Re: [PATCH RFC x86/nmi] Fix out-of-order nesting checks

From: Ingo Molnar
Date: Thu Oct 12 2023 - 02:37:36 EST



* Paul E. McKenney <paulmck@xxxxxxxxxx> wrote:

> The ->idt_seq and ->recv_jiffies variables added by commit 1a3ea611fc10
> ("x86/nmi: Accumulate NMI-progress evidence in exc_nmi()") place
> the exit-time check of the bottom bit of ->idt_seq after the
> this_cpu_dec_return() that re-enables NMI nesting. This can result in
> the following sequence of events on a given CPU in kernels built with
> CONFIG_NMI_CHECK_CPU=y:
>
> o An NMI arrives, and ->idt_seq is incremented to an odd number.
> In addition, nmi_state is set to NMI_EXECUTING==1.
>
> o The NMI is processed.
>
> o The this_cpu_dec_return(nmi_state) zeroes nmi_state and returns
> NMI_EXECUTING==1, thus opting out of the "goto nmi_restart".
>
> o Another NMI arrives and ->idt_seq is incremented to an even
> number, triggering the warning. But all is just fine, at least
> assuming we don't get so many closely spaced NMIs that the stack
> overflows or some such.
>
> Experience on the fleet indicates that the MTBF of this false positive
> is about 70 years. Or, for those who are not quite that patient, the
> MTBF appears to be about one per week per 4,000 systems.
>
> Fix this false-positive warning by moving the "nmi_restart" label before
> the initial ->idt_seq increment/check and moving the this_cpu_dec_return()
> to follow the final ->idt_seq increment/check. This way, all nested NMIs
> that get past the NMI_NOT_RUNNING check get a clean ->idt_seq slate.
> And if they don't get past that check, they will set nmi_state to
> NMI_LATCHED, which will cause the this_cpu_dec_return(nmi_state)
> to restart.

This looks like a sensible fix: the warning should obviously be atomic wrt.
the no-nesting region. I've applied your fix to tip:x86/irq, as it doesn't
seem urgent enough with a MTBF of 70 years to warrant tip:x86/urgent handling. ;-)

Thanks,

Ingo