~apparmor-dev/apparmor-kernel/+git/apparmor-kernel:v6.5-apparmor-mantic-bug-fixes
- Git
- lp:~apparmor-dev/apparmor-kernel/+git/apparmor-kernel
- v6.5-apparmor-mantic-bug-fixes
- Get this branch:
-
git clone
-b v6.5-apparmor-mantic-bug-fixes
https://git.launchpad.net/~apparmor-dev/apparmor-kernel/+git/apparmor-kernel
Branch merges
Related source package recipes
Branch information
- Name:
- v6.5-apparmor-mantic-bug-fixes
Recent commits
- f472950... by John Johansen
-
UBUNTU: SAUCE: apparmor: open userns related sysctl so lxc can check if restriction are in place
BugLink: http://
bugs.launchpad. net/bugs/ 2040194
https://github. com/canonical/ lxd/issues/ 11920#issuecomm ent-1756110109 lxc and lxd currently need to determine if the apparmor restriction
on unprivileged user namespaces are being enforced, so that apparmor
restrictions won't break lxc/d, and they won't clutter the logs
by doing something likeunshare true
to test if the restrictions are being enforced.
Ideally access to this information would be restricted so that any
unknown access would be logged, but lxc/d currently aren't ready for
this so in order to _not_ force lxc/d to probe whether enforcement is
enabled, open up read access to the sysctls for unprivileged user
namespace mediation.Signed-off-by: John Johansen <email address hidden>
- b542501... by John Johansen
-
UBUNTU: SAUCE: apparmor: fix request field from a prompt reply that denies all access
BugLink: http://
bugs.launchpad. net/bugs/ 2040192 A reply to a prompt request that denies all permissions requested will
throw the following warning, because the auditing code does not expect
the request field to be empty when generating the audit message.Sep 27 22:48:14 ubuntu-mantic snapd[596]: listener.go:189: Sending access response back to kernel: {MsgNotificatio
n:{MsgHeader: {Length: 0 Version:0} NotificationTyp e:APPARMOR_ NOTIF_RESP Signalled:0 NoCache:1 ID:2 Error:0} Error:-13 Allow:0 Deny:4}
Sep 27 22:48:14 ubuntu-mantic kernel: ------------[ cut here ]------------
Sep 27 22:48:14 ubuntu-mantic kernel: AppArmor WARN aa_audit_file: ((!ad.request)):
Sep 27 22:48:14 ubuntu-mantic kernel: WARNING: CPU: 3 PID: 2082 at security/apparmor/ file.c: 268 aa_audit_ file+0x2b1/ 0x310
Sep 27 22:48:14 ubuntu-mantic kernel: Modules linked in: snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore binfmt_misc nls_iso8859_1 kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 aesni_intel virtio_gpu crypto_simd cryptd virtio_dma_buf drm_shmem_helper 9pnet_virtio drm_kms_helper 9pnet vmw_vsock_virtio_ transport virtio_input vmw_vsock_ virtio_ transport_ common input_leds joydev serio_raw vsock msr parport_pc ppdev lp parport drm virtiofs efi_pstore ip_tables x_tables autofs4 virtio_net xhci_pci ahci psmouse net_failover libahci xhci_pci_renesas failover virtio_rng
Sep 27 22:48:14 ubuntu-mantic kernel: CPU: 3 PID: 2082 Comm: bash Not tainted 6.5.0-5-generic #5+aa4.0.0+debug5- Ubuntu
Sep 27 22:48:14 ubuntu-mantic kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS unknown 2/2/2022
Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0010:aa_audit_file+ 0x2b1/0x310
Sep 27 22:48:14 ubuntu-mantic kernel: Code: 3c ff ff ff e8 80 6f a8 ff 44 8b 95 3c ff ff ff 5a 59 e9 e3 fe ff ff 48 c7 c6 98 5c 08 84 48 c7 c7 90 1a 60 84 e8 9f da 9d ff <0f> 0b 8b 85 78 ff ff ff e9 05 ff ff ff 48 89 de 4c 89 f7 e8 b7 f5
Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 0018:ffffb66a82b57968 EFLAGS: 00010246
Sep 27 22:48:14 ubuntu-mantic kernel: RAX: 0000000000000000 RBX: ffffb66a82b57b24 RCX: 0000000000000000
Sep 27 22:48:14 ubuntu-mantic kernel: RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
Sep 27 22:48:14 ubuntu-mantic kernel: RBP: ffffb66a82b57a30 R08: 0000000000000000 R09: 0000000000000000
Sep 27 22:48:14 ubuntu-mantic kernel: R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
Sep 27 22:48:14 ubuntu-mantic kernel: R13: ffff8b160239d800 R14: ffffb66a82b57970 R15: 0000000000000001
Sep 27 22:48:14 ubuntu-mantic kernel: FS: 00007f1f7d3b3380(0000) GS:ffff8b17778c 0000(0000) knlGS:000000000 0000000
Sep 27 22:48:14 ubuntu-mantic kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Sep 27 22:48:14 ubuntu-mantic kernel: CR2: 000055d4482063f0 CR3: 0000000137e64000 CR4: 0000000000750ee0
Sep 27 22:48:14 ubuntu-mantic kernel: PKRU: 55555554
Sep 27 22:48:14 ubuntu-mantic kernel: Call Trace:
Sep 27 22:48:14 ubuntu-mantic kernel: <TASK>
Sep 27 22:48:14 ubuntu-mantic kernel: ? show_regs+0x6d/0x80
Sep 27 22:48:14 ubuntu-mantic kernel: ? __warn+0x89/0x160
Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/ 0x310
Sep 27 22:48:14 ubuntu-mantic kernel: ? report_bug+0x17e/ 0x1b0
Sep 27 22:48:14 ubuntu-mantic kernel: ? handle_bug+0x51/ 0xa0
Sep 27 22:48:14 ubuntu-mantic kernel: ? exc_invalid_op+0x18/ 0x80
Sep 27 22:48:14 ubuntu-mantic kernel: ? asm_exc_invalid_ op+0x1b/ 0x20
Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/ 0x310
Sep 27 22:48:14 ubuntu-mantic kernel: ? aa_audit_file+0x2b1/ 0x310
Sep 27 22:48:14 ubuntu-mantic kernel: __aa_path_perm+0xaf/ 0x130
Sep 27 22:48:14 ubuntu-mantic kernel: aa_path_perm+0xf1/ 0x1c0
Sep 27 22:48:14 ubuntu-mantic kernel: apparmor_file_open+ 0x1bb/0x2e0
Sep 27 22:48:14 ubuntu-mantic kernel: security_file_open+ 0x2e/0x60
Sep 27 22:48:14 ubuntu-mantic kernel: do_dentry_open+0x10d/ 0x530
Sep 27 22:48:14 ubuntu-mantic kernel: vfs_open+0x33/0x50
Sep 27 22:48:14 ubuntu-mantic kernel: do_open+0x2ed/0x470
Sep 27 22:48:14 ubuntu-mantic kernel: ? path_init+0x59/0x3d0
Sep 27 22:48:14 ubuntu-mantic kernel: path_openat+0x135/0x2d0
Sep 27 22:48:14 ubuntu-mantic kernel: ? _raw_spin_unlock+ 0xe/0x40
Sep 27 22:48:14 ubuntu-mantic kernel: do_filp_open+0xaf/ 0x170
Sep 27 22:48:14 ubuntu-mantic kernel: do_sys_openat2+ 0xb3/0xe0
Sep 27 22:48:14 ubuntu-mantic kernel: __x64_sys_openat+ 0x55/0xa0
Sep 27 22:48:14 ubuntu-mantic kernel: do_syscall_64+0x59/ 0x90
Sep 27 22:48:14 ubuntu-mantic kernel: ? handle_mm_fault+ 0xad/0x360
Sep 27 22:48:14 ubuntu-mantic kernel: ? do_user_addr_fault+ 0x238/0x6b0
Sep 27 22:48:14 ubuntu-mantic kernel: ? exit_to_user_mode_ prepare+ 0x30/0xb0
Sep 27 22:48:14 ubuntu-mantic kernel: ? irqentry_exit_to_ user_mode+ 0x17/0x20
Sep 27 22:48:14 ubuntu-mantic kernel: ? irqentry_exit+0x43/ 0x50
Sep 27 22:48:14 ubuntu-mantic kernel: ? exc_page_fault+0x94/ 0x1b0
Sep 27 22:48:14 ubuntu-mantic kernel: entry_SYSCALL_64_after_ hwframe+ 0x6e/0xd8
Sep 27 22:48:14 ubuntu-mantic kernel: RIP: 0033:0x7f1f7d4cdbcc
Sep 27 22:48:14 ubuntu-mantic kernel: Code: 24 18 31 c0 41 83 e2 40 75 44 89 f0 25 00 00 41 00 3d 00 00 41 00 74 36 44 89 c2 4c 89 ce bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 44 48 8b 54 24 18 64 48 2b 14 25 28 00 00 00
Sep 27 22:48:14 ubuntu-mantic kernel: RSP: 002b:00007fff2a1d1280 EFLAGS: 00000287 ORIG_RAX: 0000000000000101
Sep 27 22:48:14 ubuntu-mantic kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1f7d4cdbcc
Sep 27 22:48:14 ubuntu-mantic kernel: RDX: 0000000000090800 RSI: 000055b5d4043c40 RDI: 00000000ffffff9c
Sep 27 22:48:14 ubuntu-mantic kernel: RBP: 000055b5d4043c40 R08: 0000000000090800 R09: 000055b5d4043c40
Sep 27 22:48:14 ubuntu-mantic kernel: R10: 0000000000000000 R11: 0000000000000287 R12: 000055b5d4043c20
Sep 27 22:48:14 ubuntu-mantic kernel: R13: 000055b5d34637f8 R14: 000055b5d4043c00 R15: 000055b5d40436a0
Sep 27 22:48:14 ubuntu-mantic kernel: </TASK>
Sep 27 22:48:14 ubuntu-mantic kernel: ---[ end trace 0000000000000000 ]---Note: this does not change the mediation, it just ensures the assert in
the audit path does not trigger, polluting dmesg and the kernel audit log.Signed-off-by: John Johansen <email address hidden>
- f919b63... by John Johansen
-
UBUNTU: SAUCE: apparmor: fix notification header size
BugLink: https:/
/bugs.launchpad .net/bugs/ 2040250 When strings are appended to the notification the header size should
be updated to reflect the correct size. While the size is also
directly returned as part of delivering the notification, the header
should also be update to conform to specification and allow for
verification.If verification is enabled and the notification contains appended
strings then notifications fail verification and won't be delivered.Fixes: 9a3b87d8b9a0 ("UBUNTU: SAUCE: apparmor4.0.0 [64/76]: prompt - rework build to use append fn, to simplify adding strings")
Signed-off-by: John Johansen <email address hidden> - efdd5da... by John Johansen
-
UBUNTU: SAUCE: apparmor: fix oops when racing to retrieve notification
BugLink: https:/
/bugs.launchpad .net/bugs/ 2040245 When there is a race to receive a notification, the failing tasks
oopes when erroring[ 196.140988] BUG: kernel NULL pointer dereference, address: 0000000000000000
[ 196.140995] #PF: supervisor read access in kernel mode
[ 196.140996] #PF: error_code(0x0000) - not-present page
[ 196.140997] PGD 0 P4D 0
[ 196.140999] Oops: 0000 [#1] PREEMPT SMP NOPTI
[ 196.141001] CPU: 0 PID: 2316 Comm: aa-prompt Not tainted 6.5.0-9-generic #9-Ubuntu
[ 196.141004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
[ 196.141005] RIP: 0010:aa_listener_ unotif_ recv+0x11d/ 0x260
[ 196.141011] Code: ff ff ff 8b 55 d0 48 8b 75 c8 4c 89 ef e8 6b db ff ff 49 89 c2 48 85 c0 0f 88 c0 00 00 00 0f 84 25 ff ff ff 8b 05 3b 1c 1f 03 <49> 8b 55 00 83 e0 20 83 7a 08 07 74 66 85 c0 0f 85 01 01 00 00 48
[ 196.141012] RSP: 0018:ffffa2674075fdd8 EFLAGS: 00010246
[ 196.141014] RAX: 0000000000000000 RBX: ffff974507a08404 RCX: 0000000000000000
[ 196.141017] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 196.141017] RBP: ffffa2674075fe10 R08: 0000000000000000 R09: 0000000000000000
[ 196.141018] R10: fffffffffffffffe R11: 0000000000000000 R12: ffff974507a08400
[ 196.141019] R13: 0000000000000000 R14: ffff974507a08430 R15: ffff97451de00a00
[ 196.141020] FS: 00007f4ab6b30740(0000) GS:ffff97486fa0 0000(0000) knlGS:000000000 0000000
[ 196.141022] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 196.141024] CR2: 0000000000000000 CR3: 0000000104cf2003 CR4: 0000000000770ef0
[ 196.141026] PKRU: 55555554
[ 196.141027] Call Trace:
[ 196.141032] <TASK>
[ 196.141034] ? show_regs+0x6d/0x80
[ 196.141041] ? __die+0x24/0x80
[ 196.141043] ? page_fault_oops+0x99/ 0x1b0
[ 196.141047] ? do_user_addr_fault+ 0x316/0x6b0
[ 196.141048] ? filemap_map_pages+ 0x2b3/0x460
[ 196.141056] ? exc_page_fault+0x83/ 0x1b0
[ 196.141068] ? asm_exc_page_fault+ 0x27/0x30
[ 196.141079] ? aa_listener_unotif_ recv+0x11d/ 0x260
[ 196.141081] ? aa_listener_unotif_ recv+0x184/ 0x260
[ 196.141083] listener_ioctl+0x1e1/ 0x260
[ 196.141088] __x64_sys_ioctl+0xa0/ 0xf0
[ 196.141092] do_syscall_64+0x59/ 0x90
[ 196.141094] ? do_user_addr_fault+ 0x238/0x6b0
[ 196.141095] ? exit_to_user_mode_ prepare+ 0x30/0xb0
[ 196.141100] ? irqentry_exit_to_ user_mode+ 0x17/0x20
[ 196.141104] ? irqentry_exit+0x43/ 0x50
[ 196.141106] ? exc_page_fault+0x94/ 0x1b0
[ 196.141107] entry_SYSCALL_64_after_ hwframe+ 0x6e/0xd8
[ 196.141109] RIP: 0033:0x7f4ab69238ef
[ 196.141124] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
[ 196.141125] RSP: 002b:00007ffd607a9020 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 196.141127] RAX: ffffffffffffffda RBX: 00007ffd607a9100 RCX: 00007f4ab69238ef
[ 196.141128] RDX: 00007ffd607a9100 RSI: 00000000c008f804 RDI: 0000000000000003
[ 196.141128] RBP: 0000000000000003 R08: 0000000000000001 R09: 00007f4ab6b30740
[ 196.141129] R10: 00007f4ab6b7f0a0 R11: 0000000000000246 R12: 00007ffd607a90a0
[ 196.141130] R13: 00007ffd607a90dc R14: 0000559564822c10 R15: 0000000000031000
[ 196.141131] </TASK>
[ 196.141132] Modules linked in: snd_seq_dummy snd_hrtimer binfmt_misc nls_iso8859_1 intel_rapl_msr intel_rapl_common snd_hda_codec_generic ledtrig_audio snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep snd_pcm kvm_intel snd_seq_midi snd_seq_midi_event kvm irqbypass crct10dif_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel aesni_intel crypto_simd cryptd rapl joydev snd_rawmidi snd_seq i2c_i801 i2c_smbus snd_seq_device snd_timer qxl snd drm_ttm_helper lpc_ich soundcore ttm 9pnet_virtio 9pnet drm_kms_helper input_leds mac_hid serio_raw nfsd msr parport_pc auth_rpcgss ppdev nfs_acl lockd grace lp parport drm efi_pstore sunrpc dmi_sysfs qemu_fw_cfg ip_tables x_tables autofs4 hid_generic usbhid hid ahci crc32_pclmul psmouse xhci_pci libahci virtio_rng xhci_pci_renesas
[ 196.141188] CR2: 0000000000000000
[ 196.141190] ---[ end trace 0000000000000000 ]---Fixes: e07417682502 ("UBUNTU: SAUCE: apparmor4.0.0 [61/76]: prompt - refactor to moving caching to uresponse")
Signed-off-by: John Johansen <email address hidden> - 8ef5689... by Tim Gardner
-
UBUNTU: [Config] CONFIG_
DM_VERITY_ VERIFY_ ROOTHASH_ SIG_SECONDARY_ KEYRING= y BugLink: https:/
/bugs.launchpad .net/bugs/ 2019040 Signed-off-by: Tim Gardner <email address hidden>
Acked-by: Andrei Gherzan <email address hidden>
Acked-by: Tim Gardner <email address hidden>
Signed-off-by: Stefan Bader <email address hidden> - 39123de... by Kai-Heng Feng
-
power: supply: core: Use blocking_
notifier_ call_chain to avoid RCU complaint BugLink: https:/
/bugs.launchpad .net/bugs/ 2036377 AMD PMF driver can cause the following warning:
[ 196.159546] ------------[ cut here ]------------
[ 196.159556] Voluntary context switch within RCU read-side critical section!
[ 196.159571] WARNING: CPU: 0 PID: 9 at kernel/rcu/tree_ plugin. h:320 rcu_note_ context_ switch+ 0x43d/0x560
[ 196.159604] Modules linked in: nvme_fabrics ccm rfcomm snd_hda_scodec_ cs35l41_ spi cmac algif_hash algif_skcipher af_alg bnep joydev btusb btrtl uvcvideo btintel btbcm videobuf2_vmalloc intel_rapl_msr btmtk videobuf2_memops uvc videobuf2_v4l2 intel_rapl_common binfmt_misc hid_sensor_als snd_sof_amd_vangogh hid_sensor_trigger bluetooth industrialio_ triggered_ buffer videodev snd_sof_ amd_rembrandt hid_sensor_ iio_common amdgpu ecdh_generic kfifo_buf videobuf2_common hp_wmi kvm_amd sparse_keymap snd_sof_amd_renoir wmi_bmof industrialio ecc mc nls_iso8859_1 kvm snd_sof_amd_acp irqbypass snd_sof_xtensa_dsp crct10dif_pclmul crc32_pclmul mt7921e snd_sof_pci snd_ctl_led polyval_clmulni mt7921_common polyval_generic snd_sof ghash_clmulni_intel mt792x_lib mt76_connac_lib sha512_ssse3 snd_sof_utils aesni_intel snd_hda_ codec_realtek crypto_simd mt76 snd_hda_ codec_generic cryptd snd_soc_core snd_hda_codec_hdmi rapl ledtrig_audio input_leds snd_compress i2c_algo_bit drm_ttm_helper mac80211 snd_pci_ps hid_multitouch ttm drm_exec
[ 196.159970] drm_suballoc_helper snd_rpl_pci_acp6x amdxcp drm_buddy snd_hda_intel snd_acp_pci snd_hda_scodec_ cs35l41_ i2c serio_raw gpu_sched snd_hda_ scodec_ cs35l41 snd_acp_ legacy_ common snd_intel_dspcfg snd_hda_cs_dsp_ctls snd_hda_codec libarc4 drm_display_helper snd_pci_acp6x cs_dsp snd_hwdep snd_soc_cs35l41_lib video k10temp snd_pci_acp5x thunderbolt snd_hda_core drm_kms_helper cfg80211 snd_seq snd_rn_pci_acp3x snd_pcm snd_acp_config cec snd_soc_acpi snd_seq_device rc_core ccp snd_pci_acp3x snd_timer snd soundcore wmi amd_pmf platform_profile amd_pmc mac_hid serial_ multi_instantia te wireless_hotkey hid_sensor_hub sch_fq_codel msr parport_pc ppdev lp parport efi_pstore ip_tables x_tables autofs4 btrfs blake2b_generic raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx libcrc32c xor raid6_pq raid1 raid0 multipath linear dm_mirror dm_region_hash dm_log cdc_ether usbnet r8152 mii hid_generic nvme i2c_hid_acpi i2c_hid nvme_core i2c_piix4 xhci_pci amd_sfh drm xhci_pci_renesas nvme_common hid
[ 196.160382] CPU: 0 PID: 9 Comm: kworker/0:1 Not tainted 6.6.0-rc1 #4
[ 196.160397] Hardware name: HP HP EliteBook 845 14 inch G10 Notebook PC/8B6E, BIOS V82 Ver. 01.02.00 08/24/2023
[ 196.160405] Workqueue: events power_supply_changed_ work
[ 196.160426] RIP: 0010:rcu_note_context_ switch+ 0x43d/0x560
[ 196.160440] Code: 00 48 89 be 40 08 00 00 48 89 86 48 08 00 00 48 89 10 e9 63 fe ff ff 48 c7 c7 10 e7 b0 9e c6 05 e8 d8 20 02 01 e8 13 0f f3 ff <0f> 0b e9 27 fc ff ff a9 ff ff ff 7f 0f 84 cf fc ff ff 65 48 8b 3c
[ 196.160450] RSP: 0018:ffffc900001878f0 EFLAGS: 00010046
[ 196.160462] RAX: 0000000000000000 RBX: ffff88885e834040 RCX: 0000000000000000
[ 196.160470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 196.160476] RBP: ffffc90000187910 R08: 0000000000000000 R09: 0000000000000000
[ 196.160482] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[ 196.160488] R13: 0000000000000000 R14: ffff888100990000 R15: ffff888100990000
[ 196.160495] FS: 0000000000000000(0000) GS:ffff88885e80 0000(0000) knlGS:000000000 0000000
[ 196.160504] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 196.160512] CR2: 000055cb053c8246 CR3: 000000013443a000 CR4: 0000000000750ef0
[ 196.160520] PKRU: 55555554
[ 196.160526] Call Trace:
[ 196.160532] <TASK>
[ 196.160548] ? show_regs+0x72/0x90
[ 196.160570] ? rcu_note_context_ switch+ 0x43d/0x560
[ 196.160580] ? __warn+0x8d/0x160
[ 196.160600] ? rcu_note_context_ switch+ 0x43d/0x560
[ 196.160613] ? report_bug+0x1bb/ 0x1d0
[ 196.160637] ? handle_bug+0x46/ 0x90
[ 196.160658] ? exc_invalid_op+0x19/ 0x80
[ 196.160675] ? asm_exc_invalid_ op+0x1b/ 0x20
[ 196.160709] ? rcu_note_context_ switch+ 0x43d/0x560
[ 196.160727] __schedule+0xb9/0x15f0
[ 196.160746] ? srso_alias_return_ thunk+0x5/ 0x7f
[ 196.160765] ? srso_alias_return_ thunk+0x5/ 0x7f
[ 196.160778] ? acpi_ns_search_ one_scope+ 0xbe/0x270
[ 196.160806] schedule+0x68/0x110
[ 196.160820] schedule_timeout+ 0x151/0x160
[ 196.160829] ? srso_alias_return_ thunk+0x5/ 0x7f
[ 196.160842] ? srso_alias_return_ thunk+0x5/ 0x7f
[ 196.160855] ? acpi_ns_lookup+ 0x3c5/0xa90
[ 196.160878] __down_common+ 0xff/0x220
[ 196.160905] __down_timeout+ 0x16/0x30
[ 196.160920] down_timeout+0x64/0x70
[ 196.160938] acpi_os_wait_semaphore+ 0x85/0x200
[ 196.160959] acpi_ut_acquire_ mutex+0x9e/ 0x280
[ 196.160979] acpi_ex_enter_interpret er+0x2d/ 0xb0
[ 196.160992] acpi_ns_evaluate+ 0x2f0/0x5f0
[ 196.161005] acpi_evaluate_object+ 0x172/0x490
[ 196.161018] ? acpi_os_signal_ semaphore+ 0x8a/0xd0
[ 196.161038] acpi_evaluate_integer+ 0x52/0xe0
[ 196.161055] ? kfree+0x79/0x120
[ 196.161071] ? srso_alias_return_ thunk+0x5/ 0x7f
[ 196.161089] acpi_ac_get_state. part.0+ 0x27/0x80
[ 196.161110] get_ac_property+ 0x5c/0x70
[ 196.161127] ? __pfx___power_ supply_ is_system_ supplied+ 0x10/0x10
[ 196.161146] __power_supply_ is_system_ supplied+ 0x44/0xb0
[ 196.161166] class_for_each_device+ 0x124/0x160
[ 196.161184] ? acpi_ac_get_state. part.0+ 0x27/0x80
[ 196.161203] ? srso_alias_return_ thunk+0x5/ 0x7f
[ 196.161223] power_supply_is_system_ supplied+ 0x3c/0x70
[ 196.161243] amd_pmf_get_power_ source+ 0xe/0x20 [amd_pmf]
[ 196.161276] amd_pmf_power_slider_ update_ event+0x49/ 0x90 [amd_pmf]
[ 196.161310] amd_pmf_pwr_src_ notify_ call+0xe7/ 0x100 [amd_pmf]
[ 196.161340] notifier_call_chain+ 0x5f/0xe0
[ 196.161362] atomic_notifier_ call_chain+ 0x33/0x60
[ 196.161378] power_supply_changed_ work+0x84/ 0x110
[ 196.161394] process_one_work+ 0x178/0x360
[ 196.161412] ? __pfx_worker_thread+ 0x10/0x10
[ 196.161424] worker_thread+ 0x307/0x430
[ 196.161440] ? __pfx_worker_thread+ 0x10/0x10
[ 196.161451] kthread+0xf4/0x130
[ 196.161467] ? __pfx_kthread+0x10/0x10
[ 196.161486] ret_from_fork+0x43/ 0x70
[ 196.161502] ? __pfx_kthread+0x10/0x10
[ 196.161518] ret_from_fork_asm+ 0x1b/0x30
[ 196.161558] </TASK>
[ 196.161562] ---[ end trace 0000000000000000 ]---Since there's no guarantee that all the callbacks can work in atomic
context, switch to use blocking_notifier_ call_chain to relax the
constraint.Signed-off-by: Kai-Heng Feng <email address hidden>
Reported-by: Allen Zhong <email address hidden>
Fixes: 4c71ae414474 ("platform/x86/amd/ pmf: Add support SPS PMF feature")
Closes: https://bugzilla. kernel. org/show_ bug.cgi? id=217571
Reviewed-by: Mario Limonciello <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Sebastian Reichel <email address hidden>(cherry picked from commit bbaa6ffa5b6c960
9d3b3c431c389b4 07eea5441f linux-next)
Signed-off-by: Kai-Heng Feng <email address hidden>
Acked-by: Tim Gardner <email address hidden>
Acked-by: Roxana Nicolescu <email address hidden>
Signed-off-by: Stefan Bader <email address hidden> - 8b71952... by Matteo Rizzo <email address hidden>
-
io_uring: add a sysctl to disable io_uring system-wide
BugLink: https:/
/bugs.launchpad .net/bugs/ 2035116 Introduce a new sysctl (io_uring_disabled) which can be either 0, 1, or
2. When 0 (the default), all processes are allowed to create io_uring
instances, which is the current behavior. When 1, io_uring creation is
disabled (io_uring_setup() will fail with -EPERM) for unprivileged
processes not in the kernel.io_uring_ group group. When 2, calls to
io_uring_setup() fail with -EPERM regardless of privilege.Signed-off-by: Matteo Rizzo <email address hidden>
[JEM: modified to add io_uring_group]
Signed-off-by: Jeff Moyer <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Jens Axboe <email address hidden>
(backported from commit 76d3ccecfa186af3120e206d62f03d b1a94a535f)
[cascardo: conflict due to missing b97f96e22f051d59d07a527dbd7d90 408b661ca8]
Signed-off-by: Thadeu Lima de Souza Cascardo <email address hidden>
Acked-by: Cengiz Can <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Signed-off-by: Stefan Bader <email address hidden> - 6542ed6... by Kailiang Yang
-
ALSA: hda/realtek - ALC287 I2S speaker platform support
BugLink: https:/
/bugs.launchpad .net/bugs/ 2037077 0x17 was only speaker pin, DAC assigned will be 0x03. Headphone
assigned to 0x02.
Playback via headphone will get EQ filter processing. So,it needs to
swap DAC.Tested-by: Mark Pearson <email address hidden>
Signed-off-by: Kailang Yang <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Takashi Iwai <email address hidden>
(backported from commit e43252db7e207a2e194e6a4883a43a 31a776a968)
[ AaronMa: Adjusted for minor context ]
Signed-off-by: Aaron Ma <email address hidden>
Acked-by: Tim Gardner <email address hidden>
Acked-by: Roxana Nicolescu <email address hidden>
Signed-off-by: Roxana Nicolescu <email address hidden> - 9c6c455... by Stefan Bader
-
UBUNTU: Ubuntu-6.5.0-10.10
Signed-off-by: Stefan Bader <email address hidden>
- 7bc06ca... by Stefan Bader
-
UBUNTU: link-to-tracker: update tracking bug
BugLink: https:/
/bugs.launchpad .net/bugs/ 2039204
Properties: no-test-build
Signed-off-by: Stefan Bader <email address hidden>