patches.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: stable@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
	patches@lists.linux.dev, Zixi Chen <zixchen@redhat.com>,
	Paolo Bonzini <pbonzini@redhat.com>,
	Dave Hansen <dave.hansen@linux.intel.com>
Subject: [PATCH 6.7 121/162] x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers
Date: Mon,  4 Mar 2024 21:23:06 +0000	[thread overview]
Message-ID: <20240304211555.620711704@linuxfoundation.org> (raw)
In-Reply-To: <20240304211551.833500257@linuxfoundation.org>

6.7-stable review patch.  If anyone has any objections, please let me know.

------------------

From: Paolo Bonzini <pbonzini@redhat.com>

commit 6890cb1ace350b4386c8aee1343dc3b3ddd214da upstream.

MKTME repurposes the high bit of physical address to key id for encryption
key and, even though MAXPHYADDR in CPUID[0x80000008] remains the same,
the valid bits in the MTRR mask register are based on the reduced number
of physical address bits.

detect_tme() in arch/x86/kernel/cpu/intel.c detects TME and subtracts
it from the total usable physical bits, but it is called too late.
Move the call to early_init_intel() so that it is called in setup_arch(),
before MTRRs are setup.

This fixes boot on TDX-enabled systems, which until now only worked with
"disable_mtrr_cleanup".  Without the patch, the values written to the
MTRRs mask registers were 52-bit wide (e.g. 0x000fffff_80000800) and
the writes failed; with the patch, the values are 46-bit wide, which
matches the reduced MAXPHYADDR that is shown in /proc/cpuinfo.

Reported-by: Zixi Chen <zixchen@redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com>
Cc:stable@vger.kernel.org
Link: https://lore.kernel.org/all/20240131230902.1867092-3-pbonzini%40redhat.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
 arch/x86/kernel/cpu/intel.c |  178 ++++++++++++++++++++++----------------------
 1 file changed, 91 insertions(+), 87 deletions(-)

--- a/arch/x86/kernel/cpu/intel.c
+++ b/arch/x86/kernel/cpu/intel.c
@@ -184,6 +184,90 @@ static bool bad_spectre_microcode(struct
 	return false;
 }
 
+#define MSR_IA32_TME_ACTIVATE		0x982
+
+/* Helpers to access TME_ACTIVATE MSR */
+#define TME_ACTIVATE_LOCKED(x)		(x & 0x1)
+#define TME_ACTIVATE_ENABLED(x)		(x & 0x2)
+
+#define TME_ACTIVATE_POLICY(x)		((x >> 4) & 0xf)	/* Bits 7:4 */
+#define TME_ACTIVATE_POLICY_AES_XTS_128	0
+
+#define TME_ACTIVATE_KEYID_BITS(x)	((x >> 32) & 0xf)	/* Bits 35:32 */
+
+#define TME_ACTIVATE_CRYPTO_ALGS(x)	((x >> 48) & 0xffff)	/* Bits 63:48 */
+#define TME_ACTIVATE_CRYPTO_AES_XTS_128	1
+
+/* Values for mktme_status (SW only construct) */
+#define MKTME_ENABLED			0
+#define MKTME_DISABLED			1
+#define MKTME_UNINITIALIZED		2
+static int mktme_status = MKTME_UNINITIALIZED;
+
+static void detect_tme_early(struct cpuinfo_x86 *c)
+{
+	u64 tme_activate, tme_policy, tme_crypto_algs;
+	int keyid_bits = 0, nr_keyids = 0;
+	static u64 tme_activate_cpu0 = 0;
+
+	rdmsrl(MSR_IA32_TME_ACTIVATE, tme_activate);
+
+	if (mktme_status != MKTME_UNINITIALIZED) {
+		if (tme_activate != tme_activate_cpu0) {
+			/* Broken BIOS? */
+			pr_err_once("x86/tme: configuration is inconsistent between CPUs\n");
+			pr_err_once("x86/tme: MKTME is not usable\n");
+			mktme_status = MKTME_DISABLED;
+
+			/* Proceed. We may need to exclude bits from x86_phys_bits. */
+		}
+	} else {
+		tme_activate_cpu0 = tme_activate;
+	}
+
+	if (!TME_ACTIVATE_LOCKED(tme_activate) || !TME_ACTIVATE_ENABLED(tme_activate)) {
+		pr_info_once("x86/tme: not enabled by BIOS\n");
+		mktme_status = MKTME_DISABLED;
+		return;
+	}
+
+	if (mktme_status != MKTME_UNINITIALIZED)
+		goto detect_keyid_bits;
+
+	pr_info("x86/tme: enabled by BIOS\n");
+
+	tme_policy = TME_ACTIVATE_POLICY(tme_activate);
+	if (tme_policy != TME_ACTIVATE_POLICY_AES_XTS_128)
+		pr_warn("x86/tme: Unknown policy is active: %#llx\n", tme_policy);
+
+	tme_crypto_algs = TME_ACTIVATE_CRYPTO_ALGS(tme_activate);
+	if (!(tme_crypto_algs & TME_ACTIVATE_CRYPTO_AES_XTS_128)) {
+		pr_err("x86/mktme: No known encryption algorithm is supported: %#llx\n",
+				tme_crypto_algs);
+		mktme_status = MKTME_DISABLED;
+	}
+detect_keyid_bits:
+	keyid_bits = TME_ACTIVATE_KEYID_BITS(tme_activate);
+	nr_keyids = (1UL << keyid_bits) - 1;
+	if (nr_keyids) {
+		pr_info_once("x86/mktme: enabled by BIOS\n");
+		pr_info_once("x86/mktme: %d KeyIDs available\n", nr_keyids);
+	} else {
+		pr_info_once("x86/mktme: disabled by BIOS\n");
+	}
+
+	if (mktme_status == MKTME_UNINITIALIZED) {
+		/* MKTME is usable */
+		mktme_status = MKTME_ENABLED;
+	}
+
+	/*
+	 * KeyID bits effectively lower the number of physical address
+	 * bits.  Update cpuinfo_x86::x86_phys_bits accordingly.
+	 */
+	c->x86_phys_bits -= keyid_bits;
+}
+
 static void early_init_intel(struct cpuinfo_x86 *c)
 {
 	u64 misc_enable;
@@ -322,6 +406,13 @@ static void early_init_intel(struct cpui
 	 */
 	if (detect_extended_topology_early(c) < 0)
 		detect_ht_early(c);
+
+	/*
+	 * Adjust the number of physical bits early because it affects the
+	 * valid bits of the MTRR mask registers.
+	 */
+	if (cpu_has(c, X86_FEATURE_TME))
+		detect_tme_early(c);
 }
 
 static void bsp_init_intel(struct cpuinfo_x86 *c)
@@ -482,90 +573,6 @@ static void srat_detect_node(struct cpui
 #endif
 }
 
-#define MSR_IA32_TME_ACTIVATE		0x982
-
-/* Helpers to access TME_ACTIVATE MSR */
-#define TME_ACTIVATE_LOCKED(x)		(x & 0x1)
-#define TME_ACTIVATE_ENABLED(x)		(x & 0x2)
-
-#define TME_ACTIVATE_POLICY(x)		((x >> 4) & 0xf)	/* Bits 7:4 */
-#define TME_ACTIVATE_POLICY_AES_XTS_128	0
-
-#define TME_ACTIVATE_KEYID_BITS(x)	((x >> 32) & 0xf)	/* Bits 35:32 */
-
-#define TME_ACTIVATE_CRYPTO_ALGS(x)	((x >> 48) & 0xffff)	/* Bits 63:48 */
-#define TME_ACTIVATE_CRYPTO_AES_XTS_128	1
-
-/* Values for mktme_status (SW only construct) */
-#define MKTME_ENABLED			0
-#define MKTME_DISABLED			1
-#define MKTME_UNINITIALIZED		2
-static int mktme_status = MKTME_UNINITIALIZED;
-
-static void detect_tme(struct cpuinfo_x86 *c)
-{
-	u64 tme_activate, tme_policy, tme_crypto_algs;
-	int keyid_bits = 0, nr_keyids = 0;
-	static u64 tme_activate_cpu0 = 0;
-
-	rdmsrl(MSR_IA32_TME_ACTIVATE, tme_activate);
-
-	if (mktme_status != MKTME_UNINITIALIZED) {
-		if (tme_activate != tme_activate_cpu0) {
-			/* Broken BIOS? */
-			pr_err_once("x86/tme: configuration is inconsistent between CPUs\n");
-			pr_err_once("x86/tme: MKTME is not usable\n");
-			mktme_status = MKTME_DISABLED;
-
-			/* Proceed. We may need to exclude bits from x86_phys_bits. */
-		}
-	} else {
-		tme_activate_cpu0 = tme_activate;
-	}
-
-	if (!TME_ACTIVATE_LOCKED(tme_activate) || !TME_ACTIVATE_ENABLED(tme_activate)) {
-		pr_info_once("x86/tme: not enabled by BIOS\n");
-		mktme_status = MKTME_DISABLED;
-		return;
-	}
-
-	if (mktme_status != MKTME_UNINITIALIZED)
-		goto detect_keyid_bits;
-
-	pr_info("x86/tme: enabled by BIOS\n");
-
-	tme_policy = TME_ACTIVATE_POLICY(tme_activate);
-	if (tme_policy != TME_ACTIVATE_POLICY_AES_XTS_128)
-		pr_warn("x86/tme: Unknown policy is active: %#llx\n", tme_policy);
-
-	tme_crypto_algs = TME_ACTIVATE_CRYPTO_ALGS(tme_activate);
-	if (!(tme_crypto_algs & TME_ACTIVATE_CRYPTO_AES_XTS_128)) {
-		pr_err("x86/mktme: No known encryption algorithm is supported: %#llx\n",
-				tme_crypto_algs);
-		mktme_status = MKTME_DISABLED;
-	}
-detect_keyid_bits:
-	keyid_bits = TME_ACTIVATE_KEYID_BITS(tme_activate);
-	nr_keyids = (1UL << keyid_bits) - 1;
-	if (nr_keyids) {
-		pr_info_once("x86/mktme: enabled by BIOS\n");
-		pr_info_once("x86/mktme: %d KeyIDs available\n", nr_keyids);
-	} else {
-		pr_info_once("x86/mktme: disabled by BIOS\n");
-	}
-
-	if (mktme_status == MKTME_UNINITIALIZED) {
-		/* MKTME is usable */
-		mktme_status = MKTME_ENABLED;
-	}
-
-	/*
-	 * KeyID bits effectively lower the number of physical address
-	 * bits.  Update cpuinfo_x86::x86_phys_bits accordingly.
-	 */
-	c->x86_phys_bits -= keyid_bits;
-}
-
 static void init_cpuid_fault(struct cpuinfo_x86 *c)
 {
 	u64 msr;
@@ -702,9 +709,6 @@ static void init_intel(struct cpuinfo_x8
 
 	init_ia32_feat_ctl(c);
 
-	if (cpu_has(c, X86_FEATURE_TME))
-		detect_tme(c);
-
 	init_intel_misc_features(c);
 
 	split_lock_init();



  parent reply	other threads:[~2024-03-04 21:32 UTC|newest]

Thread overview: 182+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-03-04 21:21 [PATCH 6.7 000/162] 6.7.9-rc1 review Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 001/162] btrfs: fix deadlock with fiemap and extent locking Greg Kroah-Hartman
2024-03-06 12:39   ` Filipe Manana
2024-03-06 13:47     ` Greg Kroah-Hartman
2024-03-11  9:15     ` Linux regression tracking (Thorsten Leemhuis)
2024-03-11 18:41       ` David Sterba
2024-03-11 19:23         ` Linux regression tracking (Thorsten Leemhuis)
2024-03-11 20:06           ` Filipe Manana
2024-03-13 13:42             ` Linux regression tracking (Thorsten Leemhuis)
2024-03-13 13:47               ` Filipe Manana
2024-03-12 16:41           ` David Sterba
2024-03-04 21:21 ` [PATCH 6.7 002/162] mtd: spinand: gigadevice: Fix the get ecc status issue Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 003/162] ice: fix connection state of DPLL and out pin Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 004/162] ice: fix dpll input pin phase_adjust value updates Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 005/162] ice: fix dpll and dpll_pin data access on PF reset Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 006/162] ice: fix dpll periodic work data updates " Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 007/162] ice: fix pin phase adjust " Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 008/162] spi: cadence-qspi: fix pointer reference in runtime PM hooks Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 009/162] spi: cadence-qspi: remove system-wide suspend helper calls from " Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 010/162] netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 011/162] netlink: add nla be16/32 types to minlen array Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 012/162] net: ip_tunnel: prevent perpetual headroom growth Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 013/162] net: mctp: take ownership of skb in mctp_local_output Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 014/162] net: dpaa: fman_memac: accept phy-interface-type = "10gbase-r" in the device tree Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 015/162] tun: Fix xdp_rxq_infos queue_index when detaching Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 016/162] cpufreq: intel_pstate: fix pstate limits enforcement for adjust_perf call back Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 017/162] net: veth: clear GRO when clearing XDP even when down Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 018/162] ipv6: fix potential "struct net" leak in inet6_rtm_getaddr() Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 019/162] lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is detected Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 020/162] veth: try harder when allocating queue memory Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 021/162] net: usb: dm9601: fix wrong return value in dm9601_mdio_read Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 022/162] net: lan78xx: fix "softirq work is pending" error Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 023/162] uapi: in6: replace temporary label with rfc9486 Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 024/162] stmmac: Clear variable when destroying workqueue Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 025/162] Bluetooth: hci_sync: Check the correct flag before starting a scan Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 026/162] Bluetooth: Avoid potential use-after-free in hci_error_reset Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 027/162] Bluetooth: hci_sync: Fix accept_list when attempting to suspend Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 028/162] Bluetooth: hci_event: Fix wrongly recorded wakeup BD_ADDR Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 029/162] Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 030/162] Bluetooth: Enforce validation on max value of connection interval Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 031/162] Bluetooth: qca: Fix wrong event type for patch config command Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 032/162] Bluetooth: hci_qca: Set BDA quirk bit if fwnode exists in DT Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 033/162] Bluetooth: qca: Fix triggering coredump implementation Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 034/162] netfilter: nf_tables: allow NFPROTO_INET in nft_(match/target)_validate() Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 035/162] netfilter: bridge: confirm multicast packets before passing them up the stack Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 036/162] tools: ynl: fix handling of multiple mcast groups Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 037/162] rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 038/162] igb: extend PTP timestamp adjustments to i211 Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 039/162] net: hsr: Use correct offset for HSR TLV values in supervisory HSR frames Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 040/162] tls: decrement decrypt_pending if no async completion will be called Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 041/162] tls: fix peeking with sync+async decryption Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 042/162] tls: separate no-async decryption request handling from async Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 043/162] tls: fix use-after-free on failed backlog decryption Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 044/162] riscv: tlb: fix __p*d_free_tlb() Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 045/162] efi/capsule-loader: fix incorrect allocation size Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 046/162] power: supply: bq27xxx-i2c: Do not free non existing IRQ Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 047/162] ASoC: cs35l56: Must clear HALO_STATE before issuing SYSTEM_RESET Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 048/162] ALSA: Drop leftover snd-rtctimer stuff from Makefile Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 049/162] ASoC: qcom: Fix uninitialized pointer dmactl Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 050/162] gpu: host1x: Skip reset assert on Tegra186 Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 051/162] riscv: mm: fix NOCACHE_THEAD does not set bit[61] correctly Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 052/162] riscv: Fix build error if !CONFIG_ARCH_ENABLE_HUGEPAGE_MIGRATION Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 053/162] ASoC: cs35l56: cs35l56_component_remove() must clear cs35l56->component Greg Kroah-Hartman
2024-03-04 21:21 ` [PATCH 6.7 054/162] ASoC: cs35l56: cs35l56_component_remove() must clean up wm_adsp Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 055/162] ASoC: cs35l56: Dont add the same register patch multiple times Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 056/162] ASoC: cs35l56: Fix for initializing ASP1 mixer registers Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 057/162] ASoC: cs35l56: Fix misuse of wm_adsp part string for silicon revision Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 058/162] ASoC: cs35l56: Fix deadlock in ASP1 mixer register initialization Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 059/162] ASoC: soc-card: Fix missing locking in snd_soc_card_get_kcontrol() Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 060/162] RISC-V: Ignore V from the riscv,isa DT property on older T-Head CPUs Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 061/162] drm/tegra: Remove existing framebuffer only if we support display Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 062/162] fbcon: always restore the old font data in fbcon_do_set_font() Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 063/162] afs: Fix endless loop in directory parsing Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 064/162] drm/amd/display: Prevent potential buffer overflow in map_hw_resources Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 065/162] drivers: perf: added capabilities for legacy PMU Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 066/162] drivers: perf: ctr_get_width function for legacy is not defined Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 067/162] Revert "riscv: mm: support Svnapot in huge vmap" Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 068/162] riscv: Fix pte_leaf_size() for NAPOT Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 069/162] riscv: Sparse-Memory/vmemmap out-of-bounds fix Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 070/162] btrfs: fix race between ordered extent completion and fiemap Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 071/162] drm/nouveau: keep DMA buffers required for suspend/resume Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 072/162] of: property: fw_devlink: Fix stupid bug in remote-endpoint parsing Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 073/162] tomoyo: fix UAF write bug in tomoyo_write_control() Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 074/162] ALSA: firewire-lib: fix to check cycle continuity Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 075/162] ALSA: ump: Fix the discard error code from snd_ump_legacy_open() Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 076/162] ALSA: hda/realtek: Fix top speaker connection on Dell Inspiron 16 Plus 7630 Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 077/162] ALSA: hda/realtek: tas2781: enable subwoofer volume control Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 078/162] ALSA: hda/realtek: Enable Mute LED on HP 840 G8 (MB 8AB8) Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 079/162] ALSA: hda/realtek: fix mute/micmute LED For HP mt440 Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 080/162] ALSA: hda/realtek: Add special fixup for Lenovo 14IRP8 Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 081/162] Bluetooth: hci_bcm4377: do not mark valid bd_addr as invalid Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 082/162] landlock: Fix asymmetric private inodes referring Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 083/162] gtp: fix use-after-free and null-ptr-deref in gtp_newlink() Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 084/162] mm: cachestat: fix folio read-after-free in cache walk Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 085/162] mtd: rawnand: marvell: fix layouts Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 086/162] wifi: nl80211: reject iftype change with mesh ID change Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 087/162] btrfs: fix double free of anonymous device after snapshot creation failure Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 088/162] btrfs: dev-replace: properly validate device names Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 089/162] btrfs: send: dont issue unnecessary zero writes for trailing hole Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 090/162] Revert "drm/amd/pm: resolve reboot exception for si oland" Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 091/162] drm/buddy: fix range bias Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 092/162] drm/amdgpu/pm: Fix the power1_min_cap value Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 093/162] drm/amd/display: Add monitor patch for specific eDP Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 094/162] soc: qcom: pmic_glink: Fix boot when QRTR=m Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 095/162] dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 096/162] crypto: arm64/neonbs - fix out-of-bounds access on short input Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 097/162] dmaengine: ptdma: use consistent DMA masks Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 098/162] dmaengine: fsl-edma: correct calculation of nbytes in multi-fifo scenario Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 099/162] dmaengine: fsl-qdma: init irq after reg initialization Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 100/162] mmc: mmci: stm32: fix DMA API overlapping mappings warning Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 101/162] mmc: core: Fix eMMC initialization with 1-bit bus connection Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 102/162] mmc: sdhci-xenon: add timeout for PHY init complete Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 103/162] mmc: sdhci-xenon: fix PHY init clock stability Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 104/162] ceph: switch to corrected encoding of max_xattr_size in mdsmap Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 105/162] RISC-V: Drop invalid test from CONFIG_AS_HAS_OPTION_ARCH Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 106/162] riscv: add CALLER_ADDRx support Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 107/162] riscv: Fix enabling cbo.zero when running in M-mode Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 108/162] riscv: Save/restore envcfg CSR during CPU suspend Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 109/162] power: supply: mm8013: select REGMAP_I2C Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 110/162] kbuild: Add -Wa,--fatal-warnings to as-instr invocation Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 111/162] iommufd: Fix iopt_access_list_id overwrite bug Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 112/162] iommufd: Fix protection fault in iommufd_test_syz_conv_iova Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 113/162] efivarfs: Request at most 512 bytes for variable names Greg Kroah-Hartman
2024-03-04 21:22 ` [PATCH 6.7 114/162] pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 115/162] pmdomain: qcom: rpmhpd: Fix enabled_corner aggregation Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 116/162] fprobe: Fix to allocate entry_data_size buffer with rethook instances Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 117/162] mm/debug_vm_pgtable: fix BUG_ON with pud advanced test Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 118/162] mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 119/162] x86/e820: Dont reserve SETUP_RNG_SEED in e820 Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 120/162] x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() Greg Kroah-Hartman
2024-03-04 21:23 ` Greg Kroah-Hartman [this message]
2024-03-04 21:23 ` [PATCH 6.7 122/162] mptcp: map v4 address to v6 when destroying subflow Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 123/162] mptcp: avoid printing warning once on client side Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 124/162] mptcp: push at DSS boundaries Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 125/162] selftests: mptcp: join: add ss mptcp support check Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 126/162] mptcp: fix snd_wnd initialization for passive socket Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 127/162] mptcp: fix potential wake-up event loss Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 128/162] mptcp: fix double-free on socket dismantle Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 129/162] mptcp: fix possible deadlock in subflow diag Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 130/162] mfd: twl6030-irq: Revert to use of_match_device() Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 131/162] NFS: Fix data corruption caused by congestion Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 132/162] af_unix: Fix task hung while purging oob_skb in GC Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 133/162] af_unix: Drop oob_skb ref before purging queue " Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 134/162] ASoC: cs35l56: fix reversed if statement in cs35l56_dspwait_asp1tx_put() Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 135/162] dmaengine: dw-edma: Fix the ch_count hdma callback Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 136/162] dmaengine: dw-edma: Fix wrong interrupt bit set for HDMA Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 137/162] dmaengine: dw-edma: HDMA_V0_REMOTEL_STOP_INT_EN typo fix Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 138/162] dmaengine: dw-edma: Add HDMA remote interrupt configuration Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 139/162] dmaengine: dw-edma: HDMA: Add sync read before starting the DMA transfer in remote setup Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 140/162] dmaengine: dw-edma: eDMA: " Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 141/162] phy: freescale: phy-fsl-imx8-mipi-dphy: Fix alias name to use dashes Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 142/162] phy: qcom: phy-qcom-m31: fix wrong pointer pass to PTR_ERR() Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 143/162] phy: qcom-qmp-usb: fix v3 offsets data Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 144/162] dmaengine: idxd: Remove shadow Event Log head stored in idxd Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 145/162] dmaengine: idxd: Ensure safe user copy of completion record Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 146/162] powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 147/162] powerpc/rtas: use correct function name for resetting TCE tables Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 148/162] gpio: 74x164: Enable output pins after registers are reset Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 149/162] gpiolib: Fix the error path order in gpiochip_add_data_with_key() Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 150/162] gpio: fix resource unwinding order in error path Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 151/162] block: define bvec_iter as __packed __aligned(4) Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 152/162] x86/entry_64: Add VERW just before userspace transition Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 153/162] x86/entry_32: " Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 154/162] x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 155/162] KVM/VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 156/162] KVM/VMX: Move VERW closer to VMentry for MDS mitigation Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 157/162] selftests: mptcp: add evts_get_info helper Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 158/162] selftests: mptcp: add chk_subflows_total helper Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 159/162] selftests: mptcp: update userspace pm test helpers Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 160/162] selftests: mptcp: add mptcp_lib_is_v6 Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 161/162] selftests: mptcp: rm subflow with v4/v4mapped addr Greg Kroah-Hartman
2024-03-04 21:23 ` [PATCH 6.7 162/162] drm/nouveau: dont fini scheduler before entity flush Greg Kroah-Hartman
2024-03-04 22:48 ` [PATCH 6.7 000/162] 6.7.9-rc1 review SeongJae Park
2024-03-04 23:05   ` Luna Jernberg
2024-03-06 14:52     ` Greg Kroah-Hartman
2024-03-06 14:54       ` Luna Jernberg
2024-03-06 14:56       ` Luna Jernberg
2024-03-04 23:31 ` Ron Economos
2024-03-05  7:41   ` Greg Kroah-Hartman
2024-03-05  7:44     ` Luna Jernberg
2024-03-05  4:32 ` Bagas Sanjaya
2024-03-05 18:52 ` Shuah Khan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20240304211555.620711704@linuxfoundation.org \
    --to=gregkh@linuxfoundation.org \
    --cc=dave.hansen@linux.intel.com \
    --cc=patches@lists.linux.dev \
    --cc=pbonzini@redhat.com \
    --cc=stable@vger.kernel.org \
    --cc=zixchen@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).