From patchwork Sun Mar 3 10:53:04 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Borislav Petkov X-Patchwork-Id: 209297 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7301:fa17:b0:10a:f01:a869 with SMTP id ju23csp861699dyc; Sun, 3 Mar 2024 02:53:37 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCX5DQ0ZFjUi3nyYs5eizhpf8TCDaXnjn6ZreEQm/b0kLZhMK/Nz7+VWysValAlj7KekjNOva5Rv//pdhIO8afW4PPUc9Q== X-Google-Smtp-Source: AGHT+IGaV42i15Hz6/ogU+p5dwql9frmxV5Z7Ur7/rcnOP5AYPVtowG3irW9zQi290zaTczGVOco X-Received: by 2002:a05:6e02:156c:b0:365:147e:f813 with SMTP id k12-20020a056e02156c00b00365147ef813mr8337019ilu.23.1709463217411; Sun, 03 Mar 2024 02:53:37 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709463217; cv=pass; d=google.com; s=arc-20160816; b=EgghMOPvwzDU89TJkPJ2m6Y1OfZ9A5SGEJuXjLtS9Ob0+tXqs+A50mhj6MW1I9rpjd w7g+u4zP7hc+avG5mcwQqLzccjVUjjvpyn6sp1kw7bkHGHUlSai0Z2GHxpWGny3JK54A cGd5XA9JfPcWpSCl4VxzY6UTXKpShq1vu0DU0UllYrXsu+6+f49R679v1wSD4pBbeJd/ rLEJ4J9GkXrKJtOguUboiwBRXwpjQDrmQQs2X0gqTOv8Opp0LVJZu7S3V7bhHvls5dhJ N+lp86tLJ85N0y6hKTb4BVdpm0yqn12LcNOhDcxlfFGxXOLk+CBOkO1dr3DQKkLkljOZ MABA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-disposition:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:message-id:subject:cc:to:from:date :dkim-signature; bh=yzCITtHvXH1Imu68iSDIhhg9QvZ8rYfdfo2tZEbUclw=; fh=5ZjxVYKXeWzXrQtuvh8WKOTEKQBUJ80ckFoMga5XCYE=; b=z1bhqzUtNwlvnXMnvD4oZVsFSAPHf0Zt752dkO+/805BeDbsRLD55f8xlJvJr5u3gJ 3MyijqobZun6dROGtPmVAGmc2vqDQd1jScVIte6utJnj5R6jxFGAGiRnLt2FwEr6Oufo /E//uBIvXcQU3dmxBmVTJjed5YxHJ5YEb9A6p5mRd9HUwbtzlncFXWQeKJjS3lLFB0M6 Px5GT7MLGol0xs97lnBRI4MqkioMPB+oSDrvO/dBgW5xBgQeX/gsHZKdCxiOnl+mGuew CcKzk2iMEViwwBdAT9gPyJm01Qj51VqCFMekVNx43X2ABFHcMolBvnenc0S9RcOF9k3H rprw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@alien8.de header.s=alien8 header.b=H6k8g3vg; arc=pass (i=1 spf=pass spfdomain=alien8.de dkim=pass dkdomain=alien8.de dmarc=pass fromdomain=alien8.de); spf=pass (google.com: domain of linux-kernel+bounces-89709-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-89709-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id s17-20020a05622a179100b0042e8062afe7si7704522qtk.122.2024.03.03.02.53.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 03 Mar 2024 02:53:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-89709-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=alien8 header.b=H6k8g3vg; arc=pass (i=1 spf=pass spfdomain=alien8.de dkim=pass dkdomain=alien8.de dmarc=pass fromdomain=alien8.de); spf=pass (google.com: domain of linux-kernel+bounces-89709-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-89709-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 33B441C21194 for ; Sun, 3 Mar 2024 10:53:37 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 8FB0CBE68; Sun, 3 Mar 2024 10:53:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (4096-bit key) header.d=alien8.de header.i=@alien8.de header.b="H6k8g3vg" Received: from mail.alien8.de (mail.alien8.de [65.109.113.108]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A689BB65C for ; Sun, 3 Mar 2024 10:53:19 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=65.109.113.108 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709463202; cv=none; b=fdx44MpGGZCaM2znhx69MKzxdAFmWfa6aIBD2C0+XP9TDtwssMu4Z5mMTPPVBQDjUanhcNvLVrFaKhwQPffOqqygHoTmpMfF84rEsAnUDnhM1b+Sm7tqAHc008B29WUya98P7jCPxPNkPrjxczqdIiXAXYtptSnL3wLduQYy1b4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709463202; c=relaxed/simple; bh=wI4SKiW9XGcYzr0DP68rQ1sMkcqlqq03Ki50dXLEyDs=; h=Date:From:To:Cc:Subject:Message-ID:MIME-Version:Content-Type: Content-Disposition; b=ZI3xaDHLrA1CqS67LQPtz4mNIzLbHW+Ouh4/1g83id6RlCfPf+HIsohNeeSCSLbrU92W7ss7UroBQO2xQM4pqnJshs2YzDz04TUlP2VABsAJzNM/QT/BxqRinifBVCevRqOf/THralRD6E6GviWuORJGUqRDNqXQ1fuRI8+6jaQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=alien8.de; spf=pass smtp.mailfrom=alien8.de; dkim=pass (4096-bit key) header.d=alien8.de header.i=@alien8.de header.b=H6k8g3vg; arc=none smtp.client-ip=65.109.113.108 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=alien8.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=alien8.de Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTP id 12D0840E0196; Sun, 3 Mar 2024 10:53:17 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at mail.alien8.de Authentication-Results: mail.alien8.de (amavisd-new); dkim=pass (4096-bit key) header.d=alien8.de Received: from mail.alien8.de ([127.0.0.1]) by localhost (mail.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id UPCERyjmOdvP; Sun, 3 Mar 2024 10:53:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=alien8; t=1709463193; bh=yzCITtHvXH1Imu68iSDIhhg9QvZ8rYfdfo2tZEbUclw=; h=Date:From:To:Cc:Subject:From; b=H6k8g3vgDoA1N1HOZVSHqenx1MrtPKG5h0jPNFiCyldDbeT/uzcaZmArESQeO32/H vFgrzWB+afX/mIEHyHSlmsbRiddS5Xjev4EWAwqIGPrcSjWS2NFfA5Qj0gnAdNV1e+ fokZIKsgLQgrWa+8lfd6v0EHY7y1oXqqVgcSGCBAU1MSWCRQ7Ow35et2fhJNnnjn6O fAmEAMLAXdz9s+CqxKgJ6yIl5G+tft9ni8JiSvUFj683P9MGrOa2wN29zdA7LKAlnA p/2kam88w7FgVK+KCF+XYJ4BfKrQzOyA9ZVgRr7jAHJ8lBuon9kwc2C3sLW8WQogI1 +tlMqcXHKMsFA3pLVzB6n6/0F8xU+gdyfFnPnJS4sAPihFPRBVM2RCDDR7D5rPGlRJ aMOHKg6gzJt/O9tO19/2/seftc52Qn52D+pFObTJMrmwLgvgXb7XebgkdbylFZFzik rTuyX46mHFvhDEH3FLZJRU2PBogTqIy4Aj6YuqXGxrn5HxdHtUE1y0iUItWa65SehP FdX+Rq1/T5wgtRE7iiZjdif0mZdqDJ5iUmMxBlLcmUnsrz+77QC6PTofNfxRLuCuWk oPMkaDpMXH9pkk5hXaEYbLYPaE9OmqFi6z+cx2m6BE7k/GQ0LnjAPuX7lstPfa5J1V 2JcFTYrYEwCT3UfLEQorgwmI= Received: from zn.tnic (pd953021b.dip0.t-ipconnect.de [217.83.2.27]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail.alien8.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id A8A6040E016B; Sun, 3 Mar 2024 10:53:10 +0000 (UTC) Date: Sun, 3 Mar 2024 11:53:04 +0100 From: Borislav Petkov To: Linus Torvalds Cc: x86-ml , lkml Subject: [GIT PULL] x86/urgent for v6.8-rc7 Message-ID: <20240303105304.GAZeRWkNr8xmllFHr1@fat_crate.local> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Disposition: inline X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1792502102418018348 X-GMAIL-MSGID: 1792502102418018348 Hi Linus, please pull some x86/urgent fixes for v6.8-rc7. Thx. --- The following changes since commit 43fb862de8f628c5db5e96831c915b9aebf62d33: KVM/VMX: Move VERW closer to VMentry for MDS mitigation (2024-02-19 16:31:59 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_urgent_for_v6.8_rc7 for you to fetch changes up to 7fd817c906503b6813ea3b41f5fdf4192449a707: x86/e820: Don't reserve SETUP_RNG_SEED in e820 (2024-03-01 10:27:20 -0800) ---------------------------------------------------------------- - Do not reserve SETUP_RNG_SEED setup data in the e820 map as it should be used by kexec only - Make sure MKTME feature detection happens at an earlier time in the boot process so that the physical address size supported by the CPU is properly corrected and MTRR masks are programmed properly, leading to TDX systems booting without disable_mtrr_cleanup on the cmdline - Make sure the different address sizes supported by the CPU are read out as early as possible ---------------------------------------------------------------- Jiri Bohac (1): x86/e820: Don't reserve SETUP_RNG_SEED in e820 Paolo Bonzini (2): x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers arch/x86/kernel/cpu/common.c | 4 +- arch/x86/kernel/cpu/intel.c | 178 ++++++++++++++++++++++--------------------- arch/x86/kernel/e820.c | 8 +- 3 files changed, 98 insertions(+), 92 deletions(-)