The first few generations of TDX hardware have an erratum. Triggering
it in Linux requires some kind of kernel bug involving relatively exotic
memory writes to TDX private memory and will manifest via
spurious-looking machine checks when reading the affected memory.
== Background ==
Virtually all kernel memory accesses operations happen in full
cachelines. In practice, writing a "byte" of memory usually reads a 64
byte cacheline of memory, modifies it, then writes the whole line back.
Those operations do not trigger this problem.
This problem is triggered by "partial" writes where a write transaction
of less than cacheline lands at the memory controller. The CPU does
these via non-temporal write instructions (like MOVNTI), or through
UC/WC memory mappings. The issue can also be triggered away from the
CPU by devices doing partial writes via DMA.
== Problem ==
A partial write to a TDX private memory cacheline will silently "poison"
the line. Subsequent reads will consume the poison and generate a
machine check. According to the TDX hardware spec, neither of these
things should have happened.
To add insult to injury, the Linux machine code will present these as a
literal "Hardware error" when they were, in fact, a software-triggered
issue.
== Solution ==
In the end, this issue is hard to trigger. Rather than do something
rash (and incomplete) like unmap TDX private memory from the direct map,
improve the machine check handler.
Currently, the #MC handler doesn't distinguish whether the memory is
TDX private memory or not but just dump, for instance, below message:
[...] mce: [Hardware Error]: CPU 147: Machine Check Exception: f Bank 1: bd80000000100134
[...] mce: [Hardware Error]: RIP 10:<ffffffffadb69870> {__tlb_remove_page_size+0x10/0xa0}
...
[...] mce: [Hardware Error]: Run the above through 'mcelog --ascii'
[...] mce: [Hardware Error]: Machine check: Data load in unrecoverable area of kernel
[...] Kernel panic - not syncing: Fatal local machine check
Which says "Hardware Error" and "Data load in unrecoverable area of
kernel".
Ideally, it's better for the log to say "software bug around TDX private
memory" instead of "Hardware Error". But in reality the real hardware
memory error can happen, and sadly such software-triggered #MC cannot be
distinguished from the real hardware error. Also, the error message is
used by userspace tool 'mcelog' to parse, so changing the output may
break userspace.
So keep the "Hardware Error". The "Data load in unrecoverable area of
kernel" is also helpful, so keep it too.
Instead of modifying above error log, improve the error log by printing
additional TDX related message to make the log like:
...
[...] mce: [Hardware Error]: Machine check: Data load in unrecoverable area of kernel
[...] mce: [Hardware Error]: Machine Check: Memory error from TDX private memory. May be result of CPU erratum.
Adding this additional message requires determination of whether the
memory page is TDX private memory. There is no existing infrastructure
to do that. Add an interface to query the TDX module to fill this gap.
== Impact ==
This issue requires some kind of kernel bug to trigger.
TDX private memory should never be mapped UC/WC. A partial write
originating from these mappings would require *two* bugs, first mapping
the wrong page, then writing the wrong memory. It would also be
detectable using traditional memory corruption techniques like
DEBUG_PAGEALLOC.
MOVNTI (and friends) could cause this issue with something like a simple
buffer overrun or use-after-free on the direct map. It should also be
detectable with normal debug techniques.
The one place where this might get nasty would be if the CPU read data
then wrote back the same data. That would trigger this problem but
would not, for instance, set off mechanisms like slab redzoning because
it doesn't actually corrupt data.
With an IOMMU at least, the DMA exposure is similar to the UC/WC issue.
TDX private memory would first need to be incorrectly mapped into the
I/O space and then a later DMA to that mapping would actually cause the
poisoning event.
Signed-off-by: Kai Huang <[email protected]>
---
v10 -> v11:
- New patch
---
arch/x86/include/asm/tdx.h | 2 +
arch/x86/kernel/cpu/mce/core.c | 33 +++++++++++
arch/x86/virt/vmx/tdx/tdx.c | 100 +++++++++++++++++++++++++++++++++
arch/x86/virt/vmx/tdx/tdx.h | 6 ++
4 files changed, 141 insertions(+)
diff --git a/arch/x86/include/asm/tdx.h b/arch/x86/include/asm/tdx.h
index 03f74851608f..a20d9ca99e31 100644
--- a/arch/x86/include/asm/tdx.h
+++ b/arch/x86/include/asm/tdx.h
@@ -104,10 +104,12 @@ static inline long tdx_kvm_hypercall(unsigned int nr, unsigned long p1,
bool platform_tdx_enabled(void);
int tdx_cpu_enable(void);
int tdx_enable(void);
+bool tdx_is_private_mem(unsigned long phys);
#else /* !CONFIG_INTEL_TDX_HOST */
static inline bool platform_tdx_enabled(void) { return false; }
static inline int tdx_cpu_enable(void) { return -ENODEV; }
static inline int tdx_enable(void) { return -ENODEV; }
+static inline bool tdx_is_private_mem(unsigned long phys) { return false; }
#endif /* CONFIG_INTEL_TDX_HOST */
#endif /* !__ASSEMBLY__ */
diff --git a/arch/x86/kernel/cpu/mce/core.c b/arch/x86/kernel/cpu/mce/core.c
index 2eec60f50057..5ad7b563632f 100644
--- a/arch/x86/kernel/cpu/mce/core.c
+++ b/arch/x86/kernel/cpu/mce/core.c
@@ -52,6 +52,7 @@
#include <asm/mce.h>
#include <asm/msr.h>
#include <asm/reboot.h>
+#include <asm/tdx.h>
#include "internal.h"
@@ -228,11 +229,34 @@ static void wait_for_panic(void)
panic("Panicing machine check CPU died");
}
+static const char *mce_memory_info(struct mce *m)
+{
+ if (!m || !mce_is_memory_error(m) || !mce_usable_address(m))
+ return NULL;
+
+ /*
+ * Certain initial generations of TDX-capable CPUs have an
+ * erratum. A kernel non-temporal partial write to TDX private
+ * memory poisons that memory, and a subsequent read of that
+ * memory triggers #MC.
+ *
+ * However such #MC caused by software cannot be distinguished
+ * from the real hardware #MC. Just print additional message
+ * to show such #MC may be result of the CPU erratum.
+ */
+ if (!boot_cpu_has_bug(X86_BUG_TDX_PW_MCE))
+ return NULL;
+
+ return !tdx_is_private_mem(m->addr) ? NULL :
+ "Memory error from TDX private memory. May be result of CPU erratum.";
+}
+
static noinstr void mce_panic(const char *msg, struct mce *final, char *exp)
{
struct llist_node *pending;
struct mce_evt_llist *l;
int apei_err = 0;
+ const char *memmsg;
/*
* Allow instrumentation around external facilities usage. Not that it
@@ -283,6 +307,15 @@ static noinstr void mce_panic(const char *msg, struct mce *final, char *exp)
}
if (exp)
pr_emerg(HW_ERR "Machine check: %s\n", exp);
+ /*
+ * Confidential computing platforms such as TDX platforms
+ * may occur MCE due to incorrect access to confidential
+ * memory. Print additional information for such error.
+ */
+ memmsg = mce_memory_info(final);
+ if (memmsg)
+ pr_emerg(HW_ERR "Machine check: %s\n", memmsg);
+
if (!fake_panic) {
if (panic_timeout == 0)
panic_timeout = mca_cfg.panic_timeout;
diff --git a/arch/x86/virt/vmx/tdx/tdx.c b/arch/x86/virt/vmx/tdx/tdx.c
index 0aa413b712e8..4aa41352edfc 100644
--- a/arch/x86/virt/vmx/tdx/tdx.c
+++ b/arch/x86/virt/vmx/tdx/tdx.c
@@ -1250,6 +1250,106 @@ int tdx_enable(void)
}
EXPORT_SYMBOL_GPL(tdx_enable);
+static bool is_pamt_page(unsigned long phys)
+{
+ struct tdmr_info_list *tdmr_list = &tdx_tdmr_list;
+ unsigned long pfn;
+ int i;
+
+ /*
+ * This function is called from #MC handler, and theoretically
+ * it could run in parallel with the TDX module initialization
+ * on other logical cpus. But it's not OK to hold mutex here
+ * so just blindly check module status. This should work most
+ * of the time.
+ */
+ if (tdx_module_status != TDX_MODULE_INITIALIZED)
+ return false;
+
+ pfn = phys >> PAGE_SHIFT;
+ for (i = 0; i < tdmr_list->nr_consumed_tdmrs; i++) {
+ unsigned long pamt_pfn, npages;
+
+ tdmr_get_pamt(tdmr_entry(tdmr_list, i), &pamt_pfn, &npages);
+
+ if (pfn >= pamt_pfn && pfn < (pamt_pfn + npages))
+ return true;
+ }
+
+ return false;
+}
+
+/*
+ * Return whether the memory page at the given physical address is
+ * TDX private memory or not. This function is called from #MC
+ * handler do_machine_check() with IRQ disabled.
+ *
+ * Note this function may not return accurate result in rare cases, but
+ * this is fine as the #MC handler doesn't need a 100% accurate result
+ * because it cannot distinguish #MC between software bug and real
+ * hardware error anyway.
+ */
+bool tdx_is_private_mem(unsigned long phys)
+{
+ struct tdx_module_output out;
+ u64 sret;
+
+ if (!platform_tdx_enabled())
+ return false;
+
+ /* Get page type via TDH.PHYMEM.PAGE.RDMD SEAMCALL. */
+ sret = __seamcall(TDH_PHYMEM_PAGE_RDMD, phys & PAGE_MASK,
+ 0, 0, 0, &out);
+ /*
+ * Handle the case that CPU isn't in VMX operation.
+ *
+ * KVM guarantees no VM is running (thus no TDX guest)
+ * when there's any online CPU isn't in VMX operation.
+ * This means there will be no TDX guest private memory
+ * and Secure-EPT pages. However the TDX module may have
+ * been initialized and the memory page could be PAMT.
+ */
+ if (sret == TDX_SEAMCALL_UD)
+ return is_pamt_page(phys);
+
+ /*
+ * Any other failure means:
+ *
+ * 1) TDX module not loaded; or
+ * 2) Memory page isn't managed by the TDX module.
+ *
+ * In either case, the memory page cannot be a TDX
+ * private page.
+ */
+ if (sret)
+ return false;
+
+ /*
+ * SEAMCALL was successful -- read page type (via RCX):
+ *
+ * - PT_NDA: Page is not used by the TDX module
+ * - PT_RSVD: Reserved for Non-TDX use
+ * - Others: Page is used by the TDX module
+ *
+ * Note PAMT pages are marked as PT_RSVD but they are also TDX
+ * private memory.
+ *
+ * Note: Even page type is PT_NDA, the memory page could still
+ * be associated with TDX private KeyID if the kernel hasn't
+ * explicitly used MOVDIR64B to clear the page. Assume KVM
+ * always does that after reclaiming any private page from TDX
+ * gusets.
+ */
+ switch (out.rcx) {
+ case PT_NDA:
+ return false;
+ case PT_RSVD:
+ return is_pamt_page(phys);
+ default:
+ return true;
+ }
+}
+
static int __init record_keyid_partitioning(u32 *tdx_keyid_start,
u32 *nr_tdx_keyids)
{
diff --git a/arch/x86/virt/vmx/tdx/tdx.h b/arch/x86/virt/vmx/tdx/tdx.h
index 012153067440..93fbef634ac9 100644
--- a/arch/x86/virt/vmx/tdx/tdx.h
+++ b/arch/x86/virt/vmx/tdx/tdx.h
@@ -28,6 +28,12 @@
#define TDH_SYS_KEY_CONFIG 31
#define TDH_SYS_TDMR_INIT 36
+#define TDH_PHYMEM_PAGE_RDMD 24
+
+/* TDX page types */
+#define PT_NDA 0x0
+#define PT_RSVD 0x1
+
struct cmr_info {
u64 base;
u64 size;
--
2.40.1
On 6/4/2023 10:27 PM, Kai Huang wrote:
> == Problem ==
>
> A partial write to a TDX private memory cacheline will silently "poison"
> the line. Subsequent reads will consume the poison and generate a
> machine check. According to the TDX hardware spec, neither of these
> things should have happened.
The expectation is that write to TDX private memory with HKID 0 doesn't
poison the cache line. However, a partial write with HKID 0 does poison
the cache line. This is the erratum, right?
> To add insult to injury, the Linux machine code will present these as a
> literal "Hardware error" when they were, in fact, a software-triggered
> issue.
On Mon, 2023-06-05 at 10:13 +0800, Li, Xiaoyao wrote:
> On 6/4/2023 10:27 PM, Kai Huang wrote:
> > == Problem ==
> >
> > A partial write to a TDX private memory cacheline will silently "poison"
> > the line. Subsequent reads will consume the poison and generate a
> > machine check. According to the TDX hardware spec, neither of these
> > things should have happened.
>
> The expectation is that write to TDX private memory with HKID 0 doesn't
> poison the cache line. However, a partial write with HKID 0 does poison
> the cache line. This is the erratum, right?
>
Yes.
On Mon, Jun 05, 2023 at 02:27:32AM +1200, Kai Huang wrote:
> The first few generations of TDX hardware have an erratum. Triggering
> it in Linux requires some kind of kernel bug involving relatively exotic
> memory writes to TDX private memory and will manifest via
> spurious-looking machine checks when reading the affected memory.
>
> == Background ==
>
> Virtually all kernel memory accesses operations happen in full
> cachelines. In practice, writing a "byte" of memory usually reads a 64
> byte cacheline of memory, modifies it, then writes the whole line back.
> Those operations do not trigger this problem.
>
> This problem is triggered by "partial" writes where a write transaction
> of less than cacheline lands at the memory controller. The CPU does
> these via non-temporal write instructions (like MOVNTI), or through
> UC/WC memory mappings. The issue can also be triggered away from the
> CPU by devices doing partial writes via DMA.
>
> == Problem ==
>
> A partial write to a TDX private memory cacheline will silently "poison"
> the line. Subsequent reads will consume the poison and generate a
> machine check. According to the TDX hardware spec, neither of these
> things should have happened.
>
> To add insult to injury, the Linux machine code will present these as a
> literal "Hardware error" when they were, in fact, a software-triggered
> issue.
>
> == Solution ==
>
> In the end, this issue is hard to trigger. Rather than do something
> rash (and incomplete) like unmap TDX private memory from the direct map,
> improve the machine check handler.
>
> Currently, the #MC handler doesn't distinguish whether the memory is
> TDX private memory or not but just dump, for instance, below message:
>
> [...] mce: [Hardware Error]: CPU 147: Machine Check Exception: f Bank 1: bd80000000100134
> [...] mce: [Hardware Error]: RIP 10:<ffffffffadb69870> {__tlb_remove_page_size+0x10/0xa0}
> ...
> [...] mce: [Hardware Error]: Run the above through 'mcelog --ascii'
> [...] mce: [Hardware Error]: Machine check: Data load in unrecoverable area of kernel
> [...] Kernel panic - not syncing: Fatal local machine check
>
> Which says "Hardware Error" and "Data load in unrecoverable area of
> kernel".
>
> Ideally, it's better for the log to say "software bug around TDX private
> memory" instead of "Hardware Error". But in reality the real hardware
> memory error can happen, and sadly such software-triggered #MC cannot be
> distinguished from the real hardware error. Also, the error message is
> used by userspace tool 'mcelog' to parse, so changing the output may
> break userspace.
>
> So keep the "Hardware Error". The "Data load in unrecoverable area of
> kernel" is also helpful, so keep it too.
>
> Instead of modifying above error log, improve the error log by printing
> additional TDX related message to make the log like:
>
> ...
> [...] mce: [Hardware Error]: Machine check: Data load in unrecoverable area of kernel
> [...] mce: [Hardware Error]: Machine Check: Memory error from TDX private memory. May be result of CPU erratum.
The message mentions one part of issue -- CPU erratum -- but misses the
other required part -- kernel bug that makes kernel access the memory it
not suppose to.
--
Kiryl Shutsemau / Kirill A. Shutemov
On Fri, 2023-06-09 at 16:17 +0300, [email protected] wrote:
> On Mon, Jun 05, 2023 at 02:27:32AM +1200, Kai Huang wrote:
> > The first few generations of TDX hardware have an erratum. Triggering
> > it in Linux requires some kind of kernel bug involving relatively exotic
> > memory writes to TDX private memory and will manifest via
> > spurious-looking machine checks when reading the affected memory.
> >
> > == Background ==
> >
> > Virtually all kernel memory accesses operations happen in full
> > cachelines. In practice, writing a "byte" of memory usually reads a 64
> > byte cacheline of memory, modifies it, then writes the whole line back.
> > Those operations do not trigger this problem.
> >
> > This problem is triggered by "partial" writes where a write transaction
> > of less than cacheline lands at the memory controller. The CPU does
> > these via non-temporal write instructions (like MOVNTI), or through
> > UC/WC memory mappings. The issue can also be triggered away from the
> > CPU by devices doing partial writes via DMA.
> >
> > == Problem ==
> >
> > A partial write to a TDX private memory cacheline will silently "poison"
> > the line. Subsequent reads will consume the poison and generate a
> > machine check. According to the TDX hardware spec, neither of these
> > things should have happened.
> >
> > To add insult to injury, the Linux machine code will present these as a
> > literal "Hardware error" when they were, in fact, a software-triggered
> > issue.
> >
> > == Solution ==
> >
> > In the end, this issue is hard to trigger. Rather than do something
> > rash (and incomplete) like unmap TDX private memory from the direct map,
> > improve the machine check handler.
> >
> > Currently, the #MC handler doesn't distinguish whether the memory is
> > TDX private memory or not but just dump, for instance, below message:
> >
> > [...] mce: [Hardware Error]: CPU 147: Machine Check Exception: f Bank 1: bd80000000100134
> > [...] mce: [Hardware Error]: RIP 10:<ffffffffadb69870> {__tlb_remove_page_size+0x10/0xa0}
> > ...
> > [...] mce: [Hardware Error]: Run the above through 'mcelog --ascii'
> > [...] mce: [Hardware Error]: Machine check: Data load in unrecoverable area of kernel
> > [...] Kernel panic - not syncing: Fatal local machine check
> >
> > Which says "Hardware Error" and "Data load in unrecoverable area of
> > kernel".
> >
> > Ideally, it's better for the log to say "software bug around TDX private
> > memory" instead of "Hardware Error". But in reality the real hardware
> > memory error can happen, and sadly such software-triggered #MC cannot be
> > distinguished from the real hardware error. Also, the error message is
> > used by userspace tool 'mcelog' to parse, so changing the output may
> > break userspace.
> >
> > So keep the "Hardware Error". The "Data load in unrecoverable area of
> > kernel" is also helpful, so keep it too.
> >
> > Instead of modifying above error log, improve the error log by printing
> > additional TDX related message to make the log like:
> >
> > ...
> > [...] mce: [Hardware Error]: Machine check: Data load in unrecoverable area of kernel
> > [...] mce: [Hardware Error]: Machine Check: Memory error from TDX private memory. May be result of CPU erratum.
>
> The message mentions one part of issue -- CPU erratum -- but misses the
> other required part -- kernel bug that makes kernel access the memory it
> not suppose to.
>
How about below?
"Memory error from TDX private memory. May be result of CPU erratum caused by
kernel bug."
On Mon, Jun 12, 2023 at 03:08:40AM +0000, Huang, Kai wrote:
> On Fri, 2023-06-09 at 16:17 +0300, [email protected] wrote:
> > On Mon, Jun 05, 2023 at 02:27:32AM +1200, Kai Huang wrote:
> > > The first few generations of TDX hardware have an erratum. Triggering
> > > it in Linux requires some kind of kernel bug involving relatively exotic
> > > memory writes to TDX private memory and will manifest via
> > > spurious-looking machine checks when reading the affected memory.
> > >
> > > == Background ==
> > >
> > > Virtually all kernel memory accesses operations happen in full
> > > cachelines. In practice, writing a "byte" of memory usually reads a 64
> > > byte cacheline of memory, modifies it, then writes the whole line back.
> > > Those operations do not trigger this problem.
> > >
> > > This problem is triggered by "partial" writes where a write transaction
> > > of less than cacheline lands at the memory controller. The CPU does
> > > these via non-temporal write instructions (like MOVNTI), or through
> > > UC/WC memory mappings. The issue can also be triggered away from the
> > > CPU by devices doing partial writes via DMA.
> > >
> > > == Problem ==
> > >
> > > A partial write to a TDX private memory cacheline will silently "poison"
> > > the line. Subsequent reads will consume the poison and generate a
> > > machine check. According to the TDX hardware spec, neither of these
> > > things should have happened.
> > >
> > > To add insult to injury, the Linux machine code will present these as a
> > > literal "Hardware error" when they were, in fact, a software-triggered
> > > issue.
> > >
> > > == Solution ==
> > >
> > > In the end, this issue is hard to trigger. Rather than do something
> > > rash (and incomplete) like unmap TDX private memory from the direct map,
> > > improve the machine check handler.
> > >
> > > Currently, the #MC handler doesn't distinguish whether the memory is
> > > TDX private memory or not but just dump, for instance, below message:
> > >
> > > [...] mce: [Hardware Error]: CPU 147: Machine Check Exception: f Bank 1: bd80000000100134
> > > [...] mce: [Hardware Error]: RIP 10:<ffffffffadb69870> {__tlb_remove_page_size+0x10/0xa0}
> > > ...
> > > [...] mce: [Hardware Error]: Run the above through 'mcelog --ascii'
> > > [...] mce: [Hardware Error]: Machine check: Data load in unrecoverable area of kernel
> > > [...] Kernel panic - not syncing: Fatal local machine check
> > >
> > > Which says "Hardware Error" and "Data load in unrecoverable area of
> > > kernel".
> > >
> > > Ideally, it's better for the log to say "software bug around TDX private
> > > memory" instead of "Hardware Error". But in reality the real hardware
> > > memory error can happen, and sadly such software-triggered #MC cannot be
> > > distinguished from the real hardware error. Also, the error message is
> > > used by userspace tool 'mcelog' to parse, so changing the output may
> > > break userspace.
> > >
> > > So keep the "Hardware Error". The "Data load in unrecoverable area of
> > > kernel" is also helpful, so keep it too.
> > >
> > > Instead of modifying above error log, improve the error log by printing
> > > additional TDX related message to make the log like:
> > >
> > > ...
> > > [...] mce: [Hardware Error]: Machine check: Data load in unrecoverable area of kernel
> > > [...] mce: [Hardware Error]: Machine Check: Memory error from TDX private memory. May be result of CPU erratum.
> >
> > The message mentions one part of issue -- CPU erratum -- but misses the
> > other required part -- kernel bug that makes kernel access the memory it
> > not suppose to.
> >
>
> How about below?
>
> "Memory error from TDX private memory. May be result of CPU erratum caused by
> kernel bug."
Fine, I guess.
--
Kiryl Shutsemau / Kirill A. Shutemov
On 6/12/23 00:59, [email protected] wrote:
>> "Memory error from TDX private memory. May be result of CPU erratum caused by
>> kernel bug."
> Fine, I guess.
Just be short and sweet:
mce: [Hardware Error]: TDX private memory error. Possible kernel bug.
On Mon, 2023-06-12 at 06:51 -0700, Dave Hansen wrote:
> On 6/12/23 00:59, [email protected] wrote:
> > > "Memory error from TDX private memory. May be result of CPU erratum caused by
> > > kernel bug."
> > Fine, I guess.
>
> Just be short and sweet:
>
> mce: [Hardware Error]: TDX private memory error. Possible kernel bug.
Thanks!