public inbox for netdev@vger.kernel.org
 help / color / mirror / Atom feed
From: Sasha Levin <sashal@kernel.org>
To: patches@lists.linux.dev, stable@vger.kernel.org
Cc: Jiayuan Chen <jiayuan.chen@shopee.com>,
	syzbot+d5ace703ed883df56e42@syzkaller.appspotmail.com,
	Simon Horman <horms@kernel.org>,
	"Gustavo A. R. Silva" <gustavoars@kernel.org>,
	Jakub Kicinski <kuba@kernel.org>, Sasha Levin <sashal@kernel.org>,
	jhs@mojatatu.com, jiri@resnulli.us, davem@davemloft.net,
	edumazet@google.com, pabeni@redhat.com, netdev@vger.kernel.org,
	linux-kernel@vger.kernel.org
Subject: [PATCH AUTOSEL 7.0-6.1] net: sched: cls_u32: Avoid memcpy() false-positive warning in u32_init_knode()
Date: Mon, 20 Apr 2026 09:20:08 -0400	[thread overview]
Message-ID: <20260420132314.1023554-214-sashal@kernel.org> (raw)
In-Reply-To: <20260420132314.1023554-1-sashal@kernel.org>

From: Jiayuan Chen <jiayuan.chen@shopee.com>

[ Upstream commit 34bd3c6b0bd383a76d987c8c45c4f309b681b255 ]

Syzbot reported a warning in u32_init_knode() [1].

Similar to commit 7cba18332e36 ("net: sched: cls_u32: Avoid memcpy()
false-positive warning") which addressed the same issue in u32_change(),
use unsafe_memcpy() in u32_init_knode() to work around the compiler's
inability to see into composite flexible array structs.

This silences the false-positive reported by syzbot:

  memcpy: detected field-spanning write (size 32) of single field
  "&new->sel" at net/sched/cls_u32.c:855 (size 16)

Since the memory is correctly allocated with kzalloc_flex() using
s->nkeys, this is purely a false positive and does not need a Fixes tag.

[1] https://syzkaller.appspot.com/bug?extid=d5ace703ed883df56e42

Reported-by: syzbot+d5ace703ed883df56e42@syzkaller.appspotmail.com
Closes: https://lore.kernel.org/all/69a811b9.a70a0220.b118c.0019.GAE@google.com/T/
Reviewed-by: Simon Horman <horms@kernel.org>
Acked-by: Gustavo A. R. Silva <gustavoars@kernel.org>
Signed-off-by: Jiayuan Chen <jiayuan.chen@shopee.com>
Link: https://patch.msgid.link/20260309123917.402183-1-jiayuan.chen@linux.dev
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---

LLM Generated explanations, may be completely bogus:

Now I have all the information needed for a complete analysis. Let me
compile the findings.

---

## PHASE 1: COMMIT MESSAGE FORENSICS

**Step 1.1: Subject Line**
- Subsystem: `net: sched: cls_u32`
- Action verb: "Avoid" (suggesting a workaround, not a direct bug fix)
- Summary: Avoids a false-positive memcpy warning in `u32_init_knode()`

**Step 1.2: Tags**
- Reported-by: `syzbot+d5ace703ed883df56e42@syzkaller.appspotmail.com`
  (syzbot-reported)
- Closes: `https://lore.kernel.org/all/69a811b9.a70a0220.b118c.0019.GAE@
  google.com/T/`
- Reviewed-by: Simon Horman `<horms@kernel.org>` (netdev
  maintainer/reviewer)
- Acked-by: Gustavo A. R. Silva `<gustavoars@kernel.org>`
  (FORTIFY_SOURCE / flexible array expert)
- Signed-off-by: Jakub Kicinski `<kuba@kernel.org>` (net maintainer)
- No Fixes: tag, no Cc: stable (expected)
- Author explicitly states: "does not need a Fixes tag"

**Step 1.3: Commit Body**
- References prior commit 7cba18332e36 that fixed the **identical**
  issue in `u32_change()`
- The warning: `memcpy: detected field-spanning write (size 32) of
  single field "&new->sel" at net/sched/cls_u32.c:855 (size 16)`
- Root cause: FORTIFY_SOURCE's `memcpy` hardening can't see that the
  flexible array struct was correctly allocated to hold the extra keys.
- Author explicitly says: "this is purely a false positive"

**Step 1.4: Hidden Bug Fix?**
This is NOT a hidden bug fix. It is genuinely a false-positive warning
suppression. The `memcpy` operation is correct; the compiler's bounds
checking is overly conservative for composite flexible array structures.

## PHASE 2: DIFF ANALYSIS

**Step 2.1: Inventory**
- 1 file changed: `net/sched/cls_u32.c`
- 1 line removed, 4 lines added (net +3 lines)
- Function modified: `u32_init_knode()`
- Scope: single-file, surgical fix

**Step 2.2: Code Flow Change**
- Before: `memcpy(&new->sel, s, struct_size(s, keys, s->nkeys));`
- After: `unsafe_memcpy(&new->sel, s, struct_size(s, keys, s->nkeys), /*
  justification comment */);`
- `unsafe_memcpy` is defined in `include/linux/fortify-string.h` as
  `__underlying_memcpy(dst, src, bytes)` — it simply bypasses the
  FORTIFY_SOURCE field-spanning write check. The actual memory operation
  is identical.

**Step 2.3: Bug Mechanism**
- Category: Warning suppression / false positive from FORTIFY_SOURCE
- No actual memory safety bug. The `new` structure is allocated with
  `kzalloc_flex(*new, sel.keys, s->nkeys)` which correctly sizes the
  allocation for the flexible array.

**Step 2.4: Fix Quality**
- Obviously correct — same pattern as existing fix at line 1122 in the
  same file
- Zero regression risk — `unsafe_memcpy` produces identical machine code
  to `memcpy`, just without the compile-time/runtime bounds check
- Minimal change

## PHASE 3: GIT HISTORY INVESTIGATION

**Step 3.1: Blame**
- The `memcpy` line was introduced by commit `e512fcf0280ae` (Gustavo A.
  R. Silva, 2019, v5.2) which converted it from open-coded `sizeof()` to
  `struct_size()`.
- The underlying memcpy in `u32_init_knode()` predates that and goes
  back to the function's original creation.

**Step 3.2: Prior Fix (7cba18332e36)**
- Commit 7cba18332e36 (Kees Cook, Sep 2022) fixed the identical false-
  positive in `u32_change()`.
- First appeared in v6.1. Present in all stable trees from v6.1 onward.
- This commit is the direct analog for `u32_init_knode()`.

**Step 3.3: File History**
- Recent changes to cls_u32.c are mostly treewide allocation API changes
  (kzalloc_flex, kmalloc_obj).
- This patch is standalone — no dependencies on other patches.

**Step 3.4: Author**
- Jiayuan Chen is a contributor with multiple net subsystem fixes (UAF,
  NULL deref, memory leaks).
- Not the subsystem maintainer, but the patch was accepted by Jakub
  Kicinski (netdev maintainer).

**Step 3.5: Dependencies**
- The `unsafe_memcpy` macro was introduced by commit `43213daed6d6cb`
  (Kees Cook, May 2022), present since v5.19.
- In stable trees, the allocation function is different (not
  `kzalloc_flex`), but the `memcpy` line with `struct_size` exists since
  v5.2.
- This can apply standalone. Minor context differences in stable trees
  won't affect the single-line change.

## PHASE 4: MAILING LIST AND EXTERNAL RESEARCH

**Step 4.1: Patch Discussion**
- b4 dig found the submission: `https://patch.msgid.link/20260309123917.
  402183-1-jiayuan.chen@linux.dev`
- Two versions: v1 and v2 (v2 dropped unnecessary commit message content
  per reviewer feedback)
- No NAKs. Reviewed-by from Simon Horman, Acked-by from Gustavo A. R.
  Silva.

**Step 4.2: Reviewers**
- Simon Horman (netdev reviewer) — Reviewed-by
- Gustavo A. R. Silva (flexible array / FORTIFY expert, he wrote the
  original struct_size conversion) — Acked-by
- Jakub Kicinski (netdev maintainer) — committed the patch

**Step 4.3: Bug Report**
- Syzbot page at
  `https://syzkaller.appspot.com/bug?extid=d5ace703ed883df56e42`
  confirms:
  - WARNING fires at runtime in `u32_init_knode()` at cls_u32.c:855
  - Reproducible with C reproducer
  - Similar bugs exist on linux-6.1 and linux-6.6 (0 of 2 and 0 of 3
    patched, respectively)
  - Crash type: WARNING (FORTIFY_SOURCE field-spanning write detection)
  - Triggerable via syscall path: `sendmmsg → tc_new_tfilter →
    u32_change → u32_init_knode`

**Step 4.4/4.5: No explicit stable nomination in any discussion.**

## PHASE 5: CODE SEMANTIC ANALYSIS

**Step 5.1: Function Modified**
- `u32_init_knode()` — creates a new knode by cloning an existing one
  during u32 filter update

**Step 5.2: Callers**
- `u32_init_knode()` is called from `u32_change()` (line ~921), which is
  the TC filter update path
- `u32_change()` is called via `tc_new_tfilter()` → rtnetlink → netlink
  syscall path
- This is reachable from unprivileged userspace (with appropriate
  network namespace capabilities)

**Step 5.4: Call Chain**
- `sendmmsg` → `netlink_sendmsg` → `rtnetlink_rcv_msg` →
  `tc_new_tfilter` → `u32_change` → `u32_init_knode` → WARNING

## PHASE 6: CROSS-REFERENCING AND STABLE TREE ANALYSIS

**Step 6.1: Buggy Code in Stable Trees**
- The `memcpy(&new->sel, s, struct_size(s, keys, s->nkeys))` line exists
  since v5.2 (commit e512fcf0280ae).
- Present in all active stable trees (5.15.y, 6.1.y, 6.6.y, 6.12.y).
- `unsafe_memcpy` is available since v5.19 (commit 43213daed6d6cb).
- So this fix is applicable to 6.1.y and later.
- Syzbot confirms the warning fires on 6.1 and 6.6 stable trees.

**Step 6.2: Backport Complications**
- The single-line change (`memcpy` → `unsafe_memcpy`) should apply
  cleanly or with trivial context adjustment.
- The comment references `kzalloc_flex()` which doesn't exist in stable
  trees (it's a 7.0 API), but that's just a comment in the
  `unsafe_memcpy` justification parameter — functionally irrelevant.

## PHASE 7: SUBSYSTEM AND MAINTAINER CONTEXT

**Step 7.1: Subsystem**
- `net/sched` — Traffic Control (TC) classifier, specifically cls_u32
- Criticality: IMPORTANT — TC is widely used in networking, QoS,
  container networking

**Step 7.2: Activity**
- Active subsystem with regular fixes and updates.

## PHASE 8: IMPACT AND RISK ASSESSMENT

**Step 8.1: Who Is Affected**
- Any user with `CONFIG_FORTIFY_SOURCE=y` (default on most distros)
  using TC u32 classifier
- The WARNING fires during filter updates via netlink

**Step 8.2: Trigger Conditions**
- Triggered when updating a u32 TC filter with >0 keys (common
  operation)
- Reachable from userspace via netlink/rtnetlink
- Reliably reproducible (syzbot has C reproducer)

**Step 8.3: Failure Mode**
- Primary: WARN at runtime — log noise, `panic_on_warn` configurations
  would crash
- No data corruption, no memory safety issue (the memcpy is correct)
- Severity: MEDIUM (WARNING only, no functional impact unless
  `panic_on_warn=1`)

**Step 8.4: Risk-Benefit**
- BENEFIT: Silences a false-positive WARNING on stable trees, eliminates
  syzbot CI noise, prevents crashes with `panic_on_warn=1`
- RISK: Essentially zero — `unsafe_memcpy` produces identical code to
  `memcpy` minus the check
- Ratio: Favorable (small benefit, near-zero risk)

## PHASE 9: FINAL SYNTHESIS

**Evidence FOR backporting:**
1. The WARNING actively fires on stable trees (6.1, 6.6) — confirmed by
   syzbot
2. The fix is trivially correct (1 functional line changed), zero
   regression risk
3. Same exact pattern as commit 7cba18332e36 already in stable since
   v6.1
4. Reviewed by Simon Horman, Acked by Gustavo A. R. Silva (the FORTIFY
   expert), committed by Jakub Kicinski
5. With `panic_on_warn=1` (common in security-hardened deployments),
   this is a crash
6. Reachable from userspace via standard TC netlink operations

**Evidence AGAINST backporting:**
1. Author explicitly says "this is purely a false positive and does not
   need a Fixes tag"
2. Not a real memory safety bug — the memcpy operation is correct
3. Without `panic_on_warn`, only produces log noise
4. Comment in the fix references `kzalloc_flex()` which doesn't exist in
   stable trees (cosmetic issue only)

**Stable Rules Checklist:**
1. Obviously correct and tested? **YES** — identical pattern to existing
   fix in same file
2. Fixes a real bug? **BORDERLINE** — it's a false-positive warning, but
   it does fire at runtime and causes problems with `panic_on_warn`
3. Important issue? **MEDIUM** — WARNING severity, but crash with
   `panic_on_warn=1`
4. Small and contained? **YES** — 1 file, +4/-1 lines
5. No new features? **YES**
6. Applies to stable? **YES** — with minor context differences

The decisive factor: syzbot confirms this WARNING actively fires on 6.1
and 6.6 stable trees, the fix follows a proven pattern already in
stable, and the risk is essentially zero. While the author says it's a
false positive (and it is), the runtime WARNING is a real issue for
production systems, especially those with `panic_on_warn=1`.

## Verification

- [Phase 1] Parsed tags: Reported-by syzbot, Reviewed-by Simon Horman,
  Acked-by Gustavo A. R. Silva, committed by Jakub Kicinski
- [Phase 2] Diff analysis: single line `memcpy` → `unsafe_memcpy` with
  justification comment in `u32_init_knode()`
- [Phase 3] git blame: memcpy line introduced by e512fcf0280ae (v5.2,
  2019), present in all stable trees
- [Phase 3] git show 7cba18332e36: confirmed identical prior fix for
  u32_change(), present since v6.1
- [Phase 3] git tag --contains 43213daed6d6cb: `unsafe_memcpy` available
  since v5.19
- [Phase 4] b4 dig -c 34bd3c6b0bd3: found submission at lore, v1→v2, no
  NAKs
- [Phase 4] b4 dig -w: netdev maintainers and linux-hardening list were
  CC'd
- [Phase 4] syzbot page: confirmed WARNING fires on 6.1 and 6.6 stable,
  reproducible with C repro
- [Phase 5] Call chain: sendmmsg → netlink → tc_new_tfilter → u32_change
  → u32_init_knode (userspace reachable)
- [Phase 6] Code exists in all active stable trees; unsafe_memcpy
  available in 6.1+
- [Phase 8] Failure mode: WARN at runtime, MEDIUM severity (crash with
  panic_on_warn)

**YES**

 net/sched/cls_u32.c | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/net/sched/cls_u32.c b/net/sched/cls_u32.c
index 9241c025aa741..8f30cc82181d9 100644
--- a/net/sched/cls_u32.c
+++ b/net/sched/cls_u32.c
@@ -852,7 +852,10 @@ static struct tc_u_knode *u32_init_knode(struct net *net, struct tcf_proto *tp,
 	/* Similarly success statistics must be moved as pointers */
 	new->pcpu_success = n->pcpu_success;
 #endif
-	memcpy(&new->sel, s, struct_size(s, keys, s->nkeys));
+	unsafe_memcpy(&new->sel, s, struct_size(s, keys, s->nkeys),
+		      /* A composite flex-array structure destination,
+		       * which was correctly sized with kzalloc_flex(),
+		       * above. */);
 
 	if (tcf_exts_init(&new->exts, net, TCA_U32_ACT, TCA_U32_POLICE)) {
 		kfree(new);
-- 
2.53.0


  parent reply	other threads:[~2026-04-20 13:30 UTC|newest]

Thread overview: 62+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <20260420132314.1023554-1-sashal@kernel.org>
2026-04-20 13:16 ` [PATCH AUTOSEL 7.0-5.10] FDDI: defxx: Rate-limit memory allocation errors Sasha Levin
2026-04-20 13:16 ` [PATCH AUTOSEL 6.18] xsk: fix XDP_UMEM_SG_FLAG issues Sasha Levin
2026-04-20 13:17 ` [PATCH AUTOSEL 7.0-5.10] net: rose: reject truncated CLEAR_REQUEST frames in state machines Sasha Levin
2026-04-20 13:17 ` [PATCH AUTOSEL 6.18] netfilter: nfnetlink_queue: nfqnl_instance GFP_ATOMIC -> GFP_KERNEL_ACCOUNT allocation Sasha Levin
2026-04-20 13:17 ` [PATCH AUTOSEL 7.0-6.18] net: mana: hardening: Validate adapter_mtu from MANA_QUERY_DEV_CONFIG Sasha Levin
2026-04-20 13:17 ` [PATCH AUTOSEL 7.0-5.10] enic: add V2 SR-IOV VF device ID Sasha Levin
2026-04-20 13:17 ` [PATCH AUTOSEL 7.0-6.6] ipv6: move IFA_F_PERMANENT percpu allocation in process scope Sasha Levin
2026-04-20 13:17 ` [PATCH AUTOSEL 6.18] netfilter: nfnetlink_log: initialize nfgenmsg in NLMSG_DONE terminator Sasha Levin
2026-04-20 13:17 ` [PATCH AUTOSEL 6.18] net: increase IP_TUNNEL_RECURSION_LIMIT to 5 Sasha Levin
2026-04-20 13:17 ` [PATCH AUTOSEL 7.0-6.1] net: lan743x: fix SGMII detection on PCI1xxxx B0+ during warm reset Sasha Levin
2026-04-20 13:17 ` [PATCH AUTOSEL 7.0-5.10] vmxnet3: Suppress page allocation warning for massive Rx Data ring Sasha Levin
2026-04-20 13:17 ` [PATCH AUTOSEL 6.18] xfrm: Wait for RCU readers during policy netns exit Sasha Levin
2026-04-20 13:18 ` [PATCH AUTOSEL 6.18] ixgbe: stop re-reading flash on every get_drvinfo for e610 Sasha Levin
2026-04-20 13:18 ` [PATCH AUTOSEL 6.18] devlink: Fix incorrect skb socket family dumping Sasha Levin
2026-04-20 13:18 ` [PATCH AUTOSEL 7.0-6.12] net: sfp: add quirk for ZOERAX SFP-2.5G-T Sasha Levin
2026-04-20 13:18 ` [PATCH AUTOSEL 7.0-6.18] ipv6: discard fragment queue earlier if there is malformed datagram Sasha Levin
2026-04-20 13:18 ` [PATCH AUTOSEL 6.18] af_unix: read UNIX_DIAG_VFS data under unix_state_lock Sasha Levin
2026-04-20 13:18 ` [PATCH AUTOSEL 6.18] ipv4: nexthop: allocate skb dynamically in rtm_get_nexthop() Sasha Levin
2026-04-20 13:18 ` [PATCH AUTOSEL 6.18] xfrm: fix refcount leak in xfrm_migrate_policy_find Sasha Levin
2026-04-20 13:18 ` [PATCH AUTOSEL 6.18] selftests: net: bridge_vlan_mcast: wait for h1 before querier check Sasha Levin
2026-04-20 13:18 ` [PATCH AUTOSEL 6.18] xsk: tighten UMEM headroom validation to account for tailroom and min frame Sasha Levin
2026-04-20 13:18 ` [PATCH AUTOSEL 7.0-5.15] gve: fix SW coalescing when hw-GRO is used Sasha Levin
2026-04-20 13:19 ` [PATCH AUTOSEL 6.18] netfilter: ip6t_eui64: reject invalid MAC header for all packets Sasha Levin
2026-04-20 13:19 ` [PATCH AUTOSEL 6.18] l2tp: Drop large packets with UDP encap Sasha Levin
2026-04-20 13:19 ` [PATCH AUTOSEL 7.0-5.10] net: ethernet: ravb: Disable interrupts when closing device Sasha Levin
2026-04-20 13:19 ` [PATCH AUTOSEL 7.0] dsa: tag_mxl862xx: set dsa_default_offload_fwd_mark() Sasha Levin
2026-04-20 13:34   ` Daniel Golle
2026-04-20 13:19 ` [PATCH AUTOSEL 7.0-6.1] ipv4: validate IPV4_DEVCONF attributes properly Sasha Levin
2026-04-20 13:19 ` [PATCH AUTOSEL 6.18] ipv4: nexthop: avoid duplicate NHA_HW_STATS_ENABLE on nexthop group dump Sasha Levin
2026-04-20 13:19 ` [PATCH AUTOSEL 6.18] net: ipa: fix event ring index not programmed for IPA v5.0+ Sasha Levin
2026-04-20 13:19 ` [PATCH AUTOSEL 7.0-5.10] net: core: allow netdev_upper_get_next_dev_rcu from bh context Sasha Levin
2026-04-20 13:19 ` [PATCH AUTOSEL 6.18] net: txgbe: leave space for null terminators on property_entry Sasha Levin
2026-04-20 13:19 ` [PATCH AUTOSEL 7.0-5.10] net: initialize sk_rx_queue_mapping in sk_clone() Sasha Levin
2026-04-20 13:19 ` [PATCH AUTOSEL 7.0-6.19] gve: Advertise NETIF_F_GRO_HW instead of NETIF_F_LRO Sasha Levin
2026-04-20 13:19 ` [PATCH AUTOSEL 6.18] netfilter: conntrack: add missing netlink policy validations Sasha Levin
2026-04-20 13:19 ` [PATCH AUTOSEL 6.18] rtnetlink: add missing netlink_ns_capable() check for peer netns Sasha Levin
2026-04-20 13:19 ` [PATCH AUTOSEL 6.18] ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data() Sasha Levin
2026-04-20 13:20 ` Sasha Levin [this message]
2026-04-20 13:20 ` [PATCH AUTOSEL 6.18] xsk: respect tailroom for ZC setups Sasha Levin
2026-04-20 13:20 ` [PATCH AUTOSEL 7.0-6.18] tcp: use WRITE_ONCE() for tsoffset in tcp_v6_connect() Sasha Levin
2026-04-20 13:20 ` [PATCH AUTOSEL 6.18] net: mdio: realtek-rtl9300: use scoped device_for_each_child_node loop Sasha Levin
2026-04-20 13:20 ` [PATCH AUTOSEL 7.0-6.12] net: ethernet: mtk_eth_soc: avoid writing to ESW registers on MT7628 Sasha Levin
2026-04-20 13:20 ` [PATCH AUTOSEL 6.18] ipvs: fix NULL deref in ip_vs_add_service error path Sasha Levin
2026-04-20 13:20 ` [PATCH AUTOSEL 7.0-6.18] net: hsr: emit notification for PRP slave2 changed hw addr on port deletion Sasha Levin
2026-04-20 13:20 ` [PATCH AUTOSEL 7.0-5.10] net: hamradio: scc: validate bufsize in SIOCSCCSMEM ioctl Sasha Levin
2026-04-20 13:20 ` [PATCH AUTOSEL 6.18] xfrm: account XFRMA_IF_ID in aevent size calculation Sasha Levin
2026-04-20 13:20 ` [PATCH AUTOSEL 6.18] netfilter: nft_set_pipapo_avx2: don't return non-matching entry on expiry Sasha Levin
2026-04-20 13:20 ` [PATCH AUTOSEL 6.18] bridge: guard local VLAN-0 FDB helpers against NULL vlan group Sasha Levin
2026-04-20 13:21 ` [PATCH AUTOSEL 7.0-5.10] net: hamradio: bpqether: validate frame length in bpq_rcv() Sasha Levin
2026-04-20 13:21 ` [PATCH AUTOSEL 6.18] netfilter: ctnetlink: ensure safe access to master conntrack Sasha Levin
2026-04-20 13:21 ` [PATCH AUTOSEL 7.0-6.18] hinic3: Add msg_send_lock for message sending concurrecy Sasha Levin
2026-04-20 13:21 ` [PATCH AUTOSEL 7.0] netfilter: require Ethernet MAC header before using eth_hdr() Sasha Levin
2026-04-20 13:21 ` [PATCH AUTOSEL 6.18] net: sched: act_csum: validate nested VLAN headers Sasha Levin
2026-04-20 13:21 ` [PATCH AUTOSEL 6.18] net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+ Sasha Levin
2026-04-20 13:21 ` [PATCH AUTOSEL 6.18] dt-bindings: net: Fix Tegra234 MGBE PTP clock Sasha Levin
2026-04-20 13:21 ` [PATCH AUTOSEL 6.18] net: ioam6: fix OOB and missing lock Sasha Levin
2026-04-20 13:21 ` [PATCH AUTOSEL 6.18] ipv4: icmp: fix null-ptr-deref in icmp_build_probe() Sasha Levin
2026-04-20 13:21 ` [PATCH AUTOSEL 6.18] nfc: s3fwrn5: allocate rx skb before consuming bytes Sasha Levin
2026-04-20 13:21 ` [PATCH AUTOSEL 6.18] xsk: validate MTU against usable frame size on bind Sasha Levin
2026-04-20 13:21 ` [PATCH AUTOSEL 6.18] xfrm_user: fix info leak in build_mapping() Sasha Levin
2026-04-20 13:22 ` [PATCH AUTOSEL 6.18] net: lapbether: handle NETDEV_PRE_TYPE_CHANGE Sasha Levin
2026-04-20 13:22 ` [PATCH AUTOSEL 6.18] net: airoha: Fix memory leak in airoha_qdma_rx_process() Sasha Levin

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20260420132314.1023554-214-sashal@kernel.org \
    --to=sashal@kernel.org \
    --cc=davem@davemloft.net \
    --cc=edumazet@google.com \
    --cc=gustavoars@kernel.org \
    --cc=horms@kernel.org \
    --cc=jhs@mojatatu.com \
    --cc=jiayuan.chen@shopee.com \
    --cc=jiri@resnulli.us \
    --cc=kuba@kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=netdev@vger.kernel.org \
    --cc=pabeni@redhat.com \
    --cc=patches@lists.linux.dev \
    --cc=stable@vger.kernel.org \
    --cc=syzbot+d5ace703ed883df56e42@syzkaller.appspotmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox