lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <82c396c3-3f6d-759d-ba4b-38745b7f0884@intel.com>
Date:   Tue, 23 Aug 2022 09:11:54 -0700
From:   Dave Hansen <dave.hansen@...el.com>
To:     Ashok Raj <ashok.raj@...el.com>, Borislav Petkov <bp@...en8.de>,
        Thomas Gleixner <tglx@...utronix.de>
Cc:     LKML Mailing List <linux-kernel@...r.kernel.org>,
        Andy Lutomirski <luto@...capital.net>,
        Andrew Cooper <Andrew.Cooper3@...rix.com>,
        Tony Luck <tony.luck@...el.com>
Subject: Re: [PATCH v2 4/4] x86/microcode: Place siblings in NMI loop while
 update in progress

On 8/15/22 21:37, Ashok Raj wrote:
> Microcode updates need a guarantee that the thread sibling that is waiting
> for the update to finish on the primary core will not execute any
> instructions until the update is complete. This is required to guarantee
> any MSR or instruction that's being patched will be executed before the
> update is complete.

I don't think this is a great way to describe the problem.  Even in this
patch, the thread sibling is doing something far from "not executing any
instructions".

	Microcode updates affect the state of the running CPU.  In the
	case of hyperthreads, the thread initiating the update is in a
	known state (WRMSR), but its hyperthreads can be running around
	executing arbitrary instructions.

	If one of these arbitrary instructions is being patched by the
	update, <insert symptoms here>.  The existing code uses
	stop_machine() to keep userspace from running and puts the
	kernel in a relatively safe wait loop.  But, that loop can be
	still be interrupted by NMIs.

	The NMI code and NMI handlers can also execute relatively
	arbitrary instructions.

	== Solution ==

	Park sibling CPU threads in a newly-registered NMI handler while
	the primary CPU thread does the microcode update.

	This ensures that...  It removes the possibility for...


> After the stop_machine() rendezvous, an NMI handler is registered. If an
> NMI were to happen while the microcode update is not complete, the
> secondary thread will spin until the ucode update state is cleared.

This is a case where switching it imperative voice would make it a lot
more clear.

Also, maybe I'm blind or misreading this, but the code _looks_ to do
this, in this order:

> +	ret = register_nmi_handler(NMI_LOCAL, ucode_nmi_cb, NMI_FLAG_FIRST,
> +				   "ucode_nmi");
...
>  	ret = stop_machine_cpuslocked(__reload_late, NULL, cpu_online_mask);

It registers the NMI handler _before_ the stop_machine().

The description so far is (maybe) telling us what the code does.  But,
it doesn't say what the end result is.  *How* does this address the problem?

I _think_ all this ends up doing in the end is ensuring that arbitrary
NMI handlers don't run since it uses NMI_FLAG_FIRST.  I'm not completely
sure how it guarantees that it *is* first.

Also, for this to be bulletproof, what would have to be true?  I *think*
the entire NMI entry path and _this_ (new) handler has to be free of
instructions that could go bonkers during a microcode update.  How do we
know what those instructions *are*, btw?  Have you audited the NMI entry
path to make sure it is free of those instructions?  Is everything still
safe even with CONFIG_DEBUG_ENTRY in place where NMIs can be nested?

This is also the place in the changelog where you can discuss the
attributes of this solution.  It's all C code, for instance.  That is
both good (easy to code up and review) but, bad because the C compiler
might be doing fancy things that go amok during a ucode update.

For instance, you can discuss why this can safely ignore the primary
thread instead of calling it out as one of the "couple of choices".

> Couple of choices discussed are:
> 
> 1. Rendezvous inside the NMI handler, and also perform the update from
>    within the handler. This seemed too risky and might cause instability
>    with the races that we would need to solve. This would be a difficult
>    choice.
>    	1.a Since the primary thread of every core is performing a wrmsr
> 	for the update, once the wrmsr has started, it can't be
> 	interrupted. Hence its not required to NMI the primary thread of
> 	the core. Only the secondary thread needs to be parked in NMI
> 	before the update begins.
> 	Suggested by From Andy Cooper

What are the races that need to be solved?  What would make it unstable?

> 2. Thomas (tglx) suggested that we could look into masking all the LVT
>    originating NMI's. Such as LINT1, Perf control LVT entries and such.
>    Since we are in the rendezvous loop, we don't need to worry about any
>    NMI IPI's generated by the OS.
> 
>    The one we didn't have any control over is the ACPI mechanism of sending
>    notifications to kernel for Firmware First Processing (FFM). Apparently
>    it seems there is a PCH register that BIOS in SMI would write to
>    generate such an interrupt (ACPI GHES).
> 3. This is a simpler option. OS registers an NMI handler and doesn't do any
>    NMI rendezvous dance. But if an NMI were to happen, we check if any of
>    the CPUs thread siblings have an update in progress. Only those CPUs
>    would take an NMI. The thread performing the wrmsr() will only take an
>    NMI after the completion of the wrmsr 0x79 flow.
> 
>    [ Lutomirsky thinks this is weak, and what happens from taking the
>    interrupt and the path to the registered callback handler might be
>    exposed.]
> 
>    Seems like 1.a is the best candidate.
> 
> The algorithm is something like this:
> 
> After stop_machine() all threads are executing __reload_late()
> 
> nmi_callback()
> {
> 	if (!in_ucode_update)
> 		return NMI_DONE;

I'm not sure 'in_ucode_update' is even needed.  It seems redundant with
the sibling_mask, especially since this callback is not even registered
until after 'in_ucode_update=1'.

>  static atomic_t late_cpus_in;
>  static atomic_t late_cpus_out;
> +static atomic_t nmi_cpus;	// number of CPUs that enter NMI
> +static atomic_t nmi_timeouts;   // number of siblings that timeout
> +static atomic_t nmi_siblings;   // Nmber of siblings that enter NMI
> +static atomic_t in_ucode_update;// Are we in microcode update?
> +
> +static struct cpumask all_sibling_mask;

I haven't gone through this in detail.  But, this is a *LOT* of state
and my gut feeling is that there is some major simplification that can
be done here.  I don't doubt that this works, but I do doubt that this
is as simple and straightforward as we can make it.

I don't get, for instance, why you care about rendez->callin.  Why does
it matter if a CPU is in the NMI handler loop versus being in the
stop_machine() handler?  With nested NMIs, you need to handle being
anywhere in the NMI entry code, and you can end up in there from either
the stop_machine() hander *OR* the new NMI handler.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ