[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1329617173.1561.5.camel@acer.local.home>
Date: Sat, 18 Feb 2012 21:06:13 -0500
From: Steven Rostedt <rostedt@...dmis.org>
To: linux-kernel@...r.kernel.org
Cc: Ingo Molnar <mingo@...e.hu>,
Andrew Morton <akpm@...ux-foundation.org>,
"H. Peter Anvin" <hpa@...or.com>
Subject: [PATCH][GIT PULL][v3.3] x86: Test saved %rip in NMI to determine
nested NMI
Ingo,
I found that it is possible for userspace to prevent an NMI from
triggering while it is running by setting its stack pointer to that of
the NMI stack. This tricks the NMI nested algorithm in thinking that the
NMI is nested. The easy solution to this is to test the %rip to make
sure that the NMI happened in kernel mode before testing for nesting.
I've tested a program that exhibits the missing NMIs and this patch
corrects that behavior.
-- Steve
Please pull the latest tip/perf/urgent tree, which can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace.git
tip/perf/urgent
Head SHA1: b80ddc7b1636474297815d47fbfed7552f9b8f2c
Steven Rostedt (1):
x86: Test saved %rip in NMI to determine nested NMI
----
arch/x86/kernel/entry_64.S | 8 ++++++++
1 files changed, 8 insertions(+), 0 deletions(-)
---------------------------
commit b80ddc7b1636474297815d47fbfed7552f9b8f2c
Author: Steven Rostedt <srostedt@...hat.com>
Date: Sat Feb 18 20:26:52 2012 -0500
x86: Test saved %rip in NMI to determine nested NMI
Currently, the NMI handler tests if it is nested by checking the
special variable saved no the stack (set during NMI handling) and
whether the saved stack is the NMI stack as well (to prevent the race
when the variable is set to zero). But userspace may set their %rsp
to any value as long as the do not derefence it, and it may make it
point to the NMI stack, which will prevent NMIs from triggering while
the userspace app is running. (I tested this, and it is indeed the case)
Add another check to determine nested NMIs by looking at the saved
%rip and making sure that it is a kernel pointer (negative).
Cc: H. Peter Anvin <hpa@...or.com>
Signed-off-by: Steven Rostedt <rostedt@...dmis.org>
diff --git a/arch/x86/kernel/entry_64.S b/arch/x86/kernel/entry_64.S
index 3fe8239..7c35a7a 100644
--- a/arch/x86/kernel/entry_64.S
+++ b/arch/x86/kernel/entry_64.S
@@ -1532,6 +1532,14 @@ ENTRY(nmi)
pushq_cfi %rdx
/*
+ * If the RIP is not negative then we are in userspace where this is not
+ * a nested NMI.
+ */
+ movq 8(%rsp), %rdx
+ testq %rdx, %rdx
+ jns first_nmi
+
+ /*
* Check the special variable on the stack to see if NMIs are
* executing.
*/
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists