From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
patches@lists.linux.dev, Kim Phillips <kim.phillips@amd.com>,
"Borislav Petkov (AMD)" <bp@alien8.de>,
Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
Subject: [PATCH 5.10 205/208] x86/bugs: Add a Transient Scheduler Attacks mitigation
Date: Tue, 15 Jul 2025 15:15:14 +0200 [thread overview]
Message-ID: <20250715130819.141669710@linuxfoundation.org> (raw)
In-Reply-To: <20250715130810.830580412@linuxfoundation.org>
5.10-stable review patch. If anyone has any objections, please let me know.
------------------
From: Borislav Petkov <bp@kernel.org>
From: "Borislav Petkov (AMD)" <bp@alien8.de>
Commit d8010d4ba43e9f790925375a7de100604a5e2dba upstream.
Add the required features detection glue to bugs.c et all in order to
support the TSA mitigation.
Co-developed-by: Kim Phillips <kim.phillips@amd.com>
Signed-off-by: Kim Phillips <kim.phillips@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Reviewed-by: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
Documentation/ABI/testing/sysfs-devices-system-cpu | 1
Documentation/admin-guide/kernel-parameters.txt | 13 ++
arch/x86/Kconfig | 9 +
arch/x86/include/asm/cpu.h | 13 ++
arch/x86/include/asm/cpufeatures.h | 6 +
arch/x86/include/asm/mwait.h | 2
arch/x86/include/asm/nospec-branch.h | 12 +-
arch/x86/kernel/cpu/amd.c | 58 ++++++++++
arch/x86/kernel/cpu/bugs.c | 121 +++++++++++++++++++++
arch/x86/kernel/cpu/common.c | 14 ++
arch/x86/kernel/cpu/scattered.c | 2
arch/x86/kvm/svm/vmenter.S | 3
drivers/base/cpu.c | 2
include/linux/cpu.h | 1
14 files changed, 252 insertions(+), 5 deletions(-)
--- a/Documentation/ABI/testing/sysfs-devices-system-cpu
+++ b/Documentation/ABI/testing/sysfs-devices-system-cpu
@@ -514,6 +514,7 @@ What: /sys/devices/system/cpu/vulnerabi
/sys/devices/system/cpu/vulnerabilities/spectre_v1
/sys/devices/system/cpu/vulnerabilities/spectre_v2
/sys/devices/system/cpu/vulnerabilities/srbds
+ /sys/devices/system/cpu/vulnerabilities/tsa
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort
Date: January 2018
Contact: Linux kernel mailing list <linux-kernel@vger.kernel.org>
--- a/Documentation/admin-guide/kernel-parameters.txt
+++ b/Documentation/admin-guide/kernel-parameters.txt
@@ -5619,6 +5619,19 @@
See Documentation/admin-guide/mm/transhuge.rst
for more details.
+ tsa= [X86] Control mitigation for Transient Scheduler
+ Attacks on AMD CPUs. Search the following in your
+ favourite search engine for more details:
+
+ "Technical guidance for mitigating transient scheduler
+ attacks".
+
+ off - disable the mitigation
+ on - enable the mitigation (default)
+ user - mitigate only user/kernel transitions
+ vm - mitigate only guest/host transitions
+
+
tsc= Disable clocksource stability checks for TSC.
Format: <string>
[x86] reliable: mark tsc clocksource as reliable, this
--- a/arch/x86/Kconfig
+++ b/arch/x86/Kconfig
@@ -2532,6 +2532,15 @@ config MITIGATION_ITS
disabled, mitigation cannot be enabled via cmdline.
See <file:Documentation/admin-guide/hw-vuln/indirect-target-selection.rst>
+config MITIGATION_TSA
+ bool "Mitigate Transient Scheduler Attacks"
+ depends on CPU_SUP_AMD
+ default y
+ help
+ Enable mitigation for Transient Scheduler Attacks. TSA is a hardware
+ security vulnerability on AMD CPUs which can lead to forwarding of
+ invalid info to subsequent instructions and thus can affect their
+ timing and thereby cause a leakage.
endif
config ARCH_HAS_ADD_PAGES
--- a/arch/x86/include/asm/cpu.h
+++ b/arch/x86/include/asm/cpu.h
@@ -63,4 +63,17 @@ void init_ia32_feat_ctl(struct cpuinfo_x
#else
static inline void init_ia32_feat_ctl(struct cpuinfo_x86 *c) {}
#endif
+
+union zen_patch_rev {
+ struct {
+ __u32 rev : 8,
+ stepping : 4,
+ model : 4,
+ __reserved : 4,
+ ext_model : 4,
+ ext_fam : 8;
+ };
+ __u32 ucode_rev;
+};
+
#endif /* _ASM_X86_CPU_H */
--- a/arch/x86/include/asm/cpufeatures.h
+++ b/arch/x86/include/asm/cpufeatures.h
@@ -406,11 +406,16 @@
#define X86_FEATURE_SEV_ES (19*32+ 3) /* AMD Secure Encrypted Virtualization - Encrypted State */
#define X86_FEATURE_SME_COHERENT (19*32+10) /* "" AMD hardware-enforced cache coherency */
+#define X86_FEATURE_VERW_CLEAR (20*32+ 5) /* "" The memory form of VERW mitigates TSA */
#define X86_FEATURE_AUTOIBRS (20*32+ 8) /* "" Automatic IBRS */
#define X86_FEATURE_SBPB (20*32+27) /* "" Selective Branch Prediction Barrier */
#define X86_FEATURE_IBPB_BRTYPE (20*32+28) /* "" MSR_PRED_CMD[IBPB] flushes all branch type predictions */
#define X86_FEATURE_SRSO_NO (20*32+29) /* "" CPU is not affected by SRSO */
+#define X86_FEATURE_TSA_SQ_NO (21*32+11) /* "" AMD CPU not vulnerable to TSA-SQ */
+#define X86_FEATURE_TSA_L1_NO (21*32+12) /* "" AMD CPU not vulnerable to TSA-L1 */
+#define X86_FEATURE_CLEAR_CPU_BUF_VM (21*32+13) /* "" Clear CPU buffers using VERW before VMRUN */
+
/*
* BUG word(s)
*/
@@ -461,4 +466,5 @@
#define X86_BUG_IBPB_NO_RET X86_BUG(1*32 + 4) /* "ibpb_no_ret" IBPB omits return target predictions */
#define X86_BUG_ITS X86_BUG(1*32 + 5) /* CPU is affected by Indirect Target Selection */
#define X86_BUG_ITS_NATIVE_ONLY X86_BUG(1*32 + 6) /* CPU is affected by ITS, VMX is not affected */
+#define X86_BUG_TSA X86_BUG(1*32 + 9) /* "tsa" CPU is affected by Transient Scheduler Attacks */
#endif /* _ASM_X86_CPUFEATURES_H */
--- a/arch/x86/include/asm/mwait.h
+++ b/arch/x86/include/asm/mwait.h
@@ -79,7 +79,7 @@ static inline void __mwait(unsigned long
static inline void __mwaitx(unsigned long eax, unsigned long ebx,
unsigned long ecx)
{
- /* No MDS buffer clear as this is AMD/HYGON only */
+ /* No need for TSA buffer clearing on AMD */
/* "mwaitx %eax, %ebx, %ecx;" */
asm volatile(".byte 0x0f, 0x01, 0xfb;"
--- a/arch/x86/include/asm/nospec-branch.h
+++ b/arch/x86/include/asm/nospec-branch.h
@@ -197,8 +197,8 @@
* CFLAGS.ZF.
* Note: Only the memory operand variant of VERW clears the CPU buffers.
*/
-.macro CLEAR_CPU_BUFFERS
- ALTERNATIVE "jmp .Lskip_verw_\@", "", X86_FEATURE_CLEAR_CPU_BUF
+.macro __CLEAR_CPU_BUFFERS feature
+ ALTERNATIVE "jmp .Lskip_verw_\@", "", \feature
#ifdef CONFIG_X86_64
verw x86_verw_sel(%rip)
#else
@@ -212,6 +212,12 @@
.Lskip_verw_\@:
.endm
+#define CLEAR_CPU_BUFFERS \
+ __CLEAR_CPU_BUFFERS X86_FEATURE_CLEAR_CPU_BUF
+
+#define VM_CLEAR_CPU_BUFFERS \
+ __CLEAR_CPU_BUFFERS X86_FEATURE_CLEAR_CPU_BUF_VM
+
#else /* __ASSEMBLY__ */
#define ANNOTATE_RETPOLINE_SAFE \
@@ -431,7 +437,7 @@ static __always_inline void x86_clear_cp
/**
* x86_idle_clear_cpu_buffers - Buffer clearing support in idle for the MDS
- * vulnerability
+ * and TSA vulnerabilities.
*
* Clear CPU buffers if the corresponding static key is enabled
*/
--- a/arch/x86/kernel/cpu/amd.c
+++ b/arch/x86/kernel/cpu/amd.c
@@ -589,6 +589,62 @@ static void early_init_amd_mc(struct cpu
#endif
}
+static bool amd_check_tsa_microcode(void)
+{
+ struct cpuinfo_x86 *c = &boot_cpu_data;
+ union zen_patch_rev p;
+ u32 min_rev = 0;
+
+ p.ext_fam = c->x86 - 0xf;
+ p.model = c->x86_model;
+ p.ext_model = c->x86_model >> 4;
+ p.stepping = c->x86_stepping;
+
+ if (c->x86 == 0x19) {
+ switch (p.ucode_rev >> 8) {
+ case 0xa0011: min_rev = 0x0a0011d7; break;
+ case 0xa0012: min_rev = 0x0a00123b; break;
+ case 0xa0082: min_rev = 0x0a00820d; break;
+ case 0xa1011: min_rev = 0x0a10114c; break;
+ case 0xa1012: min_rev = 0x0a10124c; break;
+ case 0xa1081: min_rev = 0x0a108109; break;
+ case 0xa2010: min_rev = 0x0a20102e; break;
+ case 0xa2012: min_rev = 0x0a201211; break;
+ case 0xa4041: min_rev = 0x0a404108; break;
+ case 0xa5000: min_rev = 0x0a500012; break;
+ case 0xa6012: min_rev = 0x0a60120a; break;
+ case 0xa7041: min_rev = 0x0a704108; break;
+ case 0xa7052: min_rev = 0x0a705208; break;
+ case 0xa7080: min_rev = 0x0a708008; break;
+ case 0xa70c0: min_rev = 0x0a70c008; break;
+ case 0xaa002: min_rev = 0x0aa00216; break;
+ default:
+ pr_debug("%s: ucode_rev: 0x%x, current revision: 0x%x\n",
+ __func__, p.ucode_rev, c->microcode);
+ return false;
+ }
+ }
+
+ if (!min_rev)
+ return false;
+
+ return c->microcode >= min_rev;
+}
+
+static void tsa_init(struct cpuinfo_x86 *c)
+{
+ if (cpu_has(c, X86_FEATURE_HYPERVISOR))
+ return;
+
+ if (c->x86 == 0x19) {
+ if (amd_check_tsa_microcode())
+ setup_force_cpu_cap(X86_FEATURE_VERW_CLEAR);
+ } else {
+ setup_force_cpu_cap(X86_FEATURE_TSA_SQ_NO);
+ setup_force_cpu_cap(X86_FEATURE_TSA_L1_NO);
+ }
+}
+
static void bsp_init_amd(struct cpuinfo_x86 *c)
{
@@ -676,6 +732,8 @@ static void bsp_init_amd(struct cpuinfo_
}
resctrl_cpu_detect(c);
+
+ tsa_init(c);
}
static void early_detect_mem_encrypt(struct cpuinfo_x86 *c)
--- a/arch/x86/kernel/cpu/bugs.c
+++ b/arch/x86/kernel/cpu/bugs.c
@@ -48,6 +48,7 @@ static void __init srbds_select_mitigati
static void __init gds_select_mitigation(void);
static void __init srso_select_mitigation(void);
static void __init its_select_mitigation(void);
+static void __init tsa_select_mitigation(void);
/* The base value of the SPEC_CTRL MSR without task-specific bits set */
u64 x86_spec_ctrl_base;
@@ -171,6 +172,7 @@ void __init cpu_select_mitigations(void)
srso_select_mitigation();
gds_select_mitigation();
its_select_mitigation();
+ tsa_select_mitigation();
}
/*
@@ -1933,6 +1935,94 @@ static void update_mds_branch_idle(void)
#define TAA_MSG_SMT "TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details.\n"
#define MMIO_MSG_SMT "MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.\n"
+#undef pr_fmt
+#define pr_fmt(fmt) "Transient Scheduler Attacks: " fmt
+
+enum tsa_mitigations {
+ TSA_MITIGATION_NONE,
+ TSA_MITIGATION_UCODE_NEEDED,
+ TSA_MITIGATION_USER_KERNEL,
+ TSA_MITIGATION_VM,
+ TSA_MITIGATION_FULL,
+};
+
+static const char * const tsa_strings[] = {
+ [TSA_MITIGATION_NONE] = "Vulnerable",
+ [TSA_MITIGATION_UCODE_NEEDED] = "Vulnerable: Clear CPU buffers attempted, no microcode",
+ [TSA_MITIGATION_USER_KERNEL] = "Mitigation: Clear CPU buffers: user/kernel boundary",
+ [TSA_MITIGATION_VM] = "Mitigation: Clear CPU buffers: VM",
+ [TSA_MITIGATION_FULL] = "Mitigation: Clear CPU buffers",
+};
+
+static enum tsa_mitigations tsa_mitigation __ro_after_init =
+ IS_ENABLED(CONFIG_MITIGATION_TSA) ? TSA_MITIGATION_FULL : TSA_MITIGATION_NONE;
+
+static int __init tsa_parse_cmdline(char *str)
+{
+ if (!str)
+ return -EINVAL;
+
+ if (!strcmp(str, "off"))
+ tsa_mitigation = TSA_MITIGATION_NONE;
+ else if (!strcmp(str, "on"))
+ tsa_mitigation = TSA_MITIGATION_FULL;
+ else if (!strcmp(str, "user"))
+ tsa_mitigation = TSA_MITIGATION_USER_KERNEL;
+ else if (!strcmp(str, "vm"))
+ tsa_mitigation = TSA_MITIGATION_VM;
+ else
+ pr_err("Ignoring unknown tsa=%s option.\n", str);
+
+ return 0;
+}
+early_param("tsa", tsa_parse_cmdline);
+
+static void __init tsa_select_mitigation(void)
+{
+ if (tsa_mitigation == TSA_MITIGATION_NONE)
+ return;
+
+ if (cpu_mitigations_off() || !boot_cpu_has_bug(X86_BUG_TSA)) {
+ tsa_mitigation = TSA_MITIGATION_NONE;
+ return;
+ }
+
+ if (!boot_cpu_has(X86_FEATURE_VERW_CLEAR))
+ tsa_mitigation = TSA_MITIGATION_UCODE_NEEDED;
+
+ switch (tsa_mitigation) {
+ case TSA_MITIGATION_USER_KERNEL:
+ setup_force_cpu_cap(X86_FEATURE_CLEAR_CPU_BUF);
+ break;
+
+ case TSA_MITIGATION_VM:
+ setup_force_cpu_cap(X86_FEATURE_CLEAR_CPU_BUF_VM);
+ break;
+
+ case TSA_MITIGATION_UCODE_NEEDED:
+ if (!boot_cpu_has(X86_FEATURE_HYPERVISOR))
+ goto out;
+
+ pr_notice("Forcing mitigation on in a VM\n");
+
+ /*
+ * On the off-chance that microcode has been updated
+ * on the host, enable the mitigation in the guest just
+ * in case.
+ */
+ fallthrough;
+ case TSA_MITIGATION_FULL:
+ setup_force_cpu_cap(X86_FEATURE_CLEAR_CPU_BUF);
+ setup_force_cpu_cap(X86_FEATURE_CLEAR_CPU_BUF_VM);
+ break;
+ default:
+ break;
+ }
+
+out:
+ pr_info("%s\n", tsa_strings[tsa_mitigation]);
+}
+
void cpu_bugs_smt_update(void)
{
mutex_lock(&spec_ctrl_mutex);
@@ -1986,6 +2076,24 @@ void cpu_bugs_smt_update(void)
break;
}
+ switch (tsa_mitigation) {
+ case TSA_MITIGATION_USER_KERNEL:
+ case TSA_MITIGATION_VM:
+ case TSA_MITIGATION_FULL:
+ case TSA_MITIGATION_UCODE_NEEDED:
+ /*
+ * TSA-SQ can potentially lead to info leakage between
+ * SMT threads.
+ */
+ if (sched_smt_active())
+ static_branch_enable(&cpu_buf_idle_clear);
+ else
+ static_branch_disable(&cpu_buf_idle_clear);
+ break;
+ case TSA_MITIGATION_NONE:
+ break;
+ }
+
mutex_unlock(&spec_ctrl_mutex);
}
@@ -2867,6 +2975,11 @@ static ssize_t srso_show_state(char *buf
boot_cpu_has(X86_FEATURE_IBPB_BRTYPE) ? "" : ", no microcode");
}
+static ssize_t tsa_show_state(char *buf)
+{
+ return sysfs_emit(buf, "%s\n", tsa_strings[tsa_mitigation]);
+}
+
static ssize_t cpu_show_common(struct device *dev, struct device_attribute *attr,
char *buf, unsigned int bug)
{
@@ -2928,6 +3041,9 @@ static ssize_t cpu_show_common(struct de
case X86_BUG_ITS:
return its_show_state(buf);
+ case X86_BUG_TSA:
+ return tsa_show_state(buf);
+
default:
break;
}
@@ -3012,4 +3128,9 @@ ssize_t cpu_show_indirect_target_selecti
{
return cpu_show_common(dev, attr, buf, X86_BUG_ITS);
}
+
+ssize_t cpu_show_tsa(struct device *dev, struct device_attribute *attr, char *buf)
+{
+ return cpu_show_common(dev, attr, buf, X86_BUG_TSA);
+}
#endif
--- a/arch/x86/kernel/cpu/common.c
+++ b/arch/x86/kernel/cpu/common.c
@@ -1139,6 +1139,8 @@ static const __initconst struct x86_cpu_
#define ITS BIT(8)
/* CPU is affected by Indirect Target Selection, but guest-host isolation is not affected */
#define ITS_NATIVE_ONLY BIT(9)
+/* CPU is affected by Transient Scheduler Attacks */
+#define TSA BIT(10)
static const struct x86_cpu_id cpu_vuln_blacklist[] __initconst = {
VULNBL_INTEL_STEPPINGS(IVYBRIDGE, X86_STEPPING_ANY, SRBDS),
@@ -1186,7 +1188,7 @@ static const struct x86_cpu_id cpu_vuln_
VULNBL_AMD(0x16, RETBLEED),
VULNBL_AMD(0x17, RETBLEED | SRSO),
VULNBL_HYGON(0x18, RETBLEED | SRSO),
- VULNBL_AMD(0x19, SRSO),
+ VULNBL_AMD(0x19, SRSO | TSA),
{}
};
@@ -1378,6 +1380,16 @@ static void __init cpu_set_bug_bits(stru
setup_force_cpu_bug(X86_BUG_ITS_NATIVE_ONLY);
}
+ if (c->x86_vendor == X86_VENDOR_AMD) {
+ if (!cpu_has(c, X86_FEATURE_TSA_SQ_NO) ||
+ !cpu_has(c, X86_FEATURE_TSA_L1_NO)) {
+ if (cpu_matches(cpu_vuln_blacklist, TSA) ||
+ /* Enable bug on Zen guests to allow for live migration. */
+ (cpu_has(c, X86_FEATURE_HYPERVISOR) && cpu_has(c, X86_FEATURE_ZEN)))
+ setup_force_cpu_bug(X86_BUG_TSA);
+ }
+ }
+
if (cpu_matches(cpu_vuln_whitelist, NO_MELTDOWN))
return;
--- a/arch/x86/kernel/cpu/scattered.c
+++ b/arch/x86/kernel/cpu/scattered.c
@@ -42,6 +42,8 @@ static const struct cpuid_bit cpuid_bits
{ X86_FEATURE_CPB, CPUID_EDX, 9, 0x80000007, 0 },
{ X86_FEATURE_PROC_FEEDBACK, CPUID_EDX, 11, 0x80000007, 0 },
{ X86_FEATURE_MBA, CPUID_EBX, 6, 0x80000008, 0 },
+ { X86_FEATURE_TSA_SQ_NO, CPUID_ECX, 1, 0x80000021, 0 },
+ { X86_FEATURE_TSA_L1_NO, CPUID_ECX, 2, 0x80000021, 0 },
{ 0, 0, 0, 0, 0 }
};
--- a/arch/x86/kvm/svm/vmenter.S
+++ b/arch/x86/kvm/svm/vmenter.S
@@ -77,6 +77,9 @@ SYM_FUNC_START(__svm_vcpu_run)
/* "POP" @vmcb to RAX. */
pop %_ASM_AX
+ /* Clobbers EFLAGS.ZF */
+ VM_CLEAR_CPU_BUFFERS
+
/* Enter guest mode */
sti
1: vmload %_ASM_AX
--- a/drivers/base/cpu.c
+++ b/drivers/base/cpu.c
@@ -618,6 +618,7 @@ static DEVICE_ATTR(gather_data_sampling,
static DEVICE_ATTR(spec_rstack_overflow, 0444, cpu_show_spec_rstack_overflow, NULL);
static DEVICE_ATTR(reg_file_data_sampling, 0444, cpu_show_reg_file_data_sampling, NULL);
static DEVICE_ATTR(indirect_target_selection, 0444, cpu_show_indirect_target_selection, NULL);
+static DEVICE_ATTR(tsa, 0444, cpu_show_tsa, NULL);
static struct attribute *cpu_root_vulnerabilities_attrs[] = {
&dev_attr_meltdown.attr,
@@ -635,6 +636,7 @@ static struct attribute *cpu_root_vulner
&dev_attr_spec_rstack_overflow.attr,
&dev_attr_reg_file_data_sampling.attr,
&dev_attr_indirect_target_selection.attr,
+ &dev_attr_tsa.attr,
NULL
};
--- a/include/linux/cpu.h
+++ b/include/linux/cpu.h
@@ -78,6 +78,7 @@ extern ssize_t cpu_show_reg_file_data_sa
struct device_attribute *attr, char *buf);
extern ssize_t cpu_show_indirect_target_selection(struct device *dev,
struct device_attribute *attr, char *buf);
+extern ssize_t cpu_show_tsa(struct device *dev, struct device_attribute *attr, char *buf);
extern __printf(4, 5)
struct device *cpu_device_create(struct device *parent, void *drvdata,
next prev parent reply other threads:[~2025-07-15 13:59 UTC|newest]
Thread overview: 218+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-07-15 13:11 [PATCH 5.10 000/208] 5.10.240-rc1 review Greg Kroah-Hartman
2025-07-15 13:11 ` [PATCH 5.10 001/208] cifs: Fix cifs_query_path_info() for Windows NT servers Greg Kroah-Hartman
2025-07-15 13:11 ` [PATCH 5.10 002/208] NFSv4.2: fix listxattr to return selinux security label Greg Kroah-Hartman
2025-07-15 13:11 ` [PATCH 5.10 003/208] mailbox: Not protect module_put with spin_lock_irqsave Greg Kroah-Hartman
2025-07-15 13:11 ` [PATCH 5.10 004/208] mfd: max14577: Fix wakeup source leaks on device unbind Greg Kroah-Hartman
2025-07-15 13:11 ` [PATCH 5.10 005/208] leds: multicolor: Fix intensity setting while SW blinking Greg Kroah-Hartman
2025-07-15 13:11 ` [PATCH 5.10 006/208] hwmon: (pmbus/max34440) Fix support for max34451 Greg Kroah-Hartman
2025-07-15 13:11 ` [PATCH 5.10 007/208] dmaengine: xilinx_dma: Set dma_device directions Greg Kroah-Hartman
2025-07-15 13:11 ` [PATCH 5.10 008/208] md/md-bitmap: fix dm-raid max_write_behind setting Greg Kroah-Hartman
2025-07-15 13:11 ` [PATCH 5.10 009/208] bcache: fix NULL pointer in cache_set_flush() Greg Kroah-Hartman
2025-07-15 13:11 ` [PATCH 5.10 010/208] iio: pressure: zpa2326: Use aligned_s64 for the timestamp Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 011/208] um: Add cmpxchg8b_emu and checksum functions to asm-prototypes.h Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 012/208] usb: potential integer overflow in usbg_make_tpg() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 013/208] usb: common: usb-conn-gpio: use a unique name for usb connector device Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 014/208] usb: Add checks for snprintf() calls in usb_alloc_dev() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 015/208] usb: cdc-wdm: avoid setting WDM_READ for ZLP-s Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 016/208] usb: typec: displayport: Receive DP Status Update NAK request exit dp altmode Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 017/208] ALSA: hda: Ignore unsol events for cards being shut down Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 018/208] ALSA: hda: Add new pci id for AMD GPU display HD audio controller Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 019/208] ceph: fix possible integer overflow in ceph_zero_objects() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 020/208] ovl: Check for NULL d_inode() in ovl_dentry_upper() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 021/208] USB: usbtmc: Fix reading stale status byte Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 022/208] USB: usbtmc: Add USBTMC_IOCTL_GET_STB Greg Kroah-Hartman
2025-07-15 15:00 ` Guido Kiener
2025-07-15 15:11 ` Greg Kroah-Hartman
2025-07-16 9:10 ` Guido Kiener
2025-07-16 9:59 ` Guido Kiener
2025-07-16 14:10 ` Greg Kroah-Hartman
2025-07-21 12:41 ` Dave Penkler
2025-07-15 13:12 ` [PATCH 5.10 023/208] usb: usbtmc: Fix read_stb function and get_stb ioctl Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 024/208] VMCI: check context->notify_page after call to get_user_pages_fast() to avoid GPF Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 025/208] VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 026/208] usb: typec: tcpci_maxim: Fix uninitialized return variable Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 027/208] usb: typec: tcpci_maxim: remove redundant assignment Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 028/208] usb: typec: tcpci_maxim: add terminating newlines to logging Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 029/208] usb: typec: tcpm/tcpci_maxim: Fix bounds check in process_rx() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 030/208] fs/jfs: consolidate sanity checking in dbMount Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 031/208] jfs: validate AG parameters in dbMount() to prevent crashes Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 032/208] media: omap3isp: use sgtable-based scatterlist wrappers Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 033/208] can: tcan4x5x: fix power regulator retrieval during probe Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 034/208] f2fs: dont over-report free space or inodes in statvfs Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 035/208] RDMA/core: Use refcount_t instead of atomic_t on refcount of iwcm_id_private Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 036/208] RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 037/208] uio: uio_hv_generic: use devm_kzalloc() for private data alloc Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 038/208] Drivers: hv: vmbus: Fix duplicate CPU assignments within a device Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 039/208] Drivers: hv: Rename alloced to allocated Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 040/208] Drivers: hv: vmbus: Add utility function for querying ring size Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 041/208] uio_hv_generic: Query the ringbuffer size for device Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 042/208] uio_hv_generic: Align ring size to system page Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 043/208] PCI: cadence-ep: Correct PBA offset in .set_msix() callback Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 044/208] net_sched: sch_sfq: reject invalid perturb period Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 045/208] i2c: tiny-usb: disable zero-length read messages Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 046/208] i2c: robotfuzz-osif: " Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 047/208] atm: clip: prevent NULL deref in clip_push() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 048/208] ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 049/208] attach_recursive_mnt(): do not lock the covering tree when sliding something under it Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 050/208] libbpf: Fix null pointer dereference in btf_dump__free on allocation failure Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 051/208] wifi: mac80211: fix beacon interval calculation overflow Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 052/208] vsock/uapi: fix linux/vm_sockets.h userspace compilation errors Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 053/208] um: ubd: Add missing error check in start_io_thread() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 054/208] net: enetc: Correct endianness handling in _enetc_rd_reg64 Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 055/208] atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 056/208] dt-bindings: serial: 8250: Make clocks and clock-frequency exclusive Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 057/208] Bluetooth: L2CAP: Fix L2CAP MTU negotiation Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 058/208] dm-raid: fix variable in journal device check Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 059/208] btrfs: update superblocks device bytes_used when dropping chunk Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 060/208] HID: wacom: fix memory leak on kobject creation failure Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 061/208] HID: wacom: fix memory leak on sysfs attribute " Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 062/208] HID: wacom: fix kobject reference count leak Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 063/208] drm/tegra: Assign plane type before registration Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 064/208] drm/tegra: Fix a possible null pointer dereference Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 065/208] drm/udl: Unregister device before cleaning up on disconnect Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 066/208] drm/amdkfd: Fix race in GWS queue scheduling Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 067/208] drm/bridge: cdns-dsi: Fix the clock variable for mode_valid() Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 068/208] drm/bridge: cdns-dsi: Fix connecting to next bridge Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 069/208] drm/bridge: cdns-dsi: Check return value when getting default PHY config Greg Kroah-Hartman
2025-07-15 13:12 ` [PATCH 5.10 070/208] drm/bridge: cdns-dsi: Wait for Clk and Data Lanes to be ready Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 071/208] PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 072/208] s390: Add -std=gnu11 to decompressor and purgatory CFLAGS Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 073/208] Revert "ipv6: save dontfrag in cork" Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 074/208] arm64: Restrict pagetable teardown to avoid false warning Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 075/208] rtc: cmos: use spin_lock_irqsave in cmos_interrupt Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 076/208] vsock/vmci: Clear the vmci transport packet properly when initializing it Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 077/208] mmc: sdhci: Add a helper function for dump register in dynamic debug mode Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 078/208] Revert "mmc: sdhci: Disable SD card clock before changing parameters" Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 079/208] usb: typec: altmodes/displayport: do not index invalid pin_assignments Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 080/208] mtk-sd: Fix a pagefault in dma_unmap_sg() for not prepared data Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 081/208] platform/mellanox: mlxbf-tmfifo: fix vring_desc.len assignment Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 082/208] RDMA/mlx5: Initialize obj_event->obj_sub_list before xa_insert Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 083/208] nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 084/208] NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 085/208] scsi: qla2xxx: Fix DMA mapping test in qla24xx_get_port_database() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 086/208] scsi: qla4xxx: Fix missing DMA mapping error in qla4xxx_alloc_pdu() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 087/208] scsi: ufs: core: Fix spelling of a sysfs attribute name Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 088/208] RDMA/mlx5: Fix CC counters query for MPV Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 089/208] btrfs: fix missing error handling when searching for inode refs during log replay Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 090/208] drm/exynos: fimd: Guard display clock control with runtime PM calls Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 091/208] spi: spi-fsl-dspi: Clear completion counter before initiating transfer Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 092/208] drm/i915/selftests: Change mock_request() to return error pointers Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 093/208] drm/i915/gt: Fix timeline left held on VMA alloc error Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 094/208] lib: test_objagg: Set error message in check_expect_hints_stats() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 095/208] amd-xgbe: align CL37 AN sequence as per databook Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 096/208] enic: fix incorrect MTU comparison in enic_change_mtu() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 097/208] net: rose: Fix fall-through warnings for Clang Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 098/208] rose: fix dangling neighbour pointers in rose_rt_device_down() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 099/208] nui: Fix dma_mapping_error() check Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 100/208] net/sched: Always pass notifications when child class becomes empty Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 101/208] ALSA: sb: Force to disable DMAs once when DMA mode is changed Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 102/208] ata: pata_cs5536: fix build on 32-bit UML Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 103/208] powerpc: Fix struct termio related ioctl macros Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 104/208] scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 105/208] wifi: mac80211: drop invalid source address OCB frames Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 106/208] wifi: ath6kl: remove WARN on bad firmware input Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 107/208] ACPICA: Refuse to evaluate a method if arguments are missing Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 108/208] rcu: Return early if callback is not specified Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 109/208] regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 110/208] mmc: mediatek: use data instead of mrq parameter from msdc_{un}prepare_data() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 111/208] mtk-sd: Prevent memory corruption from DMA map failure Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 112/208] mtk-sd: reset host->mrq on prepare_data() error Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 113/208] drm/v3d: Disable interrupts before resetting the GPU Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 114/208] RDMA/mlx5: Fix vport loopback for MPV device Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 115/208] flexfiles/pNFS: update stats on NFS4ERR_DELAY for v4.1 DSes Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 116/208] NFSv4/flexfiles: Fix handling of NFS level errors in I/O Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 117/208] btrfs: propagate last_unlink_trans earlier when doing a rmdir Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 118/208] btrfs: use btrfs_record_snapshot_destroy() during rmdir Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 119/208] dpaa2-eth: rename dpaa2_eth_xdp_release_buf into dpaa2_eth_recycle_buf Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 120/208] dpaa2-eth: Update dpni_get_single_step_cfg command Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 121/208] dpaa2-eth: Update SINGLE_STEP register access Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 122/208] net: dpaa2-eth: rearrange variable in dpaa2_eth_get_ethtool_stats Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 123/208] dpaa2-eth: fix xdp_rxq_info leak Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 124/208] xhci: dbctty: disable ECHO flag by default Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 125/208] xhci: dbc: Flush queued requests before stopping dbc Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 126/208] Logitech C-270 even more broken Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 127/208] usb: typec: displayport: Fix potential deadlock Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 128/208] ACPI: PAD: fix crash in exit_round_robin() Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 129/208] media: uvcvideo: Return the number of processed controls Greg Kroah-Hartman
2025-07-15 13:13 ` [PATCH 5.10 130/208] media: uvcvideo: Send control events for partial succeeds Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 131/208] media: uvcvideo: Rollback non processed entities on error Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 132/208] staging: rtl8723bs: Avoid memset() in aes_cipher() and aes_decipher() Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 133/208] drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 134/208] ASoC: fsl_asrc: use internal measured ratio for non-ideal ratio mode Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 135/208] perf: Revert to requiring CAP_SYS_ADMIN for uprobes Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 136/208] fix proc_sys_compare() handling of in-lookup dentries Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 137/208] netlink: Fix wraparounds of sk->sk_rmem_alloc Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 138/208] tipc: Fix use-after-free in tipc_conn_close() Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 139/208] vsock: Fix transport_{g2h,h2g} TOCTOU Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 140/208] vm_sockets: Add flags field in the vsock address data structure Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 141/208] vm_sockets: Add VMADDR_FLAG_TO_HOST vsock flag Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 142/208] af_vsock: Set VMADDR_FLAG_TO_HOST flag on the receive path Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 143/208] af_vsock: Assign the vsock transport considering the vsock address flags Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 144/208] vsock: Fix transport_* TOCTOU Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 145/208] vsock: Fix IOCTL_VM_SOCKETS_GET_LOCAL_CID to check also `transport_local` Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 146/208] net: phy: smsc: Fix Auto-MDIX configuration when disabled by strap Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 147/208] net: phy: smsc: Fix link failure in forced mode with Auto-MDIX Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 148/208] atm: clip: Fix potential null-ptr-deref in to_atmarpd() Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 149/208] atm: clip: Fix memory leak of struct clip_vcc Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 150/208] atm: clip: Fix infinite recursive call of clip_push() Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 151/208] atm: clip: Fix NULL pointer dereference in vcc_sendmsg() Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 152/208] net/sched: Abort __tc_modify_qdisc if parent class does not exist Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 153/208] fs/proc: do_task_stat: use __for_each_thread() Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 154/208] rxrpc: Fix oops due to non-existence of prealloc backlog struct Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 155/208] Documentation: x86/bugs/its: Add ITS documentation Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 156/208] x86/bhi: Define SPEC_CTRL_BHI_DIS_S Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 157/208] x86/its: Enumerate Indirect Target Selection (ITS) bug Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 158/208] x86/alternatives: Introduce int3_emulate_jcc() Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 159/208] x86/alternatives: Teach text_poke_bp() to patch Jcc.d32 instructions Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 160/208] x86/its: Add support for ITS-safe indirect thunk Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 161/208] x86/alternative: Optimize returns patching Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 162/208] x86/alternatives: Remove faulty optimization Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 163/208] x86/its: Add support for ITS-safe return thunk Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 164/208] x86/its: Fix undefined reference to cpu_wants_rethunk_at() Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 165/208] x86/its: Enable Indirect Target Selection mitigation Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 166/208] x86/its: Add "vmexit" option to skip mitigation on some CPUs Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 167/208] x86/modules: Set VM_FLUSH_RESET_PERMS in module_alloc() Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 168/208] x86/its: Use dynamic thunks for indirect branches Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 169/208] x86/its: Fix build errors when CONFIG_MODULES=n Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 170/208] x86/its: FineIBT-paranoid vs ITS Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 171/208] x86/mce/amd: Fix threshold limit reset Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 172/208] x86/mce: Dont remove sysfs if thresholding sysfs init fails Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 173/208] x86/mce: Make sure CMCI banks are cleared during shutdown on Intel Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 174/208] pinctrl: qcom: msm: mark certain pins as invalid for interrupts Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 175/208] drm/sched: Increment job count before swapping tail spsc queue Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 176/208] usb: gadget: u_serial: Fix race condition in TTY wakeup Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 177/208] Revert "ACPI: battery: negate current when discharging" Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 178/208] ethernet: atl1: Add missing DMA mapping error checks and count errors Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 179/208] rtc: lib_test: add MODULE_LICENSE Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 180/208] pwm: mediatek: Ensure to disable clocks in error path Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 181/208] netlink: Fix rmem check in netlink_broadcast_deliver() Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 182/208] netlink: make sure we allow at least one dump skb Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 183/208] Input: xpad - add support for Amazon Game Controller Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 184/208] Input: xpad - add VID for Turtle Beach controllers Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 185/208] Input: xpad - support Acer NGR 200 Controller Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 186/208] dma-buf: fix timeout handling in dma_resv_wait_timeout v2 Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 187/208] wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev() Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 188/208] md/raid1: Fix stack memory use after return in raid1_reshape Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 189/208] net: appletalk: Fix device refcount leak in atrtr_create() Greg Kroah-Hartman
2025-07-15 13:14 ` [PATCH 5.10 190/208] net: phy: microchip: limit 100M workaround to link-down events on LAN88xx Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 191/208] can: m_can: m_can_handle_lost_msg(): downgrade msg lost in rx message to debug level Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 192/208] net: ll_temac: Fix missing tx_pending check in ethtools_set_ringparam() Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 193/208] bnxt_en: Fix DCB ETS validation Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 194/208] bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 195/208] atm: idt77252: Add missing `dma_map_error()` Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 196/208] um: vector: Reduce stack usage in vector_eth_configure() Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 197/208] net: usb: qmi_wwan: add SIMCom 8230C composition Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 198/208] vt: add missing notification when switching back to text mode Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 199/208] HID: Add IGNORE quirk for SMARTLINKTECHNOLOGY Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 200/208] HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 201/208] Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 202/208] vhost-scsi: protect vq->log_used with vq->mutex Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 203/208] x86/mm: Disable hugetlb page table sharing on 32-bit Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 204/208] x86/bugs: Rename MDS machinery to something more generic Greg Kroah-Hartman
2025-07-15 13:15 ` Greg Kroah-Hartman [this message]
2025-07-15 13:15 ` [PATCH 5.10 206/208] KVM: x86: add support for CPUID leaf 0x80000021 Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 207/208] KVM: SVM: Advertise TSA CPUID bits to guests Greg Kroah-Hartman
2025-07-15 13:15 ` [PATCH 5.10 208/208] x86/process: Move the buffer clearing before MONITOR Greg Kroah-Hartman
2025-07-15 14:36 ` [PATCH 5.10 000/208] 5.10.240-rc1 review Brett Sheffield
2025-07-15 15:50 ` Naresh Kamboju
2025-07-15 16:17 ` Borislav Petkov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250715130819.141669710@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=bp@alien8.de \
--cc=kim.phillips@amd.com \
--cc=patches@lists.linux.dev \
--cc=pawan.kumar.gupta@linux.intel.com \
--cc=stable@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).