linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [GIT PULL] arm64 fixes for 5.15-rc3
@ 2021-09-24 17:40 Catalin Marinas
  2021-09-24 18:26 ` pr-tracker-bot
  0 siblings, 1 reply; 2+ messages in thread
From: Catalin Marinas @ 2021-09-24 17:40 UTC (permalink / raw)
  To: Linus Torvalds; +Cc: Will Deacon, linux-arm-kernel, linux-kernel

Hi Linus,

Please pull the arm64 fixes below. Thanks.

The following changes since commit 9fcb2e93f41c07a400885325e7dbdfceba6efaec:

  arm64: Mark __stack_chk_guard as __ro_after_init (2021-09-16 17:59:17 +0100)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux tags/arm64-fixes

for you to fetch changes up to 22b70e6f2da0a4c8b1421b00cfc3016bc9d4d9d4:

  arm64: Restore forced disabling of KPTI on ThunderX (2021-09-23 15:59:15 +0100)

----------------------------------------------------------------
arm64 fixes:

- It turns out that the optimised string routines merged in 5.14 are not
  safe with in-kernel MTE (KASAN_HW_TAGS) because of reading beyond the
  end of a string (strcmp, strncmp). Such reading may go across a 16
  byte tag granule and cause a tag check fault. When KASAN_HW_TAGS is
  enabled, use the generic strcmp/strncmp C implementation.

- An errata workaround for ThunderX relied on the CPU capabilities being
  enabled in a specific order. This disappeared with the automatic
  generation of the cpucaps.h file (sorted alphabetically). Fix it by
  checking the current CPU only rather than the system-wide capability.

- Add system_supports_mte() checks on the kernel entry/exit path and
  thread switching to avoid unnecessary barriers and function calls on
  systems where MTE is not supported.

- kselftests: skip arm64 tests if the required features are missing.

----------------------------------------------------------------
Cristian Marussi (1):
      kselftest/arm64: signal: Skip tests if required features are missing

Peter Collingbourne (1):
      arm64: add MTE supported check to thread switching and syscall entry/exit

Robin Murphy (1):
      arm64: Mitigate MTE issues with str{n}cmp()

dann frazier (1):
      arm64: Restore forced disabling of KPTI on ThunderX

 arch/arm64/include/asm/assembler.h                        |  5 +++++
 arch/arm64/include/asm/mte.h                              |  6 ++++++
 arch/arm64/include/asm/string.h                           |  2 ++
 arch/arm64/kernel/cpufeature.c                            |  8 ++++++--
 arch/arm64/kernel/mte.c                                   | 10 ++++------
 arch/arm64/lib/strcmp.S                                   |  2 +-
 arch/arm64/lib/strncmp.S                                  |  2 +-
 tools/testing/selftests/arm64/signal/test_signals_utils.c |  7 +++++--
 8 files changed, 30 insertions(+), 12 deletions(-)

-- 
Catalin

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [GIT PULL] arm64 fixes for 5.15-rc3
  2021-09-24 17:40 [GIT PULL] arm64 fixes for 5.15-rc3 Catalin Marinas
@ 2021-09-24 18:26 ` pr-tracker-bot
  0 siblings, 0 replies; 2+ messages in thread
From: pr-tracker-bot @ 2021-09-24 18:26 UTC (permalink / raw)
  To: Catalin Marinas
  Cc: Linus Torvalds, Will Deacon, linux-arm-kernel, linux-kernel

The pull request you sent on Fri, 24 Sep 2021 18:40:56 +0100:

> git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux tags/arm64-fixes

has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/1b7eaf570140281a1aa898a875aa587d48d96958

Thank you!

-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2021-09-24 18:26 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-09-24 17:40 [GIT PULL] arm64 fixes for 5.15-rc3 Catalin Marinas
2021-09-24 18:26 ` pr-tracker-bot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).