public inbox for stable@vger.kernel.org
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: "Greg Kroah-Hartman" <gregkh@linuxfoundation.org>,
	patches@lists.linux.dev, syzbot <syzkaller@googlegroups.com>,
	"Eric Dumazet" <edumazet@google.com>,
	"Björn Töpel" <bjorn@kernel.org>,
	"Magnus Karlsson" <magnus.karlsson@intel.com>,
	"Maciej Fijalkowski" <maciej.fijalkowski@intel.com>,
	"Jonathan Lemon" <jonathan.lemon@gmail.com>,
	"Daniel Borkmann" <daniel@iogearbox.net>,
	"Jakub Kicinski" <kuba@kernel.org>,
	"Shung-Hsi Yu" <shung-hsi.yu@suse.com>
Subject: [PATCH 4.19 035/139] xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
Date: Wed,  3 Jul 2024 12:38:52 +0200	[thread overview]
Message-ID: <20240703102831.766914308@linuxfoundation.org> (raw)
In-Reply-To: <20240703102830.432293640@linuxfoundation.org>

4.19-stable review patch.  If anyone has any objections, please let me know.

------------------

From: Eric Dumazet <edumazet@google.com>

commit 237f3cf13b20db183d3706d997eedc3c49eacd44 upstream.

syzbot reported an illegal copy in xsk_setsockopt() [1]

Make sure to validate setsockopt() @optlen parameter.

[1]

 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]
 BUG: KASAN: slab-out-of-bounds in xsk_setsockopt+0x909/0xa40 net/xdp/xsk.c:1420
Read of size 4 at addr ffff888028c6cde3 by task syz-executor.0/7549

CPU: 0 PID: 7549 Comm: syz-executor.0 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 <TASK>
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x169/0x550 mm/kasan/report.c:488
  kasan_report+0x143/0x180 mm/kasan/report.c:601
  copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
  copy_from_sockptr include/linux/sockptr.h:55 [inline]
  xsk_setsockopt+0x909/0xa40 net/xdp/xsk.c:1420
  do_sock_setsockopt+0x3af/0x720 net/socket.c:2311
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7fb40587de69
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fb40665a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007fb4059abf80 RCX: 00007fb40587de69
RDX: 0000000000000005 RSI: 000000000000011b RDI: 0000000000000006
RBP: 00007fb4058ca47a R08: 0000000000000002 R09: 0000000000000000
R10: 0000000020001980 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007fb4059abf80 R15: 00007fff57ee4d08
 </TASK>

Allocated by task 7549:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:370 [inline]
  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387
  kasan_kmalloc include/linux/kasan.h:211 [inline]
  __do_kmalloc_node mm/slub.c:3966 [inline]
  __kmalloc+0x233/0x4a0 mm/slub.c:3979
  kmalloc include/linux/slab.h:632 [inline]
  __cgroup_bpf_run_filter_setsockopt+0xd2f/0x1040 kernel/bpf/cgroup.c:1869
  do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

The buggy address belongs to the object at ffff888028c6cde0
 which belongs to the cache kmalloc-8 of size 8
The buggy address is located 1 bytes to the right of
 allocated 2-byte region [ffff888028c6cde0, ffff888028c6cde2)

The buggy address belongs to the physical page:
page:ffffea0000a31b00 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888028c6c9c0 pfn:0x28c6c
anon flags: 0xfff00000000800(slab|node=0|zone=1|lastcpupid=0x7ff)
page_type: 0xffffffff()
raw: 00fff00000000800 ffff888014c41280 0000000000000000 dead000000000001
raw: ffff888028c6c9c0 0000000080800057 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 6648, tgid 6644 (syz-executor.0), ts 133906047828, free_ts 133859922223
  set_page_owner include/linux/page_owner.h:31 [inline]
  post_alloc_hook+0x1ea/0x210 mm/page_alloc.c:1533
  prep_new_page mm/page_alloc.c:1540 [inline]
  get_page_from_freelist+0x33ea/0x3580 mm/page_alloc.c:3311
  __alloc_pages+0x256/0x680 mm/page_alloc.c:4569
  __alloc_pages_node include/linux/gfp.h:238 [inline]
  alloc_pages_node include/linux/gfp.h:261 [inline]
  alloc_slab_page+0x5f/0x160 mm/slub.c:2175
  allocate_slab mm/slub.c:2338 [inline]
  new_slab+0x84/0x2f0 mm/slub.c:2391
  ___slab_alloc+0xc73/0x1260 mm/slub.c:3525
  __slab_alloc mm/slub.c:3610 [inline]
  __slab_alloc_node mm/slub.c:3663 [inline]
  slab_alloc_node mm/slub.c:3835 [inline]
  __do_kmalloc_node mm/slub.c:3965 [inline]
  __kmalloc_node+0x2db/0x4e0 mm/slub.c:3973
  kmalloc_node include/linux/slab.h:648 [inline]
  __vmalloc_area_node mm/vmalloc.c:3197 [inline]
  __vmalloc_node_range+0x5f9/0x14a0 mm/vmalloc.c:3392
  __vmalloc_node mm/vmalloc.c:3457 [inline]
  vzalloc+0x79/0x90 mm/vmalloc.c:3530
  bpf_check+0x260/0x19010 kernel/bpf/verifier.c:21162
  bpf_prog_load+0x1667/0x20f0 kernel/bpf/syscall.c:2895
  __sys_bpf+0x4ee/0x810 kernel/bpf/syscall.c:5631
  __do_sys_bpf kernel/bpf/syscall.c:5738 [inline]
  __se_sys_bpf kernel/bpf/syscall.c:5736 [inline]
  __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5736
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
page last free pid 6650 tgid 6647 stack trace:
  reset_page_owner include/linux/page_owner.h:24 [inline]
  free_pages_prepare mm/page_alloc.c:1140 [inline]
  free_unref_page_prepare+0x95d/0xa80 mm/page_alloc.c:2346
  free_unref_page_list+0x5a3/0x850 mm/page_alloc.c:2532
  release_pages+0x2117/0x2400 mm/swap.c:1042
  tlb_batch_pages_flush mm/mmu_gather.c:98 [inline]
  tlb_flush_mmu_free mm/mmu_gather.c:293 [inline]
  tlb_flush_mmu+0x34d/0x4e0 mm/mmu_gather.c:300
  tlb_finish_mmu+0xd4/0x200 mm/mmu_gather.c:392
  exit_mmap+0x4b6/0xd40 mm/mmap.c:3300
  __mmput+0x115/0x3c0 kernel/fork.c:1345
  exit_mm+0x220/0x310 kernel/exit.c:569
  do_exit+0x99e/0x27e0 kernel/exit.c:865
  do_group_exit+0x207/0x2c0 kernel/exit.c:1027
  get_signal+0x176e/0x1850 kernel/signal.c:2907
  arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:310
  exit_to_user_mode_loop kernel/entry/common.c:105 [inline]
  exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
  __syscall_exit_to_user_mode_work kernel/entry/common.c:201 [inline]
  syscall_exit_to_user_mode+0xc9/0x360 kernel/entry/common.c:212
  do_syscall_64+0x10a/0x240 arch/x86/entry/common.c:89
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Memory state around the buggy address:
 ffff888028c6cc80: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc
 ffff888028c6cd00: fa fc fc fc fa fc fc fc 00 fc fc fc 06 fc fc fc
>ffff888028c6cd80: fa fc fc fc fa fc fc fc fa fc fc fc 02 fc fc fc
                                                       ^
 ffff888028c6ce00: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc
 ffff888028c6ce80: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc

Fixes: 423f38329d26 ("xsk: add umem fill queue support and mmap")
Reported-by: syzbot <syzkaller@googlegroups.com>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: "Björn Töpel" <bjorn@kernel.org>
Cc: Magnus Karlsson <magnus.karlsson@intel.com>
Cc: Maciej Fijalkowski <maciej.fijalkowski@intel.com>
Cc: Jonathan Lemon <jonathan.lemon@gmail.com>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Link: https://lore.kernel.org/r/20240404202738.3634547-1-edumazet@google.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
[shung-hsi.yu: two additional changes not present in the original
 1. Check optlen in the XDP_UMEM_REG case as well. It was added in commit
    c05cd36458147 ("xsk: add support to allow unaligned chunk placement") but
    seems like too big of a change for stable
 2. copy_from_sockptr() in the context was replace copy_from_usr()
    because commit a7b75c5a8c414 ("net: pass a sockptr_t into
    ->setsockopt") was not present]
Signed-off-by: Shung-Hsi Yu <shung-hsi.yu@suse.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
 net/xdp/xsk.c |    4 ++++
 1 file changed, 4 insertions(+)

--- a/net/xdp/xsk.c
+++ b/net/xdp/xsk.c
@@ -515,6 +515,8 @@ static int xsk_setsockopt(struct socket
 		struct xdp_umem_reg mr;
 		struct xdp_umem *umem;
 
+		if (optlen < sizeof(mr))
+			return -EINVAL;
 		if (copy_from_user(&mr, optval, sizeof(mr)))
 			return -EFAULT;
 
@@ -542,6 +544,8 @@ static int xsk_setsockopt(struct socket
 		struct xsk_queue **q;
 		int entries;
 
+		if (optlen < sizeof(entries))
+			return -EINVAL;
 		if (copy_from_user(&entries, optval, sizeof(entries)))
 			return -EFAULT;
 



  parent reply	other threads:[~2024-07-03 10:43 UTC|newest]

Thread overview: 148+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-07-03 10:38 [PATCH 4.19 000/139] 4.19.317-rc1 review Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 001/139] wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 002/139] wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 003/139] wifi: iwlwifi: mvm: revert gen2 TX A-MPDU size to 64 Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 004/139] wifi: iwlwifi: mvm: dont read past the mfuart notifcation Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 005/139] ipv6: sr: block BH in seg6_output_core() and seg6_input_core() Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 006/139] vxlan: Fix regression when dropping packets due to invalid src addresses Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 007/139] tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 008/139] ptp: Fix error message on failed pin verification Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 009/139] af_unix: Annotate data-race of sk->sk_state in unix_inq_len() Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 010/139] af_unix: Annotate data-races around sk->sk_state in unix_write_space() and poll() Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 011/139] af_unix: Annotate data-races around sk->sk_state in sendmsg() and recvmsg() Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 012/139] af_unix: Annotate data-races around sk->sk_state in UNIX_DIAG Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 013/139] af_unix: Annotate data-race of net->unx.sysctl_max_dgram_qlen Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 014/139] af_unix: Use unix_recvq_full_lockless() in unix_stream_connect() Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 015/139] af_unix: Use skb_queue_len_lockless() in sk_diag_show_rqlen() Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 016/139] af_unix: Annotate data-race of sk->sk_shutdown in sk_diag_fill() Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 017/139] usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 018/139] drm/amd/display: Handle Y carry-over in VCP X.Y calculation Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 019/139] serial: sc16is7xx: replace hardcoded divisor value with BIT() macro Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 020/139] serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 021/139] media: mc: mark the media devnode as registered from the, start Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 022/139] selftests/mm: compaction_test: fix incorrect write of zero to nr_hugepages Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 023/139] selftests/mm: conform test to TAP format output Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 024/139] selftests/mm: log a consistent test name for check_compaction Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 025/139] selftests/mm: compaction_test: fix bogus test success on Aarch64 Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 026/139] nilfs2: Remove check for PageError Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 027/139] nilfs2: return the mapped address from nilfs_get_page() Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 028/139] nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 029/139] USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 030/139] mei: me: release irq in mei_me_pci_resume error path Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 031/139] jfs: xattr: fix buffer overflow for invalid xattr Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 032/139] xhci: Apply reset resume quirk to Etron EJ188 xHCI host Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 033/139] xhci: Apply broken streams " Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 034/139] Input: try trimming too long modalias strings Greg Kroah-Hartman
2024-07-03 10:38 ` Greg Kroah-Hartman [this message]
2024-07-03 10:38 ` [PATCH 4.19 036/139] HID: core: remove unnecessary WARN_ON() in implement() Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 037/139] iommu/amd: Fix sysfs leak in iommu init Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 038/139] liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 039/139] drm/bridge/panel: Fix runtime warning on panel bridge release Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 040/139] tcp: fix race in tcp_v6_syn_recv_sock() Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 041/139] Bluetooth: L2CAP: Fix rejecting L2CAP_CONN_PARAM_UPDATE_REQ Greg Kroah-Hartman
2024-07-03 10:38 ` [PATCH 4.19 042/139] ipv6/route: Add a missing check on proc_dointvec Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 043/139] net/ipv6: Fix the RT cache flush via sysctl using a previous delay Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 044/139] drivers: core: synchronize really_probe() and dev_uevent() Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 045/139] drm/exynos/vidi: fix memory leak in .get_modes() Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 046/139] vmci: prevent speculation leaks by sanitizing event in event_deliver() Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 047/139] fs/proc: fix softlockup in __read_vmcore Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 048/139] ocfs2: use coarse time for new created files Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 049/139] ocfs2: fix races between hole punching and AIO+DIO Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 050/139] PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 051/139] dmaengine: axi-dmac: fix possible race in remove() Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 052/139] intel_th: pci: Add Granite Rapids support Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 053/139] intel_th: pci: Add Granite Rapids SOC support Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 054/139] intel_th: pci: Add Sapphire " Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 055/139] intel_th: pci: Add Meteor Lake-S support Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 056/139] intel_th: pci: Add Lunar Lake support Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 057/139] nilfs2: fix potential kernel bug due to lack of writeback flag waiting Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 058/139] hv_utils: drain the timesync packets on onchannelcallback Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 059/139] hugetlb_encode.h: fix undefined behaviour (34 << 26) Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 060/139] usb-storage: alauda: Check whether the media is initialized Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 061/139] rcutorture: Fix rcu_torture_one_read() pipe_count overflow comment Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 062/139] batman-adv: bypass empty buckets in batadv_purge_orig_ref() Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 063/139] scsi: qedi: Fix crash while reading debugfs attribute Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 064/139] powerpc/pseries: Enforce hcall result buffer validity and size Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 065/139] powerpc/io: Avoid clang null pointer arithmetic warnings Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 066/139] usb: misc: uss720: check for incompatible versions of the Belkin F5U002 Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 067/139] udf: udftime: prevent overflow in udf_disk_stamp_to_time() Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 068/139] PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 069/139] MIPS: Octeon: Add PCIe link status check Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 070/139] MIPS: Routerboard 532: Fix vendor retry check code Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 071/139] cipso: fix total option length computation Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 072/139] netrom: Fix a memory leak in nr_heartbeat_expiry() Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 073/139] ipv6: prevent possible NULL dereference in rt6_probe() Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 074/139] xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 075/139] virtio_net: checksum offloading handling fix Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 076/139] net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 077/139] regulator: core: Fix modpost error "regulator_get_regmap" undefined Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 078/139] dmaengine: ioatdma: Fix missing kmem_cache_destroy() Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 079/139] ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 080/139] drm/radeon: fix UBSAN warning in kv_dpm.c Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 081/139] gcov: add support for GCC 14 Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 082/139] ARM: dts: samsung: smdkv310: fix keypad no-autorepeat Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 083/139] ARM: dts: samsung: exynos4412-origen: " Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 084/139] ARM: dts: samsung: smdk4412: " Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 085/139] selftests/ftrace: Fix checkbashisms errors Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 086/139] tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 087/139] perf/core: Fix missing wakeup when waiting for context reference Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 088/139] PCI: Add PCI_ERROR_RESPONSE and related definitions Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 089/139] x86/amd_nb: Check for invalid SMN reads Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 090/139] iio: dac: ad5592r-base: Replace indio_dev->mlock with own device lock Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 091/139] iio: dac: ad5592r: un-indent code-block for scale read Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 092/139] iio: dac: ad5592r: fix temperature channel scaling value Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 093/139] scsi: mpt3sas: Add ioc_<level> logging macros Greg Kroah-Hartman
2024-07-03 11:10   ` Joe Perches
2024-07-04  9:38     ` Greg Kroah-Hartman
2024-07-04 21:23       ` Joe Perches
2024-07-05  6:38         ` Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 094/139] scsi: mpt3sas: Gracefully handle online firmware update Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 095/139] scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 096/139] xhci: Use soft retry to recover faster from transaction errors Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 097/139] xhci: Set correct transferred length for cancelled bulk transfers Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 098/139] usb: xhci: do not perform Soft Retry for some xHCI hosts Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 099/139] pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 100/139] pinctrl: rockchip: fix pinmux bits for RK3328 GPIO2-B pins Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 101/139] pinctrl: rockchip: fix pinmux bits for RK3328 GPIO3-B pins Greg Kroah-Hartman
2024-07-03 10:39 ` [PATCH 4.19 102/139] pinctrl: rockchip: fix pinmux reset in rockchip_pmx_set Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 103/139] drm/amdgpu: fix UBSAN warning in kv_dpm.c Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 104/139] netfilter: nf_tables: validate family when identifying table via handle Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 105/139] ASoC: fsl-asoc-card: set priv->pdev before using it Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 106/139] netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 107/139] drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 108/139] net/iucv: Avoid explicit cpumask var allocation on stack Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 109/139] ALSA: emux: improve patch ioctl data validation Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 110/139] media: dvbdev: Initialize sbuf Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 111/139] soc: ti: wkup_m3_ipc: Send NULL dummy message instead of pointer message Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 112/139] nvme: fixup comment for nvme RDMA Provider Type Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 113/139] gpio: davinci: Validate the obtained number of IRQs Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 114/139] i2c: ocores: stop transfer on timeout Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 115/139] i2c: ocores: set IACK bit after core is enabled Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 116/139] x86: stop playing stack games in profile_pc() Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 117/139] mmc: sdhci-pci: Convert PCIBIOS_* return codes to errnos Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 118/139] iio: adc: ad7266: Fix variable checking bug Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 119/139] iio: chemical: bme680: Fix pressure value output Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 120/139] iio: chemical: bme680: Fix calibration data variable Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 121/139] iio: chemical: bme680: Fix overflows in compensate() functions Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 122/139] iio: chemical: bme680: Fix sensor data read operation Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 123/139] net: usb: ax88179_178a: improve link status logs Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 124/139] usb: gadget: printer: SS+ support Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 125/139] usb: musb: da8xx: fix a resource leak in probe() Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 126/139] usb: atm: cxacru: fix endpoint checking in cxacru_bind() Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 127/139] serial: imx: set receiver level before starting uart Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 128/139] tty: mcf: MCF54418 has 10 UARTS Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 129/139] hexagon: fix fadvise64_64 calling conventions Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 130/139] drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 131/139] drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 132/139] batman-adv: Dont accept TT entries for out-of-spec VIDs Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 133/139] ata: libata-core: Fix double free on error Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 134/139] ftruncate: pass a signed offset Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 135/139] pwm: stm32: Refuse too small period requests Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 136/139] ipv6: annotate some data-races around sk->sk_prot Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 137/139] ipv6: Fix data races " Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 138/139] tcp: Fix data races around icsk->icsk_af_ops Greg Kroah-Hartman
2024-07-03 10:40 ` [PATCH 4.19 139/139] arm64: dts: rockchip: Add sound-dai-cells for RK3368 Greg Kroah-Hartman
2024-07-03 13:27 ` [PATCH 4.19 000/139] 4.19.317-rc1 review Jon Hunter
2024-07-03 16:48 ` Pavel Machek
2024-07-03 16:59 ` Harshit Mogalapalli
2024-07-04 18:31 ` Naresh Kamboju

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20240703102831.766914308@linuxfoundation.org \
    --to=gregkh@linuxfoundation.org \
    --cc=bjorn@kernel.org \
    --cc=daniel@iogearbox.net \
    --cc=edumazet@google.com \
    --cc=jonathan.lemon@gmail.com \
    --cc=kuba@kernel.org \
    --cc=maciej.fijalkowski@intel.com \
    --cc=magnus.karlsson@intel.com \
    --cc=patches@lists.linux.dev \
    --cc=shung-hsi.yu@suse.com \
    --cc=stable@vger.kernel.org \
    --cc=syzkaller@googlegroups.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox