lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Tue, 29 Nov 2022 22:50:08 +0100
From:   Mateusz Jończyk <mat.jonczyk@...pl>
To:     x86@...nel.org, linux-kernel@...r.kernel.org
Cc:     Mateusz Jończyk <mat.jonczyk@...pl>,
        Paul Menzel <pmenzel@...gen.mpg.de>,
        Robert Elliott <elliott@....com>,
        Thomas Gleixner <tglx@...utronix.de>,
        Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
        Dave Hansen <dave.hansen@...ux.intel.com>,
        "H. Peter Anvin" <hpa@...or.com>, Johan Hovold <johan@...nel.org>,
        "Maciej W . Rozycki" <macro@...am.me.uk>,
        Yinghai Lu <yinghai@...nel.org>,
        Daniel Sneddon <daniel.sneddon@...ux.intel.com>
Subject: [PATCH] x86/apic: handle no CONFIG_X86_X2APIC on systems with x2APIC enabled by BIOS

A kernel that was compiled without CONFIG_X86_X2APIC was unable to boot
on platforms that have x2APIC turned on by BIOS [1]. The kernel was
supposed to panic with an approprite error message in validate_x2apic()
in arch/x86/kernel/apic/apic.c .

However, validate_x2apic() was run too late in the boot cycle, and the
kernel tried to initialize the APIC nonetheless. This resulted in an
earlier panic in setup_local_APIC() on

	/*
	 * Double-check whether this APIC is really registered.
	 * This is meaningless in clustered apic mode, so we skip it.
	 */
	BUG_ON(!apic->apic_id_registered());

during execution of

	Call Trace:
	 <TASK>
	 ? _printk+0x63/0x7e
	 apic_intr_mode_init+0xde/0xfc
	 x86_late_time_init+0x1b/0x2f
	 start_kernel+0x5db/0x69b
	 secondary_startup_64_no_verify+0xe0/0xeb
	 </TASK>

In my experiments, a panic message in setup_local_APIC() was not visible
in the graphical console, which resulted in a hang with no indication
what has gone wrong. [2]

Instead of calling panic(), disable the APIC, which should result in a
somewhat working system with the PIC only (and no SMP). This way the
user would be able to diagnose the problem more easily. Implementation
of this is much simpler then disabling the x2APIC mode only, which may
not be possible on newer systems with locked x2APIC.

The proper place to disable the APIC in this case is in check_x2apic(),
which is called early from setup_arch(). Doing this in
__apic_intr_mode_select() is too late, and in my experiments resulted in
a broken system with no working PCI interrupts and "failed to register
GSI" warnings on the screen.

The check_x2apic() function was empty on kernels without
CONFIG_X86_X2APIC. Modify arch/x86/include/asm/apic.h to remove the
empty inline stub and provide proper declaration irrespective of
CONFIG_X86_X2APIC setting.


[1] Here I differentiate between two cases:
    1. APIC already switched into the x2APIC mode by BIOS, it is in
       x2APIC mode when kernel starts booting.
    2. x2APIC made available by BIOS to the operating system, but is
       in legacy mode when kernel starts booting.

    Only in case 1. the kernel did not boot without CONFIG_X86_X2APIC.

[2] Tested with CONFIG_FB_EFI and CONFIG_EARLY_PRINTK enabled.

Reported-by: Paul Menzel <pmenzel@...gen.mpg.de>
Link: https://lkml.org/lkml/2020/2/21/1627
Reported-by: Robert Elliott (Servers) <elliott@....com>
Link: https://lore.kernel.org/lkml/20220911084711.13694-3-mat.jonczyk@o2.pl/
Signed-off-by: Mateusz Jończyk <mat.jonczyk@...pl>
Cc: Thomas Gleixner <tglx@...utronix.de>
Cc: Ingo Molnar <mingo@...hat.com>
Cc: Borislav Petkov <bp@...en8.de>
Cc: Dave Hansen <dave.hansen@...ux.intel.com>
Cc: "H. Peter Anvin" <hpa@...or.com>
Cc: Johan Hovold <johan@...nel.org>
Cc: Maciej W. Rozycki <macro@...am.me.uk>
Cc: Yinghai Lu <yinghai@...nel.org>
Cc: Daniel Sneddon <daniel.sneddon@...ux.intel.com>
---

A separate patch to enable CONFIG_X86_X2APIC by default and update the
help text of this option is being worked on.

 arch/x86/Kconfig            |  4 ++--
 arch/x86/include/asm/apic.h |  3 +--
 arch/x86/kernel/apic/apic.c | 13 ++++++++-----
 3 files changed, 11 insertions(+), 9 deletions(-)

diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
index 67745ceab0db..b2c0fce3f257 100644
--- a/arch/x86/Kconfig
+++ b/arch/x86/Kconfig
@@ -462,8 +462,8 @@ config X86_X2APIC
 
 	  Some Intel systems circa 2022 and later are locked into x2APIC mode
 	  and can not fall back to the legacy APIC modes if SGX or TDX are
-	  enabled in the BIOS.  They will be unable to boot without enabling
-	  this option.
+	  enabled in the BIOS. They will boot with very reduced functionality
+	  without enabling this option.
 
 	  If you don't know what to do here, say N.
 
diff --git a/arch/x86/include/asm/apic.h b/arch/x86/include/asm/apic.h
index 3415321c8240..3216da7074ba 100644
--- a/arch/x86/include/asm/apic.h
+++ b/arch/x86/include/asm/apic.h
@@ -249,7 +249,6 @@ static inline u64 native_x2apic_icr_read(void)
 extern int x2apic_mode;
 extern int x2apic_phys;
 extern void __init x2apic_set_max_apicid(u32 apicid);
-extern void __init check_x2apic(void);
 extern void x2apic_setup(void);
 static inline int x2apic_enabled(void)
 {
@@ -258,13 +257,13 @@ static inline int x2apic_enabled(void)
 
 #define x2apic_supported()	(boot_cpu_has(X86_FEATURE_X2APIC))
 #else /* !CONFIG_X86_X2APIC */
-static inline void check_x2apic(void) { }
 static inline void x2apic_setup(void) { }
 static inline int x2apic_enabled(void) { return 0; }
 
 #define x2apic_mode		(0)
 #define	x2apic_supported()	(0)
 #endif /* !CONFIG_X86_X2APIC */
+extern void __init check_x2apic(void);
 
 struct irq_data;
 
diff --git a/arch/x86/kernel/apic/apic.c b/arch/x86/kernel/apic/apic.c
index c6876d3ea4b1..20d9a604da7c 100644
--- a/arch/x86/kernel/apic/apic.c
+++ b/arch/x86/kernel/apic/apic.c
@@ -1931,16 +1931,19 @@ void __init check_x2apic(void)
 	}
 }
 #else /* CONFIG_X86_X2APIC */
-static int __init validate_x2apic(void)
+void __init check_x2apic(void)
 {
 	if (!apic_is_x2apic_enabled())
-		return 0;
+		return;
 	/*
-	 * Checkme: Can we simply turn off x2apic here instead of panic?
+	 * Checkme: Can we simply turn off x2APIC here instead of disabling the APIC?
 	 */
-	panic("BIOS has enabled x2apic but kernel doesn't support x2apic, please disable x2apic in BIOS.\n");
+	pr_err("Kernel does not support x2APIC, please recompile with CONFIG_X86_X2APIC.\n");
+	pr_err("Disabling APIC, expect reduced performance and functionality.\n");
+
+	disable_apic = 1;
+	setup_clear_cpu_cap(X86_FEATURE_APIC);
 }
-early_initcall(validate_x2apic);
 
 static inline void try_to_enable_x2apic(int remap_mode) { }
 static inline void __x2apic_enable(void) { }

base-commit: b7b275e60bcd5f89771e865a8239325f86d9927d
-- 
2.25.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ