]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
x86/boot: Ignore NMIs during very early boot
authorJun'ichi Nomura <junichi.nomura@nec.com>
Wed, 29 Nov 2023 20:44:49 +0000 (15:44 -0500)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 23 Feb 2024 07:42:02 +0000 (08:42 +0100)
[ Upstream commit 78a509fba9c9b1fcb77f95b7c6be30da3d24823a ]

When there are two racing NMIs on x86, the first NMI invokes NMI handler and
the 2nd NMI is latched until IRET is executed.

If panic on NMI and panic kexec are enabled, the first NMI triggers
panic and starts booting the next kernel via kexec. Note that the 2nd
NMI is still latched. During the early boot of the next kernel, once
an IRET is executed as a result of a page fault, then the 2nd NMI is
unlatched and invokes the NMI handler.

However, NMI handler is not set up at the early stage of boot, which
results in a boot failure.

Avoid such problems by setting up a NOP handler for early NMIs.

[ mingo: Refined the changelog. ]

Signed-off-by: Jun'ichi Nomura <junichi.nomura@nec.com>
Signed-off-by: Derek Barbosa <debarbos@redhat.com>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Cc: Kees Cook <keescook@chromium.org>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Paul E. McKenney <paulmck@kernel.org>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
arch/x86/boot/compressed/ident_map_64.c
arch/x86/boot/compressed/idt_64.c
arch/x86/boot/compressed/idt_handlers_64.S
arch/x86/boot/compressed/misc.h

index f4a2e6d373b29a283c95f242d7acdeb346022562..1e4eb3894ec4d62e6b05e4f2052f2c6e59b229a8 100644 (file)
@@ -367,3 +367,8 @@ void do_boot_page_fault(struct pt_regs *regs, unsigned long error_code)
         */
        add_identity_map(address, end);
 }
+
+void do_boot_nmi_trap(struct pt_regs *regs, unsigned long error_code)
+{
+       /* Empty handler to ignore NMI during early boot */
+}
index 804a502ee0d28bae40d754a00d282a5aa8ffeb51..eb30bb20c33b3de5ee9abe2de3b17d5010e864d3 100644 (file)
@@ -45,6 +45,7 @@ void load_stage2_idt(void)
        boot_idt_desc.address = (unsigned long)boot_idt;
 
        set_idt_entry(X86_TRAP_PF, boot_page_fault);
+       set_idt_entry(X86_TRAP_NMI, boot_nmi_trap);
 
 #ifdef CONFIG_AMD_MEM_ENCRYPT
        set_idt_entry(X86_TRAP_VC, boot_stage2_vc);
index 22890e199f5b44c7bc8f617f266e4364917c8efc..4d03c8562f637d2eb473f23d24e7dae61d730cb2 100644 (file)
@@ -70,6 +70,7 @@ SYM_FUNC_END(\name)
        .code64
 
 EXCEPTION_HANDLER      boot_page_fault do_boot_page_fault error_code=1
+EXCEPTION_HANDLER      boot_nmi_trap do_boot_nmi_trap error_code=0
 
 #ifdef CONFIG_AMD_MEM_ENCRYPT
 EXCEPTION_HANDLER      boot_stage1_vc do_vc_no_ghcb            error_code=1
index d9a631c5973c7f6423299baae66167579a8bdcff..0ccc327184831f4407fc20ee54bbb0b6306c46d7 100644 (file)
@@ -156,6 +156,7 @@ extern struct desc_ptr boot_idt_desc;
 
 /* IDT Entry Points */
 void boot_page_fault(void);
+void boot_nmi_trap(void);
 void boot_stage1_vc(void);
 void boot_stage2_vc(void);