[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20221014200913.14644-6-ashok.raj@intel.com>
Date: Fri, 14 Oct 2022 13:09:05 -0700
From: Ashok Raj <ashok.raj@...el.com>
To: Borislav Petkov <bp@...en8.de>,
Thomas Gleixner <tglx@...utronix.de>
Cc: Tony Luck <tony.luck@...el.com>,
Dave Hansen <dave.hansen@...el.com>,
LKML Mailing List <linux-kernel@...r.kernel.org>,
X86-kernel <x86@...nel.org>,
Tom Lendacky <thomas.lendacky@....com>,
Arjan van de Ven <arjan.van.de.ven@...el.com>,
Jacob Jun Pan <jacob.jun.pan@...el.com>,
Ashok Raj <ashok.raj@...el.com>
Subject: [PATCH 05/13] x86/microcode: Place siblings in NMI loop while update in progress
Microcode updates affect the state of the running CPU. In the case of
hyperthreads, the thread initiating the update is in a known state
(performing wrmsr 0x79), but its HT sibling can be executing arbitrary
instructions.
If one of these arbitrary instruction is being patched by the update at the
same time the sibling is trying to execute from it, its using microcode in
an unstable state.
Ensuring a rendezvous of all CPUs using stop_machine() ensures that
siblings are not executing any random user space code, and stop_machine()
also masks interrupts that can be masked.
The ones that can still slip in are the exceptions. They are:
NMI entry code and NMI handlers can also execute relatively arbitrary
instructions. This is an effort to ensure NMI doesn't slip until the wrmsr
has completed.
== Solution: NMI prevention during update ==
Before the stop_machine() rendezvous, an NMI handler is registered. The
handler is placed at the beginning of all other handlers. The siblings
then kick themselves into NMI by doing a self NMI IPI.
The handler does two things:
- Informs the primary thread that it has entered the NMI handler. Only
after all siblings of a core have entered NMI, the primary proceeds
with wrmsr to update microcode.
- It spins until the primary CPU has completed the wrmsr and informs the
sibling to quit the NMI loop.
Also an important thing to remember is the microcode requests for exclusive
access to the core before performing an update. This effectively pulls the
sibling into microcode control until the wrmsr has released exclusive
access. Since the sibling is not executing any instructions while the
wrmsr completes, no other exceptions will surface on the sibling CPU.
Breakpoints can be another source that can lead do taking exceptions. But
on NMI entry, the kernel seems to be save/clear/restore the breakpoint
control register (DR7). local_db_save() and local_db_restore(). This
effectively eliminates any breakpoints leading the sibling into
uncontrolled execution.
The algorithm is something like this:
After stop_machine() all threads are executing __reload_late()
hold_sibling_in_nmi()
{
if (cpu not do_nmi_trap)
return;
update sibling reached NMI for primary to continue
while (primary not done with update)
wait;
return;
}
exc_nmi:IDT()
{
....
hold_sibling_in_nmi();
...
}
__reload_late()
{
entry_rendezvous(&late_cpus_in);
if (this_cpu is first_cpu in the core)
wait for siblings to drop in NMI
apply_microcode()
set completion to release sibling from NMI
else
set sibling info to drop into NMI
send self_IPI(NMI_VECTOR);
wait_for_siblings:
exit_rendezvous(&late_cpus_out);
}
reload_late()
{
register_nmi_handler()
stop_machine(__reload_late);
unregister_nmi_handler();
}
Suggested-by: Thomas Gleixner <tglx@...utronix.de>
Signed-off-by: Ashok Raj <ashok.raj@...el.com>
---
arch/x86/include/asm/microcode.h | 33 ++++++++
arch/x86/kernel/cpu/microcode/core.c | 101 ++++++++++++++++++++++++-
arch/x86/kernel/cpu/microcode/nmi.c | 72 ++++++++++++++++++
arch/x86/kernel/nmi.c | 7 ++
arch/x86/kernel/cpu/microcode/Makefile | 1 +
5 files changed, 210 insertions(+), 4 deletions(-)
create mode 100644 arch/x86/kernel/cpu/microcode/nmi.c
diff --git a/arch/x86/include/asm/microcode.h b/arch/x86/include/asm/microcode.h
index 7f7800e15ed0..23d25ef546a5 100644
--- a/arch/x86/include/asm/microcode.h
+++ b/arch/x86/include/asm/microcode.h
@@ -6,6 +6,33 @@
#include <linux/earlycpio.h>
#include <linux/initrd.h>
+/*
+ * Although this is a per-cpu structure, both the primary and siblings use
+ * only the primary structure to communicate.
+ *
+ * num_core_cpus - Number of CPUs in the core
+ * callin - Siblings set to inform primary on NMI arrival
+ * core_done - Set by primary once microcode update has completed
+ */
+struct core_rendez {
+ int num_core_cpus;
+ atomic_t callin;
+ atomic_t core_done;
+ atomic_t failed;
+};
+
+DECLARE_PER_CPU(struct core_rendez, core_sync);
+
+/*
+ * The following structure is only used by secondary.
+ * Sets the primary per_cpu variable to be found inside the NMI handler to
+ * indicate this CPU is supposed to drop into NMI. Its consulted in the
+ * NMI handler before entring the loop waiting for primary to finish the
+ * loading process. Once loading is complete the NMI handler clears this
+ * pointer.
+ */
+DECLARE_PER_CPU(struct core_rendez *, nmi_primary_ptr);
+
struct ucode_patch {
struct list_head plist;
void *data; /* Intel uses only this one */
@@ -136,4 +163,10 @@ static inline void reload_early_microcode(void) { }
static inline void microcode_bsp_resume(void) { }
#endif
+#ifdef CONFIG_MICROCODE_LATE_LOADING
+extern void hold_sibling_in_nmi(void);
+#else
+static inline void hold_sibling_in_nmi(void) { }
+#endif
+
#endif /* _ASM_X86_MICROCODE_H */
diff --git a/arch/x86/kernel/cpu/microcode/core.c b/arch/x86/kernel/cpu/microcode/core.c
index e4135b4fdbc6..50652b019233 100644
--- a/arch/x86/kernel/cpu/microcode/core.c
+++ b/arch/x86/kernel/cpu/microcode/core.c
@@ -39,6 +39,8 @@
#include <asm/processor.h>
#include <asm/cmdline.h>
#include <asm/setup.h>
+#include <asm/apic.h>
+#include <asm/mce.h>
#define DRIVER_VERSION "2.2"
@@ -432,6 +434,59 @@ static int __wait_for_cpus(atomic_t *t, long long timeout)
return 0;
}
+/*
+ * This simply ensures that the self IPI with NMI to siblings is marked as
+ * handled.
+ */
+static int ucode_nmi_cb(unsigned int val, struct pt_regs *regs)
+{
+ return NMI_HANDLED;
+}
+
+/*
+ * Primary thread waits for all siblings to report that they have enterered
+ * the NMI handler
+ */
+static int __wait_for_core_siblings(struct core_rendez *rendez)
+{
+ int num_sibs = rendez->num_core_cpus - 1;
+ unsigned long long timeout = NSEC_PER_MSEC;
+ atomic_t *t = &rendez->callin;
+ int cpu = smp_processor_id();
+
+ while (atomic_read(t) < num_sibs) {
+ cpu_relax();
+ ndelay(SPINUNIT);
+ touch_nmi_watchdog();
+ timeout -= SPINUNIT;
+ if (timeout < SPINUNIT) {
+ pr_err("CPU%d timedout waiting for siblings\n", cpu);
+ atomic_inc(&rendez->failed);
+ return 1;
+ }
+ }
+ return 0;
+}
+
+static void prepare_for_nmi(void)
+{
+ int cpu, first_cpu;
+ struct core_rendez *pcpu_core;
+
+ for_each_online_cpu(cpu) {
+ first_cpu = cpumask_first(topology_sibling_cpumask(cpu));
+ if (cpu != first_cpu)
+ continue;
+
+ pcpu_core = &per_cpu(core_sync, first_cpu);
+ pcpu_core->num_core_cpus =
+ cpumask_weight(topology_sibling_cpumask(cpu));
+ atomic_set(&pcpu_core->callin, 0);
+ atomic_set(&pcpu_core->core_done, 0);
+ atomic_set(&pcpu_core->failed, 0);
+ }
+}
+
/*
* Returns:
* < 0 - on error
@@ -439,14 +494,15 @@ static int __wait_for_cpus(atomic_t *t, long long timeout)
*/
static int __reload_late(void *info)
{
- int cpu = smp_processor_id();
+ int first_cpu, cpu = smp_processor_id();
+ struct core_rendez *pcpu_core;
enum ucode_state err;
int ret = 0;
/*
* Wait for all CPUs to arrive. A load will not be attempted unless all
* CPUs show up.
- * */
+ */
if (__wait_for_cpus(&late_cpus_in, NSEC_PER_SEC))
return -1;
@@ -457,10 +513,32 @@ static int __reload_late(void *info)
* loading attempts happen on multiple threads of an SMT core. See
* below.
*/
- if (cpumask_first(topology_sibling_cpumask(cpu)) == cpu)
+ first_cpu = cpumask_first(topology_sibling_cpumask(cpu));
+ pcpu_core = &per_cpu(core_sync, first_cpu);
+
+ /*
+ * Set the CPUs that we should hold in NMI until the primary has
+ * completed the microcode update.
+ */
+ if (first_cpu == cpu) {
+ /*
+ * Wait for all siblings to enter
+ * NMI before performing the update
+ */
+ ret = __wait_for_core_siblings(pcpu_core);
+ if (ret || atomic_read(&pcpu_core->failed)) {
+ pr_err("CPU %d core lead timeout waiting for siblings\n", cpu);
+ ret = -1;
+ }
+ pr_debug("Primary CPU %d proceeding with update\n", cpu);
apply_microcode_local(&err);
- else
+ atomic_set(&pcpu_core->core_done, 1);
+ } else {
+ /* We set the per-cpu of sibling in this case */
+ this_cpu_write(nmi_primary_ptr, pcpu_core);
+ apic->send_IPI_self(NMI_VECTOR);
goto wait_for_siblings;
+ }
if (err >= UCODE_NFOUND) {
if (err == UCODE_ERROR)
@@ -496,16 +574,31 @@ static int microcode_reload_late(void)
pr_err("Attempting late microcode loading - it is dangerous and taints the kernel.\n");
pr_err("You should switch to early loading, if possible.\n");
+ /*
+ * Used for late_load entry and exit rendezvous
+ */
atomic_set(&late_cpus_in, 0);
atomic_set(&late_cpus_out, 0);
+ prepare_for_nmi();
+
+ ret = register_nmi_handler(NMI_LOCAL, ucode_nmi_cb, NMI_FLAG_FIRST,
+ "ucode_nmi");
+ if (ret) {
+ pr_err("Unable to register NMI handler\n");
+ goto done;
+ }
+
ret = stop_machine_cpuslocked(__reload_late, NULL, cpu_online_mask);
if (ret == 0)
microcode_check();
+ unregister_nmi_handler(NMI_LOCAL, "ucode_nmi");
+
pr_info("Reload completed, microcode revision: 0x%x -> 0x%x\n",
old, boot_cpu_data.microcode);
+done:
return ret;
}
diff --git a/arch/x86/kernel/cpu/microcode/nmi.c b/arch/x86/kernel/cpu/microcode/nmi.c
new file mode 100644
index 000000000000..9245dd1e8c9d
--- /dev/null
+++ b/arch/x86/kernel/cpu/microcode/nmi.c
@@ -0,0 +1,72 @@
+// SPDX-License-Identifier: GPL-2.0-or-later
+/*
+ * Copyright (C) 2022 Ashok Raj <ashok.raj@...el.com>
+ *
+ * X86 CPU microcode update NMI handler.
+ *
+ */
+
+#include <linux/kernel.h>
+#include <linux/delay.h>
+#include <linux/cpu.h>
+#include <linux/nmi.h>
+
+#include <asm/microcode.h>
+
+#define SPINUNIT 100 /* 100 nsec */
+
+DEFINE_PER_CPU(struct core_rendez, core_sync);
+DEFINE_PER_CPU(struct core_rendez *, nmi_primary_ptr);
+
+#define SPINUNIT 100 /* 100 nsec */
+
+static void delay(int ms)
+{
+ unsigned long timeout = jiffies + ((ms * HZ) / 1000);
+
+ while (time_before(jiffies, timeout))
+ cpu_relax();
+}
+
+/*
+ * Siblings wait until microcode update is completed by the primary thread.
+ */
+static int __wait_for_update(atomic_t *t)
+{
+ unsigned long long timeout = NSEC_PER_MSEC;
+
+ while (!arch_atomic_read(t)) {
+ cpu_relax();
+ delay(1);
+ //touch_nmi_watchdog();
+ timeout -= SPINUNIT;
+ if (timeout < SPINUNIT)
+ return 1;
+ }
+ return 0;
+}
+
+noinstr void hold_sibling_in_nmi(void)
+{
+ struct core_rendez *pcpu_core;
+ int ret = 0;
+
+ pcpu_core = this_cpu_read(nmi_primary_ptr);
+ if (likely(!pcpu_core))
+ return;
+
+ /*
+ * Increment the callin to inform primary thread that the sibling
+ * has arrived and parked in the NMI handler
+ */
+ arch_atomic_inc(&pcpu_core->callin);
+
+ ret = __wait_for_update(&pcpu_core->core_done);
+ if (ret)
+ atomic_inc(&pcpu_core->failed);
+
+ /*
+ * Clear the nmi_trap, so future NMI's won't be affected
+ */
+ this_cpu_write(nmi_primary_ptr, NULL);
+}
diff --git a/arch/x86/kernel/nmi.c b/arch/x86/kernel/nmi.c
index cec0bfa3bc04..619afeaef07c 100644
--- a/arch/x86/kernel/nmi.c
+++ b/arch/x86/kernel/nmi.c
@@ -28,6 +28,7 @@
#include <asm/cpu_entry_area.h>
#include <asm/traps.h>
#include <asm/mach_traps.h>
+#include <asm/microcode.h>
#include <asm/nmi.h>
#include <asm/x86_init.h>
#include <asm/reboot.h>
@@ -505,6 +506,12 @@ DEFINE_IDTENTRY_RAW(exc_nmi)
this_cpu_write(nmi_dr7, local_db_save());
+ /*
+ * If microcodeupdate is in progress, check and hold the sibling in
+ * the NMI until primary has completed the update
+ */
+ hold_sibling_in_nmi();
+
irq_state = irqentry_nmi_enter(regs);
inc_irq_stat(__nmi_count);
diff --git a/arch/x86/kernel/cpu/microcode/Makefile b/arch/x86/kernel/cpu/microcode/Makefile
index 34098d48c48f..e469990bba73 100644
--- a/arch/x86/kernel/cpu/microcode/Makefile
+++ b/arch/x86/kernel/cpu/microcode/Makefile
@@ -3,3 +3,4 @@ microcode-y := core.o
obj-$(CONFIG_MICROCODE) += microcode.o
microcode-$(CONFIG_MICROCODE_INTEL) += intel.o
microcode-$(CONFIG_MICROCODE_AMD) += amd.o
+microcode-$(CONFIG_MICROCODE_LATE_LOADING) += nmi.o
--
2.34.1
Powered by blists - more mailing lists