Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp4920413ybb; Tue, 24 Mar 2020 07:44:18 -0700 (PDT) X-Google-Smtp-Source: ADFU+vstjb04fGLQ5RKCzoLZL1GWpm3gRUd1TenEJ3Outsq4jrOxaQHfJe598sTiI3BjO1GxvGoy X-Received: by 2002:aca:ed4b:: with SMTP id l72mr3402275oih.95.1585061058047; Tue, 24 Mar 2020 07:44:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585061058; cv=none; d=google.com; s=arc-20160816; b=RLyF9NuW2y0NXnozDe4vV/6/k8qKQ7hxo0zD0MI8w/m7MURZebCNoS92PK4fAsjEqx fiRrPfofjQlQPHfltkKEI1vkNlO+Te/8CbqX+jp4tp87tda8aXmhsMhdy6FdyQKZSOu3 ASu6T5AuPLGyn8TSfF8X/pVQFJT814Fr2Bhsc/QePsKIzFIfk8+BBXbB2hFXy6V/dIeG hBiBzH8Y8nqmfT3gvVjZw9LuLIgAFOGWyaopaPZJOTJ7H92hdg/FLN2Ko4mDg1cBNSoc OpeBujP4LY67tqBB2lPbVIzrJOu3hn3ZrKpJw+1iLRHdx4OwpLtsKqdqqgTV5e+QOK1z 4zgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=fHBXsKQiGEaPXdIGq+KzwPopcr65jMj7uYxHlZeung4=; b=HSCjOfYWRIhZGTjSo5+XerrWhIta1NYN5FRgejaoIXCqWlcjrk70mCpi3hE9dWY8f1 JxTpZXmwGTcS+GtEhM3Lubzxe7iBEMg6il3sc08vZ2iw+mv/YQbRNY/latpVRTROFaNj /BLeY2cPIo4rUTa8Ej18qgjRFCQkblo4NNx3Oq7dVN553G2NjMpZSuWlOT212vIytJRF mLO/9YDWqQj0O2qDP2SqtTvGssW4GYt91axlMiuht89JetsVoLVxyXoUSngThXo2aJxf WksNVuoUdZmrMUV/NwMxfCAIq+boOU0fyjt4WHrWJzpgJ2vNNBGAzgBNHC48PthEwizY B8SA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Gc+D7SdE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f6si9629442otq.50.2020.03.24.07.44.05; Tue, 24 Mar 2020 07:44:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Gc+D7SdE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727852AbgCXOnm (ORCPT + 99 others); Tue, 24 Mar 2020 10:43:42 -0400 Received: from mail.kernel.org ([198.145.29.99]:42868 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727464AbgCXOnl (ORCPT ); Tue, 24 Mar 2020 10:43:41 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C0F0C2074D; Tue, 24 Mar 2020 14:43:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1585061021; bh=YGLNP/IXNHSdlNivc3mGScmLK2wHsHCBGrFUSV8D1/8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Gc+D7SdE/ud/v+FUvrfzIHLDg8P0l+lMONFjhoG9pzIjxogZ/4nwiVstBhi4nzXAs dSgVLcFjPgl9j44S0ghS907EjBOcbbsTltVjKaUpphLgAXbbqQZThMelpSga4K7hTN 2OcoTeOA2GPzhoWR20lv8p26kC1o/3cXn24UyYRY= Date: Tue, 24 Mar 2020 15:43:38 +0100 From: Greg KH To: Mark Salyzyn Cc: stable , Android Kernel Team , LKML Subject: Re: locks use-after-free stable request Message-ID: <20200324144338.GA2507446@kroah.com> References: <52be02d3-3a6a-c8b8-4177-5cc1d67aedd4@android.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <52be02d3-3a6a-c8b8-4177-5cc1d67aedd4@android.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 24, 2020 at 07:24:49AM -0700, Mark Salyzyn wrote: > Referencing upstream fixes commit dcf23ac3e846ca0cf626c155a0e3fcbbcf4fae8a > ("locks: reinstate locks_delete_block optimization") and commit > 6d390e4b5d48ec03bb87e63cf0a2bff5f4e116da ("locks: fix a potential > use-after-free problem when wakeup a waiter") and possibly address > CVE-2019-19769. > > Please apply to all relevant stable trees including 5.4, 4.19 and below. > Confirmed they apply cleanly to 5.4 and 4.19. > > > Signed-off-by: Mark Salyzyn > > Cc: stable@vger.kernel.org > > Cc: linux-kernel@vger.kernel.org > > Cc: kernel-team@android.com > These are all queued up for the next round of 5.4 and 5.5 stable releases,but they do not seem to apply to 4.19. And why do you think they apply to 4.19, that's not what 6d390e4b5d48 ("locks: fix a potential use-after-free problem when wakeup a waiter") says. confused, greg k-h