From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
stable@vger.kernel.org, Andy Lutomirski <luto@kernel.org>,
Thomas Gleixner <tglx@linutronix.de>,
Borislav Petkov <bp@alien8.de>, Brian Gerst <brgerst@gmail.com>,
Dave Hansen <dave.hansen@intel.com>,
Dave Hansen <dave.hansen@linux.intel.com>,
David Laight <David.Laight@aculab.com>,
"H. Peter Anvin" <hpa@zytor.com>,
Josh Poimboeuf <jpoimboe@redhat.com>,
Juergen Gross <jgross@suse.com>,
Kees Cook <keescook@chromium.org>,
"Kirill A. Shutemov" <kirill@shutemov.name>,
Linus Torvalds <torvalds@linux-foundation.org>,
Peter Zijlstra <peterz@infradead.org>,
Ingo Molnar <mingo@kernel.org>
Subject: [PATCH 4.14 022/146] x86/pti: Put the LDT in its own PGD if PTI is on
Date: Mon, 1 Jan 2018 15:36:53 +0100 [thread overview]
Message-ID: <20180101140127.058205455@linuxfoundation.org> (raw)
In-Reply-To: <20180101140123.743014891@linuxfoundation.org>
4.14-stable review patch. If anyone has any objections, please let me know.
------------------
From: Andy Lutomirski <luto@kernel.org>
commit f55f0501cbf65ec41cca5058513031b711730b1d upstream.
With PTI enabled, the LDT must be mapped in the usermode tables somewhere.
The LDT is per process, i.e. per mm.
An earlier approach mapped the LDT on context switch into a fixmap area,
but that's a big overhead and exhausted the fixmap space when NR_CPUS got
big.
Take advantage of the fact that there is an address space hole which
provides a completely unused pgd. Use this pgd to manage per-mm LDT
mappings.
This has a down side: the LDT isn't (currently) randomized, and an attack
that can write the LDT is instant root due to call gates (thanks, AMD, for
leaving call gates in AMD64 but designing them wrong so they're only useful
for exploits). This can be mitigated by making the LDT read-only or
randomizing the mapping, either of which is strightforward on top of this
patch.
This will significantly slow down LDT users, but that shouldn't matter for
important workloads -- the LDT is only used by DOSEMU(2), Wine, and very
old libc implementations.
[ tglx: Cleaned it up. ]
Signed-off-by: Andy Lutomirski <luto@kernel.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Brian Gerst <brgerst@gmail.com>
Cc: Dave Hansen <dave.hansen@intel.com>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: David Laight <David.Laight@aculab.com>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Josh Poimboeuf <jpoimboe@redhat.com>
Cc: Juergen Gross <jgross@suse.com>
Cc: Kees Cook <keescook@chromium.org>
Cc: Kirill A. Shutemov <kirill@shutemov.name>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
Documentation/x86/x86_64/mm.txt | 3
arch/x86/include/asm/mmu_context.h | 59 ++++++++++++-
arch/x86/include/asm/pgtable_64_types.h | 4
arch/x86/include/asm/processor.h | 23 +++--
arch/x86/kernel/ldt.c | 139 +++++++++++++++++++++++++++++++-
arch/x86/mm/dump_pagetables.c | 9 ++
6 files changed, 220 insertions(+), 17 deletions(-)
--- a/Documentation/x86/x86_64/mm.txt
+++ b/Documentation/x86/x86_64/mm.txt
@@ -12,6 +12,7 @@ ffffea0000000000 - ffffeaffffffffff (=40
... unused hole ...
ffffec0000000000 - fffffbffffffffff (=44 bits) kasan shadow memory (16TB)
... unused hole ...
+fffffe0000000000 - fffffe7fffffffff (=39 bits) LDT remap for PTI
fffffe8000000000 - fffffeffffffffff (=39 bits) cpu_entry_area mapping
ffffff0000000000 - ffffff7fffffffff (=39 bits) %esp fixup stacks
... unused hole ...
@@ -29,7 +30,7 @@ Virtual memory map with 5 level page tab
hole caused by [56:63] sign extension
ff00000000000000 - ff0fffffffffffff (=52 bits) guard hole, reserved for hypervisor
ff10000000000000 - ff8fffffffffffff (=55 bits) direct mapping of all phys. memory
-ff90000000000000 - ff9fffffffffffff (=52 bits) hole
+ff90000000000000 - ff9fffffffffffff (=52 bits) LDT remap for PTI
ffa0000000000000 - ffd1ffffffffffff (=54 bits) vmalloc/ioremap space (12800 TB)
ffd2000000000000 - ffd3ffffffffffff (=49 bits) hole
ffd4000000000000 - ffd5ffffffffffff (=49 bits) virtual memory map (512TB)
--- a/arch/x86/include/asm/mmu_context.h
+++ b/arch/x86/include/asm/mmu_context.h
@@ -50,10 +50,33 @@ struct ldt_struct {
* call gates. On native, we could merge the ldt_struct and LDT
* allocations, but it's not worth trying to optimize.
*/
- struct desc_struct *entries;
- unsigned int nr_entries;
+ struct desc_struct *entries;
+ unsigned int nr_entries;
+
+ /*
+ * If PTI is in use, then the entries array is not mapped while we're
+ * in user mode. The whole array will be aliased at the addressed
+ * given by ldt_slot_va(slot). We use two slots so that we can allocate
+ * and map, and enable a new LDT without invalidating the mapping
+ * of an older, still-in-use LDT.
+ *
+ * slot will be -1 if this LDT doesn't have an alias mapping.
+ */
+ int slot;
};
+/* This is a multiple of PAGE_SIZE. */
+#define LDT_SLOT_STRIDE (LDT_ENTRIES * LDT_ENTRY_SIZE)
+
+static inline void *ldt_slot_va(int slot)
+{
+#ifdef CONFIG_X86_64
+ return (void *)(LDT_BASE_ADDR + LDT_SLOT_STRIDE * slot);
+#else
+ BUG();
+#endif
+}
+
/*
* Used for LDT copy/destruction.
*/
@@ -64,6 +87,7 @@ static inline void init_new_context_ldt(
}
int ldt_dup_context(struct mm_struct *oldmm, struct mm_struct *mm);
void destroy_context_ldt(struct mm_struct *mm);
+void ldt_arch_exit_mmap(struct mm_struct *mm);
#else /* CONFIG_MODIFY_LDT_SYSCALL */
static inline void init_new_context_ldt(struct mm_struct *mm) { }
static inline int ldt_dup_context(struct mm_struct *oldmm,
@@ -71,7 +95,8 @@ static inline int ldt_dup_context(struct
{
return 0;
}
-static inline void destroy_context_ldt(struct mm_struct *mm) {}
+static inline void destroy_context_ldt(struct mm_struct *mm) { }
+static inline void ldt_arch_exit_mmap(struct mm_struct *mm) { }
#endif
static inline void load_mm_ldt(struct mm_struct *mm)
@@ -96,10 +121,31 @@ static inline void load_mm_ldt(struct mm
* that we can see.
*/
- if (unlikely(ldt))
- set_ldt(ldt->entries, ldt->nr_entries);
- else
+ if (unlikely(ldt)) {
+ if (static_cpu_has(X86_FEATURE_PTI)) {
+ if (WARN_ON_ONCE((unsigned long)ldt->slot > 1)) {
+ /*
+ * Whoops -- either the new LDT isn't mapped
+ * (if slot == -1) or is mapped into a bogus
+ * slot (if slot > 1).
+ */
+ clear_LDT();
+ return;
+ }
+
+ /*
+ * If page table isolation is enabled, ldt->entries
+ * will not be mapped in the userspace pagetables.
+ * Tell the CPU to access the LDT through the alias
+ * at ldt_slot_va(ldt->slot).
+ */
+ set_ldt(ldt_slot_va(ldt->slot), ldt->nr_entries);
+ } else {
+ set_ldt(ldt->entries, ldt->nr_entries);
+ }
+ } else {
clear_LDT();
+ }
#else
clear_LDT();
#endif
@@ -194,6 +240,7 @@ static inline int arch_dup_mmap(struct m
static inline void arch_exit_mmap(struct mm_struct *mm)
{
paravirt_arch_exit_mmap(mm);
+ ldt_arch_exit_mmap(mm);
}
#ifdef CONFIG_X86_64
--- a/arch/x86/include/asm/pgtable_64_types.h
+++ b/arch/x86/include/asm/pgtable_64_types.h
@@ -82,10 +82,14 @@ typedef struct { pteval_t pte; } pte_t;
# define VMALLOC_SIZE_TB _AC(12800, UL)
# define __VMALLOC_BASE _AC(0xffa0000000000000, UL)
# define __VMEMMAP_BASE _AC(0xffd4000000000000, UL)
+# define LDT_PGD_ENTRY _AC(-112, UL)
+# define LDT_BASE_ADDR (LDT_PGD_ENTRY << PGDIR_SHIFT)
#else
# define VMALLOC_SIZE_TB _AC(32, UL)
# define __VMALLOC_BASE _AC(0xffffc90000000000, UL)
# define __VMEMMAP_BASE _AC(0xffffea0000000000, UL)
+# define LDT_PGD_ENTRY _AC(-4, UL)
+# define LDT_BASE_ADDR (LDT_PGD_ENTRY << PGDIR_SHIFT)
#endif
#ifdef CONFIG_RANDOMIZE_MEMORY
--- a/arch/x86/include/asm/processor.h
+++ b/arch/x86/include/asm/processor.h
@@ -851,13 +851,22 @@ static inline void spin_lock_prefetch(co
#else
/*
- * User space process size. 47bits minus one guard page. The guard
- * page is necessary on Intel CPUs: if a SYSCALL instruction is at
- * the highest possible canonical userspace address, then that
- * syscall will enter the kernel with a non-canonical return
- * address, and SYSRET will explode dangerously. We avoid this
- * particular problem by preventing anything from being mapped
- * at the maximum canonical address.
+ * User space process size. This is the first address outside the user range.
+ * There are a few constraints that determine this:
+ *
+ * On Intel CPUs, if a SYSCALL instruction is at the highest canonical
+ * address, then that syscall will enter the kernel with a
+ * non-canonical return address, and SYSRET will explode dangerously.
+ * We avoid this particular problem by preventing anything executable
+ * from being mapped at the maximum canonical address.
+ *
+ * On AMD CPUs in the Ryzen family, there's a nasty bug in which the
+ * CPUs malfunction if they execute code from the highest canonical page.
+ * They'll speculate right off the end of the canonical space, and
+ * bad things happen. This is worked around in the same way as the
+ * Intel problem.
+ *
+ * With page table isolation enabled, we map the LDT in ... [stay tuned]
*/
#define TASK_SIZE_MAX ((1UL << __VIRTUAL_MASK_SHIFT) - PAGE_SIZE)
--- a/arch/x86/kernel/ldt.c
+++ b/arch/x86/kernel/ldt.c
@@ -24,6 +24,7 @@
#include <linux/uaccess.h>
#include <asm/ldt.h>
+#include <asm/tlb.h>
#include <asm/desc.h>
#include <asm/mmu_context.h>
#include <asm/syscalls.h>
@@ -51,13 +52,11 @@ static void refresh_ldt_segments(void)
static void flush_ldt(void *__mm)
{
struct mm_struct *mm = __mm;
- mm_context_t *pc;
if (this_cpu_read(cpu_tlbstate.loaded_mm) != mm)
return;
- pc = &mm->context;
- set_ldt(pc->ldt->entries, pc->ldt->nr_entries);
+ load_mm_ldt(mm);
refresh_ldt_segments();
}
@@ -94,10 +93,121 @@ static struct ldt_struct *alloc_ldt_stru
return NULL;
}
+ /* The new LDT isn't aliased for PTI yet. */
+ new_ldt->slot = -1;
+
new_ldt->nr_entries = num_entries;
return new_ldt;
}
+/*
+ * If PTI is enabled, this maps the LDT into the kernelmode and
+ * usermode tables for the given mm.
+ *
+ * There is no corresponding unmap function. Even if the LDT is freed, we
+ * leave the PTEs around until the slot is reused or the mm is destroyed.
+ * This is harmless: the LDT is always in ordinary memory, and no one will
+ * access the freed slot.
+ *
+ * If we wanted to unmap freed LDTs, we'd also need to do a flush to make
+ * it useful, and the flush would slow down modify_ldt().
+ */
+static int
+map_ldt_struct(struct mm_struct *mm, struct ldt_struct *ldt, int slot)
+{
+#ifdef CONFIG_PAGE_TABLE_ISOLATION
+ bool is_vmalloc, had_top_level_entry;
+ unsigned long va;
+ spinlock_t *ptl;
+ pgd_t *pgd;
+ int i;
+
+ if (!static_cpu_has(X86_FEATURE_PTI))
+ return 0;
+
+ /*
+ * Any given ldt_struct should have map_ldt_struct() called at most
+ * once.
+ */
+ WARN_ON(ldt->slot != -1);
+
+ /*
+ * Did we already have the top level entry allocated? We can't
+ * use pgd_none() for this because it doens't do anything on
+ * 4-level page table kernels.
+ */
+ pgd = pgd_offset(mm, LDT_BASE_ADDR);
+ had_top_level_entry = (pgd->pgd != 0);
+
+ is_vmalloc = is_vmalloc_addr(ldt->entries);
+
+ for (i = 0; i * PAGE_SIZE < ldt->nr_entries * LDT_ENTRY_SIZE; i++) {
+ unsigned long offset = i << PAGE_SHIFT;
+ const void *src = (char *)ldt->entries + offset;
+ unsigned long pfn;
+ pte_t pte, *ptep;
+
+ va = (unsigned long)ldt_slot_va(slot) + offset;
+ pfn = is_vmalloc ? vmalloc_to_pfn(src) :
+ page_to_pfn(virt_to_page(src));
+ /*
+ * Treat the PTI LDT range as a *userspace* range.
+ * get_locked_pte() will allocate all needed pagetables
+ * and account for them in this mm.
+ */
+ ptep = get_locked_pte(mm, va, &ptl);
+ if (!ptep)
+ return -ENOMEM;
+ pte = pfn_pte(pfn, __pgprot(__PAGE_KERNEL & ~_PAGE_GLOBAL));
+ set_pte_at(mm, va, ptep, pte);
+ pte_unmap_unlock(ptep, ptl);
+ }
+
+ if (mm->context.ldt) {
+ /*
+ * We already had an LDT. The top-level entry should already
+ * have been allocated and synchronized with the usermode
+ * tables.
+ */
+ WARN_ON(!had_top_level_entry);
+ if (static_cpu_has(X86_FEATURE_PTI))
+ WARN_ON(!kernel_to_user_pgdp(pgd)->pgd);
+ } else {
+ /*
+ * This is the first time we're mapping an LDT for this process.
+ * Sync the pgd to the usermode tables.
+ */
+ WARN_ON(had_top_level_entry);
+ if (static_cpu_has(X86_FEATURE_PTI)) {
+ WARN_ON(kernel_to_user_pgdp(pgd)->pgd);
+ set_pgd(kernel_to_user_pgdp(pgd), *pgd);
+ }
+ }
+
+ va = (unsigned long)ldt_slot_va(slot);
+ flush_tlb_mm_range(mm, va, va + LDT_SLOT_STRIDE, 0);
+
+ ldt->slot = slot;
+#endif
+ return 0;
+}
+
+static void free_ldt_pgtables(struct mm_struct *mm)
+{
+#ifdef CONFIG_PAGE_TABLE_ISOLATION
+ struct mmu_gather tlb;
+ unsigned long start = LDT_BASE_ADDR;
+ unsigned long end = start + (1UL << PGDIR_SHIFT);
+
+ if (!static_cpu_has(X86_FEATURE_PTI))
+ return;
+
+ tlb_gather_mmu(&tlb, mm, start, end);
+ free_pgd_range(&tlb, start, end, start, end);
+ tlb_finish_mmu(&tlb, start, end);
+#endif
+}
+
/* After calling this, the LDT is immutable. */
static void finalize_ldt_struct(struct ldt_struct *ldt)
{
@@ -156,6 +266,12 @@ int ldt_dup_context(struct mm_struct *ol
new_ldt->nr_entries * LDT_ENTRY_SIZE);
finalize_ldt_struct(new_ldt);
+ retval = map_ldt_struct(mm, new_ldt, 0);
+ if (retval) {
+ free_ldt_pgtables(mm);
+ free_ldt_struct(new_ldt);
+ goto out_unlock;
+ }
mm->context.ldt = new_ldt;
out_unlock:
@@ -174,6 +290,11 @@ void destroy_context_ldt(struct mm_struc
mm->context.ldt = NULL;
}
+void ldt_arch_exit_mmap(struct mm_struct *mm)
+{
+ free_ldt_pgtables(mm);
+}
+
static int read_ldt(void __user *ptr, unsigned long bytecount)
{
struct mm_struct *mm = current->mm;
@@ -287,6 +408,18 @@ static int write_ldt(void __user *ptr, u
new_ldt->entries[ldt_info.entry_number] = ldt;
finalize_ldt_struct(new_ldt);
+ /*
+ * If we are using PTI, map the new LDT into the userspace pagetables.
+ * If there is already an LDT, use the other slot so that other CPUs
+ * will continue to use the old LDT until install_ldt() switches
+ * them over to the new LDT.
+ */
+ error = map_ldt_struct(mm, new_ldt, old_ldt ? !old_ldt->slot : 0);
+ if (error) {
+ free_ldt_struct(old_ldt);
+ goto out_unlock;
+ }
+
install_ldt(mm, new_ldt);
free_ldt_struct(old_ldt);
error = 0;
--- a/arch/x86/mm/dump_pagetables.c
+++ b/arch/x86/mm/dump_pagetables.c
@@ -52,12 +52,18 @@ enum address_markers_idx {
USER_SPACE_NR = 0,
KERNEL_SPACE_NR,
LOW_KERNEL_NR,
+#if defined(CONFIG_MODIFY_LDT_SYSCALL) && defined(CONFIG_X86_5LEVEL)
+ LDT_NR,
+#endif
VMALLOC_START_NR,
VMEMMAP_START_NR,
#ifdef CONFIG_KASAN
KASAN_SHADOW_START_NR,
KASAN_SHADOW_END_NR,
#endif
+#if defined(CONFIG_MODIFY_LDT_SYSCALL) && !defined(CONFIG_X86_5LEVEL)
+ LDT_NR,
+#endif
CPU_ENTRY_AREA_NR,
#ifdef CONFIG_X86_ESPFIX64
ESPFIX_START_NR,
@@ -82,6 +88,9 @@ static struct addr_marker address_marker
[KASAN_SHADOW_START_NR] = { KASAN_SHADOW_START, "KASAN shadow" },
[KASAN_SHADOW_END_NR] = { KASAN_SHADOW_END, "KASAN shadow end" },
#endif
+#ifdef CONFIG_MODIFY_LDT_SYSCALL
+ [LDT_NR] = { LDT_BASE_ADDR, "LDT remap" },
+#endif
[CPU_ENTRY_AREA_NR] = { CPU_ENTRY_AREA_BASE,"CPU entry Area" },
#ifdef CONFIG_X86_ESPFIX64
[ESPFIX_START_NR] = { ESPFIX_BASE_ADDR, "ESPfix Area", 16 },
next prev parent reply other threads:[~2018-01-01 14:36 UTC|newest]
Thread overview: 147+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-01-01 14:36 [PATCH 4.14 000/146] 4.14.11-stable review Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 001/146] tracing: Remove extra zeroing out of the ring buffer page Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 002/146] tracing: Fix possible double free on failure of allocating trace buffer Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 003/146] tracing: Fix crash when it fails to alloc ring buffer Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 004/146] x86/cpufeatures: Add X86_BUG_CPU_INSECURE Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 005/146] x86/mm/pti: Disable global pages if PAGE_TABLE_ISOLATION=y Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 006/146] x86/mm/pti: Prepare the x86/entry assembly code for entry/exit CR3 switching Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 007/146] x86/mm/pti: Add infrastructure for page table isolation Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 008/146] x86/pti: Add the pti= cmdline option and documentation Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 009/146] x86/mm/pti: Add mapping helper functions Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 010/146] x86/mm/pti: Allow NX poison to be set in p4d/pgd Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 011/146] x86/mm/pti: Allocate a separate user PGD Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 012/146] x86/mm/pti: Populate " Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 013/146] x86/mm/pti: Add functions to clone kernel PMDs Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 014/146] x86/mm/pti: Force entry through trampoline when PTI active Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 015/146] x86/mm/pti: Share cpu_entry_area with user space page tables Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 016/146] x86/entry: Align entry text section to PMD boundary Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 017/146] x86/mm/pti: Share entry text PMD Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 018/146] x86/mm/pti: Map ESPFIX into user space Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 019/146] x86/cpu_entry_area: Add debugstore entries to cpu_entry_area Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 020/146] x86/events/intel/ds: Map debug buffers in cpu_entry_area Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 021/146] x86/mm/64: Make a full PGD-entry size hole in the memory map Greg Kroah-Hartman
2018-01-01 14:36 ` Greg Kroah-Hartman [this message]
2018-01-01 14:36 ` [PATCH 4.14 023/146] x86/pti: Map the vsyscall page if needed Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 024/146] x86/mm: Allow flushing for future ASID switches Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 025/146] x86/mm: Abstract switching CR3 Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 026/146] x86/mm: Use/Fix PCID to optimize user/kernel switches Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 027/146] x86/mm: Optimize RESTORE_CR3 Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 028/146] x86/mm: Use INVPCID for __native_flush_tlb_single() Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 029/146] x86/mm: Clarify the whole ASID/kernel PCID/user PCID naming Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 030/146] x86/dumpstack: Indicate in Oops whether PTI is configured and enabled Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 031/146] x86/mm/pti: Add Kconfig Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 032/146] x86/mm/dump_pagetables: Add page table directory to the debugfs VFS hierarchy Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 033/146] x86/mm/dump_pagetables: Check user space page table for WX pages Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 034/146] x86/mm/dump_pagetables: Allow dumping current pagetables Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 035/146] x86/ldt: Make the LDT mapping RO Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 036/146] ring-buffer: Mask out the info bits when returning buffer page length Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 037/146] ring-buffer: Do no reuse reader page if still in use Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 038/146] iw_cxgb4: Only validate the MSN for successful completions Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 039/146] ASoC: codecs: msm8916-wcd: Fix supported formats Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 040/146] ASoC: wm_adsp: Fix validation of firmware and coeff lengths Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 041/146] ASoC: da7218: fix fix child-node lookup Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 042/146] ASoC: fsl_ssi: AC97 ops need regmap, clock and cleaning up on failure Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 043/146] ASoC: twl4030: fix child-node lookup Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 044/146] ASoC: tlv320aic31xx: Fix GPIO1 register definition Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 045/146] gpio: fix "gpio-line-names" property retrieval Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 046/146] IB/hfi: Only read capability registers if the capability exists Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 047/146] IB/mlx5: Serialize access to the VMA list Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 048/146] IB/uverbs: Fix command checking as part of ib_uverbs_ex_modify_qp() Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 049/146] IB/core: Verify that QP is security enabled in create and destroy Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 050/146] ALSA: hda: Drop useless WARN_ON() Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 051/146] ALSA: hda - Add MIC_NO_PRESENCE fixup for 2 HP machines Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 052/146] ALSA: hda - change the location for one mic on a Lenovo machine Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 053/146] ALSA: hda - fix headset mic detection issue on a Dell machine Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 054/146] ALSA: hda - Fix missing COEF init for ALC225/295/299 Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 055/146] cpufreq: schedutil: Use idle_calls counter of the remote CPU Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 056/146] block: fix blk_rq_append_bio Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 057/146] block: dont let passthrough IO go into .make_request_fn() Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 060/146] ipv6: mcast: better catch silly mtu values Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 061/146] net: fec: unmap the xmit buffer that are not transferred by DMA Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 062/146] net: igmp: Use correct source address on IGMPv3 reports Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 063/146] netlink: Add netns check on taps Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 065/146] net: reevalulate autoflowlabel setting after sysctl setting Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 066/146] ptr_ring: add barriers Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 067/146] RDS: Check cmsg_len before dereferencing CMSG_DATA Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 068/146] tcp_bbr: record "full bw reached" decision in new full_bw_reached bit Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 069/146] tcp md5sig: Use skbs saddr when replying to an incoming segment Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 070/146] tg3: Fix rx hang on MTU change with 5717/5719 Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 071/146] tcp_bbr: reset full pipe detection on loss recovery undo Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 072/146] tcp_bbr: reset long-term bandwidth sampling " Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 073/146] s390/qeth: apply takeover changes when mode is toggled Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 074/146] s390/qeth: dont apply takeover changes to RXIP Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 075/146] s390/qeth: lock IP table while applying takeover changes Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 076/146] s390/qeth: update takeover IPs after configuration change Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 077/146] net: ipv4: fix for a race condition in raw_sendmsg Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 078/146] net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 079/146] sctp: Replace use of sockets_allocated with specified macro Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 080/146] adding missing rcu_read_unlock in ipxip6_rcv Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 081/146] ip6_gre: fix device features for ioctl setup Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 082/146] ipv4: Fix use-after-free when flushing FIB tables Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 083/146] net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 084/146] net: Fix double free and memory corruption in get_net_ns_by_id() Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 085/146] net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 086/146] sock: free skb in skb_complete_tx_timestamp on error Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 087/146] tcp: invalidate rate samples during SACK reneging Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 088/146] net/mlx5: Fix rate limit packet pacing naming and struct Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 089/146] net/mlx5e: Fix possible deadlock of VXLAN lock Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 090/146] net/mlx5e: Fix features check of IPv6 traffic Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 091/146] net/mlx5e: Add refcount to VXLAN structure Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 092/146] net/mlx5e: Prevent possible races in VXLAN control flow Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 093/146] net/mlx5: Fix error flow in CREATE_QP command Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 094/146] openvswitch: Fix pop_vlan action for double tagged frames Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 095/146] sfc: pass valid pointers from efx_enqueue_unwind Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 096/146] net: dsa: bcm_sf2: Clear IDDQ_GLOBAL_PWR bit for PHY Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 097/146] s390/qeth: fix error handling in checksum cmd callback Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 098/146] sctp: make sure stream nums can match optlen in sctp_setsockopt_reset_streams Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 099/146] tipc: fix hanging poll() for stream sockets Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 100/146] mlxsw: spectrum: Disable MAC learning for ovs port Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 101/146] tcp: fix potential underestimation on rcv_rtt Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 102/146] net: phy: marvell: Limit 88m1101 autoneg errata to 88E1145 as well Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 103/146] ipv6: Honor specified parameters in fibmatch lookup Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 104/146] tcp: refresh tcp_mstamp from timers callbacks Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 105/146] net/mlx5: FPGA, return -EINVAL if size is zero Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 106/146] vxlan: restore dev->mtu setting based on lower device Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 107/146] net: sched: fix static key imbalance in case of ingress/clsact_init error Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 108/146] bnxt_en: Fix sources of spurious netpoll warnings Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 109/146] phylink: ensure the PHY interface mode is appropriately set Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 110/146] phylink: ensure AN is enabled Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 111/146] ipv4: fib: Fix metrics match when deleting a route Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 112/146] ipv6: set all.accept_dad to 0 by default Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 113/146] Revert "mlx5: move affinity hints assignments to generic code" Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 114/146] skbuff: orphan frags before zerocopy clone Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 115/146] skbuff: skb_copy_ubufs must release uarg even without user frags Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 116/146] skbuff: in skb_copy_ubufs unclone before releasing zerocopy Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 117/146] [PATCH] sparc64: repair calling incorrect hweight function from stubs Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 118/146] usbip: fix usbip bind writing random string after command in match_busid Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 119/146] usbip: prevent leaking socket pointer address in messages Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 120/146] usbip: stub: stop printing kernel pointer addresses " Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 121/146] usbip: vhci: " Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 122/146] USB: chipidea: msm: fix ulpi-node lookup Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 123/146] USB: serial: ftdi_sio: add id for Airbus DS P8GR Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 125/146] USB: serial: option: add support for Telit ME910 PID 0x1101 Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 127/146] usb: Add device quirk for Logitech HD Pro Webcam C925e Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 128/146] usb: add RESET_RESUME for ELSA MicroLink 56K Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 129/146] USB: Fix off by one in type-specific length check of BOS SSP capability Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 130/146] usb: xhci: Add XHCI_TRUST_TX_LENGTH for Renesas uPD720201 Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 131/146] timers: Use deferrable base independent of base::nohz_active Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 132/146] timers: Invoke timer_start_debug() where it makes sense Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 133/146] timers: Reinitialize per cpu bases on hotplug Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 134/146] binder: fix proc->files use-after-free Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 135/146] phy: tegra: fix device-tree node lookups Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 136/146] drivers: base: cacheinfo: fix cache type for non-architected system cache Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 137/146] staging: android: ion: Fix dma direction for dma_sync_sg_for_cpu/device Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 138/146] nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick() Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 139/146] x86/smpboot: Remove stale TLB flush invocations Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 140/146] x86/mm: Remove preempt_disable/enable() from __native_flush_tlb() Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 141/146] x86-32: Fix kexec with stack canary (CONFIG_CC_STACKPROTECTOR) Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 142/146] x86/espfix/64: Fix espfix double-fault handling on 5-level systems Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 143/146] x86/ldt: Plug memory leak in error path Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 144/146] x86/ldt: Make LDT pgtable free conditional Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 145/146] n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 146/146] tty: fix tty_ldisc_receive_buf() documentation Greg Kroah-Hartman
2018-01-01 20:28 ` [PATCH 4.14 000/146] 4.14.11-stable review Naresh Kamboju
2018-01-02 8:56 ` Greg Kroah-Hartman
2018-01-02 17:40 ` Guenter Roeck
2018-01-02 22:34 ` Shuah Khan
2018-01-03 10:00 ` Greg Kroah-Hartman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180101140127.058205455@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=David.Laight@aculab.com \
--cc=bp@alien8.de \
--cc=brgerst@gmail.com \
--cc=dave.hansen@intel.com \
--cc=dave.hansen@linux.intel.com \
--cc=hpa@zytor.com \
--cc=jgross@suse.com \
--cc=jpoimboe@redhat.com \
--cc=keescook@chromium.org \
--cc=kirill@shutemov.name \
--cc=linux-kernel@vger.kernel.org \
--cc=luto@kernel.org \
--cc=mingo@kernel.org \
--cc=peterz@infradead.org \
--cc=stable@vger.kernel.org \
--cc=tglx@linutronix.de \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).