Received: by 2002:ab2:3141:0:b0:1ed:23cc:44d1 with SMTP id i1csp1990524lqg; Mon, 4 Mar 2024 09:28:47 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCU37KBCsQPw/6GkZcw8YW4aoooCdl0B3V+2ZyXUUux1azUStnTwh1VSKgVqLSnd84JLO1O3VHYKKgzUtj0ReGL3faREzc5VkY+KZgEv/w== X-Google-Smtp-Source: AGHT+IFYL5dWoesK4FNudRYtweG4ZQg+SchbGxnuHDriRpZYIprFAj/NS6lsKgcJPbvkzZ0p74+P X-Received: by 2002:a05:6a00:1955:b0:6e3:b7cb:b110 with SMTP id s21-20020a056a00195500b006e3b7cbb110mr9481515pfk.30.1709573326899; Mon, 04 Mar 2024 09:28:46 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709573326; cv=pass; d=google.com; s=arc-20160816; b=0002oNpJRW/cOmLzEj+dtOpCxSsEVhQ/rpZmA8EJrme2cwujVUAh0jkqkdg5KeRB9a pb0kKTmQU8Evm4G0+m0ExJ/N28AEA+Qqei2kBDh+rKZveuHui8MtwF1D7PZNo627xkCd qntHOw9bGZExdqRA3sEqneNpxAmiAJ/CLh6jNL+TfUYtw33d4ABfuatL1jfHQM3pRGBN HehMQ9bkDnYcjbxYs5fBC/MCW/Y/7tndl24uR3nMoUL0pfsGkQy0jp0TS02jeYlH8vTx dCdbfZyWK7OSO3a2tT6RqP4nxx15+tEuWC51kcVNWsRwY2OmULnUv/omyyWAMfuUCxqo /qNQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:precedence:robot-unsubscribe:robot-id :message-id:mime-version:list-unsubscribe:list-subscribe:list-id :precedence:references:in-reply-to:cc:subject:to:reply-to:sender :from:dkim-signature:dkim-signature:date; bh=UEkc6RVS8CnKBI9aoRjXwPPHjcEsiWy4gTC4RHc4te0=; fh=XfS7VWRu8hBkwZAEkqnBoeS7i9T7xQpJZ2TAW7TKBcg=; b=Rk0spnrU9eIuiBRAcC2wrZb2GZpyI20Cu70o9OH4gG/v4u277ONRCbzf6O09uQxUHC inRo341fpFos9y38cxkc/QJekACCnK1QTUAqyu7q2ymkfFZZhCBjbXpSz6lo8OOq8POG FjFEFzQiDdZuUfNPdMREqnLwLbRJN+FhzfgO9ZWCKl7PulREpOkTzWc7ZyFY8FHzekBB yqten1eboseyzffIRPEL4GBefJ62QhxKx83epg9nxYegrO6VQPy+tT9LfeIFnyy7GtiV LadWZkrHWwrL6AG44zIIQUuIzNFnMM2iJK8o+12mNREToy4zjvrzeD/0Vww6ihRL+jk0 sv1g==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=Bwg0PFWW; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e header.b=nbqu66zV; arc=pass (i=1 spf=pass spfdomain=linutronix.de dkim=pass dkdomain=linutronix.de dmarc=pass fromdomain=linutronix.de); spf=pass (google.com: domain of linux-kernel+bounces-90960-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-90960-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id x63-20020a638642000000b005dc7ee3c62dsi8329480pgd.236.2024.03.04.09.28.46 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Mar 2024 09:28:46 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-90960-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=Bwg0PFWW; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e header.b=nbqu66zV; arc=pass (i=1 spf=pass spfdomain=linutronix.de dkim=pass dkdomain=linutronix.de dmarc=pass fromdomain=linutronix.de); spf=pass (google.com: domain of linux-kernel+bounces-90960-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-90960-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id D4A84B25E83 for ; Mon, 4 Mar 2024 16:52:24 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 2228B605BE; Mon, 4 Mar 2024 16:51:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=linutronix.de header.i=@linutronix.de header.b="Bwg0PFWW"; dkim=permerror (0-bit key) header.d=linutronix.de header.i=@linutronix.de header.b="nbqu66zV" Received: from galois.linutronix.de (Galois.linutronix.de [193.142.43.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6A3E66025E; Mon, 4 Mar 2024 16:51:24 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=193.142.43.55 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709571087; cv=none; b=dY17MAFbPQMooD89e97Fy+zPNQf7bltWT6wBzxNLCfNjBEHMlEOSWapPhZGd7NqgSLk5dj2Sqm1BBlAkbtW5sZz54l9kEpWdVUL6ND3MMvqxNHDWwQfPeVtjP31nR+IxMCW2igr7QAEOYSxgTs4tSIStla5jAE6n8a8JnZo2xu0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709571087; c=relaxed/simple; bh=yqKuxOx1DXfPwnHtYoxJ3KAN1P+JEH1gy0hqR/4ZeUk=; h=Date:From:To:Subject:Cc:In-Reply-To:References:MIME-Version: Message-ID:Content-Type; b=IA6eltxY/gUvN8PcFGDeyBnXS/rq5mQwfPbSu9LdqjB6j1ZSO3spqKDBZpN9MIiAznIbenbETju5XqJH/WC4bK8ZgmDI0d+N4cBc9Sz1OU8AqO2jZFQ5EoZr3Mcw7BijNE368GIh5rcPaOBY047zycV8sVonKXKTIaLdD3bVZu4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linutronix.de; spf=pass smtp.mailfrom=linutronix.de; dkim=pass (2048-bit key) header.d=linutronix.de header.i=@linutronix.de header.b=Bwg0PFWW; dkim=permerror (0-bit key) header.d=linutronix.de header.i=@linutronix.de header.b=nbqu66zV; arc=none smtp.client-ip=193.142.43.55 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linutronix.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linutronix.de Date: Mon, 04 Mar 2024 16:51:16 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1709571077; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=UEkc6RVS8CnKBI9aoRjXwPPHjcEsiWy4gTC4RHc4te0=; b=Bwg0PFWWdY41S0JXQzt2om9AyG++LMSFJU2T1KWjduMWigUQoKHV8DLHBNZAcbN/oxK8KZ Ug8QT7QidpUxkjQz2iWrj0KZ+ZP3POxPaDAZiEeIBMcdEP0u6+fhINP3xug3uNrrNgDSfc BTp79iz2BDqxPSStu/bykpHipNCp8sn9WTWyYpnj5DGTlY3vW+fyDDabJzTQhfrXObmDyz +wDbxr8q2T/W6lWrXQ+JbnF9uECiHLQesNrqDoTCB21xjRILaawRXkRAnerkn+2LBNamxf Ra9Z1kw/T3rd+buzwYyDl4bqOs9WmnRFeqmxdtHJ5p96eNZpiCRt5RazbGbaqw== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1709571077; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=UEkc6RVS8CnKBI9aoRjXwPPHjcEsiWy4gTC4RHc4te0=; b=nbqu66zVImeXc5qrEGSjwX80kVSROmoYsYvHg7+cSMb1+N6IH7EImsNvP9iF0lfIDdPPLj ahKXhS9RAQVF+qCQ== From: "tip-bot2 for Thomas Gleixner" Sender: tip-bot2@linutronix.de Reply-to: linux-kernel@vger.kernel.org To: linux-tip-commits@vger.kernel.org Subject: [tip: x86/core] x86/idle: Sanitize X86_BUG_AMD_E400 handling Cc: Borislav Petkov , Thomas Gleixner , x86@kernel.org, linux-kernel@vger.kernel.org In-Reply-To: <877cim6sis.ffs@tglx> References: <877cim6sis.ffs@tglx> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-ID: <170957107613.398.3124673060349800615.tip-bot2@tip-bot2> Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails Precedence: bulk Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit The following commit has been merged into the x86/core branch of tip: Commit-ID: cb81deefb59de01325ab822f900c13941bfaf67f Gitweb: https://git.kernel.org/tip/cb81deefb59de01325ab822f900c13941bfaf67f Author: Thomas Gleixner AuthorDate: Wed, 28 Feb 2024 23:13:00 +01:00 Committer: Borislav Petkov (AMD) CommitterDate: Mon, 04 Mar 2024 17:38:06 +01:00 x86/idle: Sanitize X86_BUG_AMD_E400 handling amd_e400_idle(), the idle routine for AMD CPUs which are affected by erratum 400 violates the RCU constraints by invoking tick_broadcast_enter() and tick_broadcast_exit() after the core code has marked RCU non-idle. The functions can end up in lockdep or tracing, which rightfully triggers a RCU warning. The core code provides now a static branch conditional invocation of the broadcast functions. Remove amd_e400_idle(), enforce default_idle() and enable the static branch on affected CPUs to cure this. [ bp: Fold in a fix for a IS_ENABLED() check fail missing a "CONFIG_" prefix which tglx spotted. ] Reported-by: Borislav Petkov Signed-off-by: Thomas Gleixner Signed-off-by: Borislav Petkov (AMD) Link: https://lore.kernel.org/r/877cim6sis.ffs@tglx --- arch/x86/Kconfig | 1 +- arch/x86/kernel/process.c | 42 ++++++++------------------------------ 2 files changed, 10 insertions(+), 33 deletions(-) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 5029862..0802653 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -147,6 +147,7 @@ config X86 select EDAC_ATOMIC_SCRUB select EDAC_SUPPORT select GENERIC_CLOCKEVENTS_BROADCAST if X86_64 || (X86_32 && X86_LOCAL_APIC) + select GENERIC_CLOCKEVENTS_BROADCAST_IDLE if GENERIC_CLOCKEVENTS_BROADCAST select GENERIC_CLOCKEVENTS_MIN_ADJUST select GENERIC_CMOS_UPDATE select GENERIC_CPU_AUTOPROBE diff --git a/arch/x86/kernel/process.c b/arch/x86/kernel/process.c index 45a9d49..b86ff0f 100644 --- a/arch/x86/kernel/process.c +++ b/arch/x86/kernel/process.c @@ -846,31 +846,6 @@ void __noreturn stop_this_cpu(void *dummy) } /* - * AMD Erratum 400 aware idle routine. We handle it the same way as C3 power - * states (local apic timer and TSC stop). - * - * XXX this function is completely buggered vs RCU and tracing. - */ -static void amd_e400_idle(void) -{ - /* - * We cannot use static_cpu_has_bug() here because X86_BUG_AMD_APIC_C1E - * gets set after static_cpu_has() places have been converted via - * alternatives. - */ - if (!boot_cpu_has_bug(X86_BUG_AMD_APIC_C1E)) { - default_idle(); - return; - } - - tick_broadcast_enter(); - - default_idle(); - - tick_broadcast_exit(); -} - -/* * Prefer MWAIT over HALT if MWAIT is supported, MWAIT_CPUID leaf * exists and whenever MONITOR/MWAIT extensions are present there is at * least one C1 substate. @@ -890,8 +865,8 @@ static int prefer_mwait_c1_over_halt(const struct cpuinfo_x86 *c) if (!cpu_has(c, X86_FEATURE_MWAIT)) return 0; - /* Monitor has a bug. Fallback to HALT */ - if (boot_cpu_has_bug(X86_BUG_MONITOR)) + /* Monitor has a bug or APIC stops in C1E. Fallback to HALT */ + if (boot_cpu_has_bug(X86_BUG_MONITOR) || boot_cpu_has_bug(X86_BUG_AMD_APIC_C1E)) return 0; cpuid(CPUID_MWAIT_LEAF, &eax, &ebx, &ecx, &edx); @@ -942,17 +917,15 @@ void select_idle_routine(const struct cpuinfo_x86 *c) if (x86_idle_set() || boot_option_idle_override == IDLE_POLL) return; - if (boot_cpu_has_bug(X86_BUG_AMD_E400)) { - pr_info("using AMD E400 aware idle routine\n"); - static_call_update(x86_idle, amd_e400_idle); - } else if (prefer_mwait_c1_over_halt(c)) { + if (prefer_mwait_c1_over_halt(c)) { pr_info("using mwait in idle threads\n"); static_call_update(x86_idle, mwait_idle); } else if (cpu_feature_enabled(X86_FEATURE_TDX_GUEST)) { pr_info("using TDX aware idle routine\n"); static_call_update(x86_idle, tdx_safe_halt); - } else + } else { static_call_update(x86_idle, default_idle); + } } void amd_e400_c1e_apic_setup(void) @@ -985,7 +958,10 @@ void __init arch_post_acpi_subsys_init(void) if (!boot_cpu_has(X86_FEATURE_NONSTOP_TSC)) mark_tsc_unstable("TSC halt in AMD C1E"); - pr_info("System has AMD C1E enabled\n"); + + if (IS_ENABLED(CONFIG_GENERIC_CLOCKEVENTS_BROADCAST_IDLE)) + static_branch_enable(&arch_needs_tick_broadcast); + pr_info("System has AMD C1E erratum E400. Workaround enabled.\n"); } static int __init idle_setup(char *str)