By default, faulting kernel instruction that generates #AC due to
split locked access is re-executed and doesn't block system.

But in cases when user doesn't tolerate any split lock (e.g. in hard real
time system), CONFIG_SPLIT_LOCK_AC_PANIC_ON_KERNEL is added to opt-in panic
when #AC for split lock is triggered from kernel.

If it's configured as N (default), faulting instruction in kernel mode
will be recorded in #AC handler and re-executed. Split lock is not
treated as fatal fault.

If configured as Y, kernel will panic if #AC triggered by split lock
is from a kernel instruction.

Signed-off-by: Fenghua Yu <[email protected]>
---
 arch/x86/Kconfig               | 13 +++++++++++++
 arch/x86/kernel/cpu/test_ctl.c | 15 +++++++++++++++
 2 files changed, 28 insertions(+)

diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
index 1d0dcd6fa69a..d42d90abd644 100644
--- a/arch/x86/Kconfig
+++ b/arch/x86/Kconfig
@@ -475,6 +475,19 @@ config SPLIT_LOCK_AC_ENABLE_DEFAULT
 
          Leave this to the default value of 2 if you are unsure.
 
+config SPLIT_LOCK_AC_PANIC_ON_KERNEL
+       bool "Panic on #AC for split lock in kernel mode"
+       default n
+       depends on SPLIT_LOCK_AC
+       help
+         If you enable this option, kernel goes to panic when hitting
+         #AC for split lock from kernel.
+
+         If you disable this option, the kernel faulting instruction
+         is re-executed after hitting #AC for split lock.
+
+         Say N if unsure.
+
 if X86_32
 config X86_BIGSMP
        bool "Support for big SMP systems with more than 8 CPUs"
diff --git a/arch/x86/kernel/cpu/test_ctl.c b/arch/x86/kernel/cpu/test_ctl.c
index e8b3032f3db0..6784f68af26a 100644
--- a/arch/x86/kernel/cpu/test_ctl.c
+++ b/arch/x86/kernel/cpu/test_ctl.c
@@ -43,6 +43,14 @@ struct debugfs_file {
        const struct file_operations    *fops;
 };
 
+enum {
+       KERNEL_MODE_RE_EXECUTE,
+       KERNEL_MODE_PANIC,
+       KERNEL_MODE_LAST
+};
+
+static int kernel_mode_reaction = KERNEL_MODE_RE_EXECUTE;
+
 /* Detete feature of #AC for split lock by probing bit 29 in MSR_TEST_CTL. */
 void detect_split_lock_ac(void)
 {
@@ -238,6 +246,10 @@ bool do_split_lock_exception(struct pt_regs *regs, 
unsigned long error_code)
        struct task_struct *tsk = current;
        int cpu = task_cpu(tsk);
 
+       /* If configured as panic for split lock in kernel mode, panic. */
+       if (kernel_mode_reaction == KERNEL_MODE_PANIC && !user_mode(regs))
+               panic("Alignment Check exception for split lock in kernel.");
+
        if (!re_execute(regs))
                return false;
 
@@ -391,6 +403,9 @@ static int __init split_lock_init(void)
        if (ret)
                pr_warn("debugfs for #AC for split lock cannot be set up\n");
 
+       if (IS_ENABLED(CONFIG_SPLIT_LOCK_AC_PANIC_ON_KERNEL))
+               kernel_mode_reaction = KERNEL_MODE_PANIC;
+
        ret = cpuhp_setup_state(CPUHP_AP_ONLINE_DYN, "x86/split_lock:online",
                                split_lock_online, split_lock_offline);
        if (ret < 0)
-- 
2.5.0

Reply via email to