Hello, While working on a fix for the rare-but-possible problem of reentrant NMIs and MCEs, I have discovered that it is sadly possible to generate fake NMIs and MCEs which will run the relevant handlers on the relevant stacks, without invoking any of the other CPU logic for these special interrupts. A fake NMI can be generated by a processor in PIC mode as opposed to Virtual wire mode, with a delivery of vector 2. This setup is certainly possible on a 64bit CPU, but I doubt there are many 64bit CPUs running with only PIC. A fake MCE is easy to generate. A mal-programmed IO-APIC, IOMMU or MSI/MSI-X entry which deliveres vector 0x18 is sufficient. The LAPIC will reject vectors 0 thru 0xf, but will deliver vectors 0x10 thru 0x1f, despite them being architecturally reserved for exceptions. The possibility of these fake interrupts (however unlikely) means that there is necessarily a race condition between receiving a fake interrupt and a genuine interrupt during which the handler cannot fixup the stack sufficiently to be able to safely get back out. If this race condition were to occur, the real interrupt will corrupt the exception frame of the fake interrupt, meaning that we cannot possibly resume the original context. This situation can be detected, but cannot be corrected, and the only course of action is to crash gracefully. The above problem made me wonder why we use separate stacks for NMIs and MCEs. I completely accept that the double fault handler should be on a separate stack, but as we guarentee never to return from it, these problems disappear. Is there any particular reason to have separate stacks for NMIs and MCEs, other than perhaps that it is good/common practice? I can''t think of any other reasons offhand. (I am not necessarily advocating that we combine NMIs and MCEs back into the regular Xen stack because, while it would remove the above race condition, it would make other aspects of the problem harder to solve.) -- Andrew Cooper - Dom0 Kernel Engineer, Citrix XenServer T: +44 (0)1223 225 900, http://www.citrix.com
At 21:06 +0000 on 21 Nov (1353532004), Andrew Cooper wrote:> Hello, > > While working on a fix for the rare-but-possible problem of reentrant > NMIs and MCEs, I have discovered that it is sadly possible to generate > fake NMIs and MCEs which will run the relevant handlers on the relevant > stacks, without invoking any of the other CPU logic for these special > interrupts. > > A fake NMI can be generated by a processor in PIC mode as opposed to > Virtual wire mode, with a delivery of vector 2. This setup is certainly > possible on a 64bit CPU, but I doubt there are many 64bit CPUs running > with only PIC. > > A fake MCE is easy to generate. A mal-programmed IO-APIC, IOMMU or > MSI/MSI-X entry which deliveres vector 0x18 is sufficient. The LAPIC > will reject vectors 0 thru 0xf, but will deliver vectors 0x10 thru 0x1f, > despite them being architecturally reserved for exceptions.You''re not suggesting these could be caused by guest activity?> The possibility of these fake interrupts (however unlikely) means that > there is necessarily a race condition between receiving a fake interrupt > and a genuine interrupt during which the handler cannot fixup the stack > sufficiently to be able to safely get back out. If this race condition > were to occur, the real interrupt will corrupt the exception frame of > the fake interrupt, meaning that we cannot possibly resume the original > context. This situation can be detected, but cannot be corrected, and > the only course of action is to crash gracefully.If once of these could only be casued by a bug in Xen, then I don''t think we need to handle it at all. If it''s trivial to detect it and crash cleanly, that would be nice.> The above problem made me wonder why we use separate stacks for NMIs and > MCEs. I completely accept that the double fault handler should be on a > separate stack, but as we guarentee never to return from it, these > problems disappear. > > Is there any particular reason to have separate stacks for NMIs and > MCEs, other than perhaps that it is good/common practice?It''s to avoid a race where we take an NMI or MCE after swicthhing to the user/guest stack but before SYSRET. Tim.
On 21/11/12 21:17, Tim Deegan wrote:> At 21:06 +0000 on 21 Nov (1353532004), Andrew Cooper wrote: >> Hello, >> >> While working on a fix for the rare-but-possible problem of reentrant >> NMIs and MCEs, I have discovered that it is sadly possible to generate >> fake NMIs and MCEs which will run the relevant handlers on the relevant >> stacks, without invoking any of the other CPU logic for these special >> interrupts. >> >> A fake NMI can be generated by a processor in PIC mode as opposed to >> Virtual wire mode, with a delivery of vector 2. This setup is certainly >> possible on a 64bit CPU, but I doubt there are many 64bit CPUs running >> with only PIC. >> >> A fake MCE is easy to generate. A mal-programmed IO-APIC, IOMMU or >> MSI/MSI-X entry which deliveres vector 0x18 is sufficient. The LAPIC >> will reject vectors 0 thru 0xf, but will deliver vectors 0x10 thru 0x1f, >> despite them being architecturally reserved for exceptions. > You''re not suggesting these could be caused by guest activity?No. This would be buggy hardware or buggy Xen. Perhaps I should have said "A fake MCE is easy to generate (if you are hacking Xen to try and deliberately make it happen)" (Although ''easy'' is just speculation based on the description of behaviour of the LAPIC in the Intel SDM Volume 3)> >> The possibility of these fake interrupts (however unlikely) means that >> there is necessarily a race condition between receiving a fake interrupt >> and a genuine interrupt during which the handler cannot fixup the stack >> sufficiently to be able to safely get back out. If this race condition >> were to occur, the real interrupt will corrupt the exception frame of >> the fake interrupt, meaning that we cannot possibly resume the original >> context. This situation can be detected, but cannot be corrected, and >> the only course of action is to crash gracefully. > If once of these could only be casued by a bug in Xen, then I don''t think > we need to handle it at all. If it''s trivial to detect it and crash > cleanly, that would be nice.With all the other gubbins in to work around the stack problem, it becomes two extra conditionals, so for all intents and purposes trivial.> >> The above problem made me wonder why we use separate stacks for NMIs and >> MCEs. I completely accept that the double fault handler should be on a >> separate stack, but as we guarentee never to return from it, these >> problems disappear. >> >> Is there any particular reason to have separate stacks for NMIs and >> MCEs, other than perhaps that it is good/common practice? > It''s to avoid a race where we take an NMI or MCE after swicthhing to the > user/guest stack but before SYSRET. > > Tim.Ah yes - I forgot to consider that case. Thanks, -- Andrew Cooper - Dom0 Kernel Engineer, Citrix XenServer T: +44 (0)1223 225 900, http://www.citrix.com
>>> On 21.11.12 at 22:17, Tim Deegan <tim@xen.org> wrote: > At 21:06 +0000 on 21 Nov (1353532004), Andrew Cooper wrote: >> Hello, >> >> While working on a fix for the rare-but-possible problem of reentrant >> NMIs and MCEs, I have discovered that it is sadly possible to generate >> fake NMIs and MCEs which will run the relevant handlers on the relevant >> stacks, without invoking any of the other CPU logic for these special >> interrupts. >> >> A fake NMI can be generated by a processor in PIC mode as opposed to >> Virtual wire mode, with a delivery of vector 2. This setup is certainly >> possible on a 64bit CPU, but I doubt there are many 64bit CPUs running >> with only PIC. >> >> A fake MCE is easy to generate. A mal-programmed IO-APIC, IOMMU or >> MSI/MSI-X entry which deliveres vector 0x18 is sufficient. The LAPIC >> will reject vectors 0 thru 0xf, but will deliver vectors 0x10 thru 0x1f, >> despite them being architecturally reserved for exceptions. > > You''re not suggesting these could be caused by guest activity? > >> The possibility of these fake interrupts (however unlikely) means that >> there is necessarily a race condition between receiving a fake interrupt >> and a genuine interrupt during which the handler cannot fixup the stack >> sufficiently to be able to safely get back out. If this race condition >> were to occur, the real interrupt will corrupt the exception frame of >> the fake interrupt, meaning that we cannot possibly resume the original >> context. This situation can be detected, but cannot be corrected, and >> the only course of action is to crash gracefully. > > If once of these could only be casued by a bug in Xen, then I don''t think > we need to handle it at all.Fully agree - the nesting we need to deal with cleanly is only what can result from proper operation. Buggy operation should not require any extra efforts, as long as it''s only hypothetical (i.e. if we knew a certain chipset/CPU could cause such, the need for a workaround would surely arise; bugs in Xen we should treat as such rather than trying to work around their effects).> If it''s trivial to detect it and crash cleanly, that would be nice.That shouldn''t be too difficult, as such interrupts would set ISR bits in either the PIC or the LAPIC. Jan
Seemingly Similar Threads
- [PATCH V5] x86/kexec: Change NMI and MCE handling on kexec path
- NMI SERR interrupts in dom0
- [PATCH V3] vmx/nmi: Do not use self_nmi() in VMEXIT handler
- bce kernel page faults and NMIs (was: Strange reboot since 9.1)
- [RFC PATCH 00/62] Linux as SEV-ES Guest Support