public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
* [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests
@ 2022-04-08 10:31 Varad Gautam
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 1/9] x86: Move ap_init() to smp.c Varad Gautam
                   ` (9 more replies)
  0 siblings, 10 replies; 12+ messages in thread
From: Varad Gautam @ 2022-04-08 10:31 UTC (permalink / raw)
  To: kvm
  Cc: pbonzini, drjones, marcorr, zxwang42, erdemaktas, rientjes,
	seanjc, brijesh.singh, Thomas.Lendacky, jroedel, bp, varad.gautam

This series brings multi-vcpu support to UEFI tests on x86.

Most of the necessary AP bringup code already exists within kvm-unit-tests'
cstart64.S, and has now been either rewritten in C or moved to a common location
to be shared between EFI and non-EFI test builds.

A call gate is used to transition from 16-bit to 32-bit mode, since EFI may
not load the 32-bit entrypoint low enough to be reachable from the SIPI vector.

Git branch: https://github.com/varadgautam/kvm-unit-tests/commits/ap-boot-v1

Varad Gautam (9):
  x86: Move ap_init() to smp.c
  x86: Move load_idt() to desc.c
  x86: desc: Split IDT entry setup into a generic helper
  x86: efi, smp: Transition APs from 16-bit to 32-bit mode
  x86: Move 32-bit bringup routines to start32.S
  x86: efi, smp: Transition APs from 32-bit to 64-bit mode
  x86: Move load_gdt_tss() to desc.c
  x86: Provide a common 64-bit AP entrypoint for EFI and non-EFI
  x86: setup: Serialize ap_start64 with a spinlock

 lib/x86/asm/setup.h       |   3 ++
 lib/x86/desc.c            |  39 +++++++++++---
 lib/x86/desc.h            |   3 ++
 lib/x86/setup.c           |  65 +++++++++++++++++-----
 lib/x86/smp.c             |  89 +++++++++++++++++++++++++++++-
 lib/x86/smp.h             |   1 +
 x86/cstart64.S            | 111 ++------------------------------------
 x86/efi/crt0-efi-x86_64.S |   3 ++
 x86/efi/efistart64.S      |  73 ++++++++++++++++++++-----
 x86/start32.S             | 102 +++++++++++++++++++++++++++++++++++
 10 files changed, 348 insertions(+), 141 deletions(-)
 create mode 100644 x86/start32.S

-- 
2.32.0


^ permalink raw reply	[flat|nested] 12+ messages in thread

* [kvm-unit-tests PATCH 1/9] x86: Move ap_init() to smp.c
  2022-04-08 10:31 [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests Varad Gautam
@ 2022-04-08 10:31 ` Varad Gautam
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 2/9] x86: Move load_idt() to desc.c Varad Gautam
                   ` (8 subsequent siblings)
  9 siblings, 0 replies; 12+ messages in thread
From: Varad Gautam @ 2022-04-08 10:31 UTC (permalink / raw)
  To: kvm
  Cc: pbonzini, drjones, marcorr, zxwang42, erdemaktas, rientjes,
	seanjc, brijesh.singh, Thomas.Lendacky, jroedel, bp, varad.gautam

ap_init() copies the SIPI vector to lowmem, sends INIT/SIPI to APs
and waits on the APs to come up.

Port this routine to C from asm and move it to smp.c to allow sharing
this functionality between the EFI (-fPIC) and non-EFI builds.

Call ap_init() from the EFI setup path to reset the APs to a known
location.

Signed-off-by: Varad Gautam <varad.gautam@suse.com>
---
 lib/x86/setup.c      |  1 +
 lib/x86/smp.c        | 28 ++++++++++++++++++++++++++--
 lib/x86/smp.h        |  1 +
 x86/cstart64.S       | 20 ++------------------
 x86/efi/efistart64.S |  9 +++++++++
 5 files changed, 39 insertions(+), 20 deletions(-)

diff --git a/lib/x86/setup.c b/lib/x86/setup.c
index 0044b64..8be39cb 100644
--- a/lib/x86/setup.c
+++ b/lib/x86/setup.c
@@ -323,6 +323,7 @@ efi_status_t setup_efi(efi_bootinfo_t *efi_bootinfo)
 	load_idt();
 	mask_pic_interrupts();
 	enable_apic();
+	ap_init();
 	enable_x2apic();
 	smp_init();
 	setup_page_table();
diff --git a/lib/x86/smp.c b/lib/x86/smp.c
index 2ac0ef7..1a68557 100644
--- a/lib/x86/smp.c
+++ b/lib/x86/smp.c
@@ -18,6 +18,9 @@ static volatile int ipi_done;
 static volatile bool ipi_wait;
 static int _cpu_count;
 static atomic_t active_cpus;
+extern u8 sipi_entry;
+extern u8 sipi_end;
+volatile unsigned cpu_online_count = 1;
 
 static __attribute__((used)) void ipi(void)
 {
@@ -118,8 +121,6 @@ void smp_init(void)
     int i;
     void ipi_entry(void);
 
-    _cpu_count = fwcfg_get_nb_cpus();
-
     setup_idt();
     init_apic_map();
     set_idt_entry(IPI_VECTOR, ipi_entry, 0);
@@ -146,3 +147,26 @@ void smp_reset_apic(void)
 
     atomic_inc(&active_cpus);
 }
+
+void ap_init(void)
+{
+    u8 *dst_addr = 0;
+    size_t sipi_sz = (&sipi_end - &sipi_entry) + 1;
+
+    asm volatile("cld");
+
+    /* Relocate SIPI vector to dst_addr so it can run in 16-bit mode. */
+    memcpy(dst_addr, &sipi_entry, sipi_sz);
+
+    /* INIT */
+    apic_icr_write(APIC_DEST_ALLBUT | APIC_DEST_PHYSICAL | APIC_DM_INIT | APIC_INT_ASSERT, 0);
+
+    /* SIPI */
+    apic_icr_write(APIC_DEST_ALLBUT | APIC_DEST_PHYSICAL | APIC_DM_STARTUP, 0);
+
+    _cpu_count = fwcfg_get_nb_cpus();
+
+    while (_cpu_count != cpu_online_count) {
+        ;
+    }
+}
diff --git a/lib/x86/smp.h b/lib/x86/smp.h
index f74845e..40255c3 100644
--- a/lib/x86/smp.h
+++ b/lib/x86/smp.h
@@ -11,5 +11,6 @@ void on_cpu(int cpu, void (*function)(void *data), void *data);
 void on_cpu_async(int cpu, void (*function)(void *data), void *data);
 void on_cpus(void (*function)(void *data), void *data);
 void smp_reset_apic(void);
+void ap_init(void);
 
 #endif
diff --git a/x86/cstart64.S b/x86/cstart64.S
index 238cebf..06daa7c 100644
--- a/x86/cstart64.S
+++ b/x86/cstart64.S
@@ -160,6 +160,7 @@ gdt32:
 gdt32_end:
 
 .code16
+.globl sipi_entry
 sipi_entry:
 	mov %cr0, %eax
 	or $1, %eax
@@ -171,6 +172,7 @@ gdt32_descr:
 	.word gdt32_end - gdt32 - 1
 	.long gdt32
 
+.globl sipi_end
 sipi_end:
 
 .code32
@@ -249,21 +251,3 @@ lvl5:
 
 online_cpus:
 	.fill (max_cpus + 7) / 8, 1, 0
-
-ap_init:
-	cld
-	lea sipi_entry, %rsi
-	xor %rdi, %rdi
-	mov $(sipi_end - sipi_entry), %rcx
-	rep movsb
-	mov $APIC_DEFAULT_PHYS_BASE, %eax
-	movl $(APIC_DEST_ALLBUT | APIC_DEST_PHYSICAL | APIC_DM_INIT | APIC_INT_ASSERT), APIC_ICR(%rax)
-	movl $(APIC_DEST_ALLBUT | APIC_DEST_PHYSICAL | APIC_DM_STARTUP), APIC_ICR(%rax)
-	call fwcfg_get_nb_cpus
-1:	pause
-	cmpw %ax, cpu_online_count
-	jne 1b
-	ret
-
-.align 2
-cpu_online_count:	.word 1
diff --git a/x86/efi/efistart64.S b/x86/efi/efistart64.S
index 017abba..0425153 100644
--- a/x86/efi/efistart64.S
+++ b/x86/efi/efistart64.S
@@ -57,3 +57,12 @@ load_gdt_tss:
 	pushq $0x08 /* 2nd entry in gdt64: 64-bit code segment */
 	pushq %rdi
 	lretq
+
+.code16
+
+.globl sipi_entry
+sipi_entry:
+	jmp sipi_entry
+
+.globl sipi_end
+sipi_end:
-- 
2.32.0


^ permalink raw reply related	[flat|nested] 12+ messages in thread

* [kvm-unit-tests PATCH 2/9] x86: Move load_idt() to desc.c
  2022-04-08 10:31 [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests Varad Gautam
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 1/9] x86: Move ap_init() to smp.c Varad Gautam
@ 2022-04-08 10:31 ` Varad Gautam
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 3/9] x86: desc: Split IDT entry setup into a generic helper Varad Gautam
                   ` (7 subsequent siblings)
  9 siblings, 0 replies; 12+ messages in thread
From: Varad Gautam @ 2022-04-08 10:31 UTC (permalink / raw)
  To: kvm
  Cc: pbonzini, drjones, marcorr, zxwang42, erdemaktas, rientjes,
	seanjc, brijesh.singh, Thomas.Lendacky, jroedel, bp, varad.gautam

This allows sharing IDT setup code between EFI (-fPIC) and
non-EFI builds.

Signed-off-by: Varad Gautam <varad.gautam@suse.com>
---
 lib/x86/desc.c       | 5 +++++
 lib/x86/desc.h       | 1 +
 lib/x86/setup.c      | 1 -
 x86/cstart64.S       | 3 ++-
 x86/efi/efistart64.S | 5 -----
 5 files changed, 8 insertions(+), 7 deletions(-)

diff --git a/lib/x86/desc.c b/lib/x86/desc.c
index c2eb16e..355a428 100644
--- a/lib/x86/desc.c
+++ b/lib/x86/desc.c
@@ -293,6 +293,11 @@ void setup_idt(void)
     handle_exception(13, check_exception_table);
 }
 
+void load_idt(void)
+{
+	lidt(&idt_descr);
+}
+
 unsigned exception_vector(void)
 {
     unsigned char vector;
diff --git a/lib/x86/desc.h b/lib/x86/desc.h
index ad6277b..602e9f7 100644
--- a/lib/x86/desc.h
+++ b/lib/x86/desc.h
@@ -4,6 +4,7 @@
 #include <setjmp.h>
 
 void setup_idt(void);
+void load_idt(void);
 void setup_alt_stack(void);
 
 struct ex_regs {
diff --git a/lib/x86/setup.c b/lib/x86/setup.c
index 8be39cb..eab035f 100644
--- a/lib/x86/setup.c
+++ b/lib/x86/setup.c
@@ -170,7 +170,6 @@ void setup_multiboot(struct mbi_bootinfo *bi)
 #ifdef CONFIG_EFI
 
 /* From x86/efi/efistart64.S */
-extern void load_idt(void);
 extern void load_gdt_tss(size_t tss_offset);
 
 static efi_status_t setup_memory_allocator(efi_bootinfo_t *efi_bootinfo)
diff --git a/x86/cstart64.S b/x86/cstart64.S
index 06daa7c..b867791 100644
--- a/x86/cstart64.S
+++ b/x86/cstart64.S
@@ -69,7 +69,6 @@ MSR_GS_BASE = 0xc0000101
 .endm
 
 .macro load_tss
-	lidtq idt_descr
 	movq %rsp, %rdi
 	call setup_tss
 	ltr %ax
@@ -198,6 +197,7 @@ ap_start64:
 	lock btsl %eax, ap_lock
 	jc .retry
 	call reset_apic
+	call load_idt
 	load_tss
 	call enable_apic
 	call save_id
@@ -213,6 +213,7 @@ ap_start64:
 
 start64:
 	call reset_apic
+	call load_idt
 	load_tss
 	call mask_pic_interrupts
 	call enable_apic
diff --git a/x86/efi/efistart64.S b/x86/efi/efistart64.S
index 0425153..ea3d1c0 100644
--- a/x86/efi/efistart64.S
+++ b/x86/efi/efistart64.S
@@ -26,11 +26,6 @@ ptl4:
 .code64
 .text
 
-.globl load_idt
-load_idt:
-	lidtq idt_descr(%rip)
-	retq
-
 .globl load_gdt_tss
 load_gdt_tss:
 	/* Load GDT */
-- 
2.32.0


^ permalink raw reply related	[flat|nested] 12+ messages in thread

* [kvm-unit-tests PATCH 3/9] x86: desc: Split IDT entry setup into a generic helper
  2022-04-08 10:31 [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests Varad Gautam
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 1/9] x86: Move ap_init() to smp.c Varad Gautam
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 2/9] x86: Move load_idt() to desc.c Varad Gautam
@ 2022-04-08 10:31 ` Varad Gautam
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 4/9] x86: efi, smp: Transition APs from 16-bit to 32-bit mode Varad Gautam
                   ` (6 subsequent siblings)
  9 siblings, 0 replies; 12+ messages in thread
From: Varad Gautam @ 2022-04-08 10:31 UTC (permalink / raw)
  To: kvm
  Cc: pbonzini, drjones, marcorr, zxwang42, erdemaktas, rientjes,
	seanjc, brijesh.singh, Thomas.Lendacky, jroedel, bp, varad.gautam

EFI bootstrapping code configures a call gate in a later commit to jump
from 16-bit to 32-bit code.

Introduce a set_idt_entry_t() routine which can be used to fill both
an interrupt descriptor and a call gate descriptor on x86.

Signed-off-by: Varad Gautam <varad.gautam@suse.com>
---
 lib/x86/desc.c | 28 ++++++++++++++++++++++------
 lib/x86/desc.h |  1 +
 2 files changed, 23 insertions(+), 6 deletions(-)

diff --git a/lib/x86/desc.c b/lib/x86/desc.c
index 355a428..713ad0b 100644
--- a/lib/x86/desc.c
+++ b/lib/x86/desc.c
@@ -56,22 +56,38 @@ __attribute__((regparm(1)))
 #endif
 void do_handle_exception(struct ex_regs *regs);
 
-void set_idt_entry(int vec, void *addr, int dpl)
+/*
+ * Fill an idt_entry_t, clearing e_sz bytes first.
+ *
+ * This can also be used to set up x86 call gates, since the gate
+ * descriptor layout is identical to idt_entry_t, except for the
+ * absence of .offset2 and .reserved fields. To do so, pass in e_sz
+ * according to the gate descriptor size.
+ */
+void set_idt_entry_t(idt_entry_t *e, size_t e_sz, void *addr,
+		u16 sel, u16 type, u16 dpl)
 {
-    idt_entry_t *e = &boot_idt[vec];
-    memset(e, 0, sizeof *e);
+    memset(e, 0, e_sz);
     e->offset0 = (unsigned long)addr;
-    e->selector = read_cs();
+    e->selector = sel;
     e->ist = 0;
-    e->type = 14;
+    e->type = type;
     e->dpl = dpl;
     e->p = 1;
     e->offset1 = (unsigned long)addr >> 16;
 #ifdef __x86_64__
-    e->offset2 = (unsigned long)addr >> 32;
+    if (e_sz == sizeof(*e)) {
+        e->offset2 = (unsigned long)addr >> 32;
+    }
 #endif
 }
 
+void set_idt_entry(int vec, void *addr, int dpl)
+{
+    idt_entry_t *e = &boot_idt[vec];
+    set_idt_entry_t(e, sizeof *e, addr, read_cs(), 14, dpl);
+}
+
 void set_idt_dpl(int vec, u16 dpl)
 {
     idt_entry_t *e = &boot_idt[vec];
diff --git a/lib/x86/desc.h b/lib/x86/desc.h
index 602e9f7..5eb21e4 100644
--- a/lib/x86/desc.h
+++ b/lib/x86/desc.h
@@ -217,6 +217,7 @@ unsigned exception_vector(void);
 int write_cr4_checking(unsigned long val);
 unsigned exception_error_code(void);
 bool exception_rflags_rf(void);
+void set_idt_entry_t(idt_entry_t *e, size_t e_sz, void *addr, u16 sel, u16 type, u16 dpl);
 void set_idt_entry(int vec, void *addr, int dpl);
 void set_idt_sel(int vec, u16 sel);
 void set_idt_dpl(int vec, u16 dpl);
-- 
2.32.0


^ permalink raw reply related	[flat|nested] 12+ messages in thread

* [kvm-unit-tests PATCH 4/9] x86: efi, smp: Transition APs from 16-bit to 32-bit mode
  2022-04-08 10:31 [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests Varad Gautam
                   ` (2 preceding siblings ...)
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 3/9] x86: desc: Split IDT entry setup into a generic helper Varad Gautam
@ 2022-04-08 10:31 ` Varad Gautam
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 5/9] x86: Move 32-bit bringup routines to start32.S Varad Gautam
                   ` (5 subsequent siblings)
  9 siblings, 0 replies; 12+ messages in thread
From: Varad Gautam @ 2022-04-08 10:31 UTC (permalink / raw)
  To: kvm
  Cc: pbonzini, drjones, marcorr, zxwang42, erdemaktas, rientjes,
	seanjc, brijesh.singh, Thomas.Lendacky, jroedel, bp, varad.gautam

Sending INIT/SIPI to APs from ap_init() resets them into 16-bit mode
to loop within sipi_entry().

To drive the APs into 32-bit mode, the SIPI vector needs:
1. A GDT descriptor reachable from 16-bit code (gdt32_descr).
2. A 32-bit entrypoint reachable from 16-bit code (ap_start32).
3. The locations of GDT and the 32-bit entrypoint.

Setting these up at compile time (like on non-EFI builds) is not
possible since EFI builds with -shared -fPIC and efistart64.S cannot
reference any absolute addresses.

Relative addressing is unavailable on 16-bit mode.

Moreover, EFI may not load the 32-bit entrypoint to be reachable from
16-bit mode.

To overcome these problems,
1. Fill the GDT descriptor at runtime after relocating
   [sipi_entry-sipi_end] to lowmem. Since sipi_entry does not know the
   address of this descriptor, use the last two bytes of SIPI page to
   communicate it.
2. Place a call gate in the GDT to point to ap_start32.
3. Popluate sipi_entry() to lcall to ap_start32.

With this, the APs can transition to 32-bit mode and loop at a known
location.

Signed-off-by: Varad Gautam <varad.gautam@suse.com>
---
 lib/x86/smp.c        | 56 ++++++++++++++++++++++++++++++++++++++++++++
 x86/efi/efistart64.S | 29 ++++++++++++++++++++++-
 2 files changed, 84 insertions(+), 1 deletion(-)

diff --git a/lib/x86/smp.c b/lib/x86/smp.c
index 1a68557..33251cb 100644
--- a/lib/x86/smp.c
+++ b/lib/x86/smp.c
@@ -6,6 +6,7 @@
 #include "apic.h"
 #include "fwcfg.h"
 #include "desc.h"
+#include "asm/page.h"
 
 #define IPI_VECTOR 0x20
 
@@ -148,16 +149,71 @@ void smp_reset_apic(void)
     atomic_inc(&active_cpus);
 }
 
+#ifdef CONFIG_EFI
+extern u8 gdt32_descr, gdt32, gdt32_end;
+extern u8 ap_start32;
+#endif
+
 void ap_init(void)
 {
     u8 *dst_addr = 0;
     size_t sipi_sz = (&sipi_end - &sipi_entry) + 1;
 
+    assert(sipi_sz < PAGE_SIZE);
+
     asm volatile("cld");
 
     /* Relocate SIPI vector to dst_addr so it can run in 16-bit mode. */
+    memset(dst_addr, 0, PAGE_SIZE);
     memcpy(dst_addr, &sipi_entry, sipi_sz);
 
+#ifdef CONFIG_EFI
+    volatile struct descriptor_table_ptr *gdt32_descr_rel;
+    idt_entry_t *gate_descr;
+    u16 *gdt32_descr_reladdr = (u16 *) (PAGE_SIZE - sizeof(u16));
+
+    /*
+     * gdt32_descr for CONFIG_EFI needs to be filled here dynamically
+     * since compile time calculation of offsets is not allowed when
+     * building with -shared, and rip-relative addressing is not supported
+     * in 16-bit mode.
+     *
+     * Use the last two bytes of SIPI page to store relocated gdt32_descr
+     * addr.
+     */
+    *gdt32_descr_reladdr = (&gdt32_descr - &sipi_entry);
+
+    gdt32_descr_rel = (struct descriptor_table_ptr *) ((u64) *gdt32_descr_reladdr);
+    gdt32_descr_rel->limit = (u16) (&gdt32_end - &gdt32 - 1);
+    gdt32_descr_rel->base = (ulong) ((u32) (&gdt32 - &sipi_entry));
+
+    /*
+     * EFI may not load the 32-bit AP entrypoint (ap_start32) low enough
+     * to be reachable from the SIPI vector. Since we build with -shared, this
+     * location needs to be fetched at runtime, and rip-relative addressing is
+     * not supported in 16-bit mode.
+     * To perform 16-bit -> 32-bit far jump, our options are:
+     * - ljmpl $cs, $label : unusable since $label is not known at build time.
+     * - push $cs; push $label; lret : requires an intermediate trampoline since
+     *     $label must still be within 0 - 0xFFFF for 16-bit far return to work.
+     * - lcall into a call-gate : best suited.
+     *
+     * Set up call gate to ap_start32 within GDT.
+     *
+     * gdt32 layout:
+     *
+     * Entry | Segment
+     * 0     | NULL descr
+     * 1     | Code segment descr
+     * 2     | Data segment descr
+     * 3     | Call gate descr
+     */
+    gate_descr = (idt_entry_t *) ((u8 *)(&gdt32 - &sipi_entry)
+                + 3 * sizeof(gdt_entry_t));
+    set_idt_entry_t(gate_descr, sizeof(gdt_entry_t), (void *) &ap_start32,
+        0x8 /* sel */, 0xc /* type */, 0 /* dpl */);
+#endif
+
     /* INIT */
     apic_icr_write(APIC_DEST_ALLBUT | APIC_DEST_PHYSICAL | APIC_DM_INIT | APIC_INT_ASSERT, 0);
 
diff --git a/x86/efi/efistart64.S b/x86/efi/efistart64.S
index ea3d1c0..9a0cf98 100644
--- a/x86/efi/efistart64.S
+++ b/x86/efi/efistart64.S
@@ -57,7 +57,34 @@ load_gdt_tss:
 
 .globl sipi_entry
 sipi_entry:
-	jmp sipi_entry
+	mov %cr0, %eax
+	or $1, %eax
+	mov %eax, %cr0
+
+	/* Retrieve relocated gdt32_descr address at (PAGE_SIZE - 2). */
+	mov (PAGE_SIZE - 2), %ebx
+	lgdtl (%ebx)
+
+	lcall $0x18, $0x0
+
+.globl gdt32
+gdt32:
+	.quad 0
+	.quad 0x00cf9b000000ffff // flat 32-bit code segment
+	.quad 0x00cf93000000ffff // flat 32-bit data segment
+	.quad 0                  // call gate to 32-bit AP entrypoint
+.globl gdt32_end
+gdt32_end:
+
+.globl gdt32_descr
+gdt32_descr:
+	.word 0
+	.long 0
 
 .globl sipi_end
 sipi_end:
+
+.code32
+.globl ap_start32
+ap_start32:
+	jmp ap_start32
-- 
2.32.0


^ permalink raw reply related	[flat|nested] 12+ messages in thread

* [kvm-unit-tests PATCH 5/9] x86: Move 32-bit bringup routines to start32.S
  2022-04-08 10:31 [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests Varad Gautam
                   ` (3 preceding siblings ...)
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 4/9] x86: efi, smp: Transition APs from 16-bit to 32-bit mode Varad Gautam
@ 2022-04-08 10:31 ` Varad Gautam
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 6/9] x86: efi, smp: Transition APs from 32-bit to 64-bit mode Varad Gautam
                   ` (4 subsequent siblings)
  9 siblings, 0 replies; 12+ messages in thread
From: Varad Gautam @ 2022-04-08 10:31 UTC (permalink / raw)
  To: kvm
  Cc: pbonzini, drjones, marcorr, zxwang42, erdemaktas, rientjes,
	seanjc, brijesh.singh, Thomas.Lendacky, jroedel, bp, varad.gautam

These can be shared across EFI and non-EFI builds.

Signed-off-by: Varad Gautam <varad.gautam@suse.com>
---
 x86/cstart64.S | 60 +-----------------------------------------------
 x86/start32.S  | 62 ++++++++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 63 insertions(+), 59 deletions(-)
 create mode 100644 x86/start32.S

diff --git a/x86/cstart64.S b/x86/cstart64.S
index b867791..45009d4 100644
--- a/x86/cstart64.S
+++ b/x86/cstart64.S
@@ -59,35 +59,13 @@ mb_flags = 0x0
 	.long mb_magic, mb_flags, 0 - (mb_magic + mb_flags)
 mb_cmdline = 16
 
-MSR_GS_BASE = 0xc0000101
-
-.macro setup_percpu_area
-	lea -4096(%esp), %eax
-	mov $0, %edx
-	mov $MSR_GS_BASE, %ecx
-	wrmsr
-.endm
-
 .macro load_tss
 	movq %rsp, %rdi
 	call setup_tss
 	ltr %ax
 .endm
 
-.macro setup_segments
-	mov $MSR_GS_BASE, %ecx
-	rdmsr
-
-	mov $0x10, %bx
-	mov %bx, %ds
-	mov %bx, %es
-	mov %bx, %fs
-	mov %bx, %gs
-	mov %bx, %ss
-
-	/* restore MSR_GS_BASE */
-	wrmsr
-.endm
+#include "start32.S"
 
 .globl start
 start:
@@ -121,33 +99,6 @@ switch_to_5level:
 	call enter_long_mode
 	jmpl $8, $lvl5
 
-prepare_64:
-	lgdt gdt_descr
-	setup_segments
-
-	xor %eax, %eax
-	mov %eax, %cr4
-
-enter_long_mode:
-	mov %cr4, %eax
-	bts $5, %eax  // pae
-	mov %eax, %cr4
-
-	mov pt_root, %eax
-	mov %eax, %cr3
-
-efer = 0xc0000080
-	mov $efer, %ecx
-	rdmsr
-	bts $8, %eax
-	wrmsr
-
-	mov %cr0, %eax
-	bts $0, %eax
-	bts $31, %eax
-	mov %eax, %cr0
-	ret
-
 smp_stacktop:	.long stacktop - 4096
 
 .align 16
@@ -174,15 +125,6 @@ gdt32_descr:
 .globl sipi_end
 sipi_end:
 
-.code32
-ap_start32:
-	setup_segments
-	mov $-4096, %esp
-	lock xaddl %esp, smp_stacktop
-	setup_percpu_area
-	call prepare_64
-	ljmpl $8, $ap_start64
-
 .code64
 save_id:
 	movl $(APIC_DEFAULT_PHYS_BASE + APIC_ID), %eax
diff --git a/x86/start32.S b/x86/start32.S
new file mode 100644
index 0000000..9e00474
--- /dev/null
+++ b/x86/start32.S
@@ -0,0 +1,62 @@
+/* Common 32-bit code between EFI and non-EFI bootstrapping. */
+
+.code32
+
+MSR_GS_BASE = 0xc0000101
+
+.macro setup_percpu_area
+	lea -4096(%esp), %eax
+	mov $0, %edx
+	mov $MSR_GS_BASE, %ecx
+	wrmsr
+.endm
+
+.macro setup_segments
+	mov $MSR_GS_BASE, %ecx
+	rdmsr
+
+	mov $0x10, %bx
+	mov %bx, %ds
+	mov %bx, %es
+	mov %bx, %fs
+	mov %bx, %gs
+	mov %bx, %ss
+
+	/* restore MSR_GS_BASE */
+	wrmsr
+.endm
+
+prepare_64:
+	lgdt gdt_descr
+	setup_segments
+
+	xor %eax, %eax
+	mov %eax, %cr4
+
+enter_long_mode:
+	mov %cr4, %eax
+	bts $5, %eax  // pae
+	mov %eax, %cr4
+
+	mov pt_root, %eax
+	mov %eax, %cr3
+
+efer = 0xc0000080
+	mov $efer, %ecx
+	rdmsr
+	bts $8, %eax
+	wrmsr
+
+	mov %cr0, %eax
+	bts $0, %eax
+	bts $31, %eax
+	mov %eax, %cr0
+	ret
+
+ap_start32:
+	setup_segments
+	mov $-4096, %esp
+	lock xaddl %esp, smp_stacktop
+	setup_percpu_area
+	call prepare_64
+	ljmpl $8, $ap_start64
-- 
2.32.0


^ permalink raw reply related	[flat|nested] 12+ messages in thread

* [kvm-unit-tests PATCH 6/9] x86: efi, smp: Transition APs from 32-bit to 64-bit mode
  2022-04-08 10:31 [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests Varad Gautam
                   ` (4 preceding siblings ...)
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 5/9] x86: Move 32-bit bringup routines to start32.S Varad Gautam
@ 2022-04-08 10:31 ` Varad Gautam
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 7/9] x86: Move load_gdt_tss() to desc.c Varad Gautam
                   ` (3 subsequent siblings)
  9 siblings, 0 replies; 12+ messages in thread
From: Varad Gautam @ 2022-04-08 10:31 UTC (permalink / raw)
  To: kvm
  Cc: pbonzini, drjones, marcorr, zxwang42, erdemaktas, rientjes,
	seanjc, brijesh.singh, Thomas.Lendacky, jroedel, bp, varad.gautam

Reaching 64-bit mode requires setting up a valid stack and percpu
regions for each CPU and configuring a page table before far-jumping to
the 64-bit entrypoint.

This functionality is already present as prepare_64() and ap_start32()
routines in start32.S for non-EFI test builds.

However since EFI builds (-fPIC) cannot use absolute addressing, and
32-bit mode does not allow RIP-relative addressing, these routines need
some changes.

Modify prepare_64() and ap_start32() asm routines to calculate label
addresses during runtime on CONFIG_EFI. To ease the common case, replace
the far-jump to ap_start64() with a far-return.

Signed-off-by: Varad Gautam <varad.gautam@suse.com>
---
 lib/x86/setup.c           |  2 +-
 lib/x86/smp.c             |  4 ++++
 x86/efi/crt0-efi-x86_64.S |  3 +++
 x86/efi/efistart64.S      | 21 +++++++++++++++---
 x86/start32.S             | 46 ++++++++++++++++++++++++++++++++++++---
 5 files changed, 69 insertions(+), 7 deletions(-)

diff --git a/lib/x86/setup.c b/lib/x86/setup.c
index eab035f..3f3b1e2 100644
--- a/lib/x86/setup.c
+++ b/lib/x86/setup.c
@@ -321,11 +321,11 @@ efi_status_t setup_efi(efi_bootinfo_t *efi_bootinfo)
 	setup_idt();
 	load_idt();
 	mask_pic_interrupts();
+	setup_page_table();
 	enable_apic();
 	ap_init();
 	enable_x2apic();
 	smp_init();
-	setup_page_table();
 
 	return EFI_SUCCESS;
 }
diff --git a/lib/x86/smp.c b/lib/x86/smp.c
index 33251cb..4ddb459 100644
--- a/lib/x86/smp.c
+++ b/lib/x86/smp.c
@@ -152,6 +152,8 @@ void smp_reset_apic(void)
 #ifdef CONFIG_EFI
 extern u8 gdt32_descr, gdt32, gdt32_end;
 extern u8 ap_start32;
+extern u32 smp_stacktop;
+extern u8 stacktop;
 #endif
 
 void ap_init(void)
@@ -172,6 +174,8 @@ void ap_init(void)
     idt_entry_t *gate_descr;
     u16 *gdt32_descr_reladdr = (u16 *) (PAGE_SIZE - sizeof(u16));
 
+    smp_stacktop = ((u64) (&stacktop)) - 4096;
+
     /*
      * gdt32_descr for CONFIG_EFI needs to be filled here dynamically
      * since compile time calculation of offsets is not allowed when
diff --git a/x86/efi/crt0-efi-x86_64.S b/x86/efi/crt0-efi-x86_64.S
index eaf1656..1708ed5 100644
--- a/x86/efi/crt0-efi-x86_64.S
+++ b/x86/efi/crt0-efi-x86_64.S
@@ -58,6 +58,9 @@ _start:
 	popq %rdi
 	popq %rsi
 
+	/* Switch away from EFI stack. */
+	lea stacktop(%rip), %rsp
+
 	call efi_main
 	addq $8, %rsp
 
diff --git a/x86/efi/efistart64.S b/x86/efi/efistart64.S
index 9a0cf98..7e924dc 100644
--- a/x86/efi/efistart64.S
+++ b/x86/efi/efistart64.S
@@ -6,6 +6,17 @@
 
 .data
 
+max_cpus = MAX_TEST_CPUS
+
+/* Reserve stack in .data */
+	. = . + 4096 * max_cpus
+	.align 16
+.globl stacktop
+stacktop:
+
+.globl smp_stacktop
+smp_stacktop:	.long 0
+
 .align PAGE_SIZE
 .globl ptl2
 ptl2:
@@ -85,6 +96,10 @@ gdt32_descr:
 sipi_end:
 
 .code32
-.globl ap_start32
-ap_start32:
-	jmp ap_start32
+
+#include "../start32.S"
+
+.code64:
+
+ap_start64:
+	jmp ap_start64
diff --git a/x86/start32.S b/x86/start32.S
index 9e00474..2089be7 100644
--- a/x86/start32.S
+++ b/x86/start32.S
@@ -27,7 +27,16 @@ MSR_GS_BASE = 0xc0000101
 .endm
 
 prepare_64:
-	lgdt gdt_descr
+#ifdef CONFIG_EFI
+	call prepare_64_1
+prepare_64_1:
+	pop %edx
+	add $gdt_descr - prepare_64_1, %edx
+#else
+	mov $gdt_descr, %edx
+#endif
+	lgdtl (%edx)
+
 	setup_segments
 
 	xor %eax, %eax
@@ -38,7 +47,14 @@ enter_long_mode:
 	bts $5, %eax  // pae
 	mov %eax, %cr4
 
+#ifdef CONFIG_EFI
+	call prepare_64_2
+prepare_64_2:
+	pop %eax
+	add $ptl4 - prepare_64_2, %eax
+#else
 	mov pt_root, %eax
+#endif
 	mov %eax, %cr3
 
 efer = 0xc0000080
@@ -53,10 +69,34 @@ efer = 0xc0000080
 	mov %eax, %cr0
 	ret
 
+.globl ap_start32
 ap_start32:
 	setup_segments
+
+#ifdef CONFIG_EFI
+	call ap_start32_1
+ap_start32_1:
+	pop %edx
+	add $smp_stacktop - ap_start32_1, %edx
+#else
+	mov $smp_stacktop, %edx
+#endif
 	mov $-4096, %esp
-	lock xaddl %esp, smp_stacktop
+	lock xaddl %esp, (%edx)
+
 	setup_percpu_area
 	call prepare_64
-	ljmpl $8, $ap_start64
+
+#ifdef CONFIG_EFI
+	call ap_start32_2
+ap_start32_2:
+	pop %edx
+	add $ap_start64 - ap_start32_2, %edx
+#else
+	mov $ap_start64, %edx
+#endif
+
+	pushl $0x08
+	pushl %edx
+
+	lretl
-- 
2.32.0


^ permalink raw reply related	[flat|nested] 12+ messages in thread

* [kvm-unit-tests PATCH 7/9] x86: Move load_gdt_tss() to desc.c
  2022-04-08 10:31 [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests Varad Gautam
                   ` (5 preceding siblings ...)
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 6/9] x86: efi, smp: Transition APs from 32-bit to 64-bit mode Varad Gautam
@ 2022-04-08 10:31 ` Varad Gautam
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 8/9] x86: Provide a common 64-bit AP entrypoint for EFI and non-EFI Varad Gautam
                   ` (2 subsequent siblings)
  9 siblings, 0 replies; 12+ messages in thread
From: Varad Gautam @ 2022-04-08 10:31 UTC (permalink / raw)
  To: kvm
  Cc: pbonzini, drjones, marcorr, zxwang42, erdemaktas, rientjes,
	seanjc, brijesh.singh, Thomas.Lendacky, jroedel, bp, varad.gautam

Split load_gdt_tss() functionality into:
1. Load gdt/tss.
2. Setup segments in 64-bit mode.
3. Update cs segment via far-return.

and move load_gdt_tss() to desc.c to share this code between
EFI and non-EFI tests.

Signed-off-by: Varad Gautam <varad.gautam@suse.com>
---
 lib/x86/desc.c       |  6 ++++++
 lib/x86/desc.h       |  1 +
 lib/x86/setup.c      |  9 ++++++++-
 x86/efi/efistart64.S | 22 +++++++++++++---------
 4 files changed, 28 insertions(+), 10 deletions(-)

diff --git a/lib/x86/desc.c b/lib/x86/desc.c
index 713ad0b..d627a22 100644
--- a/lib/x86/desc.c
+++ b/lib/x86/desc.c
@@ -370,6 +370,12 @@ void set_gdt_entry(int sel, unsigned long base,  u32 limit, u8 type, u8 flags)
 #endif
 }
 
+void load_gdt_tss(size_t tss_offset)
+{
+	lgdt(&gdt_descr);
+	ltr(tss_offset);
+}
+
 #ifndef __x86_64__
 void set_gdt_task_gate(u16 sel, u16 tss_sel)
 {
diff --git a/lib/x86/desc.h b/lib/x86/desc.h
index 5eb21e4..30a0c90 100644
--- a/lib/x86/desc.h
+++ b/lib/x86/desc.h
@@ -222,6 +222,7 @@ void set_idt_entry(int vec, void *addr, int dpl);
 void set_idt_sel(int vec, u16 sel);
 void set_idt_dpl(int vec, u16 dpl);
 void set_gdt_entry(int sel, unsigned long base, u32 limit, u8 access, u8 gran);
+void load_gdt_tss(size_t tss_offset);
 void set_intr_alt_stack(int e, void *fn);
 void print_current_tss_info(void);
 handler handle_exception(u8 v, handler fn);
diff --git a/lib/x86/setup.c b/lib/x86/setup.c
index 3f3b1e2..e5a690a 100644
--- a/lib/x86/setup.c
+++ b/lib/x86/setup.c
@@ -170,7 +170,9 @@ void setup_multiboot(struct mbi_bootinfo *bi)
 #ifdef CONFIG_EFI
 
 /* From x86/efi/efistart64.S */
-extern void load_gdt_tss(size_t tss_offset);
+extern void update_cs(void);
+extern void setup_segments64(u64 gs_base);
+extern u8 stacktop;
 
 static efi_status_t setup_memory_allocator(efi_bootinfo_t *efi_bootinfo)
 {
@@ -271,10 +273,15 @@ static void setup_page_table(void)
 static void setup_gdt_tss(void)
 {
 	size_t tss_offset;
+	u64 gs_base;
 
 	/* 64-bit setup_tss does not use the stacktop argument.  */
 	tss_offset = setup_tss(NULL);
 	load_gdt_tss(tss_offset);
+
+	update_cs();
+	gs_base = (u64)(&stacktop) - (PAGE_SIZE * (apic_id() + 1));
+	setup_segments64(gs_base);
 }
 
 efi_status_t setup_efi(efi_bootinfo_t *efi_bootinfo)
diff --git a/x86/efi/efistart64.S b/x86/efi/efistart64.S
index 7e924dc..c8fd3a2 100644
--- a/x86/efi/efistart64.S
+++ b/x86/efi/efistart64.S
@@ -37,15 +37,8 @@ ptl4:
 .code64
 .text
 
-.globl load_gdt_tss
-load_gdt_tss:
-	/* Load GDT */
-	lgdt gdt_descr(%rip)
-
-	/* Load TSS */
-	mov %rdi, %rax
-	ltr %ax
-
+.globl setup_segments64
+setup_segments64:
 	/* Update data segments */
 	mov $0x10, %ax /* 3rd entry in gdt64: 32/64-bit data segment */
 	mov %ax, %ds
@@ -54,6 +47,17 @@ load_gdt_tss:
 	mov %ax, %gs
 	mov %ax, %ss
 
+	/* Setup percpu base */
+	MSR_GS_BASE = 0xc0000101
+	mov %rdi, %rax
+	mov $0, %edx
+	mov $MSR_GS_BASE, %ecx
+	wrmsr
+
+	ret
+
+.globl update_cs
+update_cs:
 	/*
 	 * Update the code segment by putting it on the stack before the return
 	 * address, then doing a far return: this will use the new code segment
-- 
2.32.0


^ permalink raw reply related	[flat|nested] 12+ messages in thread

* [kvm-unit-tests PATCH 8/9] x86: Provide a common 64-bit AP entrypoint for EFI and non-EFI
  2022-04-08 10:31 [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests Varad Gautam
                   ` (6 preceding siblings ...)
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 7/9] x86: Move load_gdt_tss() to desc.c Varad Gautam
@ 2022-04-08 10:31 ` Varad Gautam
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 9/9] x86: setup: Serialize ap_start64 with a spinlock Varad Gautam
  2022-04-08 14:35 ` [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests Sean Christopherson
  9 siblings, 0 replies; 12+ messages in thread
From: Varad Gautam @ 2022-04-08 10:31 UTC (permalink / raw)
  To: kvm
  Cc: pbonzini, drjones, marcorr, zxwang42, erdemaktas, rientjes,
	seanjc, brijesh.singh, Thomas.Lendacky, jroedel, bp, varad.gautam

ap_start64() currently serves as the 64-bit entrypoint for non-EFI
tests.

Having ap_start64() and save_id() written in asm prevents sharing these
routines between EFI and non-EFI tests.

Rewrite them in C and use ap_start64 as the 64-bit entrypoint in the EFI
boot flow.

With this, EFI tests support -smp > 1. smptest.efi now passes.

Signed-off-by: Varad Gautam <varad.gautam@suse.com>
---
 lib/x86/asm/setup.h  |  3 +++
 lib/x86/setup.c      | 57 +++++++++++++++++++++++++++++++++-----------
 lib/x86/smp.c        |  1 +
 x86/cstart64.S       | 30 -----------------------
 x86/efi/efistart64.S |  5 ----
 5 files changed, 47 insertions(+), 49 deletions(-)

diff --git a/lib/x86/asm/setup.h b/lib/x86/asm/setup.h
index 24d4fa9..8502e7d 100644
--- a/lib/x86/asm/setup.h
+++ b/lib/x86/asm/setup.h
@@ -16,4 +16,7 @@ efi_status_t setup_efi(efi_bootinfo_t *efi_bootinfo);
 void setup_5level_page_table(void);
 #endif /* CONFIG_EFI */
 
+void save_id(void);
+void ap_start64(void);
+
 #endif /* _X86_ASM_SETUP_H_ */
diff --git a/lib/x86/setup.c b/lib/x86/setup.c
index e5a690a..261fd9b 100644
--- a/lib/x86/setup.c
+++ b/lib/x86/setup.c
@@ -14,8 +14,12 @@
 #include "apic.h"
 #include "apic-defs.h"
 #include "asm/setup.h"
+#include "processor.h"
+#include "atomic.h"
 
 extern char edata;
+extern unsigned char online_cpus[(MAX_TEST_CPUS + 7) / 8];
+extern unsigned cpu_online_count;
 
 struct mbi_bootinfo {
 	u32 flags;
@@ -170,10 +174,27 @@ void setup_multiboot(struct mbi_bootinfo *bi)
 #ifdef CONFIG_EFI
 
 /* From x86/efi/efistart64.S */
+
 extern void update_cs(void);
 extern void setup_segments64(u64 gs_base);
 extern u8 stacktop;
+#endif
+
+static void setup_gdt_tss(void)
+{
+	size_t tss_offset;
+
+	/* 64-bit setup_tss does not use the stacktop argument.  */
+	tss_offset = setup_tss(NULL);
+	load_gdt_tss(tss_offset);
+#ifdef CONFIG_EFI
+	update_cs();
+	u64 gs_base = (u64)(&stacktop) - (PAGE_SIZE * (apic_id() + 1));
+	setup_segments64(gs_base);
+#endif
+}
 
+#ifdef CONFIG_EFI
 static efi_status_t setup_memory_allocator(efi_bootinfo_t *efi_bootinfo)
 {
 	int i;
@@ -270,20 +291,6 @@ static void setup_page_table(void)
 	write_cr3((ulong)&ptl4);
 }
 
-static void setup_gdt_tss(void)
-{
-	size_t tss_offset;
-	u64 gs_base;
-
-	/* 64-bit setup_tss does not use the stacktop argument.  */
-	tss_offset = setup_tss(NULL);
-	load_gdt_tss(tss_offset);
-
-	update_cs();
-	gs_base = (u64)(&stacktop) - (PAGE_SIZE * (apic_id() + 1));
-	setup_segments64(gs_base);
-}
-
 efi_status_t setup_efi(efi_bootinfo_t *efi_bootinfo)
 {
 	efi_status_t status;
@@ -330,6 +337,7 @@ efi_status_t setup_efi(efi_bootinfo_t *efi_bootinfo)
 	mask_pic_interrupts();
 	setup_page_table();
 	enable_apic();
+	save_id();
 	ap_init();
 	enable_x2apic();
 	smp_init();
@@ -352,3 +360,24 @@ void setup_libcflat(void)
 			add_setup_arg("bootloader");
 	}
 }
+
+void save_id(void)
+{
+	u32 id = apic_id();
+
+	/* atomic_fetch_or() emits `lock or %dl, (%eax)` */
+	atomic_fetch_or(&online_cpus[id / 8], (1 << (id % 8)));
+}
+
+void ap_start64(void)
+{
+	reset_apic();
+	load_idt();
+	setup_gdt_tss();
+	save_id();
+	enable_apic();
+	enable_x2apic();
+	sti();
+	atomic_fetch_inc(&cpu_online_count);
+	asm volatile("1: hlt; jmp 1b");
+}
diff --git a/lib/x86/smp.c b/lib/x86/smp.c
index 4ddb459..eec8d2b 100644
--- a/lib/x86/smp.c
+++ b/lib/x86/smp.c
@@ -22,6 +22,7 @@ static atomic_t active_cpus;
 extern u8 sipi_entry;
 extern u8 sipi_end;
 volatile unsigned cpu_online_count = 1;
+unsigned char online_cpus[(MAX_TEST_CPUS + 7) / 8];
 
 static __attribute__((used)) void ipi(void)
 {
diff --git a/x86/cstart64.S b/x86/cstart64.S
index 45009d4..e0d4ab5 100644
--- a/x86/cstart64.S
+++ b/x86/cstart64.S
@@ -126,33 +126,6 @@ gdt32_descr:
 sipi_end:
 
 .code64
-save_id:
-	movl $(APIC_DEFAULT_PHYS_BASE + APIC_ID), %eax
-	movl (%rax), %eax
-	shrl $24, %eax
-	lock btsl %eax, online_cpus
-	retq
-
-ap_start64:
-.retry:
-	xor %eax, %eax
-	lock btsl %eax, ap_lock
-	jc .retry
-	call reset_apic
-	call load_idt
-	load_tss
-	call enable_apic
-	call save_id
-	call enable_x2apic
-	sti
-	xor %eax, %eax
-	lock btr %eax, ap_lock
-	nop
-	lock incw cpu_online_count
-
-1:	hlt
-	jmp 1b
-
 start64:
 	call reset_apic
 	call load_idt
@@ -191,6 +164,3 @@ setup_5level_page_table:
 	lretq
 lvl5:
 	retq
-
-online_cpus:
-	.fill (max_cpus + 7) / 8, 1, 0
diff --git a/x86/efi/efistart64.S b/x86/efi/efistart64.S
index c8fd3a2..99a3802 100644
--- a/x86/efi/efistart64.S
+++ b/x86/efi/efistart64.S
@@ -102,8 +102,3 @@ sipi_end:
 .code32
 
 #include "../start32.S"
-
-.code64:
-
-ap_start64:
-	jmp ap_start64
-- 
2.32.0


^ permalink raw reply related	[flat|nested] 12+ messages in thread

* [kvm-unit-tests PATCH 9/9] x86: setup: Serialize ap_start64 with a spinlock
  2022-04-08 10:31 [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests Varad Gautam
                   ` (7 preceding siblings ...)
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 8/9] x86: Provide a common 64-bit AP entrypoint for EFI and non-EFI Varad Gautam
@ 2022-04-08 10:31 ` Varad Gautam
  2022-04-08 14:35 ` [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests Sean Christopherson
  9 siblings, 0 replies; 12+ messages in thread
From: Varad Gautam @ 2022-04-08 10:31 UTC (permalink / raw)
  To: kvm
  Cc: pbonzini, drjones, marcorr, zxwang42, erdemaktas, rientjes,
	seanjc, brijesh.singh, Thomas.Lendacky, jroedel, bp, varad.gautam

Since apic.c:apic_ops is not guarded against concurrent accesses,
there exists a race between reset_apic(), enable_apic() and
enable_x2apic() which results in APs crashing or getting blocked
in various scenarios (eg, enabling x2apic while disabling xapic).

The bug is rare with vcpu count < 32, but becomes easier to
reproduce with vcpus > 64 and the following thunk:

lib/x86/apic.c:
 void enable_apic(void)
 {
-    printf("enabling apic\n");
     xapic_write(APIC_SPIV, 0x1ff);
 }

Serialize the bringup code in ap_start64 to fix this.

Signed-off-by: Varad Gautam <varad.gautam@suse.com>
Link: https://lore.kernel.org/kvm/20220406124002.13741-1-varad.gautam@suse.com/
---
Note that this is a C port of 20220406124002.13741-1-varad.gautam@suse.com
which is not present upstream. I can squash it into the previous patch once
the asm version is upstream.

 lib/x86/setup.c | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/lib/x86/setup.c b/lib/x86/setup.c
index 261fd9b..b08290a 100644
--- a/lib/x86/setup.c
+++ b/lib/x86/setup.c
@@ -16,6 +16,9 @@
 #include "asm/setup.h"
 #include "processor.h"
 #include "atomic.h"
+#include "asm/spinlock.h"
+
+struct spinlock ap_lock;
 
 extern char edata;
 extern unsigned char online_cpus[(MAX_TEST_CPUS + 7) / 8];
@@ -371,12 +374,14 @@ void save_id(void)
 
 void ap_start64(void)
 {
+	spin_lock(&ap_lock);
 	reset_apic();
 	load_idt();
 	setup_gdt_tss();
 	save_id();
 	enable_apic();
 	enable_x2apic();
+	spin_unlock(&ap_lock);
 	sti();
 	atomic_fetch_inc(&cpu_online_count);
 	asm volatile("1: hlt; jmp 1b");
-- 
2.32.0


^ permalink raw reply related	[flat|nested] 12+ messages in thread

* Re: [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests
  2022-04-08 10:31 [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests Varad Gautam
                   ` (8 preceding siblings ...)
  2022-04-08 10:31 ` [kvm-unit-tests PATCH 9/9] x86: setup: Serialize ap_start64 with a spinlock Varad Gautam
@ 2022-04-08 14:35 ` Sean Christopherson
  2022-04-12 17:40   ` Varad Gautam
  9 siblings, 1 reply; 12+ messages in thread
From: Sean Christopherson @ 2022-04-08 14:35 UTC (permalink / raw)
  To: Varad Gautam
  Cc: kvm, pbonzini, drjones, marcorr, zxwang42, erdemaktas, rientjes,
	brijesh.singh, Thomas.Lendacky, jroedel, bp

On Fri, Apr 08, 2022, Varad Gautam wrote:
> This series brings multi-vcpu support to UEFI tests on x86.
> 
> Most of the necessary AP bringup code already exists within kvm-unit-tests'
> cstart64.S, and has now been either rewritten in C or moved to a common location
> to be shared between EFI and non-EFI test builds.
> 
> A call gate is used to transition from 16-bit to 32-bit mode, since EFI may
> not load the 32-bit entrypoint low enough to be reachable from the SIPI vector.
> 
> Git branch: https://github.com/varadgautam/kvm-unit-tests/commits/ap-boot-v1
> 
> Varad Gautam (9):
>   x86: Move ap_init() to smp.c
>   x86: Move load_idt() to desc.c
>   x86: desc: Split IDT entry setup into a generic helper
>   x86: efi, smp: Transition APs from 16-bit to 32-bit mode
>   x86: Move 32-bit bringup routines to start32.S
>   x86: efi, smp: Transition APs from 32-bit to 64-bit mode
>   x86: Move load_gdt_tss() to desc.c
>   x86: Provide a common 64-bit AP entrypoint for EFI and non-EFI
>   x86: setup: Serialize ap_start64 with a spinlock

This series doesn't apply cleanly on upstream master.  I feel bad for asking, but
in addition to rebasing to master, can you also rebase on top of my series[*] that
fixes SMP bugs that were introduced by the initial UEFI support?  I don't think
there will be semantic conflicts, but the whitespace cleanups (spaces => tabs) do
conflict, and I'd really like to start purging the spaces mess from KUT.

Paolo / Andrew, ping on my series, it still applies cleanly.

[*] https://lore.kernel.org/all/20220121231852.1439917-1-seanjc@google.com

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests
  2022-04-08 14:35 ` [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests Sean Christopherson
@ 2022-04-12 17:40   ` Varad Gautam
  0 siblings, 0 replies; 12+ messages in thread
From: Varad Gautam @ 2022-04-12 17:40 UTC (permalink / raw)
  To: Sean Christopherson
  Cc: kvm, pbonzini, drjones, marcorr, zxwang42, erdemaktas, rientjes,
	brijesh.singh, Thomas.Lendacky, jroedel, bp

Hi Sean,

On 4/8/22 4:35 PM, Sean Christopherson wrote:
> On Fri, Apr 08, 2022, Varad Gautam wrote:
>> This series brings multi-vcpu support to UEFI tests on x86.
>>
>> Most of the necessary AP bringup code already exists within kvm-unit-tests'
>> cstart64.S, and has now been either rewritten in C or moved to a common location
>> to be shared between EFI and non-EFI test builds.
>>
>> A call gate is used to transition from 16-bit to 32-bit mode, since EFI may
>> not load the 32-bit entrypoint low enough to be reachable from the SIPI vector.
>>
>> Git branch: https://github.com/varadgautam/kvm-unit-tests/commits/ap-boot-v1
>>
>> Varad Gautam (9):
>>   x86: Move ap_init() to smp.c
>>   x86: Move load_idt() to desc.c
>>   x86: desc: Split IDT entry setup into a generic helper
>>   x86: efi, smp: Transition APs from 16-bit to 32-bit mode
>>   x86: Move 32-bit bringup routines to start32.S
>>   x86: efi, smp: Transition APs from 32-bit to 64-bit mode
>>   x86: Move load_gdt_tss() to desc.c
>>   x86: Provide a common 64-bit AP entrypoint for EFI and non-EFI
>>   x86: setup: Serialize ap_start64 with a spinlock
> 
> This series doesn't apply cleanly on upstream master.  I feel bad for asking, but
> in addition to rebasing to master, can you also rebase on top of my series[*] that
> fixes SMP bugs that were introduced by the initial UEFI support?  I don't think
> there will be semantic conflicts, but the whitespace cleanups (spaces => tabs) do
> conflict, and I'd really like to start purging the spaces mess from KUT.
> 

I'd based the v1 on [1], which is no longer required after your apic_ops percpu
conversion series [2].

I've now based my series on yours and posted a v2 here [3].

[1] https://lore.kernel.org/kvm/20220406124002.13741-1-varad.gautam@suse.com/
[2] https://lore.kernel.org/all/20220121231852.1439917-1-seanjc@google.com/
[3] https://lore.kernel.org/kvm/20220412173407.13637-1-varad.gautam@suse.com/

> Paolo / Andrew, ping on my series, it still applies cleanly.
> 
> [*] https://lore.kernel.org/all/20220121231852.1439917-1-seanjc@google.com
> 


^ permalink raw reply	[flat|nested] 12+ messages in thread

end of thread, other threads:[~2022-04-12 17:39 UTC | newest]

Thread overview: 12+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-04-08 10:31 [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests Varad Gautam
2022-04-08 10:31 ` [kvm-unit-tests PATCH 1/9] x86: Move ap_init() to smp.c Varad Gautam
2022-04-08 10:31 ` [kvm-unit-tests PATCH 2/9] x86: Move load_idt() to desc.c Varad Gautam
2022-04-08 10:31 ` [kvm-unit-tests PATCH 3/9] x86: desc: Split IDT entry setup into a generic helper Varad Gautam
2022-04-08 10:31 ` [kvm-unit-tests PATCH 4/9] x86: efi, smp: Transition APs from 16-bit to 32-bit mode Varad Gautam
2022-04-08 10:31 ` [kvm-unit-tests PATCH 5/9] x86: Move 32-bit bringup routines to start32.S Varad Gautam
2022-04-08 10:31 ` [kvm-unit-tests PATCH 6/9] x86: efi, smp: Transition APs from 32-bit to 64-bit mode Varad Gautam
2022-04-08 10:31 ` [kvm-unit-tests PATCH 7/9] x86: Move load_gdt_tss() to desc.c Varad Gautam
2022-04-08 10:31 ` [kvm-unit-tests PATCH 8/9] x86: Provide a common 64-bit AP entrypoint for EFI and non-EFI Varad Gautam
2022-04-08 10:31 ` [kvm-unit-tests PATCH 9/9] x86: setup: Serialize ap_start64 with a spinlock Varad Gautam
2022-04-08 14:35 ` [kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests Sean Christopherson
2022-04-12 17:40   ` Varad Gautam

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox