public inbox for stable@vger.kernel.org
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
	patches@lists.linux.dev, Ingo Molnar <mingo@kernel.org>,
	Josh Poimboeuf <jpoimboe@redhat.com>,
	Nikolay Borisov <nik.borisov@suse.com>,
	Linus Torvalds <torvalds@linux-foundation.org>,
	Sean Christopherson <seanjc@google.com>
Subject: [PATCH 6.6 110/122] x86/bugs: Rename various ia32_cap variables to x86_arch_cap_msr
Date: Mon, 15 Apr 2024 16:21:15 +0200	[thread overview]
Message-ID: <20240415141956.673318113@linuxfoundation.org> (raw)
In-Reply-To: <20240415141953.365222063@linuxfoundation.org>

6.6-stable review patch.  If anyone has any objections, please let me know.

------------------

From: Ingo Molnar <mingo@kernel.org>

commit d0485730d2189ffe5d986d4e9e191f1e4d5ffd24 upstream.

So we are using the 'ia32_cap' value in a number of places,
which got its name from MSR_IA32_ARCH_CAPABILITIES MSR register.

But there's very little 'IA32' about it - this isn't 32-bit only
code, nor does it originate from there, it's just a historic
quirk that many Intel MSR names are prefixed with IA32_.

This is already clear from the helper method around the MSR:
x86_read_arch_cap_msr(), which doesn't have the IA32 prefix.

So rename 'ia32_cap' to 'x86_arch_cap_msr' to be consistent with
its role and with the naming of the helper function.

Signed-off-by: Ingo Molnar <mingo@kernel.org>
Cc: Josh Poimboeuf <jpoimboe@redhat.com>
Cc: Nikolay Borisov <nik.borisov@suse.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Sean Christopherson <seanjc@google.com>
Link: https://lore.kernel.org/r/9592a18a814368e75f8f4b9d74d3883aa4fd1eaf.1712813475.git.jpoimboe@kernel.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
 arch/x86/kernel/apic/apic.c  |    6 ++---
 arch/x86/kernel/cpu/bugs.c   |   30 +++++++++++++-------------
 arch/x86/kernel/cpu/common.c |   48 +++++++++++++++++++++----------------------
 3 files changed, 42 insertions(+), 42 deletions(-)

--- a/arch/x86/kernel/apic/apic.c
+++ b/arch/x86/kernel/apic/apic.c
@@ -1724,11 +1724,11 @@ static int x2apic_state;
 
 static bool x2apic_hw_locked(void)
 {
-	u64 ia32_cap;
+	u64 x86_arch_cap_msr;
 	u64 msr;
 
-	ia32_cap = x86_read_arch_cap_msr();
-	if (ia32_cap & ARCH_CAP_XAPIC_DISABLE) {
+	x86_arch_cap_msr = x86_read_arch_cap_msr();
+	if (x86_arch_cap_msr & ARCH_CAP_XAPIC_DISABLE) {
 		rdmsrl(MSR_IA32_XAPIC_DISABLE_STATUS, msr);
 		return (msr & LEGACY_XAPIC_DISABLED);
 	}
--- a/arch/x86/kernel/cpu/bugs.c
+++ b/arch/x86/kernel/cpu/bugs.c
@@ -61,7 +61,7 @@ EXPORT_SYMBOL_GPL(x86_spec_ctrl_current)
 u64 x86_pred_cmd __ro_after_init = PRED_CMD_IBPB;
 EXPORT_SYMBOL_GPL(x86_pred_cmd);
 
-static u64 __ro_after_init ia32_cap;
+static u64 __ro_after_init x86_arch_cap_msr;
 
 static DEFINE_MUTEX(spec_ctrl_mutex);
 
@@ -146,7 +146,7 @@ void __init cpu_select_mitigations(void)
 		x86_spec_ctrl_base &= ~SPEC_CTRL_MITIGATIONS_MASK;
 	}
 
-	ia32_cap = x86_read_arch_cap_msr();
+	x86_arch_cap_msr = x86_read_arch_cap_msr();
 
 	/* Select the proper CPU mitigations before patching alternatives: */
 	spectre_v1_select_mitigation();
@@ -343,8 +343,8 @@ static void __init taa_select_mitigation
 	 * On MDS_NO=1 CPUs if ARCH_CAP_TSX_CTRL_MSR is not set, microcode
 	 * update is required.
 	 */
-	if ( (ia32_cap & ARCH_CAP_MDS_NO) &&
-	    !(ia32_cap & ARCH_CAP_TSX_CTRL_MSR))
+	if ( (x86_arch_cap_msr & ARCH_CAP_MDS_NO) &&
+	    !(x86_arch_cap_msr & ARCH_CAP_TSX_CTRL_MSR))
 		taa_mitigation = TAA_MITIGATION_UCODE_NEEDED;
 
 	/*
@@ -434,7 +434,7 @@ static void __init mmio_select_mitigatio
 	 * be propagated to uncore buffers, clearing the Fill buffers on idle
 	 * is required irrespective of SMT state.
 	 */
-	if (!(ia32_cap & ARCH_CAP_FBSDP_NO))
+	if (!(x86_arch_cap_msr & ARCH_CAP_FBSDP_NO))
 		static_branch_enable(&mds_idle_clear);
 
 	/*
@@ -444,10 +444,10 @@ static void __init mmio_select_mitigatio
 	 * FB_CLEAR or by the presence of both MD_CLEAR and L1D_FLUSH on MDS
 	 * affected systems.
 	 */
-	if ((ia32_cap & ARCH_CAP_FB_CLEAR) ||
+	if ((x86_arch_cap_msr & ARCH_CAP_FB_CLEAR) ||
 	    (boot_cpu_has(X86_FEATURE_MD_CLEAR) &&
 	     boot_cpu_has(X86_FEATURE_FLUSH_L1D) &&
-	     !(ia32_cap & ARCH_CAP_MDS_NO)))
+	     !(x86_arch_cap_msr & ARCH_CAP_MDS_NO)))
 		mmio_mitigation = MMIO_MITIGATION_VERW;
 	else
 		mmio_mitigation = MMIO_MITIGATION_UCODE_NEEDED;
@@ -505,7 +505,7 @@ static void __init rfds_select_mitigatio
 	if (rfds_mitigation == RFDS_MITIGATION_OFF)
 		return;
 
-	if (ia32_cap & ARCH_CAP_RFDS_CLEAR)
+	if (x86_arch_cap_msr & ARCH_CAP_RFDS_CLEAR)
 		setup_force_cpu_cap(X86_FEATURE_CLEAR_CPU_BUF);
 	else
 		rfds_mitigation = RFDS_MITIGATION_UCODE_NEEDED;
@@ -664,7 +664,7 @@ static void __init srbds_select_mitigati
 	 * are only exposed to SRBDS when TSX is enabled or when CPU is affected
 	 * by Processor MMIO Stale Data vulnerability.
 	 */
-	if ((ia32_cap & ARCH_CAP_MDS_NO) && !boot_cpu_has(X86_FEATURE_RTM) &&
+	if ((x86_arch_cap_msr & ARCH_CAP_MDS_NO) && !boot_cpu_has(X86_FEATURE_RTM) &&
 	    !boot_cpu_has_bug(X86_BUG_MMIO_STALE_DATA))
 		srbds_mitigation = SRBDS_MITIGATION_TSX_OFF;
 	else if (boot_cpu_has(X86_FEATURE_HYPERVISOR))
@@ -807,7 +807,7 @@ static void __init gds_select_mitigation
 	/* Will verify below that mitigation _can_ be disabled */
 
 	/* No microcode */
-	if (!(ia32_cap & ARCH_CAP_GDS_CTRL)) {
+	if (!(x86_arch_cap_msr & ARCH_CAP_GDS_CTRL)) {
 		if (gds_mitigation == GDS_MITIGATION_FORCE) {
 			/*
 			 * This only needs to be done on the boot CPU so do it
@@ -1540,14 +1540,14 @@ static enum spectre_v2_mitigation __init
 /* Disable in-kernel use of non-RSB RET predictors */
 static void __init spec_ctrl_disable_kernel_rrsba(void)
 {
-	u64 ia32_cap;
+	u64 x86_arch_cap_msr;
 
 	if (!boot_cpu_has(X86_FEATURE_RRSBA_CTRL))
 		return;
 
-	ia32_cap = x86_read_arch_cap_msr();
+	x86_arch_cap_msr = x86_read_arch_cap_msr();
 
-	if (ia32_cap & ARCH_CAP_RRSBA) {
+	if (x86_arch_cap_msr & ARCH_CAP_RRSBA) {
 		x86_spec_ctrl_base |= SPEC_CTRL_RRSBA_DIS_S;
 		update_spec_ctrl(x86_spec_ctrl_base);
 	}
@@ -1915,7 +1915,7 @@ static void update_mds_branch_idle(void)
 	if (sched_smt_active()) {
 		static_branch_enable(&mds_idle_clear);
 	} else if (mmio_mitigation == MMIO_MITIGATION_OFF ||
-		   (ia32_cap & ARCH_CAP_FBSDP_NO)) {
+		   (x86_arch_cap_msr & ARCH_CAP_FBSDP_NO)) {
 		static_branch_disable(&mds_idle_clear);
 	}
 }
@@ -2809,7 +2809,7 @@ static const char *spectre_bhi_state(voi
 	else if  (boot_cpu_has(X86_FEATURE_CLEAR_BHB_LOOP))
 		return "; BHI: SW loop, KVM: SW loop";
 	else if (boot_cpu_has(X86_FEATURE_RETPOLINE) &&
-		 !(ia32_cap & ARCH_CAP_RRSBA))
+		 !(x86_arch_cap_msr & ARCH_CAP_RRSBA))
 		return "; BHI: Retpoline";
 	else if  (boot_cpu_has(X86_FEATURE_CLEAR_BHB_LOOP_ON_VMEXIT))
 		return "; BHI: Syscall hardening, KVM: SW loop";
--- a/arch/x86/kernel/cpu/common.c
+++ b/arch/x86/kernel/cpu/common.c
@@ -1329,25 +1329,25 @@ static bool __init cpu_matches(const str
 
 u64 x86_read_arch_cap_msr(void)
 {
-	u64 ia32_cap = 0;
+	u64 x86_arch_cap_msr = 0;
 
 	if (boot_cpu_has(X86_FEATURE_ARCH_CAPABILITIES))
-		rdmsrl(MSR_IA32_ARCH_CAPABILITIES, ia32_cap);
+		rdmsrl(MSR_IA32_ARCH_CAPABILITIES, x86_arch_cap_msr);
 
-	return ia32_cap;
+	return x86_arch_cap_msr;
 }
 
-static bool arch_cap_mmio_immune(u64 ia32_cap)
+static bool arch_cap_mmio_immune(u64 x86_arch_cap_msr)
 {
-	return (ia32_cap & ARCH_CAP_FBSDP_NO &&
-		ia32_cap & ARCH_CAP_PSDP_NO &&
-		ia32_cap & ARCH_CAP_SBDR_SSDP_NO);
+	return (x86_arch_cap_msr & ARCH_CAP_FBSDP_NO &&
+		x86_arch_cap_msr & ARCH_CAP_PSDP_NO &&
+		x86_arch_cap_msr & ARCH_CAP_SBDR_SSDP_NO);
 }
 
-static bool __init vulnerable_to_rfds(u64 ia32_cap)
+static bool __init vulnerable_to_rfds(u64 x86_arch_cap_msr)
 {
 	/* The "immunity" bit trumps everything else: */
-	if (ia32_cap & ARCH_CAP_RFDS_NO)
+	if (x86_arch_cap_msr & ARCH_CAP_RFDS_NO)
 		return false;
 
 	/*
@@ -1355,7 +1355,7 @@ static bool __init vulnerable_to_rfds(u6
 	 * indicate that mitigation is needed because guest is running on a
 	 * vulnerable hardware or may migrate to such hardware:
 	 */
-	if (ia32_cap & ARCH_CAP_RFDS_CLEAR)
+	if (x86_arch_cap_msr & ARCH_CAP_RFDS_CLEAR)
 		return true;
 
 	/* Only consult the blacklist when there is no enumeration: */
@@ -1364,11 +1364,11 @@ static bool __init vulnerable_to_rfds(u6
 
 static void __init cpu_set_bug_bits(struct cpuinfo_x86 *c)
 {
-	u64 ia32_cap = x86_read_arch_cap_msr();
+	u64 x86_arch_cap_msr = x86_read_arch_cap_msr();
 
 	/* Set ITLB_MULTIHIT bug if cpu is not in the whitelist and not mitigated */
 	if (!cpu_matches(cpu_vuln_whitelist, NO_ITLB_MULTIHIT) &&
-	    !(ia32_cap & ARCH_CAP_PSCHANGE_MC_NO))
+	    !(x86_arch_cap_msr & ARCH_CAP_PSCHANGE_MC_NO))
 		setup_force_cpu_bug(X86_BUG_ITLB_MULTIHIT);
 
 	if (cpu_matches(cpu_vuln_whitelist, NO_SPECULATION))
@@ -1380,7 +1380,7 @@ static void __init cpu_set_bug_bits(stru
 		setup_force_cpu_bug(X86_BUG_SPECTRE_V2);
 
 	if (!cpu_matches(cpu_vuln_whitelist, NO_SSB) &&
-	    !(ia32_cap & ARCH_CAP_SSB_NO) &&
+	    !(x86_arch_cap_msr & ARCH_CAP_SSB_NO) &&
 	   !cpu_has(c, X86_FEATURE_AMD_SSB_NO))
 		setup_force_cpu_bug(X86_BUG_SPEC_STORE_BYPASS);
 
@@ -1388,15 +1388,15 @@ static void __init cpu_set_bug_bits(stru
 	 * AMD's AutoIBRS is equivalent to Intel's eIBRS - use the Intel feature
 	 * flag and protect from vendor-specific bugs via the whitelist.
 	 */
-	if ((ia32_cap & ARCH_CAP_IBRS_ALL) || cpu_has(c, X86_FEATURE_AUTOIBRS)) {
+	if ((x86_arch_cap_msr & ARCH_CAP_IBRS_ALL) || cpu_has(c, X86_FEATURE_AUTOIBRS)) {
 		setup_force_cpu_cap(X86_FEATURE_IBRS_ENHANCED);
 		if (!cpu_matches(cpu_vuln_whitelist, NO_EIBRS_PBRSB) &&
-		    !(ia32_cap & ARCH_CAP_PBRSB_NO))
+		    !(x86_arch_cap_msr & ARCH_CAP_PBRSB_NO))
 			setup_force_cpu_bug(X86_BUG_EIBRS_PBRSB);
 	}
 
 	if (!cpu_matches(cpu_vuln_whitelist, NO_MDS) &&
-	    !(ia32_cap & ARCH_CAP_MDS_NO)) {
+	    !(x86_arch_cap_msr & ARCH_CAP_MDS_NO)) {
 		setup_force_cpu_bug(X86_BUG_MDS);
 		if (cpu_matches(cpu_vuln_whitelist, MSBDS_ONLY))
 			setup_force_cpu_bug(X86_BUG_MSBDS_ONLY);
@@ -1415,9 +1415,9 @@ static void __init cpu_set_bug_bits(stru
 	 * TSX_CTRL check alone is not sufficient for cases when the microcode
 	 * update is not present or running as guest that don't get TSX_CTRL.
 	 */
-	if (!(ia32_cap & ARCH_CAP_TAA_NO) &&
+	if (!(x86_arch_cap_msr & ARCH_CAP_TAA_NO) &&
 	    (cpu_has(c, X86_FEATURE_RTM) ||
-	     (ia32_cap & ARCH_CAP_TSX_CTRL_MSR)))
+	     (x86_arch_cap_msr & ARCH_CAP_TSX_CTRL_MSR)))
 		setup_force_cpu_bug(X86_BUG_TAA);
 
 	/*
@@ -1443,7 +1443,7 @@ static void __init cpu_set_bug_bits(stru
 	 * Set X86_BUG_MMIO_UNKNOWN for CPUs that are neither in the blacklist,
 	 * nor in the whitelist and also don't enumerate MSR ARCH_CAP MMIO bits.
 	 */
-	if (!arch_cap_mmio_immune(ia32_cap)) {
+	if (!arch_cap_mmio_immune(x86_arch_cap_msr)) {
 		if (cpu_matches(cpu_vuln_blacklist, MMIO))
 			setup_force_cpu_bug(X86_BUG_MMIO_STALE_DATA);
 		else if (!cpu_matches(cpu_vuln_whitelist, NO_MMIO))
@@ -1451,7 +1451,7 @@ static void __init cpu_set_bug_bits(stru
 	}
 
 	if (!cpu_has(c, X86_FEATURE_BTC_NO)) {
-		if (cpu_matches(cpu_vuln_blacklist, RETBLEED) || (ia32_cap & ARCH_CAP_RSBA))
+		if (cpu_matches(cpu_vuln_blacklist, RETBLEED) || (x86_arch_cap_msr & ARCH_CAP_RSBA))
 			setup_force_cpu_bug(X86_BUG_RETBLEED);
 	}
 
@@ -1469,15 +1469,15 @@ static void __init cpu_set_bug_bits(stru
 	 * disabling AVX2. The only way to do this in HW is to clear XCR0[2],
 	 * which means that AVX will be disabled.
 	 */
-	if (cpu_matches(cpu_vuln_blacklist, GDS) && !(ia32_cap & ARCH_CAP_GDS_NO) &&
+	if (cpu_matches(cpu_vuln_blacklist, GDS) && !(x86_arch_cap_msr & ARCH_CAP_GDS_NO) &&
 	    boot_cpu_has(X86_FEATURE_AVX))
 		setup_force_cpu_bug(X86_BUG_GDS);
 
-	if (vulnerable_to_rfds(ia32_cap))
+	if (vulnerable_to_rfds(x86_arch_cap_msr))
 		setup_force_cpu_bug(X86_BUG_RFDS);
 
 	/* When virtualized, eIBRS could be hidden, assume vulnerable */
-	if (!(ia32_cap & ARCH_CAP_BHI_NO) &&
+	if (!(x86_arch_cap_msr & ARCH_CAP_BHI_NO) &&
 	    !cpu_matches(cpu_vuln_whitelist, NO_BHI) &&
 	    (boot_cpu_has(X86_FEATURE_IBRS_ENHANCED) ||
 	     boot_cpu_has(X86_FEATURE_HYPERVISOR)))
@@ -1487,7 +1487,7 @@ static void __init cpu_set_bug_bits(stru
 		return;
 
 	/* Rogue Data Cache Load? No! */
-	if (ia32_cap & ARCH_CAP_RDCL_NO)
+	if (x86_arch_cap_msr & ARCH_CAP_RDCL_NO)
 		return;
 
 	setup_force_cpu_bug(X86_BUG_CPU_MELTDOWN);



  parent reply	other threads:[~2024-04-15 14:37 UTC|newest]

Thread overview: 145+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-04-15 14:19 [PATCH 6.6 000/122] 6.6.28-rc1 review Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 001/122] smb3: fix Open files on server counter going negative Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 002/122] ata: libata-core: Allow command duration limits detection for ACS-4 drives Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 003/122] ata: libata-scsi: Fix ata_scsi_dev_rescan() error path Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 004/122] batman-adv: Avoid infinite loop trying to resize local TT Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 005/122] arm64: tlb: Fix TLBI RANGE operand Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 006/122] ARM: dts: imx7s-warp: Pass OV2680 link-frequencies Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 007/122] raid1: fix use-after-free for original bio in raid1_write_request() Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 008/122] ring-buffer: Only update pages_touched when a new page is touched Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 009/122] Bluetooth: Fix memory leak in hci_req_sync_complete() Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 010/122] drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 011/122] platform/chrome: cros_ec_uart: properly fix race condition Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 012/122] ACPI: scan: Do not increase dep_unmet for already met dependencies Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 013/122] PM: s2idle: Make sure CPUs will wakeup directly on resume Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 014/122] media: cec: core: remove length check of Timer Status Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 015/122] ARM: OMAP2+: fix bogus MMC GPIO labels on Nokia N8x0 Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 016/122] ARM: OMAP2+: fix N810 MMC gpiod table Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 017/122] mmc: omap: fix broken slot switch lookup Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 018/122] mmc: omap: fix deferred probe Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 019/122] mmc: omap: restore original power up/down steps Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 020/122] ARM: OMAP2+: fix USB regression on Nokia N8x0 Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 021/122] firmware: arm_scmi: Make raw debugfs entries non-seekable Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 022/122] cxl/mem: Fix for the index of Clear Event Record Handle Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 023/122] cxl/core/regs: Fix usage of map->reg_type in cxl_decode_regblock() before assigned Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 024/122] drm/msm/dpu: dont allow overriding data from catalog Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 025/122] arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 026/122] cxl/core: Fix initialization of mbox_cmd.size_out in get event Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 027/122] Revert "drm/qxl: simplify qxl_fence_wait" Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 028/122] nouveau: fix function cast warning Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 029/122] scsi: hisi_sas: Modify the deadline for ata_wait_after_reset() Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 030/122] scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 031/122] net: openvswitch: fix unwanted error log on timeout policy probing Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 032/122] u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 033/122] xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING Greg Kroah-Hartman
2024-04-15 14:19 ` [PATCH 6.6 034/122] octeontx2-pf: Fix transmit scheduler resource leak Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 035/122] block: fix q->blkg_list corruption during disk rebind Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 036/122] geneve: fix header validation in geneve[6]_xmit_skb Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 037/122] s390/ism: fix receive message buffer allocation Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 038/122] bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init() Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 039/122] bnxt_en: Fix error recovery for RoCE ulp client Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 040/122] bnxt_en: Reset PTP tx_avail after possible firmware reset Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 041/122] net: ks8851: Inline ks8851_rx_skb() Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 042/122] net: ks8851: Handle softirqs at the end of IRQ thread to fix hang Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 043/122] af_unix: Clear stale u->oob_skb Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 044/122] octeontx2-af: Fix NIX SQ mode and BP config Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 045/122] ipv6: fib: hide unused pn variable Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 046/122] ipv4/route: avoid unused-but-set-variable warning Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 047/122] ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 048/122] Bluetooth: ISO: Align broadcast sync_timeout with connection timeout Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 049/122] Bluetooth: ISO: Dont reject BT_ISO_QOS if parameters are unset Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 050/122] Bluetooth: hci_sync: Use QoS to determine which PHY to scan Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 051/122] Bluetooth: hci_sync: Fix using the same interval and window for Coded PHY Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 052/122] Bluetooth: SCO: Fix not validating setsockopt user input Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 053/122] Bluetooth: l2cap: Dont double set the HCI_CONN_MGMT_CONNECTED bit Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 054/122] netfilter: complete validation of user input Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 055/122] net/mlx5: SF, Stop waiting for FW as teardown was called Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 056/122] net/mlx5: Register devlink first under devlink lock Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 057/122] net/mlx5: offset comp irq index in name by one Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 058/122] net/mlx5: Properly link new fs rules into the tree Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 059/122] net/mlx5: Correctly compare pkt reformat ids Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 060/122] net/mlx5e: Fix mlx5e_priv_init() cleanup flow Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 061/122] net/mlx5e: HTB, Fix inconsistencies with QoS SQs number Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 062/122] net/mlx5e: Do not produce metadata freelist entries in Tx port ts WQE xmit Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 063/122] net: sparx5: fix wrong config being used when reconfiguring PCS Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 064/122] Revert "s390/ism: fix receive message buffer allocation" Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 065/122] net: dsa: mt7530: trap link-local frames regardless of ST Port State Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 066/122] af_unix: Do not use atomic ops for unix_sk(sk)->inflight Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 067/122] af_unix: Fix garbage collector racing against connect() Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 068/122] net: ena: Fix potential sign extension issue Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 069/122] net: ena: Wrong missing IO completions check order Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 070/122] net: ena: Fix incorrect descriptor free behavior Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 071/122] net: ena: Move XDP code to its new files Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 072/122] net: ena: Pass ena_adapter instead of net_device to ena_xmit_common() Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 073/122] net: ena: Use tx_ring instead of xdp_ring for XDP channel TX Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 074/122] net: ena: Set tx_info->xdpf value to NULL Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 075/122] tracing: hide unused ftrace_event_id_fops Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 076/122] iommu/vt-d: Fix wrong use of pasid config Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 077/122] iommu/vt-d: Allocate local memory for page request queue Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 078/122] selftests: mptcp: use += operator to append strings Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 079/122] btrfs: qgroup: correctly model root qgroup rsv in convert Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 080/122] btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 081/122] btrfs: record delayed inode root in transaction Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 082/122] btrfs: qgroup: convert PREALLOC to PERTRANS after record_root_in_trans Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 083/122] io_uring/net: restore msg_control on sendzc retry Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 084/122] kprobes: Fix possible use-after-free issue on kprobe registration Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 085/122] scsi: sg: Avoid sg device teardown race Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 086/122] scsi: sg: Avoid race in error handling & drop bogus warn Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 087/122] accel/ivpu: Fix deadlock in context_xa Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 088/122] drm/vmwgfx: Enable DMA mappings with SEV Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 089/122] drm/i915/vrr: Disable VRR when using bigjoiner Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 090/122] drm/amdkfd: Reset GPU on queue preemption failure Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 091/122] drm/ast: Fix soft lockup Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 092/122] drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 093/122] drm/client: Fully protect modes[] with dev->mode_config.mutex Greg Kroah-Hartman
2024-04-15 14:20 ` [PATCH 6.6 094/122] arm64: dts: imx8qm-ss-dma: fix can lpcg indices Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 095/122] arm64: dts: imx8-ss-dma: " Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 096/122] arm64: dts: imx8-ss-dma: fix adc " Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 097/122] arm64: dts: imx8-ss-conn: fix usb " Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 098/122] arm64: dts: imx8-ss-lsio: fix pwm " Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 099/122] arm64: dts: imx8-ss-dma: fix spi " Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 100/122] vhost: Add smp_rmb() in vhost_vq_avail_empty() Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 101/122] vhost: Add smp_rmb() in vhost_enable_notify() Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 102/122] perf/x86: Fix out of range data Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 103/122] x86/cpu: Actually turn off mitigations by default for SPECULATION_MITIGATIONS=n Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 104/122] selftests: timers: Fix abs() warning in posix_timers test Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 105/122] x86/apic: Force native_apic_mem_read() to use the MOV instruction Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 106/122] irqflags: Explicitly ignore lockdep_hrtimer_exit() argument Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 107/122] x86/bugs: Fix return type of spectre_bhi_state() Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 108/122] x86/bugs: Fix BHI documentation Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 109/122] x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES Greg Kroah-Hartman
2024-04-15 14:21 ` Greg Kroah-Hartman [this message]
2024-04-15 14:21 ` [PATCH 6.6 111/122] x86/bugs: Fix BHI handling of RRSBA Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 112/122] x86/bugs: Clarify that syscall hardening isnt a BHI mitigation Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 113/122] x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 114/122] x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 115/122] drm/i915/cdclk: Fix CDCLK programming order when pipes are active Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 116/122] drm/i915: Disable port sync when bigjoiner is used Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 117/122] drm/amdgpu: Reset dGPU if suspend got aborted Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 118/122] drm/amdgpu: always force full reset for SOC21 Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 119/122] drm/amdgpu: fix incorrect number of active RBs for gfx11 Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 120/122] drm/amd/display: Program VSC SDP colorimetry for all DP sinks >= 1.4 Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 121/122] drm/amd/display: Set VSC SDP Colorimetry same way for MST and SST Greg Kroah-Hartman
2024-04-15 14:21 ` [PATCH 6.6 122/122] drm/amd/display: fix disable otg wa logic in DCN316 Greg Kroah-Hartman
2024-04-15 18:12 ` [PATCH 6.6 000/122] 6.6.28-rc1 review Florian Fainelli
2024-04-15 23:52 ` Kelsey Steele
2024-04-16  0:05 ` Mark Brown
2024-04-16  9:16   ` Naresh Kamboju
2024-04-16  6:26 ` Ron Economos
2024-04-16  7:44 ` Harshit Mogalapalli
2024-04-16 10:13 ` Takeshi Ogasawara
2024-04-16 10:34 ` Mark Brown
2024-04-16 11:04   ` Marc Zyngier
2024-04-16 11:14     ` Mark Brown
2024-04-16 13:07   ` Naresh Kamboju
2024-04-16 13:22     ` Marc Zyngier
2024-04-16 17:28       ` Catalin Marinas
2024-04-17  7:05         ` Greg Kroah-Hartman
2024-04-17 20:06           ` Catalin Marinas
2024-04-18 11:07         ` Marc Zyngier
2024-04-18 11:21           ` Catalin Marinas
2024-04-19 10:40             ` Greg Kroah-Hartman
2024-04-19 10:50               ` Marc Zyngier
2024-04-19 11:05                 ` Greg Kroah-Hartman
2024-04-16 10:37 ` Jon Hunter
2024-04-16 14:17 ` Pascal Ernster

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20240415141956.673318113@linuxfoundation.org \
    --to=gregkh@linuxfoundation.org \
    --cc=jpoimboe@redhat.com \
    --cc=mingo@kernel.org \
    --cc=nik.borisov@suse.com \
    --cc=patches@lists.linux.dev \
    --cc=seanjc@google.com \
    --cc=stable@vger.kernel.org \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox