All of lore.kernel.org
 help / color / mirror / Atom feed
From: Kamal Mostafa <kamal@canonical.com>
To: linux-kernel@vger.kernel.org, stable@vger.kernel.org,
	kernel-team@lists.ubuntu.com
Cc: Herbert Xu <herbert@gondor.hengli.com.au>,
	Luis Henriques <luis.henriques@canonical.com>
Subject: [PATCH 037/145] crypto: algboss - Hold ref count on larval
Date: Wed, 17 Jul 2013 15:46:09 -0700	[thread overview]
Message-ID: <1374101277-7915-38-git-send-email-kamal@canonical.com> (raw)
In-Reply-To: <1374101277-7915-1-git-send-email-kamal@canonical.com>

3.8.13.5 -stable review patch.  If anyone has any objections, please let me know.

------------------

From: Herbert Xu <herbert@gondor.apana.org.au>

commit 939e17799619e31331d2433041196529515a86a6 upstream.

On Thu, Jun 20, 2013 at 10:00:21AM +0200, Daniel Borkmann wrote:
> After having fixed a NULL pointer dereference in SCTP 1abd165e ("net:
> sctp: fix NULL pointer dereference in socket destruction"), I ran into
> the following NULL pointer dereference in the crypto subsystem with
> the same reproducer, easily hit each time:
>
> BUG: unable to handle kernel NULL pointer dereference at (null)
> IP: [<ffffffff81070321>] __wake_up_common+0x31/0x90
> PGD 0
> Oops: 0000 [#1] SMP
> Modules linked in: padlock_sha(F-) sha256_generic(F) sctp(F) libcrc32c(F) [..]
> CPU: 6 PID: 3326 Comm: cryptomgr_probe Tainted: GF            3.10.0-rc5+ #1
> Hardware name: Dell Inc. PowerEdge T410/0H19HD, BIOS 1.6.3 02/01/2011
> task: ffff88007b6cf4e0 ti: ffff88007b7cc000 task.ti: ffff88007b7cc000
> RIP: 0010:[<ffffffff81070321>]  [<ffffffff81070321>] __wake_up_common+0x31/0x90
> RSP: 0018:ffff88007b7cde08  EFLAGS: 00010082
> RAX: ffffffffffffffe8 RBX: ffff88003756c130 RCX: 0000000000000000
> RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff88003756c130
> RBP: ffff88007b7cde48 R08: 0000000000000000 R09: ffff88012b173200
> R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000282
> R13: ffff88003756c138 R14: 0000000000000000 R15: 0000000000000000
> FS:  0000000000000000(0000) GS:ffff88012fc60000(0000) knlGS:0000000000000000
> CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> CR2: 0000000000000000 CR3: 0000000001a0b000 CR4: 00000000000007e0
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> Stack:
>  ffff88007b7cde28 0000000300000000 ffff88007b7cde28 ffff88003756c130
>  0000000000000282 ffff88003756c128 ffffffff81227670 0000000000000000
>  ffff88007b7cde78 ffffffff810722b7 ffff88007cdcf000 ffffffff81a90540
> Call Trace:
>  [<ffffffff81227670>] ? crypto_alloc_pcomp+0x20/0x20
>  [<ffffffff810722b7>] complete_all+0x47/0x60
>  [<ffffffff81227708>] cryptomgr_probe+0x98/0xc0
>  [<ffffffff81227670>] ? crypto_alloc_pcomp+0x20/0x20
>  [<ffffffff8106760e>] kthread+0xce/0xe0
>  [<ffffffff81067540>] ? kthread_freezable_should_stop+0x70/0x70
>  [<ffffffff815450dc>] ret_from_fork+0x7c/0xb0
>  [<ffffffff81067540>] ? kthread_freezable_should_stop+0x70/0x70
> Code: 41 56 41 55 41 54 53 48 83 ec 18 66 66 66 66 90 89 75 cc 89 55 c8
>       4c 8d 6f 08 48 8b 57 08 41 89 cf 4d 89 c6 48 8d 42 e
> RIP  [<ffffffff81070321>] __wake_up_common+0x31/0x90
>  RSP <ffff88007b7cde08>
> CR2: 0000000000000000
> ---[ end trace b495b19270a4d37e ]---
>
> My assumption is that the following is happening: the minimal SCTP
> tool runs under ``echo 1 > /proc/sys/net/sctp/auth_enable'', hence
> it's making use of crypto_alloc_hash() via sctp_auth_init_hmacs().
> It forks itself, heavily allocates, binds, listens and waits in
> accept on sctp sockets, and then randomly kills some of them (no
> need for an actual client in this case to hit this). Then, again,
> allocating, binding, etc, and then killing child processes.
>
> The problem that might be happening here is that cryptomgr requests
> the module to probe/load through cryptomgr_schedule_probe(), but
> before the thread handler cryptomgr_probe() returns, we return from
> the wait_for_completion_interruptible() function and probably already
> have cleared up larval, thus we run into a NULL pointer dereference
> when in cryptomgr_probe() complete_all() is being called.
>
> If we wait with wait_for_completion() instead, this panic will not
> occur anymore. This is valid, because in case a signal is pending,
> cryptomgr_probe() returns from probing anyway with properly calling
> complete_all().

The use of wait_for_completion_interruptible is intentional so that
we don't lock up the thread if a bug causes us to never wake up.

This bug is caused by the helper thread using the larval without
holding a reference count on it.  If the helper thread completes
after the original thread requesting for help has gone away and
destroyed the larval, then we get the crash above.

So the fix is to hold a reference count on the larval.

Reported-by: Daniel Borkmann <dborkman@redhat.com>
Tested-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Luis Henriques <luis.henriques@canonical.com>
---
 crypto/algboss.c  | 15 ++++++++-------
 crypto/api.c      |  6 ------
 crypto/internal.h |  6 ++++++
 3 files changed, 14 insertions(+), 13 deletions(-)

diff --git a/crypto/algboss.c b/crypto/algboss.c
index 769219b..76fc0b2 100644
--- a/crypto/algboss.c
+++ b/crypto/algboss.c
@@ -45,10 +45,9 @@ struct cryptomgr_param {
 		} nu32;
 	} attrs[CRYPTO_MAX_ATTRS];
 
-	char larval[CRYPTO_MAX_ALG_NAME];
 	char template[CRYPTO_MAX_ALG_NAME];
 
-	struct completion *completion;
+	struct crypto_larval *larval;
 
 	u32 otype;
 	u32 omask;
@@ -87,7 +86,8 @@ static int cryptomgr_probe(void *data)
 	crypto_tmpl_put(tmpl);
 
 out:
-	complete_all(param->completion);
+	complete_all(&param->larval->completion);
+	crypto_alg_put(&param->larval->alg);
 	kfree(param);
 	module_put_and_exit(0);
 }
@@ -187,18 +187,19 @@ static int cryptomgr_schedule_probe(struct crypto_larval *larval)
 	param->otype = larval->alg.cra_flags;
 	param->omask = larval->mask;
 
-	memcpy(param->larval, larval->alg.cra_name, CRYPTO_MAX_ALG_NAME);
-
-	param->completion = &larval->completion;
+	crypto_alg_get(&larval->alg);
+	param->larval = larval;
 
 	thread = kthread_run(cryptomgr_probe, param, "cryptomgr_probe");
 	if (IS_ERR(thread))
-		goto err_free_param;
+		goto err_put_larval;
 
 	wait_for_completion_interruptible(&larval->completion);
 
 	return NOTIFY_STOP;
 
+err_put_larval:
+	crypto_alg_put(&larval->alg);
 err_free_param:
 	kfree(param);
 err_put_module:
diff --git a/crypto/api.c b/crypto/api.c
index 033a714..3b61803 100644
--- a/crypto/api.c
+++ b/crypto/api.c
@@ -34,12 +34,6 @@ EXPORT_SYMBOL_GPL(crypto_alg_sem);
 BLOCKING_NOTIFIER_HEAD(crypto_chain);
 EXPORT_SYMBOL_GPL(crypto_chain);
 
-static inline struct crypto_alg *crypto_alg_get(struct crypto_alg *alg)
-{
-	atomic_inc(&alg->cra_refcnt);
-	return alg;
-}
-
 struct crypto_alg *crypto_mod_get(struct crypto_alg *alg)
 {
 	return try_module_get(alg->cra_module) ? crypto_alg_get(alg) : NULL;
diff --git a/crypto/internal.h b/crypto/internal.h
index 9ebedae..bd39bfc 100644
--- a/crypto/internal.h
+++ b/crypto/internal.h
@@ -103,6 +103,12 @@ int crypto_register_notifier(struct notifier_block *nb);
 int crypto_unregister_notifier(struct notifier_block *nb);
 int crypto_probing_notify(unsigned long val, void *v);
 
+static inline struct crypto_alg *crypto_alg_get(struct crypto_alg *alg)
+{
+	atomic_inc(&alg->cra_refcnt);
+	return alg;
+}
+
 static inline void crypto_alg_put(struct crypto_alg *alg)
 {
 	if (atomic_dec_and_test(&alg->cra_refcnt) && alg->cra_destroy)
-- 
1.8.1.2


WARNING: multiple messages have this Message-ID (diff)
From: Kamal Mostafa <kamal@canonical.com>
To: linux-kernel@vger.kernel.org, stable@vger.kernel.org,
	kernel-team@lists.ubuntu.com
Cc: Herbert Xu <herbert@gondor.apana.org.au>,
	Luis Henriques <luis.henriques@canonical.com>
Subject: [PATCH 037/145] crypto: algboss - Hold ref count on larval
Date: Wed, 17 Jul 2013 15:46:09 -0700	[thread overview]
Message-ID: <1374101277-7915-38-git-send-email-kamal@canonical.com> (raw)
In-Reply-To: <1374101277-7915-1-git-send-email-kamal@canonical.com>

3.8.13.5 -stable review patch.  If anyone has any objections, please let me know.

------------------

From: Herbert Xu <herbert@gondor.apana.org.au>

commit 939e17799619e31331d2433041196529515a86a6 upstream.

On Thu, Jun 20, 2013 at 10:00:21AM +0200, Daniel Borkmann wrote:
> After having fixed a NULL pointer dereference in SCTP 1abd165e ("net:
> sctp: fix NULL pointer dereference in socket destruction"), I ran into
> the following NULL pointer dereference in the crypto subsystem with
> the same reproducer, easily hit each time:
>
> BUG: unable to handle kernel NULL pointer dereference at (null)
> IP: [<ffffffff81070321>] __wake_up_common+0x31/0x90
> PGD 0
> Oops: 0000 [#1] SMP
> Modules linked in: padlock_sha(F-) sha256_generic(F) sctp(F) libcrc32c(F) [..]
> CPU: 6 PID: 3326 Comm: cryptomgr_probe Tainted: GF            3.10.0-rc5+ #1
> Hardware name: Dell Inc. PowerEdge T410/0H19HD, BIOS 1.6.3 02/01/2011
> task: ffff88007b6cf4e0 ti: ffff88007b7cc000 task.ti: ffff88007b7cc000
> RIP: 0010:[<ffffffff81070321>]  [<ffffffff81070321>] __wake_up_common+0x31/0x90
> RSP: 0018:ffff88007b7cde08  EFLAGS: 00010082
> RAX: ffffffffffffffe8 RBX: ffff88003756c130 RCX: 0000000000000000
> RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffff88003756c130
> RBP: ffff88007b7cde48 R08: 0000000000000000 R09: ffff88012b173200
> R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000282
> R13: ffff88003756c138 R14: 0000000000000000 R15: 0000000000000000
> FS:  0000000000000000(0000) GS:ffff88012fc60000(0000) knlGS:0000000000000000
> CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> CR2: 0000000000000000 CR3: 0000000001a0b000 CR4: 00000000000007e0
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> Stack:
>  ffff88007b7cde28 0000000300000000 ffff88007b7cde28 ffff88003756c130
>  0000000000000282 ffff88003756c128 ffffffff81227670 0000000000000000
>  ffff88007b7cde78 ffffffff810722b7 ffff88007cdcf000 ffffffff81a90540
> Call Trace:
>  [<ffffffff81227670>] ? crypto_alloc_pcomp+0x20/0x20
>  [<ffffffff810722b7>] complete_all+0x47/0x60
>  [<ffffffff81227708>] cryptomgr_probe+0x98/0xc0
>  [<ffffffff81227670>] ? crypto_alloc_pcomp+0x20/0x20
>  [<ffffffff8106760e>] kthread+0xce/0xe0
>  [<ffffffff81067540>] ? kthread_freezable_should_stop+0x70/0x70
>  [<ffffffff815450dc>] ret_from_fork+0x7c/0xb0
>  [<ffffffff81067540>] ? kthread_freezable_should_stop+0x70/0x70
> Code: 41 56 41 55 41 54 53 48 83 ec 18 66 66 66 66 90 89 75 cc 89 55 c8
>       4c 8d 6f 08 48 8b 57 08 41 89 cf 4d 89 c6 48 8d 42 e
> RIP  [<ffffffff81070321>] __wake_up_common+0x31/0x90
>  RSP <ffff88007b7cde08>
> CR2: 0000000000000000
> ---[ end trace b495b19270a4d37e ]---
>
> My assumption is that the following is happening: the minimal SCTP
> tool runs under ``echo 1 > /proc/sys/net/sctp/auth_enable'', hence
> it's making use of crypto_alloc_hash() via sctp_auth_init_hmacs().
> It forks itself, heavily allocates, binds, listens and waits in
> accept on sctp sockets, and then randomly kills some of them (no
> need for an actual client in this case to hit this). Then, again,
> allocating, binding, etc, and then killing child processes.
>
> The problem that might be happening here is that cryptomgr requests
> the module to probe/load through cryptomgr_schedule_probe(), but
> before the thread handler cryptomgr_probe() returns, we return from
> the wait_for_completion_interruptible() function and probably already
> have cleared up larval, thus we run into a NULL pointer dereference
> when in cryptomgr_probe() complete_all() is being called.
>
> If we wait with wait_for_completion() instead, this panic will not
> occur anymore. This is valid, because in case a signal is pending,
> cryptomgr_probe() returns from probing anyway with properly calling
> complete_all().

The use of wait_for_completion_interruptible is intentional so that
we don't lock up the thread if a bug causes us to never wake up.

This bug is caused by the helper thread using the larval without
holding a reference count on it.  If the helper thread completes
after the original thread requesting for help has gone away and
destroyed the larval, then we get the crash above.

So the fix is to hold a reference count on the larval.

Reported-by: Daniel Borkmann <dborkman@redhat.com>
Tested-by: Daniel Borkmann <dborkman@redhat.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Luis Henriques <luis.henriques@canonical.com>
---
 crypto/algboss.c  | 15 ++++++++-------
 crypto/api.c      |  6 ------
 crypto/internal.h |  6 ++++++
 3 files changed, 14 insertions(+), 13 deletions(-)

diff --git a/crypto/algboss.c b/crypto/algboss.c
index 769219b..76fc0b2 100644
--- a/crypto/algboss.c
+++ b/crypto/algboss.c
@@ -45,10 +45,9 @@ struct cryptomgr_param {
 		} nu32;
 	} attrs[CRYPTO_MAX_ATTRS];
 
-	char larval[CRYPTO_MAX_ALG_NAME];
 	char template[CRYPTO_MAX_ALG_NAME];
 
-	struct completion *completion;
+	struct crypto_larval *larval;
 
 	u32 otype;
 	u32 omask;
@@ -87,7 +86,8 @@ static int cryptomgr_probe(void *data)
 	crypto_tmpl_put(tmpl);
 
 out:
-	complete_all(param->completion);
+	complete_all(&param->larval->completion);
+	crypto_alg_put(&param->larval->alg);
 	kfree(param);
 	module_put_and_exit(0);
 }
@@ -187,18 +187,19 @@ static int cryptomgr_schedule_probe(struct crypto_larval *larval)
 	param->otype = larval->alg.cra_flags;
 	param->omask = larval->mask;
 
-	memcpy(param->larval, larval->alg.cra_name, CRYPTO_MAX_ALG_NAME);
-
-	param->completion = &larval->completion;
+	crypto_alg_get(&larval->alg);
+	param->larval = larval;
 
 	thread = kthread_run(cryptomgr_probe, param, "cryptomgr_probe");
 	if (IS_ERR(thread))
-		goto err_free_param;
+		goto err_put_larval;
 
 	wait_for_completion_interruptible(&larval->completion);
 
 	return NOTIFY_STOP;
 
+err_put_larval:
+	crypto_alg_put(&larval->alg);
 err_free_param:
 	kfree(param);
 err_put_module:
diff --git a/crypto/api.c b/crypto/api.c
index 033a714..3b61803 100644
--- a/crypto/api.c
+++ b/crypto/api.c
@@ -34,12 +34,6 @@ EXPORT_SYMBOL_GPL(crypto_alg_sem);
 BLOCKING_NOTIFIER_HEAD(crypto_chain);
 EXPORT_SYMBOL_GPL(crypto_chain);
 
-static inline struct crypto_alg *crypto_alg_get(struct crypto_alg *alg)
-{
-	atomic_inc(&alg->cra_refcnt);
-	return alg;
-}
-
 struct crypto_alg *crypto_mod_get(struct crypto_alg *alg)
 {
 	return try_module_get(alg->cra_module) ? crypto_alg_get(alg) : NULL;
diff --git a/crypto/internal.h b/crypto/internal.h
index 9ebedae..bd39bfc 100644
--- a/crypto/internal.h
+++ b/crypto/internal.h
@@ -103,6 +103,12 @@ int crypto_register_notifier(struct notifier_block *nb);
 int crypto_unregister_notifier(struct notifier_block *nb);
 int crypto_probing_notify(unsigned long val, void *v);
 
+static inline struct crypto_alg *crypto_alg_get(struct crypto_alg *alg)
+{
+	atomic_inc(&alg->cra_refcnt);
+	return alg;
+}
+
 static inline void crypto_alg_put(struct crypto_alg *alg)
 {
 	if (atomic_dec_and_test(&alg->cra_refcnt) && alg->cra_destroy)
-- 
1.8.1.2


  parent reply	other threads:[~2013-07-17 22:56 UTC|newest]

Thread overview: 152+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-07-17 22:45 [ 3.8.y.z extended stable ] Linux 3.8.13.5 stable review Kamal Mostafa
2013-07-17 22:45 ` [PATCH 001/145] UBIFS: correct mount message Kamal Mostafa
2013-07-17 22:45 ` [PATCH 002/145] [SCSI] zfcp: fix adapter (re)open recovery while link to SAN is down Kamal Mostafa
2013-07-17 22:45 ` [PATCH 003/145] [SCSI] zfcp: block queue limits with data router Kamal Mostafa
2013-07-17 22:45 ` [PATCH 004/145] [SCSI] zfcp: status read buffers on first adapter open with link down Kamal Mostafa
2013-07-17 22:45 ` [PATCH 005/145] ahci: Add AMD CZ SATA device ID Kamal Mostafa
2013-07-17 22:45 ` [PATCH 006/145] i2c-piix4: Add AMD CZ SMBus " Kamal Mostafa
2013-07-17 22:45 ` [PATCH 007/145] sata_highbank: increase retry count but shorten duration for Calxeda controller Kamal Mostafa
2013-07-17 22:45 ` [PATCH 008/145] clocksource: dw_apb: Fix error check Kamal Mostafa
2013-07-17 22:45 ` [PATCH 009/145] zram: avoid invalid memory access in zram_exit() Kamal Mostafa
2013-07-17 22:45 ` [PATCH 010/145] zram: use zram->lock to protect zram_free_page() in swap free notify path Kamal Mostafa
2013-07-17 22:45 ` [PATCH 011/145] zram: destroy all devices on error recovery path in zram_init() Kamal Mostafa
2013-07-17 22:45 ` [PATCH 012/145] zram: avoid access beyond the zram device Kamal Mostafa
2013-07-17 22:45 ` [PATCH 013/145] zram: protect sysfs handler from invalid memory access Kamal Mostafa
2013-07-17 22:45 ` [PATCH 014/145] pcmcia: at91_cf: fix gpio_get_value in at91_cf_get_status Kamal Mostafa
2013-07-17 22:45 ` [PATCH 015/145] PCI: Fix refcount issue in pci_create_root_bus() error recovery path Kamal Mostafa
2013-07-17 22:45 ` [PATCH 016/145] ahci: remove pmp link online check in FBS EH Kamal Mostafa
2013-07-17 22:45 ` [PATCH 017/145] usb: gadget: f_mass_storage: add missing memory barrier for thread_wakeup_needed Kamal Mostafa
2013-07-17 22:45 ` [PATCH 018/145] x86, efi: retry ExitBootServices() on failure Kamal Mostafa
2013-07-17 22:45 ` [PATCH 019/145] libata: skip SRST for all SIMG [34]7x port-multipliers Kamal Mostafa
2013-07-17 22:45 ` [PATCH 020/145] ASoC: wm8962: Remove remaining direct register cache accesses Kamal Mostafa
2013-07-17 22:45 ` [PATCH 021/145] xen/pcifront: Deal with toolstack missing 'XenbusStateClosing' state Kamal Mostafa
2013-07-17 22:45 ` [PATCH 022/145] ACPICA: Do not use extended sleep registers unless HW-reduced bit is set Kamal Mostafa
2013-07-17 22:45 ` [PATCH 023/145] ALSA: hda - Cache the MUX selection for generic HDMI Kamal Mostafa
2013-07-17 22:45 ` [PATCH 024/145] cgroup: fix umount vs cgroup_cfts_commit() race Kamal Mostafa
2013-07-17 22:45 ` [PATCH 025/145] cgroup: fix umount vs cgroup_event_remove() race Kamal Mostafa
2013-07-17 22:45 ` [PATCH 026/145] xhci: check for failed dma pool allocation Kamal Mostafa
2013-07-17 22:45 ` [PATCH 027/145] powerpc/eeh: Fix fetching bus for single-dev-PE Kamal Mostafa
2013-07-17 22:46 ` [PATCH 028/145] ata_piix: IDE-mode SATA patch for Intel Coleto Creek DeviceIDs Kamal Mostafa
2013-07-17 22:46 ` [PATCH 029/145] ahci: AHCI-mode " Kamal Mostafa
2013-07-17 22:46 ` [PATCH 030/145] ARM: 7765/1: perf: Record the user-mode PC in the call chain Kamal Mostafa
2013-07-17 22:46 ` [PATCH 031/145] [SCSI] mpt2sas: Fix for issue Missing delay not getting set during system bootup Kamal Mostafa
2013-07-17 22:46 ` [PATCH 032/145] [SCSI] mpt2sas: Fix for device scan following host reset could get stuck in a infinite loop Kamal Mostafa
2013-07-17 22:46 ` [PATCH 033/145] [SCSI] mpt2sas: fix firmware failure with wrong task attribute Kamal Mostafa
2013-07-17 22:46 ` [PATCH 034/145] usb: host: xhci-plat: release mem region while removing module Kamal Mostafa
2013-07-17 22:46 ` [PATCH 035/145] USB: option,qcserial: move Novatel Gobi1K IDs to qcserial Kamal Mostafa
2013-07-17 22:46 ` [PATCH 036/145] powerpc/hw_brk: Fix setting of length for exact mode breakpoints Kamal Mostafa
2013-07-17 22:46 ` Kamal Mostafa [this message]
2013-07-17 22:46   ` [PATCH 037/145] crypto: algboss - Hold ref count on larval Kamal Mostafa
2013-07-17 22:46 ` [PATCH 038/145] x86: Fix /proc/mtrr with base/size more than 44bits Kamal Mostafa
2013-07-17 22:46 ` [PATCH 039/145] futex: Take hugepages into account when generating futex_key Kamal Mostafa
2013-07-17 22:46 ` [PATCH 040/145] pch_uart: Add uart_clk selection for the MinnowBoard Kamal Mostafa
2013-07-17 22:46 ` [PATCH 041/145] perf: Disable monitoring on setuid processes for regular users Kamal Mostafa
2013-07-17 22:46 ` [PATCH 042/145] [SCSI] sd: Fix parsing of 'temporary ' cache mode prefix Kamal Mostafa
2013-07-17 22:46 ` [PATCH 043/145] Handle big endianness in NTLM (ntlmv2) authentication Kamal Mostafa
2013-07-17 22:46 ` [PATCH 044/145] [SCSI] sd: Update WRITE SAME heuristics Kamal Mostafa
2013-07-17 22:46 ` [PATCH 045/145] [SCSI] aacraid: Fix for arrays are going offline in the system. System hangs Kamal Mostafa
2013-07-17 22:46 ` [PATCH 046/145] genirq: Fix can_request_irq() for IRQs without an action Kamal Mostafa
2013-07-17 22:46 ` [PATCH 047/145] timer: Fix jiffies wrap behavior of round_jiffies_common() Kamal Mostafa
2013-07-17 22:46 ` [PATCH 048/145] xen/time: remove blocked time accounting from xen "clockchip" Kamal Mostafa
2013-07-17 22:46 ` [PATCH 049/145] UBIFS: prepare to fix a horrid bug Kamal Mostafa
2013-07-17 22:46 ` [PATCH 050/145] UBIFS: " Kamal Mostafa
2013-07-17 22:46 ` [PATCH 051/145] Revert "serial: 8250_pci: add support for another kind of NetMos Technology PCI 9835 Multi-I/O Controller" Kamal Mostafa
2013-07-17 22:46 ` [PATCH 052/145] powerpc/smp: Section mismatch from smp_release_cpus to __initdata spinning_secondaries Kamal Mostafa
2013-07-17 22:46 ` [PATCH 053/145] ext4: fix corruption when online resizing a fs with 1K block size Kamal Mostafa
2013-07-17 22:46 ` [PATCH 054/145] jbd2: move superblock checksum calculation to jbd2_write_superblock() Kamal Mostafa
2013-07-17 22:46 ` [PATCH 055/145] ext3,ext4: don't mess with dir_file->f_pos in htree_dirblock_to_tree() Kamal Mostafa
2013-07-17 22:46 ` [PATCH 056/145] jbd2: fix theoretical race in jbd2__journal_restart Kamal Mostafa
2013-07-17 22:46 ` [PATCH 057/145] tick: Prevent uncontrolled switch to oneshot mode Kamal Mostafa
2013-07-17 22:46 ` [PATCH 058/145] md/raid10: fix two bugs affecting RAID10 reshape Kamal Mostafa
2013-07-17 22:46 ` [PATCH 059/145] HID: apple: Add support for the 2013 Macbook Air Kamal Mostafa
2013-07-17 22:46 ` [PATCH 060/145] Input: bcm5974 - add support for the 2013 MacBook Air Kamal Mostafa
2013-07-17 22:46 ` [PATCH 061/145] drivers/dma/pl330.c: fix locking in pl330_free_chan_resources() Kamal Mostafa
2013-07-17 22:46 ` [PATCH 062/145] ocfs2: xattr: fix inlined xattr reflink Kamal Mostafa
2013-07-17 22:46 ` [PATCH 063/145] block: do not pass disk names as format strings Kamal Mostafa
2013-07-17 22:46 ` [PATCH 064/145] crypto: sanitize argument for format string Kamal Mostafa
2013-07-17 22:46   ` Kamal Mostafa
2013-07-17 22:46 ` [PATCH 065/145] mm/memory-hotplug: fix lowmem count overflow when offline pages Kamal Mostafa
2013-07-17 22:46 ` [PATCH 066/145] drivers/rtc/rtc-rv3029c2.c: fix disabling AIE irq Kamal Mostafa
2013-07-17 22:46 ` [PATCH 067/145] nbd: correct disconnect behavior Kamal Mostafa
2013-07-17 22:46 ` [PATCH 068/145] hpfs: better test for errors Kamal Mostafa
2013-07-17 22:46 ` [PATCH 069/145] Drivers: hv: Execute shutdown in a thread context Kamal Mostafa
2013-07-17 22:46 ` [PATCH 070/145] ext3: fix data=journal fast mount/umount hang Kamal Mostafa
2013-07-17 22:46 ` [PATCH 071/145] netfilter: xt_TCPOPTSTRIP: fix possible mangling beyond packet boundary Kamal Mostafa
2013-07-17 22:46 ` [PATCH 072/145] netfilter: ipt_ULOG: fix non-null terminated string in the nf_log path Kamal Mostafa
2013-07-17 22:46 ` [PATCH 073/145] netfilter: add nf_ipv6_ops hook to fix xt_addrtype with IPv6 Kamal Mostafa
2013-07-17 22:46 ` [PATCH 074/145] ipvs: Fix reuse connection if real server is dead Kamal Mostafa
2013-07-17 22:46 ` [PATCH 075/145] netfilter: xt_LOG: fix mark logging for IPv6 packets Kamal Mostafa
2013-07-17 22:46 ` [PATCH 076/145] ipvs: info leak in __ip_vs_get_dest_entries() Kamal Mostafa
2013-07-17 22:46 ` [PATCH 077/145] netfilter: nfnetlink_cttimeout: fix incomplete dumping of objects Kamal Mostafa
2013-07-17 22:46 ` [PATCH 078/145] netfilter: nfnetlink_acct: " Kamal Mostafa
2013-07-17 22:46 ` [PATCH 079/145] netfilter: xt_TCPMSS: Fix violation of RFC879 in absence of MSS option Kamal Mostafa
2013-07-17 22:46 ` [PATCH 080/145] netfilter: xt_TCPOPTSTRIP: don't use tcp_hdr() Kamal Mostafa
2013-07-17 22:46 ` [PATCH 081/145] netfilter: xt_TCPMSS: Fix missing fragmentation handling Kamal Mostafa
2013-07-17 22:46 ` [PATCH 082/145] netfilter: xt_TCPMSS: Fix IPv6 default MSS too Kamal Mostafa
2013-07-17 22:46 ` [PATCH 083/145] ipvs: SCTP ports should be writable in ICMP packets Kamal Mostafa
2013-07-17 22:46 ` [PATCH 084/145] tracing: Use current_uid() for critical time tracing Kamal Mostafa
2013-07-17 22:46 ` [PATCH 085/145] ext4: fix overflow when counting used blocks on 32-bit architectures Kamal Mostafa
2013-07-17 22:46 ` [PATCH 086/145] ext4: fix data offset overflow in ext4_xattr_fiemap() on 32-bit archs Kamal Mostafa
2013-07-17 22:46 ` [PATCH 087/145] ext4: fix overflows in SEEK_HOLE, SEEK_DATA implementations Kamal Mostafa
2013-07-17 22:47 ` [PATCH 088/145] ext4: fix data offset overflow on 32-bit archs in ext4_inline_data_fiemap() Kamal Mostafa
2013-07-17 22:47 ` [PATCH 089/145] iommu/vt-d: add quirk for broken interrupt remapping on 55XX chipsets Kamal Mostafa
2013-07-18  8:02   ` Thomas Backlund
2013-07-18 10:37     ` Neil Horman
2013-07-18 13:45       ` Thomas Backlund
2013-07-18 18:30         ` Kamal Mostafa
2013-07-17 22:47 ` [PATCH 090/145] dma: tegra: avoid channel lock up after free Kamal Mostafa
2013-07-17 22:47 ` [PATCH 091/145] drivers/cdrom/cdrom.c: use kzalloc() for failing hardware Kamal Mostafa
2013-07-17 22:47 ` [PATCH 092/145] printk: Fix rq->lock vs logbuf_lock unlock lock inversion Kamal Mostafa
2013-07-17 22:47 ` [PATCH 093/145] charger-manager: Ensure event is not used as format string Kamal Mostafa
2013-07-17 22:47 ` [PATCH 094/145] drm/radeon: add backlight quirk for hybrid mac Kamal Mostafa
2013-07-17 22:47 ` [PATCH 095/145] b43: ensue that BCMA is "y" when B43 is "y" Kamal Mostafa
2013-07-17 22:47 ` [PATCH 096/145] ath9k_hw: Assign default xlna config for AR9485 Kamal Mostafa
2013-07-17 22:47 ` [PATCH 097/145] ath9k: Do not assign noise for NULL caldata Kamal Mostafa
2013-07-17 22:47 ` [PATCH 098/145] iwlwifi: pcie: fix race in queue unmapping Kamal Mostafa
2013-07-17 22:47 ` [PATCH 099/145] iwlwifi: pcie: wake the queue if stopped when being unmapped Kamal Mostafa
2013-07-17 22:47 ` [PATCH 100/145] rtlwifi: rtl8192cu: Add new USB ID for TP-Link TL-WN8200ND Kamal Mostafa
2013-07-17 22:47 ` [PATCH 101/145] [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side Kamal Mostafa
2013-07-17 22:47 ` [PATCH 102/145] MIPS: Octeon: Don't clobber bootloader data structures Kamal Mostafa
2013-07-17 22:47 ` [PATCH 103/145] iommu/amd: Only unmap large pages from the first pte Kamal Mostafa
2013-07-17 22:47 ` [PATCH 104/145] rt2x00: read 5GHz TX power values from the correct offset Kamal Mostafa
2013-07-17 22:47 ` [PATCH 105/145] rtlwifi: rtl8723ae: Fix typo in firmware names Kamal Mostafa
2013-07-17 22:47 ` [PATCH 106/145] writeback: Fix periodic writeback after fs mount Kamal Mostafa
2013-07-17 22:47 ` [PATCH 107/145] drm/i915: Fix context sizes on HSW Kamal Mostafa
2013-07-17 22:47 ` [PATCH 108/145] drm/i915: Only clear write-domains after a successful wait-seqno Kamal Mostafa
2013-07-17 22:47 ` [PATCH 109/145] nfsd4: fix decoding of compounds across page boundaries Kamal Mostafa
2013-07-17 22:47 ` [PATCH 110/145] svcrpc: fix handling of too-short rpc's Kamal Mostafa
2013-07-17 22:47 ` [PATCH 111/145] svcrpc: don't error out on small tcp fragment Kamal Mostafa
2013-07-17 22:47 ` [PATCH 112/145] ARM: shmobile: emev2 GIO3 resource fix Kamal Mostafa
2013-07-17 22:47 ` [PATCH 113/145] Btrfs: fix unlock after free on rewinded tree blocks Kamal Mostafa
2013-07-17 22:47 ` [PATCH 114/145] Btrfs: hold the tree mod lock in __tree_mod_log_rewind Kamal Mostafa
2013-07-17 22:47 ` [PATCH 115/145] Btrfs: only do the tree_mod_log_free_eb if this is our last ref Kamal Mostafa
2013-07-17 22:47 ` [PATCH 116/145] uprobes: Fix return value in error handling path Kamal Mostafa
2013-07-17 22:47 ` [PATCH 117/145] module: do percpu allocation after uniqueness check. No, really! Kamal Mostafa
2013-07-17 22:47 ` [PATCH 118/145] libceph: Fix NULL pointer dereference in auth client code Kamal Mostafa
2013-07-17 22:47 ` [PATCH 119/145] [CIFS] use sensible file nlink values if unprovided Kamal Mostafa
2013-07-17 22:47 ` [PATCH 120/145] drm/nouveau: use vmalloc for pgt allocation Kamal Mostafa
2013-07-17 22:47 ` [PATCH 121/145] drm/nva3/disp: Fix HDMI audio regression Kamal Mostafa
2013-07-17 22:47 ` [PATCH 122/145] ACPI / power: add missing newline to debug messages Kamal Mostafa
2013-07-17 22:47 ` [PATCH 123/145] [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries Kamal Mostafa
2013-07-17 22:47 ` [PATCH 124/145] iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow Kamal Mostafa
2013-07-17 22:47 ` [PATCH 125/145] [SCSI] mpt3sas: fix for kernel panic when driver loads with HBA conected to non LUN 0 configured expander Kamal Mostafa
2013-07-17 22:47 ` [PATCH 126/145] [SCSI] mpt3sas: Infinite loops can occur if MPI2_IOCSTATUS_CONFIG_INVALID_PAGE is not returned Kamal Mostafa
2013-07-17 22:47 ` [PATCH 127/145] parisc: Fix gcc miscompilation in pa_memcpy() Kamal Mostafa
2013-07-17 22:47 ` [PATCH 128/145] ARM: 7778/1: smp_twd: twd_update_frequency need be run on all online CPUs Kamal Mostafa
2013-07-17 22:47 ` [PATCH 129/145] dm mpath: fix ioctl deadlock when no paths Kamal Mostafa
2013-07-17 22:47 ` [PATCH 130/145] dm ioctl: set noio flag to avoid __vmalloc deadlock Kamal Mostafa
2013-07-17 22:47 ` [PATCH 131/145] dm verity: fix inability to use a few specific devices sizes Kamal Mostafa
2013-07-17 22:47 ` [PATCH 132/145] CIFS: Fix a deadlock when a file is reopened Kamal Mostafa
2013-07-17 22:47 ` [PATCH 133/145] perf: Clone child context from parent context pmu Kamal Mostafa
2013-07-17 22:47 ` [PATCH 134/145] perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid scenario Kamal Mostafa
2013-07-17 22:47 ` [PATCH 135/145] perf: Fix perf_lock_task_context() vs RCU Kamal Mostafa
2013-07-17 22:47 ` [PATCH 136/145] MFD: rtsx_pcr: Fix probe fail path Kamal Mostafa
2013-07-17 22:47 ` [PATCH 137/145] x86, efivars: firmware bug workarounds should be in platform code Kamal Mostafa
2013-07-17 22:47 ` [PATCH 138/145] x86, efi: remove duplicate code in setup_arch() by using, efi_is_native() Kamal Mostafa
2013-07-17 22:47 ` [PATCH 139/145] x86,efi: Implement efi_no_storage_paranoia parameter Kamal Mostafa
2013-07-17 22:47 ` [PATCH 140/145] Modify UEFI anti-bricking code Kamal Mostafa
2013-07-17 22:47 ` [PATCH 141/145] x86/efi: Fix dummy variable buffer allocation Kamal Mostafa
2013-07-17 22:47 ` [PATCH 142/145] lockd: protect nlm_blocked access in nlmsvc_retry_blocked Kamal Mostafa
2013-07-17 22:47 ` [PATCH 143/145] ext4: don't show usrquota/grpquota twice in /proc/mounts Kamal Mostafa
2013-07-17 22:47 ` [PATCH 144/145] ext4: don't allow ext4_free_blocks() to fail due to ENOMEM Kamal Mostafa
2013-07-17 22:47 ` [PATCH 145/145] svcrdma: underflow issue in decode_write_list() Kamal Mostafa

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1374101277-7915-38-git-send-email-kamal@canonical.com \
    --to=kamal@canonical.com \
    --cc=herbert@gondor.hengli.com.au \
    --cc=kernel-team@lists.ubuntu.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=luis.henriques@canonical.com \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.