From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
patches@lists.linux.dev,
Kumar Kartikeya Dwivedi <memxor@gmail.com>,
Alexei Starovoitov <ast@kernel.org>,
Sasha Levin <sashal@kernel.org>
Subject: [PATCH 6.9 035/143] bpf: Defer work in bpf_timer_cancel_and_free
Date: Tue, 16 Jul 2024 17:30:31 +0200 [thread overview]
Message-ID: <20240716152757.340264198@linuxfoundation.org> (raw)
In-Reply-To: <20240716152755.980289992@linuxfoundation.org>
6.9-stable review patch. If anyone has any objections, please let me know.
------------------
From: Kumar Kartikeya Dwivedi <memxor@gmail.com>
[ Upstream commit a6fcd19d7eac1335eb76bc16b6a66b7f574d1d69 ]
Currently, the same case as previous patch (two timer callbacks trying
to cancel each other) can be invoked through bpf_map_update_elem as
well, or more precisely, freeing map elements containing timers. Since
this relies on hrtimer_cancel as well, it is prone to the same deadlock
situation as the previous patch.
It would be sufficient to use hrtimer_try_to_cancel to fix this problem,
as the timer cannot be enqueued after async_cancel_and_free. Once
async_cancel_and_free has been done, the timer must be reinitialized
before it can be armed again. The callback running in parallel trying to
arm the timer will fail, and freeing bpf_hrtimer without waiting is
sufficient (given kfree_rcu), and bpf_timer_cb will return
HRTIMER_NORESTART, preventing the timer from being rearmed again.
However, there exists a UAF scenario where the callback arms the timer
before entering this function, such that if cancellation fails (due to
timer callback invoking this routine, or the target timer callback
running concurrently). In such a case, if the timer expiration is
significantly far in the future, the RCU grace period expiration
happening before it will free the bpf_hrtimer state and along with it
the struct hrtimer, that is enqueued.
Hence, it is clear cancellation needs to occur after
async_cancel_and_free, and yet it cannot be done inline due to deadlock
issues. We thus modify bpf_timer_cancel_and_free to defer work to the
global workqueue, adding a work_struct alongside rcu_head (both used at
_different_ points of time, so can share space).
Update existing code comments to reflect the new state of affairs.
Fixes: b00628b1c7d5 ("bpf: Introduce bpf timers.")
Signed-off-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Link: https://lore.kernel.org/r/20240709185440.1104957-3-memxor@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
kernel/bpf/helpers.c | 61 ++++++++++++++++++++++++++++++++++----------
1 file changed, 47 insertions(+), 14 deletions(-)
diff --git a/kernel/bpf/helpers.c b/kernel/bpf/helpers.c
index 79cb5681cf136..6ad7a61c7617f 100644
--- a/kernel/bpf/helpers.c
+++ b/kernel/bpf/helpers.c
@@ -1084,7 +1084,10 @@ struct bpf_async_cb {
struct bpf_prog *prog;
void __rcu *callback_fn;
void *value;
- struct rcu_head rcu;
+ union {
+ struct rcu_head rcu;
+ struct work_struct delete_work;
+ };
u64 flags;
};
@@ -1168,6 +1171,21 @@ static enum hrtimer_restart bpf_timer_cb(struct hrtimer *hrtimer)
return HRTIMER_NORESTART;
}
+static void bpf_timer_delete_work(struct work_struct *work)
+{
+ struct bpf_hrtimer *t = container_of(work, struct bpf_hrtimer, cb.delete_work);
+
+ /* Cancel the timer and wait for callback to complete if it was running.
+ * If hrtimer_cancel() can be safely called it's safe to call
+ * kfree_rcu(t) right after for both preallocated and non-preallocated
+ * maps. The async->cb = NULL was already done and no code path can see
+ * address 't' anymore. Timer if armed for existing bpf_hrtimer before
+ * bpf_timer_cancel_and_free will have been cancelled.
+ */
+ hrtimer_cancel(&t->timer);
+ kfree_rcu(t, cb.rcu);
+}
+
static int __bpf_async_init(struct bpf_async_kern *async, struct bpf_map *map, u64 flags,
enum bpf_async_type type)
{
@@ -1207,6 +1225,7 @@ static int __bpf_async_init(struct bpf_async_kern *async, struct bpf_map *map, u
t = (struct bpf_hrtimer *)cb;
atomic_set(&t->cancelling, 0);
+ INIT_WORK(&t->cb.delete_work, bpf_timer_delete_work);
hrtimer_init(&t->timer, clockid, HRTIMER_MODE_REL_SOFT);
t->timer.function = bpf_timer_cb;
cb->value = (void *)async - map->record->timer_off;
@@ -1464,25 +1483,39 @@ void bpf_timer_cancel_and_free(void *val)
__bpf_spin_unlock_irqrestore(&timer->lock);
if (!t)
return;
- /* Cancel the timer and wait for callback to complete if it was running.
- * If hrtimer_cancel() can be safely called it's safe to call kfree(t)
- * right after for both preallocated and non-preallocated maps.
- * The timer->timer = NULL was already done and no code path can
- * see address 't' anymore.
- *
- * Check that bpf_map_delete/update_elem() wasn't called from timer
- * callback_fn. In such case don't call hrtimer_cancel() (since it will
- * deadlock) and don't call hrtimer_try_to_cancel() (since it will just
- * return -1). Though callback_fn is still running on this cpu it's
+ /* We check that bpf_map_delete/update_elem() was called from timer
+ * callback_fn. In such case we don't call hrtimer_cancel() (since it
+ * will deadlock) and don't call hrtimer_try_to_cancel() (since it will
+ * just return -1). Though callback_fn is still running on this cpu it's
* safe to do kfree(t) because bpf_timer_cb() read everything it needed
* from 't'. The bpf subprog callback_fn won't be able to access 't',
* since timer->timer = NULL was already done. The timer will be
* effectively cancelled because bpf_timer_cb() will return
* HRTIMER_NORESTART.
+ *
+ * However, it is possible the timer callback_fn calling us armed the
+ * timer _before_ calling us, such that failing to cancel it here will
+ * cause it to possibly use struct hrtimer after freeing bpf_hrtimer.
+ * Therefore, we _need_ to cancel any outstanding timers before we do
+ * kfree_rcu, even though no more timers can be armed.
+ *
+ * Moreover, we need to schedule work even if timer does not belong to
+ * the calling callback_fn, as on two different CPUs, we can end up in a
+ * situation where both sides run in parallel, try to cancel one
+ * another, and we end up waiting on both sides in hrtimer_cancel
+ * without making forward progress, since timer1 depends on time2
+ * callback to finish, and vice versa.
+ *
+ * CPU 1 (timer1_cb) CPU 2 (timer2_cb)
+ * bpf_timer_cancel_and_free(timer2) bpf_timer_cancel_and_free(timer1)
+ *
+ * To avoid these issues, punt to workqueue context when we are in a
+ * timer callback.
*/
- if (this_cpu_read(hrtimer_running) != t)
- hrtimer_cancel(&t->timer);
- kfree_rcu(t, cb.rcu);
+ if (this_cpu_read(hrtimer_running))
+ queue_work(system_unbound_wq, &t->cb.delete_work);
+ else
+ bpf_timer_delete_work(&t->cb.delete_work);
}
BPF_CALL_2(bpf_kptr_xchg, void *, map_value, void *, ptr)
--
2.43.0
next prev parent reply other threads:[~2024-07-16 15:48 UTC|newest]
Thread overview: 153+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-07-16 15:29 [PATCH 6.9 000/143] 6.9.10-rc1 review Greg Kroah-Hartman
2024-07-16 15:29 ` [PATCH 6.9 001/143] mm: prevent derefencing NULL ptr in pfn_section_valid() Greg Kroah-Hartman
2024-07-16 15:29 ` [PATCH 6.9 002/143] scsi: ufs: core: Fix ufshcd_clear_cmd racing issue Greg Kroah-Hartman
2024-07-16 15:29 ` [PATCH 6.9 003/143] scsi: ufs: core: Fix ufshcd_abort_one " Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 004/143] vfio/pci: Init the count variable in collecting hot-reset devices Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 005/143] spi: axi-spi-engine: fix sleep calculation Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 006/143] cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 007/143] cachefiles: stop sending new request when dropping object Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 008/143] cachefiles: cancel all requests for the object that is being dropped Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 009/143] cachefiles: wait for ondemand_object_worker to finish when dropping object Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 010/143] cachefiles: cyclic allocation of msg_id to avoid reuse Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 011/143] cachefiles: add missing lock protection when polling Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 012/143] net: dsa: introduce dsa_phylink_to_port() Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 013/143] net: dsa: allow DSA switch drivers to provide their own phylink mac ops Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 014/143] net: dsa: lan9303: provide own phylink MAC operations Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 015/143] dsa: lan9303: Fix mapping between DSA port number and PHY address Greg Kroah-Hartman
2024-07-17 13:18 ` Vladimir Oltean
2024-07-18 7:59 ` Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 016/143] filelock: fix potential use-after-free in posix_lock_inode Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 017/143] fs/dcache: Re-use value stored to dentry->d_flags instead of re-reading Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 018/143] vfs: dont mod negative dentry count when on shrinker list Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 019/143] net: bcmasp: Fix error code in probe() Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 020/143] tcp: fix incorrect undo caused by DSACK of TLP retransmit Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 021/143] bpf: Fix too early release of tcx_entry Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 022/143] net: phy: microchip: lan87xx: reinit PHY after cable test Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 023/143] skmsg: Skip zero length skb in sk_msg_recvmsg Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 024/143] octeontx2-af: Fix incorrect value output on error path in rvu_check_rsrc_availability() Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 025/143] spi: dont unoptimize message in spi_async() Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 026/143] spi: add defer_optimize_message controller flag Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 027/143] net: fix rc7s __skb_datagram_iter() Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 028/143] i40e: Fix XDP program unloading while removing the driver Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 029/143] net: ethernet: lantiq_etop: fix double free in detach Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 030/143] minixfs: Fix minixfs_rename with HIGHMEM Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 031/143] bpf: fix order of args in call to bpf_map_kvcalloc Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 032/143] bpf: make timer data struct more generic Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 033/143] bpf: replace bpf_timer_init with a generic helper Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 034/143] bpf: Fail bpf_timer_cancel when callback is being cancelled Greg Kroah-Hartman
2024-07-16 15:30 ` Greg Kroah-Hartman [this message]
2024-07-16 15:30 ` [PATCH 6.9 036/143] tcp: avoid too many retransmit packets Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 037/143] net: ethernet: mtk-star-emac: set mac_managed_pm when probing Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 038/143] ppp: reject claimed-as-LCP but actually malformed packets Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 039/143] ethtool: netlink: do not return SQI value if link is down Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 040/143] netfilter: nfnetlink_queue: drop bogus WARN_ON Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 041/143] netfilter: nf_tables: prefer nft_chain_validate Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 042/143] udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 043/143] net/sched: Fix UAF when resolving a clash Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 044/143] net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 045/143] arm64: dts: qcom: sc8180x: Fix LLCC reg property again Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 046/143] arm64: dts: qcom: x1e80100-*: Allocate some CMA buffers Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 047/143] arm64: dts: allwinner: Fix PMIC interrupt number Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 048/143] arm64: dts: qcom: x1e80100: Fix PCIe 6a reg offsets and add MHI Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 049/143] arm64: dts: qcom: sm6115: add iommu for sdhc_1 Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 050/143] arm64: dts: qcom: qdu1000: Fix LLCC reg property Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 051/143] firmware: cs_dsp: Fix overflow checking of wmfw header Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 052/143] firmware: cs_dsp: Return error if block header overflows file Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 053/143] firmware: cs_dsp: Validate payload length before processing block Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 054/143] firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 055/143] ASoC: SOF: Intel: hda: fix null deref on system suspend entry Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 056/143] firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 057/143] ARM: davinci: Convert comma to semicolon Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 058/143] net: ethtool: Fix RSS setting Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 059/143] i40e: fix: remove needless retries of NVM update Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 060/143] octeontx2-af: replace cpt slot with lf id on reg write Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 061/143] octeontx2-af: fix a issue with cpt_lf_alloc mailbox Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 062/143] octeontx2-af: fix detection of IP layer Greg Kroah-Hartman
2024-07-16 15:30 ` [PATCH 6.9 063/143] octeontx2-af: fix issue with IPv6 ext match for RSS Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 064/143] octeontx2-af: fix issue with IPv4 " Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 065/143] cifs: fix setting SecurityFlags to true Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 066/143] Revert "sched/fair: Make sure to try to detach at least one movable task" Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 067/143] net: ks8851: Fix deadlock with the SPI chip variant Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 068/143] net: ks8851: Fix potential TX stall after interface reopen Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 069/143] USB: serial: option: add Telit generic core-dump composition Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 070/143] USB: serial: option: add Telit FN912 rmnet compositions Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 071/143] USB: serial: option: add Fibocom FM350-GL Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 072/143] USB: serial: option: add support for Foxconn T99W651 Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 073/143] USB: serial: option: add Netprisma LCUK54 series modules Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 074/143] USB: serial: option: add Rolling RW350-GL variants Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 075/143] USB: serial: mos7840: fix crash on resume Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 076/143] USB: Add USB_QUIRK_NO_SET_INTF quirk for START BP-850k Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 077/143] usb: dwc3: pci: add support for the Intel Panther Lake Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 078/143] usb: core: add missing of_node_put() in usb_of_has_devices_or_graph Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 079/143] usb: gadget: configfs: Prevent OOB read/write in usb_string_copy() Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 080/143] USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 081/143] misc: microchip: pci1xxxx: Fix return value of nvmem callbacks Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 082/143] hpet: Support 32-bit userspace Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 083/143] xhci: always resume roothubs if xHC was reset during resume Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 084/143] s390/mm: Add NULL pointer check to crst_table_free() base_crst_free() Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 085/143] nilfs2: fix kernel bug on rename operation of broken directory Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 086/143] cachestat: do not flush stats in recency check Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 087/143] mm: vmalloc: check if a hash-index is in cpu_possible_mask Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 088/143] mm: fix crashes from deferred split racing folio migration Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 089/143] filemap: replace pte_offset_map() with pte_offset_map_nolock() Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 090/143] mm/filemap: skip to create PMD-sized page cache if needed Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 091/143] mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 092/143] ksmbd: discard write access to the directory open Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 093/143] scsi: sd: Do not repeat the starting disk message Greg Kroah-Hartman
2024-07-16 19:55 ` Bart Van Assche
2024-07-17 6:28 ` Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 094/143] iio: trigger: Fix condition for own trigger Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 095/143] arm64: dts: qcom: sa8775p: Correct IRQ number of EL2 non-secure physical timer Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 096/143] arm64: dts: qcom: sc8280xp-x13s: fix touchscreen power on Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 097/143] arm64: dts: qcom: x1e80100-crd: fix WCD audio codec TX port mapping Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 098/143] arm64: dts: qcom: x1e80100-crd: fix DAI used for headset recording Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 099/143] nvmem: rmem: Fix return value of rmem_read() Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 100/143] nvmem: meson-efuse: Fix return value of nvmem callbacks Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 101/143] nvmem: core: only change name to fram for current attribute Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 102/143] nvmem: core: limit cell sysfs permissions to main attribute ones Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 103/143] platform/x86: toshiba_acpi: Fix array out-of-bounds access Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 104/143] tty: serial: ma35d1: Add a NULL check for of_node Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 105/143] serial: imx: ensure RTS signal is not left active after shutdown Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 106/143] ALSA: hda/realtek: add quirk for Clevo V5[46]0TU Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 107/143] ALSA: hda/realtek: Enable Mute LED on HP 250 G7 Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 108/143] ALSA: hda/realtek: Limit mic boost on VAIO PRO PX Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 109/143] mei: vsc: Enhance IVSC chipset stability during warm reboot Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 110/143] mei: vsc: Prevent timeout error with added delay post-firmware download Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 111/143] mei: vsc: Utilize the appropriate byte order swap function Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 112/143] Fix userfaultfd_api to return EINVAL as expected Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 113/143] mmc: sdhci: Fix max_seg_size for 64KiB PAGE_SIZE Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 114/143] mmc: davinci_mmc: Prevent transmitted data size from exceeding sgms length Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 115/143] pmdomain: qcom: rpmhpd: Skip retention level for Power Domains Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 116/143] libceph: fix race between delayed_work() and ceph_monc_stop() Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 117/143] ACPI: processor_idle: Fix invalid comparison with insertion sort for latency Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 118/143] cpufreq: ACPI: Mark boost policy as enabled when setting boost Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 119/143] cpufreq: Allow drivers to advertise boost enabled Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 120/143] wireguard: selftests: use acpi=off instead of -no-acpi for recent QEMU Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 121/143] wireguard: allowedips: avoid unaligned 64-bit memory accesses Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 122/143] wireguard: queueing: annotate intentional data race in cpu round robin Greg Kroah-Hartman
2024-07-16 15:31 ` [PATCH 6.9 123/143] wireguard: send: annotate intentional data race in checking empty queue Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 124/143] misc: fastrpc: Fix DSP capabilities request Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 125/143] misc: fastrpc: Avoid updating PD type for capability request Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 126/143] misc: fastrpc: Copy the complete capability structure to user Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 127/143] misc: fastrpc: Fix memory leak in audio daemon attach operation Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 128/143] misc: fastrpc: Fix ownership reassignment of remote heap Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 129/143] misc: fastrpc: Restrict untrusted app to attach to privileged PD Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 130/143] mm/readahead: limit page cache size in page_cache_ra_order() Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 131/143] mm/shmem: disable PMD-sized page cache if needed Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 132/143] mm/damon/core: merge regions aggressively when max_nr_regions is unmet Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 133/143] Revert "dt-bindings: cache: qcom,llcc: correct QDU1000 reg entries" Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 134/143] ext4: avoid ptr null pointer dereference Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 135/143] i2c: rcar: bring hardware to known state when probing Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 136/143] i2c: rcar: clear NO_RXDMA flag after resetting Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 137/143] i2c: mark HostNotify target address as used Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 138/143] i2c: rcar: ensure Gen3+ reset does not disturb local targets Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 139/143] i2c: testunit: avoid re-issued work after read message Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 140/143] sched/deadline: Fix task_struct reference leak Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 141/143] x86/bhi: Avoid warning in #DB handler due to BHI mitigation Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 142/143] kbuild: Make ld-version.sh more robust against version string changes Greg Kroah-Hartman
2024-07-16 15:32 ` [PATCH 6.9 143/143] kbuild: rpm-pkg: avoid the warnings with dtbs listed twice Greg Kroah-Hartman
2024-07-16 18:36 ` [PATCH 6.9 000/143] 6.9.10-rc1 review SeongJae Park
2024-07-16 19:39 ` Florian Fainelli
2024-07-16 20:13 ` Pavel Machek
2024-07-17 15:42 ` Shuah Khan
2024-07-17 16:59 ` Allen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20240716152757.340264198@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=ast@kernel.org \
--cc=memxor@gmail.com \
--cc=patches@lists.linux.dev \
--cc=sashal@kernel.org \
--cc=stable@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox