From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
patches@lists.linux.dev, Tejun Heo <tj@kernel.org>,
Andrea Righi <andrea.righi@canonical.com>,
Geert Uytterhoeven <geert@linux-m68k.org>,
Sasha Levin <sashal@kernel.org>
Subject: [PATCH 6.8 110/143] kernfs: RCU protect kernfs_nodes and avoid kernfs_idr_lock in kernfs_find_and_get_node_by_id()
Date: Thu, 11 Apr 2024 11:56:18 +0200 [thread overview]
Message-ID: <20240411095424.218530547@linuxfoundation.org> (raw)
In-Reply-To: <20240411095420.903937140@linuxfoundation.org>
6.8-stable review patch. If anyone has any objections, please let me know.
------------------
From: Tejun Heo <tj@kernel.org>
[ Upstream commit 4207b556e62f0a8915afc5da4c5d5ad915a253a5 ]
The BPF helper bpf_cgroup_from_id() calls kernfs_find_and_get_node_by_id()
which acquires kernfs_idr_lock, which is an non-raw non-IRQ-safe lock. This
can lead to deadlocks as bpf_cgroup_from_id() can be called from any BPF
programs including e.g. the ones that attach to functions which are holding
the scheduler rq lock.
Consider the following BPF program:
SEC("fentry/__set_cpus_allowed_ptr_locked")
int BPF_PROG(__set_cpus_allowed_ptr_locked, struct task_struct *p,
struct affinity_context *affn_ctx, struct rq *rq, struct rq_flags *rf)
{
struct cgroup *cgrp = bpf_cgroup_from_id(p->cgroups->dfl_cgrp->kn->id);
if (cgrp) {
bpf_printk("%d[%s] in %s", p->pid, p->comm, cgrp->kn->name);
bpf_cgroup_release(cgrp);
}
return 0;
}
__set_cpus_allowed_ptr_locked() is called with rq lock held and the above
BPF program calls bpf_cgroup_from_id() within leading to the following
lockdep warning:
=====================================================
WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected
6.7.0-rc3-work-00053-g07124366a1d7-dirty #147 Not tainted
-----------------------------------------------------
repro/1620 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire:
ffffffff833b3688 (kernfs_idr_lock){+.+.}-{2:2}, at: kernfs_find_and_get_node_by_id+0x1e/0x70
and this task is already holding:
ffff888237ced698 (&rq->__lock){-.-.}-{2:2}, at: task_rq_lock+0x4e/0xf0
which would create a new lock dependency:
(&rq->__lock){-.-.}-{2:2} -> (kernfs_idr_lock){+.+.}-{2:2}
...
Possible interrupt unsafe locking scenario:
CPU0 CPU1
---- ----
lock(kernfs_idr_lock);
local_irq_disable();
lock(&rq->__lock);
lock(kernfs_idr_lock);
<Interrupt>
lock(&rq->__lock);
*** DEADLOCK ***
...
Call Trace:
dump_stack_lvl+0x55/0x70
dump_stack+0x10/0x20
__lock_acquire+0x781/0x2a40
lock_acquire+0xbf/0x1f0
_raw_spin_lock+0x2f/0x40
kernfs_find_and_get_node_by_id+0x1e/0x70
cgroup_get_from_id+0x21/0x240
bpf_cgroup_from_id+0xe/0x20
bpf_prog_98652316e9337a5a___set_cpus_allowed_ptr_locked+0x96/0x11a
bpf_trampoline_6442545632+0x4f/0x1000
__set_cpus_allowed_ptr_locked+0x5/0x5a0
sched_setaffinity+0x1b3/0x290
__x64_sys_sched_setaffinity+0x4f/0x60
do_syscall_64+0x40/0xe0
entry_SYSCALL_64_after_hwframe+0x46/0x4e
Let's fix it by protecting kernfs_node and kernfs_root with RCU and making
kernfs_find_and_get_node_by_id() acquire rcu_read_lock() instead of
kernfs_idr_lock.
This adds an rcu_head to kernfs_node making it larger by 16 bytes on 64bit.
Combined with the preceding rearrange patch, the net increase is 8 bytes.
Signed-off-by: Tejun Heo <tj@kernel.org>
Cc: Andrea Righi <andrea.righi@canonical.com>
Cc: Geert Uytterhoeven <geert@linux-m68k.org>
Link: https://lore.kernel.org/r/20240109214828.252092-4-tj@kernel.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
fs/kernfs/dir.c | 31 ++++++++++++++++++++-----------
fs/kernfs/kernfs-internal.h | 2 ++
include/linux/kernfs.h | 2 ++
3 files changed, 24 insertions(+), 11 deletions(-)
diff --git a/fs/kernfs/dir.c b/fs/kernfs/dir.c
index bce1d7ac95caa..458519e416fe7 100644
--- a/fs/kernfs/dir.c
+++ b/fs/kernfs/dir.c
@@ -529,6 +529,20 @@ void kernfs_get(struct kernfs_node *kn)
}
EXPORT_SYMBOL_GPL(kernfs_get);
+static void kernfs_free_rcu(struct rcu_head *rcu)
+{
+ struct kernfs_node *kn = container_of(rcu, struct kernfs_node, rcu);
+
+ kfree_const(kn->name);
+
+ if (kn->iattr) {
+ simple_xattrs_free(&kn->iattr->xattrs, NULL);
+ kmem_cache_free(kernfs_iattrs_cache, kn->iattr);
+ }
+
+ kmem_cache_free(kernfs_node_cache, kn);
+}
+
/**
* kernfs_put - put a reference count on a kernfs_node
* @kn: the target kernfs_node
@@ -557,16 +571,11 @@ void kernfs_put(struct kernfs_node *kn)
if (kernfs_type(kn) == KERNFS_LINK)
kernfs_put(kn->symlink.target_kn);
- kfree_const(kn->name);
-
- if (kn->iattr) {
- simple_xattrs_free(&kn->iattr->xattrs, NULL);
- kmem_cache_free(kernfs_iattrs_cache, kn->iattr);
- }
spin_lock(&kernfs_idr_lock);
idr_remove(&root->ino_idr, (u32)kernfs_ino(kn));
spin_unlock(&kernfs_idr_lock);
- kmem_cache_free(kernfs_node_cache, kn);
+
+ call_rcu(&kn->rcu, kernfs_free_rcu);
kn = parent;
if (kn) {
@@ -575,7 +584,7 @@ void kernfs_put(struct kernfs_node *kn)
} else {
/* just released the root kn, free @root too */
idr_destroy(&root->ino_idr);
- kfree(root);
+ kfree_rcu(root, rcu);
}
}
EXPORT_SYMBOL_GPL(kernfs_put);
@@ -715,7 +724,7 @@ struct kernfs_node *kernfs_find_and_get_node_by_id(struct kernfs_root *root,
ino_t ino = kernfs_id_ino(id);
u32 gen = kernfs_id_gen(id);
- spin_lock(&kernfs_idr_lock);
+ rcu_read_lock();
kn = idr_find(&root->ino_idr, (u32)ino);
if (!kn)
@@ -739,10 +748,10 @@ struct kernfs_node *kernfs_find_and_get_node_by_id(struct kernfs_root *root,
if (unlikely(!__kernfs_active(kn) || !atomic_inc_not_zero(&kn->count)))
goto err_unlock;
- spin_unlock(&kernfs_idr_lock);
+ rcu_read_unlock();
return kn;
err_unlock:
- spin_unlock(&kernfs_idr_lock);
+ rcu_read_unlock();
return NULL;
}
diff --git a/fs/kernfs/kernfs-internal.h b/fs/kernfs/kernfs-internal.h
index 237f2764b9412..b42ee6547cdc1 100644
--- a/fs/kernfs/kernfs-internal.h
+++ b/fs/kernfs/kernfs-internal.h
@@ -49,6 +49,8 @@ struct kernfs_root {
struct rw_semaphore kernfs_rwsem;
struct rw_semaphore kernfs_iattr_rwsem;
struct rw_semaphore kernfs_supers_rwsem;
+
+ struct rcu_head rcu;
};
/* +1 to avoid triggering overflow warning when negating it */
diff --git a/include/linux/kernfs.h b/include/linux/kernfs.h
index 99aaa050ccb76..e857a150babc6 100644
--- a/include/linux/kernfs.h
+++ b/include/linux/kernfs.h
@@ -223,6 +223,8 @@ struct kernfs_node {
unsigned short flags;
umode_t mode;
struct kernfs_iattrs *iattr;
+
+ struct rcu_head rcu;
};
/*
--
2.43.0
next prev parent reply other threads:[~2024-04-11 10:12 UTC|newest]
Thread overview: 155+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-04-11 9:54 [PATCH 6.8 000/143] 6.8.6-rc1 review Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 001/143] wifi: ath9k: fix LNA selection in ath_ant_try_scan() Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 002/143] wifi: rtw89: fix null pointer access when abort scan Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 003/143] bnx2x: Fix firmware version string character counts Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 004/143] batman-adv: Return directly after a failed batadv_dat_select_candidates() in batadv_dat_forward_data() Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 005/143] batman-adv: Improve exception handling in batadv_throw_uevent() Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 006/143] net: stmmac: dwmac-starfive: Add support for JH7100 SoC Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 007/143] net: phy: phy_device: Prevent nullptr exceptions on ISR Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 008/143] wifi: rtw89: pci: validate RX tag for RXQ and RPQ Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 009/143] wifi: rtw89: pci: enlarge RX DMA buffer to consider size of RX descriptor Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 010/143] VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 011/143] wifi: iwlwifi: pcie: Add the PCI device id for new hardware Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 012/143] arm64: dts: qcom: qcm6490-idp: Add definition for three LEDs Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 013/143] net: dsa: qca8k: put MDIO controller OF node if unavailable Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 014/143] arm64: dts: qcom: qrb2210-rb1: disable cluster power domains Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 015/143] printk: For @suppress_panic_printk check for other CPU in panic Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 016/143] panic: Flush kernel log buffer at the end Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 017/143] dump_stack: Do not get cpu_sync for panic CPU Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 018/143] wifi: iwlwifi: pcie: Add new PCI device id and CNVI Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 019/143] cpuidle: Avoid potential overflow in integer multiplication Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 020/143] ARM: dts: rockchip: fix rk3288 hdmi ports node Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 021/143] ARM: dts: rockchip: fix rk322x " Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 022/143] arm64: dts: rockchip: fix rk3328 " Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 023/143] arm64: dts: rockchip: fix rk3399 " Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 024/143] net: add netdev_lockdep_set_classes() to virtual drivers Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 025/143] arm64: dts: qcom: qcs6490-rb3gen2: Declare GCC clocks protected Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 026/143] pmdomain: ti: Add a null pointer check to the omap_prm_domain_init Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 027/143] pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 028/143] ACPI: resource: Add IRQ override quirk for ASUS ExpertBook B2502FBA Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 029/143] ionic: set adminq irq affinity Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 030/143] net: skbuff: add overflow debug check to pull/push helpers Greg Kroah-Hartman
2024-04-11 9:54 ` [PATCH 6.8 031/143] firmware: tegra: bpmp: Return directly after a failed kzalloc() in get_filename() Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 032/143] wifi: brcmfmac: Add DMI nvram filename quirk for ACEPC W5 Pro Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 033/143] wifi: mt76: mt7915: add locking for accessing mapped registers Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 034/143] wifi: mt76: mt7996: disable AMSDU for non-data frames Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 035/143] wifi: mt76: mt7996: add locking for accessing mapped registers Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 036/143] ACPI: x86: Move acpi_quirk_skip_serdev_enumeration() out of CONFIG_X86_ANDROID_TABLETS Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 037/143] ACPI: x86: Add DELL0501 handling to acpi_quirk_skip_serdev_enumeration() Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 038/143] pstore/zone: Add a null pointer check to the psz_kmsg_read Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 039/143] tools/power x86_energy_perf_policy: Fix file leak in get_pkg_num() Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 040/143] net: pcs: xpcs: Return EINVAL in the internal methods Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 041/143] dma-direct: Leak pages on dma_set_decrypted() failure Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 042/143] wifi: ath11k: decrease MHI channel buffer length to 8KB Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 043/143] iommu/arm-smmu-v3: Hold arm_smmu_asid_lock during all of attach_dev Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 044/143] cpufreq: Dont unregister cpufreq cooling on CPU hotplug Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 045/143] overflow: Allow non-type arg to type_max() and type_min() Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 046/143] wifi: iwlwifi: Add missing MODULE_FIRMWARE() for *.pnvm Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 047/143] wifi: cfg80211: check A-MSDU format more carefully Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 048/143] btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 049/143] btrfs: export: handle invalid inode or root reference in btrfs_get_parent() Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 050/143] btrfs: send: handle path ref underflow in header iterate_inode_ref() Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 051/143] ice: use relative VSI index for VFs instead of PF VSI number Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 052/143] net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 053/143] netdev: let netlink core handle -EMSGSIZE errors Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 054/143] Bluetooth: btintel: Fix null ptr deref in btintel_read_version Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 055/143] Bluetooth: btmtk: Add MODULE_FIRMWARE() for MT7922 Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 056/143] Bluetooth: Add new quirk for broken read key length on ATS2851 Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 057/143] drm/vc4: dont check if plane->state->fb == state->fb Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 058/143] drm/ci: uprev mesa version: fix kdl commit fetch Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 059/143] drm/amdgpu: Skip do PCI error slot reset during RAS recovery Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 060/143] Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 061/143] drm: panel-orientation-quirks: Add quirk for GPD Win Mini Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 062/143] ASoC: SOF: amd: Optimize quirk for Valve Galileo Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 063/143] drm/ttm: return ENOSPC from ttm_bo_mem_space v3 Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 064/143] scsi: ufs: qcom: Avoid re-init quirk when gears match Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 065/143] drm/amd/display: increased min_dcfclk_mhz and min_fclk_mhz Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 066/143] pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 067/143] sysv: dont call sb_bread() with pointers_lock held Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 068/143] scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 069/143] drm/amd/display: Disable idle reallow as part of command/gpint execution Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 070/143] isofs: handle CDs with bad root inode but good Joliet root directory Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 071/143] ASoC: Intel: sof_rt5682: dmi quirk cleanup for mtl boards Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 072/143] ASoC: Intel: common: DMI remap for rebranded Intel NUC M15 (LAPRC710) laptops Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 073/143] rcu/nocb: Fix WARN_ON_ONCE() in the rcu_nocb_bypass_lock() Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 074/143] rcu-tasks: Repair RCU Tasks Trace quiescence check Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 075/143] Julia Lawall reported this null pointer dereference, this should fix it Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 076/143] media: sta2x11: fix irq handler cast Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 077/143] ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 078/143] drm/panel: simple: Add BOE BP082WX1-100 8.2" panel Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 079/143] x86/vdso: Fix rethunk patching for vdso-image-{32,64}.o Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 080/143] ASoC: Intel: avs: Populate board selection with new I2S entries Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 081/143] ext4: add a hint for block bitmap corrupt state in mb_groups Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 082/143] ext4: forbid commit inconsistent quota data when errors=remount-ro Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 083/143] drm/amd/display: Fix nanosec stat overflow Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 084/143] accel/habanalabs: increase HL_MAX_STR to 64 bytes to avoid warnings Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 085/143] i2c: designware: Fix RX FIFO depth define on Wangxun 10Gb NIC Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 086/143] HID: input: avoid polling stylus battery on Chromebook Pompom Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 087/143] drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init() Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 088/143] drm: Check output polling initialized before disabling Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 089/143] SUNRPC: increase size of rpc_wait_queue.qlen from unsigned short to unsigned int Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 090/143] PCI: Disable D3cold on Asus B1400 PCI-NVMe bridge Greg Kroah-Hartman
2024-04-11 9:55 ` [PATCH 6.8 091/143] Revert "ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default" Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 092/143] libperf evlist: Avoid out-of-bounds access Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 093/143] crypto: iaa - Fix async_disable descriptor leak Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 094/143] input/touchscreen: imagis: Correct the maximum touch area value Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 095/143] drivers/perf: hisi: Enable HiSilicon Erratum 162700402 quirk for HIP09 Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 096/143] block: prevent division by zero in blk_rq_stat_sum() Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 097/143] RDMA/cm: add timeout to cm_destroy_id wait Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 098/143] Input: imagis - use FIELD_GET where applicable Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 099/143] Input: allocate keycode for Display refresh rate toggle Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 100/143] platform/x86: acer-wmi: Add support for Acer PH16-71 Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 101/143] platform/x86: acer-wmi: Add predator_v4 module parameter Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 102/143] platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 103/143] perf/x86/amd/lbr: Discard erroneous branch entries Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 104/143] ALSA: hda/realtek: Add quirk for Lenovo Yoga 9 14IMH9 Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 105/143] ktest: force $buildonly = 1 for make_warnings_file test type Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 106/143] Input: xpad - add support for Snakebyte GAMEPADs Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 107/143] ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 108/143] tools: iio: replace seekdir() in iio_generic_buffer Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 109/143] bus: mhi: host: Add MHI_PM_SYS_ERR_FAIL state Greg Kroah-Hartman
2024-04-11 9:56 ` Greg Kroah-Hartman [this message]
2024-04-11 9:56 ` [PATCH 6.8 111/143] usb: typec: ucsi: Add qcm6490-pmic-glink as needing PDOS quirk Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 112/143] thunderbolt: Calculate DisplayPort tunnel bandwidth after DPRX capabilities read Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 113/143] usb: gadget: uvc: refactor the check for a valid buffer in the pump worker Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 114/143] usb: gadget: uvc: mark incomplete frames with UVC_STREAM_ERR Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 115/143] usb: typec: ucsi: Limit read size on v1.2 Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 116/143] serial: 8250_of: Drop quirk fot NPCM from 8250_port Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 117/143] thunderbolt: Keep the domain powered when USB4 port is in redrive mode Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 118/143] usb: typec: tcpci: add generic tcpci fallback compatible Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 119/143] usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 120/143] ASoC: amd: yc: Fix non-functional mic on ASUS M7600RE Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 121/143] thermal/of: Assume polling-delay(-passive) 0 when absent Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 122/143] ASoC: soc-core.c: Skip dummy codec when adding platforms Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 123/143] x86/xen: attempt to inflate the memory balloon on PVH Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 124/143] fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 125/143] io_uring: clear opcode specific data for an early failure Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 126/143] modpost: fix null pointer dereference Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 127/143] drivers/nvme: Add quirks for device 126f:2262 Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 128/143] fbmon: prevent division by zero in fb_videomode_from_videomode() Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 129/143] ALSA: hda/realtek: Add quirks for some Clevo laptops Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 130/143] drm/amdgpu: Init zone device and drm client after mode-1 reset on reload Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 131/143] gcc-plugins/stackleak: Avoid .head.text section Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 132/143] media: mediatek: vcodec: Fix oops when HEVC init fails Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 133/143] media: mediatek: vcodec: adding lock to protect decoder context list Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 134/143] media: mediatek: vcodec: adding lock to protect encoder " Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 135/143] randomize_kstack: Improve entropy diffusion Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 136/143] platform/x86/intel/hid: Dont wake on 5-button releases Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 137/143] platform/x86: intel-vbtn: Update tablet mode switch at end of probe Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 138/143] nouveau: fix devinit paths to only handle display on GSP Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 139/143] Bluetooth: btintel: Fixe build regression Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 140/143] net: mpls: error out if inner headers are not set Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 141/143] VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 142/143] x86/vdso: Fix rethunk patching for vdso-image-x32.o too Greg Kroah-Hartman
2024-04-11 9:56 ` [PATCH 6.8 143/143] Revert "drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init()" Greg Kroah-Hartman
2024-04-11 15:38 ` [PATCH 6.8 000/143] 6.8.6-rc1 review Justin Forbes
2024-04-11 18:17 ` SeongJae Park
2024-04-11 19:34 ` Holger Hoffstätte
2024-04-12 8:26 ` Greg Kroah-Hartman
2024-04-11 20:36 ` Ronald Warsow
2024-04-11 22:07 ` Florian Fainelli
2024-04-11 23:38 ` Shuah Khan
2024-04-12 1:32 ` Bagas Sanjaya
2024-04-12 7:19 ` Ron Economos
2024-04-12 8:08 ` Jon Hunter
2024-04-12 18:21 ` Naresh Kamboju
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20240411095424.218530547@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=andrea.righi@canonical.com \
--cc=geert@linux-m68k.org \
--cc=patches@lists.linux.dev \
--cc=sashal@kernel.org \
--cc=stable@vger.kernel.org \
--cc=tj@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox