Skip to content

Commit 93ae235

Browse files
committed
Merge branch 'stable/linux-5.15.y' into linux-5.15-mchp
2 parents 841bed6 + e29be67 commit 93ae235

582 files changed

Lines changed: 9051 additions & 3910 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

Documentation/admin-guide/hw-vuln/spectre.rst

Lines changed: 32 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ privileged data touched during the speculative execution.
6060
Spectre variant 1 attacks take advantage of speculative execution of
6161
conditional branches, while Spectre variant 2 attacks use speculative
6262
execution of indirect branches to leak privileged memory.
63-
See :ref:`[1] <spec_ref1>` :ref:`[5] <spec_ref5>` :ref:`[7] <spec_ref7>`
64-
:ref:`[10] <spec_ref10>` :ref:`[11] <spec_ref11>`.
63+
See :ref:`[1] <spec_ref1>` :ref:`[5] <spec_ref5>` :ref:`[6] <spec_ref6>`
64+
:ref:`[7] <spec_ref7>` :ref:`[10] <spec_ref10>` :ref:`[11] <spec_ref11>`.
6565

6666
Spectre variant 1 (Bounds Check Bypass)
6767
---------------------------------------
@@ -131,6 +131,19 @@ steer its indirect branch speculations to gadget code, and measure the
131131
speculative execution's side effects left in level 1 cache to infer the
132132
victim's data.
133133

134+
Yet another variant 2 attack vector is for the attacker to poison the
135+
Branch History Buffer (BHB) to speculatively steer an indirect branch
136+
to a specific Branch Target Buffer (BTB) entry, even if the entry isn't
137+
associated with the source address of the indirect branch. Specifically,
138+
the BHB might be shared across privilege levels even in the presence of
139+
Enhanced IBRS.
140+
141+
Currently the only known real-world BHB attack vector is via
142+
unprivileged eBPF. Therefore, it's highly recommended to not enable
143+
unprivileged eBPF, especially when eIBRS is used (without retpolines).
144+
For a full mitigation against BHB attacks, it's recommended to use
145+
retpolines (or eIBRS combined with retpolines).
146+
134147
Attack scenarios
135148
----------------
136149

@@ -364,13 +377,15 @@ The possible values in this file are:
364377

365378
- Kernel status:
366379

367-
==================================== =================================
368-
'Not affected' The processor is not vulnerable
369-
'Vulnerable' Vulnerable, no mitigation
370-
'Mitigation: Full generic retpoline' Software-focused mitigation
371-
'Mitigation: Full AMD retpoline' AMD-specific software mitigation
372-
'Mitigation: Enhanced IBRS' Hardware-focused mitigation
373-
==================================== =================================
380+
======================================== =================================
381+
'Not affected' The processor is not vulnerable
382+
'Mitigation: None' Vulnerable, no mitigation
383+
'Mitigation: Retpolines' Use Retpoline thunks
384+
'Mitigation: LFENCE' Use LFENCE instructions
385+
'Mitigation: Enhanced IBRS' Hardware-focused mitigation
386+
'Mitigation: Enhanced IBRS + Retpolines' Hardware-focused + Retpolines
387+
'Mitigation: Enhanced IBRS + LFENCE' Hardware-focused + LFENCE
388+
======================================== =================================
374389

375390
- Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is
376391
used to protect against Spectre variant 2 attacks when calling firmware (x86 only).
@@ -584,12 +599,13 @@ kernel command line.
584599

585600
Specific mitigations can also be selected manually:
586601

587-
retpoline
588-
replace indirect branches
589-
retpoline,generic
590-
google's original retpoline
591-
retpoline,amd
592-
AMD-specific minimal thunk
602+
retpoline auto pick between generic,lfence
603+
retpoline,generic Retpolines
604+
retpoline,lfence LFENCE; indirect branch
605+
retpoline,amd alias for retpoline,lfence
606+
eibrs enhanced IBRS
607+
eibrs,retpoline enhanced IBRS + Retpolines
608+
eibrs,lfence enhanced IBRS + LFENCE
593609

594610
Not specifying this option is equivalent to
595611
spectre_v2=auto.
@@ -730,7 +746,7 @@ AMD white papers:
730746

731747
.. _spec_ref6:
732748

733-
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/90343-B_SoftwareTechniquesforManagingSpeculation_WP_7-18Update_FNL.pdf>`_.
749+
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/Managing-Speculation-on-AMD-Processors.pdf>`_.
734750

735751
ARM white papers:
736752

Documentation/admin-guide/kernel-parameters.txt

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5267,8 +5267,12 @@
52675267
Specific mitigations can also be selected manually:
52685268

52695269
retpoline - replace indirect branches
5270-
retpoline,generic - google's original retpoline
5271-
retpoline,amd - AMD-specific minimal thunk
5270+
retpoline,generic - Retpolines
5271+
retpoline,lfence - LFENCE; indirect branch
5272+
retpoline,amd - alias for retpoline,lfence
5273+
eibrs - enhanced IBRS
5274+
eibrs,retpoline - enhanced IBRS + Retpolines
5275+
eibrs,lfence - enhanced IBRS + LFENCE
52725276

52735277
Not specifying this option is equivalent to
52745278
spectre_v2=auto.

Documentation/admin-guide/mm/pagemap.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ There are four components to pagemap:
2323
* Bit 56 page exclusively mapped (since 4.2)
2424
* Bit 57 pte is uffd-wp write-protected (since 5.13) (see
2525
:ref:`Documentation/admin-guide/mm/userfaultfd.rst <userfaultfd>`)
26-
* Bits 57-60 zero
26+
* Bits 58-60 zero
2727
* Bit 61 page is file-page or shared-anon (since 3.5)
2828
* Bit 62 page swapped
2929
* Bit 63 page present

Documentation/arm64/cpu-feature-registers.rst

Lines changed: 27 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -235,15 +235,23 @@ infrastructure:
235235
| DPB | [3-0] | y |
236236
+------------------------------+---------+---------+
237237

238-
6) ID_AA64MMFR2_EL1 - Memory model feature register 2
238+
6) ID_AA64MMFR0_EL1 - Memory model feature register 0
239+
240+
+------------------------------+---------+---------+
241+
| Name | bits | visible |
242+
+------------------------------+---------+---------+
243+
| ECV | [63-60] | y |
244+
+------------------------------+---------+---------+
245+
246+
7) ID_AA64MMFR2_EL1 - Memory model feature register 2
239247

240248
+------------------------------+---------+---------+
241249
| Name | bits | visible |
242250
+------------------------------+---------+---------+
243251
| AT | [35-32] | y |
244252
+------------------------------+---------+---------+
245253

246-
7) ID_AA64ZFR0_EL1 - SVE feature ID register 0
254+
8) ID_AA64ZFR0_EL1 - SVE feature ID register 0
247255

248256
+------------------------------+---------+---------+
249257
| Name | bits | visible |
@@ -267,6 +275,23 @@ infrastructure:
267275
| SVEVer | [3-0] | y |
268276
+------------------------------+---------+---------+
269277

278+
8) ID_AA64MMFR1_EL1 - Memory model feature register 1
279+
280+
+------------------------------+---------+---------+
281+
| Name | bits | visible |
282+
+------------------------------+---------+---------+
283+
| AFP | [47-44] | y |
284+
+------------------------------+---------+---------+
285+
286+
9) ID_AA64ISAR2_EL1 - Instruction set attribute register 2
287+
288+
+------------------------------+---------+---------+
289+
| Name | bits | visible |
290+
+------------------------------+---------+---------+
291+
| RPRES | [7-4] | y |
292+
+------------------------------+---------+---------+
293+
294+
270295
Appendix I: Example
271296
-------------------
272297

Documentation/arm64/elf_hwcaps.rst

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -247,6 +247,18 @@ HWCAP2_MTE
247247
Functionality implied by ID_AA64PFR1_EL1.MTE == 0b0010, as described
248248
by Documentation/arm64/memory-tagging-extension.rst.
249249

250+
HWCAP2_ECV
251+
252+
Functionality implied by ID_AA64MMFR0_EL1.ECV == 0b0001.
253+
254+
HWCAP2_AFP
255+
256+
Functionality implied by ID_AA64MFR1_EL1.AFP == 0b0001.
257+
258+
HWCAP2_RPRES
259+
260+
Functionality implied by ID_AA64ISAR2_EL1.RPRES == 0b0001.
261+
250262
4. Unused AT_HWCAP bits
251263
-----------------------
252264

Documentation/gpu/i915.rst

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -183,25 +183,25 @@ Frame Buffer Compression (FBC)
183183
Display Refresh Rate Switching (DRRS)
184184
-------------------------------------
185185

186-
.. kernel-doc:: drivers/gpu/drm/i915/display/intel_dp.c
186+
.. kernel-doc:: drivers/gpu/drm/i915/display/intel_drrs.c
187187
:doc: Display Refresh Rate Switching (DRRS)
188188

189-
.. kernel-doc:: drivers/gpu/drm/i915/display/intel_dp.c
189+
.. kernel-doc:: drivers/gpu/drm/i915/display/intel_drrs.c
190190
:functions: intel_dp_set_drrs_state
191191

192-
.. kernel-doc:: drivers/gpu/drm/i915/display/intel_dp.c
192+
.. kernel-doc:: drivers/gpu/drm/i915/display/intel_drrs.c
193193
:functions: intel_edp_drrs_enable
194194

195-
.. kernel-doc:: drivers/gpu/drm/i915/display/intel_dp.c
195+
.. kernel-doc:: drivers/gpu/drm/i915/display/intel_drrs.c
196196
:functions: intel_edp_drrs_disable
197197

198-
.. kernel-doc:: drivers/gpu/drm/i915/display/intel_dp.c
198+
.. kernel-doc:: drivers/gpu/drm/i915/display/intel_drrs.c
199199
:functions: intel_edp_drrs_invalidate
200200

201-
.. kernel-doc:: drivers/gpu/drm/i915/display/intel_dp.c
201+
.. kernel-doc:: drivers/gpu/drm/i915/display/intel_drrs.c
202202
:functions: intel_edp_drrs_flush
203203

204-
.. kernel-doc:: drivers/gpu/drm/i915/display/intel_dp.c
204+
.. kernel-doc:: drivers/gpu/drm/i915/display/intel_drrs.c
205205
:functions: intel_dp_drrs_init
206206

207207
DPIO

Documentation/trace/events.rst

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -198,6 +198,15 @@ The glob (~) accepts a wild card character (\*,?) and character classes
198198
prev_comm ~ "*sh*"
199199
prev_comm ~ "ba*sh"
200200

201+
If the field is a pointer that points into user space (for example
202+
"filename" from sys_enter_openat), then you have to append ".ustring" to the
203+
field name::
204+
205+
filename.ustring ~ "password"
206+
207+
As the kernel will have to know how to retrieve the memory that the pointer
208+
is at from user space.
209+
201210
5.2 Setting filters
202211
-------------------
203212

@@ -230,6 +239,16 @@ Currently the caret ('^') for an error always appears at the beginning of
230239
the filter string; the error message should still be useful though
231240
even without more accurate position info.
232241

242+
5.2.1 Filter limitations
243+
------------------------
244+
245+
If a filter is placed on a string pointer ``(char *)`` that does not point
246+
to a string on the ring buffer, but instead points to kernel or user space
247+
memory, then, for safety reasons, at most 1024 bytes of the content is
248+
copied onto a temporary buffer to do the compare. If the copy of the memory
249+
faults (the pointer points to memory that should not be accessed), then the
250+
string compare will be treated as not matching.
251+
233252
5.3 Clearing filters
234253
--------------------
235254

MAINTAINERS

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7031,7 +7031,6 @@ F: drivers/net/mdio/fwnode_mdio.c
70317031
F: drivers/net/mdio/of_mdio.c
70327032
F: drivers/net/pcs/
70337033
F: drivers/net/phy/
7034-
F: drivers/of/of_net.c
70357034
F: include/dt-bindings/net/qca-ar803x.h
70367035
F: include/linux/*mdio*.h
70377036
F: include/linux/mdio/*.h
@@ -7043,6 +7042,7 @@ F: include/linux/platform_data/mdio-gpio.h
70437042
F: include/trace/events/mdio.h
70447043
F: include/uapi/linux/mdio.h
70457044
F: include/uapi/linux/mii.h
7045+
F: net/core/of_net.c
70467046

70477047
EXFAT FILE SYSTEM
70487048
M: Namjae Jeon <linkinjeon@kernel.org>

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# SPDX-License-Identifier: GPL-2.0
22
VERSION = 5
33
PATCHLEVEL = 15
4-
SUBLEVEL = 26
4+
SUBLEVEL = 32
55
EXTRAVERSION =
66
NAME = Trick or Treat
77

arch/arm/boot/dts/aspeed-g6-pinctrl.dtsi

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@
118118
};
119119

120120
pinctrl_fwqspid_default: fwqspid_default {
121-
function = "FWQSPID";
121+
function = "FWSPID";
122122
groups = "FWQSPID";
123123
};
124124

0 commit comments

Comments
 (0)