From patchwork Sun May 1 22:16:22 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Greg Kroah-Hartman X-Patchwork-Id: 8989611 Return-Path: X-Original-To: patchwork-xen-devel@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork1.web.kernel.org (Postfix) with ESMTP id CE5659F372 for ; Sun, 1 May 2016 22:19:21 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id A43BD201B4 for ; Sun, 1 May 2016 22:19:16 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 87FA4201D3 for ; Sun, 1 May 2016 22:19:10 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1awzf9-0008H5-Oz; Sun, 01 May 2016 22:16:27 +0000 Received: from mail6.bemta3.messagelabs.com ([195.245.230.39]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1awzf8-0008Gz-VV for xen-devel@lists.xenproject.org; Sun, 01 May 2016 22:16:27 +0000 Received: from [85.158.137.68] by server-16.bemta-3.messagelabs.com id A7/1F-02994-93086275; Sun, 01 May 2016 22:16:25 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrHLMWRWlGSWpSXmKPExsXSc3klj65lg1q 4wfPlvBbft0xmcmD0OPzhCksAYxRrZl5SfkUCa8aCV4sYC05JVcy60MLcwDhDvIuRi0NIYBuj xMHr01m7GDk5hAWSJB6ufM0KkhARWMAs0dJxhQUkwSxgJzG5+xkTiM0moCTxbeE5MJtFQFVi3 t1D7CA2r4C6xJ3fS6FsQYmTM59A9RpInD2+jBXClpdo3jqbeQIj1ywkZbOQlM1CUraAkXkVo3 pxalFZapGuhV5SUWZ6RkluYmaOrqGBsV5uanFxYnpqTmJSsV5yfu4mRmA4MADBDsYL7c6HGCU 5mJREeWfMVQkX4kvKT6nMSCzOiC8qzUktPsQow8GhJMGbUq8WLiRYlJqeWpGWmQMMTJi0BAeP kggvex1Qmre4IDG3ODMdInWKUVFKnNcdpE8AJJFRmgfXBouGS4yyUsK8jECHCPEUpBblZpagy r9iFOdgVBKGmMKTmVcCN/0V0GImoMXZ61VBFpckIqSkGhhXP9gVcKXQt7m76+KnDqaIe8diIq Xb1q/9xfTINHfC42+r/s6+elvemvd7/SE7x3UBd3f5LF6WJWvQsGT7V0WdnTVL8ibFf5MIn9t ls/oB74fiOX77bJ994Dc/ezz7S53/jVU7xKZ833c3P8LTpfRG44/lZ/aUXF87/evssPWH5hfs 8XXycZNVVmIpzkg01GIuKk4EAHmkBKCBAgAA X-Env-Sender: gregkh@linuxfoundation.org X-Msg-Ref: server-14.tower-31.messagelabs.com!1462140983!37922457!1 X-Originating-IP: [140.211.169.12] X-SpamReason: No, hits=0.0 required=7.0 tests= X-StarScan-Received: X-StarScan-Version: 8.34; banners=-,-,- X-VirusChecked: Checked Received: (qmail 16953 invoked from network); 1 May 2016 22:16:24 -0000 Received: from mail.linuxfoundation.org (HELO mail.linuxfoundation.org) (140.211.169.12) by server-14.tower-31.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted SMTP; 1 May 2016 22:16:24 -0000 Received: from localhost (c-50-170-35-168.hsd1.wa.comcast.net [50.170.35.168]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 7E7C0726; Sun, 1 May 2016 22:16:22 +0000 (UTC) To: JBeulich@suse.com, JGross@suse.com, akpm@linux-foundation.org, boris.ostrovsky@oracle.com, bp@alien8.de, brgerst@gmail.com, david.vrabel@citrix.com, dvlasenk@redhat.com, gregkh@linuxfoundation.org, hpa@zytor.com, jbeulich@suse.com, luto@amacapital.net, mcgrof@suse.com, mingo@kernel.org, peterz@infradead.org, tglx@linutronix.de, torvalds@linux-foundation.org, toshi.kani@hp.com, vkuznets@redhat.com, xen-devel@lists.xenproject.org From: Date: Sun, 01 May 2016 15:16:22 -0700 Message-ID: <146214098217590@kroah.com> MIME-Version: 1.0 Cc: stable@vger.kernel.org, stable-commits@vger.kernel.org Subject: [Xen-devel] Patch "x86/mm/xen: Suppress hugetlbfs in PV guests" has been added to the 4.5-stable tree X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_MED, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP This is a note to let you know that I've just added the patch titled x86/mm/xen: Suppress hugetlbfs in PV guests to the 4.5-stable tree which can be found at: http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary The filename of the patch is: x86-mm-xen-suppress-hugetlbfs-in-pv-guests.patch and it can be found in the queue-4.5 subdirectory. If you, or anyone else, feels it should not be added to the stable tree, please let know about it. From 103f6112f253017d7062cd74d17f4a514ed4485c Mon Sep 17 00:00:00 2001 From: Jan Beulich Date: Thu, 21 Apr 2016 00:27:04 -0600 Subject: x86/mm/xen: Suppress hugetlbfs in PV guests From: Jan Beulich commit 103f6112f253017d7062cd74d17f4a514ed4485c upstream. Huge pages are not normally available to PV guests. Not suppressing hugetlbfs use results in an endless loop of page faults when user mode code tries to access a hugetlbfs mapped area (since the hypervisor denies such PTEs to be created, but error indications can't be propagated out of xen_set_pte_at(), just like for various of its siblings), and - once killed in an oops like this: kernel BUG at .../fs/hugetlbfs/inode.c:428! invalid opcode: 0000 [#1] SMP ... RIP: e030:[] [] remove_inode_hugepages+0x25b/0x320 ... Call Trace: [] hugetlbfs_evict_inode+0x15/0x40 [] evict+0xbd/0x1b0 [] __dentry_kill+0x19a/0x1f0 [] dput+0x1fe/0x220 [] __fput+0x155/0x200 [] task_work_run+0x60/0xa0 [] do_exit+0x160/0x400 [] do_group_exit+0x3b/0xa0 [] get_signal+0x1ed/0x470 [] do_signal+0x14/0x110 [] prepare_exit_to_usermode+0xe9/0xf0 [] retint_user+0x8/0x13 This is CVE-2016-3961 / XSA-174. Reported-by: Vitaly Kuznetsov Signed-off-by: Jan Beulich Cc: Andrew Morton Cc: Andy Lutomirski Cc: Boris Ostrovsky Cc: Borislav Petkov Cc: Brian Gerst Cc: David Vrabel Cc: Denys Vlasenko Cc: H. Peter Anvin Cc: Juergen Gross Cc: Linus Torvalds Cc: Luis R. Rodriguez Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: Toshi Kani Cc: xen-devel Link: http://lkml.kernel.org/r/57188ED802000078000E431C@prv-mh.provo.novell.com Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/hugetlb.h | 1 + 1 file changed, 1 insertion(+) Patches currently in stable-queue which might be from JBeulich@suse.com are queue-4.5/x86-mm-xen-suppress-hugetlbfs-in-pv-guests.patch --- a/arch/x86/include/asm/hugetlb.h +++ b/arch/x86/include/asm/hugetlb.h @@ -4,6 +4,7 @@ #include #include +#define hugepages_supported() cpu_has_pse static inline int is_hugepage_only_range(struct mm_struct *mm, unsigned long addr,