From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
stable@vger.kernel.org, Chuck Lever <chuck.lever@oracle.com>,
Sasha Levin <sashal@kernel.org>
Subject: [PATCH 5.4 006/147] SUNRPC: Add "@len" parameter to gss_unwrap()
Date: Mon, 18 May 2020 19:35:29 +0200 [thread overview]
Message-ID: <20200518173514.027317263@linuxfoundation.org> (raw)
In-Reply-To: <20200518173513.009514388@linuxfoundation.org>
From: Chuck Lever <chuck.lever@oracle.com>
[ Upstream commit 31c9590ae468478fe47dc0f5f0d3562b2f69450e ]
Refactor: This is a pre-requisite to fixing the client-side ralign
computation in gss_unwrap_resp_priv().
The length value is passed in explicitly rather that as the value
of buf->len. This will subsequently allow gss_unwrap_kerberos_v1()
to compute a slack and align value, instead of computing it in
gss_unwrap_resp_priv().
Fixes: 35e77d21baa0 ("SUNRPC: Add rpc_auth::au_ralign field")
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
include/linux/sunrpc/gss_api.h | 2 ++
include/linux/sunrpc/gss_krb5.h | 6 +++---
net/sunrpc/auth_gss/auth_gss.c | 4 ++--
net/sunrpc/auth_gss/gss_krb5_crypto.c | 8 ++++----
net/sunrpc/auth_gss/gss_krb5_wrap.c | 26 +++++++++++++++-----------
net/sunrpc/auth_gss/gss_mech_switch.c | 3 ++-
net/sunrpc/auth_gss/svcauth_gss.c | 8 ++------
7 files changed, 30 insertions(+), 27 deletions(-)
diff --git a/include/linux/sunrpc/gss_api.h b/include/linux/sunrpc/gss_api.h
index 5ac5db4d295f9..d1c6f65de76e7 100644
--- a/include/linux/sunrpc/gss_api.h
+++ b/include/linux/sunrpc/gss_api.h
@@ -67,6 +67,7 @@ u32 gss_wrap(
u32 gss_unwrap(
struct gss_ctx *ctx_id,
int offset,
+ int len,
struct xdr_buf *inbuf);
u32 gss_delete_sec_context(
struct gss_ctx **ctx_id);
@@ -127,6 +128,7 @@ struct gss_api_ops {
u32 (*gss_unwrap)(
struct gss_ctx *ctx_id,
int offset,
+ int len,
struct xdr_buf *buf);
void (*gss_delete_sec_context)(
void *internal_ctx_id);
diff --git a/include/linux/sunrpc/gss_krb5.h b/include/linux/sunrpc/gss_krb5.h
index 02c0412e368cc..07930bc9ad604 100644
--- a/include/linux/sunrpc/gss_krb5.h
+++ b/include/linux/sunrpc/gss_krb5.h
@@ -83,7 +83,7 @@ struct gss_krb5_enctype {
u32 (*encrypt_v2) (struct krb5_ctx *kctx, u32 offset,
struct xdr_buf *buf,
struct page **pages); /* v2 encryption function */
- u32 (*decrypt_v2) (struct krb5_ctx *kctx, u32 offset,
+ u32 (*decrypt_v2) (struct krb5_ctx *kctx, u32 offset, u32 len,
struct xdr_buf *buf, u32 *headskip,
u32 *tailskip); /* v2 decryption function */
};
@@ -255,7 +255,7 @@ gss_wrap_kerberos(struct gss_ctx *ctx_id, int offset,
struct xdr_buf *outbuf, struct page **pages);
u32
-gss_unwrap_kerberos(struct gss_ctx *ctx_id, int offset,
+gss_unwrap_kerberos(struct gss_ctx *ctx_id, int offset, int len,
struct xdr_buf *buf);
@@ -312,7 +312,7 @@ gss_krb5_aes_encrypt(struct krb5_ctx *kctx, u32 offset,
struct page **pages);
u32
-gss_krb5_aes_decrypt(struct krb5_ctx *kctx, u32 offset,
+gss_krb5_aes_decrypt(struct krb5_ctx *kctx, u32 offset, u32 len,
struct xdr_buf *buf, u32 *plainoffset,
u32 *plainlen);
diff --git a/net/sunrpc/auth_gss/auth_gss.c b/net/sunrpc/auth_gss/auth_gss.c
index ff5fcb3e12084..c8782f4e20ec2 100644
--- a/net/sunrpc/auth_gss/auth_gss.c
+++ b/net/sunrpc/auth_gss/auth_gss.c
@@ -2041,9 +2041,9 @@ gss_unwrap_resp_priv(struct rpc_task *task, struct rpc_cred *cred,
offset = (u8 *)(p) - (u8 *)head->iov_base;
if (offset + opaque_len > rcv_buf->len)
goto unwrap_failed;
- rcv_buf->len = offset + opaque_len;
- maj_stat = gss_unwrap(ctx->gc_gss_ctx, offset, rcv_buf);
+ maj_stat = gss_unwrap(ctx->gc_gss_ctx, offset,
+ offset + opaque_len, rcv_buf);
if (maj_stat == GSS_S_CONTEXT_EXPIRED)
clear_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags);
if (maj_stat != GSS_S_COMPLETE)
diff --git a/net/sunrpc/auth_gss/gss_krb5_crypto.c b/net/sunrpc/auth_gss/gss_krb5_crypto.c
index 6f2d30d7b766d..e7180da1fc6a1 100644
--- a/net/sunrpc/auth_gss/gss_krb5_crypto.c
+++ b/net/sunrpc/auth_gss/gss_krb5_crypto.c
@@ -851,8 +851,8 @@ gss_krb5_aes_encrypt(struct krb5_ctx *kctx, u32 offset,
}
u32
-gss_krb5_aes_decrypt(struct krb5_ctx *kctx, u32 offset, struct xdr_buf *buf,
- u32 *headskip, u32 *tailskip)
+gss_krb5_aes_decrypt(struct krb5_ctx *kctx, u32 offset, u32 len,
+ struct xdr_buf *buf, u32 *headskip, u32 *tailskip)
{
struct xdr_buf subbuf;
u32 ret = 0;
@@ -881,7 +881,7 @@ gss_krb5_aes_decrypt(struct krb5_ctx *kctx, u32 offset, struct xdr_buf *buf,
/* create a segment skipping the header and leaving out the checksum */
xdr_buf_subsegment(buf, &subbuf, offset + GSS_KRB5_TOK_HDR_LEN,
- (buf->len - offset - GSS_KRB5_TOK_HDR_LEN -
+ (len - offset - GSS_KRB5_TOK_HDR_LEN -
kctx->gk5e->cksumlength));
nblocks = (subbuf.len + blocksize - 1) / blocksize;
@@ -926,7 +926,7 @@ gss_krb5_aes_decrypt(struct krb5_ctx *kctx, u32 offset, struct xdr_buf *buf,
goto out_err;
/* Get the packet's hmac value */
- ret = read_bytes_from_xdr_buf(buf, buf->len - kctx->gk5e->cksumlength,
+ ret = read_bytes_from_xdr_buf(buf, len - kctx->gk5e->cksumlength,
pkt_hmac, kctx->gk5e->cksumlength);
if (ret)
goto out_err;
diff --git a/net/sunrpc/auth_gss/gss_krb5_wrap.c b/net/sunrpc/auth_gss/gss_krb5_wrap.c
index 14a0aff0cd84c..a7cafc29d61ee 100644
--- a/net/sunrpc/auth_gss/gss_krb5_wrap.c
+++ b/net/sunrpc/auth_gss/gss_krb5_wrap.c
@@ -261,7 +261,8 @@ gss_wrap_kerberos_v1(struct krb5_ctx *kctx, int offset,
}
static u32
-gss_unwrap_kerberos_v1(struct krb5_ctx *kctx, int offset, struct xdr_buf *buf)
+gss_unwrap_kerberos_v1(struct krb5_ctx *kctx, int offset, int len,
+ struct xdr_buf *buf)
{
int signalg;
int sealalg;
@@ -284,7 +285,7 @@ gss_unwrap_kerberos_v1(struct krb5_ctx *kctx, int offset, struct xdr_buf *buf)
ptr = (u8 *)buf->head[0].iov_base + offset;
if (g_verify_token_header(&kctx->mech_used, &bodysize, &ptr,
- buf->len - offset))
+ len - offset))
return GSS_S_DEFECTIVE_TOKEN;
if ((ptr[0] != ((KG_TOK_WRAP_MSG >> 8) & 0xff)) ||
@@ -324,6 +325,7 @@ gss_unwrap_kerberos_v1(struct krb5_ctx *kctx, int offset, struct xdr_buf *buf)
(!kctx->initiate && direction != 0))
return GSS_S_BAD_SIG;
+ buf->len = len;
if (kctx->enctype == ENCTYPE_ARCFOUR_HMAC) {
struct crypto_sync_skcipher *cipher;
int err;
@@ -376,7 +378,7 @@ gss_unwrap_kerberos_v1(struct krb5_ctx *kctx, int offset, struct xdr_buf *buf)
data_len = (buf->head[0].iov_base + buf->head[0].iov_len) - data_start;
memmove(orig_start, data_start, data_len);
buf->head[0].iov_len -= (data_start - orig_start);
- buf->len -= (data_start - orig_start);
+ buf->len = len - (data_start - orig_start);
if (gss_krb5_remove_padding(buf, blocksize))
return GSS_S_DEFECTIVE_TOKEN;
@@ -486,7 +488,8 @@ gss_wrap_kerberos_v2(struct krb5_ctx *kctx, u32 offset,
}
static u32
-gss_unwrap_kerberos_v2(struct krb5_ctx *kctx, int offset, struct xdr_buf *buf)
+gss_unwrap_kerberos_v2(struct krb5_ctx *kctx, int offset, int len,
+ struct xdr_buf *buf)
{
s32 now;
u8 *ptr;
@@ -532,7 +535,7 @@ gss_unwrap_kerberos_v2(struct krb5_ctx *kctx, int offset, struct xdr_buf *buf)
if (rrc != 0)
rotate_left(offset + 16, buf, rrc);
- err = (*kctx->gk5e->decrypt_v2)(kctx, offset, buf,
+ err = (*kctx->gk5e->decrypt_v2)(kctx, offset, len, buf,
&headskip, &tailskip);
if (err)
return GSS_S_FAILURE;
@@ -542,7 +545,7 @@ gss_unwrap_kerberos_v2(struct krb5_ctx *kctx, int offset, struct xdr_buf *buf)
* it against the original
*/
err = read_bytes_from_xdr_buf(buf,
- buf->len - GSS_KRB5_TOK_HDR_LEN - tailskip,
+ len - GSS_KRB5_TOK_HDR_LEN - tailskip,
decrypted_hdr, GSS_KRB5_TOK_HDR_LEN);
if (err) {
dprintk("%s: error %u getting decrypted_hdr\n", __func__, err);
@@ -568,14 +571,14 @@ gss_unwrap_kerberos_v2(struct krb5_ctx *kctx, int offset, struct xdr_buf *buf)
* Note that buf->head[0].iov_len may indicate the available
* head buffer space rather than that actually occupied.
*/
- movelen = min_t(unsigned int, buf->head[0].iov_len, buf->len);
+ movelen = min_t(unsigned int, buf->head[0].iov_len, len);
movelen -= offset + GSS_KRB5_TOK_HDR_LEN + headskip;
if (offset + GSS_KRB5_TOK_HDR_LEN + headskip + movelen >
buf->head[0].iov_len)
return GSS_S_FAILURE;
memmove(ptr, ptr + GSS_KRB5_TOK_HDR_LEN + headskip, movelen);
buf->head[0].iov_len -= GSS_KRB5_TOK_HDR_LEN + headskip;
- buf->len -= GSS_KRB5_TOK_HDR_LEN + headskip;
+ buf->len = len - GSS_KRB5_TOK_HDR_LEN + headskip;
/* Trim off the trailing "extra count" and checksum blob */
buf->len -= ec + GSS_KRB5_TOK_HDR_LEN + tailskip;
@@ -603,7 +606,8 @@ gss_wrap_kerberos(struct gss_ctx *gctx, int offset,
}
u32
-gss_unwrap_kerberos(struct gss_ctx *gctx, int offset, struct xdr_buf *buf)
+gss_unwrap_kerberos(struct gss_ctx *gctx, int offset,
+ int len, struct xdr_buf *buf)
{
struct krb5_ctx *kctx = gctx->internal_ctx_id;
@@ -613,9 +617,9 @@ gss_unwrap_kerberos(struct gss_ctx *gctx, int offset, struct xdr_buf *buf)
case ENCTYPE_DES_CBC_RAW:
case ENCTYPE_DES3_CBC_RAW:
case ENCTYPE_ARCFOUR_HMAC:
- return gss_unwrap_kerberos_v1(kctx, offset, buf);
+ return gss_unwrap_kerberos_v1(kctx, offset, len, buf);
case ENCTYPE_AES128_CTS_HMAC_SHA1_96:
case ENCTYPE_AES256_CTS_HMAC_SHA1_96:
- return gss_unwrap_kerberos_v2(kctx, offset, buf);
+ return gss_unwrap_kerberos_v2(kctx, offset, len, buf);
}
}
diff --git a/net/sunrpc/auth_gss/gss_mech_switch.c b/net/sunrpc/auth_gss/gss_mech_switch.c
index 82060099a4291..8fa924c8e282c 100644
--- a/net/sunrpc/auth_gss/gss_mech_switch.c
+++ b/net/sunrpc/auth_gss/gss_mech_switch.c
@@ -438,10 +438,11 @@ gss_wrap(struct gss_ctx *ctx_id,
u32
gss_unwrap(struct gss_ctx *ctx_id,
int offset,
+ int len,
struct xdr_buf *buf)
{
return ctx_id->mech_type->gm_ops
- ->gss_unwrap(ctx_id, offset, buf);
+ ->gss_unwrap(ctx_id, offset, len, buf);
}
diff --git a/net/sunrpc/auth_gss/svcauth_gss.c b/net/sunrpc/auth_gss/svcauth_gss.c
index ed20fa8a6f707..ab3a9c49a859a 100644
--- a/net/sunrpc/auth_gss/svcauth_gss.c
+++ b/net/sunrpc/auth_gss/svcauth_gss.c
@@ -925,7 +925,7 @@ static int
unwrap_priv_data(struct svc_rqst *rqstp, struct xdr_buf *buf, u32 seq, struct gss_ctx *ctx)
{
u32 priv_len, maj_stat;
- int pad, saved_len, remaining_len, offset;
+ int pad, remaining_len, offset;
clear_bit(RQ_SPLICE_OK, &rqstp->rq_flags);
@@ -945,12 +945,8 @@ unwrap_priv_data(struct svc_rqst *rqstp, struct xdr_buf *buf, u32 seq, struct gs
buf->len -= pad;
fix_priv_head(buf, pad);
- /* Maybe it would be better to give gss_unwrap a length parameter: */
- saved_len = buf->len;
- buf->len = priv_len;
- maj_stat = gss_unwrap(ctx, 0, buf);
+ maj_stat = gss_unwrap(ctx, 0, priv_len, buf);
pad = priv_len - buf->len;
- buf->len = saved_len;
buf->len -= pad;
/* The upper layers assume the buffer is aligned on 4-byte boundaries.
* In the krb5p case, at least, the data ends up offset, so we need to
--
2.20.1
next prev parent reply other threads:[~2020-05-18 18:19 UTC|newest]
Thread overview: 152+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-05-18 17:35 [PATCH 5.4 000/147] 5.4.42-rc1 review Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 001/147] net: dsa: Do not make user port errors fatal Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 002/147] shmem: fix possible deadlocks on shmlock_user_lock Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 003/147] net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 004/147] KVM: arm: vgic: Synchronize the whole guest on GIC{D,R}_I{S,C}ACTIVER read Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 005/147] gpio: pca953x: Fix pca953x_gpio_set_config Greg Kroah-Hartman
2020-05-18 17:35 ` Greg Kroah-Hartman [this message]
2020-05-18 17:35 ` [PATCH 5.4 007/147] SUNRPC: Fix GSS privacy computation of auth->au_ralign Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 008/147] net/sonic: Fix a resource leak in an error handling path in jazz_sonic_probe() Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 009/147] net: moxa: Fix a potential double free_irq() Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 010/147] ftrace/selftests: workaround cgroup RT scheduling issues Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 011/147] drop_monitor: work around gcc-10 stringop-overflow warning Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 012/147] virtio-blk: handle block_device_operations callbacks after hot unplug Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 013/147] sun6i: dsi: fix gcc-4.8 Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 014/147] net_sched: fix tcm_parent in tc filter dump Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 015/147] scsi: sg: add sg_remove_request in sg_write Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 016/147] selftests/bpf: fix goto cleanup label not defined Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 017/147] mmc: sdhci-acpi: Add SDHCI_QUIRK2_BROKEN_64_BIT_DMA for AMDI0040 Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 018/147] dpaa2-eth: properly handle buffer size restrictions Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 019/147] net: fix a potential recursive NETDEV_FEAT_CHANGE Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 020/147] netlabel: cope with NULL catmap Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 021/147] net: phy: fix aneg restart in phy_ethtool_set_eee Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 022/147] net: stmmac: fix num_por initialization Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 023/147] pppoe: only process PADT targeted at local interfaces Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 024/147] Revert "ipv6: add mtu lock check in __ip6_rt_update_pmtu" Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 025/147] tcp: fix error recovery in tcp_zerocopy_receive() Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 026/147] tcp: fix SO_RCVLOWAT hangs with fat skbs Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 027/147] virtio_net: fix lockdep warning on 32 bit Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 028/147] dpaa2-eth: prevent array underflow in update_cls_rule() Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 029/147] hinic: fix a bug of ndo_stop Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 030/147] net: dsa: loop: Add module soft dependency Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 031/147] net: ipv4: really enforce backoff for redirects Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 032/147] netprio_cgroup: Fix unlimited memory leak of v2 cgroups Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 033/147] net: tcp: fix rx timestamp behavior for tcp_recvmsg Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 034/147] nfp: abm: fix error return code in nfp_abm_vnic_alloc() Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 035/147] r8169: re-establish support for RTL8401 chip version Greg Kroah-Hartman
2020-05-18 17:35 ` [PATCH 5.4 036/147] umh: fix memory leak on execve failure Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 037/147] riscv: fix vdso build with lld Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 038/147] dmaengine: pch_dma.c: Avoid data race between probe and irq handler Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 039/147] dmaengine: mmp_tdma: Do not ignore slave config validation errors Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 040/147] dmaengine: mmp_tdma: Reset channel error on release Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 041/147] selftests/ftrace: Check the first record for kprobe_args_type.tc Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 042/147] cpufreq: intel_pstate: Only mention the BIOS disabling turbo mode once Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 043/147] ALSA: hda/hdmi: fix race in monitor detection during probe Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 044/147] drm/amd/powerplay: avoid using pm_en before it is initialized revised Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 045/147] drm/amd/display: check if REFCLK_CNTL register is present Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 046/147] drm/amd/display: Update downspread percent to match spreadsheet for DCN2.1 Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 047/147] drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 048/147] drm/amdgpu: simplify padding calculations (v2) Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 049/147] drm/amdgpu: invalidate L2 before SDMA IBs (v2) Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 050/147] ipc/util.c: sysvipc_find_ipc() incorrectly updates position index Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 051/147] ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 052/147] gfs2: Another gfs2_walk_metadata fix Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 053/147] mmc: sdhci-pci-gli: Fix no irq handler from suspend Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 054/147] IB/hfi1: Fix another case where pq is left on waitlist Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 055/147] ACPI: EC: PM: Avoid premature returns from acpi_s2idle_wake() Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 056/147] pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 057/147] pinctrl: baytrail: Enable pin configuration setting for GPIO chip Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 058/147] pinctrl: qcom: fix wrong write in update_dual_edge Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 059/147] pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 060/147] bpf: Fix error return code in map_lookup_and_delete_elem() Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 061/147] ALSA: firewire-lib: fix function sizeof not defined error of tracepoints format Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 062/147] i40iw: Fix error handling in i40iw_manage_arp_cache() Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 063/147] drm/i915: Dont enable WaIncreaseLatencyIPCEnabled when IPC is disabled Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 064/147] bpf, sockmap: msg_pop_data can incorrecty set an sge length Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 065/147] bpf, sockmap: bpf_tcp_ingress needs to subtract bytes from sg.size Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 066/147] mmc: alcor: Fix a resource leak in the error path for ->probe() Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 067/147] mmc: sdhci-pci-gli: Fix can not access GL9750 after reboot from Windows 10 Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 068/147] mmc: core: Check request type before completing the request Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 069/147] mmc: core: Fix recursive locking issue in CQE recovery path Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 070/147] mmc: block: Fix request completion in the CQE timeout path Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 071/147] gfs2: More gfs2_find_jhead fixes Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 072/147] fork: prevent accidental access to clone3 features Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 073/147] drm/amdgpu: force fbdev into vram Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 074/147] NFS: Fix fscache super_cookie index_key from changing after umount Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 075/147] nfs: fscache: use timespec64 in inode auxdata Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 076/147] NFSv4: Fix fscache cookie aux_data to ensure change_attr is included Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 077/147] netfilter: conntrack: avoid gcc-10 zero-length-bounds warning Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 078/147] drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 079/147] arm64: fix the flush_icache_range arguments in machine_kexec Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 080/147] nfs: fix NULL deference in nfs4_get_valid_delegation Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 081/147] SUNRPC: Signalled ASYNC tasks need to exit Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 082/147] netfilter: nft_set_rbtree: Introduce and use nft_rbtree_interval_start() Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 083/147] netfilter: nft_set_rbtree: Add missing expired checks Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 084/147] RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 085/147] IB/mlx4: Test return value of calls to ib_get_cached_pkey Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 086/147] IB/core: Fix potential NULL pointer dereference in pkey cache Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 087/147] RDMA/core: Fix double put of resource Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 088/147] RDMA/iw_cxgb4: Fix incorrect function parameters Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 089/147] hwmon: (da9052) Synchronize access with mfd Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 090/147] s390/ism: fix error return code in ism_probe() Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 091/147] mm, memcg: fix inconsistent oom event behavior Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 092/147] NFSv3: fix rpc receive buffer size for MOUNT call Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 093/147] pnp: Use list_for_each_entry() instead of open coding Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 094/147] net/rds: Use ERR_PTR for rds_message_alloc_sgs() Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 095/147] Stop the ad-hoc games with -Wno-maybe-initialized Greg Kroah-Hartman
2020-05-18 17:36 ` [PATCH 5.4 096/147] gcc-10: disable zero-length-bounds warning for now Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 097/147] gcc-10: disable array-bounds " Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 098/147] gcc-10: disable stringop-overflow " Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 099/147] gcc-10: disable restrict " Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 100/147] gcc-10 warnings: fix low-hanging fruit Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 101/147] gcc-10: mark more functions __init to avoid section mismatch warnings Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 102/147] gcc-10: avoid shadowing standard library free() in crypto Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 103/147] usb: usbfs: correct kernel->user page attribute mismatch Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 104/147] USB: usbfs: fix mmap dma mismatch Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 105/147] ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 106/147] ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 107/147] ALSA: rawmidi: Fix racy buffer resize under concurrent accesses Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 108/147] ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 109/147] usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 110/147] usb: host: xhci-plat: keep runtime active when removing host Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 111/147] usb: cdns3: gadget: prev_req->trb is NULL for ep0 Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 112/147] USB: gadget: fix illegal array access in binding with UDC Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 113/147] usb: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 114/147] Make the "Reducing compressed framebufer size" message be DRM_INFO_ONCE() Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 115/147] ARM: dts: dra7: Fix bus_dma_limit for PCIe Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 116/147] ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 117/147] ARM: dts: imx6dl-yapp4: Fix Ursa board Ethernet connection Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 118/147] drm/amd/display: add basic atomic check for cursor plane Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 119/147] powerpc/32s: Fix build failure with CONFIG_PPC_KUAP_DEBUG Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 120/147] cifs: fix leaked reference on requeued write Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 121/147] x86: Fix early boot crash on gcc-10, third try Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 122/147] x86/unwind/orc: Fix error handling in __unwind_start() Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 123/147] exec: Move would_dump into flush_old_exec Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 124/147] clk: rockchip: fix incorrect configuration of rk3228 aclk_gpu* clocks Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 125/147] dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 126/147] fanotify: fix merging marks masks with FAN_ONDIR Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 127/147] usb: gadget: net2272: Fix a memory leak in an error handling path in net2272_plat_probe() Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 128/147] usb: gadget: audio: Fix a missing error return value in audio_bind() Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 129/147] usb: gadget: legacy: fix error return code in gncm_bind() Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 130/147] usb: gadget: legacy: fix error return code in cdc_bind() Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 131/147] Revert "ALSA: hda/realtek: Fix pop noise on ALC225" Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 132/147] clk: Unlink clock if failed to prepare or enable Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 133/147] arm64: dts: meson-g12b-khadas-vim3: add missing frddr_a status property Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 134/147] arm64: dts: meson-g12-common: fix dwc2 clock names Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 135/147] arm64: dts: rockchip: Replace RK805 PMIC node name with "pmic" on rk3328 boards Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 136/147] arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc happy Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 137/147] arm64: dts: imx8mn: Change SDMA1 ahb clock for imx8mn Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 138/147] ARM: dts: r8a73a4: Add missing CMT1 interrupts Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 139/147] arm64: dts: renesas: r8a77980: Fix IPMMU VIP[01] nodes Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 140/147] ARM: dts: r8a7740: Add missing extal2 to CPG node Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 141/147] SUNRPC: Revert 241b1f419f0e ("SUNRPC: Remove xdr_buf_trim()") Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 142/147] bpf: Fix sk_psock refcnt leak when receiving message Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 143/147] KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 144/147] Makefile: disallow data races on gcc-10 as well Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 145/147] libbpf: Extract and generalize CPU mask parsing logic Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 146/147] selftest/bpf: fix backported test_select_reuseport selftest changes Greg Kroah-Hartman
2020-05-18 17:37 ` [PATCH 5.4 147/147] bpf: Test_progs, fix test_get_stack_rawtp_err.c build Greg Kroah-Hartman
2020-05-19 7:27 ` [PATCH 5.4 000/147] 5.4.42-rc1 review Naresh Kamboju
2020-05-19 8:51 ` Jon Hunter
2020-05-19 14:45 ` shuah
2020-05-19 16:29 ` Guenter Roeck
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200518173514.027317263@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=chuck.lever@oracle.com \
--cc=linux-kernel@vger.kernel.org \
--cc=sashal@kernel.org \
--cc=stable@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).