This bug was fixed in the package linux - 3.13.0-96.143

---------------
linux (3.13.0-96.143) trusty; urgency=low

  [ Tim Gardner ]

  * Release Tracking Bug
    - LP: #1618083

  * CVE-2015-8767
    - sctp: Prevent soft lockup when sctp_accept() is called during a timeout
      event

  * MacBookPro11,4 fails to poweroff or suspend (LP: #1587714)
    - SAUCE: PCI: Workaround to enable poweroff on Mac Pro 11

  * 3.13: libvirtd: page allocation failure: order:4, mode:0x1040d0
    (LP: #1616193)
    - vhost-net: extend device allocation to vmalloc
    - vhost-net: don't open-code kvfree

  * [arm64] nova instances can't boot with 3.13.0-92 (LP: #1608854)
    - Revert "UBUNTU: [Config] CONFIG_EFI=n for arm64"
    - Revert "UBUNTU: SAUCE: UEFI: Set EFI_SECURE_BOOT bit in x86_efi_facility"
    - Revert "UBUNTU: SAUCE: UEFI: Add secure boot and MOK SB State disabled
      sysctl"
    - Revert "UBUNTU: SAUCE: UEFI: Display MOKSBState when disabled"
    - Revert "UBUNTU: SAUCE: UEFI: efi: Disable secure boot if shim is in 
insecure
      mode"
    - Revert "UBUNTU: SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure
      Boot"
    - Revert "UBUNTU: SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend 
on
      EFI"
    - Revert "UBUNTU: SAUCE: UEFI: Add option to automatically enforce module
      signatures when in Secure Boot mode"
    - Revert "UBUNTU: [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y"
    - Revert "UBUNTU: SAUCE: UEFI: x86: Restrict MSR access when module loading 
is
      restricted"
    - Revert "UBUNTU: SAUCE: UEFI: kexec: Disable at runtime if the kernel
      enforces module loading restrictions"
    - Revert "UBUNTU: SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when
      module loading is restricted"
    - Revert "UBUNTU: SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module
      loading is restricted"
    - Revert "UBUNTU: SAUCE: UEFI: asus-wmi: Restrict debugfs interface when
      module loading is restricted"
    - Revert "UBUNTU: SAUCE: UEFI: ACPI: Limit access to custom_method"
    - Revert "UBUNTU: SAUCE: UEFI: x86: Lock down IO port access when module
      security is enabled"
    - Revert "UBUNTU: SAUCE: UEFI: PCI: Lock down BAR access when module 
security
      is enabled"
    - Revert "UBUNTU: SAUCE: UEFI: Add secure_modules() call"
    - Revert "x86/efi: Build our own EFI services pointer table"
    - Revert "efi: Add separate 32-bit/64-bit definitions"

  * [Hyper-V] storvsc messages for CD-ROM medium not present tray closed
    (LP: #1590655)
    - scsi: storvsc: Filter out storvsc messages CD-ROM medium not present

  * CVE-2016-3841
    - ipv6: add complete rcu protection around np->opt

 -- Kamal Mostafa <ka...@canonical.com>  Tue, 16 Aug 2016 10:20:51 -0700

** Changed in: linux (Ubuntu Trusty)
       Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-8767

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3841

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1616193

Title:
  3.13: libvirtd: page allocation failure: order:4, mode:0x1040d0

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Trusty:
  Fix Released

Bug description:
  [Impact]
   * libvirtd is no longer able to open the vhost_net device.  This causes the 
guest VM to hang.  This happens if memory becomes fragmented to the point where 
vhost_net_open is not able to successfully kmalloc.

   * Gratuitous stack trace.
  libvirtd: page allocation failure: order:4, mode:0x1040d0
  CPU: 14 PID: 82768 Comm: libvirtd Not tainted 3.13.0-85-generic #129-Ubuntu
  Hardware name: Dell Inc. PowerEdge R730/0599V5, BIOS 1.5.4 10/002/2015
   0000000000000000 ffff88003b419990 ffffffff8172b6a7 00000000001040d0
   0000000000000000 ffff88003b419a18 ffffffff811580eb ffff88187fffce48
   ffff88003b4199b8 ffffffff8115abd6 ffff88003b4199e8 0000000000000286
  Call Trace:
   [<ffffffff8172b6a7>] dump_stack+0x64/0x82
   [<ffffffff811580eb>] warn_alloc_failed+0xeb/0x140
   [<ffffffff8115abd6>] ? drain_local_pages+0x16/0x20
   [<ffffffff8115c8c0>] __alloc_pages_nodemask+0x980/0xb90
   [<ffffffff8119b3a3>] alloc_pages_current+0xa3/0x160
   [<ffffffff811570ae>] __get_free_pages+0xe/0x50
   [<ffffffff811743be>] kmalloc_order_trace+0x2e/0xc0
   [<ffffffffa04e79c9>] vhost_net_open+0x29/0x1b0 [vhost_net]
   [<ffffffff81484283>] misc_open+0xb3/0x170
   [<ffffffff811c63ff>] chrdev_open+0x9f/0x1d0
   [<ffffffff811bef13>] do_dentry_open+0x233/0x2e0
   [<ffffffff811c6360>] ? cdev_put+0x30/0x30
   [<ffffffff811bf249>] vfs_open+0x49/0x50
   [<ffffffff811d0812>] do_last+0x562/0x1370
   [<ffffffff811d16db>] path_openat+0xbb/0x670
   [<ffffffff811d2afa>] do_filp_open+0x3a/0x90
   [<ffffffff811df957>] ? __alloc_fd+0xa7/0x130
   [<ffffffff811c0d69>] do_sys_open+0x129/0x2a0
   [<ffffffff811c0efe>] SyS_open+0x1e/0x20
   [<ffffffff8173c39d>] system_call_fastpath+0x1a/0x1f

   * justification: because cloud.

   * The patches fix this issue by allowing vhost_net_open to use
  vmalloc when kmalloc fails to find a sufficient page size.

  [Test Case]

   * Fragment Kernel memory.  Write to Nic from within a kvm guest that
  uses a virtio nic.

  [Regression Potential]

   * Fix was implemented upstream in 3.15, and still exists.

   * The fix is fairly straightfoward given the stack trace and the
  upstream fix.

   * The fix is hard to verify, as it requires significant memory
  fragmentation, and an over-active guest.  The users machine that was
  experiencing this has worked around this by removing VM's from the
  compute host, and using vfs.cache.pressure=600.

  [Other Info]

   * https://lkml.org/lkml/2013/1/23/492
   * 
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23cc5a991c7a9fb7e6d6550e65cee4f4173111c5
   * 
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d04257b07f2362d4eb550952d5bf5f4241a8046d
   * I'm going on vacation, and Eric Desrochers will be following up on this in 
my absence.  This is also the reason for submitting before receiving 
verification.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1616193/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to