
* E1AP. see PII A1AP
|
|
* E2AP. see PII A2AP
|
|
* E3AP. see PII A3AP
|
|
*
|
|
* Pentium II / [Xeon]
|
|
* None of the A1AP-A3AP errata are visible to the user.
|
|
*
|
|
* A1AP. see PPro 1AP
|
|
* A2AP. see PPro 2AP
|
|
* A3AP. see PPro 7AP
|
|
*
|
|
* Pentium Pro
|
|
* None of 1AP-9AP errata are visible to the normal user,
|
|
* except occasional delivery of 'spurious interrupt' as trap #15.
|
|
* This is very rare and a non-problem.
|
|
*
|
|
* 1AP. Linux maps APIC as non-cacheable
|
|
* 2AP. worked around in hardware
|
|
* 3AP. fixed in C0 and above steppings microcode update.
|
|
* Linux does not use excessive STARTUP_IPIs.
|
|
* 4AP. worked around in hardware
|
|
* 5AP. symmetric IO mode (normal Linux operation) not affected.
|
|
* 'noapic' mode has vector 0xf filled out properly.
|
|
* 6AP. 'noapic' mode might be affected - fixed in later steppings
|
|
* 7AP. We do not assume writes to the LVT deasserting IRQs
|
|
* 8AP. We do not enable low power mode (deep sleep) during MP bootup
|
|
* 9AP. We do not use mixed mode
|
|
*
|
|
* Pentium
|
|
* There is a marginal case where REP MOVS on 100MHz SMP
|
|
* machines with B stepping processors can fail. XXX should provide
|
|
* an L1cache=Writethrough or L1cache=off option.
|
|
*
|
|
* B stepping CPUs may hang. There are hardware work arounds
|
|
* for this. We warn about it in case your board doesn't have the work
|
|
* arounds. Basically that's so I can tell anyone with a B stepping
|
|
* CPU and SMP problems "tough".
|
|
*
|
|
* Specific items [From Pentium Processor Specification Update]
|
|
*
|
|
* 1AP. Linux doesn't use remote read
|
|
* 2AP. Linux doesn't trust APIC errors
|
|
* 3AP. We work around this
|
|
* 4AP. Linux never generated 3 interrupts of the same priority
|
|
* to cause a lost local interrupt.
|
|
* 5AP. Remote read is never used
|
|
* 6AP. not affected - worked around in hardware
|
|
* 7AP. not affected - worked around in hardware
|
|
* 8AP. worked around in hardware - we get explicit CS errors if not
|
|
* 9AP. only 'noapic' mode affected. Might generate spurious
|
|
* interrupts, we log only the first one and count the
|
|
* rest silently.
|
|
* 10AP. not affected - worked around in hardware
|
|
* 11AP. Linux reads the APIC between writes to avoid this, as per
|
|
* the documentation. Make sure you preserve this as it affects
|
|
* the C stepping chips too.
|
|
* 12AP. not affected - worked around in hardware
|
|
* 13AP. not affected - worked around in hardware
|
|
* 14AP. we always deassert INIT during bootup
|
|
* 15AP. not affected - worked around in hardware
|
|
* 16AP. not affected - worked around in hardware
|
|
* 17AP. not affected - worked around in hardware
|
|
* 18AP. not affected - worked around in hardware
|
|
* 19AP. not affected - worked around in BIOS
|
|
*
|
|
* If this sounds worrying believe me these bugs are either ___RARE___,
|
|
* or are signal timing bugs worked around in hardware and there's
|
|
* about nothing of note with C stepping upwards.
|
|
*/
|
|
|
|
static atomic_t stopping_cpu = ATOMIC_INIT(-1);
|
|
static bool smp_no_nmi_ipi = false;
|
|
|
|
static int smp_stop_nmi_callback(unsigned int val, struct pt_regs *regs)
|
|
{
|
|
/* We are registered on stopping cpu too, avoid spurious NMI */
|
|
if (raw_smp_processor_id() == atomic_read(&stopping_cpu))
|
|
return NMI_HANDLED;
|
|
|
|
cpu_emergency_disable_virtualization();
|
|
stop_this_cpu(NULL);
|
|
|
|
return NMI_HANDLED;
|
|
}
|
|
|
|
/*
|
|
* Disable virtualization, APIC etc. and park the CPU in a HLT loop
|
|
*/
|
|
DEFINE_IDTENTRY_SYSVEC(sysvec_reboot)
|
|
{
|
|
ack_APIC_irq();
|
|
cpu_emergency_disable_virtualization();
|
|
stop_this_cpu(NULL);
|
|
}
|
|
|
|
static int register_stop_handler(void)
|
|
{
|
|
return register_nmi_handler(NMI_LOCAL, smp_stop_nmi_callback,
|
|
NMI_FLAG_FIRST, "smp_stop");
|
|
}
|
|
|
|
static void native_stop_other_cpus(int wait)
|
|
{
|
|
unsigned int cpu = smp_processor_id();
|
|
unsigned long flags, timeout;
|
|
|
|
if (reboot_force)
|
|
return;
|
|
|
|
/* Only proceed if this is the first CPU to reach this code */
|
|
if (atomic_cmpxchg(&stopping_cpu, -1, cpu) != -1)
|
|
return;
|
|
|
|
/* For kexec, ensure that offline CPUs are out of MWAIT and in HLT */
|
|
if (kexec_in_progress)
|
|
smp_kick_mwait_play_dead();
|
|
|
|
/*
|
|
* 1) Send an IPI on the reboot vector to all other CPUs.
|
|
*
|
|
* The other CPUs should react on it after leaving critical
|
|
* sections and re-enabling interrupts. They might still hold
|
|
* locks, but there is nothing which can be done about that.
|
|
*
|
|
* 2) Wait for all other CPUs to report that they reached the
|
|
* HLT loop in stop_this_cpu()
|
|
*
|
|
* 3) If the system uses INIT/STARTUP for CPU bringup, then
|
|
* send all present CPUs an INIT vector, which brings them
|
|
* completely out of the way.
|
|
*
|
|
* 4) If #3 is not possible and #2 timed out send an NMI to the
|
|
* CPUs which did not yet report
|
|
*
|
|
* 5) Wait for all other CPUs to report that they reached the
|
|
* HLT loop in stop_this_cpu()
|
|
*
|
|
* #4 can obviously race against a CPU reaching the HLT loop late.
|
|
* That CPU will have reported already and the "have all CPUs
|
|
* reached HLT" condition will be true despite the fact that the
|
|
* other CPU is still handling the NMI. Again, there is no
|
|
* protection against that as "disabled" APICs still respond to
|
|
* NMIs.
|
|
*/
|
|
cpumask_copy(&cpus_stop_mask, cpu_online_mask);
|
|
cpumask_clear_cpu(cpu, &cpus_stop_mask);
|
|
|
|
if (!cpumask_empty(&cpus_stop_mask)) {
|
|
apic_send_IPI_allbutself(REBOOT_VECTOR);
|
|
|
|
/*
|
|
* Don't wait longer than a second for IPI completion. The
|
|
* wait request is not checked here because that would
|
|
* prevent an NMI/INIT shutdown in case that not all
|
|
* CPUs reach shutdown state.
|
|
*/
|
|
timeout = USEC_PER_SEC;
|
|
while (!cpumask_empty(&cpus_stop_mask) && timeout--)
|
|
udelay(1);
|
|
}
|
|
|
|
/*
|
|
* Park all other CPUs in INIT including "offline" CPUs, if
|
|
* possible. That's a safe place where they can't resume execution
|
|
* of HLT and then execute the HLT loop from overwritten text or
|
|
* page tables.
|
|
*
|
|
* The only downside is a broadcast MCE, but up to the point where
|
|
* the kexec() kernel brought all APs online again an MCE will just
|
|
* make HLT resume and handle the MCE. The machine crashes and burns
|
|
* due to overwritten text, page tables and data. So there is a
|
|
* choice between fire and frying pan. The result is pretty much
|
|
* the same. Chose frying pan until x86 provides a sane mechanism
|
|
* to park a CPU.
|
|
*/
|
|
if (smp_park_other_cpus_in_init())
|
|
goto done;
|
|
|
|
/*
|
|
* If park with INIT was not possible and the REBOOT_VECTOR didn't
|
|
* take all secondary CPUs offline, try with the NMI.
|
|
*/
|
|
if (!cpumask_empty(&cpus_stop_mask)) {
|
|
/*
|
|
* If NMI IPI is enabled, try to register the stop handler
|
|
* and send the IPI. In any case try to wait for the other
|
|
* CPUs to stop.
|
|
*/
|
|
if (!smp_no_nmi_ipi && !register_stop_handler()) {
|
|
pr_emerg("Shutting down cpus with NMI\n");
|
|
|
|
for_each_cpu(cpu, &cpus_stop_mask)
|
|
apic->send_IPI(cpu, NMI_VECTOR);
|
|
}
|
|
/*
|
|
* Don't wait longer than 10 ms if the caller didn't
|
|
* request it. If wait is true, the machine hangs here if
|
|
* one or more CPUs do not reach shutdown state.
|
|
*/
|
|
timeout = USEC_PER_MSEC * 10;
|
|
while (!cpumask_empty(&cpus_stop_mask) && (wait || timeout--))
|
|
udelay(1);
|
|
}
|
|
|
|
done:
|
|
local_irq_save(flags);
|
|
disable_local_APIC();
|
|
mcheck_cpu_clear(this_cpu_ptr(&cpu_info));
|
|
local_irq_restore(flags);
|
|
|
|
/*
|
|
* Ensure that the cpus_stop_mask cache lines are invalidated on
|
|
* the other CPUs. See comment vs. SME in stop_this_cpu().
|
|
*/
|
|
cpumask_clear(&cpus_stop_mask);
|
|
}
|
|
|
|
/*
|
|
* Reschedule call back. KVM uses this interrupt to force a cpu out of
|
|
* guest mode.
|
|
*/
|
|
DEFINE_IDTENTRY_SYSVEC_SIMPLE(sysvec_reschedule_ipi)
|
|
{
|
|
ack_APIC_irq();
|
|
trace_reschedule_entry(RESCHEDULE_VECTOR);
|
|
inc_irq_stat(irq_resched_count);
|
|
scheduler_ipi();
|
|
trace_reschedule_exit(RESCHEDULE_VECTOR);
|
|
}
|
|
|
|
DEFINE_IDTENTRY_SYSVEC(sysvec_call_function)
|
|
{
|
|
ack_APIC_irq();
|
|
trace_call_function_entry(CALL_FUNCTION_VECTOR);
|
|
inc_irq_stat(irq_call_count);
|
|
generic_smp_call_function_interrupt();
|
|
trace_call_function_exit(CALL_FUNCTION_VECTOR);
|
|
}
|
|
|
|
DEFINE_IDTENTRY_SYSVEC(sysvec_call_function_single)
|
|
{
|
|
ack_APIC_irq();
|
|
trace_call_function_single_entry(CALL_FUNCTION_SINGLE_VECTOR);
|
|
inc_irq_stat(irq_call_count);
|
|
generic_smp_call_function_single_interrupt();
|
|
trace_call_function_single_exit(CALL_FUNCTION_SINGLE_VECTOR);
|
|
}
|
|
|
|
static int __init nonmi_ipi_setup(char *str)
|
|
{
|
|
smp_no_nmi_ipi = true;
|
|
return 1;
|
|
}
|
|
|
|
__setup("nonmi_ipi", nonmi_ipi_setup);
|
|
|
|
struct smp_ops smp_ops = {
|
|
.smp_prepare_boot_cpu = native_smp_prepare_boot_cpu,
|
|
.smp_prepare_cpus = native_smp_prepare_cpus,
|
|
.smp_cpus_done = native_smp_cpus_done,
|
|
|
|
.stop_other_cpus = native_stop_other_cpus,
|
|
#if defined(CONFIG_KEXEC_CORE)
|
|
.crash_stop_other_cpus = kdump_nmi_shootdown_cpus,
|
|
#endif
|
|
.smp_send_reschedule = native_smp_send_reschedule,
|
|
|
|
.kick_ap_alive = native_kick_ap,
|
|
.cpu_disable = native_cpu_disable,
|
|
.play_dead = native_play_dead,
|
|
|
|
.send_call_func_ipi = native_send_call_func_ipi,
|
|
.send_call_func_single_ipi = native_send_call_func_single_ipi,
|
|
};
|
|
EXPORT_SYMBOL_GPL(smp_ops);
|