stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
	patches@lists.linux.dev, Johan Hovold <johan+linaro@kernel.org>,
	Maximilian Luz <luzmaximilian@gmail.com>,
	Bjorn Andersson <andersson@kernel.org>,
	Konrad Dybcio <konrad.dybcio@linaro.org>
Subject: [PATCH 6.8 195/228] firmware: qcom: uefisecapp: Fix memory related IO errors and crashes
Date: Tue, 30 Apr 2024 12:39:33 +0200	[thread overview]
Message-ID: <20240430103109.426068542@linuxfoundation.org> (raw)
In-Reply-To: <20240430103103.806426847@linuxfoundation.org>

6.8-stable review patch.  If anyone has any objections, please let me know.

------------------

From: Maximilian Luz <luzmaximilian@gmail.com>

commit ed09f81eeaa8f9265e1787282cb283f10285c259 upstream.

It turns out that while the QSEECOM APP_SEND command has specific fields
for request and response buffers, uefisecapp expects them both to be in
a single memory region. Failure to adhere to this has (so far) resulted
in either no response being written to the response buffer (causing an
EIO to be emitted down the line), the SCM call to fail with EINVAL
(i.e., directly from TZ/firmware), or the device to be hard-reset.

While this issue can be triggered deterministically, in the current form
it seems to happen rather sporadically (which is why it has gone
unnoticed during earlier testing). This is likely due to the two
kzalloc() calls (for request and response) being directly after each
other. Which means that those likely return consecutive regions most of
the time, especially when not much else is going on in the system.

Fix this by allocating a single memory region for both request and
response buffers, properly aligning both structs inside it. This
unfortunately also means that the qcom_scm_qseecom_app_send() interface
needs to be restructured, as it should no longer map the DMA regions
separately. Therefore, move the responsibility of DMA allocation (or
mapping) to the caller.

Fixes: 759e7a2b62eb ("firmware: Add support for Qualcomm UEFI Secure Application")
Cc: stable@vger.kernel.org  # 6.7
Tested-by: Johan Hovold <johan+linaro@kernel.org>
Reviewed-by: Johan Hovold <johan+linaro@kernel.org>
Signed-off-by: Maximilian Luz <luzmaximilian@gmail.com>
Tested-by: Konrad Dybcio <konrad.dybcio@linaro.org> # X13s
Link: https://lore.kernel.org/r/20240406130125.1047436-1-luzmaximilian@gmail.com
Signed-off-by: Bjorn Andersson <andersson@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
 .../firmware/qcom/qcom_qseecom_uefisecapp.c   | 137 ++++++++++++------
 drivers/firmware/qcom/qcom_scm.c              |  37 +----
 include/linux/firmware/qcom/qcom_qseecom.h    |  55 ++++++-
 include/linux/firmware/qcom/qcom_scm.h        |  10 +-
 4 files changed, 153 insertions(+), 86 deletions(-)

diff --git a/drivers/firmware/qcom/qcom_qseecom_uefisecapp.c b/drivers/firmware/qcom/qcom_qseecom_uefisecapp.c
index 32188f098ef3..bc550ad0dbe0 100644
--- a/drivers/firmware/qcom/qcom_qseecom_uefisecapp.c
+++ b/drivers/firmware/qcom/qcom_qseecom_uefisecapp.c
@@ -221,6 +221,19 @@ struct qsee_rsp_uefi_query_variable_info {
  * alignment of 8 bytes (64 bits) for GUIDs. Our definition of efi_guid_t,
  * however, has an alignment of 4 byte (32 bits). So far, this seems to work
  * fine here. See also the comment on the typedef of efi_guid_t.
+ *
+ * Note: It looks like uefisecapp is quite picky about how the memory passed to
+ * it is structured and aligned. In particular the request/response setup used
+ * for QSEE_CMD_UEFI_GET_VARIABLE. While qcom_qseecom_app_send(), in theory,
+ * accepts separate buffers/addresses for the request and response parts, in
+ * practice, however, it seems to expect them to be both part of a larger
+ * contiguous block. We initially allocated separate buffers for the request
+ * and response but this caused the QSEE_CMD_UEFI_GET_VARIABLE command to
+ * either not write any response to the response buffer or outright crash the
+ * device. Therefore, we now allocate a single contiguous block of DMA memory
+ * for both and properly align the data using the macros below. In particular,
+ * request and response structs are aligned at 8 byte (via __reqdata_offs()),
+ * following the driver that this has been reverse-engineered from.
  */
 #define qcuefi_buf_align_fields(fields...)					\
 	({									\
@@ -244,6 +257,12 @@ struct qsee_rsp_uefi_query_variable_info {
 #define __array_offs(type, count, offset)					\
 	__field_impl(sizeof(type) * (count), __alignof__(type), offset)
 
+#define __array_offs_aligned(type, count, align, offset)			\
+	__field_impl(sizeof(type) * (count), align, offset)
+
+#define __reqdata_offs(size, offset)						\
+	__array_offs_aligned(u8, size, 8, offset)
+
 #define __array(type, count)		__array_offs(type, count, NULL)
 #define __field_offs(type, offset)	__array_offs(type, 1, offset)
 #define __field(type)			__array_offs(type, 1, NULL)
@@ -277,10 +296,15 @@ static efi_status_t qsee_uefi_get_variable(struct qcuefi_client *qcuefi, const e
 	unsigned long buffer_size = *data_size;
 	efi_status_t efi_status = EFI_SUCCESS;
 	unsigned long name_length;
+	dma_addr_t cmd_buf_dma;
+	size_t cmd_buf_size;
+	void *cmd_buf;
 	size_t guid_offs;
 	size_t name_offs;
 	size_t req_size;
 	size_t rsp_size;
+	size_t req_offs;
+	size_t rsp_offs;
 	ssize_t status;
 
 	if (!name || !guid)
@@ -304,17 +328,19 @@ static efi_status_t qsee_uefi_get_variable(struct qcuefi_client *qcuefi, const e
 		__array(u8, buffer_size)
 	);
 
-	req_data = kzalloc(req_size, GFP_KERNEL);
-	if (!req_data) {
+	cmd_buf_size = qcuefi_buf_align_fields(
+		__reqdata_offs(req_size, &req_offs)
+		__reqdata_offs(rsp_size, &rsp_offs)
+	);
+
+	cmd_buf = qseecom_dma_alloc(qcuefi->client, cmd_buf_size, &cmd_buf_dma, GFP_KERNEL);
+	if (!cmd_buf) {
 		efi_status = EFI_OUT_OF_RESOURCES;
 		goto out;
 	}
 
-	rsp_data = kzalloc(rsp_size, GFP_KERNEL);
-	if (!rsp_data) {
-		efi_status = EFI_OUT_OF_RESOURCES;
-		goto out_free_req;
-	}
+	req_data = cmd_buf + req_offs;
+	rsp_data = cmd_buf + rsp_offs;
 
 	req_data->command_id = QSEE_CMD_UEFI_GET_VARIABLE;
 	req_data->data_size = buffer_size;
@@ -332,7 +358,9 @@ static efi_status_t qsee_uefi_get_variable(struct qcuefi_client *qcuefi, const e
 
 	memcpy(((void *)req_data) + req_data->guid_offset, guid, req_data->guid_size);
 
-	status = qcom_qseecom_app_send(qcuefi->client, req_data, req_size, rsp_data, rsp_size);
+	status = qcom_qseecom_app_send(qcuefi->client,
+				       cmd_buf_dma + req_offs, req_size,
+				       cmd_buf_dma + rsp_offs, rsp_size);
 	if (status) {
 		efi_status = EFI_DEVICE_ERROR;
 		goto out_free;
@@ -407,9 +435,7 @@ static efi_status_t qsee_uefi_get_variable(struct qcuefi_client *qcuefi, const e
 	memcpy(data, ((void *)rsp_data) + rsp_data->data_offset, rsp_data->data_size);
 
 out_free:
-	kfree(rsp_data);
-out_free_req:
-	kfree(req_data);
+	qseecom_dma_free(qcuefi->client, cmd_buf_size, cmd_buf, cmd_buf_dma);
 out:
 	return efi_status;
 }
@@ -422,10 +448,15 @@ static efi_status_t qsee_uefi_set_variable(struct qcuefi_client *qcuefi, const e
 	struct qsee_rsp_uefi_set_variable *rsp_data;
 	efi_status_t efi_status = EFI_SUCCESS;
 	unsigned long name_length;
+	dma_addr_t cmd_buf_dma;
+	size_t cmd_buf_size;
+	void *cmd_buf;
 	size_t name_offs;
 	size_t guid_offs;
 	size_t data_offs;
 	size_t req_size;
+	size_t req_offs;
+	size_t rsp_offs;
 	ssize_t status;
 
 	if (!name || !guid)
@@ -450,17 +481,19 @@ static efi_status_t qsee_uefi_set_variable(struct qcuefi_client *qcuefi, const e
 		__array_offs(u8, data_size, &data_offs)
 	);
 
-	req_data = kzalloc(req_size, GFP_KERNEL);
-	if (!req_data) {
+	cmd_buf_size = qcuefi_buf_align_fields(
+		__reqdata_offs(req_size, &req_offs)
+		__reqdata_offs(sizeof(*rsp_data), &rsp_offs)
+	);
+
+	cmd_buf = qseecom_dma_alloc(qcuefi->client, cmd_buf_size, &cmd_buf_dma, GFP_KERNEL);
+	if (!cmd_buf) {
 		efi_status = EFI_OUT_OF_RESOURCES;
 		goto out;
 	}
 
-	rsp_data = kzalloc(sizeof(*rsp_data), GFP_KERNEL);
-	if (!rsp_data) {
-		efi_status = EFI_OUT_OF_RESOURCES;
-		goto out_free_req;
-	}
+	req_data = cmd_buf + req_offs;
+	rsp_data = cmd_buf + rsp_offs;
 
 	req_data->command_id = QSEE_CMD_UEFI_SET_VARIABLE;
 	req_data->attributes = attributes;
@@ -483,8 +516,9 @@ static efi_status_t qsee_uefi_set_variable(struct qcuefi_client *qcuefi, const e
 	if (data_size)
 		memcpy(((void *)req_data) + req_data->data_offset, data, req_data->data_size);
 
-	status = qcom_qseecom_app_send(qcuefi->client, req_data, req_size, rsp_data,
-				       sizeof(*rsp_data));
+	status = qcom_qseecom_app_send(qcuefi->client,
+				       cmd_buf_dma + req_offs, req_size,
+				       cmd_buf_dma + rsp_offs, sizeof(*rsp_data));
 	if (status) {
 		efi_status = EFI_DEVICE_ERROR;
 		goto out_free;
@@ -507,9 +541,7 @@ static efi_status_t qsee_uefi_set_variable(struct qcuefi_client *qcuefi, const e
 	}
 
 out_free:
-	kfree(rsp_data);
-out_free_req:
-	kfree(req_data);
+	qseecom_dma_free(qcuefi->client, cmd_buf_size, cmd_buf, cmd_buf_dma);
 out:
 	return efi_status;
 }
@@ -521,10 +553,15 @@ static efi_status_t qsee_uefi_get_next_variable(struct qcuefi_client *qcuefi,
 	struct qsee_req_uefi_get_next_variable *req_data;
 	struct qsee_rsp_uefi_get_next_variable *rsp_data;
 	efi_status_t efi_status = EFI_SUCCESS;
+	dma_addr_t cmd_buf_dma;
+	size_t cmd_buf_size;
+	void *cmd_buf;
 	size_t guid_offs;
 	size_t name_offs;
 	size_t req_size;
 	size_t rsp_size;
+	size_t req_offs;
+	size_t rsp_offs;
 	ssize_t status;
 
 	if (!name_size || !name || !guid)
@@ -545,17 +582,19 @@ static efi_status_t qsee_uefi_get_next_variable(struct qcuefi_client *qcuefi,
 		__array(*name, *name_size / sizeof(*name))
 	);
 
-	req_data = kzalloc(req_size, GFP_KERNEL);
-	if (!req_data) {
+	cmd_buf_size = qcuefi_buf_align_fields(
+		__reqdata_offs(req_size, &req_offs)
+		__reqdata_offs(rsp_size, &rsp_offs)
+	);
+
+	cmd_buf = qseecom_dma_alloc(qcuefi->client, cmd_buf_size, &cmd_buf_dma, GFP_KERNEL);
+	if (!cmd_buf) {
 		efi_status = EFI_OUT_OF_RESOURCES;
 		goto out;
 	}
 
-	rsp_data = kzalloc(rsp_size, GFP_KERNEL);
-	if (!rsp_data) {
-		efi_status = EFI_OUT_OF_RESOURCES;
-		goto out_free_req;
-	}
+	req_data = cmd_buf + req_offs;
+	rsp_data = cmd_buf + rsp_offs;
 
 	req_data->command_id = QSEE_CMD_UEFI_GET_NEXT_VARIABLE;
 	req_data->guid_offset = guid_offs;
@@ -572,7 +611,9 @@ static efi_status_t qsee_uefi_get_next_variable(struct qcuefi_client *qcuefi,
 		goto out_free;
 	}
 
-	status = qcom_qseecom_app_send(qcuefi->client, req_data, req_size, rsp_data, rsp_size);
+	status = qcom_qseecom_app_send(qcuefi->client,
+				       cmd_buf_dma + req_offs, req_size,
+				       cmd_buf_dma + rsp_offs, rsp_size);
 	if (status) {
 		efi_status = EFI_DEVICE_ERROR;
 		goto out_free;
@@ -645,9 +686,7 @@ static efi_status_t qsee_uefi_get_next_variable(struct qcuefi_client *qcuefi,
 	}
 
 out_free:
-	kfree(rsp_data);
-out_free_req:
-	kfree(req_data);
+	qseecom_dma_free(qcuefi->client, cmd_buf_size, cmd_buf, cmd_buf_dma);
 out:
 	return efi_status;
 }
@@ -659,26 +698,34 @@ static efi_status_t qsee_uefi_query_variable_info(struct qcuefi_client *qcuefi,
 	struct qsee_req_uefi_query_variable_info *req_data;
 	struct qsee_rsp_uefi_query_variable_info *rsp_data;
 	efi_status_t efi_status = EFI_SUCCESS;
+	dma_addr_t cmd_buf_dma;
+	size_t cmd_buf_size;
+	void *cmd_buf;
+	size_t req_offs;
+	size_t rsp_offs;
 	int status;
 
-	req_data = kzalloc(sizeof(*req_data), GFP_KERNEL);
-	if (!req_data) {
+	cmd_buf_size = qcuefi_buf_align_fields(
+		__reqdata_offs(sizeof(*req_data), &req_offs)
+		__reqdata_offs(sizeof(*rsp_data), &rsp_offs)
+	);
+
+	cmd_buf = qseecom_dma_alloc(qcuefi->client, cmd_buf_size, &cmd_buf_dma, GFP_KERNEL);
+	if (!cmd_buf) {
 		efi_status = EFI_OUT_OF_RESOURCES;
 		goto out;
 	}
 
-	rsp_data = kzalloc(sizeof(*rsp_data), GFP_KERNEL);
-	if (!rsp_data) {
-		efi_status = EFI_OUT_OF_RESOURCES;
-		goto out_free_req;
-	}
+	req_data = cmd_buf + req_offs;
+	rsp_data = cmd_buf + rsp_offs;
 
 	req_data->command_id = QSEE_CMD_UEFI_QUERY_VARIABLE_INFO;
 	req_data->attributes = attr;
 	req_data->length = sizeof(*req_data);
 
-	status = qcom_qseecom_app_send(qcuefi->client, req_data, sizeof(*req_data), rsp_data,
-				       sizeof(*rsp_data));
+	status = qcom_qseecom_app_send(qcuefi->client,
+				       cmd_buf_dma + req_offs, sizeof(*req_data),
+				       cmd_buf_dma + rsp_offs, sizeof(*rsp_data));
 	if (status) {
 		efi_status = EFI_DEVICE_ERROR;
 		goto out_free;
@@ -711,9 +758,7 @@ static efi_status_t qsee_uefi_query_variable_info(struct qcuefi_client *qcuefi,
 		*max_variable_size = rsp_data->max_variable_size;
 
 out_free:
-	kfree(rsp_data);
-out_free_req:
-	kfree(req_data);
+	qseecom_dma_free(qcuefi->client, cmd_buf_size, cmd_buf, cmd_buf_dma);
 out:
 	return efi_status;
 }
diff --git a/drivers/firmware/qcom/qcom_scm.c b/drivers/firmware/qcom/qcom_scm.c
index 520de9b5633a..90283f160a22 100644
--- a/drivers/firmware/qcom/qcom_scm.c
+++ b/drivers/firmware/qcom/qcom_scm.c
@@ -1576,9 +1576,9 @@ EXPORT_SYMBOL_GPL(qcom_scm_qseecom_app_get_id);
 /**
  * qcom_scm_qseecom_app_send() - Send to and receive data from a given QSEE app.
  * @app_id:   The ID of the target app.
- * @req:      Request buffer sent to the app (must be DMA-mappable).
+ * @req:      DMA address of the request buffer sent to the app.
  * @req_size: Size of the request buffer.
- * @rsp:      Response buffer, written to by the app (must be DMA-mappable).
+ * @rsp:      DMA address of the response buffer, written to by the app.
  * @rsp_size: Size of the response buffer.
  *
  * Sends a request to the QSEE app associated with the given ID and read back
@@ -1589,33 +1589,13 @@ EXPORT_SYMBOL_GPL(qcom_scm_qseecom_app_get_id);
  *
  * Return: Zero on success, nonzero on failure.
  */
-int qcom_scm_qseecom_app_send(u32 app_id, void *req, size_t req_size, void *rsp,
-			      size_t rsp_size)
+int qcom_scm_qseecom_app_send(u32 app_id, dma_addr_t req, size_t req_size,
+			      dma_addr_t rsp, size_t rsp_size)
 {
 	struct qcom_scm_qseecom_resp res = {};
 	struct qcom_scm_desc desc = {};
-	dma_addr_t req_phys;
-	dma_addr_t rsp_phys;
 	int status;
 
-	/* Map request buffer */
-	req_phys = dma_map_single(__scm->dev, req, req_size, DMA_TO_DEVICE);
-	status = dma_mapping_error(__scm->dev, req_phys);
-	if (status) {
-		dev_err(__scm->dev, "qseecom: failed to map request buffer\n");
-		return status;
-	}
-
-	/* Map response buffer */
-	rsp_phys = dma_map_single(__scm->dev, rsp, rsp_size, DMA_FROM_DEVICE);
-	status = dma_mapping_error(__scm->dev, rsp_phys);
-	if (status) {
-		dma_unmap_single(__scm->dev, req_phys, req_size, DMA_TO_DEVICE);
-		dev_err(__scm->dev, "qseecom: failed to map response buffer\n");
-		return status;
-	}
-
-	/* Set up SCM call data */
 	desc.owner = QSEECOM_TZ_OWNER_TZ_APPS;
 	desc.svc = QSEECOM_TZ_SVC_APP_ID_PLACEHOLDER;
 	desc.cmd = QSEECOM_TZ_CMD_APP_SEND;
@@ -1623,18 +1603,13 @@ int qcom_scm_qseecom_app_send(u32 app_id, void *req, size_t req_size, void *rsp,
 				     QCOM_SCM_RW, QCOM_SCM_VAL,
 				     QCOM_SCM_RW, QCOM_SCM_VAL);
 	desc.args[0] = app_id;
-	desc.args[1] = req_phys;
+	desc.args[1] = req;
 	desc.args[2] = req_size;
-	desc.args[3] = rsp_phys;
+	desc.args[3] = rsp;
 	desc.args[4] = rsp_size;
 
-	/* Perform call */
 	status = qcom_scm_qseecom_call(&desc, &res);
 
-	/* Unmap buffers */
-	dma_unmap_single(__scm->dev, rsp_phys, rsp_size, DMA_FROM_DEVICE);
-	dma_unmap_single(__scm->dev, req_phys, req_size, DMA_TO_DEVICE);
-
 	if (status)
 		return status;
 
diff --git a/include/linux/firmware/qcom/qcom_qseecom.h b/include/linux/firmware/qcom/qcom_qseecom.h
index 5c28298a98be..366243ee9609 100644
--- a/include/linux/firmware/qcom/qcom_qseecom.h
+++ b/include/linux/firmware/qcom/qcom_qseecom.h
@@ -10,6 +10,7 @@
 #define __QCOM_QSEECOM_H
 
 #include <linux/auxiliary_bus.h>
+#include <linux/dma-mapping.h>
 #include <linux/types.h>
 
 #include <linux/firmware/qcom/qcom_scm.h>
@@ -24,12 +25,57 @@ struct qseecom_client {
 	u32 app_id;
 };
 
+/**
+ * qseecom_scm_dev() - Get the SCM device associated with the QSEECOM client.
+ * @client: The QSEECOM client device.
+ *
+ * Returns the SCM device under which the provided QSEECOM client device
+ * operates. This function is intended to be used for DMA allocations.
+ */
+static inline struct device *qseecom_scm_dev(struct qseecom_client *client)
+{
+	return client->aux_dev.dev.parent->parent;
+}
+
+/**
+ * qseecom_dma_alloc() - Allocate DMA memory for a QSEECOM client.
+ * @client:     The QSEECOM client to allocate the memory for.
+ * @size:       The number of bytes to allocate.
+ * @dma_handle: Pointer to where the DMA address should be stored.
+ * @gfp:        Allocation flags.
+ *
+ * Wrapper function for dma_alloc_coherent(), allocating DMA memory usable for
+ * TZ/QSEECOM communication. Refer to dma_alloc_coherent() for details.
+ */
+static inline void *qseecom_dma_alloc(struct qseecom_client *client, size_t size,
+				      dma_addr_t *dma_handle, gfp_t gfp)
+{
+	return dma_alloc_coherent(qseecom_scm_dev(client), size, dma_handle, gfp);
+}
+
+/**
+ * dma_free_coherent() - Free QSEECOM DMA memory.
+ * @client:     The QSEECOM client for which the memory has been allocated.
+ * @size:       The number of bytes allocated.
+ * @cpu_addr:   Virtual memory address to free.
+ * @dma_handle: DMA memory address to free.
+ *
+ * Wrapper function for dma_free_coherent(), freeing memory previously
+ * allocated with qseecom_dma_alloc(). Refer to dma_free_coherent() for
+ * details.
+ */
+static inline void qseecom_dma_free(struct qseecom_client *client, size_t size,
+				    void *cpu_addr, dma_addr_t dma_handle)
+{
+	return dma_free_coherent(qseecom_scm_dev(client), size, cpu_addr, dma_handle);
+}
+
 /**
  * qcom_qseecom_app_send() - Send to and receive data from a given QSEE app.
  * @client:   The QSEECOM client associated with the target app.
- * @req:      Request buffer sent to the app (must be DMA-mappable).
+ * @req:      DMA address of the request buffer sent to the app.
  * @req_size: Size of the request buffer.
- * @rsp:      Response buffer, written to by the app (must be DMA-mappable).
+ * @rsp:      DMA address of the response buffer, written to by the app.
  * @rsp_size: Size of the response buffer.
  *
  * Sends a request to the QSEE app associated with the given client and read
@@ -43,8 +89,9 @@ struct qseecom_client {
  *
  * Return: Zero on success, nonzero on failure.
  */
-static inline int qcom_qseecom_app_send(struct qseecom_client *client, void *req, size_t req_size,
-					void *rsp, size_t rsp_size)
+static inline int qcom_qseecom_app_send(struct qseecom_client *client,
+					dma_addr_t req, size_t req_size,
+					dma_addr_t rsp, size_t rsp_size)
 {
 	return qcom_scm_qseecom_app_send(client->app_id, req, req_size, rsp, rsp_size);
 }
diff --git a/include/linux/firmware/qcom/qcom_scm.h b/include/linux/firmware/qcom/qcom_scm.h
index ccaf28846054..aaa19f93ac43 100644
--- a/include/linux/firmware/qcom/qcom_scm.h
+++ b/include/linux/firmware/qcom/qcom_scm.h
@@ -118,8 +118,8 @@ bool qcom_scm_lmh_dcvsh_available(void);
 #ifdef CONFIG_QCOM_QSEECOM
 
 int qcom_scm_qseecom_app_get_id(const char *app_name, u32 *app_id);
-int qcom_scm_qseecom_app_send(u32 app_id, void *req, size_t req_size, void *rsp,
-			      size_t rsp_size);
+int qcom_scm_qseecom_app_send(u32 app_id, dma_addr_t req, size_t req_size,
+			      dma_addr_t rsp, size_t rsp_size);
 
 #else /* CONFIG_QCOM_QSEECOM */
 
@@ -128,9 +128,9 @@ static inline int qcom_scm_qseecom_app_get_id(const char *app_name, u32 *app_id)
 	return -EINVAL;
 }
 
-static inline int qcom_scm_qseecom_app_send(u32 app_id, void *req,
-					    size_t req_size, void *rsp,
-					    size_t rsp_size)
+static inline int qcom_scm_qseecom_app_send(u32 app_id,
+					    dma_addr_t req, size_t req_size,
+					    dma_addr_t rsp, size_t rsp_size)
 {
 	return -EINVAL;
 }
-- 
2.44.0




  parent reply	other threads:[~2024-04-30 10:56 UTC|newest]

Thread overview: 240+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-04-30 10:36 [PATCH 6.8 000/228] 6.8.9-rc1 review Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 001/228] cifs: Fix reacquisition of volume cookie on still-live connection Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 002/228] smb: client: fix rename(2) regression against samba Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 003/228] cifs: reinstate original behavior again for forceuid/forcegid Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 004/228] HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 005/228] HID: logitech-dj: allow mice to use all types of reports Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 006/228] arm64: dts: rockchip: set PHY address of MT7531 switch to 0x1f Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 007/228] arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 Puma Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 008/228] arm64: dts: rockchip: fix alphabetical ordering RK3399 puma Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 009/228] arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for RK3399 Puma Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 010/228] arm64: dts: rockchip: Fix the i2c address of es8316 on Cool Pi CM5 Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 011/228] arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro dts Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 012/228] arm64: dts: mediatek: mt8183: Add power-domains properity to mfgcfg Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 013/228] arm64: dts: mediatek: mt8192: Add missing gce-client-reg to mutex Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 014/228] arm64: dts: mediatek: mt8195: Add missing gce-client-reg to vpp/vdosys Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 015/228] arm64: dts: mediatek: mt8195: Add missing gce-client-reg to mutex Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 016/228] arm64: dts: mediatek: mt8195: Add missing gce-client-reg to mutex1 Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 017/228] arm64: dts: mediatek: cherry: Describe CPU supplies Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 018/228] arm64: dts: mediatek: mt8192-asurada: Update min voltage constraint for MT6315 Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 019/228] arm64: dts: mediatek: mt8195-cherry: " Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 020/228] arm64: dts: mediatek: mt8183-kukui: Use default min voltage for MT6358 Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 021/228] arm64: dts: mediatek: mt7622: fix clock controllers Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 022/228] arm64: dts: mediatek: mt7622: fix IR nodename Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 023/228] arm64: dts: mediatek: mt7622: fix ethernet controller "compatible" Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 024/228] arm64: dts: mediatek: mt7622: drop "reset-names" from thermal block Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 025/228] arm64: dts: mediatek: mt7986: reorder properties Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 026/228] arm64: dts: mediatek: mt7986: drop invalid properties from ethsys Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 027/228] arm64: dts: mediatek: mt7986: drop "#reset-cells" from Ethernet controller Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 028/228] arm64: dts: mediatek: mt7986: reorder nodes Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 029/228] arm64: dts: mediatek: mt7986: drop invalid thermal block clock Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 030/228] arm64: dts: mediatek: mt7986: prefix BPI-R3 cooling maps with "map-" Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 031/228] arm64: dts: mediatek: mt2712: fix validation errors Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 032/228] arm64: dts: rockchip: mark system power controller and fix typo on orangepi-5-plus Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 033/228] arm64: dts: rockchip: regulator for sd needs to be always on for BPI-R2Pro Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 034/228] block: fix module reference leakage from bdev_open_by_dev error path Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 035/228] arm64: dts: qcom: Fix type of "wdog" IRQs for remoteprocs Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 036/228] arm64: dts: qcom: x1e80100: Fix the compatible for cluster idle states Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 037/228] arm64: dts: qcom: sc8180x: Fix ss_phy_irq for secondary USB controller Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 038/228] gpio: tangier: Use correct type for the IRQ chip data Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 039/228] ARC: [plat-hsdk]: Remove misplaced interrupt-cells property Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 040/228] wifi: mac80211: clean up assignments to pointer cache Greg Kroah-Hartman
2024-04-30 10:36 ` [PATCH 6.8 041/228] wifi: mac80211: split mesh fast tx cache into local/proxied/forwarded Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 042/228] wifi: iwlwifi: mvm: remove old PASN station when adding a new one Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 043/228] wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 044/228] drm/gma500: Remove lid code Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 045/228] wifi: mac80211_hwsim: init peer measurement result Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 046/228] wifi: mac80211: remove link before AP Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 047/228] wifi: mac80211: fix unaligned le16 access Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 048/228] net: libwx: fix alloc msix vectors failed Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 049/228] vxlan: drop packets from invalid src-address Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 050/228] net: bcmasp: fix memory leak when bringing down interface Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 051/228] mlxsw: core: Unregister EMAD trap using FORWARD action Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 052/228] mlxsw: core_env: Fix driver initialization with old firmware Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 053/228] mlxsw: pci: " Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 054/228] ARM: dts: microchip: at91-sama7g5ek: Replace regulator-suspend-voltage with the valid property Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 055/228] icmp: prevent possible NULL dereferences from icmp_build_probe() Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 056/228] bridge/br_netlink.c: no need to return void function Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 057/228] bnxt_en: refactor reset close code Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 058/228] bnxt_en: Fix the PCI-AER routines Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 059/228] bnxt_en: Fix error recovery for 5760X (P7) chips Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 060/228] cxl/core: Fix potential payload size confusion in cxl_mem_get_poison() Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 061/228] net: dsa: mv88e6xx: fix supported_interfaces setup in mv88e6250_phylink_get_caps() Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 062/228] NFC: trf7970a: disable all regulators on removal Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 063/228] netfs: Fix writethrough-mode error handling Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 064/228] ax25: Fix netdev refcount issue Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 065/228] soc: mediatek: mtk-svs: Append "-thermal" to thermal zone names Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 066/228] tools: ynl: dont ignore errors in NLMSG_DONE messages Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 067/228] net: make SK_MEMORY_PCPU_RESERV tunable Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 068/228] net: fix sk_memory_allocated_{add|sub} vs softirqs Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 069/228] ipv4: check for NULL idev in ip_route_use_hint() Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 070/228] net: usb: ax88179_178a: stop lying about skb->truesize Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 071/228] tcp: Fix Use-After-Free in tcp_ao_connect_init Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 072/228] net: gtp: Fix Use-After-Free in gtp_dellink Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 073/228] net: phy: mediatek-ge-soc: follow netdev LED trigger semantics Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 074/228] gpio: tegra186: Fix tegra186_gpio_is_accessible() check Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 075/228] drm/xe: Remove sysfs only once on action add failure Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 076/228] drm/xe: call free_gsc_pkt " Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 077/228] Bluetooth: hci_event: Use HCI error defines instead of magic values Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 078/228] Bluetooth: hci_conn: Only do ACL connections sequentially Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 079/228] Bluetooth: Remove pending ACL connection attempts Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 080/228] Bluetooth: hci_conn: Always use sk_timeo as conn_timeout Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 081/228] Bluetooth: hci_conn: Fix UAF Write in __hci_acl_create_connection_sync Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 082/228] Bluetooth: hci_sync: Add helper functions to manipulate cmd_sync queue Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 083/228] Bluetooth: hci_sync: Attempt to dequeue connection attempt Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 084/228] Bluetooth: ISO: Reassemble PA data for bcast sink Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 085/228] Bluetooth: hci_sync: Use advertised PHYs on hci_le_ext_create_conn_sync Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 086/228] Bluetooth: btusb: Fix triggering coredump implementation for QCA Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 087/228] Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 088/228] Bluetooth: MGMT: Fix failing to MGMT_OP_ADD_UUID/MGMT_OP_REMOVE_UUID Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 089/228] Bluetooth: btusb: mediatek: Fix double free of skb in coredump Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 090/228] Bluetooth: hci_sync: Using hci_cmd_sync_submit when removing Adv Monitor Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 091/228] Bluetooth: qca: set power_ctrl_enabled on NULL returned by gpiod_get_optional() Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 092/228] ipvs: Fix checksumming on GSO of SCTP packets Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 093/228] net: openvswitch: Fix Use-After-Free in ovs_ct_exit Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 094/228] mlxsw: Use refcount_t for reference counting Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 095/228] mlxsw: spectrum_acl_tcam: Fix race in region ID allocation Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 096/228] mlxsw: spectrum_acl_tcam: Fix race during rehash delayed work Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 097/228] mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 098/228] mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 099/228] mlxsw: spectrum_acl_tcam: Rate limit error message Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 100/228] mlxsw: spectrum_acl_tcam: Fix memory leak during rehash Greg Kroah-Hartman
2024-04-30 10:37 ` [PATCH 6.8 101/228] mlxsw: spectrum_acl_tcam: Fix warning " Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 102/228] mlxsw: spectrum_acl_tcam: Fix incorrect list API usage Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 103/228] mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 104/228] eth: bnxt: fix counting packets discarded due to OOM and netpoll Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 105/228] ARM: dts: imx6ull-tarragon: fix USB over-current polarity Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 106/228] netfilter: nf_tables: honor table dormant flag from netdev release event path Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 107/228] net: phy: dp83869: Fix MII mode failure Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 108/228] net: ti: icssg-prueth: Fix signedness bug in prueth_init_rx_chns() Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 109/228] i40e: Do not use WQ_MEM_RECLAIM flag for workqueue Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 110/228] i40e: Report MFS in decimal base instead of hex Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 111/228] iavf: Fix TC config comparison with existing adapter TC config Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 112/228] ice: fix LAG and VF lock dependency in ice_reset_vf() Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 113/228] net: ethernet: ti: am65-cpts: Fix PTPv1 message type on TX packets Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 114/228] octeontx2-af: fix the double free in rvu_npc_freemem() Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 115/228] dpll: check that pin is registered in __dpll_pin_unregister() Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 116/228] dpll: fix dpll_pin_on_pin_register() for multiple parent pins Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 117/228] tls: fix lockless read of strp->msg_ready in ->poll Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 118/228] af_unix: Suppress false-positive lockdep splat for spin_lock() in __unix_gc() Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 119/228] netfs: Fix the pre-flush when appending to a file in writethrough mode Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 120/228] drm/amd/display: Check DP Alt mode DPCS state via DMUB Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 121/228] Revert "drm/amd/display: fix USB-C flag update after enc10 feature init" Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 122/228] xhci: move event processing for one interrupter to a separate function Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 123/228] usb: xhci: correct return value in case of STS_HCE Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 124/228] KVM: x86/pmu: Zero out PMU metadata on AMD if PMU is disabled Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 125/228] KVM: x86/pmu: Set enable bits for GP counters in PERF_GLOBAL_CTRL at "RESET" Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 126/228] drm: add drm_gem_object_is_shared_for_memory_stats() helper Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 127/228] drm/amdgpu: add shared fdinfo stats Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 128/228] drm/amdgpu: fix visible VRAM handling during faults Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 129/228] selftests/seccomp: user_notification_addfd check nextfd is available Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 130/228] selftests/seccomp: Change the syscall used in KILL_THREAD test Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 131/228] selftests/seccomp: Handle EINVAL on unshare(CLONE_NEWPID) Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 132/228] x86/CPU/AMD: Add models 0x10-0x1f to the Zen5 range Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 133/228] x86/cpu: Fix check for RDPKRU in __show_regs() Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 134/228] rust: phy: implement `Send` for `Registration` Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 135/228] rust: kernel: require `Send` for `Module` implementations Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 136/228] rust: dont select CONSTRUCTORS Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 137/228] rust: init: remove impl Zeroable for Infallible Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 138/228] rust: make mutually exclusive with CFI_CLANG Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 139/228] kbuild: rust: remove unneeded `@rustc_cfg` to avoid ICE Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 140/228] kbuild: rust: force `alloc` extern to allow "empty" Rust files Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 141/228] rust: remove `params` from `module` macro example Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 142/228] Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 143/228] Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 144/228] Bluetooth: qca: fix NULL-deref on non-serdev suspend Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 145/228] Bluetooth: qca: fix NULL-deref on non-serdev setup Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 146/228] mtd: rawnand: qcom: Fix broken OP_RESET_DEVICE command in qcom_misc_cmd_type_exec() Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 147/228] mm/hugetlb: fix missing hugetlb_lock for resv uncharge Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 148/228] mmc: sdhci-msm: pervent access to suspended controller Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 149/228] mmc: sdhci-of-dwcmshc: th1520: Increase tuning loop count to 128 Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 150/228] mm: create FOLIO_FLAG_FALSE and FOLIO_TYPE_OPS macros Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 151/228] mm: support page_mapcount() on page_has_type() pages Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 152/228] mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when dissolve_free_hugetlb_folio() Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 153/228] smb: client: Fix struct_group() usage in __packed structs Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 154/228] smb3: missing lock when picking channel Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 155/228] smb3: fix lock ordering potential deadlock in cifs_sync_mid_result Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 156/228] HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 157/228] HID: i2c-hid: Revert to await reset ACK before reading report descriptor Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 158/228] btrfs: fallback if compressed IO fails for ENOSPC Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 159/228] btrfs: fix wrong block_start calculation for btrfs_drop_extent_map_range() Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 160/228] btrfs: scrub: run relocation repair when/only needed Greg Kroah-Hartman
2024-04-30 10:38 ` [PATCH 6.8 161/228] btrfs: fix information leak in btrfs_ioctl_logical_to_ino() Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 162/228] x86/tdx: Preserve shared bit on mprotect() Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 163/228] cpu: Re-enable CPU mitigations by default for !X86 architectures Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 164/228] eeprom: at24: fix memory corruption race condition Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 165/228] LoongArch: Fix callchain parse error with kernel tracepoint events Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 166/228] LoongArch: Fix access error when read fault on a write-only VMA Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 167/228] arm64: dts: qcom: sc8280xp: add missing PCIe minimum OPP Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 168/228] arm64: dts: qcom: sm8450: Fix the msi-map entries Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 169/228] arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 Puma Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 170/228] dmaengine: Revert "dmaengine: pl330: issue_pending waits until WFP state" Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 171/228] dmaengine: xilinx: xdma: Fix wrong offsets in the buffers addresses in dma descriptor Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 172/228] dmaengine: xilinx: xdma: Fix synchronization issue Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 173/228] drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 174/228] drm/amdgpu: Assign correct bits for SDMA HDP flush Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 175/228] drm/atomic-helper: fix parameter order in drm_format_conv_state_copy() call Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 176/228] drm/amdgpu/pm: Remove gpu_od if its an empty directory Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 177/228] drm/amdgpu/umsch: dont execute umsch test when GPU is in reset/suspend Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 178/228] drm/amdgpu: Fix leak when GPU memory allocation fails Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 179/228] drm/amdkfd: Fix rescheduling of restore worker Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 180/228] drm/amdkfd: Fix eviction fence handling Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 181/228] irqchip/gic-v3-its: Prevent double free on error Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 182/228] ACPI: CPPC: Use access_width over bit_width for system memory accesses Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 183/228] ACPI: CPPC: Fix bit_offset shift in MASK_VAL() macro Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 184/228] ACPI: CPPC: Fix access width used for PCC registers Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 185/228] net/mlx5e: Advertise mlx5 ethernet driver updates sk_buff md_dst for MACsec Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 186/228] ethernet: Add helper for assigning packet type when dest address does not match device address Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 187/228] net: b44: set pause params only when interface is up Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 188/228] macsec: Enable devices to advertise whether they update sk_buff md_dst during offloads Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 189/228] macsec: Detect if Rx skb is macsec-related for offloading devices that update md_dst Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 190/228] stackdepot: respect __GFP_NOLOCKDEP allocation flag Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 191/228] fbdev: fix incorrect address computation in deferred IO Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 192/228] udp: preserve the connected status if only UDP cmsg Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 193/228] mtd: limit OTP NVMEM cell parse to non-NAND devices Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 194/228] mtd: diskonchip: work around ubsan link failure Greg Kroah-Hartman
2024-04-30 10:39 ` Greg Kroah-Hartman [this message]
2024-04-30 10:39 ` [PATCH 6.8 196/228] phy: qcom: qmp-combo: Fix register base for QSERDES_DP_PHY_MODE Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 197/228] phy: qcom: qmp-combo: Fix VCO div offset on v3 Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 198/228] mm: turn folio_test_hugetlb into a PageType Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 199/228] mm: zswap: fix shrinker NULL crash with cgroup_disable=memory Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 200/228] dmaengine: owl: fix register access functions Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 201/228] dmaengine: tegra186: Fix residual calculation Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 202/228] idma64: Dont try to serve interrupts when device is powered off Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 203/228] soundwire: amd: fix for wake interrupt handling for clockstop mode Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 204/228] phy: marvell: a3700-comphy: Fix out of bounds read Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 205/228] phy: marvell: a3700-comphy: Fix hardcoded array size Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 206/228] phy: freescale: imx8m-pcie: fix pcie link-up instability Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 207/228] phy: rockchip-snps-pcie3: fix bifurcation on rk3588 Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 208/228] phy: rockchip-snps-pcie3: fix clearing PHP_GRF_PCIESEL_CON bits Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 209/228] phy: rockchip: naneng-combphy: Fix mux on rk3588 Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 210/228] phy: qcom: m31: match requested regulator name with dt schema Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 211/228] dmaengine: idxd: Convert spinlock to mutex to lock evl workqueue Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 212/228] dma: xilinx_dpdma: Fix locking Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 213/228] dmaengine: idxd: Fix oops during rmmod on single-CPU platforms Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 214/228] riscv: Fix TASK_SIZE on 64-bit NOMMU Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 215/228] riscv: Fix loading 64-bit NOMMU kernels past the start of RAM Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 216/228] phy: ti: tusb1210: Resolve charger-det crash if charger psy is unregistered Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 217/228] dt-bindings: eeprom: at24: Fix ST M24C64-D compatible schema Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 218/228] sched/eevdf: Always update V if se->on_rq when reweighting Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 219/228] sched/eevdf: Fix miscalculation in reweight_entity() when se is not curr Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 220/228] sched/eevdf: Prevent vlag from going out of bounds in reweight_eevdf() Greg Kroah-Hartman
2024-04-30 10:39 ` [PATCH 6.8 221/228] riscv: hwprobe: fix invalid sign extension for RISCV_HWPROBE_EXT_ZVFHMIN Greg Kroah-Hartman
2024-04-30 10:40 ` [PATCH 6.8 222/228] RISC-V: selftests: cbo: Ensure asm operands match constraints, take 2 Greg Kroah-Hartman
2024-04-30 10:40 ` [PATCH 6.8 223/228] i2c: smbus: fix NULL function pointer dereference Greg Kroah-Hartman
2024-04-30 10:40 ` [PATCH 6.8 224/228] phy: qcom: qmp-combo: fix VCO div offset on v5_5nm and v6 Greg Kroah-Hartman
2024-04-30 10:40 ` [PATCH 6.8 225/228] bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS Greg Kroah-Hartman
2024-04-30 10:40 ` [PATCH 6.8 226/228] Bluetooth: hci_sync: Fix UAF in hci_acl_create_conn_sync Greg Kroah-Hartman
2024-04-30 10:40 ` [PATCH 6.8 227/228] Bluetooth: hci_sync: Fix UAF on create_le_conn_complete Greg Kroah-Hartman
2024-04-30 10:40 ` [PATCH 6.8 228/228] Bluetooth: hci_sync: Fix UAF on hci_abort_conn_sync Greg Kroah-Hartman
2024-04-30 16:49 ` [PATCH 6.8 000/228] 6.8.9-rc1 review SeongJae Park
2024-04-30 19:29 ` Florian Fainelli
2024-04-30 20:40 ` Justin Forbes
2024-05-01  2:12 ` Bagas Sanjaya
2024-05-01  5:25 ` Naresh Kamboju
2024-05-01  8:37 ` Ron Economos
2024-05-01 11:36 ` Miguel Ojeda
2024-05-01 13:39 ` Jon Hunter
2024-05-01 13:41 ` Mark Brown
2024-05-02  2:11 ` Shuah Khan
2024-05-02  6:47 ` Pascal Ernster

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20240430103109.426068542@linuxfoundation.org \
    --to=gregkh@linuxfoundation.org \
    --cc=andersson@kernel.org \
    --cc=johan+linaro@kernel.org \
    --cc=konrad.dybcio@linaro.org \
    --cc=luzmaximilian@gmail.com \
    --cc=patches@lists.linux.dev \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).