* Request for review for 4.4-st65, 4.4-cip100
@ 2025-06-16 16:55 Ulrich Hecht
2025-06-17 7:15 ` nobuhiro1.iwamatsu
` (2 more replies)
0 siblings, 3 replies; 5+ messages in thread
From: Ulrich Hecht @ 2025-06-16 16:55 UTC (permalink / raw)
To: cip-dev@lists.cip-project.org, pavel@denx.de,
nobuhiro1.iwamatsu@toshiba.co.jp
Hi!
Here's the manual backports for the upcoming 4.4 kernel release. As always they can be found in https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git/log/?h=linux-4.4.y-st-rc
8dab9bb642b2e net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
6f43c571bf094 of/irq: Fix device node refcount leakages in of_irq_init()
7f406a4c1fd70 mm: add missing release barrier on PGDAT_RECLAIM_LOCKED unlock
d24045205aaa7 media: streamzap: prevent processing IR data on URB failure
Thanks for having a look!
CU
Uli
^ permalink raw reply [flat|nested] 5+ messages in thread
* RE: Request for review for 4.4-st65, 4.4-cip100
2025-06-16 16:55 Request for review for 4.4-st65, 4.4-cip100 Ulrich Hecht
@ 2025-06-17 7:15 ` nobuhiro1.iwamatsu
2025-06-17 9:27 ` Pavel Machek
2025-06-17 10:20 ` Indirect Target Selection (CVE-2024-28956) " Pavel Machek
2 siblings, 0 replies; 5+ messages in thread
From: nobuhiro1.iwamatsu @ 2025-06-17 7:15 UTC (permalink / raw)
To: uli, cip-dev, pavel
Hi Ulrich,
> -----Original Message-----
> From: Ulrich Hecht <uli@fpond.eu>
> Sent: Tuesday, June 17, 2025 1:55 AM
> To: cip-dev@lists.cip-project.org; pavel@denx.de; iwamatsu nobuhiro(岩松 信
> 洋 □DITC○CPT) <nobuhiro1.iwamatsu@toshiba.co.jp>
> Subject: Request for review for 4.4-st65, 4.4-cip100
>
> Hi!
>
> Here's the manual backports for the upcoming 4.4 kernel release. As always
> they can be found in
> https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git/log/?h=linu
> x-4.4.y-st-rc
>
> 8dab9bb642b2e net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
> 6f43c571bf094 of/irq: Fix device node refcount leakages in of_irq_init()
> 7f406a4c1fd70 mm: add missing release barrier on PGDAT_RECLAIM_LOCKED
> unlock
> d24045205aaa7 media: streamzap: prevent processing IR data on URB failure
>
> Thanks for having a look!
>
Thanks for you update!
I checked this update. looks good to me.
Best regards,
Nobuhiro
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Request for review for 4.4-st65, 4.4-cip100
2025-06-16 16:55 Request for review for 4.4-st65, 4.4-cip100 Ulrich Hecht
2025-06-17 7:15 ` nobuhiro1.iwamatsu
@ 2025-06-17 9:27 ` Pavel Machek
2025-06-17 10:20 ` Indirect Target Selection (CVE-2024-28956) " Pavel Machek
2 siblings, 0 replies; 5+ messages in thread
From: Pavel Machek @ 2025-06-17 9:27 UTC (permalink / raw)
To: Ulrich Hecht
Cc: cip-dev@lists.cip-project.org, nobuhiro1.iwamatsu@toshiba.co.jp
[-- Attachment #1: Type: text/plain, Size: 1127 bytes --]
Hi!
> Here's the manual backports for the upcoming 4.4 kernel release. As always they can be found in https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git/log/?h=linux-4.4.y-st-rc
>
One patch is not complete, the rest look ok to me.
a > 8dab9bb642b2e net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
> 6f43c571bf094 of/irq: Fix device node refcount leakages in
> of_irq_init()
4.4 has one more place to handle, AFAICT:
if (WARN(!match->data,
"of_irq_init: no init function for %s\n",
match->compatible)) {
kfree(desc);
continue;
}
(Being behind WARN(), it is probably not too important).
a > 7f406a4c1fd70 mm: add missing release barrier on PGDAT_RECLAIM_LOCKED unlock
a > d24045205aaa7 media: streamzap: prevent processing IR data on URB failure
Best regards,
Pavel
--
DENX Software Engineering GmbH, Managing Director: Erika Unter
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 195 bytes --]
^ permalink raw reply [flat|nested] 5+ messages in thread
* Indirect Target Selection (CVE-2024-28956) Re: Request for review for 4.4-st65, 4.4-cip100
2025-06-16 16:55 Request for review for 4.4-st65, 4.4-cip100 Ulrich Hecht
2025-06-17 7:15 ` nobuhiro1.iwamatsu
2025-06-17 9:27 ` Pavel Machek
@ 2025-06-17 10:20 ` Pavel Machek
2025-06-17 15:05 ` [cip-dev] " Ulrich Hecht
2 siblings, 1 reply; 5+ messages in thread
From: Pavel Machek @ 2025-06-17 10:20 UTC (permalink / raw)
To: Ulrich Hecht
Cc: cip-dev@lists.cip-project.org, nobuhiro1.iwamatsu@toshiba.co.jp
[-- Attachment #1: Type: text/plain, Size: 1592 bytes --]
Hi!
> Here's the manual backports for the upcoming 4.4 kernel release. As always they can be found in https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git/log/?h=linux-4.4.y-st-rc
>
> 8dab9bb642b2e net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too
> 6f43c571bf094 of/irq: Fix device node refcount leakages in of_irq_init()
> 7f406a4c1fd70 mm: add missing release barrier on PGDAT_RECLAIM_LOCKED unlock
> d24045205aaa7 media: streamzap: prevent processing IR data on URB failure
>
> Thanks for having a look!
Should we add something like this?
Does anyone care deeply about ITS bugs? If so, talk to me, and we can
cooperate on deeper investigation.
Best regards,
Pavel
---
Document that ITS workarounds are not present in 4.4-cip.
Signed-off-by: Pavel Machek <pavel@denx.de>
diff --git a/KNOWN-BUGS b/KNOWN-BUGS
index ec2de4aab685e..b268e54bc96e4 100644
--- a/KNOWN-BUGS
+++ b/KNOWN-BUGS
@@ -19,6 +19,10 @@ architectures.
Random rewrite from 4.9.320 was not backported. We have seen no good
explanation why it is needed, and it is rather intrusive.
+Workarounds for Intel Indirect Target Selection (CVE-2024-28956) bugs
+were not backported to 5.10-stable and older, and so are not present
+in here, either.
+
These commits were not backported and may need more investigation:
be8173bc1 | mm: fix race between MADV_FREE reclaim and blkdev direct IO read
--
DENX Software Engineering GmbH, Managing Director: Erika Unter
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 195 bytes --]
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [cip-dev] Indirect Target Selection (CVE-2024-28956) Re: Request for review for 4.4-st65, 4.4-cip100
2025-06-17 10:20 ` Indirect Target Selection (CVE-2024-28956) " Pavel Machek
@ 2025-06-17 15:05 ` Ulrich Hecht
0 siblings, 0 replies; 5+ messages in thread
From: Ulrich Hecht @ 2025-06-17 15:05 UTC (permalink / raw)
To: pavel; +Cc: cip-dev@lists.cip-project.org, nobuhiro1.iwamatsu@toshiba.co.jp
> On 06/17/2025 12:20 PM CEST Pavel Machek via lists.cip-project.org <pavel=denx.de@lists.cip-project.org> wrote:
> Should we add something like this?
>
[...]
> ---
>
> Document that ITS workarounds are not present in 4.4-cip.
>
> Signed-off-by: Pavel Machek <pavel@denx.de>
>
> diff --git a/KNOWN-BUGS b/KNOWN-BUGS
> index ec2de4aab685e..b268e54bc96e4 100644
> --- a/KNOWN-BUGS
> +++ b/KNOWN-BUGS
> @@ -19,6 +19,10 @@ architectures.
> Random rewrite from 4.9.320 was not backported. We have seen no good
> explanation why it is needed, and it is rather intrusive.
>
> +Workarounds for Intel Indirect Target Selection (CVE-2024-28956) bugs
> +were not backported to 5.10-stable and older, and so are not present
> +in here, either.
> +
I guess that can't hurt. I'll add it.
CU
Uli
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2025-06-17 15:05 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-06-16 16:55 Request for review for 4.4-st65, 4.4-cip100 Ulrich Hecht
2025-06-17 7:15 ` nobuhiro1.iwamatsu
2025-06-17 9:27 ` Pavel Machek
2025-06-17 10:20 ` Indirect Target Selection (CVE-2024-28956) " Pavel Machek
2025-06-17 15:05 ` [cip-dev] " Ulrich Hecht
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox