lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <tip-1e2ae9ec072f3b7887f456426bc2cf23b80f661a@git.kernel.org>
Date:	Sat, 16 Apr 2016 04:21:35 -0700
From:	tip-bot for Vitaly Kuznetsov <tipbot@...or.com>
To:	linux-tip-commits@...r.kernel.org
Cc:	vkuznets@...hat.com, tglx@...utronix.de, hpa@...or.com,
	cavery@...hat.com, acme@...hat.com, kys@...rosoft.com,
	linux-kernel@...r.kernel.org, torvalds@...ux-foundation.org,
	alexander.shishkin@...ux.intel.com, mingo@...nel.org,
	jolsa@...hat.com, peterz@...radead.org, haiyangz@...rosoft.com
Subject: [tip:x86/urgent] x86/hyperv: Avoid reporting bogus NMI status for
 Gen2 instances

Commit-ID:  1e2ae9ec072f3b7887f456426bc2cf23b80f661a
Gitweb:     http://git.kernel.org/tip/1e2ae9ec072f3b7887f456426bc2cf23b80f661a
Author:     Vitaly Kuznetsov <vkuznets@...hat.com>
AuthorDate: Fri, 15 Apr 2016 15:50:32 +0200
Committer:  Ingo Molnar <mingo@...nel.org>
CommitDate: Sat, 16 Apr 2016 11:18:21 +0200

x86/hyperv: Avoid reporting bogus NMI status for Gen2 instances

Generation2 instances don't support reporting the NMI status on port 0x61,
read from there returns 'ff' and we end up reporting nonsensical PCI
error (as there is no PCI bus in these instances) on all NMIs:

    NMI: PCI system error (SERR) for reason ff on CPU 0.
    Dazed and confused, but trying to continue

Fix the issue by overriding x86_platform.get_nmi_reason. Use 'booted on
EFI' flag to detect Gen2 instances.

Signed-off-by: Vitaly Kuznetsov <vkuznets@...hat.com>
Cc: Alexander Shishkin <alexander.shishkin@...ux.intel.com>
Cc: Arnaldo Carvalho de Melo <acme@...hat.com>
Cc: Cathy Avery <cavery@...hat.com>
Cc: Haiyang Zhang <haiyangz@...rosoft.com>
Cc: Jiri Olsa <jolsa@...hat.com>
Cc: K. Y. Srinivasan <kys@...rosoft.com>
Cc: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: Peter Zijlstra <peterz@...radead.org>
Cc: Thomas Gleixner <tglx@...utronix.de>
Cc: devel@...uxdriverproject.org
Link: http://lkml.kernel.org/r/1460728232-31433-1-git-send-email-vkuznets@redhat.com
Signed-off-by: Ingo Molnar <mingo@...nel.org>
---
 arch/x86/kernel/cpu/mshyperv.c | 12 ++++++++++++
 1 file changed, 12 insertions(+)

diff --git a/arch/x86/kernel/cpu/mshyperv.c b/arch/x86/kernel/cpu/mshyperv.c
index 4e7c693..10c11b4 100644
--- a/arch/x86/kernel/cpu/mshyperv.c
+++ b/arch/x86/kernel/cpu/mshyperv.c
@@ -152,6 +152,11 @@ static struct clocksource hyperv_cs = {
 	.flags		= CLOCK_SOURCE_IS_CONTINUOUS,
 };
 
+static unsigned char hv_get_nmi_reason(void)
+{
+	return 0;
+}
+
 static void __init ms_hyperv_init_platform(void)
 {
 	/*
@@ -191,6 +196,13 @@ static void __init ms_hyperv_init_platform(void)
 	machine_ops.crash_shutdown = hv_machine_crash_shutdown;
 #endif
 	mark_tsc_unstable("running on Hyper-V");
+
+	/*
+	 * Generation 2 instances don't support reading the NMI status from
+	 * 0x61 port.
+	 */
+	if (efi_enabled(EFI_BOOT))
+		x86_platform.get_nmi_reason = hv_get_nmi_reason;
 }
 
 const __refconst struct hypervisor_x86 x86_hyper_ms_hyperv = {

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ