public inbox for stable@vger.kernel.org
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
	patches@lists.linux.dev, Zixi Chen <zixchen@redhat.com>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Dave Hansen <dave.hansen@linux.intel.com>
Subject: [PATCH 6.6 105/143] x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers
Date: Mon,  4 Mar 2024 21:23:45 +0000	[thread overview]
Message-ID: <20240304211553.270683490@linuxfoundation.org> (raw)
In-Reply-To: <20240304211549.876981797@linuxfoundation.org>

6.6-stable review patch.  If anyone has any objections, please let me know.

------------------

From: Paolo Bonzini <pbonzini@redhat.com>

commit 6890cb1ace350b4386c8aee1343dc3b3ddd214da upstream.

MKTME repurposes the high bit of physical address to key id for encryption
key and, even though MAXPHYADDR in CPUID[0x80000008] remains the same,
the valid bits in the MTRR mask register are based on the reduced number
of physical address bits.

detect_tme() in arch/x86/kernel/cpu/intel.c detects TME and subtracts
it from the total usable physical bits, but it is called too late.
Move the call to early_init_intel() so that it is called in setup_arch(),
before MTRRs are setup.

This fixes boot on TDX-enabled systems, which until now only worked with
"disable_mtrr_cleanup".  Without the patch, the values written to the
MTRRs mask registers were 52-bit wide (e.g. 0x000fffff_80000800) and
the writes failed; with the patch, the values are 46-bit wide, which
matches the reduced MAXPHYADDR that is shown in /proc/cpuinfo.

Reported-by: Zixi Chen <zixchen@redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com>
Cc:stable@vger.kernel.org
Link: https://lore.kernel.org/all/20240131230902.1867092-3-pbonzini%40redhat.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
 arch/x86/kernel/cpu/intel.c |  178 ++++++++++++++++++++++----------------------
 1 file changed, 91 insertions(+), 87 deletions(-)

--- a/arch/x86/kernel/cpu/intel.c
+++ b/arch/x86/kernel/cpu/intel.c
@@ -184,6 +184,90 @@ static bool bad_spectre_microcode(struct
 	return false;
 }
 
+#define MSR_IA32_TME_ACTIVATE		0x982
+
+/* Helpers to access TME_ACTIVATE MSR */
+#define TME_ACTIVATE_LOCKED(x)		(x & 0x1)
+#define TME_ACTIVATE_ENABLED(x)		(x & 0x2)
+
+#define TME_ACTIVATE_POLICY(x)		((x >> 4) & 0xf)	/* Bits 7:4 */
+#define TME_ACTIVATE_POLICY_AES_XTS_128	0
+
+#define TME_ACTIVATE_KEYID_BITS(x)	((x >> 32) & 0xf)	/* Bits 35:32 */
+
+#define TME_ACTIVATE_CRYPTO_ALGS(x)	((x >> 48) & 0xffff)	/* Bits 63:48 */
+#define TME_ACTIVATE_CRYPTO_AES_XTS_128	1
+
+/* Values for mktme_status (SW only construct) */
+#define MKTME_ENABLED			0
+#define MKTME_DISABLED			1
+#define MKTME_UNINITIALIZED		2
+static int mktme_status = MKTME_UNINITIALIZED;
+
+static void detect_tme_early(struct cpuinfo_x86 *c)
+{
+	u64 tme_activate, tme_policy, tme_crypto_algs;
+	int keyid_bits = 0, nr_keyids = 0;
+	static u64 tme_activate_cpu0 = 0;
+
+	rdmsrl(MSR_IA32_TME_ACTIVATE, tme_activate);
+
+	if (mktme_status != MKTME_UNINITIALIZED) {
+		if (tme_activate != tme_activate_cpu0) {
+			/* Broken BIOS? */
+			pr_err_once("x86/tme: configuration is inconsistent between CPUs\n");
+			pr_err_once("x86/tme: MKTME is not usable\n");
+			mktme_status = MKTME_DISABLED;
+
+			/* Proceed. We may need to exclude bits from x86_phys_bits. */
+		}
+	} else {
+		tme_activate_cpu0 = tme_activate;
+	}
+
+	if (!TME_ACTIVATE_LOCKED(tme_activate) || !TME_ACTIVATE_ENABLED(tme_activate)) {
+		pr_info_once("x86/tme: not enabled by BIOS\n");
+		mktme_status = MKTME_DISABLED;
+		return;
+	}
+
+	if (mktme_status != MKTME_UNINITIALIZED)
+		goto detect_keyid_bits;
+
+	pr_info("x86/tme: enabled by BIOS\n");
+
+	tme_policy = TME_ACTIVATE_POLICY(tme_activate);
+	if (tme_policy != TME_ACTIVATE_POLICY_AES_XTS_128)
+		pr_warn("x86/tme: Unknown policy is active: %#llx\n", tme_policy);
+
+	tme_crypto_algs = TME_ACTIVATE_CRYPTO_ALGS(tme_activate);
+	if (!(tme_crypto_algs & TME_ACTIVATE_CRYPTO_AES_XTS_128)) {
+		pr_err("x86/mktme: No known encryption algorithm is supported: %#llx\n",
+				tme_crypto_algs);
+		mktme_status = MKTME_DISABLED;
+	}
+detect_keyid_bits:
+	keyid_bits = TME_ACTIVATE_KEYID_BITS(tme_activate);
+	nr_keyids = (1UL << keyid_bits) - 1;
+	if (nr_keyids) {
+		pr_info_once("x86/mktme: enabled by BIOS\n");
+		pr_info_once("x86/mktme: %d KeyIDs available\n", nr_keyids);
+	} else {
+		pr_info_once("x86/mktme: disabled by BIOS\n");
+	}
+
+	if (mktme_status == MKTME_UNINITIALIZED) {
+		/* MKTME is usable */
+		mktme_status = MKTME_ENABLED;
+	}
+
+	/*
+	 * KeyID bits effectively lower the number of physical address
+	 * bits.  Update cpuinfo_x86::x86_phys_bits accordingly.
+	 */
+	c->x86_phys_bits -= keyid_bits;
+}
+
 static void early_init_intel(struct cpuinfo_x86 *c)
 {
 	u64 misc_enable;
@@ -335,6 +419,13 @@ static void early_init_intel(struct cpui
 	 */
 	if (detect_extended_topology_early(c) < 0)
 		detect_ht_early(c);
+
+	/*
+	 * Adjust the number of physical bits early because it affects the
+	 * valid bits of the MTRR mask registers.
+	 */
+	if (cpu_has(c, X86_FEATURE_TME))
+		detect_tme_early(c);
 }
 
 static void bsp_init_intel(struct cpuinfo_x86 *c)
@@ -495,90 +586,6 @@ static void srat_detect_node(struct cpui
 #endif
 }
 
-#define MSR_IA32_TME_ACTIVATE		0x982
-
-/* Helpers to access TME_ACTIVATE MSR */
-#define TME_ACTIVATE_LOCKED(x)		(x & 0x1)
-#define TME_ACTIVATE_ENABLED(x)		(x & 0x2)
-
-#define TME_ACTIVATE_POLICY(x)		((x >> 4) & 0xf)	/* Bits 7:4 */
-#define TME_ACTIVATE_POLICY_AES_XTS_128	0
-
-#define TME_ACTIVATE_KEYID_BITS(x)	((x >> 32) & 0xf)	/* Bits 35:32 */
-
-#define TME_ACTIVATE_CRYPTO_ALGS(x)	((x >> 48) & 0xffff)	/* Bits 63:48 */
-#define TME_ACTIVATE_CRYPTO_AES_XTS_128	1
-
-/* Values for mktme_status (SW only construct) */
-#define MKTME_ENABLED			0
-#define MKTME_DISABLED			1
-#define MKTME_UNINITIALIZED		2
-static int mktme_status = MKTME_UNINITIALIZED;
-
-static void detect_tme(struct cpuinfo_x86 *c)
-{
-	u64 tme_activate, tme_policy, tme_crypto_algs;
-	int keyid_bits = 0, nr_keyids = 0;
-	static u64 tme_activate_cpu0 = 0;
-
-	rdmsrl(MSR_IA32_TME_ACTIVATE, tme_activate);
-
-	if (mktme_status != MKTME_UNINITIALIZED) {
-		if (tme_activate != tme_activate_cpu0) {
-			/* Broken BIOS? */
-			pr_err_once("x86/tme: configuration is inconsistent between CPUs\n");
-			pr_err_once("x86/tme: MKTME is not usable\n");
-			mktme_status = MKTME_DISABLED;
-
-			/* Proceed. We may need to exclude bits from x86_phys_bits. */
-		}
-	} else {
-		tme_activate_cpu0 = tme_activate;
-	}
-
-	if (!TME_ACTIVATE_LOCKED(tme_activate) || !TME_ACTIVATE_ENABLED(tme_activate)) {
-		pr_info_once("x86/tme: not enabled by BIOS\n");
-		mktme_status = MKTME_DISABLED;
-		return;
-	}
-
-	if (mktme_status != MKTME_UNINITIALIZED)
-		goto detect_keyid_bits;
-
-	pr_info("x86/tme: enabled by BIOS\n");
-
-	tme_policy = TME_ACTIVATE_POLICY(tme_activate);
-	if (tme_policy != TME_ACTIVATE_POLICY_AES_XTS_128)
-		pr_warn("x86/tme: Unknown policy is active: %#llx\n", tme_policy);
-
-	tme_crypto_algs = TME_ACTIVATE_CRYPTO_ALGS(tme_activate);
-	if (!(tme_crypto_algs & TME_ACTIVATE_CRYPTO_AES_XTS_128)) {
-		pr_err("x86/mktme: No known encryption algorithm is supported: %#llx\n",
-				tme_crypto_algs);
-		mktme_status = MKTME_DISABLED;
-	}
-detect_keyid_bits:
-	keyid_bits = TME_ACTIVATE_KEYID_BITS(tme_activate);
-	nr_keyids = (1UL << keyid_bits) - 1;
-	if (nr_keyids) {
-		pr_info_once("x86/mktme: enabled by BIOS\n");
-		pr_info_once("x86/mktme: %d KeyIDs available\n", nr_keyids);
-	} else {
-		pr_info_once("x86/mktme: disabled by BIOS\n");
-	}
-
-	if (mktme_status == MKTME_UNINITIALIZED) {
-		/* MKTME is usable */
-		mktme_status = MKTME_ENABLED;
-	}
-
-	/*
-	 * KeyID bits effectively lower the number of physical address
-	 * bits.  Update cpuinfo_x86::x86_phys_bits accordingly.
-	 */
-	c->x86_phys_bits -= keyid_bits;
-}
-
 static void init_cpuid_fault(struct cpuinfo_x86 *c)
 {
 	u64 msr;
@@ -715,9 +722,6 @@ static void init_intel(struct cpuinfo_x8
 
 	init_ia32_feat_ctl(c);
 
-	if (cpu_has(c, X86_FEATURE_TME))
-		detect_tme(c);
-
 	init_intel_misc_features(c);
 
 	split_lock_init();



  parent reply	other threads:[~2024-03-04 21:41 UTC|newest]

Thread overview: 156+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-03-04 21:22 [PATCH 6.6 000/143] 6.6.21-rc1 review Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 001/143] btrfs: fix deadlock with fiemap and extent locking Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 002/143] ubifs: fix possible dereference after free Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 003/143] ASoC: cs35l34: Fix GPIO name and drop legacy include Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 004/143] ksmbd: fix wrong allocation size update in smb2_open() Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 005/143] ublk: move ublk_cancel_dev() out of ub->mutex Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 006/143] mtd: spinand: gigadevice: Fix the get ecc status issue Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 007/143] spi: cadence-qspi: fix pointer reference in runtime PM hooks Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 008/143] netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 009/143] netlink: add nla be16/32 types to minlen array Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 010/143] net: ip_tunnel: prevent perpetual headroom growth Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 011/143] net: mctp: take ownership of skb in mctp_local_output Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 012/143] net: dpaa: fman_memac: accept phy-interface-type = "10gbase-r" in the device tree Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 013/143] tun: Fix xdp_rxq_infos queue_index when detaching Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 014/143] cpufreq: intel_pstate: fix pstate limits enforcement for adjust_perf call back Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 015/143] net: veth: clear GRO when clearing XDP even when down Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 016/143] ipv6: fix potential "struct net" leak in inet6_rtm_getaddr() Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 017/143] lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is detected Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 018/143] veth: try harder when allocating queue memory Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 019/143] net: usb: dm9601: fix wrong return value in dm9601_mdio_read Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 020/143] net: lan78xx: fix "softirq work is pending" error Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 021/143] uapi: in6: replace temporary label with rfc9486 Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 022/143] stmmac: Clear variable when destroying workqueue Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 023/143] Bluetooth: hci_sync: Check the correct flag before starting a scan Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 024/143] Bluetooth: Avoid potential use-after-free in hci_error_reset Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 025/143] Bluetooth: hci_sync: Fix accept_list when attempting to suspend Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 026/143] Bluetooth: hci_event: Fix wrongly recorded wakeup BD_ADDR Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 027/143] Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 028/143] Bluetooth: Enforce validation on max value of connection interval Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 029/143] Bluetooth: qca: Fix wrong event type for patch config command Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 030/143] Bluetooth: hci_qca: Set BDA quirk bit if fwnode exists in DT Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 031/143] Bluetooth: qca: Fix triggering coredump implementation Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 032/143] netfilter: nf_tables: allow NFPROTO_INET in nft_(match/target)_validate() Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 033/143] netfilter: bridge: confirm multicast packets before passing them up the stack Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 034/143] tools: ynl: fix handling of multiple mcast groups Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 035/143] rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 036/143] igb: extend PTP timestamp adjustments to i211 Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 037/143] net: hsr: Use correct offset for HSR TLV values in supervisory HSR frames Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 038/143] tls: decrement decrypt_pending if no async completion will be called Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 039/143] tls: fix peeking with sync+async decryption Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 040/143] tls: separate no-async decryption request handling from async Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 041/143] tls: fix use-after-free on failed backlog decryption Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 042/143] efi/capsule-loader: fix incorrect allocation size Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 043/143] power: supply: bq27xxx-i2c: Do not free non existing IRQ Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 044/143] ASoC: cs35l56: Must clear HALO_STATE before issuing SYSTEM_RESET Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 045/143] ALSA: Drop leftover snd-rtctimer stuff from Makefile Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 046/143] ASoC: soc.h: convert asoc_xxx() to snd_soc_xxx() Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 047/143] ASoC: qcom: convert not to use asoc_xxx() Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 048/143] ASoC: qcom: Fix uninitialized pointer dmactl Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 049/143] riscv: Fix build error if !CONFIG_ARCH_ENABLE_HUGEPAGE_MIGRATION Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 050/143] ASoC: cs35l56: cs35l56_component_remove() must clear cs35l56->component Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 051/143] ASoC: cs35l56: cs35l56_component_remove() must clean up wm_adsp Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 052/143] ASoC: cs35l56: Dont add the same register patch multiple times Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 053/143] ASoC: cs35l56: Fix for initializing ASP1 mixer registers Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 054/143] ASoC: cs35l56: Fix misuse of wm_adsp part string for silicon revision Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 055/143] ASoC: cs35l56: Fix deadlock in ASP1 mixer register initialization Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 056/143] ASoC: soc-card: Fix missing locking in snd_soc_card_get_kcontrol() Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 057/143] RISC-V: Ignore V from the riscv,isa DT property on older T-Head CPUs Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 058/143] drm/tegra: Remove existing framebuffer only if we support display Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.6 059/143] fbcon: always restore the old font data in fbcon_do_set_font() Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 060/143] afs: Fix endless loop in directory parsing Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 061/143] drivers: perf: added capabilities for legacy PMU Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 062/143] drivers: perf: ctr_get_width function for legacy is not defined Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 063/143] Revert "riscv: mm: support Svnapot in huge vmap" Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 064/143] riscv: Fix pte_leaf_size() for NAPOT Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 065/143] riscv: Sparse-Memory/vmemmap out-of-bounds fix Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 066/143] btrfs: fix race between ordered extent completion and fiemap Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 067/143] of: property: fw_devlink: Fix stupid bug in remote-endpoint parsing Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 068/143] tomoyo: fix UAF write bug in tomoyo_write_control() Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 069/143] ALSA: firewire-lib: fix to check cycle continuity Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 070/143] ALSA: ump: Fix the discard error code from snd_ump_legacy_open() Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 071/143] ALSA: hda/realtek: tas2781: enable subwoofer volume control Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 072/143] ALSA: hda/realtek: Enable Mute LED on HP 840 G8 (MB 8AB8) Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 073/143] ALSA: hda/realtek: fix mute/micmute LED For HP mt440 Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 074/143] ALSA: hda/realtek: Add special fixup for Lenovo 14IRP8 Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 075/143] Bluetooth: hci_bcm4377: do not mark valid bd_addr as invalid Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 076/143] landlock: Fix asymmetric private inodes referring Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 077/143] gtp: fix use-after-free and null-ptr-deref in gtp_newlink() Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 078/143] mm: cachestat: fix folio read-after-free in cache walk Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 079/143] mtd: rawnand: marvell: fix layouts Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 080/143] wifi: nl80211: reject iftype change with mesh ID change Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 081/143] btrfs: fix double free of anonymous device after snapshot creation failure Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 082/143] btrfs: dev-replace: properly validate device names Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 083/143] btrfs: send: dont issue unnecessary zero writes for trailing hole Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 084/143] Revert "drm/amd/pm: resolve reboot exception for si oland" Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 085/143] drm/buddy: fix range bias Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 086/143] drm/amd/display: Add monitor patch for specific eDP Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 087/143] soc: qcom: pmic_glink: Fix boot when QRTR=m Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 088/143] dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 089/143] crypto: arm64/neonbs - fix out-of-bounds access on short input Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 090/143] dmaengine: ptdma: use consistent DMA masks Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 091/143] dmaengine: fsl-edma: correct calculation of nbytes in multi-fifo scenario Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 092/143] dmaengine: fsl-qdma: init irq after reg initialization Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 093/143] mmc: mmci: stm32: fix DMA API overlapping mappings warning Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 094/143] mmc: core: Fix eMMC initialization with 1-bit bus connection Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 095/143] mmc: sdhci-xenon: add timeout for PHY init complete Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 096/143] mmc: sdhci-xenon: fix PHY init clock stability Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 097/143] RISC-V: Drop invalid test from CONFIG_AS_HAS_OPTION_ARCH Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 098/143] riscv: add CALLER_ADDRx support Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 099/143] kbuild: Add -Wa,--fatal-warnings to as-instr invocation Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 100/143] iommufd: Fix iopt_access_list_id overwrite bug Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 101/143] efivarfs: Request at most 512 bytes for variable names Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 102/143] pmdomain: qcom: rpmhpd: Fix enabled_corner aggregation Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 103/143] mm/debug_vm_pgtable: fix BUG_ON with pud advanced test Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 104/143] x86/e820: Dont reserve SETUP_RNG_SEED in e820 Greg Kroah-Hartman
2024-03-04 21:23 ` Greg Kroah-Hartman [this message]
2024-03-04 21:23 ` [PATCH 6.6 106/143] mptcp: map v4 address to v6 when destroying subflow Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 107/143] mptcp: avoid printing warning once on client side Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 108/143] mptcp: push at DSS boundaries Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 109/143] selftests: mptcp: join: add ss mptcp support check Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 110/143] mptcp: fix snd_wnd initialization for passive socket Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 111/143] mptcp: fix potential wake-up event loss Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 112/143] mptcp: fix double-free on socket dismantle Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 113/143] mptcp: fix possible deadlock in subflow diag Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 114/143] NFS: Fix data corruption caused by congestion Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 115/143] af_unix: Fix task hung while purging oob_skb in GC Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 116/143] af_unix: Drop oob_skb ref before purging queue " Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 117/143] ASoC: cs35l56: fix reversed if statement in cs35l56_dspwait_asp1tx_put() Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 118/143] dmaengine: dw-edma: Fix the ch_count hdma callback Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.6 119/143] dmaengine: dw-edma: Fix wrong interrupt bit set for HDMA Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 120/143] dmaengine: dw-edma: HDMA_V0_REMOTEL_STOP_INT_EN typo fix Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 121/143] dmaengine: dw-edma: Add HDMA remote interrupt configuration Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 122/143] dmaengine: dw-edma: HDMA: Add sync read before starting the DMA transfer in remote setup Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 123/143] dmaengine: dw-edma: eDMA: " Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 124/143] phy: freescale: phy-fsl-imx8-mipi-dphy: Fix alias name to use dashes Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 125/143] dmaengine: idxd: Remove shadow Event Log head stored in idxd Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 126/143] dmaengine: idxd: Ensure safe user copy of completion record Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 127/143] powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 128/143] powerpc/rtas: use correct function name for resetting TCE tables Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 129/143] gpio: 74x164: Enable output pins after registers are reset Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 130/143] gpiolib: Fix the error path order in gpiochip_add_data_with_key() Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 131/143] gpio: fix resource unwinding order in error path Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 132/143] block: define bvec_iter as __packed __aligned(4) Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 133/143] x86/entry_64: Add VERW just before userspace transition Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 134/143] x86/entry_32: " Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 135/143] x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 136/143] KVM/VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 137/143] KVM/VMX: Move VERW closer to VMentry for MDS mitigation Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 138/143] selftests: mptcp: add evts_get_info helper Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 139/143] selftests: mptcp: add chk_subflows_total helper Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 140/143] selftests: mptcp: update userspace pm test helpers Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 141/143] selftests: mptcp: add mptcp_lib_is_v6 Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 142/143] selftests: mptcp: rm subflow with v4/v4mapped addr Greg Kroah-Hartman
2024-03-04 21:24 ` [PATCH 6.6 143/143] drm/nouveau: dont fini scheduler before entity flush Greg Kroah-Hartman
2024-03-04 22:48 ` [PATCH 6.6 000/143] 6.6.21-rc1 review SeongJae Park
2024-03-05  1:06   ` Luna Jernberg
2024-03-05  4:17 ` Bagas Sanjaya
2024-03-05  4:26 ` Ron Economos
2024-03-05  9:29 ` Takeshi Ogasawara
2024-03-05 10:58 ` Jon Hunter
2024-03-05 11:44 ` Harshit Mogalapalli
2024-03-05 18:56 ` Shuah Khan
2024-03-05 23:06 ` Florian Fainelli
2024-03-06 12:55 ` Naresh Kamboju
2024-03-06 14:55   ` Luna Jernberg
2024-03-06 19:08 ` Allen

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20240304211553.270683490@linuxfoundation.org \
    --to=gregkh@linuxfoundation.org \
    --cc=dave.hansen@linux.intel.com \
    --cc=patches@lists.linux.dev \
    --cc=pbonzini@redhat.com \
    --cc=stable@vger.kernel.org \
    --cc=zixchen@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox