[Public]
Hi,
There are a variety of x86 systems that advertise LPI support and as part of negotiation with firmware they don't end up using C-states
in certain circumstances. This leads to higher runtime power consumption and also failure to enter s2idle.
In mainline there have been changes to block that behavior. Can you please backport these two commits from mainline?
commit 01f6c7338ce267959975da65d86ba34f44d54220 ("cpuidle: PSCI: Move the `has_lpi` check to the beginning of the function")
commit eb087f305919ee8169ad65665610313e74260463 ("ACPI: processor idle: Check for architectural support for LPI")
This should go to 5.15.y and later stable kernels.
Thanks,
Hello,
It seems the fix commits for a couple of CVEs have not been cherry
picked in the current linux-5.4.y branch (v5.4.188, currently):
---
CVE-2020-16120:
<https://nvd.nist.gov/vuln/detail/CVE-2020-16120> references the
following mainline commits:
d1d04ef8572bc8c22265057bd3d5a79f223f8f52 "ovl: stack file ops"
(break commit)
56230d956739b9cb1cbde439d76227d77979a04d "ovl: verify permissions
in ovl_path_open()"
48bd024b8a40d73ad6b086de2615738da0c7004f "ovl: switch to mounter
creds in readdir"
05acefb4872dae89e772729efb194af754c877e8 "ovl: check permission to
open real file"
b6650dab404c701d7fe08a108b746542a934da84 "ovl: do not fail because
of O_NOATIME"
The CVE description says the last commit in the list above fixes a
regression introduced by these two commits:
130fdbc3d1f9966dd4230709c30f3768bccd3065 "ovl: pass correct flags
for opening real directory"
292f902a40c11f043a5ca1305a114da0e523eaa3 "ovl: call secutiry hook
in ovl_real_ioctl()"
---
CVE-2021-3428:
According to <https://bugzilla.suse.com/show_bug.cgi?id=1173485>, the
mainline fix commits are:
d176b1f62f24 "ext4: handle error of ext4_setup_system_zone() on
remount"
bf9a379d0980 "ext4: don't allow overlapping system zones"
ce9f24cccdc0 "ext4: check journal inode extents more carefully"
Of these, only the first two have been cherry-picked.
---
Half of these commits may be cherry-picked without a conflict. I wonder
why they have not been applied and cannot find any discussion about them
on this mailing list. Is it an oversight? Or because the v5.4 line is
not affected? Some other reason?
Regards,
achtol
Backport summary
----------------
1756d7994ad8 ("cgroup: Use open-time credentials for process migraton perm checks")
* Cherry pick from 4.19-stable, no modifications.
0d2b5955b362 ("cgroup: Allocate cgroup_file_ctx for kernfs_open_file->priv")
* Cherry-pick from 4.19-stable, minor contextual adjustement.
e57457641613 ("cgroup: Use open-time cgroup namespace for process migration perm checks")
* Cherry-pick from 4.19-stable, no modifications.
Testing
-------
There are no cgroup selftests in 4.14, but when running the ones from 4.19 on
the 4.14 kernel, all selftests pass:
root@intel-x86-64:~# ./test_core
ok 1 test_cgcore_internal_process_constraint
ok 2 test_cgcore_top_down_constraint_enable
ok 3 test_cgcore_top_down_constraint_disable
ok 4 test_cgcore_no_internal_process_constraint_on_threads
ok 5 test_cgcore_parent_becomes_threaded
ok 6 test_cgcore_invalid_domain
ok 7 test_cgcore_populated
ok 8 test_cgcore_lesser_euid_open
ok 9 test_cgcore_lesser_ns_open
Tejun Heo (3):
cgroup: Use open-time credentials for process migraton perm checks
cgroup: Allocate cgroup_file_ctx for kernfs_open_file->priv
cgroup: Use open-time cgroup namespace for process migration perm
checks
kernel/cgroup/cgroup-internal.h | 19 ++++++++
kernel/cgroup/cgroup-v1.c | 33 ++++++++------
kernel/cgroup/cgroup.c | 81 +++++++++++++++++++++++----------
3 files changed, 95 insertions(+), 38 deletions(-)
--
2.25.1
Backport summary
----------------
1756d7994ad8 ("cgroup: Use open-time credentials for process migraton perm checks")
* Cherry pick for 5.4-stable, no modifications.
0d2b5955b362 ("cgroup: Allocate cgroup_file_ctx for kernfs_open_file->priv")
* Cherry-pick from 5.4-stable.
* Backport to v4.19: drop changes to cgroup_pressure_*() functions -
psi monitor feature is not available in 4.19.
e57457641613 ("cgroup: Use open-time cgroup namespace for process migration perm checks")
* Cherry-pick from 5.4-stable, no modifications.
b09c2baa5634 ("selftests: cgroup: Make cg_create() use 0755 for permission instead of 0644")
613e040e4dc2 ("selftests: cgroup: Test open-time credential usage for migration checks")
* Minor contextual adjustments.
bf35a7879f1d ("selftests: cgroup: Test open-time cgroup namespace usage for migration checks")
* Minor contextual adjustments and added wait.h
and fcntl.h includes to fix compilation.
Testing
-------
The newly introduced selftests (test_cgcore_lesser_euid_open() and
test_cgcore_lesser_ns_open()) pass with this series applied:
root@intel-x86-64:~# ./test_core
ok 1 test_cgcore_internal_process_constraint
ok 2 test_cgcore_top_down_constraint_enable
ok 3 test_cgcore_top_down_constraint_disable
ok 4 test_cgcore_no_internal_process_constraint_on_threads
ok 5 test_cgcore_parent_becomes_threaded
ok 6 test_cgcore_invalid_domain
ok 7 test_cgcore_populated
ok 8 test_cgcore_lesser_euid_open
ok 9 test_cgcore_lesser_ns_open
Tejun Heo (6):
cgroup: Use open-time credentials for process migraton perm checks
cgroup: Allocate cgroup_file_ctx for kernfs_open_file->priv
cgroup: Use open-time cgroup namespace for process migration perm
checks
selftests: cgroup: Make cg_create() use 0755 for permission instead of
0644
selftests: cgroup: Test open-time credential usage for migration
checks
selftests: cgroup: Test open-time cgroup namespace usage for migration
checks
kernel/cgroup/cgroup-internal.h | 19 +++
kernel/cgroup/cgroup-v1.c | 33 ++--
kernel/cgroup/cgroup.c | 81 ++++++---
tools/testing/selftests/cgroup/cgroup_util.c | 2 +-
tools/testing/selftests/cgroup/test_core.c | 167 +++++++++++++++++++
5 files changed, 263 insertions(+), 39 deletions(-)
--
2.25.1
Backport summary
----------------
1756d7994ad8 ("cgroup: Use open-time credentials for process migraton perm checks")
* Cherry pick from 5.10-stable with minor contextual adjustments.
0d2b5955b362 ("cgroup: Allocate cgroup_file_ctx for kernfs_open_file->priv")
* Cherry-pick from 5.10-stable, no modifications.
e57457641613 ("cgroup: Use open-time cgroup namespace for process migration perm checks")
* Cherry-pick from 5.10-stable.
* Backport to 5.4: drop changes to cgroup_attach_permissions() and
cgroup_css_set_fork() as the two functions are not present. Also,
adjust cgroup_procs_write_permission() callsites directly in
cgroup_procs_write() and cgroup_threads_write().
b09c2baa5634 ("selftests: cgroup: Make cg_create() use 0755 for permission instead of 0644")
* Clean cherry-pick.
613e040e4dc2 ("selftests: cgroup: Test open-time credential usage for migration checks")
* Minor contextual adjustments.
bf35a7879f1d ("selftests: cgroup: Test open-time cgroup namespace usage for migration checks")
* Minor contextual adjustments and added wait.h
and fcntl.h includes to fix compilation.
Testing
-------
The newly introduced selftests (test_cgcore_lesser_euid_open() and
test_cgcore_lesser_ns_open()) pass with this series applied:
root@intel-x86-64:~# ./test_core
ok 1 test_cgcore_internal_process_constraint
ok 2 test_cgcore_top_down_constraint_enable
ok 3 test_cgcore_top_down_constraint_disable
ok 4 test_cgcore_no_internal_process_constraint_on_threads
ok 5 test_cgcore_parent_becomes_threaded
ok 6 test_cgcore_invalid_domain
ok 7 test_cgcore_populated
ok 8 test_cgcore_lesser_euid_open
ok 9 test_cgcore_lesser_ns_open
Tejun Heo (6):
cgroup: Use open-time credentials for process migraton perm checks
cgroup: Allocate cgroup_file_ctx for kernfs_open_file->priv
cgroup: Use open-time cgroup namespace for process migration perm
checks
selftests: cgroup: Make cg_create() use 0755 for permission instead of
0644
selftests: cgroup: Test open-time credential usage for migration
checks
selftests: cgroup: Test open-time cgroup namespace usage for migration
checks
kernel/cgroup/cgroup-internal.h | 19 +++
kernel/cgroup/cgroup-v1.c | 33 ++--
kernel/cgroup/cgroup.c | 93 ++++++++---
tools/testing/selftests/cgroup/cgroup_util.c | 2 +-
tools/testing/selftests/cgroup/test_core.c | 167 +++++++++++++++++++
5 files changed, 271 insertions(+), 43 deletions(-)
--
2.25.1
The bug is here:
bus_flags = connector->display_info.bus_flags;
The list iterator 'connector-' will point to a bogus position containing
HEAD if the list is empty or no element is found. This case must
be checked before any use of the iterator, otherwise it will lead
to a invalid memory access.
To fix this bug, add an check. Use a new value 'iter' as the list
iterator, while use the old value 'connector' as a dedicated variable
to point to the found element.
Cc: stable(a)vger.kernel.org
Fixes: ("drm/omap: Add support for drm_panel")
Signed-off-by: Xiaomeng Tong <xiam0nd.tong(a)gmail.com>
---
drivers/gpu/drm/omapdrm/omap_encoder.c | 14 +++++++++-----
1 file changed, 9 insertions(+), 5 deletions(-)
diff --git a/drivers/gpu/drm/omapdrm/omap_encoder.c b/drivers/gpu/drm/omapdrm/omap_encoder.c
index 4dd05bc732da..d648ab4223b1 100644
--- a/drivers/gpu/drm/omapdrm/omap_encoder.c
+++ b/drivers/gpu/drm/omapdrm/omap_encoder.c
@@ -76,14 +76,16 @@ static void omap_encoder_mode_set(struct drm_encoder *encoder,
struct omap_encoder *omap_encoder = to_omap_encoder(encoder);
struct omap_dss_device *output = omap_encoder->output;
struct drm_device *dev = encoder->dev;
- struct drm_connector *connector;
+ struct drm_connector *connector = NULL, *iter;
struct drm_bridge *bridge;
struct videomode vm = { 0 };
u32 bus_flags;
- list_for_each_entry(connector, &dev->mode_config.connector_list, head) {
- if (connector->encoder == encoder)
+ list_for_each_entry(iter, &dev->mode_config.connector_list, head) {
+ if (iter->encoder == encoder) {
+ connector = iter;
break;
+ }
}
drm_display_mode_to_videomode(adjusted_mode, &vm);
@@ -106,8 +108,10 @@ static void omap_encoder_mode_set(struct drm_encoder *encoder,
omap_encoder_update_videomode_flags(&vm, bus_flags);
}
- bus_flags = connector->display_info.bus_flags;
- omap_encoder_update_videomode_flags(&vm, bus_flags);
+ if (connector) {
+ bus_flags = connector->display_info.bus_flags;
+ omap_encoder_update_videomode_flags(&vm, bus_flags);
+ }
/* Set timings for all devices in the display pipeline. */
dss_mgr_set_timings(output, &vm);
--
2.17.1
💌 Jean want to play with you! Start play: https://telegra.ph/insta-sex-04-14?7y20e8 💌 様
この度はGOOD NATURE HOTEL KYOTOへお問い合わせいただき、誠にありがとうございます。
お問い合わせ内容をご確認の上、改めてご連絡差し上げますので今しばらくお待ちくださいますよう
よろしくお願い申し上げます。
以下、お問い合わせいただいた内容になります。
--
【お名前】:💌 Jean want to play with you! Start play: https://telegra.ph/insta-sex-04-14?7y20e8 💌(bfgwdf) 様
【お電話番号】:902325069439
【メールアドレス】:stable(a)vger.kernel.org
【お問い合わせ内容】:その他
【ご質問・ご意見】:
y2rqvlq
--
このメールは GOOD NATURE HOTEL KYOTO (https://goodnaturehotel.jp/) のお問い合わせフォームから送信されました