From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
patches@lists.linux.dev,
Shinichiro Kawasaki <shinichiro.kawasaki@wdc.com>,
Zhu Yanjun <yanjun.zhu@linux.dev>,
Leon Romanovsky <leon@kernel.org>,
Sasha Levin <sashal@kernel.org>
Subject: [PATCH 5.4 034/148] RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction
Date: Tue, 15 Jul 2025 15:12:36 +0200 [thread overview]
Message-ID: <20250715130801.678216530@linuxfoundation.org> (raw)
In-Reply-To: <20250715130800.293690950@linuxfoundation.org>
5.4-stable review patch. If anyone has any objections, please let me know.
------------------
From: Shin'ichiro Kawasaki <shinichiro.kawasaki@wdc.com>
[ Upstream commit 6883b680e703c6b2efddb4e7a8d891ce1803d06b ]
The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last
deref") simplified cm_id resource management by freeing cm_id once all
references to the cm_id were removed. The references are removed either
upon completion of iw_cm event handlers or when the application destroys
the cm_id. This commit introduced the use-after-free condition where
cm_id_private object could still be in use by event handler works during
the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a
use-after-free related to destroying CM IDs") addressed this use-after-
free by flushing all pending works at the cm_id destruction.
However, still another use-after-free possibility remained. It happens
with the work objects allocated for each cm_id_priv within
alloc_work_entries() during cm_id creation, and subsequently freed in
dealloc_work_entries() once all references to the cm_id are removed.
If the cm_id's last reference is decremented in the event handler work,
the work object for the work itself gets removed, and causes the use-
after-free BUG below:
BUG: KASAN: slab-use-after-free in __pwq_activate_work+0x1ff/0x250
Read of size 8 at addr ffff88811f9cf800 by task kworker/u16:1/147091
CPU: 2 UID: 0 PID: 147091 Comm: kworker/u16:1 Not tainted 6.15.0-rc2+ #27 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014
Workqueue: 0x0 (iw_cm_wq)
Call Trace:
<TASK>
dump_stack_lvl+0x6a/0x90
print_report+0x174/0x554
? __virt_addr_valid+0x208/0x430
? __pwq_activate_work+0x1ff/0x250
kasan_report+0xae/0x170
? __pwq_activate_work+0x1ff/0x250
__pwq_activate_work+0x1ff/0x250
pwq_dec_nr_in_flight+0x8c5/0xfb0
process_one_work+0xc11/0x1460
? __pfx_process_one_work+0x10/0x10
? assign_work+0x16c/0x240
worker_thread+0x5ef/0xfd0
? __pfx_worker_thread+0x10/0x10
kthread+0x3b0/0x770
? __pfx_kthread+0x10/0x10
? rcu_is_watching+0x11/0xb0
? _raw_spin_unlock_irq+0x24/0x50
? rcu_is_watching+0x11/0xb0
? __pfx_kthread+0x10/0x10
ret_from_fork+0x30/0x70
? __pfx_kthread+0x10/0x10
ret_from_fork_asm+0x1a/0x30
</TASK>
Allocated by task 147416:
kasan_save_stack+0x2c/0x50
kasan_save_track+0x10/0x30
__kasan_kmalloc+0xa6/0xb0
alloc_work_entries+0xa9/0x260 [iw_cm]
iw_cm_connect+0x23/0x4a0 [iw_cm]
rdma_connect_locked+0xbfd/0x1920 [rdma_cm]
nvme_rdma_cm_handler+0x8e5/0x1b60 [nvme_rdma]
cma_cm_event_handler+0xae/0x320 [rdma_cm]
cma_work_handler+0x106/0x1b0 [rdma_cm]
process_one_work+0x84f/0x1460
worker_thread+0x5ef/0xfd0
kthread+0x3b0/0x770
ret_from_fork+0x30/0x70
ret_from_fork_asm+0x1a/0x30
Freed by task 147091:
kasan_save_stack+0x2c/0x50
kasan_save_track+0x10/0x30
kasan_save_free_info+0x37/0x60
__kasan_slab_free+0x4b/0x70
kfree+0x13a/0x4b0
dealloc_work_entries+0x125/0x1f0 [iw_cm]
iwcm_deref_id+0x6f/0xa0 [iw_cm]
cm_work_handler+0x136/0x1ba0 [iw_cm]
process_one_work+0x84f/0x1460
worker_thread+0x5ef/0xfd0
kthread+0x3b0/0x770
ret_from_fork+0x30/0x70
ret_from_fork_asm+0x1a/0x30
Last potentially related work creation:
kasan_save_stack+0x2c/0x50
kasan_record_aux_stack+0xa3/0xb0
__queue_work+0x2ff/0x1390
queue_work_on+0x67/0xc0
cm_event_handler+0x46a/0x820 [iw_cm]
siw_cm_upcall+0x330/0x650 [siw]
siw_cm_work_handler+0x6b9/0x2b20 [siw]
process_one_work+0x84f/0x1460
worker_thread+0x5ef/0xfd0
kthread+0x3b0/0x770
ret_from_fork+0x30/0x70
ret_from_fork_asm+0x1a/0x30
This BUG is reproducible by repeating the blktests test case nvme/061
for the rdma transport and the siw driver.
To avoid the use-after-free of cm_id_private work objects, ensure that
the last reference to the cm_id is decremented not in the event handler
works, but in the cm_id destruction context. For that purpose, move
iwcm_deref_id() call from destroy_cm_id() to the callers of
destroy_cm_id(). In iw_destroy_cm_id(), call iwcm_deref_id() after
flushing the pending works.
During the fix work, I noticed that iw_destroy_cm_id() is called from
cm_work_handler() and process_event() context. However, the comment of
iw_destroy_cm_id() notes that the function "cannot be called by the
event thread". Drop the false comment.
Closes: https://lore.kernel.org/linux-rdma/r5676e754sv35aq7cdsqrlnvyhiq5zktteaurl7vmfih35efko@z6lay7uypy3c/
Fixes: 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref")
Cc: stable@vger.kernel.org
Signed-off-by: Shin'ichiro Kawasaki <shinichiro.kawasaki@wdc.com>
Link: https://patch.msgid.link/20250510101036.1756439-1-shinichiro.kawasaki@wdc.com
Reviewed-by: Zhu Yanjun <yanjun.zhu@linux.dev>
Signed-off-by: Leon Romanovsky <leon@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
drivers/infiniband/core/iwcm.c | 29 +++++++++++++++--------------
1 file changed, 15 insertions(+), 14 deletions(-)
diff --git a/drivers/infiniband/core/iwcm.c b/drivers/infiniband/core/iwcm.c
index 3e4941754b48d..ce41f235af253 100644
--- a/drivers/infiniband/core/iwcm.c
+++ b/drivers/infiniband/core/iwcm.c
@@ -367,12 +367,9 @@ EXPORT_SYMBOL(iw_cm_disconnect);
/*
* CM_ID <-- DESTROYING
*
- * Clean up all resources associated with the connection and release
- * the initial reference taken by iw_create_cm_id.
- *
- * Returns true if and only if the last cm_id_priv reference has been dropped.
+ * Clean up all resources associated with the connection.
*/
-static bool destroy_cm_id(struct iw_cm_id *cm_id)
+static void destroy_cm_id(struct iw_cm_id *cm_id)
{
struct iwcm_id_private *cm_id_priv;
struct ib_qp *qp;
@@ -441,20 +438,22 @@ static bool destroy_cm_id(struct iw_cm_id *cm_id)
iwpm_remove_mapinfo(&cm_id->local_addr, &cm_id->m_local_addr);
iwpm_remove_mapping(&cm_id->local_addr, RDMA_NL_IWCM);
}
-
- return iwcm_deref_id(cm_id_priv);
}
/*
- * This function is only called by the application thread and cannot
- * be called by the event thread. The function will wait for all
- * references to be released on the cm_id and then kfree the cm_id
- * object.
+ * Destroy cm_id. If the cm_id still has other references, wait for all
+ * references to be released on the cm_id and then release the initial
+ * reference taken by iw_create_cm_id.
*/
void iw_destroy_cm_id(struct iw_cm_id *cm_id)
{
- if (!destroy_cm_id(cm_id))
+ struct iwcm_id_private *cm_id_priv;
+
+ cm_id_priv = container_of(cm_id, struct iwcm_id_private, id);
+ destroy_cm_id(cm_id);
+ if (refcount_read(&cm_id_priv->refcount) > 1)
flush_workqueue(iwcm_wq);
+ iwcm_deref_id(cm_id_priv);
}
EXPORT_SYMBOL(iw_destroy_cm_id);
@@ -1037,8 +1036,10 @@ static void cm_work_handler(struct work_struct *_work)
if (!test_bit(IWCM_F_DROP_EVENTS, &cm_id_priv->flags)) {
ret = process_event(cm_id_priv, &levent);
- if (ret)
- WARN_ON_ONCE(destroy_cm_id(&cm_id_priv->id));
+ if (ret) {
+ destroy_cm_id(&cm_id_priv->id);
+ WARN_ON_ONCE(iwcm_deref_id(cm_id_priv));
+ }
} else
pr_debug("dropping event %d\n", levent.event);
if (iwcm_deref_id(cm_id_priv))
--
2.39.5
next prev parent reply other threads:[~2025-07-15 13:33 UTC|newest]
Thread overview: 154+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-07-15 13:12 [PATCH 5.4 000/148] 5.4.296-rc1 review Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 001/148] cifs: Fix cifs_query_path_info() for Windows NT servers Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 002/148] mailbox: Not protect module_put with spin_lock_irqsave Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 003/148] mfd: max14577: Fix wakeup source leaks on device unbind Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 004/148] dmaengine: xilinx_dma: Set dma_device directions Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 005/148] md/md-bitmap: fix dm-raid max_write_behind setting Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 006/148] iio: pressure: zpa2326: Use aligned_s64 for the timestamp Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 007/148] usb: potential integer overflow in usbg_make_tpg() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 008/148] tty: serial: uartlite: register uart driver in init Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 009/148] usb: Add checks for snprintf() calls in usb_alloc_dev() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 010/148] usb: cdc-wdm: avoid setting WDM_READ for ZLP-s Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 011/148] usb: typec: displayport: Receive DP Status Update NAK request exit dp altmode Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 012/148] ALSA: hda: Ignore unsol events for cards being shut down Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 013/148] ceph: fix possible integer overflow in ceph_zero_objects() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 014/148] ovl: Check for NULL d_inode() in ovl_dentry_upper() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 015/148] USB: usbtmc: Fix reading stale status byte Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 016/148] USB: usbtmc: Add USBTMC_IOCTL_GET_STB Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 017/148] usb: usbtmc: Fix read_stb function and get_stb ioctl Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 018/148] VMCI: check context->notify_page after call to get_user_pages_fast() to avoid GPF Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 019/148] VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 020/148] kbuild: use -MMD instead of -MD to exclude system headers from dependency Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 021/148] bpfilter: match bit size of bpfilter_umh to that of the kernel Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 022/148] kbuild: add --target to correctly cross-compile UAPI headers with Clang Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 023/148] kbuild: hdrcheck: fix cross build with clang Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 024/148] of: property: define of_property_read_u{8,16,32,64}_array() unconditionally Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 025/148] of: Add of_property_present() helper Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 026/148] ASoC: meson: meson-card-utils: use of_property_present() for DT parsing Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 027/148] fs/jfs: consolidate sanity checking in dbMount Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 028/148] jfs: validate AG parameters in dbMount() to prevent crashes Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 029/148] media: cxusb: use dev_dbg() rather than hand-rolled debug Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 030/148] media: cxusb: no longer judge rbuf when the write fails Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 031/148] media: omap3isp: use sgtable-based scatterlist wrappers Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 032/148] media: vivid: Change the siize of the composing Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 033/148] RDMA/core: Use refcount_t instead of atomic_t on refcount of iwcm_id_private Greg Kroah-Hartman
2025-07-15 13:12 ` Greg Kroah-Hartman [this message]
2025-07-15 13:12 ` [PATCH 5.4 035/148] i2c: tiny-usb: disable zero-length read messages Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 036/148] i2c: robotfuzz-osif: " Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 037/148] ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 038/148] attach_recursive_mnt(): do not lock the covering tree when sliding something under it Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 039/148] wifi: mac80211: fix beacon interval calculation overflow Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 040/148] vsock/uapi: fix linux/vm_sockets.h userspace compilation errors Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 041/148] um: ubd: Add missing error check in start_io_thread() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 042/148] net: enetc: Correct endianness handling in _enetc_rd_reg64 Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 043/148] atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 044/148] Bluetooth: L2CAP: Fix L2CAP MTU negotiation Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 045/148] dm-raid: fix variable in journal device check Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 046/148] HID: wacom: fix memory leak on kobject creation failure Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 047/148] HID: wacom: fix memory leak on sysfs attribute " Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 048/148] HID: wacom: fix kobject reference count leak Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 049/148] drm/tegra: Assign plane type before registration Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 050/148] drm/bridge: cdns-dsi: Fix the clock variable for mode_valid() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 051/148] drm/bridge: cdns-dsi: Fix connecting to next bridge Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 052/148] drm/bridge: cdns-dsi: Check return value when getting default PHY config Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 053/148] s390: Add -std=gnu11 to decompressor and purgatory CFLAGS Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 054/148] arm64: Restrict pagetable teardown to avoid false warning Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 055/148] btrfs: dont abort filesystem when attempting to snapshot deleted subvolume Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 056/148] vsock/vmci: Clear the vmci transport packet properly when initializing it Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.4 057/148] mmc: sdhci: Add a helper function for dump register in dynamic debug mode Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 058/148] Revert "mmc: sdhci: Disable SD card clock before changing parameters" Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 059/148] usb: typec: altmodes/displayport: do not index invalid pin_assignments Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 060/148] mtk-sd: Fix a pagefault in dma_unmap_sg() for not prepared data Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 061/148] platform/mellanox: mlxbf-tmfifo: fix vring_desc.len assignment Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 062/148] RDMA/mlx5: Initialize obj_event->obj_sub_list before xa_insert Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 063/148] nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 064/148] scsi: qla4xxx: Fix missing DMA mapping error in qla4xxx_alloc_pdu() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 065/148] btrfs: fix missing error handling when searching for inode refs during log replay Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 066/148] drm/exynos: fimd: Guard display clock control with runtime PM calls Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 067/148] lib: test_objagg: Set error message in check_expect_hints_stats() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 068/148] amd-xgbe: align CL37 AN sequence as per databook Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 069/148] enic: fix incorrect MTU comparison in enic_change_mtu() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 070/148] nui: Fix dma_mapping_error() check Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 071/148] net/sched: Always pass notifications when child class becomes empty Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 072/148] ALSA: sb: Force to disable DMAs once when DMA mode is changed Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 073/148] ata: pata_cs5536: fix build on 32-bit UML Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 074/148] powerpc: Fix struct termio related ioctl macros Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 075/148] wifi: mac80211: drop invalid source address OCB frames Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 076/148] wifi: ath6kl: remove WARN on bad firmware input Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 077/148] ACPICA: Refuse to evaluate a method if arguments are missing Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 078/148] rcu: Return early if callback is not specified Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 079/148] regulator: gpio: Add input_supply support in gpio_regulator_config Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 080/148] regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 081/148] mmc: mediatek: use data instead of mrq parameter from msdc_{un}prepare_data() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 082/148] mtk-sd: Prevent memory corruption from DMA map failure Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 083/148] mtk-sd: reset host->mrq on prepare_data() error Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 084/148] drm/v3d: Disable interrupts before resetting the GPU Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 085/148] scsi: ufs: core: Fix spelling of a sysfs attribute name Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 086/148] RDMA/core: Create and destroy counters in the ib_core Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 087/148] RDMA/mlx5: Fix CC counters query for MPV Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 088/148] btrfs: propagate last_unlink_trans earlier when doing a rmdir Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 089/148] btrfs: use btrfs_record_snapshot_destroy() during rmdir Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 090/148] ethernet: atl1: Add missing DMA mapping error checks and count errors Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 091/148] dpaa2-eth: fix xdp_rxq_info leak Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 092/148] spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 093/148] spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 094/148] spi: spi-fsl-dspi: Clear completion counter before initiating transfer Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 095/148] drm/i915/selftests: Change mock_request() to return error pointers Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 096/148] drm/i915/gt: Fix timeline left held on VMA alloc error Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 097/148] net: rose: Fix fall-through warnings for Clang Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 098/148] rose: fix dangling neighbour pointers in rose_rt_device_down() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 099/148] Logitech C-270 even more broken Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 100/148] usb: typec: displayport: Fix potential deadlock Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 101/148] ACPI: PAD: fix crash in exit_round_robin() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 102/148] media: uvcvideo: Return the number of processed controls Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 103/148] media: uvcvideo: Send control events for partial succeeds Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 104/148] media: uvcvideo: Rollback non processed entities on error Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 105/148] staging: rtl8723bs: Avoid memset() in aes_cipher() and aes_decipher() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 106/148] drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 107/148] proc: Clear the pieces of proc_inode that proc_evict_inode cares about Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 108/148] fix proc_sys_compare() handling of in-lookup dentries Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 109/148] netlink: Fix wraparounds of sk->sk_rmem_alloc Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 110/148] tipc: Fix use-after-free in tipc_conn_close() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 111/148] atm: clip: Fix potential null-ptr-deref in to_atmarpd() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 112/148] atm: clip: Fix memory leak of struct clip_vcc Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 113/148] atm: clip: Fix infinite recursive call of clip_push() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 114/148] atm: clip: Fix NULL pointer dereference in vcc_sendmsg() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 115/148] net/sched: Abort __tc_modify_qdisc if parent class does not exist Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 116/148] rxrpc: Fix oops due to non-existence of prealloc backlog struct Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.4 117/148] x86/mce/amd: Fix threshold limit reset Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 118/148] x86/mce: Dont remove sysfs if thresholding sysfs init fails Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 119/148] x86/mce: Make sure CMCI banks are cleared during shutdown on Intel Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 120/148] pinctrl: qcom: msm: mark certain pins as invalid for interrupts Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 121/148] drm/sched: Increment job count before swapping tail spsc queue Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 122/148] usb: gadget: u_serial: Fix race condition in TTY wakeup Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 123/148] Revert "ACPI: battery: negate current when discharging" Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 124/148] pwm: mediatek: Ensure to disable clocks in error path Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 125/148] netlink: make sure we allow at least one dump skb Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 126/148] netlink: Fix rmem check in netlink_broadcast_deliver() Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 127/148] RDMA/mlx5: Fix vport loopback for MPV device Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 128/148] flexfiles/pNFS: update stats on NFS4ERR_DELAY for v4.1 DSes Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 129/148] NFSv4/flexfiles: Fix handling of NFS level errors in I/O Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 130/148] Input: xpad - add support for Amazon Game Controller Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 131/148] Input: xpad - add VID for Turtle Beach controllers Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 132/148] Input: xpad - support Acer NGR 200 Controller Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 133/148] dma-buf: fix timeout handling in dma_resv_wait_timeout v2 Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 134/148] wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev() Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 135/148] md/raid1: Fix stack memory use after return in raid1_reshape Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 136/148] net: appletalk: Fix device refcount leak in atrtr_create() Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 137/148] net: phy: microchip: limit 100M workaround to link-down events on LAN88xx Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 138/148] can: m_can: m_can_handle_lost_msg(): downgrade msg lost in rx message to debug level Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 139/148] bnxt_en: Fix DCB ETS validation Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 140/148] bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 141/148] atm: idt77252: Add missing `dma_map_error()` Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 142/148] net: usb: qmi_wwan: add SIMCom 8230C composition Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 143/148] vt: add missing notification when switching back to text mode Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 144/148] HID: Add IGNORE quirk for SMARTLINKTECHNOLOGY Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 145/148] HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 146/148] Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 147/148] x86/mm: Disable hugetlb page table sharing on 32-bit Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.4 148/148] net: ipv6: Discard next-hop MTU less than minimum link MTU Greg Kroah-Hartman
2025-07-16 10:11 ` [PATCH 5.4 000/148] 5.4.296-rc1 review Jon Hunter
2025-07-16 10:16 ` Jon Hunter
2025-07-16 14:10 ` Greg Kroah-Hartman
2025-07-16 12:25 ` ALOK TIWARI
2025-07-16 15:01 ` Shuah Khan
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250715130801.678216530@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=leon@kernel.org \
--cc=patches@lists.linux.dev \
--cc=sashal@kernel.org \
--cc=shinichiro.kawasaki@wdc.com \
--cc=stable@vger.kernel.org \
--cc=yanjun.zhu@linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).