From: Antony Antony <antony.antony@secunet.com>
To: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: <stable@vger.kernel.org>, <patches@lists.linux.dev>,
Antony Antony <antony.antony@secunet.com>,
Sabrina Dubroca <sd@queasysnail.net>,
"Steffen Klassert" <steffen.klassert@secunet.com>,
Sasha Levin <sashal@kernel.org>
Subject: Re: [PATCH 6.6 133/208] xfrm: Add Direction to the SA in or out
Date: Mon, 28 Oct 2024 12:08:23 +0100 [thread overview]
Message-ID: <Zx9wp6atLMR1UcCL@moon.secunet.de> (raw)
In-Reply-To: <20241028062309.914261564@linuxfoundation.org>
On Mon, Oct 28, 2024 at 07:25:13 +0100, Greg Kroah-Hartman wrote:
> 6.6-stable review patch. If anyone has any objections, please let me know.
Hi Greg,
This patch is a part of a new feature SA direction and it appears the auto
patch selector picked one patch out of patch set?
I think this patch alone should not be applied to older stable kernel.
-antony
>
> ------------------
>
> From: Antony Antony <antony.antony@secunet.com>
>
> [ Upstream commit a4a87fa4e96c7746e009de06a567688fd9af6013 ]
>
> This patch introduces the 'dir' attribute, 'in' or 'out', to the
> xfrm_state, SA, enhancing usability by delineating the scope of values
> based on direction. An input SA will restrict values pertinent to input,
> effectively segregating them from output-related values.
> And an output SA will restrict attributes for output. This change aims
> to streamline the configuration process and improve the overall
> consistency of SA attributes during configuration.
>
> This feature sets the groundwork for future patches, including
> the upcoming IP-TFS patch.
>
> Signed-off-by: Antony Antony <antony.antony@secunet.com>
> Reviewed-by: Sabrina Dubroca <sd@queasysnail.net>
> Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
> Stable-dep-of: 3f0ab59e6537 ("xfrm: validate new SA's prefixlen using SA family when sel.family is unset")
> Signed-off-by: Sasha Levin <sashal@kernel.org>
> ---
> include/net/xfrm.h | 1 +
> include/uapi/linux/xfrm.h | 6 ++
> net/xfrm/xfrm_compat.c | 7 +-
> net/xfrm/xfrm_device.c | 6 ++
> net/xfrm/xfrm_replay.c | 3 +-
> net/xfrm/xfrm_state.c | 8 +++
> net/xfrm/xfrm_user.c | 138 ++++++++++++++++++++++++++++++++++++--
> 7 files changed, 160 insertions(+), 9 deletions(-)
>
> diff --git a/include/net/xfrm.h b/include/net/xfrm.h
> index 93a9866ee481f..c5cf062afd4a2 100644
> --- a/include/net/xfrm.h
> +++ b/include/net/xfrm.h
> @@ -292,6 +292,7 @@ struct xfrm_state {
> /* Private data of this transformer, format is opaque,
> * interpreted by xfrm_type methods. */
> void *data;
> + u8 dir;
> };
>
> static inline struct net *xs_net(struct xfrm_state *x)
> diff --git a/include/uapi/linux/xfrm.h b/include/uapi/linux/xfrm.h
> index 23543c33fee82..7cd491caef354 100644
> --- a/include/uapi/linux/xfrm.h
> +++ b/include/uapi/linux/xfrm.h
> @@ -140,6 +140,11 @@ enum {
> XFRM_POLICY_MAX = 3
> };
>
> +enum xfrm_sa_dir {
> + XFRM_SA_DIR_IN = 1,
> + XFRM_SA_DIR_OUT = 2
> +};
> +
> enum {
> XFRM_SHARE_ANY, /* No limitations */
> XFRM_SHARE_SESSION, /* For this session only */
> @@ -314,6 +319,7 @@ enum xfrm_attr_type_t {
> XFRMA_SET_MARK_MASK, /* __u32 */
> XFRMA_IF_ID, /* __u32 */
> XFRMA_MTIMER_THRESH, /* __u32 in seconds for input SA */
> + XFRMA_SA_DIR, /* __u8 */
> __XFRMA_MAX
>
> #define XFRMA_OUTPUT_MARK XFRMA_SET_MARK /* Compatibility */
> diff --git a/net/xfrm/xfrm_compat.c b/net/xfrm/xfrm_compat.c
> index 655fe4ff86212..703d4172c7d73 100644
> --- a/net/xfrm/xfrm_compat.c
> +++ b/net/xfrm/xfrm_compat.c
> @@ -98,6 +98,7 @@ static const int compat_msg_min[XFRM_NR_MSGTYPES] = {
> };
>
> static const struct nla_policy compat_policy[XFRMA_MAX+1] = {
> + [XFRMA_UNSPEC] = { .strict_start_type = XFRMA_SA_DIR },
> [XFRMA_SA] = { .len = XMSGSIZE(compat_xfrm_usersa_info)},
> [XFRMA_POLICY] = { .len = XMSGSIZE(compat_xfrm_userpolicy_info)},
> [XFRMA_LASTUSED] = { .type = NLA_U64},
> @@ -129,6 +130,7 @@ static const struct nla_policy compat_policy[XFRMA_MAX+1] = {
> [XFRMA_SET_MARK_MASK] = { .type = NLA_U32 },
> [XFRMA_IF_ID] = { .type = NLA_U32 },
> [XFRMA_MTIMER_THRESH] = { .type = NLA_U32 },
> + [XFRMA_SA_DIR] = NLA_POLICY_RANGE(NLA_U8, XFRM_SA_DIR_IN, XFRM_SA_DIR_OUT),
> };
>
> static struct nlmsghdr *xfrm_nlmsg_put_compat(struct sk_buff *skb,
> @@ -277,9 +279,10 @@ static int xfrm_xlate64_attr(struct sk_buff *dst, const struct nlattr *src)
> case XFRMA_SET_MARK_MASK:
> case XFRMA_IF_ID:
> case XFRMA_MTIMER_THRESH:
> + case XFRMA_SA_DIR:
> return xfrm_nla_cpy(dst, src, nla_len(src));
> default:
> - BUILD_BUG_ON(XFRMA_MAX != XFRMA_MTIMER_THRESH);
> + BUILD_BUG_ON(XFRMA_MAX != XFRMA_SA_DIR);
> pr_warn_once("unsupported nla_type %d\n", src->nla_type);
> return -EOPNOTSUPP;
> }
> @@ -434,7 +437,7 @@ static int xfrm_xlate32_attr(void *dst, const struct nlattr *nla,
> int err;
>
> if (type > XFRMA_MAX) {
> - BUILD_BUG_ON(XFRMA_MAX != XFRMA_MTIMER_THRESH);
> + BUILD_BUG_ON(XFRMA_MAX != XFRMA_SA_DIR);
> NL_SET_ERR_MSG(extack, "Bad attribute");
> return -EOPNOTSUPP;
> }
> diff --git a/net/xfrm/xfrm_device.c b/net/xfrm/xfrm_device.c
> index 04dc0c8a83707..fc18b9b4f22f3 100644
> --- a/net/xfrm/xfrm_device.c
> +++ b/net/xfrm/xfrm_device.c
> @@ -253,6 +253,12 @@ int xfrm_dev_state_add(struct net *net, struct xfrm_state *x,
> return -EINVAL;
> }
>
> + if ((xuo->flags & XFRM_OFFLOAD_INBOUND && x->dir == XFRM_SA_DIR_OUT) ||
> + (!(xuo->flags & XFRM_OFFLOAD_INBOUND) && x->dir == XFRM_SA_DIR_IN)) {
> + NL_SET_ERR_MSG(extack, "Mismatched SA and offload direction");
> + return -EINVAL;
> + }
> +
> is_packet_offload = xuo->flags & XFRM_OFFLOAD_PACKET;
>
> /* We don't yet support UDP encapsulation and TFC padding. */
> diff --git a/net/xfrm/xfrm_replay.c b/net/xfrm/xfrm_replay.c
> index ce56d659c55a6..bc56c63057252 100644
> --- a/net/xfrm/xfrm_replay.c
> +++ b/net/xfrm/xfrm_replay.c
> @@ -778,7 +778,8 @@ int xfrm_init_replay(struct xfrm_state *x, struct netlink_ext_ack *extack)
> }
>
> if (x->props.flags & XFRM_STATE_ESN) {
> - if (replay_esn->replay_window == 0) {
> + if (replay_esn->replay_window == 0 &&
> + (!x->dir || x->dir == XFRM_SA_DIR_IN)) {
> NL_SET_ERR_MSG(extack, "ESN replay window must be > 0");
> return -EINVAL;
> }
> diff --git a/net/xfrm/xfrm_state.c b/net/xfrm/xfrm_state.c
> index 8a6e8656d014f..93c19f64746fa 100644
> --- a/net/xfrm/xfrm_state.c
> +++ b/net/xfrm/xfrm_state.c
> @@ -1349,6 +1349,7 @@ xfrm_state_find(const xfrm_address_t *daddr, const xfrm_address_t *saddr,
> if (km_query(x, tmpl, pol) == 0) {
> spin_lock_bh(&net->xfrm.xfrm_state_lock);
> x->km.state = XFRM_STATE_ACQ;
> + x->dir = XFRM_SA_DIR_OUT;
> list_add(&x->km.all, &net->xfrm.state_all);
> XFRM_STATE_INSERT(bydst, &x->bydst,
> net->xfrm.state_bydst + h,
> @@ -1801,6 +1802,7 @@ static struct xfrm_state *xfrm_state_clone(struct xfrm_state *orig,
> x->lastused = orig->lastused;
> x->new_mapping = 0;
> x->new_mapping_sport = 0;
> + x->dir = orig->dir;
>
> return x;
>
> @@ -1921,8 +1923,14 @@ int xfrm_state_update(struct xfrm_state *x)
> }
>
> if (x1->km.state == XFRM_STATE_ACQ) {
> + if (x->dir && x1->dir != x->dir)
> + goto out;
> +
> __xfrm_state_insert(x);
> x = NULL;
> + } else {
> + if (x1->dir != x->dir)
> + goto out;
> }
> err = 0;
>
> diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c
> index 979f23cded401..4328e81ea6a31 100644
> --- a/net/xfrm/xfrm_user.c
> +++ b/net/xfrm/xfrm_user.c
> @@ -130,7 +130,7 @@ static inline int verify_sec_ctx_len(struct nlattr **attrs, struct netlink_ext_a
> }
>
> static inline int verify_replay(struct xfrm_usersa_info *p,
> - struct nlattr **attrs,
> + struct nlattr **attrs, u8 sa_dir,
> struct netlink_ext_ack *extack)
> {
> struct nlattr *rt = attrs[XFRMA_REPLAY_ESN_VAL];
> @@ -168,6 +168,30 @@ static inline int verify_replay(struct xfrm_usersa_info *p,
> return -EINVAL;
> }
>
> + if (sa_dir == XFRM_SA_DIR_OUT) {
> + if (rs->replay_window) {
> + NL_SET_ERR_MSG(extack, "Replay window should be 0 for output SA");
> + return -EINVAL;
> + }
> + if (rs->seq || rs->seq_hi) {
> + NL_SET_ERR_MSG(extack,
> + "Replay seq and seq_hi should be 0 for output SA");
> + return -EINVAL;
> + }
> + if (rs->bmp_len) {
> + NL_SET_ERR_MSG(extack, "Replay bmp_len should 0 for output SA");
> + return -EINVAL;
> + }
> + }
> +
> + if (sa_dir == XFRM_SA_DIR_IN) {
> + if (rs->oseq || rs->oseq_hi) {
> + NL_SET_ERR_MSG(extack,
> + "Replay oseq and oseq_hi should be 0 for input SA");
> + return -EINVAL;
> + }
> + }
> +
> return 0;
> }
>
> @@ -176,6 +200,7 @@ static int verify_newsa_info(struct xfrm_usersa_info *p,
> struct netlink_ext_ack *extack)
> {
> int err;
> + u8 sa_dir = attrs[XFRMA_SA_DIR] ? nla_get_u8(attrs[XFRMA_SA_DIR]) : 0;
>
> err = -EINVAL;
> switch (p->family) {
> @@ -334,7 +359,7 @@ static int verify_newsa_info(struct xfrm_usersa_info *p,
> goto out;
> if ((err = verify_sec_ctx_len(attrs, extack)))
> goto out;
> - if ((err = verify_replay(p, attrs, extack)))
> + if ((err = verify_replay(p, attrs, sa_dir, extack)))
> goto out;
>
> err = -EINVAL;
> @@ -358,6 +383,77 @@ static int verify_newsa_info(struct xfrm_usersa_info *p,
> err = -EINVAL;
> goto out;
> }
> +
> + if (sa_dir == XFRM_SA_DIR_OUT) {
> + NL_SET_ERR_MSG(extack,
> + "MTIMER_THRESH attribute should not be set on output SA");
> + err = -EINVAL;
> + goto out;
> + }
> + }
> +
> + if (sa_dir == XFRM_SA_DIR_OUT) {
> + if (p->flags & XFRM_STATE_DECAP_DSCP) {
> + NL_SET_ERR_MSG(extack, "Flag DECAP_DSCP should not be set for output SA");
> + err = -EINVAL;
> + goto out;
> + }
> +
> + if (p->flags & XFRM_STATE_ICMP) {
> + NL_SET_ERR_MSG(extack, "Flag ICMP should not be set for output SA");
> + err = -EINVAL;
> + goto out;
> + }
> +
> + if (p->flags & XFRM_STATE_WILDRECV) {
> + NL_SET_ERR_MSG(extack, "Flag WILDRECV should not be set for output SA");
> + err = -EINVAL;
> + goto out;
> + }
> +
> + if (p->replay_window) {
> + NL_SET_ERR_MSG(extack, "Replay window should be 0 for output SA");
> + err = -EINVAL;
> + goto out;
> + }
> +
> + if (attrs[XFRMA_REPLAY_VAL]) {
> + struct xfrm_replay_state *replay;
> +
> + replay = nla_data(attrs[XFRMA_REPLAY_VAL]);
> +
> + if (replay->seq || replay->bitmap) {
> + NL_SET_ERR_MSG(extack,
> + "Replay seq and bitmap should be 0 for output SA");
> + err = -EINVAL;
> + goto out;
> + }
> + }
> + }
> +
> + if (sa_dir == XFRM_SA_DIR_IN) {
> + if (p->flags & XFRM_STATE_NOPMTUDISC) {
> + NL_SET_ERR_MSG(extack, "Flag NOPMTUDISC should not be set for input SA");
> + err = -EINVAL;
> + goto out;
> + }
> +
> + if (attrs[XFRMA_SA_EXTRA_FLAGS]) {
> + u32 xflags = nla_get_u32(attrs[XFRMA_SA_EXTRA_FLAGS]);
> +
> + if (xflags & XFRM_SA_XFLAG_DONT_ENCAP_DSCP) {
> + NL_SET_ERR_MSG(extack, "Flag DONT_ENCAP_DSCP should not be set for input SA");
> + err = -EINVAL;
> + goto out;
> + }
> +
> + if (xflags & XFRM_SA_XFLAG_OSEQ_MAY_WRAP) {
> + NL_SET_ERR_MSG(extack, "Flag OSEQ_MAY_WRAP should not be set for input SA");
> + err = -EINVAL;
> + goto out;
> + }
> +
> + }
> }
>
> out:
> @@ -734,6 +830,9 @@ static struct xfrm_state *xfrm_state_construct(struct net *net,
> if (attrs[XFRMA_IF_ID])
> x->if_id = nla_get_u32(attrs[XFRMA_IF_ID]);
>
> + if (attrs[XFRMA_SA_DIR])
> + x->dir = nla_get_u8(attrs[XFRMA_SA_DIR]);
> +
> err = __xfrm_init_state(x, false, attrs[XFRMA_OFFLOAD_DEV], extack);
> if (err)
> goto error;
> @@ -1182,8 +1281,13 @@ static int copy_to_user_state_extra(struct xfrm_state *x,
> if (ret)
> goto out;
> }
> - if (x->mapping_maxage)
> + if (x->mapping_maxage) {
> ret = nla_put_u32(skb, XFRMA_MTIMER_THRESH, x->mapping_maxage);
> + if (ret)
> + goto out;
> + }
> + if (x->dir)
> + ret = nla_put_u8(skb, XFRMA_SA_DIR, x->dir);
> out:
> return ret;
> }
> @@ -1618,6 +1722,9 @@ static int xfrm_alloc_userspi(struct sk_buff *skb, struct nlmsghdr *nlh,
> if (err)
> goto out;
>
> + if (attrs[XFRMA_SA_DIR])
> + x->dir = nla_get_u8(attrs[XFRMA_SA_DIR]);
> +
> resp_skb = xfrm_state_netlink(skb, x, nlh->nlmsg_seq);
> if (IS_ERR(resp_skb)) {
> err = PTR_ERR(resp_skb);
> @@ -2401,7 +2508,8 @@ static inline unsigned int xfrm_aevent_msgsize(struct xfrm_state *x)
> + nla_total_size_64bit(sizeof(struct xfrm_lifetime_cur))
> + nla_total_size(sizeof(struct xfrm_mark))
> + nla_total_size(4) /* XFRM_AE_RTHR */
> - + nla_total_size(4); /* XFRM_AE_ETHR */
> + + nla_total_size(4) /* XFRM_AE_ETHR */
> + + nla_total_size(sizeof(x->dir)); /* XFRMA_SA_DIR */
> }
>
> static int build_aevent(struct sk_buff *skb, struct xfrm_state *x, const struct km_event *c)
> @@ -2458,6 +2566,12 @@ static int build_aevent(struct sk_buff *skb, struct xfrm_state *x, const struct
> if (err)
> goto out_cancel;
>
> + if (x->dir) {
> + err = nla_put_u8(skb, XFRMA_SA_DIR, x->dir);
> + if (err)
> + goto out_cancel;
> + }
> +
> nlmsg_end(skb, nlh);
> return 0;
>
> @@ -3017,6 +3131,7 @@ EXPORT_SYMBOL_GPL(xfrm_msg_min);
> #undef XMSGSIZE
>
> const struct nla_policy xfrma_policy[XFRMA_MAX+1] = {
> + [XFRMA_UNSPEC] = { .strict_start_type = XFRMA_SA_DIR },
> [XFRMA_SA] = { .len = sizeof(struct xfrm_usersa_info)},
> [XFRMA_POLICY] = { .len = sizeof(struct xfrm_userpolicy_info)},
> [XFRMA_LASTUSED] = { .type = NLA_U64},
> @@ -3048,6 +3163,7 @@ const struct nla_policy xfrma_policy[XFRMA_MAX+1] = {
> [XFRMA_SET_MARK_MASK] = { .type = NLA_U32 },
> [XFRMA_IF_ID] = { .type = NLA_U32 },
> [XFRMA_MTIMER_THRESH] = { .type = NLA_U32 },
> + [XFRMA_SA_DIR] = NLA_POLICY_RANGE(NLA_U8, XFRM_SA_DIR_IN, XFRM_SA_DIR_OUT),
> };
> EXPORT_SYMBOL_GPL(xfrma_policy);
>
> @@ -3188,8 +3304,9 @@ static void xfrm_netlink_rcv(struct sk_buff *skb)
>
> static inline unsigned int xfrm_expire_msgsize(void)
> {
> - return NLMSG_ALIGN(sizeof(struct xfrm_user_expire))
> - + nla_total_size(sizeof(struct xfrm_mark));
> + return NLMSG_ALIGN(sizeof(struct xfrm_user_expire)) +
> + nla_total_size(sizeof(struct xfrm_mark)) +
> + nla_total_size(sizeof_field(struct xfrm_state, dir));
> }
>
> static int build_expire(struct sk_buff *skb, struct xfrm_state *x, const struct km_event *c)
> @@ -3216,6 +3333,12 @@ static int build_expire(struct sk_buff *skb, struct xfrm_state *x, const struct
> if (err)
> return err;
>
> + if (x->dir) {
> + err = nla_put_u8(skb, XFRMA_SA_DIR, x->dir);
> + if (err)
> + return err;
> + }
> +
> nlmsg_end(skb, nlh);
> return 0;
> }
> @@ -3323,6 +3446,9 @@ static inline unsigned int xfrm_sa_len(struct xfrm_state *x)
> if (x->mapping_maxage)
> l += nla_total_size(sizeof(x->mapping_maxage));
>
> + if (x->dir)
> + l += nla_total_size(sizeof(x->dir));
> +
> return l;
> }
>
> --
> 2.43.0
>
>
>
next prev parent reply other threads:[~2024-10-28 11:08 UTC|newest]
Thread overview: 224+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-10-28 6:23 [PATCH 6.6 000/208] 6.6.59-rc1 review Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 001/208] iio: accel: bma400: Fix uninitialized variable field_value in tap event handling Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 002/208] bpf: Make sure internal and UAPI bpf_redirect flags dont overlap Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 003/208] bpf: devmap: provide rxq after redirect Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 004/208] cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 005/208] lib/Kconfig.debug: fix grammar in RUST_BUILD_ASSERT_ALLOW Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 006/208] bpf: Fix memory leak in bpf_core_apply Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 007/208] RDMA/bnxt_re: Fix a possible memory leak Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 008/208] RDMA/bnxt_re: Fix incorrect AVID type in WQE structure Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 009/208] RDMA/bnxt_re: Add a check for memory allocation Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 010/208] RDMA/core: Fix ENODEV error for iWARP test over vlan Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 011/208] x86/resctrl: Avoid overflow in MB settings in bw_validate() Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 012/208] ARM: dts: bcm2837-rpi-cm3-io3: Fix HDMI hpd-gpio pin Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 013/208] bpf: Add missed value to kprobe perf link info Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 014/208] bpf: Add cookie to perf_event bpf_link_info records Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 015/208] bpf: fix unpopulated name_len field in perf_event link info Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 016/208] selftests/bpf: Use bpf_link__destroy in fill_link_info tests Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 017/208] selftests/bpf: Add cookies check for perf_event fill_link_info test Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 018/208] selftests/bpf: fix perf_event link info name_len assertion Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 019/208] s390/pci: Handle PCI error codes other than 0x3a Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 020/208] bpf: fix kfunc btf caching for modules Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 021/208] iio: frequency: {admv4420,adrf6780}: format Kconfig entries Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 022/208] iio: frequency: admv4420: fix missing select REMAP_SPI in Kconfig Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 023/208] drm/vmwgfx: Handle possible ENOMEM in vmw_stdu_connector_atomic_check Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 024/208] selftests/bpf: Fix cross-compiling urandom_read Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 025/208] task_work: Add TWA_NMI_CURRENT as an additional notify mode Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 026/208] sched/core: Disable page allocation in task_tick_mm_cid() Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 027/208] ALSA: hda/cs8409: Fix possible NULL dereference Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 028/208] firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 029/208] RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 030/208] RDMA/irdma: Fix misspelling of "accept*" Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 031/208] RDMA/srpt: Make slab cache names unique Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 032/208] ipv4: give an IPv4 dev to blackhole_netdev Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 033/208] RDMA/bnxt_re: Support new 5760X P7 devices Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 034/208] RDMA/bnxt_re: Fix the max CQ WQEs for older adapters Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 035/208] RDMA/bnxt_re: Fix out of bound check Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 036/208] RDMA/bnxt_re: Return more meaningful error Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 037/208] RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 038/208] RDMA/bnxt_re: Update the BAR offsets Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 039/208] RDMA/bnxt_re: Fix the GID table length Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 040/208] accel/qaic: Fix the for loop used to walk SG table Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 041/208] drm/msm/dpu: make sure phys resources are properly initialized Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 042/208] drm/msm/dpu: check for overflow in _dpu_crtc_setup_lm_bounds() Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 043/208] drm/msm/dsi: improve/fix dsc pclk calculation Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 044/208] drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 045/208] drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 046/208] drm/msm: Allocate memory for disp snapshot with kvzalloc() Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 047/208] firmware: arm_scmi: Queue in scmi layer for mailbox implementation Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 048/208] net/smc: Fix memory leak when using percpu refs Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 049/208] net: usb: usbnet: fix race in probe failure Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 050/208] net: stmmac: dwmac-tegra: Fix link bring-up sequence Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 051/208] octeontx2-af: Fix potential integer overflows on integer shifts Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 052/208] drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 053/208] macsec: dont increment counters for an unrelated SA Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 054/208] netdevsim: use cond_resched() in nsim_dev_trap_report_work() Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 055/208] net: ethernet: aeroflex: fix potential memory leak in greth_start_xmit_gbit() Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 056/208] net/smc: Fix searching in list of known pnetids in smc_pnet_add_pnetid Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 057/208] net: xilinx: axienet: fix potential memory leak in axienet_start_xmit() Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 058/208] bpf: Fix truncation bug in coerce_reg_to_size_sx() Greg Kroah-Hartman
2024-10-28 6:23 ` [PATCH 6.6 059/208] net: systemport: fix potential memory leak in bcm_sysport_xmit() Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 060/208] irqchip/renesas-rzg2l: Align struct member names to tabs Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 061/208] irqchip/renesas-rzg2l: Document structure members Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 062/208] irqchip/renesas-rzg2l: Add support for suspend to RAM Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 063/208] irqchip/renesas-rzg2l: Fix missing put_device Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 064/208] drm/msm/dpu: dont always program merge_3d block Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 065/208] net: bcmasp: fix potential memory leak in bcmasp_xmit() Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 066/208] tcp/dccp: Dont use timer_pending() in reqsk_queue_unlink() Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 067/208] net: dsa: mv88e6xxx: Fix the max_vid definition for the MV88E6361 Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 068/208] genetlink: hold RCU in genlmsg_mcast() Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 069/208] ravb: Remove setting of RX software timestamp Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 070/208] net: ravb: Only advertise Rx/Tx timestamps if hardware supports it Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 071/208] scsi: target: core: Fix null-ptr-deref in target_alloc_device() Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 072/208] smb: client: fix possible double free in smb2_set_ea() Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 073/208] smb: client: fix OOBs when building SMB2_IOCTL request Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 074/208] usb: typec: altmode should keep reference to parent Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 075/208] s390: Initialize psw mask in perf_arch_fetch_caller_regs() Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 076/208] bpf: Fix link info netfilter flags to populate defrag flag Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 077/208] Bluetooth: bnep: fix wild-memory-access in proto_unregister Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 078/208] vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 079/208] net/mlx5: Check for invalid vector index on EQ creation Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 080/208] net/mlx5: Fix command bitmask initialization Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 081/208] net/mlx5: Unregister notifier on eswitch init failure Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 082/208] bpf, sockmap: SK_DROP on attempted redirects of unsupported af_vsock Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 083/208] vsock: Update rx_bytes on read_skb() Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 084/208] vsock: Update msg_count " Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 085/208] bpf, vsock: Drop static vsock_bpf_prot initialization Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 086/208] riscv, bpf: Make BPF_CMPXCHG fully ordered Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 087/208] nvme-pci: set doorbell config before unquiescing Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 088/208] nvme-pci: fix race condition between reset and nvme_dev_disable() Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 089/208] bpf: Fix iter/task tid filtering Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 090/208] cdrom: Avoid barrier_nospec() in cdrom_ioctl_media_changed() Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 091/208] mm/khugepaged: convert alloc_charge_hpage() to use folios Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 092/208] mm: convert collapse_huge_page() to use a folio Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 093/208] mm/khugepaged: use a folio more in collapse_file() Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 094/208] khugepaged: inline hpage_collapse_alloc_folio() Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 095/208] khugepaged: convert alloc_charge_hpage to alloc_charge_folio Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 096/208] khugepaged: remove hpage from collapse_file() Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 097/208] mm: khugepaged: fix the arguments order in khugepaged_collapse_file trace point Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 098/208] iio: adc: ti-lmp92064: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 099/208] xhci: dbgtty: remove kfifo_out() wrapper Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 100/208] xhci: dbgtty: use kfifo from tty_port struct Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 101/208] xhci: dbc: honor usb transfer size boundaries Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 102/208] usb: gadget: f_uac2: Replace snprintf() with the safer scnprintf() variant Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 103/208] usb: gadget: f_uac2: fix non-newline-terminated function name Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 104/208] usb: gadget: f_uac2: fix return value for UAC2_ATTRIBUTE_STRING store Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 105/208] XHCI: Separate PORT and CAPs macros into dedicated file Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 106/208] usb: dwc3: core: Fix system suspend on TI AM62 platforms Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 107/208] tracing/fprobe-event: cleanup: Fix a wrong comment in fprobe event Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 108/208] tracing/probes: cleanup: Set trace_probe::nr_args at trace_probe_init Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 109/208] tracing/probes: Support $argN in return probe (kprobe and fprobe) Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 110/208] uprobes: encapsulate preparation of uprobe args buffer Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 111/208] uprobes: prepare uprobe args buffer lazily Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 112/208] uprobes: prevent mutex_lock() under rcu_read_lock() Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 113/208] uprobe: avoid out-of-bounds memory access of fetching args Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 114/208] exec: dont WARN for racy path_noexec check Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 115/208] drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 116/208] ASoC: amd: yc: Add quirk for HP Dragonfly pro one Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 117/208] ASoC: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 118/208] ASoC: fsl_sai: Enable FIFO continue on error FCONT bit Greg Kroah-Hartman
2024-10-28 6:24 ` [PATCH 6.6 119/208] arm64: Force position-independent veneers Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 120/208] udf: refactor udf_current_aext() to handle error Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 121/208] udf: refactor udf_next_aext() " Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 122/208] udf: refactor inode_bmap() " Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 123/208] udf: fix uninit-value use in udf_get_fileshortad Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 124/208] ASoC: qcom: sm8250: add qrb4210-rb2-sndcard compatible string Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 125/208] cifs: Validate content of NFS reparse point buffer Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 126/208] platform/x86: dell-sysman: add support for alienware products Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 127/208] LoongArch: Dont crash in stack_top() for tasks without vDSO Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 128/208] jfs: Fix sanity check in dbMount Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 129/208] tracing/probes: Fix MAX_TRACE_ARGS limit handling Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 130/208] tracing: Consider the NULL character when validating the event length Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 131/208] xfrm: extract dst lookup parameters into a struct Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 132/208] xfrm: respect ip protocols rules criteria when performing dst lookups Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 133/208] xfrm: Add Direction to the SA in or out Greg Kroah-Hartman
2024-10-28 11:08 ` Antony Antony [this message]
2024-10-28 12:42 ` Sasha Levin
2024-10-29 10:18 ` Antony Antony
2024-10-29 16:38 ` Sasha Levin
2024-10-28 6:25 ` [PATCH 6.6 134/208] xfrm: validate new SAs prefixlen using SA family when sel.family is unset Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 135/208] netfilter: bpf: must hold reference on net namespace Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 136/208] net/sun3_82586: fix potential memory leak in sun3_82586_send_packet() Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 137/208] be2net: fix potential memory leak in be_xmit() Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 138/208] net: plip: fix break; causing plip to never transmit Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 139/208] octeon_ep: Implement helper for iterating packets in Rx queue Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 140/208] octeon_ep: Add SKB allocation failures handling in __octep_oq_process_rx() Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 141/208] net: dsa: mv88e6xxx: Fix error when setting port policy on mv88e6393x Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 142/208] fsl/fman: Save device references taken in mac_probe() Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 143/208] fsl/fman: Fix refcount handling of fman-related devices Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 144/208] netfilter: xtables: fix typo causing some targets not to load on IPv6 Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 145/208] net: wwan: fix global oob in wwan_rtnl_policy Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 146/208] net/sched: adjust device watchdog timer to detect stopped queue at right time Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 147/208] net: fix races in netdev_tx_sent_queue()/dev_watchdog() Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 148/208] net: usb: usbnet: fix name regression Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 149/208] bpf: Simplify checking size of helper accesses Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 150/208] bpf: Add MEM_WRITE attribute Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 151/208] bpf: Fix overloading of MEM_UNINITs meaning Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 152/208] bpf: Remove MEM_UNINIT from skb/xdp MTU helpers Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 153/208] net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 154/208] net: sched: fix use-after-free in taprio_change() Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 155/208] net: sched: use RCU read-side critical section in taprio_dump() Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 156/208] r8169: avoid unsolicited interrupts Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 157/208] posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime() Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 158/208] Bluetooth: SCO: Fix UAF on sco_sock_timeout Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 159/208] Bluetooth: ISO: Fix UAF on iso_sock_timeout Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 160/208] bpf,perf: Fix perf_event_detach_bpf_prog error handling Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 161/208] net: dsa: mv88e6xxx: group cycle counter coefficients Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 162/208] net: dsa: mv88e6xxx: read cycle counter period from hardware Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 163/208] net: dsa: mv88e6xxx: support 4000ps cycle counter period Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 164/208] ASoC: dt-bindings: davinci-mcasp: Fix interrupts property Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 165/208] ASoC: dt-bindings: davinci-mcasp: Fix interrupt properties Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 166/208] ASoC: loongson: Fix component check failed on FDT systems Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 167/208] ASoC: max98388: Fix missing increment of variable slot_found Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 168/208] ASoC: rsnd: Fix probe failure on HiHope boards due to endpoint parsing Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 169/208] ASoC: fsl_micfil: Add a flag to distinguish with different volume control types Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 170/208] ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 171/208] powercap: dtpm_devfreq: Fix error check against dev_pm_qos_add_request() Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 172/208] nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 173/208] ALSA: hda/realtek: Update default depop procedure Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 174/208] smb: client: Handle kstrdup failures for passwords Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 175/208] cpufreq/cppc: Move and rename cppc_cpufreq_{perf_to_khz|khz_to_perf}() Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 176/208] cpufreq: CPPC: fix perf_to_khz/khz_to_perf conversion exception Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 177/208] btrfs: fix passing 0 to ERR_PTR in btrfs_search_dir_index_item() Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 178/208] btrfs: zoned: fix zone unusable accounting for freed reserved extent Greg Kroah-Hartman
2024-10-28 6:25 ` [PATCH 6.6 179/208] drm/amd: Guard against bad data for ATIF ACPI method Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 180/208] ACPI: resource: Add LG 16T90SP to irq1_level_low_skip_override[] Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 181/208] ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 182/208] ACPI: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 183/208] nilfs2: fix kernel bug due to missing clearing of buffer delay flag Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 184/208] openat2: explicitly return -E2BIG for (usize > PAGE_SIZE) Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 185/208] KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 186/208] KVM: arm64: Fix shift-out-of-bounds bug Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 187/208] KVM: arm64: Dont eagerly teardown the vgic on init error Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 188/208] x86/lam: Disable ADDRESS_MASKING in most cases Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 189/208] ALSA: hda/tas2781: select CRC32 instead of CRC32_SARWATE Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 190/208] ALSA: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 191/208] LoongArch: Get correct cores_per_package for SMT systems Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 192/208] LoongArch: Enable IRQ if do_ale() triggered in irq-enabled context Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 193/208] LoongArch: Make KASAN usable for variable cpu_vabits Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 194/208] xfrm: fix one more kernel-infoleak in algo dumping Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 195/208] hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 196/208] drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 197/208] selinux: improve error checking in sel_write_load() Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 198/208] net: phy: dp83822: Fix reset pin definitions Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 199/208] block: fix sanity checks in blk_rq_map_user_bvec Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 200/208] ata: libata: Set DID_TIME_OUT for commands that actually timed out Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 201/208] ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 202/208] platform/x86: dell-wmi: Ignore suspend notifications Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 203/208] ACPI: PRM: Clean up guid type in struct prm_handler_info Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 204/208] RDMA/bnxt_re: Fix the offset for GenP7 adapters for user applications Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 205/208] RDMA/bnxt_re: Avoid creating fence MR for newer adapters Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 206/208] RDMA/bnxt_re: Fix unconditional fence " Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 207/208] tracing: probes: Fix to zero initialize a local variable Greg Kroah-Hartman
2024-10-28 6:26 ` [PATCH 6.6 208/208] task_work: make TWA_NMI_CURRENT handling conditional on IRQ_WORK Greg Kroah-Hartman
2024-10-28 8:06 ` [PATCH 6.6 000/208] 6.6.59-rc1 review Miguel Ojeda
2024-10-28 12:48 ` Takeshi Ogasawara
2024-10-28 14:18 ` Mark Brown
2024-10-28 15:58 ` Naresh Kamboju
2024-10-28 17:51 ` SeongJae Park
2024-10-28 19:20 ` Peter Schneider
2024-10-28 19:51 ` Florian Fainelli
2024-10-29 2:02 ` [PATCH 6.6] " Hardik Garg
2024-10-29 5:05 ` [PATCH 6.6 000/208] " Harshit Mogalapalli
2024-10-29 12:45 ` Muhammad Usama Anjum
2024-10-30 1:31 ` Ron Economos
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Zx9wp6atLMR1UcCL@moon.secunet.de \
--to=antony.antony@secunet.com \
--cc=gregkh@linuxfoundation.org \
--cc=patches@lists.linux.dev \
--cc=sashal@kernel.org \
--cc=sd@queasysnail.net \
--cc=stable@vger.kernel.org \
--cc=steffen.klassert@secunet.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox