linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
	stable@vger.kernel.org, "Dmitry V. Levin" <ldv@altlinux.org>,
	kbuild test robot <lkp@intel.com>,
	Greentime Hu <greentime@andestech.com>,
	Vincent Chen <deanbo422@gmail.com>,
	Elvira Khabirova <lineprinter@altlinux.org>,
	Eugene Syromyatnikov <esyr@redhat.com>,
	Oleg Nesterov <oleg@redhat.com>,
	Andy Lutomirski <luto@kernel.org>,
	Benjamin Herrenschmidt <benh@kernel.crashing.org>,
	"James E.J. Bottomley" <jejb@parisc-linux.org>,
	James Hogan <jhogan@kernel.org>,
	Kees Cook <keescook@chromium.org>,
	Michael Ellerman <mpe@ellerman.id.au>,
	Paul Burton <paul.burton@mips.com>,
	Paul Mackerras <paulus@samba.org>,
	Ralf Baechle <ralf@linux-mips.org>,
	Richard Kuo <rkuo@codeaurora.org>, Shuah Khan <shuah@kernel.org>,
	Andrew Morton <akpm@linux-foundation.org>,
	Linus Torvalds <torvalds@linux-foundation.org>,
	Sasha Levin <sashal@kernel.org>, Helge Deller <deller@gmx.de>
Subject: [PATCH 5.2 062/131] nds32: fix asm/syscall.h
Date: Mon,  5 Aug 2019 15:02:29 +0200	[thread overview]
Message-ID: <20190805124955.579892869@linuxfoundation.org> (raw)
In-Reply-To: <20190805124951.453337465@linuxfoundation.org>

[ Upstream commit 33644b95eb342201511fc951d8fcd10362bd435b ]

PTRACE_GET_SYSCALL_INFO is a generic ptrace API that lets ptracer obtain
details of the syscall the tracee is blocked in.

There are two reasons for a special syscall-related ptrace request.

Firstly, with the current ptrace API there are cases when ptracer cannot
retrieve necessary information about syscalls.  Some examples include:

 * The notorious int-0x80-from-64-bit-task issue. See [1] for details.
   In short, if a 64-bit task performs a syscall through int 0x80, its
   tracer has no reliable means to find out that the syscall was, in
   fact, a compat syscall, and misidentifies it.

 * Syscall-enter-stop and syscall-exit-stop look the same for the
   tracer. Common practice is to keep track of the sequence of
   ptrace-stops in order not to mix the two syscall-stops up. But it is
   not as simple as it looks; for example, strace had a (just recently
   fixed) long-standing bug where attaching strace to a tracee that is
   performing the execve system call led to the tracer identifying the
   following syscall-exit-stop as syscall-enter-stop, which messed up
   all the state tracking.

 * Since the introduction of commit 84d77d3f06e7 ("ptrace: Don't allow
   accessing an undumpable mm"), both PTRACE_PEEKDATA and
   process_vm_readv become unavailable when the process dumpable flag is
   cleared. On such architectures as ia64 this results in all syscall
   arguments being unavailable for the tracer.

Secondly, ptracers also have to support a lot of arch-specific code for
obtaining information about the tracee.  For some architectures, this
requires a ptrace(PTRACE_PEEKUSER, ...) invocation for every syscall
argument and return value.

PTRACE_GET_SYSCALL_INFO returns the following structure:

struct ptrace_syscall_info {
	__u8 op;	/* PTRACE_SYSCALL_INFO_* */
	__u32 arch __attribute__((__aligned__(sizeof(__u32))));
	__u64 instruction_pointer;
	__u64 stack_pointer;
	union {
		struct {
			__u64 nr;
			__u64 args[6];
		} entry;
		struct {
			__s64 rval;
			__u8 is_error;
		} exit;
		struct {
			__u64 nr;
			__u64 args[6];
			__u32 ret_data;
		} seccomp;
	};
};

The structure was chosen according to [2], except for the following
changes:

 * seccomp substructure was added as a superset of entry substructure

 * the type of nr field was changed from int to __u64 because syscall
   numbers are, as a practical matter, 64 bits

 * stack_pointer field was added along with instruction_pointer field
   since it is readily available and can save the tracer from extra
   PTRACE_GETREGS/PTRACE_GETREGSET calls

 * arch is always initialized to aid with tracing system calls such as
   execve()

 * instruction_pointer and stack_pointer are always initialized so they
   could be easily obtained for non-syscall stops

 * a boolean is_error field was added along with rval field, this way
   the tracer can more reliably distinguish a return value from an error
   value

strace has been ported to PTRACE_GET_SYSCALL_INFO.  Starting with
release 4.26, strace uses PTRACE_GET_SYSCALL_INFO API as the preferred
mechanism of obtaining syscall information.

[1] https://lore.kernel.org/lkml/CA+55aFzcSVmdDj9Lh_gdbz1OzHyEm6ZrGPBDAJnywm2LF_eVyg@mail.gmail.com/
[2] https://lore.kernel.org/lkml/CAObL_7GM0n80N7J_DFw_eQyfLyzq+sf4y2AvsCCV88Tb3AwEHA@mail.gmail.com/

This patch (of 7):

All syscall_get_*() and syscall_set_*() functions must be defined as
static inline as on all other architectures, otherwise asm/syscall.h
cannot be included in more than one compilation unit.

This bug has to be fixed in order to extend the generic
ptrace API with PTRACE_GET_SYSCALL_INFO request.

Link: http://lkml.kernel.org/r/20190510152749.GA28558@altlinux.org
Fixes: 1932fbe36e02 ("nds32: System calls handling")
Signed-off-by: Dmitry V. Levin <ldv@altlinux.org>
Reported-by: kbuild test robot <lkp@intel.com>
Acked-by: Greentime Hu <greentime@andestech.com>
Cc: Vincent Chen <deanbo422@gmail.com>
Cc: Elvira Khabirova <lineprinter@altlinux.org>
Cc: Eugene Syromyatnikov <esyr@redhat.com>
Cc: Oleg Nesterov <oleg@redhat.com>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
Cc: Helge Deller <deller@gmx.de>	[parisc]
Cc: James E.J. Bottomley <jejb@parisc-linux.org>
Cc: James Hogan <jhogan@kernel.org>
Cc: Kees Cook <keescook@chromium.org>
Cc: Michael Ellerman <mpe@ellerman.id.au>
Cc: Paul Burton <paul.burton@mips.com>
Cc: Paul Mackerras <paulus@samba.org>
Cc: Ralf Baechle <ralf@linux-mips.org>
Cc: Richard Kuo <rkuo@codeaurora.org>
Cc: Shuah Khan <shuah@kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
 arch/nds32/include/asm/syscall.h | 27 +++++++++++++++++----------
 1 file changed, 17 insertions(+), 10 deletions(-)

diff --git a/arch/nds32/include/asm/syscall.h b/arch/nds32/include/asm/syscall.h
index 899b2fb4b52f7..7b5180d78e200 100644
--- a/arch/nds32/include/asm/syscall.h
+++ b/arch/nds32/include/asm/syscall.h
@@ -26,7 +26,8 @@ struct pt_regs;
  *
  * It's only valid to call this when @task is known to be blocked.
  */
-int syscall_get_nr(struct task_struct *task, struct pt_regs *regs)
+static inline int
+syscall_get_nr(struct task_struct *task, struct pt_regs *regs)
 {
 	return regs->syscallno;
 }
@@ -47,7 +48,8 @@ int syscall_get_nr(struct task_struct *task, struct pt_regs *regs)
  * system call instruction.  This may not be the same as what the
  * register state looked like at system call entry tracing.
  */
-void syscall_rollback(struct task_struct *task, struct pt_regs *regs)
+static inline void
+syscall_rollback(struct task_struct *task, struct pt_regs *regs)
 {
 	regs->uregs[0] = regs->orig_r0;
 }
@@ -62,7 +64,8 @@ void syscall_rollback(struct task_struct *task, struct pt_regs *regs)
  * It's only valid to call this when @task is stopped for tracing on exit
  * from a system call, due to %TIF_SYSCALL_TRACE or %TIF_SYSCALL_AUDIT.
  */
-long syscall_get_error(struct task_struct *task, struct pt_regs *regs)
+static inline long
+syscall_get_error(struct task_struct *task, struct pt_regs *regs)
 {
 	unsigned long error = regs->uregs[0];
 	return IS_ERR_VALUE(error) ? error : 0;
@@ -79,7 +82,8 @@ long syscall_get_error(struct task_struct *task, struct pt_regs *regs)
  * It's only valid to call this when @task is stopped for tracing on exit
  * from a system call, due to %TIF_SYSCALL_TRACE or %TIF_SYSCALL_AUDIT.
  */
-long syscall_get_return_value(struct task_struct *task, struct pt_regs *regs)
+static inline long
+syscall_get_return_value(struct task_struct *task, struct pt_regs *regs)
 {
 	return regs->uregs[0];
 }
@@ -99,8 +103,9 @@ long syscall_get_return_value(struct task_struct *task, struct pt_regs *regs)
  * It's only valid to call this when @task is stopped for tracing on exit
  * from a system call, due to %TIF_SYSCALL_TRACE or %TIF_SYSCALL_AUDIT.
  */
-void syscall_set_return_value(struct task_struct *task, struct pt_regs *regs,
-			      int error, long val)
+static inline void
+syscall_set_return_value(struct task_struct *task, struct pt_regs *regs,
+			 int error, long val)
 {
 	regs->uregs[0] = (long)error ? error : val;
 }
@@ -118,8 +123,9 @@ void syscall_set_return_value(struct task_struct *task, struct pt_regs *regs,
  * entry to a system call, due to %TIF_SYSCALL_TRACE or %TIF_SYSCALL_AUDIT.
  */
 #define SYSCALL_MAX_ARGS 6
-void syscall_get_arguments(struct task_struct *task, struct pt_regs *regs,
-			   unsigned long *args)
+static inline void
+syscall_get_arguments(struct task_struct *task, struct pt_regs *regs,
+		      unsigned long *args)
 {
 	args[0] = regs->orig_r0;
 	args++;
@@ -138,8 +144,9 @@ void syscall_get_arguments(struct task_struct *task, struct pt_regs *regs,
  * It's only valid to call this when @task is stopped for tracing on
  * entry to a system call, due to %TIF_SYSCALL_TRACE or %TIF_SYSCALL_AUDIT.
  */
-void syscall_set_arguments(struct task_struct *task, struct pt_regs *regs,
-			   const unsigned long *args)
+static inline void
+syscall_set_arguments(struct task_struct *task, struct pt_regs *regs,
+		      const unsigned long *args)
 {
 	regs->orig_r0 = args[0];
 	args++;
-- 
2.20.1




  parent reply	other threads:[~2019-08-05 13:28 UTC|newest]

Thread overview: 145+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-08-05 13:01 [PATCH 5.2 000/131] 5.2.7-stable review Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 001/131] ARM: riscpc: fix DMA Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 002/131] ARM: dts: rockchip: Make rk3288-veyron-minnie run at hs200 Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 003/131] ARM: dts: rockchip: Make rk3288-veyron-mickeys emmc work again Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 004/131] clk: meson: mpll: properly handle spread spectrum Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 005/131] ARM: dts: rockchip: Mark that the rk3288 timer might stop in suspend Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 006/131] ftrace: Enable trampoline when rec count returns back to one Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 007/131] arm64: dts: qcom: qcs404-evb: fix l3 min voltage Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 008/131] soc: qcom: rpmpd: fixup rpmpd set performance state Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 009/131] arm64: dts: marvell: mcbin: enlarge PCI memory window Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 010/131] soc: imx: soc-imx8: Correct return value of error handle Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 011/131] dmaengine: tegra-apb: Error out if DMA_PREP_INTERRUPT flag is unset Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 012/131] arm64: dts: rockchip: fix isp iommu clocks and power domain Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 013/131] kernel/module.c: Only return -EEXIST for modules that have finished loading Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 014/131] PCI: OF: Initialize dev->fwnode appropriately Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 015/131] firmware/psci: psci_checker: Park kthreads before stopping them Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 016/131] soc: imx8: Fix potential kernel dump in error path Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 017/131] arm64: qcom: qcs404: Add reset-cells to GCC node Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 018/131] swiotlb: fix phys_addr_t overflow warning Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 019/131] MIPS: lantiq: Fix bitfield masking Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 020/131] dmaengine: rcar-dmac: Reject zero-length slave DMA requests Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 021/131] ARM: exynos: Only build MCPM support if used Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 022/131] clk: tegra210: fix PLLU and PLLU_OUT1 Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 023/131] fs/adfs: super: fix use-after-free bug Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 024/131] clk: sprd: Add check for return value of sprd_clk_regmap_init() Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 025/131] arm64: dts: rockchip: Fix USB3 Type-C on rk3399-sapphire Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 026/131] btrfs: tree-checker: Check if the file extent end overflows Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 027/131] btrfs: fix minimum number of chunk errors for DUP Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 028/131] btrfs: Flush before reflinking any extent to prevent NOCOW write falling back to COW without data reservation Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 029/131] remoteproc: copy parent dma_pfn_offset for vdev Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 030/131] btrfs: qgroup: Dont hold qgroup_ioctl_lock in btrfs_qgroup_inherit() Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 031/131] cifs: Fix a race condition with cifs_echo_request Greg Kroah-Hartman
2019-08-05 13:01 ` [PATCH 5.2 032/131] ceph: fix improper use of smp_mb__before_atomic() Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 033/131] ceph: fix dir_lease_is_valid() Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 034/131] ceph: return -ERANGE if virtual xattr value didnt fit in buffer Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 035/131] virtio-mmio: add error check for platform_get_irq Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 036/131] ACPI: blacklist: fix clang warning for unused DMI table Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 037/131] scsi: zfcp: fix GCC compiler warning emitted with -Wmaybe-uninitialized Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 038/131] selftests/bpf: do not ignore clang failures Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 039/131] drm/amd/display: Expose audio inst from DC to DM Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 040/131] cifs: fix crash in cifs_dfs_do_automount Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 041/131] perf version: Fix segfault due to missing OPT_END() Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 042/131] x86: kvm: avoid constant-conversion warning Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 043/131] ACPI: fix false-positive -Wuninitialized warning Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 044/131] KVM: nVMX: Ignore segment base for VMX memory operand when segment not FS or GS Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 045/131] bpf: fix BTF verifier size resolution logic Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 046/131] be2net: Signal that the device cannot transmit during reconfiguration Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 047/131] mm/z3fold: dont try to use buddy slots after free Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 048/131] mm/slab_common.c: work around clang bug #42570 Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 049/131] mm/memcontrol.c: keep local VM counters in sync with the hierarchical ones Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 050/131] mm/z3fold.c: reinitialize zhdr structs after migration Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 051/131] x86/apic: Silence -Wtype-limits compiler warnings Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 052/131] x86: math-emu: Hide clang warnings for 16-bit overflow Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 053/131] mm/cma.c: fail if fixed declaration cant be honored Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 054/131] lib/test_overflow.c: avoid tainting the kernel and fix wrap size Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 055/131] lib/test_string.c: avoid masking memset16/32/64 failures Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 056/131] mm/ioremap: check virtual address alignment while creating huge mappings Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 057/131] coda: add error handling for fget Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 058/131] coda: fix build using bare-metal toolchain Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 059/131] uapi linux/coda_psdev.h: move upc_req definition from uapi to kernel side headers Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 060/131] drivers/rapidio/devices/rio_mport_cdev.c: NUL terminate some strings Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 061/131] ipc/mqueue.c: only perform resource calculation if user valid Greg Kroah-Hartman
2019-08-05 13:02 ` Greg Kroah-Hartman [this message]
2019-08-05 13:02 ` [PATCH 5.2 063/131] device-dax: fix memory and resource leak if hotplug fails Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 064/131] mm/hotplug: make remove_memory() interface usable Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 065/131] stacktrace: Force USER_DS for stack_trace_save_user() Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 066/131] crypto: ccp - Fix SEV_VERSION_GREATER_OR_EQUAL Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 067/131] xen/pv: Fix a boot up hang revealed by int3 self test Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 068/131] x86/kvm: Dont call kvm_spurious_fault() from .fixup Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 069/131] x86/paravirt: Fix callee-saved function ELF sizes Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 070/131] x86, boot: Remove multiple copy of static function sanitize_boot_params() Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 071/131] bpf: Disable GCC -fgcse optimization for ___bpf_prog_run() Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 072/131] drm/nouveau: fix memory leak in nouveau_conn_reset() Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 073/131] dma-direct: correct the physical addr in dma_direct_sync_sg_for_cpu/device Greg Kroah-Hartman
2019-08-06 12:41   ` Sasha Levin
2019-08-06 12:57     ` Robin Murphy
2019-08-06 22:04       ` Sasha Levin
2019-08-07  5:44         ` Christoph Hellwig
2019-08-05 13:02 ` [PATCH 5.2 074/131] drm/nouveau/dmem: missing mutex_lock in error path Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 075/131] kconfig: Clear "written" flag to avoid data loss Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 076/131] kbuild: initialize CLANG_FLAGS correctly in the top Makefile Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 077/131] kbuild: modpost: include .*.cmd files only when targets exist Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 078/131] tpm: Fix null pointer dereference on chip register error path Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 079/131] Btrfs: fix incremental send failure after deduplication Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 080/131] Btrfs: fix race leading to fs corruption after transaction abort Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 081/131] dax: Fix missed wakeup in put_unlocked_entry() Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 082/131] fgraph: Remove redundant ftrace_graph_notrace_addr() test Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 083/131] mmc: dw_mmc: Fix occasional hang after tuning on eMMC Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 084/131] mmc: meson-mx-sdio: Fix misuse of GENMASK macro Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 085/131] mmc: host: sdhci-sprd: Fix the missing pm_runtime_put_noidle() Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 086/131] mmc: mmc_spi: Enable stable writes Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 087/131] gpiolib: Preserve desc->flags when setting state Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 088/131] gpio: dont WARN() on NULL descs if gpiolib is disabled Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 089/131] gpiolib: fix incorrect IRQ requesting of an active-low lineevent Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 090/131] IB/hfi1: Fix Spectre v1 vulnerability Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 091/131] drm/nouveau: Only release VCPI slots on mode changes Greg Kroah-Hartman
2019-08-05 13:02 ` [PATCH 5.2 092/131] mtd: rawnand: micron: handle on-die "ECC-off" devices correctly Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 093/131] eeprom: at24: make spd world-readable again Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 094/131] i2c: iproc: Fix i2c master read more than 63 bytes Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 095/131] i2c: at91: disable TXRDY interrupt after sending data Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 096/131] i2c: at91: fix clk_offset for sama5d2 Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 097/131] powerpc/kasan: fix early boot failure on PPC32 Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 098/131] selinux: fix memory leak in policydb_init() Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 099/131] ALSA: hda: Fix 1-minute detection delay when i915 module is not available Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 100/131] mm: vmscan: check if mem cgroup is disabled or not before calling memcg slab shrinker Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 101/131] mm: migrate: fix reference check race between __find_get_block() and migration Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 102/131] mm: compaction: avoid 100% CPU usage during compaction when a task is killed Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 103/131] ubsan: build ubsan.c more conservatively Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 104/131] mm/migrate.c: initialize pud_entry in migrate_vma() Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 105/131] loop: Fix mount(2) failure due to race with LOOP_SET_FD Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 106/131] s390/dasd: fix endless loop after read unit address configuration Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 107/131] cgroup: kselftest: relax fs_spec checks Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 108/131] parisc: Add archclean Makefile target Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 109/131] parisc: Strip debug info from kernel before creating compressed vmlinuz Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 110/131] parisc: Fix build of compressed kernel even with debug enabled Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 111/131] drivers/perf: arm_pmu: Fix failure path in PM notifier Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 112/131] arm64: compat: Allow single-byte watchpoints on all addresses Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 113/131] arm64: cpufeature: Fix feature comparison for CTR_EL0.{CWG,ERG} Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 114/131] io_uring: fix KASAN use after free in io_sq_wq_submit_work Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 115/131] clk: mediatek: mt8183: Register 13MHz clock earlier for clocksource Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 116/131] scsi: mpt3sas: Use 63-bit DMA addressing on SAS35 HBA Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 117/131] nbd: replace kill_bdev() with __invalidate_device() again Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 118/131] xen/swiotlb: fix condition for calling xen_destroy_contiguous_region() Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 119/131] xen/gntdev.c: Replace vm_map_pages() with vm_map_pages_zero() Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 120/131] RDMA/bnxt_re: Honor vlan_id in GID entry comparison Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 121/131] RDMA/devices: Do not deadlock during client removal Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 122/131] IB/mlx5: Fix unreg_umr to ignore the mkey state Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 123/131] IB/mlx5: Use direct mkey destroy command upon UMR unreg failure Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 124/131] IB/mlx5: Move MRs to a kernel PD when freeing them to the MR cache Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 125/131] IB/mlx5: Fix clean_mr() to work in the expected order Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 126/131] IB/mlx5: Fix RSS Toeplitz setup to be aligned with the HW specification Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 127/131] IB/hfi1: Check for error on call to alloc_rsm_map_table Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 128/131] IB/hfi1: Drop all TID RDMA READ RESP packets after r_next_psn Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 129/131] IB/hfi1: Field not zero-ed when allocating TID flow memory Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 130/131] drm/i915/perf: fix ICL perf register offsets Greg Kroah-Hartman
2019-08-05 13:03 ` [PATCH 5.2 131/131] drm/i915/gvt: fix incorrect cache entry for guest page mapping Greg Kroah-Hartman
2019-08-05 18:35 ` [PATCH 5.2 000/131] 5.2.7-stable review kernelci.org bot
2019-08-06  0:51 ` shuah
2019-08-06  5:34   ` Greg Kroah-Hartman
2019-08-06  6:17 ` Naresh Kamboju
2019-08-06 10:55   ` Greg Kroah-Hartman
2019-08-06 15:50 ` Guenter Roeck
2019-08-06 16:01   ` Greg Kroah-Hartman
2019-08-06 18:30 ` Jon Hunter
2019-08-06 18:44   ` Greg Kroah-Hartman

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20190805124955.579892869@linuxfoundation.org \
    --to=gregkh@linuxfoundation.org \
    --cc=akpm@linux-foundation.org \
    --cc=benh@kernel.crashing.org \
    --cc=deanbo422@gmail.com \
    --cc=deller@gmx.de \
    --cc=esyr@redhat.com \
    --cc=greentime@andestech.com \
    --cc=jejb@parisc-linux.org \
    --cc=jhogan@kernel.org \
    --cc=keescook@chromium.org \
    --cc=ldv@altlinux.org \
    --cc=lineprinter@altlinux.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=lkp@intel.com \
    --cc=luto@kernel.org \
    --cc=mpe@ellerman.id.au \
    --cc=oleg@redhat.com \
    --cc=paul.burton@mips.com \
    --cc=paulus@samba.org \
    --cc=ralf@linux-mips.org \
    --cc=rkuo@codeaurora.org \
    --cc=sashal@kernel.org \
    --cc=shuah@kernel.org \
    --cc=stable@vger.kernel.org \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).