ACK/Cmnt: [PATCH 0/5] [Xenial] CVE-2019-10124 - hwpoison memory DoS
Stefan Bader
stefan.bader at canonical.com
Wed Apr 17 14:13:39 UTC 2019
On 02.04.19 16:52, Andrea Righi wrote:
> https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-10124.html
>
> When memory_failure() is called on a thp tail page after pmd is split an
> attacker can cause a denial of service (via hwpoison), triggering a
> reference counter bug, reported by VM_BUG_ON_PAGE().
>
> The reason is that memory_failure() is always using page refcount and
> page lock from tail page to head page when calling split_huge_page(),
> but it can pass any subpage to split_huge_page(), causing a potential
> refcount / locking bug. Fix by locking and checking the proper subpage.
>
> The fix requires backporting additional patches:
>
> PATCH 1/5: introduce hpage locking in memory_failure()
> PATCH 2/5: no functional changes, only code refactoring that helps to
> apply the next patches
> PATCH 3/5: properly handle non anonymous thp
> PATCH 4/5: a fix similar to the actual CVE
> PATCH 5/5: the actual CVE
>
> Kirill A. Shutemov (1):
> thp, mm: split_huge_page(): caller need to lock page
>
> Naoya Horiguchi (3):
> mm: soft-offline: clean up soft_offline_page()
> mm: soft-offline: exit with failure for non anonymous thp
> mm: hwpoison: fix thp split handling in memory_failure()
>
> zhongjiang (1):
> mm: hwpoison: fix thp split handing in soft_offline_in_use_page()
>
> mm/memory-failure.c | 80 ++++++++++++++++++++++++++++++++++-------------------
> mm/migrate.c | 8 ++++--
> 2 files changed, 58 insertions(+), 30 deletions(-)
>
>
When doing backports it helps to review when you add a short hint about how hard
it was or what had to be adapted. The submitted patches still look reasonably
compact, so I assume it was mostly context adjustments.
Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20190417/5c63ca41/attachment-0001.sig>
More information about the kernel-team
mailing list