public inbox for stable@vger.kernel.org
 help / color / mirror / Atom feed
From: Sasha Levin <sashal@kernel.org>
To: patches@lists.linux.dev, stable@vger.kernel.org
Cc: DaeMyung Kang <charsyam@gmail.com>,
	Namjae Jeon <linkinjeon@kernel.org>,
	Steve French <stfrench@microsoft.com>,
	Sasha Levin <sashal@kernel.org>,
	sfrench@samba.org, linux-cifs@vger.kernel.org,
	linux-kernel@vger.kernel.org
Subject: [PATCH AUTOSEL 7.0-5.15] ksmbd: fix CreateOptions sanitization clobbering the whole field
Date: Tue, 28 Apr 2026 06:40:21 -0400	[thread overview]
Message-ID: <20260428104133.2858589-10-sashal@kernel.org> (raw)
In-Reply-To: <20260428104133.2858589-1-sashal@kernel.org>

From: DaeMyung Kang <charsyam@gmail.com>

[ Upstream commit 5d115fa84027e4b999c3d3c7b1294849cf35cdb2 ]

smb2_open() attempts to clear conflicting CreateOptions bits
(FILE_SEQUENTIAL_ONLY_LE together with FILE_RANDOM_ACCESS_LE, and
FILE_NO_COMPRESSION_LE on a directory open), but uses a plain
assignment of the bitwise negation of the target flag:

	req->CreateOptions = ~(FILE_SEQUENTIAL_ONLY_LE);
	req->CreateOptions = ~(FILE_NO_COMPRESSION_LE);

This replaces the entire field with 0xFFFFFFFB / 0xFFFFFFEF rather
than clearing a single bit. With the SEQUENTIAL/RANDOM case, the
next check for FILE_OPEN_BY_FILE_ID_LE | CREATE_TREE_CONNECTION |
FILE_RESERVE_OPFILTER_LE then trivially matches and a legitimate
request is rejected with -EOPNOTSUPP. With the NO_COMPRESSION case,
every downstream test (FILE_DELETE_ON_CLOSE, etc.) operates on a
corrupted CreateOptions value.

Use &= ~FLAG to clear only the intended bit in both places.

Signed-off-by: DaeMyung Kang <charsyam@gmail.com>
Acked-by: Namjae Jeon <linkinjeon@kernel.org>
Signed-off-by: Steve French <stfrench@microsoft.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---

LLM Generated explanations, may be completely bogus:

Now I have all the information needed to complete the full analysis.

## Phase 1: Commit Message Forensics

**Step 1.1: Subject line parsing**
- Record: Subsystem prefix `ksmbd:` (kernel SMB3 server), action verb
  `fix`, one-line summary: "CreateOptions sanitization clobbering the
  whole field"

**Step 1.2: Tags**
- Signed-off-by: DaeMyung Kang (community contributor who authored the
  fix)
- **Acked-by: Namjae Jeon** (the ksmbd maintainer and original author of
  the buggy code)
- Signed-off-by: Steve French (VFS/SMB maintainer, committed the patch)
- No `Fixes:` tag (expected - this is a candidate under review)
- No `Reported-by:` / `Link:` / `Cc: stable` tags
- Record: Author + ksmbd maintainer Acked + SMB subsystem maintainer
  committed

**Step 1.3: Commit body analysis**
- Record: Author clearly explains the bug mechanism: two lines use `=`
  (assignment) instead of `&=` (bit-clear). `req->CreateOptions = ~FLAG`
  replaces the ENTIRE field with `0xFFFFFFFB` (sequential case) or
  `0xFFFF7FFF`-ish (no-compression case, message says 0xFFFFFFEF -
  slight discrepancy but point stands). Consequence 1: immediately next
  `EOPNOTSUPP` check trivially matches → legitimate client requests
  rejected. Consequence 2: every downstream test (FILE_DELETE_ON_CLOSE,
  etc.) operates on corrupted value.

**Step 1.4: Hidden bug detection**
- Record: Not hidden — commit subject explicitly says "fix".

## Phase 2: Diff Analysis

**Step 2.1: Inventory**
- Record: 1 file changed (`fs/smb/server/smb2pdu.c`), +2/-2 lines, 1
  function touched (`smb2_open()`), single-file surgical fix.

**Step 2.2: Code flow change**
- Record:
  - Hunk 1 (line ~3064): Before: `req->CreateOptions =
    ~(FILE_SEQUENTIAL_ONLY_LE);` writes `0xFFFFFFFB` to the field.
    After: `req->CreateOptions &= ~FILE_SEQUENTIAL_ONLY_LE;` clears only
    bit 0x00000004.
  - Hunk 2 (line ~3078, inside DIRECTORY_FILE branch): Before:
    `req->CreateOptions = ~(FILE_NO_COMPRESSION_LE);` writes ~`0x8000`
    into the field. After: `req->CreateOptions &=
    ~FILE_NO_COMPRESSION_LE;` clears only bit 0x00008000.

**Step 2.3: Bug mechanism**
- Record: Category (g) "Logic / correctness fix" — classic missing `&`
  in `&=`, making assignment clobber the field. Two independent sites,
  same root cause.

**Step 2.4: Fix quality**
- Record: Obviously correct, minimal and idiomatic (`&= ~FLAG` is the
  standard kernel pattern). Zero regression risk — the fix makes the
  code do exactly what the surrounding check clearly intends. In both
  sites the value was already mangled post-change by the buggy line;
  restoring correct semantics cannot introduce a new failure mode.

## Phase 3: Git History Investigation

**Step 3.1: Blame**
- Record: `git blame -L 3055,3075 fs/smb/server/smb2pdu.c` shows both
  buggy lines come from commit `e2f34481b24db2` ("cifsd: add server-side
  procedures for SMB3", Namjae Jeon, 2021) — the very first commit that
  added ksmbd to the kernel. `git describe --contains e2f34481b24db2`
  returns `v5.15-rc1~183^2~93` → present since **v5.15-rc1**.

**Step 3.2: Fixes: tag**
- Record: No `Fixes:` tag in the commit, but blame unambiguously
  identifies the introducing commit. That commit (ksmbd initial merge)
  is present in every ksmbd-capable stable tree (5.15.y and later).

**Step 3.3: Related file changes**
- Record: `git log --oneline -- fs/smb/server/smb2pdu.c | head -30`
  shows a steady stream of ksmbd CVE / bug fixes (UAF, OOB, refcount
  leaks) in the file — an actively maintained, churn-prone area. No
  prerequisite commit is implied by the diff hunks.

**Step 3.4: Author's other commits**
- Record: `git log --author="DaeMyung Kang"` shows 4 related ksmbd fixes
  (durable fd leak, async_ida destroy, tree_conn_ida destroy, and this
  one). Regular ksmbd contributor, not a one-off submitter.

**Step 3.5: Dependencies**
- Record: Patch is `[PATCH 2/2]` of a series. Patch 1/2
  (`804054d19886a`, durable fd leak) touches
  `parse_durable_handle_context()` at line ~2844, completely independent
  from this patch's changes at lines ~3064/3078. `git show
  804054d19886a` confirms zero textual/semantic overlap → **this patch
  is fully standalone**, no dependency on 1/2.

## Phase 4: Mailing List Research

**Step 4.1: b4 dig**
- Record: `b4 dig -c 5d115fa84027e` found match by patch-id at https://l
  ore.kernel.org/all/20260420175125.3341090-1-charsyam@gmail.com/

**Step 4.2: Reviewers (b4 dig -w)**
- Record: Originally sent to ksmbd maintainer Namjae Jeon, Steve French
  (SMB maintainer), Sergey Senozhatsky, Tom Talpey, linux-cifs, LKML.
  The right audience was included.

**Step 4.3: Revisions (b4 dig -a)**
- Record: Only v1, no rework needed — the fix was straightforward enough
  to be accepted on first submission.

**Step 4.4: Thread content**
- Record: `b4 dig -m /tmp/ksmbd_createopts_thread.mbox` retrieved the
  full thread. The only reply is from Namjae Jeon: *"Applied it to
  #ksmbd-for-next-next. Note that I have added the missing signed-off-by
  tag..."* — no NAKs, no concerns, no revision requests, no explicit
  stable nomination, but unambiguous maintainer approval.

**Step 4.5: Stable ML**
- Record: No prior stable mailing-list discussion found; the bug has
  been latent since v5.15 but only now diagnosed.

## Phase 5: Code Semantic Analysis

**Step 5.1: Key functions**
- Record: `smb2_open()` in `fs/smb/server/smb2pdu.c`

**Step 5.2: Callers**
- Record: `fs/smb/server/smb2ops.c:181` registers `smb2_open` as the
  handler for `SMB2_CREATE_HE` in the `smb2_0_server_cmds[]` dispatch
  table. This means **every SMB2 CREATE request** (file/directory open —
  the bread-and-butter operation of an SMB server) enters `smb2_open()`.
  The buggy code executes unconditionally whenever the client sets the
  relevant CreateOptions flags.

**Step 5.3: Callees**
- Record: Downstream, `req->CreateOptions` is tested against
  `FILE_DELETE_ON_CLOSE_LE` at lines 3159, 3216, 3240, 3317, and 3537
  (per grep). Line 3537 is especially consequential — it calls
  `ksmbd_fd_set_delete_on_close(fp, file_info)`, which marks the newly
  opened file/dir for deletion on close.

**Step 5.4: Reachability**
- Record: CreateOptions is attacker/client-controlled and reaches
  `smb2_open()` from an authenticated SMB session (or guest, depending
  on server config). Both trigger paths are reachable from any connected
  SMB client — trivially triggerable by sending a crafted SMB2 CREATE
  request.

**Step 5.5: Similar patterns**
- Record: Only these two sites in ksmbd use `req->CreateOptions =
  ~FLAG`; no other copies of this pattern exist in the tree (confirmed
  by reading the surrounding hunk — the rest of the file uses
  `&=`/`|=`/masking correctly).

## Phase 6: Stable Tree Analysis

**Step 6.1: Code existence in stable**
- Record: Verified buggy code exists verbatim in: `stable-
  push/linux-5.15.y` (at `fs/ksmbd/smb2pdu.c`), `linux-6.1.y`,
  `linux-6.6.y`, `linux-6.12.y`, `linux-6.18.y`, `linux-6.19.y` (all at
  `fs/smb/server/smb2pdu.c`). Confirmed with `git show <branch>:<path> |
  grep ~(FILE_SEQUENTIAL_ONLY_LE)`.

**Step 6.2: Backport complications**
- Record: Surrounding context lines are IDENTICAL in 6.1.y through
  6.19.y — the mainline patch applies cleanly. For 5.15.y the file was
  renamed from `fs/ksmbd/` to `fs/smb/server/` in v6.1, so the patch
  needs a trivial path rewrite but the code context is the same.

**Step 6.3: Related fixes in stable**
- Record: No prior fix of the same bug in any stable tree. The buggy
  code has been shipping since v5.15.

## Phase 7: Subsystem Context

**Step 7.1: Criticality**
- Record: `fs/smb/server/` = ksmbd = in-kernel SMB3 server. Network-
  facing, security-sensitive, used for file sharing. Classification:
  **IMPORTANT** (not quite CORE, but exposed to remote input and used in
  real deployments — many ksmbd fixes have been CVE-class in the last
  year).

**Step 7.2: Activity**
- Record: ksmbd receives frequent fixes (UAF, OOB, refcount, memory leak
  fixes in recent history — see Step 3.3). Active subsystem, fixes are
  expected to land in stable.

## Phase 8: Impact and Risk Assessment

**Step 8.1: Who is affected**
- Record: Anyone running ksmbd (Linux as SMB file server). Bug is
  triggered purely from client-side input → every ksmbd instance is
  potentially affected.

**Step 8.2: Trigger conditions**
- Record:
  - Case 1 (SEQUENTIAL+RANDOM): client sends CREATE with both
    `FILE_SEQUENTIAL_ONLY` and `FILE_RANDOM_ACCESS` flags → server
    wrongly rejects with `-EOPNOTSUPP`. Some SMB clients/workloads do
    set both hints; the rejection is an interop bug.
  - Case 2 (DIRECTORY+NO_COMPRESSION): client issues directory open with
    `FILE_NO_COMPRESSION` → `CreateOptions` is set to
    `~FILE_NO_COMPRESSION_LE` (approximately `0xFFFF7FFF`), which has
    the `FILE_DELETE_ON_CLOSE_LE` bit set plus many other unintended
    bits. Every subsequent test in `smb2_open()` (lines 3159, 3216,
    3240, 3317, 3537) operates on wrong data. In particular line 3537
    may call `ksmbd_fd_set_delete_on_close()`, silently marking an
    opened directory for deletion when the handle closes. Triggered by
    unprivileged (authenticated) SMB client.

**Step 8.3: Failure mode severity**
- Record: Case 1 = functional/interop failure (user-visible: "can't open
  file through SMB"). Case 2 = logic corruption, potentially including
  unintended delete-on-close marking on directory opens → **potential
  data loss / unexpected state**. Combined severity: MEDIUM-HIGH. Not a
  crash, not a classic security UAF, but a real, reachable, client-
  controllable behavioral corruption bug in a file server.

**Step 8.4: Risk-benefit**
- Record: **Benefit** = fixes wrong behavior / potential data-affecting
  logic on every SMB client CREATE that sets the relevant bits, across
  every ksmbd deployment since v5.15. **Risk** = negligible: 2 lines,
  corrects `=` to `&=`, cannot regress anything (the pre-patch code
  demonstrably clobbers the field). Textbook stable candidate.

## Phase 9: Final Synthesis

**Step 9.1: Evidence summary**
- FOR: (1) Obvious typo fix — `=` → `&=`; (2) 2-line diff, zero
  regression risk; (3) Bug reachable via client-supplied CreateOptions
  in every SMB2 CREATE; (4) Both failure modes matter — one breaks
  interop, the other corrupts downstream semantics including potential
  unintended DELETE_ON_CLOSE marking; (5) Acked by ksmbd maintainer,
  committed by SMB subsystem maintainer; (6) Bug present since v5.15 —
  all active stable trees affected; (7) Patch applies cleanly to
  6.1.y–6.19.y, needs only path rename for 5.15.y.
- AGAINST: No Fixes: tag, no explicit stable nomination, no Reported-by
  (expected for a code-inspection find). None of these outweigh the
  above.
- UNVERIFIED: I did not reproduce the bug with a live ksmbd server;
  analysis is based on code reading and the commit author's explanation,
  which is consistent with the code.

**Step 9.2: Stable rules checklist**
1. Obviously correct and tested — YES (typo fix, trivial to verify by
   reading; maintainer Ack)
2. Fixes real bug affecting users — YES (every ksmbd CREATE path)
3. Important issue — YES (client-triggerable behavioral corruption)
4. Small and contained — YES (2 lines, 1 function)
5. No new features/APIs — YES (pure bug fix)
6. Applies to stable — YES (clean in 6.1+, trivial path rename for 5.15)

**Step 9.3: Exception category**
- Record: N/A — this is a straightforward bug fix, not an exception-
  class change.

**Step 9.4: Decision**
- Clear YES. Textbook stable material: tiny, obviously correct, fixes a
  real client-reachable bug in a maintained subsystem, present in every
  active stable tree since v5.15.

## Verification
- [Phase 1] Parsed tags: DaeMyung Kang (author), Namjae Jeon (ksmbd
  maintainer, Acked), Steve French (SMB maintainer, signed-off). No
  Fixes/Reported-by/Link/Cc: stable.
- [Phase 1] Parsed body: author's description of `=` vs `&=` bug and
  downstream consequences is accurate (verified by inspecting the code).
- [Phase 2] Diff: `git show 5d115fa84027e` → 2 lines changed, both in
  `smb2_open()`, in `fs/smb/server/smb2pdu.c`.
- [Phase 2] Flag values confirmed via `fs/smb/common/smb2pdu.h`:
  `FILE_SEQUENTIAL_ONLY_LE=0x4`, `FILE_RANDOM_ACCESS_LE=0x800`,
  `FILE_NO_COMPRESSION_LE=0x8000`, `FILE_DELETE_ON_CLOSE_LE=0x1000`,
  `FILE_OPEN_BY_FILE_ID_LE=0x2000`, `FILE_DIRECTORY_FILE_LE=0x1`. Commit
  message's `0xFFFFFFEF` for the NO_COMPRESSION case is slightly off
  (actual `~0x8000` ≈ `0xFFFF7FFF`), but the core claim (entire field
  clobbered and `FILE_DELETE_ON_CLOSE_LE` wrongly set) is correct.
- [Phase 3] `git blame -L 3055,3075 fs/smb/server/smb2pdu.c` → buggy
  lines come from commit `e2f34481b24db2`.
- [Phase 3] `git describe --contains e2f34481b24db2` →
  `v5.15-rc1~183^2~93`, i.e., ksmbd initial merge in v5.15.
- [Phase 3] `git show 804054d19886a`: patch 1/2 edits
  `parse_durable_handle_context()` around line 2844, unrelated to this
  patch's edits around line 3064/3078 — confirms standalone
  applicability.
- [Phase 4] `b4 dig -c 5d115fa84027e`: matched on patch-id, lore URL htt
  ps://lore.kernel.org/all/20260420175125.3341090-1-charsyam@gmail.com/
  returned.
- [Phase 4] `b4 dig -c ... -w`: recipients include Namjae Jeon
  (maintainer), Steve French, linux-cifs, LKML.
- [Phase 4] `b4 dig -c ... -a`: only v1, no revisions.
- [Phase 4] `b4 dig -c ... -m /tmp/ksmbd_createopts_thread.mbox`: thread
  contents read — only reply from Namjae Jeon says "Applied it to
  #ksmbd-for-next-next"; no NAKs, no concerns.
- [Phase 5] `fs/smb/server/smb2ops.c:181` confirms `smb2_open` is
  dispatched for SMB2_CREATE_HE — every CREATE request path.
- [Phase 5] `grep 'CreateOptions.*FILE_DELETE_ON_CLOSE_LE'
  fs/smb/server`: 5 downstream sites at lines 3159/3216/3240/3317/3537
  depend on `CreateOptions`, and line 3537 calls
  `ksmbd_fd_set_delete_on_close()`.
- [Phase 6] `git show stable-
  push/linux-{5.15,6.1,6.6,6.12,6.18,6.19}.y:<path>`: buggy lines
  present in every listed stable tree.
- [Phase 6] Context around buggy lines in 6.1.y–6.19.y is textually
  identical to mainline → patch applies cleanly.
- [Phase 6] 5.15.y file path is `fs/ksmbd/smb2pdu.c` (not
  `fs/smb/server/...`) — trivial path rename required for that tree, no
  content rework.
- [Phase 7] `fs/smb/server/` is ksmbd (in-kernel SMB3 server); subsystem
  is active, has received many CVE-class fixes recently.
- [Phase 8] Failure mode: (1) legitimate CREATE requests rejected with
  `-EOPNOTSUPP`, (2) directory opens with NO_COMPRESSION corrupt
  CreateOptions including wrongly setting `FILE_DELETE_ON_CLOSE_LE` for
  line 3537. Severity MEDIUM-HIGH.
- UNVERIFIED: Did not run ksmbd and craft a CREATE packet to observe the
  bug at runtime; analysis relies on static reading of the code which
  matches the commit message and is unambiguous.

The patch is a 2-line, obviously-correct typo fix (`=` → `&=`) in
`smb2_open()` that corrects a client-reachable sanitization bug present
in ksmbd since v5.15. It is Acked by the ksmbd maintainer, affects every
active stable tree, and applies cleanly with at most a trivial path
rename for 5.15.y. It meets every stable-kernel-rules criterion and
introduces essentially zero regression risk.

**YES**

 fs/smb/server/smb2pdu.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/fs/smb/server/smb2pdu.c b/fs/smb/server/smb2pdu.c
index e21c6c22355b1..ad5559d48975b 100644
--- a/fs/smb/server/smb2pdu.c
+++ b/fs/smb/server/smb2pdu.c
@@ -3061,7 +3061,7 @@ int smb2_open(struct ksmbd_work *work)
 	} else {
 		if (req->CreateOptions & FILE_SEQUENTIAL_ONLY_LE &&
 		    req->CreateOptions & FILE_RANDOM_ACCESS_LE)
-			req->CreateOptions = ~(FILE_SEQUENTIAL_ONLY_LE);
+			req->CreateOptions &= ~FILE_SEQUENTIAL_ONLY_LE;
 
 		if (req->CreateOptions &
 		    (FILE_OPEN_BY_FILE_ID_LE | CREATE_TREE_CONNECTION |
@@ -3075,7 +3075,7 @@ int smb2_open(struct ksmbd_work *work)
 				rc = -EINVAL;
 				goto err_out2;
 			} else if (req->CreateOptions & FILE_NO_COMPRESSION_LE) {
-				req->CreateOptions = ~(FILE_NO_COMPRESSION_LE);
+				req->CreateOptions &= ~FILE_NO_COMPRESSION_LE;
 			}
 		}
 	}
-- 
2.53.0


  parent reply	other threads:[~2026-04-28 10:41 UTC|newest]

Thread overview: 76+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-28 10:40 [PATCH AUTOSEL 7.0] ALSA: hda/realtek: add quirk for HONOR MRB-XXX M1020 Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] tools/power/x86/intel-speed-select: Avoid current base freq as maximum Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] um: fix address-of CMSG_DATA() rvalue in stub Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] tty: serial: samsung_tty: avoid dev_dbg deadlock Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] drm/amdgpu: fix CPER ring header parsing Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] io_uring/rsrc: unify nospec indexing for direct descriptors Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] um: avoid struct sigcontext redefinition with musl Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.15] leds: lgm-sso: Fix typo in macro for src offset Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.15] fs/ntfs3: increase CLIENT_REC name field size Sasha Levin
2026-04-28 10:40 ` Sasha Levin [this message]
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.1] thunderbolt: Disable CLx on Titan Ridge-based devices with old firmware Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.6] NFS: Use nlmclnt_shutdown_rpc_clnt() to safely shut down NLM Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] smb: client: compress: fix buffer overrun in lz77_compress() Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] drm/amd/display: Pass min page size from SOC BB to dml2_1 plane config Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] usb: dwc3: Support USB3340x ULPI PHY high-speed negotiation Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] smb: client: compress: fix counting in LZ77 match finding Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] mfd: mt6397: Properly fix CID of MT6328, MT6331 and MT6332 Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.1] um: Disable GCOV_PROFILE_ALL on 32-bit UML with Clang 20/21 Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] ASoC: qcom: x1e80100: limit speaker volumes Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] smb: client: compress: fix bad encoding on last LZ77 flag Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.15] fs/ntfs3: fix potential double iput on d_make_root() failure Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] scsi: storvsc: Handle PERSISTENT_RESERVE_IN truncation for Hyper-V vFC Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0] fs: aio: set VMA_DONTCOPY_BIT in mmap to fix NULL-pointer-dereference error Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] dt-bindings: arm64: add Marvell 7k COMe boards Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] ecryptfs: Set s_time_gran to get correct time granularity Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] usb: usbip: fix OOB read/write in usbip_pad_iso() Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] scsi: lpfc: Remove unnecessary ndlp kref get in lpfc_check_nlp_post_devloss Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] leds: core: Implement fallback to software node name for LED names Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.15] ntfs3: reject inodes with zero non-DOS link count Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] f2fs: fix to skip empty sections in f2fs_get_victim Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0] NFS: fix writeback in presence of errors Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.6] dt-bindings: rtc: microcrystal,rv3028: Allow to specify vdd-supply Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] fs: aio: reject partial mremap to avoid Null-pointer-dereference error Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.15] fs/ntfs3: fix $LXDEV xattr lookup Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] scsi: ufs: ufs-pci: Add support for Intel Nova Lake Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.1] scsi: lpfc: Fix incorrect txcmplq_cnt during cleanup in lpfc_sli_abort_ring() Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] drm/amdgpu: drop userq fence driver refs out of fence process() Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.15] ksmbd: fix O(N^2) DoS in smb2_lock via unbounded LockCount Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] usb: gadget: bdc: validate status-report endpoint indices Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] coda_flag_children(): fix a UAF Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] fbdev: savage: fix probe-path EDID cleanup leaks Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0] scsi: virtio_scsi: Move INIT_WORK calls to virtscsi_probe() Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] iio: ABI: fix current_trigger description Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] staging: octeon: fix free_irq dev_id mismatch in cvm_oct_rx_shutdown Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] mfd: intel-lpss: Add Intel Nova Lake-H PCI IDs Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] tty: serial: imx: keep dma request disabled before dma transfer setup Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] greybus: beagleplay: bound bootloader RX buffer copy Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] serial: qcom-geni: Fix RTS behavior with flow control Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] selftests: fib_nexthops: test stale has_v4 on nexthop replace Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.1] ntfs3: fix OOB write in attr_wof_frame_info() Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] arm64: cputype: Add C1-Pro definitions Sasha Levin
2026-04-28 11:13   ` Mark Rutland
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.18] drm/amd/display: Fix HostVMMinPageSize unit mismatch in DML2.1 Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.12] 9p/trans_xen: make cleanup idempotent after dataring alloc errors Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0] drm/amdgpu: OR init_pte_flags into invalid leaf PTE updates Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.6] scsi: ufs: core: Disable timestamp for Kioxia THGJFJT0E25BAIP Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.18] f2fs: fix to freeze GC and discard threads quickly Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] scsi: esas2r: Fix __printf annotation on esas2r_log_master() Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.18] rtc: max77686: convert to i2c_new_ancillary_device Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.1] rtc: ti-k3: Add support to resume from IO DDR low power mode Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.12] bus: mhi: host: pci_generic: Add Telit FE912C04 modem support Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] usb: usbip: fix integer overflow in usbip_recv_iso() Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] clk: qcom: rcg2: expand frac table for mdss_pixel_clk_src Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] usb: usbip: validate iso frame actual_length in usbip_recv_iso() Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.12] bus: mhi: host: pci_generic: Add Qualcomm SDX35 modem Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0] drm/amd/display: Use overlay cursor when color pipeline is active Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.18] platform/x86: hp-wmi: Add support for Omen 16-wf1xxx (8C77) Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.12] smb: server: stop sending fake security descriptors Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.18] ALSA: usb-audio: Add quirk entries for NexiGo N930W webcam Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.15] ntfs3: fix memory leak in indx_create_allocate() Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] staging: fbtft: fix unchecked write return value in fb_agm1264k-fl Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] ipv6: Cap TLV scan in ip6_tnl_parse_tlv_enc_lim Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.18] scsi: lpfc: Add PCI ID support for LPe42100 series adapters Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.12] io_uring: take page references for NOMMU pbuf_ring mmaps Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.18] iio: imu: st_lsm6dsx: Add ACPI ID for SHIFT13mi gyroscope Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.15] dt-bindings: clock: qcom,gcc-sc8180x: Add missing GDSCs Sasha Levin

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20260428104133.2858589-10-sashal@kernel.org \
    --to=sashal@kernel.org \
    --cc=charsyam@gmail.com \
    --cc=linkinjeon@kernel.org \
    --cc=linux-cifs@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=patches@lists.linux.dev \
    --cc=sfrench@samba.org \
    --cc=stable@vger.kernel.org \
    --cc=stfrench@microsoft.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox