From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
patches@lists.linux.dev, Mike Freemon <mfreemon@cloudflare.com>,
Eric Dumazet <edumazet@google.com>,
"David S. Miller" <davem@davemloft.net>,
Sasha Levin <sashal@kernel.org>
Subject: [PATCH 6.1 067/131] tcp: enforce receive buffer memory limits by allowing the tcp window to shrink
Date: Mon, 16 Oct 2023 10:40:50 +0200 [thread overview]
Message-ID: <20231016084001.732118317@linuxfoundation.org> (raw)
In-Reply-To: <20231016084000.050926073@linuxfoundation.org>
6.1-stable review patch. If anyone has any objections, please let me know.
------------------
From: mfreemon@cloudflare.com <mfreemon@cloudflare.com>
[ Upstream commit b650d953cd391595e536153ce30b4aab385643ac ]
Under certain circumstances, the tcp receive buffer memory limit
set by autotuning (sk_rcvbuf) is increased due to incoming data
packets as a result of the window not closing when it should be.
This can result in the receive buffer growing all the way up to
tcp_rmem[2], even for tcp sessions with a low BDP.
To reproduce: Connect a TCP session with the receiver doing
nothing and the sender sending small packets (an infinite loop
of socket send() with 4 bytes of payload with a sleep of 1 ms
in between each send()). This will cause the tcp receive buffer
to grow all the way up to tcp_rmem[2].
As a result, a host can have individual tcp sessions with receive
buffers of size tcp_rmem[2], and the host itself can reach tcp_mem
limits, causing the host to go into tcp memory pressure mode.
The fundamental issue is the relationship between the granularity
of the window scaling factor and the number of byte ACKed back
to the sender. This problem has previously been identified in
RFC 7323, appendix F [1].
The Linux kernel currently adheres to never shrinking the window.
In addition to the overallocation of memory mentioned above, the
current behavior is functionally incorrect, because once tcp_rmem[2]
is reached when no remediations remain (i.e. tcp collapse fails to
free up any more memory and there are no packets to prune from the
out-of-order queue), the receiver will drop in-window packets
resulting in retransmissions and an eventual timeout of the tcp
session. A receive buffer full condition should instead result
in a zero window and an indefinite wait.
In practice, this problem is largely hidden for most flows. It
is not applicable to mice flows. Elephant flows can send data
fast enough to "overrun" the sk_rcvbuf limit (in a single ACK),
triggering a zero window.
But this problem does show up for other types of flows. Examples
are websockets and other type of flows that send small amounts of
data spaced apart slightly in time. In these cases, we directly
encounter the problem described in [1].
RFC 7323, section 2.4 [2], says there are instances when a retracted
window can be offered, and that TCP implementations MUST ensure
that they handle a shrinking window, as specified in RFC 1122,
section 4.2.2.16 [3]. All prior RFCs on the topic of tcp window
management have made clear that sender must accept a shrunk window
from the receiver, including RFC 793 [4] and RFC 1323 [5].
This patch implements the functionality to shrink the tcp window
when necessary to keep the right edge within the memory limit by
autotuning (sk_rcvbuf). This new functionality is enabled with
the new sysctl: net.ipv4.tcp_shrink_window
Additional information can be found at:
https://blog.cloudflare.com/unbounded-memory-usage-by-tcp-for-receive-buffers-and-how-we-fixed-it/
[1] https://www.rfc-editor.org/rfc/rfc7323#appendix-F
[2] https://www.rfc-editor.org/rfc/rfc7323#section-2.4
[3] https://www.rfc-editor.org/rfc/rfc1122#page-91
[4] https://www.rfc-editor.org/rfc/rfc793
[5] https://www.rfc-editor.org/rfc/rfc1323
Signed-off-by: Mike Freemon <mfreemon@cloudflare.com>
Reviewed-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
Documentation/networking/ip-sysctl.rst | 15 +++++++
include/net/netns/ipv4.h | 1 +
net/ipv4/sysctl_net_ipv4.c | 9 ++++
net/ipv4/tcp_ipv4.c | 2 +
net/ipv4/tcp_output.c | 60 ++++++++++++++++++++++----
5 files changed, 78 insertions(+), 9 deletions(-)
diff --git a/Documentation/networking/ip-sysctl.rst b/Documentation/networking/ip-sysctl.rst
index f5f7a464605f9..b47b3d0ce5596 100644
--- a/Documentation/networking/ip-sysctl.rst
+++ b/Documentation/networking/ip-sysctl.rst
@@ -967,6 +967,21 @@ tcp_tw_reuse - INTEGER
tcp_window_scaling - BOOLEAN
Enable window scaling as defined in RFC1323.
+tcp_shrink_window - BOOLEAN
+ This changes how the TCP receive window is calculated.
+
+ RFC 7323, section 2.4, says there are instances when a retracted
+ window can be offered, and that TCP implementations MUST ensure
+ that they handle a shrinking window, as specified in RFC 1122.
+
+ - 0 - Disabled. The window is never shrunk.
+ - 1 - Enabled. The window is shrunk when necessary to remain within
+ the memory limit set by autotuning (sk_rcvbuf).
+ This only occurs if a non-zero receive window
+ scaling factor is also in effect.
+
+ Default: 0
+
tcp_wmem - vector of 3 INTEGERs: min, default, max
min: Amount of memory reserved for send buffers for TCP sockets.
Each TCP socket has rights to use it due to fact of its birth.
diff --git a/include/net/netns/ipv4.h b/include/net/netns/ipv4.h
index 1b80046794451..ede2ff1da53a3 100644
--- a/include/net/netns/ipv4.h
+++ b/include/net/netns/ipv4.h
@@ -64,6 +64,7 @@ struct netns_ipv4 {
#endif
bool fib_has_custom_local_routes;
bool fib_offload_disabled;
+ u8 sysctl_tcp_shrink_window;
#ifdef CONFIG_IP_ROUTE_CLASSID
atomic_t fib_num_tclassid_users;
#endif
diff --git a/net/ipv4/sysctl_net_ipv4.c b/net/ipv4/sysctl_net_ipv4.c
index f68762ce4d8a3..73e5821584c18 100644
--- a/net/ipv4/sysctl_net_ipv4.c
+++ b/net/ipv4/sysctl_net_ipv4.c
@@ -1387,6 +1387,15 @@ static struct ctl_table ipv4_net_table[] = {
.extra1 = SYSCTL_ZERO,
.extra2 = SYSCTL_TWO,
},
+ {
+ .procname = "tcp_shrink_window",
+ .data = &init_net.ipv4.sysctl_tcp_shrink_window,
+ .maxlen = sizeof(u8),
+ .mode = 0644,
+ .proc_handler = proc_dou8vec_minmax,
+ .extra1 = SYSCTL_ZERO,
+ .extra2 = SYSCTL_ONE,
+ },
{ }
};
diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c
index f9b8a4a1d2edc..5df19f93f86ab 100644
--- a/net/ipv4/tcp_ipv4.c
+++ b/net/ipv4/tcp_ipv4.c
@@ -3221,6 +3221,8 @@ static int __net_init tcp_sk_init(struct net *net)
else
net->ipv4.tcp_congestion_control = &tcp_reno;
+ net->ipv4.sysctl_tcp_shrink_window = 0;
+
return 0;
}
diff --git a/net/ipv4/tcp_output.c b/net/ipv4/tcp_output.c
index 5921b0f6f9f41..443b1cab25299 100644
--- a/net/ipv4/tcp_output.c
+++ b/net/ipv4/tcp_output.c
@@ -259,8 +259,8 @@ static u16 tcp_select_window(struct sock *sk)
u32 old_win = tp->rcv_wnd;
u32 cur_win = tcp_receive_window(tp);
u32 new_win = __tcp_select_window(sk);
+ struct net *net = sock_net(sk);
- /* Never shrink the offered window */
if (new_win < cur_win) {
/* Danger Will Robinson!
* Don't update rcv_wup/rcv_wnd here or else
@@ -269,11 +269,14 @@ static u16 tcp_select_window(struct sock *sk)
*
* Relax Will Robinson.
*/
- if (new_win == 0)
- NET_INC_STATS(sock_net(sk),
- LINUX_MIB_TCPWANTZEROWINDOWADV);
- new_win = ALIGN(cur_win, 1 << tp->rx_opt.rcv_wscale);
+ if (!READ_ONCE(net->ipv4.sysctl_tcp_shrink_window) || !tp->rx_opt.rcv_wscale) {
+ /* Never shrink the offered window */
+ if (new_win == 0)
+ NET_INC_STATS(net, LINUX_MIB_TCPWANTZEROWINDOWADV);
+ new_win = ALIGN(cur_win, 1 << tp->rx_opt.rcv_wscale);
+ }
}
+
tp->rcv_wnd = new_win;
tp->rcv_wup = tp->rcv_nxt;
@@ -281,7 +284,7 @@ static u16 tcp_select_window(struct sock *sk)
* scaled window.
*/
if (!tp->rx_opt.rcv_wscale &&
- READ_ONCE(sock_net(sk)->ipv4.sysctl_tcp_workaround_signed_windows))
+ READ_ONCE(net->ipv4.sysctl_tcp_workaround_signed_windows))
new_win = min(new_win, MAX_TCP_WINDOW);
else
new_win = min(new_win, (65535U << tp->rx_opt.rcv_wscale));
@@ -293,10 +296,9 @@ static u16 tcp_select_window(struct sock *sk)
if (new_win == 0) {
tp->pred_flags = 0;
if (old_win)
- NET_INC_STATS(sock_net(sk),
- LINUX_MIB_TCPTOZEROWINDOWADV);
+ NET_INC_STATS(net, LINUX_MIB_TCPTOZEROWINDOWADV);
} else if (old_win == 0) {
- NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPFROMZEROWINDOWADV);
+ NET_INC_STATS(net, LINUX_MIB_TCPFROMZEROWINDOWADV);
}
return new_win;
@@ -2949,6 +2951,7 @@ u32 __tcp_select_window(struct sock *sk)
{
struct inet_connection_sock *icsk = inet_csk(sk);
struct tcp_sock *tp = tcp_sk(sk);
+ struct net *net = sock_net(sk);
/* MSS for the peer's data. Previous versions used mss_clamp
* here. I don't know if the value based on our guesses
* of peer's MSS is better for the performance. It's more correct
@@ -2970,6 +2973,15 @@ u32 __tcp_select_window(struct sock *sk)
if (mss <= 0)
return 0;
}
+
+ /* Only allow window shrink if the sysctl is enabled and we have
+ * a non-zero scaling factor in effect.
+ */
+ if (READ_ONCE(net->ipv4.sysctl_tcp_shrink_window) && tp->rx_opt.rcv_wscale)
+ goto shrink_window_allowed;
+
+ /* do not allow window to shrink */
+
if (free_space < (full_space >> 1)) {
icsk->icsk_ack.quick = 0;
@@ -3024,6 +3036,36 @@ u32 __tcp_select_window(struct sock *sk)
}
return window;
+
+shrink_window_allowed:
+ /* new window should always be an exact multiple of scaling factor */
+ free_space = round_down(free_space, 1 << tp->rx_opt.rcv_wscale);
+
+ if (free_space < (full_space >> 1)) {
+ icsk->icsk_ack.quick = 0;
+
+ if (tcp_under_memory_pressure(sk))
+ tcp_adjust_rcv_ssthresh(sk);
+
+ /* if free space is too low, return a zero window */
+ if (free_space < (allowed_space >> 4) || free_space < mss ||
+ free_space < (1 << tp->rx_opt.rcv_wscale))
+ return 0;
+ }
+
+ if (free_space > tp->rcv_ssthresh) {
+ free_space = tp->rcv_ssthresh;
+ /* new window should always be an exact multiple of scaling factor
+ *
+ * For this case, we ALIGN "up" (increase free_space) because
+ * we know free_space is not zero here, it has been reduced from
+ * the memory-based limit, and rcv_ssthresh is not a hard limit
+ * (unlike sk_rcvbuf).
+ */
+ free_space = ALIGN(free_space, (1 << tp->rx_opt.rcv_wscale));
+ }
+
+ return free_space;
}
void tcp_skb_collapse_tstamp(struct sk_buff *skb,
--
2.40.1
next prev parent reply other threads:[~2023-10-16 9:01 UTC|newest]
Thread overview: 152+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-10-16 8:39 [PATCH 6.1 000/131] 6.1.59-rc1 review Greg Kroah-Hartman
2023-10-16 8:39 ` [PATCH 6.1 001/131] net: mana: Fix TX CQE error handling Greg Kroah-Hartman
2023-10-16 14:35 ` Haiyang Zhang
2023-10-16 14:46 ` Greg Kroah-Hartman
2023-10-16 15:35 ` Haiyang Zhang
2023-10-16 17:02 ` Greg Kroah-Hartman
2023-10-16 17:55 ` Haiyang Zhang
2023-10-16 8:39 ` [PATCH 6.1 002/131] mptcp: fix delegated action races Greg Kroah-Hartman
2023-10-16 8:39 ` [PATCH 6.1 003/131] drm/i915: Dont set PIPE_CONTROL_FLUSH_L3 for aux inval Greg Kroah-Hartman
2023-10-16 8:39 ` [PATCH 6.1 004/131] RDMA/cxgb4: Check skb value for failure to allocate Greg Kroah-Hartman
2023-10-16 8:39 ` [PATCH 6.1 005/131] perf/arm-cmn: Fix the unhandled overflow status of counter 4 to 7 Greg Kroah-Hartman
2023-10-16 8:39 ` [PATCH 6.1 006/131] platform/x86: think-lmi: Fix reference leak Greg Kroah-Hartman
2023-10-16 8:39 ` [PATCH 6.1 007/131] platform/x86: hp-wmi:: Mark driver struct with __refdata to prevent section mismatch warning Greg Kroah-Hartman
2023-10-16 8:39 ` [PATCH 6.1 008/131] scsi: Do not rescan devices with a suspended queue Greg Kroah-Hartman
2023-10-16 8:39 ` [PATCH 6.1 009/131] HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect Greg Kroah-Hartman
2023-10-16 8:39 ` [PATCH 6.1 010/131] quota: Fix slow quotaoff Greg Kroah-Hartman
2023-10-16 8:39 ` [PATCH 6.1 011/131] ASoC: amd: yc: Fix non-functional mic on Lenovo 82YM Greg Kroah-Hartman
2023-10-16 8:39 ` [PATCH 6.1 012/131] ata: libata-scsi: Disable scsi device manage_system_start_stop Greg Kroah-Hartman
2023-10-16 8:39 ` [PATCH 6.1 013/131] net: prevent address rewrite in kernel_bind() Greg Kroah-Hartman
2023-10-16 8:39 ` [PATCH 6.1 014/131] arm64: dts: qcom: sm8150: extend the size of the PDC resource Greg Kroah-Hartman
2023-10-16 8:39 ` [PATCH 6.1 015/131] dt-bindings: interrupt-controller: renesas,rzg2l-irqc: Update description for #interrupt-cells property Greg Kroah-Hartman
2023-10-16 8:39 ` [PATCH 6.1 016/131] irqchip: renesas-rzg2l: Fix logic to clear TINT interrupt source Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 017/131] KEYS: trusted: Remove redundant static calls usage Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 018/131] ALSA: usb-audio: Fix microphone sound on Opencomm2 Headset Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 019/131] ALSA: usb-audio: Fix microphone sound on Nexigo webcam Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 020/131] ALSA: hda/realtek: Change model for Intel RVP board Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 021/131] ASoC: SOF: amd: fix for firmware reload failure after playback Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 022/131] ASoC: simple-card-utils: fixup simple_util_startup() error handling Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 023/131] ASoC: Intel: soc-acpi: Add entry for HDMI_In capture support in MTL match table Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 024/131] ASoC: Intel: sof_sdw: add support for SKU 0B14 Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 025/131] ASoC: Intel: soc-acpi: Add entry for sof_es8336 in MTL match table Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 026/131] ASoC: Use of_property_read_bool() for boolean properties Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 027/131] ASoC: fsl_sai: MCLK bind with TX/RX enable bit Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 028/131] ASoC: fsl_sai: Dont disable bitclock for i.MX8MP Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 029/131] ALSA: hda/realtek: Add quirk for HP Victus 16-d1xxx to enable mute LED Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 030/131] ALSA: hda/realtek: Add quirk for mute LEDs on HP ENVY x360 15-eu0xxx Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 031/131] ALSA: hda/realtek - ALC287 I2S speaker platform support Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 032/131] ALSA: hda/realtek - ALC287 merge RTK codec with CS CS35L41 AMP Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 033/131] pinctrl: nuvoton: wpcm450: fix out of bounds write Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 034/131] drm/msm/dp: do not reinitialize phy unless retry during link training Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 035/131] drm/msm/dsi: skip the wait for video mode done if not applicable Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 036/131] drm/msm/dsi: fix irq_of_parse_and_map() error checking Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 037/131] drm/msm/dpu: change _dpu_plane_calc_bw() to use u64 to avoid overflow Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 038/131] drm/msm/dp: Add newlines to debug printks Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 039/131] phy: lynx-28g: cancel the CDR check work item on the remove path Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 040/131] phy: lynx-28g: lock PHY while performing CDR lock workaround Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 041/131] phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 042/131] net: dsa: qca8k: fix potential MDIO bus conflict when accessing internal PHYs via management frames Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 043/131] can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior Greg Kroah-Hartman
2023-10-24 18:34 ` Oliver Hartkopp
2023-10-25 18:52 ` Lukas Magel
2023-10-27 12:16 ` Greg Kroah-Hartman
2023-10-30 11:36 ` Oliver Hartkopp
2023-10-16 8:40 ` [PATCH 6.1 044/131] can: sun4i_can: Only show Kconfig if ARCH_SUNXI is set Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 045/131] arm64: dts: mediatek: mt8195: Set DSU PMU status to fail Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 046/131] ravb: Fix up dma_free_coherent() call in ravb_remove() Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 047/131] ravb: Fix use-after-free issue in ravb_tx_timeout_work() Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 048/131] ieee802154: ca8210: Fix a potential UAF in ca8210_probe Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 049/131] mlxsw: fix mlxsw_sp2_nve_vxlan_learning_set() return type Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 050/131] xen-netback: use default TX queue size for vifs Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 051/131] riscv, bpf: Factor out emit_call for kernel and bpf context Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 052/131] riscv, bpf: Sign-extend return values Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 053/131] drm/vmwgfx: fix typo of sizeof argument Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 054/131] bpf: Fix verifier log for async callback return values Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 055/131] net: refine debug info in skb_checksum_help() Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 056/131] net: macsec: indicate next pn update when offloading Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 057/131] net: phy: mscc: macsec: reject PN update requests Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 058/131] net/mlx5e: macsec: use update_pn flag instead of PN comparation Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 059/131] ixgbe: fix crash with empty VF macvlan list Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 060/131] net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 061/131] net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 062/131] ethtool: Fix mod state of verbose no_mask bitset Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 063/131] net/smc: Fix pos miscalculation in statistics Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 064/131] pinctrl: renesas: rzn1: Enable missing PINMUX Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 065/131] nfc: nci: assert requested protocol is valid Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 066/131] workqueue: Override implicit ordered attribute in workqueue_apply_unbound_cpumask() Greg Kroah-Hartman
2023-10-16 8:40 ` Greg Kroah-Hartman [this message]
2023-10-16 8:40 ` [PATCH 6.1 068/131] dmaengine: stm32-mdma: abort resume if no ongoing transfer Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 069/131] dmaengine: stm32-dma: fix stm32_dma_prep_slave_sg in case of MDMA chaining Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 070/131] dmaengine: stm32-dma: fix residue " Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 071/131] dmaengine: stm32-mdma: use Link Address Register to compute residue Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 072/131] dmaengine: stm32-mdma: set in_flight_bytes in case CRQA flag is set Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 073/131] usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 074/131] net: usb: dm9601: fix uninitialized variable use in dm9601_mdio_read Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 075/131] usb: dwc3: Soft reset phy on probe for host Greg Kroah-Hartman
2023-10-16 8:40 ` [PATCH 6.1 076/131] usb: cdns3: Modify the return value of cdns_set_active () to void when CONFIG_PM_SLEEP is disabled Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 077/131] usb: hub: Guard against accesses to uninitialized BOS descriptors Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 078/131] usb: musb: Get the musb_qh poniter after musb_giveback Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 079/131] usb: musb: Modify the "HWVers" register address Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 080/131] iio: pressure: bmp280: Fix NULL pointer exception Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 081/131] iio: imu: bno055: Fix missing Kconfig dependencies Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 082/131] iio: adc: imx8qxp: Fix address for command buffer registers Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 083/131] iio: dac: ad3552r: Correct device IDs Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 084/131] iio: admv1013: add mixer_vgate corner cases Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 085/131] iio: pressure: dps310: Adjust Timeout Settings Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 086/131] iio: pressure: ms5611: ms5611_prom_is_valid false negative bug Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 087/131] iio: addac: Kconfig: update ad74413r selections Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 088/131] arm64: dts: mediatek: mt8195-demo: fix the memory size to 8GB Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 089/131] arm64: dts: mediatek: mt8195-demo: update and reorder reserved memory regions Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 090/131] drm/atomic-helper: relax unregistered connector check Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 091/131] drm/amdgpu: add missing NULL check Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 092/131] drm/amd/display: Dont set dpms_off for seamless boot Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 093/131] ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CBA Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 094/131] ACPI: EC: Add quirk for the HP Pavilion Gaming 15-dk1xxx Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 095/131] ksmbd: not allow to open file if delelete on close bit is set Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 096/131] perf/x86/lbr: Filter vsyscall addresses Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 097/131] x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 098/131] mcb: remove is_added flag from mcb_device struct Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 099/131] thunderbolt: Workaround an IOMMU fault on certain systems with Intel Maple Ridge Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 100/131] thunderbolt: Check that lane 1 is in CL0 before enabling lane bonding Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 101/131] thunderbolt: Restart XDomain discovery handshake after failure Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 102/131] powerpc/47x: Fix 47x syscall return crash Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 103/131] libceph: use kernel_connect() Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 104/131] ceph: fix incorrect revoked caps assert in ceph_fill_file_size() Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 105/131] ceph: fix type promotion bug on 32bit systems Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 106/131] Input: powermate - fix use-after-free in powermate_config_complete Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 107/131] Input: psmouse - fix fast_reconnect function for PS/2 mode Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 108/131] Input: xpad - add PXN V900 support Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 109/131] Input: i8042 - add Fujitsu Lifebook E5411 to i8042 quirk table Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 110/131] Input: goodix - ensure int GPIO is in input for gpio_count == 1 && gpio_int_idx == 0 case Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 111/131] tee: amdtee: fix use-after-free vulnerability in amdtee_close_session Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 112/131] mctp: perform route lookups under a RCU read-side lock Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 113/131] nfp: flower: avoid rmmod nfp crash issues Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 114/131] usb: typec: ucsi: Use GET_CAPABILITY attributes data to set power supply scope Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 115/131] cgroup: Remove duplicates in cgroup v1 tasks file Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 116/131] dma-buf: add dma_fence_timestamp helper Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 117/131] pinctrl: avoid unsafe code pattern in find_pinctrl() Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 118/131] scsi: ufs: core: Correct clear TM error log Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 119/131] counter: chrdev: fix getting array extensions Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 120/131] counter: microchip-tcb-capture: Fix the use of internal GCLK logic Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 121/131] usb: typec: altmodes/displayport: Signal hpd low when exiting mode Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 122/131] usb: typec: ucsi: Clear EVENT_PENDING bit if ucsi_send_command fails Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 123/131] usb: gadget: udc-xilinx: replace memcpy with memcpy_toio Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 124/131] usb: gadget: ncm: Handle decoding of multiple NTBs in unwrap call Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 125/131] usb: cdnsp: Fixes issue with dequeuing not queued requests Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 126/131] x86/alternatives: Disable KASAN in apply_alternatives() Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 127/131] dmaengine: idxd: use spin_lock_irqsave before wait_event_lock_irq Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 128/131] dmaengine: mediatek: Fix deadlock caused by synchronize_irq() Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 129/131] powerpc/8xx: Fix pte_access_permitted() for PAGE_NONE Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 130/131] powerpc/64e: Fix wrong test in __ptep_test_and_clear_young() Greg Kroah-Hartman
2023-10-16 8:41 ` [PATCH 6.1 131/131] ALSA: hda/realtek - Fixed two speaker platform Greg Kroah-Hartman
2023-10-16 11:40 ` [PATCH 6.1 000/131] 6.1.59-rc1 review Ricardo B. Marliere
2023-10-16 12:56 ` Jon Hunter
2023-10-16 18:18 ` Florian Fainelli
2023-10-16 18:37 ` SeongJae Park
2023-10-16 21:31 ` Shuah Khan
2023-10-17 3:03 ` Bagas Sanjaya
2023-10-17 7:35 ` Ron Economos
2023-10-17 8:26 ` Naresh Kamboju
2023-10-17 10:03 ` Pavel Machek
2023-10-17 11:50 ` Takeshi Ogasawara
2023-10-25 19:11 ` Jon Hunter
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20231016084001.732118317@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=davem@davemloft.net \
--cc=edumazet@google.com \
--cc=mfreemon@cloudflare.com \
--cc=patches@lists.linux.dev \
--cc=sashal@kernel.org \
--cc=stable@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox