[PATCH 3/3] ARM: vfp: Use vfp_lock() in vfp_entry().

Ard Biesheuvel ardb at kernel.org
Tue Jun 27 06:26:16 PDT 2023


On Tue, 27 Jun 2023 at 15:22, Russell King (Oracle)
<linux at armlinux.org.uk> wrote:
>
> On Tue, Jun 27, 2023 at 03:06:02PM +0200, Sebastian Andrzej Siewior wrote:
> > On 2023-06-27 14:57:38 [+0200], Ard Biesheuvel wrote:
> > >
> > > OK, so would it make sense to split this off into a separate patch,
> > > and combine all the vfp_lock/unlock replacements into a second patch.
> >
> > If you want I can split it. Given that the code in v6.1 looks different,
> > I'm not sure if I can apply it as-it or need to adapt it anyway.
> >
> > > Note that Russell didn't pull my VFP work so it won't be landing in v6.5.
> > Good, or not. Please keep me in the loop if you repost so I can rebase
> > accordingly if needed.
>
> Probably a good thing if the problem you have is caused by Ard's
> series...

No, they are independent. Note that PREEMPT_RT for ARM is not in
mainline, so this is not a regression of any kind for mainline itself.

I suggested to Sebastian to rebase his changes on top of my PR, but
that seems to have fallen between the cracks.

> as the patch system is down for the long term until Debian
> fix their mariadb security regression which prevents a server requiring
> a minimum of TLS v1.2 accepting connections from Debian Bookworm
> systems (which regress from supporting TLS v1.3 to a maximum of TLS
> v1.1).
>
> I reported this as a bug to the debian BTS last week, and as I have
> come to expect from useless waste of space distro bug tracking systems,
> there has been zero reaction - and as the bug has already been reported
> by others, and they've been fobbed off by the package maintainer, I am
> not hopeful that this regression will ever be fixed.
>
> It seems to me that Debian is ripe for having a CVE raised against
> Bookworm for the regression, especially as TLS v1.1 is now regarded
> as vulnerable due to downgrade attacks - and maybe that will make
> Debian sit up and take notice.
>

Does this mean the ARM tree is closed for business a the moment? Is
there no way to carry on without the patch system?



More information about the linux-arm-kernel mailing list