** Description changed:
- SRU Justification
[Impact]
-
- Out of order reads can fetch a NULL pointer causing a kernel crash.
- Affects kernels from v4.15 to v5.11.
+ * Out of order reads can fetch a NULL pointer causing a kernel crash. Affects
kernels from v4.15 to v5.11.
[Fix]
+ * commit 84a24bf8c52e ("locking/qrwlock: Fix ordering in
queued_write_lock_slowpath()")
- commit 84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896 ("locking/qrwlock: Fix
- ordering in queued_write_lock_slowpath()")
+ * For Bionic, we also require an additional patch: commit fcfdfe30e324
+ ("locking/barriers: Introduce smp_cond_load_relaxed() and
+ atomic_cond_read_relaxed()")
[Where problems could occur]
- This is quite a subtle bug. It is more prevalent on arm64. Regression
+ * This is quite a subtle bug. It is more prevalent on arm64. Regression
possibility seems quite low. The worst impact could be a minor performance
degradation.
** Description changed:
-
[Impact]
* Out of order reads can fetch a NULL pointer causing a kernel crash. Affects
kernels from v4.15 to v5.11.
[Fix]
* commit 84a24bf8c52e ("locking/qrwlock: Fix ordering in
queued_write_lock_slowpath()")
* For Bionic, we also require an additional patch: commit fcfdfe30e324
("locking/barriers: Introduce smp_cond_load_relaxed() and
atomic_cond_read_relaxed()")
[Where problems could occur]
* This is quite a subtle bug. It is more prevalent on arm64. Regression
possibility seems quite low. The worst impact could be a minor performance
degradation.
+
+ * Kernels 4.15 / 5.4 / 5.8 / 5.11 were successfully built and booted
+ with this patch. Also, by using ftrace we could see that the changed
+ function was executed with success multiple times.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926184
Title:
locking/qrwlock: Fix ordering in queued_write_lock_slowpath()
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1926184/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs