lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20210716145320.GB3161@willie-the-truck>
Date:   Fri, 16 Jul 2021 15:53:21 +0100
From:   Will Deacon <will@...nel.org>
To:     torvalds@...ux-foundation.org
Cc:     catalin.marinas@....com, maz@...nel.org,
        linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org,
        kernel-team@...roid.com
Subject: [GIT PULL] arm64 fixes for -rc2

Hi Linus,

Please pull these arm64 fixes for -rc2. The bulk of the diffstat consists
of changes to our uaccess routines so that they fall back to bytewise
copying prior to reporting complete failure when the initial (multi-byte)
access faults. However, the most disappointing change here is that we've
had to bump ARCH_DMA_MINALIGN back to 128 bytes thanks to Qualcomm's "Kryo"
CPU, which ended up in the MSM8996 mobile SoC. Still, at least we're now
aware of this design and one of the hardware designers confirmed the
L2 cacheline size for us.

Cheers,

Will

--->8

The following changes since commit e73f0f0ee7541171d89f2e2491130c7771ba58d3:

  Linux 5.14-rc1 (2021-07-11 15:07:40 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes

for you to fetch changes up to e6f85cbeb23bd74b8966cf1f15bf7d01399ff625:

  arm64: entry: fix KCOV suppression (2021-07-15 17:37:55 +0100)

----------------------------------------------------------------
arm64 fixes for -rc2

- Fix instrumentation annotations for entry code

- Ensure kernel MTE state is restored correctly on resume from suspend

- Fix MTE fault from new strlen() routine

- Fallback to byte-wise accesses on initial uaccess fault

- Bump Clang requirement for BTI

- Revert ARCH_DMA_MINALIGN back to 128 bytes (shakes fist at Qualcomm)

----------------------------------------------------------------
Carlos Bilbao (1):
      arm64: Add missing header <asm/smp.h> in two files

Mark Rutland (4):
      arm64: fix strlen() with CONFIG_KASAN_HW_TAGS
      arm64: mte: fix restoration of GCR_EL1 from suspend
      arm64: entry: add missing noinstr
      arm64: entry: fix KCOV suppression

Nathan Chancellor (1):
      arm64: Restrict ARM64_BTI_KERNEL to clang 12.0.0 and newer

Robin Murphy (1):
      arm64: Avoid premature usercopy failure

Will Deacon (1):
      Revert "arm64: cache: Lower ARCH_DMA_MINALIGN to 64 (L1_CACHE_BYTES)"

 arch/arm64/Kconfig                |  3 ++-
 arch/arm64/include/asm/cache.h    |  2 +-
 arch/arm64/include/asm/smp_plat.h |  1 +
 arch/arm64/kernel/Makefile        |  2 +-
 arch/arm64/kernel/cpufeature.c    |  1 +
 arch/arm64/kernel/entry-common.c  |  2 +-
 arch/arm64/kernel/mte.c           | 15 ++-------------
 arch/arm64/lib/copy_from_user.S   | 13 ++++++++++---
 arch/arm64/lib/copy_in_user.S     | 21 ++++++++++++++-------
 arch/arm64/lib/copy_to_user.S     | 14 +++++++++++---
 arch/arm64/lib/strlen.S           | 10 ++++++++++
 11 files changed, 54 insertions(+), 30 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ