public inbox for stable@vger.kernel.org
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
	patches@lists.linux.dev,
	syzbot+685e14d04fe35692d3bc@syzkaller.appspotmail.com,
	syzbot+1f8ca5ee82576ec01f12@syzkaller.appspotmail.com,
	Edward Adam Davis <eadavis@qq.com>,
	syzbot+5f1ce62e956b7b19610e@syzkaller.appspotmail.com,
	Oliver Neukum <oneukum@suse.com>, Sasha Levin <sashal@kernel.org>
Subject: [PATCH 4.19 096/138] USB: chaoskey: Fix possible deadlock chaoskey_list_lock
Date: Tue,  3 Dec 2024 15:32:05 +0100	[thread overview]
Message-ID: <20241203141927.238223438@linuxfoundation.org> (raw)
In-Reply-To: <20241203141923.524658091@linuxfoundation.org>

4.19-stable review patch.  If anyone has any objections, please let me know.

------------------

From: Edward Adam Davis <eadavis@qq.com>

[ Upstream commit d73dc7b182be4238b75278bfae16afb4c5564a58 ]

[Syzbot reported two possible deadlocks]
The first possible deadlock is:
WARNING: possible recursive locking detected
6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 Not tainted
--------------------------------------------
syz-executor363/2651 is trying to acquire lock:
ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x15d/0x2c0 drivers/usb/misc/chaoskey.c:322

but task is already holding lock:
ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_release+0x7f/0x2c0 drivers/usb/misc/chaoskey.c:299

other info that might help us debug this:
 Possible unsafe locking scenario:

       CPU0
       ----
  lock(chaoskey_list_lock);
  lock(chaoskey_list_lock);

 *** DEADLOCK ***

The second possible deadlock is:
WARNING: possible circular locking dependency detected
6.12.0-rc1-syzkaller-00027-g4a9fe2a8ac53 #0 Not tainted
------------------------------------------------------
kworker/0:2/804 is trying to acquire lock:
ffffffff899dadb0 (minor_rwsem){++++}-{3:3}, at: usb_deregister_dev+0x7c/0x1e0 drivers/usb/core/file.c:186

but task is already holding lock:
ffffffff89b120e8 (chaoskey_list_lock){+.+.}-{3:3}, at: chaoskey_disconnect+0xa8/0x2a0 drivers/usb/misc/chaoskey.c:235

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-> #1 (chaoskey_list_lock){+.+.}-{3:3}:
       __mutex_lock_common kernel/locking/mutex.c:608 [inline]
       __mutex_lock+0x175/0x9c0 kernel/locking/mutex.c:752
       chaoskey_open+0xdd/0x220 drivers/usb/misc/chaoskey.c:274
       usb_open+0x186/0x220 drivers/usb/core/file.c:47
       chrdev_open+0x237/0x6a0 fs/char_dev.c:414
       do_dentry_open+0x6cb/0x1390 fs/open.c:958
       vfs_open+0x82/0x3f0 fs/open.c:1088
       do_open fs/namei.c:3774 [inline]
       path_openat+0x1e6a/0x2d60 fs/namei.c:3933
       do_filp_open+0x1dc/0x430 fs/namei.c:3960
       do_sys_openat2+0x17a/0x1e0 fs/open.c:1415
       do_sys_open fs/open.c:1430 [inline]
       __do_sys_openat fs/open.c:1446 [inline]
       __se_sys_openat fs/open.c:1441 [inline]
       __x64_sys_openat+0x175/0x210 fs/open.c:1441
       do_syscall_x64 arch/x86/entry/common.c:52 [inline]
       do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
       entry_SYSCALL_64_after_hwframe+0x77/0x7f

-> #0 (minor_rwsem){++++}-{3:3}:
       check_prev_add kernel/locking/lockdep.c:3161 [inline]
       check_prevs_add kernel/locking/lockdep.c:3280 [inline]
       validate_chain kernel/locking/lockdep.c:3904 [inline]
       __lock_acquire+0x250b/0x3ce0 kernel/locking/lockdep.c:5202
       lock_acquire.part.0+0x11b/0x380 kernel/locking/lockdep.c:5825
       down_write+0x93/0x200 kernel/locking/rwsem.c:1577
       usb_deregister_dev+0x7c/0x1e0 drivers/usb/core/file.c:186
       chaoskey_disconnect+0xb7/0x2a0 drivers/usb/misc/chaoskey.c:236
       usb_unbind_interface+0x1e8/0x970 drivers/usb/core/driver.c:461
       device_remove drivers/base/dd.c:569 [inline]
       device_remove+0x122/0x170 drivers/base/dd.c:561
       __device_release_driver drivers/base/dd.c:1273 [inline]
       device_release_driver_internal+0x44a/0x610 drivers/base/dd.c:1296
       bus_remove_device+0x22f/0x420 drivers/base/bus.c:576
       device_del+0x396/0x9f0 drivers/base/core.c:3864
       usb_disable_device+0x36c/0x7f0 drivers/usb/core/message.c:1418
       usb_disconnect+0x2e1/0x920 drivers/usb/core/hub.c:2304
       hub_port_connect drivers/usb/core/hub.c:5361 [inline]
       hub_port_connect_change drivers/usb/core/hub.c:5661 [inline]
       port_event drivers/usb/core/hub.c:5821 [inline]
       hub_event+0x1bed/0x4f40 drivers/usb/core/hub.c:5903
       process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3229
       process_scheduled_works kernel/workqueue.c:3310 [inline]
       worker_thread+0x6c8/0xf00 kernel/workqueue.c:3391
       kthread+0x2c1/0x3a0 kernel/kthread.c:389
       ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
       ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(chaoskey_list_lock);
                               lock(minor_rwsem);
                               lock(chaoskey_list_lock);
  lock(minor_rwsem);

 *** DEADLOCK ***
[Analysis]
The first is AA lock, it because wrong logic, it need a unlock.
The second is AB lock, it needs to rearrange the order of lock usage.

Fixes: 422dc0a4d12d ("USB: chaoskey: fail open after removal")
Reported-by: syzbot+685e14d04fe35692d3bc@syzkaller.appspotmail.com
Reported-by: syzbot+1f8ca5ee82576ec01f12@syzkaller.appspotmail.com
Closes: https://syzkaller.appspot.com/bug?extid=685e14d04fe35692d3bc
Signed-off-by: Edward Adam Davis <eadavis@qq.com>
Tested-by: syzbot+685e14d04fe35692d3bc@syzkaller.appspotmail.com
Reported-by: syzbot+5f1ce62e956b7b19610e@syzkaller.appspotmail.com
Tested-by: syzbot+5f1ce62e956b7b19610e@syzkaller.appspotmail.com
Tested-by: syzbot+1f8ca5ee82576ec01f12@syzkaller.appspotmail.com
Link: https://lore.kernel.org/r/tencent_84EB865C89862EC22EE94CB3A7C706C59206@qq.com
Cc: Oliver Neukum <oneukum@suse.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 drivers/usb/misc/chaoskey.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/drivers/usb/misc/chaoskey.c b/drivers/usb/misc/chaoskey.c
index 32fa7fd50c380..d99d424c05a7a 100644
--- a/drivers/usb/misc/chaoskey.c
+++ b/drivers/usb/misc/chaoskey.c
@@ -233,10 +233,10 @@ static void chaoskey_disconnect(struct usb_interface *interface)
 	if (dev->hwrng_registered)
 		hwrng_unregister(&dev->hwrng);
 
-	mutex_lock(&chaoskey_list_lock);
 	usb_deregister_dev(interface, &chaoskey_class);
 
 	usb_set_intfdata(interface, NULL);
+	mutex_lock(&chaoskey_list_lock);
 	mutex_lock(&dev->lock);
 
 	dev->present = false;
@@ -320,7 +320,7 @@ static int chaoskey_release(struct inode *inode, struct file *file)
 bail:
 	mutex_unlock(&dev->lock);
 destruction:
-	mutex_lock(&chaoskey_list_lock);
+	mutex_unlock(&chaoskey_list_lock);
 	usb_dbg(interface, "release success");
 	return rv;
 }
-- 
2.43.0




  parent reply	other threads:[~2024-12-03 14:38 UTC|newest]

Thread overview: 152+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-12-03 14:30 [PATCH 4.19 000/138] 4.19.325-rc1 review Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 001/138] netlink: terminate outstanding dump on socket close Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 002/138] ocfs2: uncache inode which has failed entering the group Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 003/138] nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 004/138] ocfs2: fix UBSAN warning in ocfs2_verify_volume() Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 005/138] nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 006/138] Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 007/138] media: dvbdev: fix the logic when DVB_DYNAMIC_MINORS is not set Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 008/138] kbuild: Use uname for LINUX_COMPILE_HOST detection Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 009/138] mm: revert "mm: shmem: fix data-race in shmem_getattr()" Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 010/138] ASoC: Intel: bytcr_rt5640: Add DMI quirk for Vexia Edu Atla 10 tablet Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 011/138] mac80211: fix user-power when emulating chanctx Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 012/138] selftests/watchdog-test: Fix system accidentally reset after watchdog-test Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 013/138] x86/amd_nb: Fix compile-testing without CONFIG_AMD_NB Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 014/138] net: usb: qmi_wwan: add Quectel RG650V Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 015/138] proc/softirqs: replace seq_printf with seq_put_decimal_ull_width Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 016/138] nvme: fix metadata handling in nvme-passthrough Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 017/138] initramfs: avoid filename buffer overrun Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 018/138] m68k: mvme147: Fix SCSI controller IRQ numbers Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 019/138] m68k: mvme16x: Add and use "mvme16x.h" Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 020/138] m68k: mvme147: Reinstate early console Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 021/138] acpi/arm64: Adjust error handling procedure in gtdt_parse_timer_block() Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 022/138] s390/syscalls: Avoid creation of arch/arch/ directory Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 023/138] hfsplus: dont query the device logical block size multiple times Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 024/138] EDAC/fsl_ddr: Fix bad bit shift operations Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 025/138] crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 026/138] crypto: cavium - Fix the if condition to exit loop after timeout Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 027/138] crypto: bcm - add error check in the ahash_hmac_init function Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 028/138] crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 029/138] time: Fix references to _msecs_to_jiffies() handling of values Greg Kroah-Hartman
2024-12-03 14:30 ` [PATCH 4.19 030/138] soc: ti: smartreflex: Use IRQF_NO_AUTOEN flag in request_irq() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 031/138] soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 032/138] mmc: mmc_spi: drop buggy snprintf() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 033/138] ARM: dts: cubieboard4: Fix DCDC5 regulator constraints Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 034/138] regmap: irq: Set lockdep class for hierarchical IRQ domains Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 035/138] firmware: arm_scpi: Check the DVFS OPP count returned by the firmware Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 036/138] drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 037/138] wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 038/138] drm/omap: Fix locking in omap_gem_new_dmabuf() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 039/138] drm/imx/ipuv3: Use IRQF_NO_AUTOEN flag in request_irq() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 040/138] bpf: Fix the xdp_adjust_tail sample prog issue Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 041/138] wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 042/138] drm/i915/gtt: Enable full-ppgtt by default everywhere Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 043/138] drm/fsl-dcu: Use drm_fbdev_generic_setup() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 044/138] drm/fsl-dcu: Drop drm_gem_prime_export/import Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 045/138] drm/fsl-dcu: Use GEM CMA object functions Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 046/138] drm/fsl-dcu: Set GEM CMA functions with DRM_GEM_CMA_DRIVER_OPS Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 047/138] drm/fsl-dcu: Convert to Linux IRQ interfaces Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 048/138] drm: fsl-dcu: enable PIXCLK on LS1021A Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 049/138] drm/etnaviv: consolidate hardware fence handling in etnaviv_gpu Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 050/138] drm/etnaviv: dump: fix sparse warnings Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 051/138] drm/etnaviv: fix power register offset on GC300 Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 052/138] drm/etnaviv: hold GPU lock across perfmon sampling Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 053/138] net: rfkill: gpio: Add check for clk_enable() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 054/138] ALSA: us122l: Use snd_card_free_when_closed() at disconnection Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 055/138] ALSA: caiaq: " Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 056/138] ALSA: 6fire: Release resources at card release Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 057/138] netpoll: Use rcu_access_pointer() in netpoll_poll_lock Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 058/138] trace/trace_event_perf: remove duplicate samples on the first tracepoint event Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 059/138] powerpc/vdso: Flag VDSO64 entry points as functions Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 060/138] mfd: da9052-spi: Change read-mask to write-mask Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 061/138] cpufreq: loongson2: Unregister platform_driver on failure Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 062/138] mtd: rawnand: atmel: Fix possible memory leak Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 063/138] RDMA/bnxt_re: Check cqe flags to know imm_data vs inv_irkey Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 064/138] mfd: rt5033: Fix missing regmap_del_irq_chip() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 065/138] scsi: bfa: Fix use-after-free in bfad_im_module_exit() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 066/138] scsi: fusion: Remove unused variable rc Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 067/138] scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 068/138] ocfs2: fix uninitialized value in ocfs2_file_read_iter() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 069/138] powerpc/sstep: make emulate_vsx_load and emulate_vsx_store static Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 070/138] fbdev/sh7760fb: Alloc DMA memory from hardware device Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 071/138] fbdev: sh7760fb: Fix a possible memory leak in sh7760fb_alloc_mem() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 072/138] dt-bindings: clock: adi,axi-clkgen: convert old binding to yaml format Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 073/138] dt-bindings: clock: axi-clkgen: include AXI clk Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 074/138] clk: axi-clkgen: use devm_platform_ioremap_resource() short-hand Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 075/138] clk: clk-axi-clkgen: make sure to enable the AXI bus clock Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 076/138] perf probe: Correct demangled symbols in C++ program Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 077/138] PCI: cpqphp: Use PCI_POSSIBLE_ERROR() to check config reads Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 078/138] PCI: cpqphp: Fix PCIBIOS_* return value confusion Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 079/138] m68k: mcfgpio: Fix incorrect register offset for CONFIG_M5441x Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 080/138] m68k: coldfire/device.c: only build FEC when HW macros are defined Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 081/138] rpmsg: glink: Add TX_DATA_CONT command while sending Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 082/138] rpmsg: glink: Send READ_NOTIFY command in FIFO full case Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 083/138] rpmsg: glink: Fix GLINK command prefix Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 084/138] rpmsg: glink: use only lower 16-bits of param2 for CMD_OPEN name length Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 085/138] NFSD: Prevent NULL dereference in nfsd4_process_cb_update() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 086/138] NFSD: Cap the number of bytes copied by nfs4_reset_recoverydir() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 087/138] vfio/pci: Properly hide first-in-list PCIe extended capability Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 088/138] power: supply: core: Remove might_sleep() from power_supply_put() Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 089/138] net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device Greg Kroah-Hartman
2024-12-03 14:31 ` [PATCH 4.19 090/138] tg3: Set coherent DMA mask bits to 31 for BCM57766 chipsets Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 091/138] net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 092/138] marvell: pxa168_eth: fix call balance of pep->clk handling routines Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 093/138] net: stmmac: dwmac-socfpga: Set RX watchdog interrupt as broken Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 094/138] usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 095/138] USB: chaoskey: fail open after removal Greg Kroah-Hartman
2024-12-03 14:32 ` Greg Kroah-Hartman [this message]
2024-12-03 14:32 ` [PATCH 4.19 097/138] misc: apds990x: Fix missing pm_runtime_disable() Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 098/138] apparmor: fix Do simple duplicate message elimination Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 099/138] usb: ehci-spear: fix call balance of sehci clk handling routines Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 100/138] ext4: supress data-race warnings in ext4_free_inodes_{count,set}() Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 101/138] ext4: fix FS_IOC_GETFSMAP handling Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 102/138] jfs: xattr: check invalid xattr size more strictly Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 103/138] ASoC: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 104/138] PCI: Fix use-after-free of slot->bus on hot remove Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 105/138] tty: ldsic: fix tty_ldisc_autoload sysctls proc_handler Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 106/138] Bluetooth: Fix type of len in rfcomm_sock_getsockopt{,_old}() Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 107/138] ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 108/138] Revert "usb: gadget: composite: fix OS descriptors w_value logic" Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 109/138] serial: sh-sci: Clean sci_ports[0] after at earlycon exit Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 110/138] Revert "serial: sh-sci: Clean sci_ports[0] after at earlycon exit" Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 111/138] netfilter: ipset: add missing range check in bitmap_ip_uadt Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 112/138] spi: Fix acpi deferred irq probe Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 113/138] ubi: wl: Put source PEB into correct list if trying locking LEB failed Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 114/138] um: ubd: Do not use drvdata in release Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 115/138] um: net: " Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 116/138] serial: 8250: omap: Move pm_runtime_get_sync Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 117/138] um: vector: Do not use drvdata in release Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 118/138] sh: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 119/138] arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 120/138] block: fix ordering between checking BLK_MQ_S_STOPPED request adding Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 121/138] HID: wacom: Interpret tilt data from Intuos Pro BT as signed values Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 122/138] media: wl128x: Fix atomicity violation in fmc_send_cmd() Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 123/138] usb: dwc3: gadget: Fix checking for number of TRBs left Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 124/138] lib: string_helpers: silence snprintf() output truncation warning Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 125/138] NFSD: Prevent a potential integer overflow Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 126/138] rpmsg: glink: Propagate TX failures in intentless mode as well Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 127/138] um: Fix the return value of elf_core_copy_task_fpregs Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 128/138] NFSv4.0: Fix a use-after-free problem in the asynchronous open() Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 129/138] rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 130/138] rtc: check if __rtc_read_time was successful in rtc_timer_do_work() Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 131/138] ubifs: Correct the total block count by deducting journal reservation Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 132/138] ubi: fastmap: Fix duplicate slab cache names while attaching Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 133/138] jffs2: fix use of uninitialized variable Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 134/138] block: return unsigned int from bdev_io_min Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 135/138] 9p/xen: fix init sequence Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 136/138] 9p/xen: fix release of IRQ Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 137/138] modpost: remove incorrect code in do_eisa_entry() Greg Kroah-Hartman
2024-12-03 14:32 ` [PATCH 4.19 138/138] sh: intc: Fix use-after-free bug in register_intc_controller() Greg Kroah-Hartman
2024-12-03 18:13 ` [PATCH 4.19 000/138] 4.19.325-rc1 review Pavel Machek
2024-12-04  9:48   ` Greg Kroah-Hartman
2024-12-04 11:34     ` Pavel Machek
2024-12-05  9:36       ` Greg Kroah-Hartman
2024-12-04 13:54 ` Naresh Kamboju
2024-12-04 15:32   ` Naresh Kamboju
2024-12-05  9:33     ` Greg Kroah-Hartman
2024-12-04 14:28 ` Harshit Mogalapalli
2024-12-04 16:56 ` Shuah Khan
2024-12-05 14:38 ` Jon Hunter
2024-12-05 14:40   ` Jon Hunter
2024-12-06  6:07     ` Greg Kroah-Hartman
2024-12-06 10:39       ` Jon Hunter

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20241203141927.238223438@linuxfoundation.org \
    --to=gregkh@linuxfoundation.org \
    --cc=eadavis@qq.com \
    --cc=oneukum@suse.com \
    --cc=patches@lists.linux.dev \
    --cc=sashal@kernel.org \
    --cc=stable@vger.kernel.org \
    --cc=syzbot+1f8ca5ee82576ec01f12@syzkaller.appspotmail.com \
    --cc=syzbot+5f1ce62e956b7b19610e@syzkaller.appspotmail.com \
    --cc=syzbot+685e14d04fe35692d3bc@syzkaller.appspotmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox