Skip to content

Commit b8738fa

Browse files
committed
Merge tag 'v5.10.105' into linux-5.10-mchp
This is the 5.10.105 stable release Signed-off-by: Nicolas Ferre <nicolas.ferre@microchip.com>
2 parents 92d4af1 + 67c781d commit b8738fa

510 files changed

Lines changed: 5191 additions & 1872 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

Documentation/admin-guide/hw-vuln/spectre.rst

Lines changed: 32 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ privileged data touched during the speculative execution.
6060
Spectre variant 1 attacks take advantage of speculative execution of
6161
conditional branches, while Spectre variant 2 attacks use speculative
6262
execution of indirect branches to leak privileged memory.
63-
See :ref:`[1] <spec_ref1>` :ref:`[5] <spec_ref5>` :ref:`[7] <spec_ref7>`
64-
:ref:`[10] <spec_ref10>` :ref:`[11] <spec_ref11>`.
63+
See :ref:`[1] <spec_ref1>` :ref:`[5] <spec_ref5>` :ref:`[6] <spec_ref6>`
64+
:ref:`[7] <spec_ref7>` :ref:`[10] <spec_ref10>` :ref:`[11] <spec_ref11>`.
6565

6666
Spectre variant 1 (Bounds Check Bypass)
6767
---------------------------------------
@@ -131,6 +131,19 @@ steer its indirect branch speculations to gadget code, and measure the
131131
speculative execution's side effects left in level 1 cache to infer the
132132
victim's data.
133133

134+
Yet another variant 2 attack vector is for the attacker to poison the
135+
Branch History Buffer (BHB) to speculatively steer an indirect branch
136+
to a specific Branch Target Buffer (BTB) entry, even if the entry isn't
137+
associated with the source address of the indirect branch. Specifically,
138+
the BHB might be shared across privilege levels even in the presence of
139+
Enhanced IBRS.
140+
141+
Currently the only known real-world BHB attack vector is via
142+
unprivileged eBPF. Therefore, it's highly recommended to not enable
143+
unprivileged eBPF, especially when eIBRS is used (without retpolines).
144+
For a full mitigation against BHB attacks, it's recommended to use
145+
retpolines (or eIBRS combined with retpolines).
146+
134147
Attack scenarios
135148
----------------
136149

@@ -364,13 +377,15 @@ The possible values in this file are:
364377

365378
- Kernel status:
366379

367-
==================================== =================================
368-
'Not affected' The processor is not vulnerable
369-
'Vulnerable' Vulnerable, no mitigation
370-
'Mitigation: Full generic retpoline' Software-focused mitigation
371-
'Mitigation: Full AMD retpoline' AMD-specific software mitigation
372-
'Mitigation: Enhanced IBRS' Hardware-focused mitigation
373-
==================================== =================================
380+
======================================== =================================
381+
'Not affected' The processor is not vulnerable
382+
'Mitigation: None' Vulnerable, no mitigation
383+
'Mitigation: Retpolines' Use Retpoline thunks
384+
'Mitigation: LFENCE' Use LFENCE instructions
385+
'Mitigation: Enhanced IBRS' Hardware-focused mitigation
386+
'Mitigation: Enhanced IBRS + Retpolines' Hardware-focused + Retpolines
387+
'Mitigation: Enhanced IBRS + LFENCE' Hardware-focused + LFENCE
388+
======================================== =================================
374389

375390
- Firmware status: Show if Indirect Branch Restricted Speculation (IBRS) is
376391
used to protect against Spectre variant 2 attacks when calling firmware (x86 only).
@@ -584,12 +599,13 @@ kernel command line.
584599

585600
Specific mitigations can also be selected manually:
586601

587-
retpoline
588-
replace indirect branches
589-
retpoline,generic
590-
google's original retpoline
591-
retpoline,amd
592-
AMD-specific minimal thunk
602+
retpoline auto pick between generic,lfence
603+
retpoline,generic Retpolines
604+
retpoline,lfence LFENCE; indirect branch
605+
retpoline,amd alias for retpoline,lfence
606+
eibrs enhanced IBRS
607+
eibrs,retpoline enhanced IBRS + Retpolines
608+
eibrs,lfence enhanced IBRS + LFENCE
593609

594610
Not specifying this option is equivalent to
595611
spectre_v2=auto.
@@ -730,7 +746,7 @@ AMD white papers:
730746

731747
.. _spec_ref6:
732748

733-
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/90343-B_SoftwareTechniquesforManagingSpeculation_WP_7-18Update_FNL.pdf>`_.
749+
[6] `Software techniques for managing speculation on AMD processors <https://developer.amd.com/wp-content/resources/Managing-Speculation-on-AMD-Processors.pdf>`_.
734750

735751
ARM white papers:
736752

Documentation/admin-guide/kernel-parameters.txt

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4957,8 +4957,12 @@
49574957
Specific mitigations can also be selected manually:
49584958

49594959
retpoline - replace indirect branches
4960-
retpoline,generic - google's original retpoline
4961-
retpoline,amd - AMD-specific minimal thunk
4960+
retpoline,generic - Retpolines
4961+
retpoline,lfence - LFENCE; indirect branch
4962+
retpoline,amd - alias for retpoline,lfence
4963+
eibrs - enhanced IBRS
4964+
eibrs,retpoline - enhanced IBRS + Retpolines
4965+
eibrs,lfence - enhanced IBRS + LFENCE
49624966

49634967
Not specifying this option is equivalent to
49644968
spectre_v2=auto.

Documentation/arm64/cpu-feature-registers.rst

Lines changed: 27 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -235,15 +235,23 @@ infrastructure:
235235
| DPB | [3-0] | y |
236236
+------------------------------+---------+---------+
237237

238-
6) ID_AA64MMFR2_EL1 - Memory model feature register 2
238+
6) ID_AA64MMFR0_EL1 - Memory model feature register 0
239+
240+
+------------------------------+---------+---------+
241+
| Name | bits | visible |
242+
+------------------------------+---------+---------+
243+
| ECV | [63-60] | y |
244+
+------------------------------+---------+---------+
245+
246+
7) ID_AA64MMFR2_EL1 - Memory model feature register 2
239247

240248
+------------------------------+---------+---------+
241249
| Name | bits | visible |
242250
+------------------------------+---------+---------+
243251
| AT | [35-32] | y |
244252
+------------------------------+---------+---------+
245253

246-
7) ID_AA64ZFR0_EL1 - SVE feature ID register 0
254+
8) ID_AA64ZFR0_EL1 - SVE feature ID register 0
247255

248256
+------------------------------+---------+---------+
249257
| Name | bits | visible |
@@ -267,6 +275,23 @@ infrastructure:
267275
| SVEVer | [3-0] | y |
268276
+------------------------------+---------+---------+
269277

278+
8) ID_AA64MMFR1_EL1 - Memory model feature register 1
279+
280+
+------------------------------+---------+---------+
281+
| Name | bits | visible |
282+
+------------------------------+---------+---------+
283+
| AFP | [47-44] | y |
284+
+------------------------------+---------+---------+
285+
286+
9) ID_AA64ISAR2_EL1 - Instruction set attribute register 2
287+
288+
+------------------------------+---------+---------+
289+
| Name | bits | visible |
290+
+------------------------------+---------+---------+
291+
| RPRES | [7-4] | y |
292+
+------------------------------+---------+---------+
293+
294+
270295
Appendix I: Example
271296
-------------------
272297

Documentation/arm64/elf_hwcaps.rst

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -245,6 +245,18 @@ HWCAP2_MTE
245245
Functionality implied by ID_AA64PFR1_EL1.MTE == 0b0010, as described
246246
by Documentation/arm64/memory-tagging-extension.rst.
247247

248+
HWCAP2_ECV
249+
250+
Functionality implied by ID_AA64MMFR0_EL1.ECV == 0b0001.
251+
252+
HWCAP2_AFP
253+
254+
Functionality implied by ID_AA64MFR1_EL1.AFP == 0b0001.
255+
256+
HWCAP2_RPRES
257+
258+
Functionality implied by ID_AA64ISAR2_EL1.RPRES == 0b0001.
259+
248260
4. Unused AT_HWCAP bits
249261
-----------------------
250262

Documentation/devicetree/bindings/arm/omap/omap.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,9 @@ Boards (incomplete list of examples):
119119
- OMAP3 BeagleBoard : Low cost community board
120120
compatible = "ti,omap3-beagle", "ti,omap3430", "ti,omap3"
121121

122+
- OMAP3 BeagleBoard A to B4 : Early BeagleBoard revisions A to B4 with a timer quirk
123+
compatible = "ti,omap3-beagle-ab4", "ti,omap3-beagle", "ti,omap3430", "ti,omap3"
124+
122125
- OMAP3 Tobi with Overo : Commercial expansion board with daughter board
123126
compatible = "gumstix,omap3-overo-tobi", "gumstix,omap3-overo", "ti,omap3430", "ti,omap3"
124127

Documentation/trace/events.rst

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -198,6 +198,15 @@ The glob (~) accepts a wild card character (\*,?) and character classes
198198
prev_comm ~ "*sh*"
199199
prev_comm ~ "ba*sh"
200200

201+
If the field is a pointer that points into user space (for example
202+
"filename" from sys_enter_openat), then you have to append ".ustring" to the
203+
field name::
204+
205+
filename.ustring ~ "password"
206+
207+
As the kernel will have to know how to retrieve the memory that the pointer
208+
is at from user space.
209+
201210
5.2 Setting filters
202211
-------------------
203212

@@ -230,6 +239,16 @@ Currently the caret ('^') for an error always appears at the beginning of
230239
the filter string; the error message should still be useful though
231240
even without more accurate position info.
232241

242+
5.2.1 Filter limitations
243+
------------------------
244+
245+
If a filter is placed on a string pointer ``(char *)`` that does not point
246+
to a string on the ring buffer, but instead points to kernel or user space
247+
memory, then, for safety reasons, at most 1024 bytes of the content is
248+
copied onto a temporary buffer to do the compare. If the copy of the memory
249+
faults (the pointer points to memory that should not be accessed), then the
250+
string compare will be treated as not matching.
251+
233252
5.3 Clearing filters
234253
--------------------
235254

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# SPDX-License-Identifier: GPL-2.0
22
VERSION = 5
33
PATCHLEVEL = 10
4-
SUBLEVEL = 100
4+
SUBLEVEL = 105
55
EXTRAVERSION = -linux4microchip-2021.10
66
NAME = Dare mighty things
77

arch/arm/boot/dts/Makefile

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -733,6 +733,7 @@ dtb-$(CONFIG_ARCH_OMAP3) += \
733733
logicpd-som-lv-37xx-devkit.dtb \
734734
omap3430-sdp.dtb \
735735
omap3-beagle.dtb \
736+
omap3-beagle-ab4.dtb \
736737
omap3-beagle-xm.dtb \
737738
omap3-beagle-xm-ab.dtb \
738739
omap3-cm-t3517.dtb \

arch/arm/boot/dts/imx23-evk.dts

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,6 @@
7979
MX23_PAD_LCD_RESET__GPIO_1_18
8080
MX23_PAD_PWM3__GPIO_1_29
8181
MX23_PAD_PWM4__GPIO_1_30
82-
MX23_PAD_SSP1_DETECT__SSP1_DETECT
8382
>;
8483
fsl,drive-strength = <MXS_DRIVE_4mA>;
8584
fsl,voltage = <MXS_VOLTAGE_HIGH>;

arch/arm/boot/dts/imx6qdl-udoo.dtsi

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@
55
* Author: Fabio Estevam <fabio.estevam@freescale.com>
66
*/
77

8+
#include <dt-bindings/gpio/gpio.h>
9+
810
/ {
911
aliases {
1012
backlight = &backlight;
@@ -226,6 +228,7 @@
226228
MX6QDL_PAD_SD3_DAT1__SD3_DATA1 0x17059
227229
MX6QDL_PAD_SD3_DAT2__SD3_DATA2 0x17059
228230
MX6QDL_PAD_SD3_DAT3__SD3_DATA3 0x17059
231+
MX6QDL_PAD_SD3_DAT5__GPIO7_IO00 0x1b0b0
229232
>;
230233
};
231234

@@ -304,7 +307,7 @@
304307
&usdhc3 {
305308
pinctrl-names = "default";
306309
pinctrl-0 = <&pinctrl_usdhc3>;
307-
non-removable;
310+
cd-gpios = <&gpio7 0 GPIO_ACTIVE_LOW>;
308311
status = "okay";
309312
};
310313

0 commit comments

Comments
 (0)