Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp3798576yba; Tue, 16 Apr 2019 20:39:37 -0700 (PDT) X-Google-Smtp-Source: APXvYqw+WXW7DwFUUUGB5k5soybGSlSOgpnl+2TXPtLzkTiJ4VKBV66ia7Nm2R1xqxxP2X8qV9Ms X-Received: by 2002:a62:1795:: with SMTP id 143mr88043058pfx.104.1555472377005; Tue, 16 Apr 2019 20:39:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555472376; cv=none; d=google.com; s=arc-20160816; b=wbOAWre5Lv3zWu2viIR/1XfhXczwriTgx9+N1qcK/eBoJH+W4gBi9TKkcF/6eRiiNM BS0BD8wOf2qUX0IKdZqI4nT3nBqO8Gvn+t66GOgNoVqXfIHlo6eDopV3+mjPM7hXUknf 3G5D2por34KrZvmn1ks8JX5DA6rBR9R69oTu43PeFXaAB1LznrMiY9D93hfl5PTjx+dj cUMTh8gix9QlDxLVQ5jUNYAVLL8SAQM4NT0tnDxN3p7JkRIMxzUuf3U5I+YF96YC8Ccq tG4eZnkaKT/k0KN152eWty1/1VgaNCtcySCCzif3Gx6uR+xvwGvtxOOyxH5vK74XtrhH 6sLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from; bh=8UstNk5Ykmvqlt7Q4PtrRU8czubpAdt1JgmBXTvo2E8=; b=uu2zf/qgtudrG6ewLXCbF+GqX7EAFhVIk0LLZdtUfLT0bnHkWwjxe6BIEICOlQp1Ud J5cfrcKaUDZ0uAfSEnoYLgoFsBaFNkFX3F6WECAnS0zp8HMS7iepOpVwzTzUt5iKIRav RkzYlQG2064JnxlDZG2KXicuUnsPHTpb2EW3DjscmjlCKmIgwEqSO2m7RjFFDEH3AgQB drI5b1HH/kS6ECX+nskZi4anCWDtK16Jfd8VfFUC5Z1CmOe62pSS8JmREYtBGp/NGQL8 UvxPEBeAFuWZhzGtVshjQhareNGEcH2cobSHCF93HE1TPtkBACBohUt+vdWDiiXukxci HHOg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a61si51956162pla.178.2019.04.16.20.39.21; Tue, 16 Apr 2019 20:39:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731112AbfDQDii (ORCPT + 99 others); Tue, 16 Apr 2019 23:38:38 -0400 Received: from ozlabs.org ([203.11.71.1]:45247 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728508AbfDQDii (ORCPT ); Tue, 16 Apr 2019 23:38:38 -0400 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 44kSd76Crfz9s9G; Wed, 17 Apr 2019 13:38:35 +1000 (AEST) From: Michael Ellerman To: Linus Torvalds , Christoph Hellwig Cc: Linux List Kernel Mailing , linuxppc-dev@lists.ozlabs.org, Martin Schwidefsky , linux-s390 , Nicholas Piggin , "Aneesh Kumar K.V" , Paul Mackerras Subject: Re: Linux 5.1-rc5 In-Reply-To: References: <20190415051919.GA31481@infradead.org> Date: Wed, 17 Apr 2019 13:38:33 +1000 Message-ID: <87sguhti6e.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Cc += Nick & Aneesh & Paul ] Linus Torvalds writes: > On Sun, Apr 14, 2019 at 10:19 PM Christoph Hellwig wrote: >> >> Can we please have the page refcount overflow fixes out on the list >> for review, even if it is after the fact? > > They were actually on a list for review long before the fact, but it > was the security mailing list. The issue actually got discussed back > in January along with early versions of the patches, but then we > dropped the ball because it just wasn't on anybody's radar and it got > resurrected late March. Willy wrote a rather bigger patch-series, and > review of that is what then resulted in those commits. So they may > look recent, but that's just because the original patches got > seriously edited down and rewritten. > > That said, powerpc and s390 should at least look at maybe adding a > check for the page ref in their gup paths too. Powerpc has the special > gup_hugepte() case Which uses page_cache_add_speculative(), which handles the case of the refcount being zero but not overflow. So that looks like it needs fixing. We also have follow_huge_pd() that should use try_get_page(). And we have a few uses of bare get_page() in KVM code which might be subject to the same attack. cheers