All of lore.kernel.org
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
	stable@vger.kernel.org, Eric Dumazet <edumazet@google.com>,
	syzbot <syzkaller@googlegroups.com>,
	Jay Vosburgh <j.vosburgh@gmail.com>,
	Veaceslav Falico <vfalico@gmail.com>,
	Andy Gospodarek <andy@greyhouse.net>,
	"David S. Miller" <davem@davemloft.net>
Subject: [PATCH 4.14 29/99] bonding/alb: make sure arp header is pulled before accessing it
Date: Thu, 19 Mar 2020 14:03:07 +0100	[thread overview]
Message-ID: <20200319123950.580684040@linuxfoundation.org> (raw)
In-Reply-To: <20200319123941.630731708@linuxfoundation.org>

From: Eric Dumazet <edumazet@google.com>

commit b7469e83d2add567e4e0b063963db185f3167cea upstream.

Similar to commit 38f88c454042 ("bonding/alb: properly access headers
in bond_alb_xmit()"), we need to make sure arp header was pulled
in skb->head before blindly accessing it in rlb_arp_xmit().

Remove arp_pkt() private helper, since it is more readable/obvious
to have the following construct back to back :

	if (!pskb_network_may_pull(skb, sizeof(*arp)))
		return NULL;
	arp = (struct arp_pkt *)skb_network_header(skb);

syzbot reported :

BUG: KMSAN: uninit-value in bond_slave_has_mac_rx include/net/bonding.h:704 [inline]
BUG: KMSAN: uninit-value in rlb_arp_xmit drivers/net/bonding/bond_alb.c:662 [inline]
BUG: KMSAN: uninit-value in bond_alb_xmit+0x575/0x25e0 drivers/net/bonding/bond_alb.c:1477
CPU: 0 PID: 12743 Comm: syz-executor.4 Not tainted 5.6.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1c9/0x220 lib/dump_stack.c:118
 kmsan_report+0xf7/0x1e0 mm/kmsan/kmsan_report.c:118
 __msan_warning+0x58/0xa0 mm/kmsan/kmsan_instr.c:215
 bond_slave_has_mac_rx include/net/bonding.h:704 [inline]
 rlb_arp_xmit drivers/net/bonding/bond_alb.c:662 [inline]
 bond_alb_xmit+0x575/0x25e0 drivers/net/bonding/bond_alb.c:1477
 __bond_start_xmit drivers/net/bonding/bond_main.c:4257 [inline]
 bond_start_xmit+0x85d/0x2f70 drivers/net/bonding/bond_main.c:4282
 __netdev_start_xmit include/linux/netdevice.h:4524 [inline]
 netdev_start_xmit include/linux/netdevice.h:4538 [inline]
 xmit_one net/core/dev.c:3470 [inline]
 dev_hard_start_xmit+0x531/0xab0 net/core/dev.c:3486
 __dev_queue_xmit+0x37de/0x4220 net/core/dev.c:4063
 dev_queue_xmit+0x4b/0x60 net/core/dev.c:4096
 packet_snd net/packet/af_packet.c:2967 [inline]
 packet_sendmsg+0x8347/0x93b0 net/packet/af_packet.c:2992
 sock_sendmsg_nosec net/socket.c:652 [inline]
 sock_sendmsg net/socket.c:672 [inline]
 __sys_sendto+0xc1b/0xc50 net/socket.c:1998
 __do_sys_sendto net/socket.c:2010 [inline]
 __se_sys_sendto+0x107/0x130 net/socket.c:2006
 __x64_sys_sendto+0x6e/0x90 net/socket.c:2006
 do_syscall_64+0xb8/0x160 arch/x86/entry/common.c:296
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x45c479
Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fc77ffbbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007fc77ffbc6d4 RCX: 000000000045c479
RDX: 000000000000000e RSI: 00000000200004c0 RDI: 0000000000000003
RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 0000000000000a04 R14: 00000000004cc7b0 R15: 000000000076bf2c

Uninit was created at:
 kmsan_save_stack_with_flags mm/kmsan/kmsan.c:144 [inline]
 kmsan_internal_poison_shadow+0x66/0xd0 mm/kmsan/kmsan.c:127
 kmsan_slab_alloc+0x8a/0xe0 mm/kmsan/kmsan_hooks.c:82
 slab_alloc_node mm/slub.c:2793 [inline]
 __kmalloc_node_track_caller+0xb40/0x1200 mm/slub.c:4401
 __kmalloc_reserve net/core/skbuff.c:142 [inline]
 __alloc_skb+0x2fd/0xac0 net/core/skbuff.c:210
 alloc_skb include/linux/skbuff.h:1051 [inline]
 alloc_skb_with_frags+0x18c/0xa70 net/core/skbuff.c:5766
 sock_alloc_send_pskb+0xada/0xc60 net/core/sock.c:2242
 packet_alloc_skb net/packet/af_packet.c:2815 [inline]
 packet_snd net/packet/af_packet.c:2910 [inline]
 packet_sendmsg+0x66a0/0x93b0 net/packet/af_packet.c:2992
 sock_sendmsg_nosec net/socket.c:652 [inline]
 sock_sendmsg net/socket.c:672 [inline]
 __sys_sendto+0xc1b/0xc50 net/socket.c:1998
 __do_sys_sendto net/socket.c:2010 [inline]
 __se_sys_sendto+0x107/0x130 net/socket.c:2006
 __x64_sys_sendto+0x6e/0x90 net/socket.c:2006
 do_syscall_64+0xb8/0x160 arch/x86/entry/common.c:296
 entry_SYSCALL_64_after_hwframe+0x44/0xa9

Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Reported-by: syzbot <syzkaller@googlegroups.com>
Cc: Jay Vosburgh <j.vosburgh@gmail.com>
Cc: Veaceslav Falico <vfalico@gmail.com>
Cc: Andy Gospodarek <andy@greyhouse.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
 drivers/net/bonding/bond_alb.c |   20 ++++++++++----------
 1 file changed, 10 insertions(+), 10 deletions(-)

--- a/drivers/net/bonding/bond_alb.c
+++ b/drivers/net/bonding/bond_alb.c
@@ -71,11 +71,6 @@ struct arp_pkt {
 };
 #pragma pack()
 
-static inline struct arp_pkt *arp_pkt(const struct sk_buff *skb)
-{
-	return (struct arp_pkt *)skb_network_header(skb);
-}
-
 /* Forward declaration */
 static void alb_send_learning_packets(struct slave *slave, u8 mac_addr[],
 				      bool strict_match);
@@ -574,10 +569,11 @@ static void rlb_req_update_subnet_client
 	spin_unlock(&bond->mode_lock);
 }
 
-static struct slave *rlb_choose_channel(struct sk_buff *skb, struct bonding *bond)
+static struct slave *rlb_choose_channel(struct sk_buff *skb,
+					struct bonding *bond,
+					const struct arp_pkt *arp)
 {
 	struct alb_bond_info *bond_info = &(BOND_ALB_INFO(bond));
-	struct arp_pkt *arp = arp_pkt(skb);
 	struct slave *assigned_slave, *curr_active_slave;
 	struct rlb_client_info *client_info;
 	u32 hash_index = 0;
@@ -674,8 +670,12 @@ static struct slave *rlb_choose_channel(
  */
 static struct slave *rlb_arp_xmit(struct sk_buff *skb, struct bonding *bond)
 {
-	struct arp_pkt *arp = arp_pkt(skb);
 	struct slave *tx_slave = NULL;
+	struct arp_pkt *arp;
+
+	if (!pskb_network_may_pull(skb, sizeof(*arp)))
+		return NULL;
+	arp = (struct arp_pkt *)skb_network_header(skb);
 
 	/* Don't modify or load balance ARPs that do not originate locally
 	 * (e.g.,arrive via a bridge).
@@ -685,7 +685,7 @@ static struct slave *rlb_arp_xmit(struct
 
 	if (arp->op_code == htons(ARPOP_REPLY)) {
 		/* the arp must be sent on the selected rx channel */
-		tx_slave = rlb_choose_channel(skb, bond);
+		tx_slave = rlb_choose_channel(skb, bond, arp);
 		if (tx_slave)
 			bond_hw_addr_copy(arp->mac_src, tx_slave->dev->dev_addr,
 					  tx_slave->dev->addr_len);
@@ -696,7 +696,7 @@ static struct slave *rlb_arp_xmit(struct
 		 * When the arp reply is received the entry will be updated
 		 * with the correct unicast address of the client.
 		 */
-		rlb_choose_channel(skb, bond);
+		rlb_choose_channel(skb, bond, arp);
 
 		/* The ARP reply packets must be delayed so that
 		 * they can cancel out the influence of the ARP request.



  parent reply	other threads:[~2020-03-19 13:15 UTC|newest]

Thread overview: 103+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-03-19 13:02 [PATCH 4.14 00/99] 4.14.174-rc1 review Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 01/99] phy: Revert toggling reset changes Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 02/99] net: phy: Avoid multiple suspends Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 03/99] cgroup, netclassid: periodically release file_lock on classid updating Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 04/99] gre: fix uninit-value in __iptunnel_pull_header Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 05/99] ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 06/99] ipvlan: add cond_resched_rcu() while processing muticast backlog Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 07/99] ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 08/99] netlink: Use netlink header as base to calculate bad attribute offset Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 09/99] net: macsec: update SCI upon MAC address change Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 10/99] net: nfc: fix bounds checking bugs on "pipe" Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 11/99] net/packet: tpacket_rcv: do not increment ring index on drop Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 12/99] r8152: check disconnect status after long sleep Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 13/99] sfc: detach from cb_page in efx_copy_channel() Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 14/99] bnxt_en: reinitialize IRQs when MTU is modified Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 15/99] cgroup: memcg: net: do not associate sock with unrelated cgroup Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 16/99] net: memcg: late association of sock to memcg Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 17/99] net: memcg: fix lockdep splat in inet_csk_accept() Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 18/99] fib: add missing attribute validation for tun_id Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 19/99] nl802154: add missing attribute validation Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 20/99] nl802154: add missing attribute validation for dev_type Greg Kroah-Hartman
2020-03-19 13:02 ` [PATCH 4.14 21/99] can: add missing attribute validation for termination Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 22/99] macsec: add missing attribute validation for port Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 23/99] net: fq: add missing attribute validation for orphan mask Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 24/99] team: add missing attribute validation for port ifindex Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 25/99] team: add missing attribute validation for array index Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 26/99] nfc: add missing attribute validation for SE API Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 27/99] nfc: add missing attribute validation for vendor subcommand Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 28/99] net: phy: fix MDIO bus PM PHY resuming Greg Kroah-Hartman
2020-03-19 13:03 ` Greg Kroah-Hartman [this message]
2020-03-19 13:03 ` [PATCH 4.14 30/99] slip: make slhc_compress() more robust against malicious packets Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 31/99] net: fec: validate the new settings in fec_enet_set_coalesce() Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 32/99] macvlan: add cond_resched() during multicast processing Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 33/99] inet_diag: return classid for all socket types Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 34/99] ipvlan: do not add hardware address of master to its unicast filter list Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 35/99] ipvlan: egress mcast packets are not exceptional Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 36/99] ipvlan: dont deref eth hdr before checking its set Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 37/99] cgroup: cgroup_procs_next should increase position index Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 38/99] cgroup: Iterate tasks that did not finish do_exit() Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 39/99] iwlwifi: mvm: Do not require PHY_SKU NVM section for 3168 devices Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 40/99] virtio-blk: fix hw_queue stopped on arbitrary error Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 41/99] iommu/vt-d: quirk_ioat_snb_local_iommu: replace WARN_TAINT with pr_warn + add_taint Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 42/99] workqueue: dont use wq_select_unbound_cpu() for bound works Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 43/99] drm/amd/display: remove duplicated assignment to grph_obj_type Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 44/99] ktest: Add timeout for ssh sync testing Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 45/99] cifs_atomic_open(): fix double-put on late allocation failure Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 46/99] gfs2_atomic_open(): fix O_EXCL|O_CREAT handling on cold dcache Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 47/99] KVM: x86: clear stale x86_emulate_ctxt->intercept value Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 48/99] ARC: define __ALIGN_STR and __ALIGN symbols for ARC Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 49/99] efi: Fix a race and a buffer overflow while reading efivars via sysfs Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 50/99] x86/mce: Fix logic and comments around MSR_PPIN_CTL Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 51/99] iommu/dma: Fix MSI reservation allocation Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 52/99] iommu/vt-d: dmar: replace WARN_TAINT with pr_warn + add_taint Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 53/99] iommu/vt-d: Fix a bug in intel_iommu_iova_to_phys() for huge page Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 54/99] pinctrl: meson-gxl: fix GPIOX sdio pins Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 55/99] pinctrl: core: Remove extra kref_get which blocks hogs being freed Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 56/99] nl80211: add missing attribute validation for critical protocol indication Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 57/99] nl80211: add missing attribute validation for beacon report scanning Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 58/99] nl80211: add missing attribute validation for channel switch Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 59/99] netfilter: cthelper: add missing attribute validation for cthelper Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 60/99] netfilter: nft_payload: add missing attribute validation for payload csum flags Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 61/99] iommu/vt-d: Fix the wrong printing in RHSA parsing Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 62/99] iommu/vt-d: Ignore devices with out-of-spec domain number Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 63/99] i2c: acpi: put device when verifying client fails Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 64/99] ipv6: restrict IPV6_ADDRFORM operation Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 65/99] net/smc: check for valid ib_client_data Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 66/99] efi: Add a sanity check to efivar_store_raw() Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 67/99] batman-adv: Avoid spurious warnings from bat_v neigh_cmp implementation Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 68/99] batman-adv: Always initialize fragment header priority Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 69/99] batman-adv: Fix check of retrieved orig_gw in batadv_v_gw_is_eligible Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 70/99] batman-adv: Fix lock for ogm cnt access in batadv_iv_ogm_calc_tq Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 71/99] batman-adv: Fix internal interface indices types Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 72/99] batman-adv: update data pointers after skb_cow() Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 73/99] batman-adv: Avoid race in TT TVLV allocator helper Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 74/99] batman-adv: Fix TT sync flags for intermediate TT responses Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 75/99] batman-adv: prevent TT request storms by not sending inconsistent TT TLVLs Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 76/99] batman-adv: Fix debugfs path for renamed hardif Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 77/99] batman-adv: Fix debugfs path for renamed softif Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 78/99] batman-adv: Fix duplicated OGMs on NETDEV_UP Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 79/99] batman-adv: Avoid free/alloc race when handling OGM2 buffer Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 80/99] batman-adv: Avoid free/alloc race when handling OGM buffer Greg Kroah-Hartman
2020-03-19 13:03 ` [PATCH 4.14 81/99] batman-adv: Dont schedule OGM for disabled interface Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 82/99] perf/amd/uncore: Replace manual sampling check with CAP_NO_INTERRUPT flag Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 83/99] ACPI: watchdog: Allow disabling WDAT at boot Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 84/99] HID: apple: Add support for recent firmware on Magic Keyboards Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 85/99] HID: i2c-hid: add Trekstor Surfbook E11B to descriptor override Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 86/99] cfg80211: check reg_rule for NULL in handle_channel_custom() Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 87/99] scsi: libfc: free response frame from GPN_ID Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 88/99] net: usb: qmi_wwan: restore mtu min/max values after raw_ip switch Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 89/99] net: ks8851-ml: Fix IRQ handling and locking Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 90/99] mac80211: rx: avoid RCU list traversal under mutex Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 91/99] signal: avoid double atomic counter increments for user accounting Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 92/99] slip: not call free_netdev before rtnl_unlock in slip_open Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 93/99] hinic: fix a bug of setting hw_ioctxt Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 94/99] net: rmnet: fix NULL pointer dereference in rmnet_newlink() Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 95/99] jbd2: fix data races at struct journal_head Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 96/99] ARM: 8957/1: VDSO: Match ARMv8 timer in cntvct_functional() Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 97/99] ARM: 8958/1: rename missed uaccess .fixup section Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 98/99] mm: slub: add missing TID bump in kmem_cache_alloc_bulk() Greg Kroah-Hartman
2020-03-19 13:04 ` [PATCH 4.14 99/99] ipv4: ensure rcu_read_lock() in cipso_v4_error() Greg Kroah-Hartman
2020-03-19 18:35 ` [PATCH 4.14 00/99] 4.14.174-rc1 review Naresh Kamboju
2020-03-19 23:36 ` Guenter Roeck
2020-03-21  0:44 ` shuah

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20200319123950.580684040@linuxfoundation.org \
    --to=gregkh@linuxfoundation.org \
    --cc=andy@greyhouse.net \
    --cc=davem@davemloft.net \
    --cc=edumazet@google.com \
    --cc=j.vosburgh@gmail.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=stable@vger.kernel.org \
    --cc=syzkaller@googlegroups.com \
    --cc=vfalico@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.