From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
patches@lists.linux.dev, linux-fsdevel@vger.kernel.org,
linux-unionfs@vger.kernel.org, linux-erofs@lists.ozlabs.org,
Amir Goldstein <amir73il@gmail.com>,
Serge Hallyn <serge@hallyn.com>,
Christian Brauner <brauner@kernel.org>,
Paul Moore <paul@paul-moore.com>
Subject: [PATCH 7.0 169/307] lsm: add backing_file LSM hooks
Date: Mon, 4 May 2026 15:50:54 +0200 [thread overview]
Message-ID: <20260504135149.223269107@linuxfoundation.org> (raw)
In-Reply-To: <20260504135142.814938198@linuxfoundation.org>
7.0-stable review patch. If anyone has any objections, please let me know.
------------------
From: Paul Moore <paul@paul-moore.com>
commit 6af36aeb147a06dea47c49859cd6ca5659aeb987 upstream.
Stacked filesystems such as overlayfs do not currently provide the
necessary mechanisms for LSMs to properly enforce access controls on the
mmap() and mprotect() operations. In order to resolve this gap, a LSM
security blob is being added to the backing_file struct and the following
new LSM hooks are being created:
security_backing_file_alloc()
security_backing_file_free()
security_mmap_backing_file()
The first two hooks are to manage the lifecycle of the LSM security blob
in the backing_file struct, while the third provides a new mmap() access
control point for the underlying backing file. It is also expected that
LSMs will likely want to update their security_file_mprotect() callback
to address issues with their mprotect() controls, but that does not
require a change to the security_file_mprotect() LSM hook.
There are a three other small changes to support these new LSM hooks:
* Pass the user file associated with a backing file down to
alloc_empty_backing_file() so it can be included in the
security_backing_file_alloc() hook.
* Add getter and setter functions for the backing_file struct LSM blob
as the backing_file struct remains private to fs/file_table.c.
* Constify the file struct field in the LSM common_audit_data struct to
better support LSMs that need to pass a const file struct pointer into
the common LSM audit code.
Thanks to Arnd Bergmann for identifying the missing EXPORT_SYMBOL_GPL()
and supplying a fixup.
Cc: stable@vger.kernel.org
Cc: linux-fsdevel@vger.kernel.org
Cc: linux-unionfs@vger.kernel.org
Cc: linux-erofs@lists.ozlabs.org
Reviewed-by: Amir Goldstein <amir73il@gmail.com>
Reviewed-by: Serge Hallyn <serge@hallyn.com>
Reviewed-by: Christian Brauner <brauner@kernel.org>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
fs/backing-file.c | 18 +++++--
fs/erofs/ishare.c | 10 +++-
fs/file_table.c | 27 +++++++++--
fs/fuse/passthrough.c | 2
fs/internal.h | 3 -
fs/overlayfs/dir.c | 2
fs/overlayfs/file.c | 2
include/linux/backing-file.h | 4 -
include/linux/fs.h | 13 +++++
include/linux/lsm_audit.h | 2
include/linux/lsm_hook_defs.h | 5 ++
include/linux/lsm_hooks.h | 1
include/linux/security.h | 22 +++++++++
security/lsm.h | 1
security/lsm_init.c | 9 +++
security/security.c | 102 ++++++++++++++++++++++++++++++++++++++++++
16 files changed, 206 insertions(+), 17 deletions(-)
--- a/fs/backing-file.c
+++ b/fs/backing-file.c
@@ -12,6 +12,7 @@
#include <linux/backing-file.h>
#include <linux/splice.h>
#include <linux/mm.h>
+#include <linux/security.h>
#include "internal.h"
@@ -29,14 +30,15 @@
* returned file into a container structure that also stores the stacked
* file's path, which can be retrieved using backing_file_user_path().
*/
-struct file *backing_file_open(const struct path *user_path, int flags,
+struct file *backing_file_open(const struct file *user_file, int flags,
const struct path *real_path,
const struct cred *cred)
{
+ const struct path *user_path = &user_file->f_path;
struct file *f;
int error;
- f = alloc_empty_backing_file(flags, cred);
+ f = alloc_empty_backing_file(flags, cred, user_file);
if (IS_ERR(f))
return f;
@@ -52,15 +54,16 @@ struct file *backing_file_open(const str
}
EXPORT_SYMBOL_GPL(backing_file_open);
-struct file *backing_tmpfile_open(const struct path *user_path, int flags,
+struct file *backing_tmpfile_open(const struct file *user_file, int flags,
const struct path *real_parentpath,
umode_t mode, const struct cred *cred)
{
struct mnt_idmap *real_idmap = mnt_idmap(real_parentpath->mnt);
+ const struct path *user_path = &user_file->f_path;
struct file *f;
int error;
- f = alloc_empty_backing_file(flags, cred);
+ f = alloc_empty_backing_file(flags, cred, user_file);
if (IS_ERR(f))
return f;
@@ -336,8 +339,13 @@ int backing_file_mmap(struct file *file,
vma_set_file(vma, file);
- scoped_with_creds(ctx->cred)
+ scoped_with_creds(ctx->cred) {
+ ret = security_mmap_backing_file(vma, file, user_file);
+ if (ret)
+ return ret;
+
ret = vfs_mmap(vma->vm_file, vma);
+ }
if (ctx->accessed)
ctx->accessed(user_file);
--- a/fs/erofs/ishare.c
+++ b/fs/erofs/ishare.c
@@ -4,6 +4,7 @@
*/
#include <linux/xxhash.h>
#include <linux/mount.h>
+#include <linux/security.h>
#include "internal.h"
#include "xattr.h"
@@ -106,7 +107,8 @@ static int erofs_ishare_file_open(struct
if (file->f_flags & O_DIRECT)
return -EINVAL;
- realfile = alloc_empty_backing_file(O_RDONLY|O_NOATIME, current_cred());
+ realfile = alloc_empty_backing_file(O_RDONLY|O_NOATIME, current_cred(),
+ file);
if (IS_ERR(realfile))
return PTR_ERR(realfile);
ihold(sharedinode);
@@ -150,8 +152,14 @@ static ssize_t erofs_ishare_file_read_it
static int erofs_ishare_mmap(struct file *file, struct vm_area_struct *vma)
{
struct file *realfile = file->private_data;
+ int err;
vma_set_file(vma, realfile);
+
+ err = security_mmap_backing_file(vma, realfile, file);
+ if (err)
+ return err;
+
return generic_file_readonly_mmap(file, vma);
}
--- a/fs/file_table.c
+++ b/fs/file_table.c
@@ -50,6 +50,9 @@ struct backing_file {
struct path user_path;
freeptr_t bf_freeptr;
};
+#ifdef CONFIG_SECURITY
+ void *security;
+#endif
};
#define backing_file(f) container_of(f, struct backing_file, file)
@@ -66,8 +69,21 @@ void backing_file_set_user_path(struct f
}
EXPORT_SYMBOL_GPL(backing_file_set_user_path);
+#ifdef CONFIG_SECURITY
+void *backing_file_security(const struct file *f)
+{
+ return backing_file(f)->security;
+}
+
+void backing_file_set_security(struct file *f, void *security)
+{
+ backing_file(f)->security = security;
+}
+#endif /* CONFIG_SECURITY */
+
static inline void backing_file_free(struct backing_file *ff)
{
+ security_backing_file_free(&ff->file);
path_put(&ff->user_path);
kmem_cache_free(bfilp_cachep, ff);
}
@@ -288,10 +304,12 @@ struct file *alloc_empty_file_noaccount(
return f;
}
-static int init_backing_file(struct backing_file *ff)
+static int init_backing_file(struct backing_file *ff,
+ const struct file *user_file)
{
memset(&ff->user_path, 0, sizeof(ff->user_path));
- return 0;
+ backing_file_set_security(&ff->file, NULL);
+ return security_backing_file_alloc(&ff->file, user_file);
}
/*
@@ -301,7 +319,8 @@ static int init_backing_file(struct back
* This is only for kernel internal use, and the allocate file must not be
* installed into file tables or such.
*/
-struct file *alloc_empty_backing_file(int flags, const struct cred *cred)
+struct file *alloc_empty_backing_file(int flags, const struct cred *cred,
+ const struct file *user_file)
{
struct backing_file *ff;
int error;
@@ -318,7 +337,7 @@ struct file *alloc_empty_backing_file(in
/* The f_mode flags must be set before fput(). */
ff->file.f_mode |= FMODE_BACKING | FMODE_NOACCOUNT;
- error = init_backing_file(ff);
+ error = init_backing_file(ff, user_file);
if (unlikely(error)) {
fput(&ff->file);
return ERR_PTR(error);
--- a/fs/fuse/passthrough.c
+++ b/fs/fuse/passthrough.c
@@ -167,7 +167,7 @@ struct fuse_backing *fuse_passthrough_op
goto out;
/* Allocate backing file per fuse file to store fuse path */
- backing_file = backing_file_open(&file->f_path, file->f_flags,
+ backing_file = backing_file_open(file, file->f_flags,
&fb->file->f_path, fb->cred);
err = PTR_ERR(backing_file);
if (IS_ERR(backing_file)) {
--- a/fs/internal.h
+++ b/fs/internal.h
@@ -106,7 +106,8 @@ extern void chroot_fs_refs(const struct
*/
struct file *alloc_empty_file(int flags, const struct cred *cred);
struct file *alloc_empty_file_noaccount(int flags, const struct cred *cred);
-struct file *alloc_empty_backing_file(int flags, const struct cred *cred);
+struct file *alloc_empty_backing_file(int flags, const struct cred *cred,
+ const struct file *user_file);
void backing_file_set_user_path(struct file *f, const struct path *path);
static inline void file_put_write_access(struct file *file)
--- a/fs/overlayfs/dir.c
+++ b/fs/overlayfs/dir.c
@@ -1374,7 +1374,7 @@ static int ovl_create_tmpfile(struct fil
return PTR_ERR(cred);
ovl_path_upper(dentry->d_parent, &realparentpath);
- realfile = backing_tmpfile_open(&file->f_path, flags, &realparentpath,
+ realfile = backing_tmpfile_open(file, flags, &realparentpath,
mode, current_cred());
err = PTR_ERR_OR_ZERO(realfile);
pr_debug("tmpfile/open(%pd2, 0%o) = %i\n", realparentpath.dentry, mode, err);
--- a/fs/overlayfs/file.c
+++ b/fs/overlayfs/file.c
@@ -48,7 +48,7 @@ static struct file *ovl_open_realfile(co
if (!inode_owner_or_capable(real_idmap, realinode))
flags &= ~O_NOATIME;
- realfile = backing_file_open(file_user_path(file),
+ realfile = backing_file_open(file,
flags, realpath, current_cred());
}
}
--- a/include/linux/backing-file.h
+++ b/include/linux/backing-file.h
@@ -18,10 +18,10 @@ struct backing_file_ctx {
void (*end_write)(struct kiocb *iocb, ssize_t);
};
-struct file *backing_file_open(const struct path *user_path, int flags,
+struct file *backing_file_open(const struct file *user_file, int flags,
const struct path *real_path,
const struct cred *cred);
-struct file *backing_tmpfile_open(const struct path *user_path, int flags,
+struct file *backing_tmpfile_open(const struct file *user_file, int flags,
const struct path *real_parentpath,
umode_t mode, const struct cred *cred);
ssize_t backing_file_read_iter(struct file *file, struct iov_iter *iter,
--- a/include/linux/fs.h
+++ b/include/linux/fs.h
@@ -2475,6 +2475,19 @@ struct file *dentry_create(struct path *
const struct cred *cred);
const struct path *backing_file_user_path(const struct file *f);
+#ifdef CONFIG_SECURITY
+void *backing_file_security(const struct file *f);
+void backing_file_set_security(struct file *f, void *security);
+#else
+static inline void *backing_file_security(const struct file *f)
+{
+ return NULL;
+}
+static inline void backing_file_set_security(struct file *f, void *security)
+{
+}
+#endif /* CONFIG_SECURITY */
+
/*
* When mmapping a file on a stackable filesystem (e.g., overlayfs), the file
* stored in ->vm_file is a backing file whose f_inode is on the underlying
--- a/include/linux/lsm_audit.h
+++ b/include/linux/lsm_audit.h
@@ -94,7 +94,7 @@ struct common_audit_data {
#endif
char *kmod_name;
struct lsm_ioctlop_audit *op;
- struct file *file;
+ const struct file *file;
struct lsm_ibpkey_audit *ibpkey;
struct lsm_ibendport_audit *ibendport;
int reason;
--- a/include/linux/lsm_hook_defs.h
+++ b/include/linux/lsm_hook_defs.h
@@ -191,6 +191,9 @@ LSM_HOOK(int, 0, file_permission, struct
LSM_HOOK(int, 0, file_alloc_security, struct file *file)
LSM_HOOK(void, LSM_RET_VOID, file_release, struct file *file)
LSM_HOOK(void, LSM_RET_VOID, file_free_security, struct file *file)
+LSM_HOOK(int, 0, backing_file_alloc, struct file *backing_file,
+ const struct file *user_file)
+LSM_HOOK(void, LSM_RET_VOID, backing_file_free, struct file *backing_file)
LSM_HOOK(int, 0, file_ioctl, struct file *file, unsigned int cmd,
unsigned long arg)
LSM_HOOK(int, 0, file_ioctl_compat, struct file *file, unsigned int cmd,
@@ -198,6 +201,8 @@ LSM_HOOK(int, 0, file_ioctl_compat, stru
LSM_HOOK(int, 0, mmap_addr, unsigned long addr)
LSM_HOOK(int, 0, mmap_file, struct file *file, unsigned long reqprot,
unsigned long prot, unsigned long flags)
+LSM_HOOK(int, 0, mmap_backing_file, struct vm_area_struct *vma,
+ struct file *backing_file, struct file *user_file)
LSM_HOOK(int, 0, file_mprotect, struct vm_area_struct *vma,
unsigned long reqprot, unsigned long prot)
LSM_HOOK(int, 0, file_lock, struct file *file, unsigned int cmd)
--- a/include/linux/lsm_hooks.h
+++ b/include/linux/lsm_hooks.h
@@ -104,6 +104,7 @@ struct security_hook_list {
struct lsm_blob_sizes {
unsigned int lbs_cred;
unsigned int lbs_file;
+ unsigned int lbs_backing_file;
unsigned int lbs_ib;
unsigned int lbs_inode;
unsigned int lbs_sock;
--- a/include/linux/security.h
+++ b/include/linux/security.h
@@ -472,11 +472,17 @@ int security_file_permission(struct file
int security_file_alloc(struct file *file);
void security_file_release(struct file *file);
void security_file_free(struct file *file);
+int security_backing_file_alloc(struct file *backing_file,
+ const struct file *user_file);
+void security_backing_file_free(struct file *backing_file);
int security_file_ioctl(struct file *file, unsigned int cmd, unsigned long arg);
int security_file_ioctl_compat(struct file *file, unsigned int cmd,
unsigned long arg);
int security_mmap_file(struct file *file, unsigned long prot,
unsigned long flags);
+int security_mmap_backing_file(struct vm_area_struct *vma,
+ struct file *backing_file,
+ struct file *user_file);
int security_mmap_addr(unsigned long addr);
int security_file_mprotect(struct vm_area_struct *vma, unsigned long reqprot,
unsigned long prot);
@@ -1141,6 +1147,15 @@ static inline void security_file_release
static inline void security_file_free(struct file *file)
{ }
+static inline int security_backing_file_alloc(struct file *backing_file,
+ const struct file *user_file)
+{
+ return 0;
+}
+
+static inline void security_backing_file_free(struct file *backing_file)
+{ }
+
static inline int security_file_ioctl(struct file *file, unsigned int cmd,
unsigned long arg)
{
@@ -1159,6 +1174,13 @@ static inline int security_mmap_file(str
{
return 0;
}
+
+static inline int security_mmap_backing_file(struct vm_area_struct *vma,
+ struct file *backing_file,
+ struct file *user_file)
+{
+ return 0;
+}
static inline int security_mmap_addr(unsigned long addr)
{
--- a/security/lsm.h
+++ b/security/lsm.h
@@ -29,6 +29,7 @@ extern struct lsm_blob_sizes blob_sizes;
/* LSM blob caches */
extern struct kmem_cache *lsm_file_cache;
+extern struct kmem_cache *lsm_backing_file_cache;
extern struct kmem_cache *lsm_inode_cache;
/* LSM blob allocators */
--- a/security/lsm_init.c
+++ b/security/lsm_init.c
@@ -293,6 +293,8 @@ static void __init lsm_prepare(struct ls
blobs = lsm->blobs;
lsm_blob_size_update(&blobs->lbs_cred, &blob_sizes.lbs_cred);
lsm_blob_size_update(&blobs->lbs_file, &blob_sizes.lbs_file);
+ lsm_blob_size_update(&blobs->lbs_backing_file,
+ &blob_sizes.lbs_backing_file);
lsm_blob_size_update(&blobs->lbs_ib, &blob_sizes.lbs_ib);
/* inode blob gets an rcu_head in addition to LSM blobs. */
if (blobs->lbs_inode && blob_sizes.lbs_inode == 0)
@@ -441,6 +443,8 @@ int __init security_init(void)
if (lsm_debug) {
lsm_pr("blob(cred) size %d\n", blob_sizes.lbs_cred);
lsm_pr("blob(file) size %d\n", blob_sizes.lbs_file);
+ lsm_pr("blob(backing_file) size %d\n",
+ blob_sizes.lbs_backing_file);
lsm_pr("blob(ib) size %d\n", blob_sizes.lbs_ib);
lsm_pr("blob(inode) size %d\n", blob_sizes.lbs_inode);
lsm_pr("blob(ipc) size %d\n", blob_sizes.lbs_ipc);
@@ -462,6 +466,11 @@ int __init security_init(void)
lsm_file_cache = kmem_cache_create("lsm_file_cache",
blob_sizes.lbs_file, 0,
SLAB_PANIC, NULL);
+ if (blob_sizes.lbs_backing_file)
+ lsm_backing_file_cache = kmem_cache_create(
+ "lsm_backing_file_cache",
+ blob_sizes.lbs_backing_file,
+ 0, SLAB_PANIC, NULL);
if (blob_sizes.lbs_inode)
lsm_inode_cache = kmem_cache_create("lsm_inode_cache",
blob_sizes.lbs_inode, 0,
--- a/security/security.c
+++ b/security/security.c
@@ -82,6 +82,7 @@ const struct lsm_id *lsm_idlist[MAX_LSM_
struct lsm_blob_sizes blob_sizes;
struct kmem_cache *lsm_file_cache;
+struct kmem_cache *lsm_backing_file_cache;
struct kmem_cache *lsm_inode_cache;
#define SECURITY_HOOK_ACTIVE_KEY(HOOK, IDX) security_hook_active_##HOOK##_##IDX
@@ -174,6 +175,30 @@ static int lsm_file_alloc(struct file *f
}
/**
+ * lsm_backing_file_alloc - allocate a composite backing file blob
+ * @backing_file: the backing file
+ *
+ * Allocate the backing file blob for all the modules.
+ *
+ * Returns 0, or -ENOMEM if memory can't be allocated.
+ */
+static int lsm_backing_file_alloc(struct file *backing_file)
+{
+ void *blob;
+
+ if (!lsm_backing_file_cache) {
+ backing_file_set_security(backing_file, NULL);
+ return 0;
+ }
+
+ blob = kmem_cache_zalloc(lsm_backing_file_cache, GFP_KERNEL);
+ backing_file_set_security(backing_file, blob);
+ if (!blob)
+ return -ENOMEM;
+ return 0;
+}
+
+/**
* lsm_blob_alloc - allocate a composite blob
* @dest: the destination for the blob
* @size: the size of the blob
@@ -2419,6 +2444,57 @@ void security_file_free(struct file *fil
}
/**
+ * security_backing_file_alloc() - Allocate and setup a backing file blob
+ * @backing_file: the backing file
+ * @user_file: the associated user visible file
+ *
+ * Allocate a backing file LSM blob and perform any necessary initialization of
+ * the LSM blob. There will be some operations where the LSM will not have
+ * access to @user_file after this point, so any important state associated
+ * with @user_file that is important to the LSM should be captured in the
+ * backing file's LSM blob.
+ *
+ * LSM's should avoid taking a reference to @user_file in this hook as it will
+ * result in problems later when the system attempts to drop/put the file
+ * references due to a circular dependency.
+ *
+ * Return: Return 0 if the hook is successful, negative values otherwise.
+ */
+int security_backing_file_alloc(struct file *backing_file,
+ const struct file *user_file)
+{
+ int rc;
+
+ rc = lsm_backing_file_alloc(backing_file);
+ if (rc)
+ return rc;
+ rc = call_int_hook(backing_file_alloc, backing_file, user_file);
+ if (unlikely(rc))
+ security_backing_file_free(backing_file);
+
+ return rc;
+}
+
+/**
+ * security_backing_file_free() - Free a backing file blob
+ * @backing_file: the backing file
+ *
+ * Free any LSM state associate with a backing file's LSM blob, including the
+ * blob itself.
+ */
+void security_backing_file_free(struct file *backing_file)
+{
+ void *blob = backing_file_security(backing_file);
+
+ call_void_hook(backing_file_free, backing_file);
+
+ if (blob) {
+ backing_file_set_security(backing_file, NULL);
+ kmem_cache_free(lsm_backing_file_cache, blob);
+ }
+}
+
+/**
* security_file_ioctl() - Check if an ioctl is allowed
* @file: associated file
* @cmd: ioctl cmd
@@ -2507,6 +2583,32 @@ int security_mmap_file(struct file *file
}
/**
+ * security_mmap_backing_file - Check if mmap'ing a backing file is allowed
+ * @vma: the vm_area_struct for the mmap'd region
+ * @backing_file: the backing file being mmap'd
+ * @user_file: the user file being mmap'd
+ *
+ * Check permissions for a mmap operation on a stacked filesystem. This hook
+ * is called after the security_mmap_file() and is responsible for authorizing
+ * the mmap on @backing_file. It is important to note that the mmap operation
+ * on @user_file has already been authorized and the @vma->vm_file has been
+ * set to @backing_file.
+ *
+ * Return: Returns 0 if permission is granted.
+ */
+int security_mmap_backing_file(struct vm_area_struct *vma,
+ struct file *backing_file,
+ struct file *user_file)
+{
+ /* recommended by the stackable filesystem devs */
+ if (WARN_ON_ONCE(!(backing_file->f_mode & FMODE_BACKING)))
+ return -EIO;
+
+ return call_int_hook(mmap_backing_file, vma, backing_file, user_file);
+}
+EXPORT_SYMBOL_GPL(security_mmap_backing_file);
+
+/**
* security_mmap_addr() - Check if mmap'ing an address is allowed
* @addr: address
*
next prev parent reply other threads:[~2026-05-04 14:01 UTC|newest]
Thread overview: 324+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-05-04 13:48 [PATCH 7.0 000/307] 7.0.4-rc1 review Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 001/307] ALSA: usb-audio: stop parsing UAC2 rates at MAX_NR_RATES Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 002/307] ALSA: usb-audio: Avoid false E-MU sample-rate notifications Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 003/307] ALSA: usb-audio: Fix Audio Advantage Micro II SPDIF switch Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 004/307] usb: xhci: Make usb_host_endpoint.hcpriv survive endpoint_disable() Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 005/307] usb: chipidea: otg: not wait vbus drop if use role_switch Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 006/307] usb: chipidea: core: allow ci_irq_handler() handle both ID and VBUS change Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 007/307] ALSA: usb-audio: Evaluate packsize caps at the right place Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 008/307] LoongArch: Add spectre boundry for syscall dispatch table Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 009/307] drm/nouveau: fix u32 overflow in pushbuf reloc bounds check Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 010/307] leds: qcom-lpg: Check for array overflow when selecting the high resolution Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 011/307] greybus: gb-beagleplay: bound bootloader receive buffering Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 012/307] greybus: gb-beagleplay: fix sleep in atomic context in hdlc_tx_frames() Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 013/307] misc: ibmasm: fix OOB MMIO read in ibmasm_handle_mouse_interrupt() Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 014/307] ibmasm: fix OOB reads in command_file_write due to missing size checks Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 015/307] ibmasm: fix heap over-read in ibmasm_send_i2o_message() Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 016/307] sysfs: attribute_group: Respect is_visible_const() when changing owner Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 017/307] driver core: Dont let a device probe until its ready Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 018/307] device property: Make modifications of fwnode "flags" thread safe Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 019/307] drm/nouveau: fix nvkm_device leak on aperture removal failure Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 020/307] rust: dma: remove DMA_ATTR_NO_KERNEL_MAPPING from public attrs Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 021/307] kbuild: rust: allow `clippy::uninlined_format_args` Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 022/307] fs: afs: revert mmap_prepare() change Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 023/307] firmware: google: framebuffer: Do not mark framebuffer as busy Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 024/307] lib: test_hmm: evict device pages on file close to avoid use-after-free Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 025/307] arm64/mm: Enable batched TLB flush in unmap_hotplug_range() Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 026/307] arm64: mm: Fix rodata=full block mapping support for realm guests Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 027/307] mm: migrate: requeue destination folio on deferred split queue Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 028/307] mm: prevent droppable mappings from being locked Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 029/307] mm: fix deferred split queue races during migration Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 030/307] ocfs2: split transactions in dio completion to avoid credit exhaustion Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 031/307] Input: edt-ft5x06 - fix use-after-free in debugfs teardown Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 032/307] zram: do not forget to endio for partial discard requests Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 033/307] wifi: rtw88: check for PCI upstream bridge existence Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 034/307] wifi: mwifiex: fix use-after-free in mwifiex_adapter_cleanup() Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 035/307] vfio: selftests: Fix VLA initialisation in vfio_pci_irq_set() Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 036/307] vfio/xe: Add a missing vfio_pci_core_release_dev() Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 037/307] vfio/virtio: Convert list_lock from spinlock to mutex Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 038/307] vfio/cdx: Serialize VFIO_DEVICE_SET_IRQS with a per-device mutex Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 039/307] vfio/cdx: Fix NULL pointer dereference in interrupt trigger path Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 040/307] um: drivers: call kernel_strrchr() explicitly in cow_user.c Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 041/307] thermal: core: Fix thermal zone governor cleanup issues Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 042/307] spi: imx: fix use-after-free on unbind Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 043/307] spi: ch341: fix memory leaks on probe failures Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 044/307] crypto: algif_aead - snapshot IV for async AEAD requests Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 045/307] crypto: pcrypt - Fix handling of MAY_BACKLOG requests Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 046/307] dt-bindings: display: ti, am65x-dss: Fix AM62L DSS reg and clock constraints Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 047/307] of: unittest: fix use-after-free in of_unittest_changeset() Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 048/307] of: unittest: fix use-after-free in testdrv_probe() Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 049/307] hwmon: (powerz) Fix missing usb_kill_urb() on signal interrupt Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 050/307] EDAC/versalnet: Fix device_node leak in mc_probe() Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 051/307] PCI: imx6: Skip waiting for L2/L3 Ready on i.MX6SX Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 052/307] media: amphion: Fix race between m2m job_abort and device_run Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 053/307] ALSA: control: Validate buf_len before strnlen() in snd_ctl_elem_init_enum_names() Greg Kroah-Hartman
2026-05-04 13:48 ` [PATCH 7.0 054/307] net: caif: clear client service pointer on teardown Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 055/307] net: strparser: fix skb_head leak in strp_abort_strp() Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 056/307] media: mtk-jpeg: fix use-after-free in release path due to uncancelled work Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 057/307] crypto: atmel-sha204a - Fix OTP sysfs read and error handling Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 058/307] PCI: endpoint: pci-epf-ntb: Remove duplicate resource teardown Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 059/307] Revert "ALSA: usb: Increase volume range that triggers a warning" Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 060/307] phy: qcom: m31-eusb2: clear PLL_EN during init Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 061/307] PCI: epf-mhi: Return 0, not remaining timeout, when eDMA ops complete Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 062/307] lib/ts_kmp: fix integer overflow in pattern length calculation Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 063/307] media: i2c: imx219: Check return value of devm_gpiod_get_optional() in imx219_probe() Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 064/307] net: qrtr: ns: Fix use-after-free in driver remove() Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 065/307] ext2: reject inodes with zero i_nlink and valid mode in ext2_iget() Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 066/307] mm/zsmalloc: copy KMSAN metadata in zs_page_migrate() Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 067/307] ALSA: aoa: i2sbus: clear stale prepared state Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 068/307] ALSA: aoa: i2sbus: fix OF node lifetime handling Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 069/307] ALSA: aoa: Skip devices with no codecs in i2sbus_resume() Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 070/307] ALSA: ctxfi: Add fallback to default RSR for S/PDIF Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 071/307] ALSA: seq_oss: return full count for successful SEQ_FULLSIZE writes Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 072/307] erofs: fix the out-of-bounds nameoff handling for trailing dirents Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 073/307] ipmi:ssif: Clean up kthread on errors Greg Kroah-Hartman
2026-05-05 9:10 ` Jiri Slaby
2026-05-05 10:06 ` Greg Kroah-Hartman
2026-05-05 12:54 ` Corey Minyard
2026-05-04 13:49 ` [PATCH 7.0 074/307] jbd2: fix deadlock in jbd2_journal_cancel_revoke() Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 075/307] KVM: selftests: Fix reserved value WRMSR testcase for multi-feature MSRs Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 076/307] md/raid10: fix deadlock with check operation and nowait requests Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 077/307] media: rc: igorplugusb: heed coherency rules Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 078/307] media: rockchip: rkcif: fix off by one bugs Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 079/307] media: rockchip: rkcif: comply with minimum number of buffers requirement Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 080/307] mfd: stpmic1: Attempt system shutdown twice in case PMIC is confused Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 081/307] mm/alloc_tag: clear codetag for pages allocated before page_ext initialization Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 082/307] mm/damon/core: fix damon_call() vs kdamond_fn() exit race Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 083/307] mm/damon/core: fix damos_walk() " Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 084/307] mm/hugetlb: fix early boot crash on parameters without = separator Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 085/307] mtd: docg3: fix use-after-free in docg3_release() Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 086/307] nvme-pci: add NVME_QUIRK_DISABLE_WRITE_ZEROES for Kingston OM3SGP4 Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 087/307] nvme: respect NVME_QUIRK_DISABLE_WRITE_ZEROES when wzsl is set Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 088/307] parisc: _llseek syscall is only available for 32-bit userspace Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 089/307] parisc: Drop ip_fast_csum() inline assembly implementation Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 090/307] PCI: cadence: Use cdns_pcie_read_sz() for byte or word read access Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 091/307] PCI: imx6: Fix reference clock source selection for i.MX95 Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 092/307] perf annotate: Use jump__delete when freeing LoongArch jumps Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 093/307] RDMA/mana_ib: Disable RX steering on RSS QP destroy Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 094/307] remoteproc: xlnx: Only access buffer information if IPI is buffered Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 095/307] reset: rzv2h-usb2phy: Keep PHY clock enabled for entire device lifetime Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 096/307] sched: Use u64 for bandwidth ratio calculations Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 097/307] selftests/mqueue: Fix incorrectly named file Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 098/307] landlock: Fix LOG_SUBDOMAINS_OFF inheritance across fork() Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 099/307] landlock: Allow TSYNC with LOG_SUBDOMAINS_OFF and fd=-1 Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 100/307] selftests/landlock: Drain stale audit records on init Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 101/307] selftests/landlock: Fix format warning for __u64 in net_test Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 102/307] selftests/landlock: Fix snprintf truncation checks in audit helpers Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 103/307] selftests/landlock: Skip stale records in audit_match_record() Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 104/307] rbd: fix null-ptr-deref when device_add_disk() fails Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 105/307] mm/zone_device: do not touch device folio after calling ->folio_free() Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 106/307] block: fix zone write plugs refcount handling in disk_zone_wplug_schedule_bio_work() Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 107/307] io_uring/zcrx: return back two step unregistration Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 108/307] io_uring/timeout: check unused sqe fields Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 109/307] block: relax pgmap check in bio_add_page for compatible zone device pages Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 110/307] iio: adc: ti-ads7950: use iio_push_to_buffers_with_ts_unaligned() Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 111/307] io_uring/register: fix ring resizing with mixed/large SQEs/CQEs Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 112/307] io_uring/zcrx: fix user_struct uaf Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 113/307] io_uring/poll: fix signed comparison in io_poll_get_ownership() Greg Kroah-Hartman
2026-05-04 13:49 ` [PATCH 7.0 114/307] io_uring/poll: ensure EPOLL_ONESHOT is propagated for EPOLL_URING_WAKE Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 115/307] module.lds,codetag: force 0 sh_addr for sections Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 116/307] module.lds.S: Fix modules on 32-bit parisc architecture Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 117/307] ALSA: core: Fix potential data race at fasync handling Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 118/307] ALSA: caiaq: Fix control_put() result and cache rollback Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 119/307] ALSA: caiaq: Handle probe errors properly Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 120/307] ALSA: 6fire: Fix input volume change detection Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 121/307] ALSA: hda/realtek - Add mute LED support for HP Victus 15-fa2xxx Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 122/307] ALSA: pcmtest: fix reference leak on failed device registration Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 123/307] ALSA: pcmtest: Fix resource leaks in module init error paths Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 124/307] iio: adc: ad7768-1: fix one-shot mode data acquisition Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 125/307] iio: adc: ad7768-1: remove switch to one-shot mode Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 126/307] rxrpc: Fix potential UAF after skb_unshare() failure Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 127/307] rxrpc: Fix memory leaks in rxkad_verify_response() Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 128/307] rxrpc: Fix conn-level packet handling to unshare RESPONSE packets Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 129/307] rxrpc: Fix rxkad crypto unalignment handling Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 130/307] rxrpc: Fix error handling in rxgk_extract_token() Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 131/307] rxrpc: Fix re-decryption of RESPONSE packets Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 132/307] rxrpc: Fix rxrpc_input_call_event() to only unshare DATA packets Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 133/307] EDAC/versalnet: Fix memory leak in remove and probe error paths Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 134/307] tools/accounting: handle truncated taskstats netlink messages Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 135/307] net: txgbe: fix RTNL assertion warning when remove module Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 136/307] arm64: dts: marvell: uDPU: add ethernet aliases Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 137/307] net: qrtr: ns: Limit the maximum server registration per node Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 138/307] net: qrtr: ns: Limit the maximum number of lookups Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 139/307] net: qrtr: ns: Free the node during ctrl_cmd_bye() Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 140/307] net: qrtr: ns: Limit the total number of nodes Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 141/307] net: rds: fix MR cleanup on copy error Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 142/307] net: txgbe: fix firmware version check Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 143/307] net/smc: avoid early lgr access in smc_clc_wait_msg Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 144/307] net: ks8851: Reinstate disabling of BHs around IRQ handler Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 145/307] net: bridge: use a stable FDB dst snapshot in RCU readers Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 146/307] netconsole: avoid out-of-bounds access on empty string in trim_newline() Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 147/307] net: mctp: fix dont require received header reserved bits to be zero Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 148/307] net: ks8851: Avoid excess softirq scheduling Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 149/307] drm/arcpgu: fix device node leak Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 150/307] slub: fix data loss and overflow in krealloc() Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 151/307] tracing/fprobe: Reject registration of a registered fprobe before init Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 152/307] RDMA/rxe: Validate pad and ICRC before payload_size() in rxe_rcv Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 153/307] printf: Compile the kunit test with DISABLE_BRANCH_PROFILING DISABLE_BRANCH_PROFILING Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 154/307] ipv4: icmp: validate reply type before using icmp_pointers Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 155/307] libceph: Prevent potential null-ptr-deref in ceph_handle_auth_reply() Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 156/307] spi: fix resource leaks on device setup failure Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 157/307] apparmor: Fix string overrun due to missing termination Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 158/307] extract-cert: Wrap key_pass with #ifdef USE_PKCS11_ENGINE Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 159/307] tpm: avoid -Wunused-but-set-variable Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 160/307] LoongArch: Make arch_irq_work_has_interrupt() true only if IPI HW exist Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 161/307] LoongArch: Show CPU vulnerabilites correctly Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 162/307] fbdev: defio: Disconnect deferred I/O from the lifetime of struct fb_info Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 163/307] power: supply: axp288_charger: Do not cancel work before initializing it Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 164/307] hwmon: (isl28022) Fix integer overflow in power calculation on 32-bit Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 165/307] hwmon: (powerz) Avoid cacheline sharing for DMA buffer Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 166/307] media: rzv2h-ivc: Revise default VBLANK formula Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 167/307] media: rzv2h-ivc: Fix AXIRX_VBLANK register write Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 168/307] fs: prepare for adding LSM blob to backing_file Greg Kroah-Hartman
2026-05-04 13:50 ` Greg Kroah-Hartman [this message]
2026-05-04 13:50 ` [PATCH 7.0 170/307] selinux: fix overlayfs mmap() and mprotect() access checks Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 171/307] hwmon: (pt5161l) Fix bugs in pt5161l_read_block_data() Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 172/307] randomize_kstack: Maintain kstack_offset per task Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 173/307] mmc: block: use single block write in retry Greg Kroah-Hartman
2026-05-04 13:50 ` [PATCH 7.0 174/307] mmc: sdhci-of-dwcmshc: Disable clock before DLL configuration Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 175/307] arm64: dts: ti: am62-verdin: Enable pullup for eMMC data pins Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 176/307] crypto: qat - fix IRQ cleanup on 6xxx probe failure Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 177/307] xfs: start gc on zonegc_low_space attribute updates Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 178/307] xfs: fix a resource leak in xfs_alloc_buftarg() Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 179/307] firmware: google: framebuffer: Do not unregister platform device Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 180/307] firmware: exynos-acpm: Drop fake const on handle pointer Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 181/307] crypto: talitos - fix SEC1 32k ahash request limitation Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 182/307] crypto: talitos - rename first/last to first_desc/last_desc Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 183/307] pwm: imx-tpm: Count the number of enabled channels in probe Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 184/307] tpm2-sessions: Fix missing tpm_buf_destroy() in tpm2_read_public() Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 185/307] tpm: Fix auth session leak in tpm2_get_random() error path Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 186/307] tpm: Use kfree_sensitive() to free auth session in tpm_dev_release() Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 187/307] tpm: tpm_tis: add error logging for data transfer Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 188/307] tpm: tpm_tis: stop transmit if retries are exhausted Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 189/307] rtc: ntxec: fix OF node reference imbalance Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 190/307] mm/vmalloc: take vmap_purge_lock in shrinker Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 191/307] mm/memfd_luo: fix physical address conversion in put_folios cleanup Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 192/307] mm/mempolicy: fix memory leaks in weighted_interleave_auto_store() Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 193/307] mm/damon/stat: fix memory leak on damon_start() failure in damon_stat_start() Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 194/307] mm/damon/core: validate damos_quota_goal->nid for node_mem_{used,free}_bp Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 195/307] mm/damon/core: validate damos_quota_goal->nid for node_memcg_{used,free}_bp Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 196/307] mm/damon/core: use time_in_range_open() for damos quota window start Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 197/307] mm/damon/core: disallow time-quota setting zero esz Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 198/307] mm/damon/core: disallow non-power of two min_region_sz on damon_start() Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 199/307] userfaultfd: allow registration of ranges below mmap_min_addr Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 200/307] LoongArch: KVM: Use CSR_CRMD_PLV in kvm_arch_vcpu_in_kernel() Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 201/307] KVM: x86: Defer non-architectural deliver of exception payload to userspace read Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 202/307] KVM: nSVM: Mark all of vmcb02 dirty when restoring nested state Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 203/307] KVM: nSVM: Sync NextRIP to cached vmcb12 after VMRUN of L2 Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 204/307] KVM: nSVM: Sync interrupt shadow " Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 205/307] KVM: SVM: Inject #UD for INVLPGA if EFER.SVME=0 Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 206/307] KVM: SVM: Explicitly mark vmcb01 dirty after modifying VMCB intercepts Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 207/307] KVM: nSVM: Ensure AVIC is inhibited when restoring a vCPU to guest mode Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 208/307] KVM: nSVM: Always use NextRIP as vmcb02s NextRIP after first L2 VMRUN Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 209/307] KVM: nSVM: Delay stuffing L2s current RIP into NextRIP until vCPU run Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 210/307] KVM: nSVM: Use vcpu->arch.cr2 when updating vmcb12 on nested #VMEXIT Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 211/307] KVM: arm64: Account for RESx bits in __compute_fgt() Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 212/307] KVM: nSVM: Avoid clearing VMCB_LBR in vmcb12 Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 213/307] KVM: nSVM: Delay setting soft IRQ RIP tracking fields until vCPU run Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 214/307] KVM: SVM: Switch svm_copy_lbrs() to a macro Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 215/307] KVM: SVM: Add missing save/restore handling of LBR MSRs Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 216/307] KVM: nSVM: Always inject a #GP if mapping VMCB12 fails on nested VMRUN Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 217/307] KVM: nSVM: Refactor checking LBRV enablement in vmcb12 into a helper Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 218/307] KVM: nSVM: Refactor writing vmcb12 on nested #VMEXIT as " Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 219/307] KVM: nSVM: Triple fault if restore host CR3 fails on nested #VMEXIT Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 220/307] KVM: nSVM: Triple fault if mapping VMCB12 " Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 221/307] KVM: nSVM: Clear GIF on nested #VMEXIT(INVALID) Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 222/307] KVM: nSVM: Clear EVENTINJ fields in vmcb12 on nested #VMEXIT Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 223/307] KVM: nSVM: Clear tracking of L1->L2 NMI and soft IRQ " Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 224/307] KVM: nSVM: Add missing consistency check for EFER, CR0, CR4, and CS Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 225/307] KVM: nSVM: Drop the non-architectural consistency check for NP_ENABLE Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 226/307] KVM: nSVM: Add missing consistency check for nCR3 validity Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 227/307] KVM: nSVM: Raise #UD if unhandled VMMCALL isnt intercepted by L1 Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 228/307] KVM: nSVM: Always intercept VMMCALL when L2 is active Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 229/307] ARM: 9472/1: fix race condition on PG_dcache_clean in __sync_icache_dcache() Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 230/307] ring-buffer: Do not double count the reader_page Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 231/307] ext4: fix bounds check in check_xattrs() to prevent out-of-bounds access Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 232/307] ext4: fix missing brelse() in ext4_xattr_inode_dec_ref_all() Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 233/307] udf: fix partition descriptor append bookkeeping Greg Kroah-Hartman
2026-05-04 13:51 ` [PATCH 7.0 234/307] mtd: spi-nor: sst: Fix write enable before AAI sequence Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 235/307] mtd: spinand: winbond: Declare the QE bit on W25NxxJW Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 236/307] amdgpu/jpeg: fix deepsleep register for jpeg 5_0_0 and 5_0_2 Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 237/307] md/md-llbitmap: skip reading rdevs that are not in_sync Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 238/307] md/md-llbitmap: raise barrier before state machine transition Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 239/307] md/raid5: fix soft lockup in retry_aligned_read() Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 240/307] md/raid5: validate payload size before accessing journal metadata Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 241/307] check-uapi: link into shared objects Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 242/307] mm, swap: speed up hibernation allocation and writeout Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 243/307] HID: apple: ensure the keyboard backlight is off if suspending Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 244/307] inotify: fix watch count leak when fsnotify_add_inode_mark_locked() fails Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 245/307] x86/cpu: Disable FRED when PTI is forced on Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 246/307] x86/shstk: Prevent deadlock during shstk sigreturn Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 247/307] wifi: rtl8xxxu: fix potential use of uninitialized value Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 248/307] tcp: call sk_data_ready() after listener migration Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 249/307] taskstats: set version in TGID exit notifications Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 250/307] mptcp: sync the msk->sndbuf at accept() time Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 251/307] mfd: core: Preserve OF node when ACPI handle is present Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 252/307] 9p: fix access mode flags being ORed instead of replaced Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 253/307] apparmor: use target tasks context in apparmor_getprocattr() Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 254/307] Bluetooth: hci_event: fix potential UAF in SSP passkey handlers Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 255/307] bus: mhi: host: pci_generic: Switch to async power up to avoid boot delays Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 256/307] can: ucan: fix devres lifetime Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 257/307] crypto: acomp - fix wrong pointer stored by acomp_save_req() Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 258/307] crypto: arm64/aes - Fix 32-bit aes_mac_update() arg treated as 64-bit Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 259/307] crypto: atmel-aes - Fix 3-page memory leak in atmel_aes_buff_cleanup Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 260/307] crypto: atmel-ecc - Release client on allocation failure Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 261/307] crypto: hisilicon - Fix dma_unmap_single() direction Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 262/307] crypto: ccree - fix a memory leak in cc_mac_digest() Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 263/307] crypto: atmel-tdes - fix DMA sync direction Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 264/307] crypto: atmel-sha204a - Fix error codes in OTP reads Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 265/307] crypto: atmel-sha204a - Fix potential UAF and memory leak in remove path Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 266/307] crypto: atmel-sha204a - Fix uninitialized data access on OTP read error Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 267/307] crypto: nx - fix bounce buffer leaks in nx842_crypto_{alloc,free}_ctx Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 268/307] crypto: nx - fix context leak in nx842_crypto_free_ctx Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 269/307] crypto: nx - Fix packed layout in struct nx842_crypto_header Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 270/307] dm mirror: fix integer overflow in create_dirty_log() Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 271/307] erofs: fix unsigned underflow in z_erofs_lz4_handle_overlap() Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 272/307] ceph: fix num_ops off-by-one when crypto allocation fails Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 273/307] ceph: only d_add() negative dentries when they are unhashed Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 274/307] gtp: disable BH before calling udp_tunnel_xmit_skb() Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 275/307] IB/core: Fix zero dmac race in neighbor resolution Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 276/307] ktest: Fix the month in the name of the failure directory Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 277/307] NFSv4.1: Apply session size limits on clone path Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 278/307] ntfs3: add buffer boundary checks to run_unpack() Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 279/307] ntfs3: fix integer overflow in run_unpack() volume boundary check Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 280/307] rtmutex: Use waiter::task instead of current in remove_waiter() Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 281/307] rxgk: Fix potential integer overflow in length check Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 282/307] sched_ext: Documentation: Clarify ops.dispatch() role in task lifecycle Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 283/307] scsi: sd: fix missing put_disk() when device_add(&disk_dev) fails Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 284/307] seg6: fix seg6 lwtunnel output redirect for L2 reduced encap mode Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 285/307] perf loongarch: Fix build failure with CONFIG_LIBDW_DWARF_UNWIND Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 286/307] iio: frequency: admv1013: add dev variable Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 287/307] iio: frequency: admv1013: fix NULL pointer dereference on str Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 288/307] wifi: mt76: mt792x: describe USB WFSYS reset with a descriptor Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 289/307] wifi: mt76: mt792x: fix mt7925u USB WFSYS reset handling Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 290/307] mm: various small mmap_prepare cleanups Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 291/307] mm: avoid deadlock when holding rmap on mmap_prepare error Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 292/307] mei: me: use PCI_DEVICE_DATA macro Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 293/307] mei: me: add nova lake point H DID Greg Kroah-Hartman
2026-05-04 13:52 ` [PATCH 7.0 294/307] crypto: authencesn - reject short ahash digests during instance creation Greg Kroah-Hartman
2026-05-04 13:53 ` [PATCH 7.0 295/307] driver core: Add kernel-doc for DEV_FLAG_COUNT enum value Greg Kroah-Hartman
2026-05-04 13:53 ` [PATCH 7.0 296/307] ALSA: caiaq: Fix potentially leftover ep1_in_urb at error path Greg Kroah-Hartman
2026-05-04 13:53 ` [PATCH 7.0 297/307] ALSA: caiaq: Dont abort when no input device is available Greg Kroah-Hartman
2026-05-04 13:53 ` [PATCH 7.0 298/307] ipv6: rpl: reserve mac_len headroom when recompressed SRH grows Greg Kroah-Hartman
2026-05-04 13:53 ` [PATCH 7.0 299/307] drm/amdgpu: fix zero-size GDS range init on RDNA4 Greg Kroah-Hartman
2026-05-04 13:53 ` [PATCH 7.0 300/307] drm/imagination: Fix segfault when updating ftrace mask Greg Kroah-Hartman
2026-05-04 13:53 ` [PATCH 7.0 301/307] ALSA: caiaq: fix usb_dev refcount leak on probe failure Greg Kroah-Hartman
2026-05-04 13:53 ` [PATCH 7.0 302/307] ALSA: aloop: Fix peer runtime UAF during format-change stop Greg Kroah-Hartman
2026-05-04 13:53 ` [PATCH 7.0 303/307] vmalloc: fix buffer overflow in vrealloc_node_align() Greg Kroah-Hartman
2026-05-04 13:53 ` [PATCH 7.0 304/307] mm/page_alloc: return NULL early from alloc_frozen_pages_nolock() in NMI on UP Greg Kroah-Hartman
2026-05-04 13:53 ` [PATCH 7.0 305/307] mm/slab: return NULL early from kmalloc_nolock() " Greg Kroah-Hartman
2026-05-04 13:53 ` [PATCH 7.0 306/307] net: ipv6: fix NOREF dst use in seg6 and rpl lwtunnels Greg Kroah-Hartman
2026-05-04 13:53 ` [PATCH 7.0 307/307] netfilter: reject zero shift in nft_bitwise Greg Kroah-Hartman
2026-05-04 14:13 ` [PATCH 7.0 000/307] 7.0.4-rc1 review Brett A C Sheffield
2026-05-04 15:28 ` Ronald Warsow
2026-05-04 17:53 ` Peter Schneider
2026-05-04 20:34 ` Takeshi Ogasawara
2026-05-04 21:24 ` Florian Fainelli
2026-05-05 7:59 ` Ron Economos
2026-05-05 9:51 ` Miguel Ojeda
2026-05-05 10:04 ` Luna Jernberg
2026-05-05 11:58 ` Mark Brown
2026-05-05 15:51 ` Shuah Khan
2026-05-05 18:30 ` Justin Forbes
2026-05-06 3:05 ` Barry K. Nathan
2026-05-06 8:36 ` Dileep malepu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260504135149.223269107@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=amir73il@gmail.com \
--cc=brauner@kernel.org \
--cc=linux-erofs@lists.ozlabs.org \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-unionfs@vger.kernel.org \
--cc=patches@lists.linux.dev \
--cc=paul@paul-moore.com \
--cc=serge@hallyn.com \
--cc=stable@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox