All of lore.kernel.org
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org, stable@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
	Daniel Borkmann <daniel@iogearbox.net>,
	Piotr Krysiuk <piotras@gmail.com>,
	Benedict Schlueter <benedict.schlueter@rub.de>,
	Alexei Starovoitov <ast@kernel.org>,
	Ovidiu Panait <ovidiu.panait@windriver.com>
Subject: [PATCH 4.19 137/293] bpf: Fix leakage due to insufficient speculative store bypass mitigation
Date: Mon, 20 Sep 2021 18:41:39 +0200	[thread overview]
Message-ID: <20210920163937.976031091@linuxfoundation.org> (raw)
In-Reply-To: <20210920163933.258815435@linuxfoundation.org>

From: Daniel Borkmann <daniel@iogearbox.net>

commit 2039f26f3aca5b0e419b98f65dd36481337b86ee upstream.

Spectre v4 gadgets make use of memory disambiguation, which is a set of
techniques that execute memory access instructions, that is, loads and
stores, out of program order; Intel's optimization manual, section 2.4.4.5:

  A load instruction micro-op may depend on a preceding store. Many
  microarchitectures block loads until all preceding store addresses are
  known. The memory disambiguator predicts which loads will not depend on
  any previous stores. When the disambiguator predicts that a load does
  not have such a dependency, the load takes its data from the L1 data
  cache. Eventually, the prediction is verified. If an actual conflict is
  detected, the load and all succeeding instructions are re-executed.

af86ca4e3088 ("bpf: Prevent memory disambiguation attack") tried to mitigate
this attack by sanitizing the memory locations through preemptive "fast"
(low latency) stores of zero prior to the actual "slow" (high latency) store
of a pointer value such that upon dependency misprediction the CPU then
speculatively executes the load of the pointer value and retrieves the zero
value instead of the attacker controlled scalar value previously stored at
that location, meaning, subsequent access in the speculative domain is then
redirected to the "zero page".

The sanitized preemptive store of zero prior to the actual "slow" store is
done through a simple ST instruction based on r10 (frame pointer) with
relative offset to the stack location that the verifier has been tracking
on the original used register for STX, which does not have to be r10. Thus,
there are no memory dependencies for this store, since it's only using r10
and immediate constant of zero; hence af86ca4e3088 /assumed/ a low latency
operation.

However, a recent attack demonstrated that this mitigation is not sufficient
since the preemptive store of zero could also be turned into a "slow" store
and is thus bypassed as well:

  [...]
  // r2 = oob address (e.g. scalar)
  // r7 = pointer to map value
  31: (7b) *(u64 *)(r10 -16) = r2
  // r9 will remain "fast" register, r10 will become "slow" register below
  32: (bf) r9 = r10
  // JIT maps BPF reg to x86 reg:
  //  r9  -> r15 (callee saved)
  //  r10 -> rbp
  // train store forward prediction to break dependency link between both r9
  // and r10 by evicting them from the predictor's LRU table.
  33: (61) r0 = *(u32 *)(r7 +24576)
  34: (63) *(u32 *)(r7 +29696) = r0
  35: (61) r0 = *(u32 *)(r7 +24580)
  36: (63) *(u32 *)(r7 +29700) = r0
  37: (61) r0 = *(u32 *)(r7 +24584)
  38: (63) *(u32 *)(r7 +29704) = r0
  39: (61) r0 = *(u32 *)(r7 +24588)
  40: (63) *(u32 *)(r7 +29708) = r0
  [...]
  543: (61) r0 = *(u32 *)(r7 +25596)
  544: (63) *(u32 *)(r7 +30716) = r0
  // prepare call to bpf_ringbuf_output() helper. the latter will cause rbp
  // to spill to stack memory while r13/r14/r15 (all callee saved regs) remain
  // in hardware registers. rbp becomes slow due to push/pop latency. below is
  // disasm of bpf_ringbuf_output() helper for better visual context:
  //
  // ffffffff8117ee20: 41 54                 push   r12
  // ffffffff8117ee22: 55                    push   rbp
  // ffffffff8117ee23: 53                    push   rbx
  // ffffffff8117ee24: 48 f7 c1 fc ff ff ff  test   rcx,0xfffffffffffffffc
  // ffffffff8117ee2b: 0f 85 af 00 00 00     jne    ffffffff8117eee0 <-- jump taken
  // [...]
  // ffffffff8117eee0: 49 c7 c4 ea ff ff ff  mov    r12,0xffffffffffffffea
  // ffffffff8117eee7: 5b                    pop    rbx
  // ffffffff8117eee8: 5d                    pop    rbp
  // ffffffff8117eee9: 4c 89 e0              mov    rax,r12
  // ffffffff8117eeec: 41 5c                 pop    r12
  // ffffffff8117eeee: c3                    ret
  545: (18) r1 = map[id:4]
  547: (bf) r2 = r7
  548: (b7) r3 = 0
  549: (b7) r4 = 4
  550: (85) call bpf_ringbuf_output#194288
  // instruction 551 inserted by verifier    \
  551: (7a) *(u64 *)(r10 -16) = 0            | /both/ are now slow stores here
  // storing map value pointer r7 at fp-16   | since value of r10 is "slow".
  552: (7b) *(u64 *)(r10 -16) = r7           /
  // following "fast" read to the same memory location, but due to dependency
  // misprediction it will speculatively execute before insn 551/552 completes.
  553: (79) r2 = *(u64 *)(r9 -16)
  // in speculative domain contains attacker controlled r2. in non-speculative
  // domain this contains r7, and thus accesses r7 +0 below.
  554: (71) r3 = *(u8 *)(r2 +0)
  // leak r3

As can be seen, the current speculative store bypass mitigation which the
verifier inserts at line 551 is insufficient since /both/, the write of
the zero sanitation as well as the map value pointer are a high latency
instruction due to prior memory access via push/pop of r10 (rbp) in contrast
to the low latency read in line 553 as r9 (r15) which stays in hardware
registers. Thus, architecturally, fp-16 is r7, however, microarchitecturally,
fp-16 can still be r2.

Initial thoughts to address this issue was to track spilled pointer loads
from stack and enforce their load via LDX through r10 as well so that /both/
the preemptive store of zero /as well as/ the load use the /same/ register
such that a dependency is created between the store and load. However, this
option is not sufficient either since it can be bypassed as well under
speculation. An updated attack with pointer spill/fills now _all_ based on
r10 would look as follows:

  [...]
  // r2 = oob address (e.g. scalar)
  // r7 = pointer to map value
  [...]
  // longer store forward prediction training sequence than before.
  2062: (61) r0 = *(u32 *)(r7 +25588)
  2063: (63) *(u32 *)(r7 +30708) = r0
  2064: (61) r0 = *(u32 *)(r7 +25592)
  2065: (63) *(u32 *)(r7 +30712) = r0
  2066: (61) r0 = *(u32 *)(r7 +25596)
  2067: (63) *(u32 *)(r7 +30716) = r0
  // store the speculative load address (scalar) this time after the store
  // forward prediction training.
  2068: (7b) *(u64 *)(r10 -16) = r2
  // preoccupy the CPU store port by running sequence of dummy stores.
  2069: (63) *(u32 *)(r7 +29696) = r0
  2070: (63) *(u32 *)(r7 +29700) = r0
  2071: (63) *(u32 *)(r7 +29704) = r0
  2072: (63) *(u32 *)(r7 +29708) = r0
  2073: (63) *(u32 *)(r7 +29712) = r0
  2074: (63) *(u32 *)(r7 +29716) = r0
  2075: (63) *(u32 *)(r7 +29720) = r0
  2076: (63) *(u32 *)(r7 +29724) = r0
  2077: (63) *(u32 *)(r7 +29728) = r0
  2078: (63) *(u32 *)(r7 +29732) = r0
  2079: (63) *(u32 *)(r7 +29736) = r0
  2080: (63) *(u32 *)(r7 +29740) = r0
  2081: (63) *(u32 *)(r7 +29744) = r0
  2082: (63) *(u32 *)(r7 +29748) = r0
  2083: (63) *(u32 *)(r7 +29752) = r0
  2084: (63) *(u32 *)(r7 +29756) = r0
  2085: (63) *(u32 *)(r7 +29760) = r0
  2086: (63) *(u32 *)(r7 +29764) = r0
  2087: (63) *(u32 *)(r7 +29768) = r0
  2088: (63) *(u32 *)(r7 +29772) = r0
  2089: (63) *(u32 *)(r7 +29776) = r0
  2090: (63) *(u32 *)(r7 +29780) = r0
  2091: (63) *(u32 *)(r7 +29784) = r0
  2092: (63) *(u32 *)(r7 +29788) = r0
  2093: (63) *(u32 *)(r7 +29792) = r0
  2094: (63) *(u32 *)(r7 +29796) = r0
  2095: (63) *(u32 *)(r7 +29800) = r0
  2096: (63) *(u32 *)(r7 +29804) = r0
  2097: (63) *(u32 *)(r7 +29808) = r0
  2098: (63) *(u32 *)(r7 +29812) = r0
  // overwrite scalar with dummy pointer; same as before, also including the
  // sanitation store with 0 from the current mitigation by the verifier.
  2099: (7a) *(u64 *)(r10 -16) = 0         | /both/ are now slow stores here
  2100: (7b) *(u64 *)(r10 -16) = r7        | since store unit is still busy.
  // load from stack intended to bypass stores.
  2101: (79) r2 = *(u64 *)(r10 -16)
  2102: (71) r3 = *(u8 *)(r2 +0)
  // leak r3
  [...]

Looking at the CPU microarchitecture, the scheduler might issue loads (such
as seen in line 2101) before stores (line 2099,2100) because the load execution
units become available while the store execution unit is still busy with the
sequence of dummy stores (line 2069-2098). And so the load may use the prior
stored scalar from r2 at address r10 -16 for speculation. The updated attack
may work less reliable on CPU microarchitectures where loads and stores share
execution resources.

This concludes that the sanitizing with zero stores from af86ca4e3088 ("bpf:
Prevent memory disambiguation attack") is insufficient. Moreover, the detection
of stack reuse from af86ca4e3088 where previously data (STACK_MISC) has been
written to a given stack slot where a pointer value is now to be stored does
not have sufficient coverage as precondition for the mitigation either; for
several reasons outlined as follows:

 1) Stack content from prior program runs could still be preserved and is
    therefore not "random", best example is to split a speculative store
    bypass attack between tail calls, program A would prepare and store the
    oob address at a given stack slot and then tail call into program B which
    does the "slow" store of a pointer to the stack with subsequent "fast"
    read. From program B PoV such stack slot type is STACK_INVALID, and
    therefore also must be subject to mitigation.

 2) The STACK_SPILL must not be coupled to register_is_const(&stack->spilled_ptr)
    condition, for example, the previous content of that memory location could
    also be a pointer to map or map value. Without the fix, a speculative
    store bypass is not mitigated in such precondition and can then lead to
    a type confusion in the speculative domain leaking kernel memory near
    these pointer types.

While brainstorming on various alternative mitigation possibilities, we also
stumbled upon a retrospective from Chrome developers [0]:

  [...] For variant 4, we implemented a mitigation to zero the unused memory
  of the heap prior to allocation, which cost about 1% when done concurrently
  and 4% for scavenging. Variant 4 defeats everything we could think of. We
  explored more mitigations for variant 4 but the threat proved to be more
  pervasive and dangerous than we anticipated. For example, stack slots used
  by the register allocator in the optimizing compiler could be subject to
  type confusion, leading to pointer crafting. Mitigating type confusion for
  stack slots alone would have required a complete redesign of the backend of
  the optimizing compiler, perhaps man years of work, without a guarantee of
  completeness. [...]

>From BPF side, the problem space is reduced, however, options are rather
limited. One idea that has been explored was to xor-obfuscate pointer spills
to the BPF stack:

  [...]
  // preoccupy the CPU store port by running sequence of dummy stores.
  [...]
  2106: (63) *(u32 *)(r7 +29796) = r0
  2107: (63) *(u32 *)(r7 +29800) = r0
  2108: (63) *(u32 *)(r7 +29804) = r0
  2109: (63) *(u32 *)(r7 +29808) = r0
  2110: (63) *(u32 *)(r7 +29812) = r0
  // overwrite scalar with dummy pointer; xored with random 'secret' value
  // of 943576462 before store ...
  2111: (b4) w11 = 943576462
  2112: (af) r11 ^= r7
  2113: (7b) *(u64 *)(r10 -16) = r11
  2114: (79) r11 = *(u64 *)(r10 -16)
  2115: (b4) w2 = 943576462
  2116: (af) r2 ^= r11
  // ... and restored with the same 'secret' value with the help of AX reg.
  2117: (71) r3 = *(u8 *)(r2 +0)
  [...]

While the above would not prevent speculation, it would make data leakage
infeasible by directing it to random locations. In order to be effective
and prevent type confusion under speculation, such random secret would have
to be regenerated for each store. The additional complexity involved for a
tracking mechanism that prevents jumps such that restoring spilled pointers
would not get corrupted is not worth the gain for unprivileged. Hence, the
fix in here eventually opted for emitting a non-public BPF_ST | BPF_NOSPEC
instruction which the x86 JIT translates into a lfence opcode. Inserting the
latter in between the store and load instruction is one of the mitigations
options [1]. The x86 instruction manual notes:

  [...] An LFENCE that follows an instruction that stores to memory might
  complete before the data being stored have become globally visible. [...]

The latter meaning that the preceding store instruction finished execution
and the store is at minimum guaranteed to be in the CPU's store queue, but
it's not guaranteed to be in that CPU's L1 cache at that point (globally
visible). The latter would only be guaranteed via sfence. So the load which
is guaranteed to execute after the lfence for that local CPU would have to
rely on store-to-load forwarding. [2], in section 2.3 on store buffers says:

  [...] For every store operation that is added to the ROB, an entry is
  allocated in the store buffer. This entry requires both the virtual and
  physical address of the target. Only if there is no free entry in the store
  buffer, the frontend stalls until there is an empty slot available in the
  store buffer again. Otherwise, the CPU can immediately continue adding
  subsequent instructions to the ROB and execute them out of order. On Intel
  CPUs, the store buffer has up to 56 entries. [...]

One small upside on the fix is that it lifts constraints from af86ca4e3088
where the sanitize_stack_off relative to r10 must be the same when coming
from different paths. The BPF_ST | BPF_NOSPEC gets emitted after a BPF_STX
or BPF_ST instruction. This happens either when we store a pointer or data
value to the BPF stack for the first time, or upon later pointer spills.
The former needs to be enforced since otherwise stale stack data could be
leaked under speculation as outlined earlier. For non-x86 JITs the BPF_ST |
BPF_NOSPEC mapping is currently optimized away, but others could emit a
speculation barrier as well if necessary. For real-world unprivileged
programs e.g. generated by LLVM, pointer spill/fill is only generated upon
register pressure and LLVM only tries to do that for pointers which are not
used often. The program main impact will be the initial BPF_ST | BPF_NOSPEC
sanitation for the STACK_INVALID case when the first write to a stack slot
occurs e.g. upon map lookup. In future we might refine ways to mitigate
the latter cost.

  [0] https://arxiv.org/pdf/1902.05178.pdf
  [1] https://msrc-blog.microsoft.com/2018/05/21/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639/
  [2] https://arxiv.org/pdf/1905.05725.pdf

Fixes: af86ca4e3088 ("bpf: Prevent memory disambiguation attack")
Fixes: f7cf25b2026d ("bpf: track spill/fill of constants")
Co-developed-by: Piotr Krysiuk <piotras@gmail.com>
Co-developed-by: Benedict Schlueter <benedict.schlueter@rub.de>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: Piotr Krysiuk <piotras@gmail.com>
Signed-off-by: Benedict Schlueter <benedict.schlueter@rub.de>
Acked-by: Alexei Starovoitov <ast@kernel.org>
[OP: - apply check_stack_write_fixed_off() changes in check_stack_write()
     - replace env->bypass_spec_v4 -> env->allow_ptr_leaks]
Signed-off-by: Ovidiu Panait <ovidiu.panait@windriver.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
 include/linux/bpf_verifier.h |    2 
 kernel/bpf/verifier.c        |   88 ++++++++++++++++---------------------------
 2 files changed, 34 insertions(+), 56 deletions(-)

--- a/include/linux/bpf_verifier.h
+++ b/include/linux/bpf_verifier.h
@@ -158,8 +158,8 @@ struct bpf_insn_aux_data {
 		u32 alu_limit;			/* limit for add/sub register with pointer */
 	};
 	int ctx_field_size; /* the ctx field size for load insn, maybe 0 */
-	int sanitize_stack_off; /* stack slot to be cleared */
 	bool seen; /* this insn was processed by the verifier */
+	bool sanitize_stack_spill; /* subject to Spectre v4 sanitation */
 	u8 alu_state; /* used in combination with alu_limit */
 };
 
--- a/kernel/bpf/verifier.c
+++ b/kernel/bpf/verifier.c
@@ -1008,6 +1008,19 @@ static int check_stack_write(struct bpf_
 	cur = env->cur_state->frame[env->cur_state->curframe];
 	if (value_regno >= 0)
 		reg = &cur->regs[value_regno];
+	if (!env->allow_ptr_leaks) {
+		bool sanitize = reg && is_spillable_regtype(reg->type);
+
+		for (i = 0; i < size; i++) {
+			if (state->stack[spi].slot_type[i] == STACK_INVALID) {
+				sanitize = true;
+				break;
+			}
+		}
+
+		if (sanitize)
+			env->insn_aux_data[insn_idx].sanitize_stack_spill = true;
+	}
 
 	if (reg && size == BPF_REG_SIZE && register_is_const(reg) &&
 	    !register_is_null(reg) && env->allow_ptr_leaks) {
@@ -1018,47 +1031,10 @@ static int check_stack_write(struct bpf_
 			verbose(env, "invalid size of register spill\n");
 			return -EACCES;
 		}
-
 		if (state != cur && reg->type == PTR_TO_STACK) {
 			verbose(env, "cannot spill pointers to stack into stack frame of the caller\n");
 			return -EINVAL;
 		}
-
-		if (!env->allow_ptr_leaks) {
-			bool sanitize = false;
-
-			if (state->stack[spi].slot_type[0] == STACK_SPILL &&
-			    register_is_const(&state->stack[spi].spilled_ptr))
-				sanitize = true;
-			for (i = 0; i < BPF_REG_SIZE; i++)
-				if (state->stack[spi].slot_type[i] == STACK_MISC) {
-					sanitize = true;
-					break;
-				}
-			if (sanitize) {
-				int *poff = &env->insn_aux_data[insn_idx].sanitize_stack_off;
-				int soff = (-spi - 1) * BPF_REG_SIZE;
-
-				/* detected reuse of integer stack slot with a pointer
-				 * which means either llvm is reusing stack slot or
-				 * an attacker is trying to exploit CVE-2018-3639
-				 * (speculative store bypass)
-				 * Have to sanitize that slot with preemptive
-				 * store of zero.
-				 */
-				if (*poff && *poff != soff) {
-					/* disallow programs where single insn stores
-					 * into two different stack slots, since verifier
-					 * cannot sanitize them
-					 */
-					verbose(env,
-						"insn %d cannot access two stack slots fp%d and fp%d",
-						insn_idx, *poff, soff);
-					return -EINVAL;
-				}
-				*poff = soff;
-			}
-		}
 		save_register_state(state, spi, reg);
 	} else {
 		u8 type = STACK_MISC;
@@ -5867,34 +5843,33 @@ static int convert_ctx_accesses(struct b
 	insn = env->prog->insnsi + delta;
 
 	for (i = 0; i < insn_cnt; i++, insn++) {
+		bool ctx_access;
+
 		if (insn->code == (BPF_LDX | BPF_MEM | BPF_B) ||
 		    insn->code == (BPF_LDX | BPF_MEM | BPF_H) ||
 		    insn->code == (BPF_LDX | BPF_MEM | BPF_W) ||
-		    insn->code == (BPF_LDX | BPF_MEM | BPF_DW))
+		    insn->code == (BPF_LDX | BPF_MEM | BPF_DW)) {
 			type = BPF_READ;
-		else if (insn->code == (BPF_STX | BPF_MEM | BPF_B) ||
-			 insn->code == (BPF_STX | BPF_MEM | BPF_H) ||
-			 insn->code == (BPF_STX | BPF_MEM | BPF_W) ||
-			 insn->code == (BPF_STX | BPF_MEM | BPF_DW))
+			ctx_access = true;
+		} else if (insn->code == (BPF_STX | BPF_MEM | BPF_B) ||
+			   insn->code == (BPF_STX | BPF_MEM | BPF_H) ||
+			   insn->code == (BPF_STX | BPF_MEM | BPF_W) ||
+			   insn->code == (BPF_STX | BPF_MEM | BPF_DW) ||
+			   insn->code == (BPF_ST | BPF_MEM | BPF_B) ||
+			   insn->code == (BPF_ST | BPF_MEM | BPF_H) ||
+			   insn->code == (BPF_ST | BPF_MEM | BPF_W) ||
+			   insn->code == (BPF_ST | BPF_MEM | BPF_DW)) {
 			type = BPF_WRITE;
-		else
+			ctx_access = BPF_CLASS(insn->code) == BPF_STX;
+		} else {
 			continue;
+		}
 
 		if (type == BPF_WRITE &&
-		    env->insn_aux_data[i + delta].sanitize_stack_off) {
+		    env->insn_aux_data[i + delta].sanitize_stack_spill) {
 			struct bpf_insn patch[] = {
-				/* Sanitize suspicious stack slot with zero.
-				 * There are no memory dependencies for this store,
-				 * since it's only using frame pointer and immediate
-				 * constant of zero
-				 */
-				BPF_ST_MEM(BPF_DW, BPF_REG_FP,
-					   env->insn_aux_data[i + delta].sanitize_stack_off,
-					   0),
-				/* the original STX instruction will immediately
-				 * overwrite the same stack slot with appropriate value
-				 */
 				*insn,
+				BPF_ST_NOSPEC(),
 			};
 
 			cnt = ARRAY_SIZE(patch);
@@ -5908,6 +5883,9 @@ static int convert_ctx_accesses(struct b
 			continue;
 		}
 
+		if (!ctx_access)
+			continue;
+
 		if (env->insn_aux_data[i + delta].ptr_type != PTR_TO_CTX)
 			continue;
 



  parent reply	other threads:[~2021-09-20 17:52 UTC|newest]

Thread overview: 305+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-09-20 16:39 [PATCH 4.19 000/293] 4.19.207-rc1 review Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 001/293] ext4: fix race writing to an inline_data file while its xattrs are changing Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 002/293] xtensa: fix kconfig unmet dependency warning for HAVE_FUTEX_CMPXCHG Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 003/293] gpu: ipu-v3: Fix i.MX IPU-v3 offset calculations for (semi)planar U/V formats Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 004/293] qed: Fix the VF msix vectors flow Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 005/293] net: macb: Add a NULL check on desc_ptp Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 006/293] qede: Fix memset corruption Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 007/293] perf/x86/intel/pt: Fix mask of num_address_ranges Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 008/293] perf/x86/amd/ibs: Work around erratum #1197 Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 009/293] cryptoloop: add a deprecation warning Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 010/293] ARM: 8918/2: only build return_address() if needed Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 011/293] ALSA: pcm: fix divide error in snd_pcm_lib_ioctl Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 012/293] clk: fix build warning for orphan_list Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 013/293] media: stkwebcam: fix memory leak in stk_camera_probe Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 014/293] ARM: imx: add missing clk_disable_unprepare() Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 015/293] ARM: imx: fix missing 3rd argument in macro imx_mmdc_perf_init Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 016/293] igmp: Add ip_mc_list lock in ip_check_mc_rcu Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 017/293] USB: serial: mos7720: improve OOM-handling in read_mos_reg() Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 018/293] ipv4/icmp: l3mdev: Perform icmp error route lookup on source device routing table (v2) Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 019/293] SUNRPC/nfs: Fix return value for nfs4_callback_compound() Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 020/293] crypto: talitos - reduce max key size for SEC1 Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 021/293] powerpc/module64: Fix comment in R_PPC64_ENTRY handling Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 022/293] powerpc/boot: Delete unneeded .globl _zimage_start Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 023/293] net: ll_temac: Remove left-over debug message Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 024/293] mm/page_alloc: speed up the iteration of max_order Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 025/293] Revert "btrfs: compression: dont try to compress if we dont have enough pages" Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 026/293] ALSA: usb-audio: Add registration quirk for JBL Quantum 800 Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 027/293] usb: host: xhci-rcar: Dont reload firmware after the completion Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 028/293] usb: mtu3: use @mult for HS isoc or intr Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 029/293] usb: mtu3: fix the wrong HS mult value Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 030/293] x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 031/293] PCI: Call Max Payload Size-related fixup quirks early Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 032/293] locking/mutex: Fix HANDOFF condition Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 033/293] regmap: fix the offset of register error log Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 034/293] crypto: mxs-dcp - Check for DMA mapping errors Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 035/293] sched/deadline: Fix reset_on_fork reporting of DL tasks Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 036/293] power: supply: axp288_fuel_gauge: Report register-address on readb / writeb errors Greg Kroah-Hartman
2021-09-20 16:39 ` [PATCH 4.19 037/293] crypto: omap-sham - clear dma flags only after omap_sham_update_dma_stop() Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 038/293] sched/deadline: Fix missing clock update in migrate_task_rq_dl() Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 039/293] hrtimer: Avoid double reprogramming in __hrtimer_start_range_ns() Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 040/293] udf: Check LVID earlier Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 041/293] isofs: joliet: Fix iocharset=utf8 mount option Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 042/293] bcache: add proper error unwinding in bcache_device_init Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 043/293] nvme-rdma: dont update queue count when failing to set io queues Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 044/293] power: supply: max17042_battery: fix typo in MAx17042_TOFF Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 045/293] s390/cio: add dev_busid sysfs entry for each subchannel Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 046/293] libata: fix ata_host_start() Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 047/293] crypto: qat - do not ignore errors from enable_vf2pf_comms() Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 048/293] crypto: qat - handle both source of interrupt in VF ISR Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 049/293] crypto: qat - fix reuse of completion variable Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 050/293] crypto: qat - fix naming for init/shutdown VF to PF notifications Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 051/293] crypto: qat - do not export adf_iov_putmsg() Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 052/293] fcntl: fix potential deadlock for &fasync_struct.fa_lock Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 053/293] udf_get_extendedattr() had no boundary checks Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 054/293] m68k: emu: Fix invalid free in nfeth_cleanup() Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 055/293] spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 056/293] spi: spi-pic32: " Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 057/293] lib/mpi: use kcalloc in mpi_resize Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 058/293] clocksource/drivers/sh_cmt: Fix wrong setting if dont request IRQ for clock source channel Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 059/293] crypto: qat - use proper type for vf_mask Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 060/293] certs: Trigger creation of RSA module signing key if its not an RSA key Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 061/293] spi: sprd: Fix the wrong WDG_LOAD_VAL Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 062/293] media: TDA1997x: enable EDID support Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 063/293] soc: rockchip: ROCKCHIP_GRF should not default to y, unconditionally Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 064/293] media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 065/293] media: dvb-usb: fix uninit-value in vp702x_read_mac_addr Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 066/293] media: go7007: remove redundant initialization Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 067/293] Bluetooth: sco: prevent information leak in sco_conn_defer_accept() Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 068/293] tcp: seq_file: Avoid skipping sk during tcp_seek_last_pos Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 069/293] net: cipso: fix warnings in netlbl_cipsov4_add_std Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 070/293] i2c: highlander: add IRQ check Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 071/293] media: em28xx-input: fix refcount bug in em28xx_usb_disconnect Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 072/293] media: venus: venc: Fix potential null pointer dereference on pointer fmt Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 073/293] PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 074/293] PCI: PM: Enable PME if it can be signaled from D3cold Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 075/293] soc: qcom: smsm: Fix missed interrupts if state changes while masked Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 076/293] Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 077/293] drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 078/293] arm64: dts: exynos: correct GIC CPU interfaces address range on Exynos7 Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 079/293] Bluetooth: fix repeated calls to sco_sock_kill Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 080/293] drm/msm/dsi: Fix some reference counted resource leaks Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 081/293] usb: gadget: udc: at91: add IRQ check Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 082/293] usb: phy: fsl-usb: " Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 083/293] usb: phy: twl6030: add IRQ checks Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 084/293] Bluetooth: Move shutdown callback before flushing tx and rx queue Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 085/293] usb: host: ohci-tmio: add IRQ check Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 086/293] usb: phy: tahvo: " Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 087/293] mac80211: Fix insufficient headroom issue for AMSDU Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 088/293] usb: gadget: mv_u3d: request_irq() after initializing UDC Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 089/293] Bluetooth: add timeout sanity check to hci_inquiry Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 090/293] i2c: iop3xx: fix deferred probing Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 091/293] i2c: s3c2410: fix IRQ check Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 092/293] mmc: dw_mmc: Fix issue with uninitialized dma_slave_config Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 093/293] mmc: moxart: " Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 094/293] CIFS: Fix a potencially linear read overflow Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 095/293] i2c: mt65xx: fix IRQ check Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 096/293] usb: ehci-orion: Handle errors of clk_prepare_enable() in probe Greg Kroah-Hartman
2021-09-20 16:40 ` [PATCH 4.19 097/293] usb: bdc: Fix an error handling path in bdc_probe() when no suitable DMA config is available Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 098/293] tty: serial: fsl_lpuart: fix the wrong mapbase value Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 099/293] ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 100/293] bcma: Fix memory leak for internally-handled cores Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 101/293] ipv4: make exception cache less predictible Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 102/293] net: sched: Fix qdisc_rate_table refcount leak when get tcf_block failed Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 103/293] net: qualcomm: fix QCA7000 checksum handling Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 104/293] ipv4: fix endianness issue in inet_rtm_getroute_build_skb() Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 105/293] netns: protect netns ID lookups with RCU Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 106/293] fscrypt: add fscrypt_symlink_getattr() for computing st_size Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 107/293] ext4: report correct st_size for encrypted symlinks Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 108/293] f2fs: " Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 109/293] ubifs: " Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 110/293] tty: Fix data race between tiocsti() and flush_to_ldisc() Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 111/293] x86/resctrl: Fix a maybe-uninitialized build warning treated as error Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 112/293] KVM: x86: Update vCPUs hv_clock before back to guest when tsc_offset is adjusted Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 113/293] IMA: remove -Wmissing-prototypes warning Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 114/293] IMA: remove the dependency on CRYPTO_MD5 Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 115/293] fbmem: dont allow too huge resolutions Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 116/293] backlight: pwm_bl: Improve bootloader/kernel device handover Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 117/293] clk: kirkwood: Fix a clocking boot regression Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 118/293] rtc: tps65910: Correct driver module alias Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 119/293] btrfs: reset replace target device to allocation state on close Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 120/293] blk-zoned: allow zone management send operations without CAP_SYS_ADMIN Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 121/293] blk-zoned: allow BLKREPORTZONE " Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 122/293] PCI/MSI: Skip masking MSI-X on Xen PV Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 123/293] powerpc/perf/hv-gpci: Fix counter value parsing Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 124/293] xen: fix setting of max_pfn in shared_info Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 125/293] include/linux/list.h: add a macro to test if entry is pointing to the head Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 126/293] 9p/xen: Fix end of loop tests for list_for_each_entry Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 127/293] bpf/verifier: per-register parent pointers Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 128/293] bpf: correct slot_type marking logic to allow more stack slot sharing Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 129/293] bpf: Support variable offset stack access from helpers Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 130/293] bpf: Reject indirect var_off stack access in raw mode Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 131/293] bpf: Reject indirect var_off stack access in unpriv mode Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 132/293] bpf: Sanity check max value for var_off stack access Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 133/293] selftests/bpf: Test variable offset " Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 134/293] bpf: track spill/fill of constants Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 135/293] selftests/bpf: fix tests due to const spill/fill Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 136/293] bpf: Introduce BPF nospec instruction for mitigating Spectre v4 Greg Kroah-Hartman
2021-09-20 16:41 ` Greg Kroah-Hartman [this message]
2021-09-20 16:41 ` [PATCH 4.19 138/293] bpf: verifier: Allocate idmap scratch in verifier env Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 139/293] bpf: Fix pointer arithmetic mask tightening under state pruning Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 140/293] tools/thermal/tmon: Add cross compiling support Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 141/293] soc: aspeed: lpc-ctrl: Fix boundary check for mmap Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 142/293] arm64: head: avoid over-mapping in map_memory Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 143/293] crypto: public_key: fix overflow during implicit conversion Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 144/293] block: bfq: fix bfq_set_next_ioprio_data() Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 145/293] power: supply: max17042: handle fails of reading status register Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 146/293] dm crypt: Avoid percpu_counter spinlock contention in crypt_page_alloc() Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 147/293] VMCI: fix NULL pointer dereference when unmapping queue pair Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 148/293] media: uvc: dont do DMA on stack Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 149/293] media: rc-loopback: return number of emitters rather than error Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 150/293] libata: add ATA_HORKAGE_NO_NCQ_TRIM for Samsung 860 and 870 SSDs Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 151/293] ARM: 9105/1: atags_to_fdt: dont warn about stack size Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 152/293] PCI: Restrict ASMedia ASM1062 SATA Max Payload Size Supported Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 153/293] PCI: Return ~0 data on pciconfig_read() CAP_SYS_ADMIN failure Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 154/293] PCI: xilinx-nwl: Enable the clock through CCF Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 155/293] PCI: aardvark: Increase polling delay to 1.5s while waiting for PIO response Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 156/293] PCI: aardvark: Fix masking and unmasking legacy INTx interrupts Greg Kroah-Hartman
2021-09-20 16:41 ` [PATCH 4.19 157/293] HID: input: do not report stylus battery state as "full" Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 158/293] RDMA/iwcm: Release resources if iw_cm module initialization fails Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 159/293] docs: Fix infiniband uverbs minor number Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 160/293] pinctrl: samsung: Fix pinctrl bank pin count Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 161/293] vfio: Use config not menuconfig for VFIO_NOIOMMU Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 162/293] powerpc/stacktrace: Include linux/delay.h Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 163/293] openrisc: dont printk() unconditionally Greg Kroah-Hartman
2021-09-20 16:42   ` [OpenRISC] " Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 164/293] pinctrl: single: Fix error return code in pcs_parse_bits_in_pinctrl_entry() Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 165/293] scsi: qedi: Fix error codes in qedi_alloc_global_queues() Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 166/293] platform/x86: dell-smbios-wmi: Add missing kfree in error-exit from run_smbios_call Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 167/293] fscache: Fix cookie key hashing Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 168/293] f2fs: fix to account missing .skipped_gc_rwsem Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 169/293] f2fs: fix to unmap pages from userspace process in punch_hole() Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 170/293] MIPS: Malta: fix alignment of the devicetree buffer Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 171/293] userfaultfd: prevent concurrent API initialization Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 172/293] media: dib8000: rewrite the init prbs logic Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 173/293] crypto: mxs-dcp - Use sg_mapping_iter to copy data Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 174/293] PCI: Use pci_update_current_state() in pci_enable_device_flags() Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 175/293] tipc: keep the skb in rcv queue until the whole data is read Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 176/293] iio: dac: ad5624r: Fix incorrect handling of an optional regulator Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 177/293] ARM: dts: qcom: apq8064: correct clock names Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 178/293] video: fbdev: kyro: fix a DoS bug by restricting user input Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 179/293] netlink: Deal with ESRCH error in nlmsg_notify() Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 180/293] Smack: Fix wrong semantics in smk_access_entry() Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 181/293] usb: host: fotg210: fix the endpoints transactional opportunities calculation Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 182/293] usb: host: fotg210: fix the actual_length of an iso packet Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 183/293] usb: gadget: u_ether: fix a potential null pointer dereference Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 184/293] usb: gadget: composite: Allow bMaxPower=0 if self-powered Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 185/293] staging: board: Fix uninitialized spinlock when attaching genpd Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 186/293] tty: serial: jsm: hold port lock when reporting modem line changes Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 187/293] drm/amd/amdgpu: Update debugfs link_settings output link_rate field in hex Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 188/293] bpf/tests: Fix copy-and-paste error in double word test Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 189/293] bpf/tests: Do not PASS tests without actually testing the result Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 190/293] video: fbdev: asiliantfb: Error out if pixclock equals zero Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 191/293] video: fbdev: kyro: " Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 192/293] video: fbdev: riva: " Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 193/293] ipv4: ip_output.c: Fix out-of-bounds warning in ip_copy_addrs() Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 194/293] flow_dissector: Fix out-of-bounds warnings Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 195/293] s390/jump_label: print real address in a case of a jump label bug Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 196/293] serial: 8250: Define RX trigger levels for OxSemi 950 devices Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 197/293] xtensa: ISS: dont panic in rs_init Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 198/293] hvsi: dont panic on tty_register_driver failure Greg Kroah-Hartman
2021-09-20 16:42   ` Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 199/293] serial: 8250_pci: make setup_port() parameters explicitly unsigned Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 200/293] staging: ks7010: Fix the initialization of the sleep_status structure Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 201/293] samples: bpf: Fix tracex7 error raised on the missing argument Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 202/293] ata: sata_dwc_460ex: No need to call phy_exit() befre phy_init() Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 203/293] Bluetooth: skip invalid hci_sync_conn_complete_evt Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 204/293] bonding: 3ad: fix the concurrency between __bond_release_one() and bond_3ad_state_machine_handler() Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 205/293] ASoC: Intel: bytcr_rt5640: Move "Platform Clock" routes to the maps for the matching in-/output Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 206/293] media: imx258: Rectify mismatch of VTS value Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 207/293] media: imx258: Limit the max analogue gain to 480 Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 208/293] media: v4l2-dv-timings.c: fix wrong condition in two for-loops Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 209/293] media: TDA1997x: fix tda1997x_query_dv_timings() return value Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 210/293] media: tegra-cec: Handle errors of clk_prepare_enable() Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 211/293] ARM: dts: imx53-ppd: Fix ACHC entry Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 212/293] arm64: dts: qcom: sdm660: use reg value for memory node Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 213/293] net: ethernet: stmmac: Do not use unreachable() in ipq806x_gmac_probe() Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 214/293] Bluetooth: schedule SCO timeouts with delayed_work Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 215/293] Bluetooth: avoid circular locks in sco_sock_connect Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 216/293] gpu: drm: amd: amdgpu: amdgpu_i2c: fix possible uninitialized-variable access in amdgpu_i2c_router_select_ddc_port() Greg Kroah-Hartman
2021-09-20 16:42 ` [PATCH 4.19 217/293] ARM: tegra: tamonten: Fix UART pad setting Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 218/293] Bluetooth: Fix handling of LE Enhanced Connection Complete Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 219/293] serial: sh-sci: fix break handling for sysrq Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 220/293] tcp: enable data-less, empty-cookie SYN with TFO_SERVER_COOKIE_NOT_REQD Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 221/293] rpc: fix gss_svc_init cleanup on failure Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 222/293] staging: rts5208: Fix get_ms_information() heap buffer size Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 223/293] gfs2: Dont call dlm after protocol is unmounted Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 224/293] of: Dont allow __of_attached_node_sysfs() without CONFIG_SYSFS Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 225/293] mmc: sdhci-of-arasan: Check return value of non-void funtions Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 226/293] mmc: rtsx_pci: Fix long reads when clock is prescaled Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 227/293] selftests/bpf: Enlarge select() timeout for test_maps Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 228/293] mmc: core: Return correct emmc response in case of ioctl error Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 229/293] cifs: fix wrong release in sess_alloc_buffer() failed path Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 230/293] Revert "USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set" Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 231/293] usb: musb: musb_dsps: request_irq() after initializing musb Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 232/293] usbip: give back URBs for unsent unlink requests during cleanup Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 233/293] usbip:vhci_hcd USB port can get stuck in the disabled state Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 234/293] ASoC: rockchip: i2s: Fix regmap_ops hang Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 235/293] ASoC: rockchip: i2s: Fixup config for DAIFMT_DSP_A/B Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 236/293] parport: remove non-zero check on count Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 237/293] ath9k: fix OOB read ar9300_eeprom_restore_internal Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 238/293] ath9k: fix sleeping in atomic context Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 239/293] net: fix NULL pointer reference in cipso_v4_doi_free Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 240/293] net: w5100: check return value after calling platform_get_resource() Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 241/293] parisc: fix crash with signals and alloca Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 242/293] ovl: fix BUG_ON() in may_delete() when called from ovl_cleanup() Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 243/293] scsi: BusLogic: Fix missing pr_cont() use Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 244/293] scsi: qla2xxx: Sync queue idx with queue_pair_map idx Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 245/293] cpufreq: powernv: Fix init_chip_info initialization in numa=off Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 246/293] mm/hugetlb: initialize hugetlb_usage in mm_init Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 247/293] memcg: enable accounting for pids in nested pid namespaces Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 248/293] platform/chrome: cros_ec_proto: Send command again when timeout occurs Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 249/293] drm/amdgpu: Fix BUG_ON assert Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 250/293] dm thin metadata: Fix use-after-free in dm_bm_set_read_only Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 251/293] xen: reset legacy rtc flag for PV domU Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 252/293] bnx2x: Fix enabling network interfaces without VFs Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 253/293] arm64/sve: Use correct size when reinitialising SVE state Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 254/293] PM: base: power: dont try to use non-existing RTC for storing data Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 255/293] PCI: Add AMD GPU multi-function power dependencies Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 256/293] x86/mm: Fix kern_addr_valid() to cope with existing but not present entries Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 257/293] tipc: fix an use-after-free issue in tipc_recvmsg Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 258/293] net-caif: avoid user-triggerable WARN_ON(1) Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 259/293] ptp: dp83640: dont define PAGE0 Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 260/293] dccp: dont duplicate ccid when cloning dccp sock Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 261/293] net/l2tp: Fix reference count leak in l2tp_udp_recv_core Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 262/293] r6040: Restore MDIO clock frequency after MAC reset Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 263/293] tipc: increase timeout in tipc_sk_enqueue() Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 264/293] perf machine: Initialize srcline string member in add_location struct Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 265/293] net/mlx5: Fix potential sleeping in atomic context Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 266/293] events: Reuse value read using READ_ONCE instead of re-reading it Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 267/293] net/af_unix: fix a data-race in unix_dgram_poll Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 268/293] net: dsa: destroy the phylink instance on any error in dsa_slave_phy_setup Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 269/293] tcp: fix tp->undo_retrans accounting in tcp_sacktag_one() Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 270/293] qed: Handle management FW error Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 271/293] ibmvnic: check failover_pending in login response Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 272/293] net: hns3: pad the short tunnel frame before sending to hardware Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 273/293] mm/memory_hotplug: use "unsigned long" for PFN in zone_for_pfn_range() Greg Kroah-Hartman
2021-09-20 16:43   ` Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 274/293] KVM: s390: index kvm->arch.idle_mask by vcpu_idx Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 275/293] dt-bindings: mtd: gpmc: Fix the ECC bytes vs. OOB bytes equation Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 276/293] mfd: Dont use irq_create_mapping() to resolve a mapping Greg Kroah-Hartman
2021-09-20 16:43 ` [PATCH 4.19 277/293] PCI: Add ACS quirks for Cavium multi-function devices Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 278/293] net: usb: cdc_mbim: avoid altsetting toggling for Telit LN920 Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 279/293] block, bfq: honor already-setup queue merges Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 280/293] ethtool: Fix an error code in cxgb2.c Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 281/293] NTB: perf: Fix an error code in perf_setup_inbuf() Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 282/293] mfd: axp20x: Update AXP288 volatile ranges Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 283/293] PCI: Fix pci_dev_str_match_path() alloc while atomic bug Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 284/293] KVM: arm64: Handle PSCI resets before userspace touches vCPU state Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 285/293] PCI: Sync __pci_register_driver() stub for CONFIG_PCI=n Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 286/293] mtd: rawnand: cafe: Fix a resource leak in the error handling path of cafe_nand_probe() Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 287/293] ARC: export clear_user_page() for modules Greg Kroah-Hartman
2021-09-20 16:44   ` Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 288/293] net: dsa: b53: Fix calculating number of switch ports Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 289/293] netfilter: socket: icmp6: fix use-after-scope Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 290/293] fq_codel: reject silly quantum parameters Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 291/293] qlcnic: Remove redundant unlock in qlcnic_pinit_from_rom Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 292/293] ip_gre: validate csum_start only on pull Greg Kroah-Hartman
2021-09-20 16:44 ` [PATCH 4.19 293/293] net: renesas: sh_eth: Fix freeing wrong tx descriptor Greg Kroah-Hartman
2021-09-20 20:25 ` [PATCH 4.19 000/293] 4.19.207-rc1 review Pavel Machek
2021-09-21 13:26 ` Jon Hunter
2021-09-21 15:34 ` Shuah Khan
2021-09-21 19:05 ` Sudip Mukherjee
2021-09-21 20:33 ` Guenter Roeck
2021-09-22  2:00 ` Samuel Zou
2021-09-22  5:34 ` Naresh Kamboju

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20210920163937.976031091@linuxfoundation.org \
    --to=gregkh@linuxfoundation.org \
    --cc=ast@kernel.org \
    --cc=benedict.schlueter@rub.de \
    --cc=daniel@iogearbox.net \
    --cc=linux-kernel@vger.kernel.org \
    --cc=ovidiu.panait@windriver.com \
    --cc=piotras@gmail.com \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.