Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2766152pxj; Sun, 23 May 2021 10:07:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwIaeAERaJdSS/0sO1oh0L3lxMkBqynoc1xbyiqRnNF5f5JWzFNfmw6/riTaEIwVuzzfNKu X-Received: by 2002:a05:6e02:1c8e:: with SMTP id w14mr11239629ill.138.1621789637573; Sun, 23 May 2021 10:07:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621789637; cv=none; d=google.com; s=arc-20160816; b=L+qKh3i+DDUJPF9FoNIMIiwvlHVBJtgE47qGfKEvTq/yI4vdmJB5mIwtFGBL06yTqV tDNgOW2Laez3R+GZQQHgwVKDBeii//2UC8QVqbkiLodM/xwmxLIZ5sNMZUjvpErNBC4v 84c7tPc3wFfjElgQ7cfmin2SgWktWj8cjC3BlNJ64w0eQSsdHd2v21HHxSx1ErFCD+FC /wI5GAmIb1S823kT0wERzVBzRZ6XrL/YIO6NDeoRLT8rtw25FvDVnj26vfBg+jmYvsFd BJ24WwCidBjGtN/ZhPjNCD0S3adNtkbNRH1nNXgfjy6qEXxBA3HOJYvKWP4B9VD38/xM 3I8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:dkim-signature; bh=AQY8MaNXdB9lrK0EVRcQv50/fTdkdlIzkK11aCclTwY=; b=HE/XBas9MFuuTXRyU5Fpd2aTdD1ZqRbq32RPbq1y90WrGxAz/zlMhmh56zxnm1r5u1 ncPZKM+hcD9oOIaVG50Qe/lVb1BXGE4SkSVShIcFpvGUPT870XDHSEe3qgO9Ym3coJ8F WNX9l42PKkQbxfoT3b+DU/fIk5gDmoJlwOOy91hkhbGdWsCnpKqZDgPhe5kK9WV/b+HT eQgpl9m6bVVx3XwHGU4P2kr73w/vK2hQSguQjAxbhhZgTSmVDeoUDkvhoDMLwB/iiCrs Yno+S0OKyfOQ5cyZUThbovJPHuZQhKWVHT0P0qewkikNt90j0LoaC4OqesA86xfc7r9Y ldww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=YrqnMcRo; dkim=neutral (no key) header.i=@suse.de header.b=cv17nhrv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g8si11810412ilq.40.2021.05.23.10.07.04; Sun, 23 May 2021 10:07:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=YrqnMcRo; dkim=neutral (no key) header.i=@suse.de header.b=cv17nhrv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231954AbhEWRGx (ORCPT + 99 others); Sun, 23 May 2021 13:06:53 -0400 Received: from mx2.suse.de ([195.135.220.15]:47676 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231828AbhEWRGs (ORCPT ); Sun, 23 May 2021 13:06:48 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1621789521; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=AQY8MaNXdB9lrK0EVRcQv50/fTdkdlIzkK11aCclTwY=; b=YrqnMcRoll/K3arytPngpzidGJggy3zhK0c+U7OTwpD42tEOSORkxiiXR4227rg1/MQXnr 6xPSUFjaTIh+GiagoWoIgTG7jivpSvI4LfpaJ/7oc+uWuHLRuTNZSGO77VRTlVGJ7m7U7O iDZNGMUGvmp032152cRLOiQ4ZNcEY2M= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1621789521; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=AQY8MaNXdB9lrK0EVRcQv50/fTdkdlIzkK11aCclTwY=; b=cv17nhrvfMl/ZUFhf8i+qV4+BMSEjs/9lb9OmDUiDV+JaTGNpw4yWnkeGdTwHvkUKN/IzA BfRv3a5qv3dXufAw== Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id EE885AAFD; Sun, 23 May 2021 17:05:20 +0000 (UTC) Date: Sun, 23 May 2021 19:05:14 +0200 From: Borislav Petkov To: James Feeney Cc: linux-smp@vger.kernel.org, Jens Axboe , lkml Subject: Re: linux 5.12 - fails to boot - soft lockup - CPU#0 stuck for 23s! - RIP smp_call_function_single Message-ID: References: <1876afbe-a167-2be5-3690-846700eeb76c@nurealm.net> <984ee4ab-6e6b-cb0e-a4f1-ce2951994b1d@nurealm.net> <373464e3-b8a0-0fe0-b890-41df0eecf090@nurealm.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <373464e3-b8a0-0fe0-b890-41df0eecf090@nurealm.net> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, May 22, 2021 at 05:28:42PM -0600, James Feeney wrote: > Out of curiosity, I added "pr_info("%s : mcheck_intel_therm_init() > use to run here", __func__);" to __init mcheck_init() in > arch/x86/kernel/cpu/mce/core.c, just to see *when* it *would have* > run, compared to when it is running now. Yes, this is probably the only timing-sensitive difference this patch of mine introduces. So who knows what's in that LVT APIC register earlier and *maybe* reading it later might give us different values. So do the same game again pls, but this time apply the patch below. It is practically a revert of my patch and with it, your box should *not* freeze anymore *if* my patch really is the culprit. Thx. --- diff --git a/arch/x86/include/asm/mce.h b/arch/x86/include/asm/mce.h index ddfb3cad8dff..5ac8b827bc12 100644 --- a/arch/x86/include/asm/mce.h +++ b/arch/x86/include/asm/mce.h @@ -296,6 +296,12 @@ struct cper_sec_mem_err; extern void apei_mce_report_mem_error(int corrected, struct cper_sec_mem_err *mem_err); +#ifdef CONFIG_X86_THERMAL_VECTOR +extern void mcheck_intel_therm_init(void); +#else +static inline void mcheck_intel_therm_init(void) { } +#endif + /* * Enumerate new IP types and HWID values in AMD processors which support * Scalable MCA. diff --git a/arch/x86/kernel/cpu/mce/core.c b/arch/x86/kernel/cpu/mce/core.c index bf7fe87a7e88..ded20b8612fe 100644 --- a/arch/x86/kernel/cpu/mce/core.c +++ b/arch/x86/kernel/cpu/mce/core.c @@ -2190,6 +2190,7 @@ __setup("mce", mcheck_enable); int __init mcheck_init(void) { + mcheck_intel_therm_init(); mce_register_decode_chain(&early_nb); mce_register_decode_chain(&mce_uc_nb); mce_register_decode_chain(&mce_default_nb); diff --git a/drivers/thermal/intel/therm_throt.c b/drivers/thermal/intel/therm_throt.c index f8e882592ba5..0ebd2386839f 100644 --- a/drivers/thermal/intel/therm_throt.c +++ b/drivers/thermal/intel/therm_throt.c @@ -621,19 +621,30 @@ bool x86_thermal_enabled(void) return atomic_read(&therm_throt_en); } +void __init mcheck_intel_therm_init(void) +{ + /* + * This function is only called on boot CPU. Save the init thermal + * LVT value on BSP and use that value to restore APs' thermal LVT + * entry BIOS programmed later + */ + if (intel_thermal_supported(&boot_cpu_data)) { + lvtthmr_init = apic_read(APIC_LVTTHMR); + pr_info("%s: lvtthmr_init: 0x%x\n", __func__, lvtthmr_init); + } else { + pr_info("%s: !intel_thermal_supported\n", __func__); + } +} + void intel_init_thermal(struct cpuinfo_x86 *c) { unsigned int cpu = smp_processor_id(); int tm2 = 0; - u32 l, h; + u32 l, h, tmp = -1; if (!intel_thermal_supported(c)) return; - /* On the BSP? */ - if (c == &boot_cpu_data) - lvtthmr_init = apic_read(APIC_LVTTHMR); - /* * First check if its enabled already, in which case there might * be some SMM goo which handles it, so we can't even put a handler @@ -652,13 +663,17 @@ void intel_init_thermal(struct cpuinfo_x86 *c) * BIOS has programmed on AP based on BSP's info we saved since BIOS * is always setting the same value for all threads/cores. */ - if ((h & APIC_DM_FIXED_MASK) != APIC_DM_FIXED) + if ((h & APIC_DM_FIXED_MASK) != APIC_DM_FIXED) { apic_write(APIC_LVTTHMR, lvtthmr_init); + tmp = apic_read(APIC_LVTTHMR); + } + pr_info("%s: CPU%d, lvtthmr_init: 0x%x, read: 0x%x, misc_enable (low): 0x%x\n", + __func__, cpu, lvtthmr_init, tmp, l); if ((l & MSR_IA32_MISC_ENABLE_TM1) && (h & APIC_DM_SMI)) { if (system_state == SYSTEM_BOOTING) - pr_debug("CPU%d: Thermal monitoring handled by SMI\n", cpu); + pr_info("CPU%d: Thermal monitoring handled by SMI\n", cpu); return; } -- Regards/Gruss, Boris. SUSE Software Solutions Germany GmbH, GF: Felix Imendörffer, HRB 36809, AG Nürnberg