Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
3671 commits
Select commit Hold shift + click to select a range
d525bbd
qca_spi: Fix reset behavior
lategoodbye Dec 6, 2023
e16f961
atm: solos-pci: Fix potential deadlock on &cli_queue_lock
Ychame Dec 7, 2023
fe779db
atm: solos-pci: Fix potential deadlock on &tx_queue_lock
Ychame Dec 7, 2023
3c4dcfb
net: vlan: introduce skb_vlan_eth_hdr()
vladimiroltean Apr 20, 2023
af7a772
net: fec: correct queue selection
r4dubu Dec 7, 2023
86f50bb
octeontx2-af: fix a use-after-free in rvu_nix_register_reporters
AlexiousLu Dec 7, 2023
e0676d3
octeontx2-pf: Fix promisc mcam entry action
Dec 8, 2023
db400b1
octeontx2-af: Update RSS algorithm index
Dec 8, 2023
3bb41dc
atm: Fix Use-After-Free in do_vcc_ioctl
ImV4bel Dec 9, 2023
3f1f6a9
net/rose: Fix Use-After-Free in rose_ioctl
ImV4bel Dec 9, 2023
d3b174d
qed: Fix a potential use-after-free in qed_cxt_tables_alloc
dinghaoliu Dec 10, 2023
e2b48f9
net: Remove acked SYN flag from packet in the transmit queue correctly
Dec 10, 2023
3908271
net: ena: Destroy correct number of xdp queues upon failure
davidarinzon Dec 11, 2023
5d45225
net: ena: Fix xdp drops handling due to multibuf packets
davidarinzon Dec 11, 2023
abb4055
net: ena: Fix XDP redirection error
davidarinzon Dec 11, 2023
8eec2dc
stmmac: dwmac-loongson: Make sure MDIO is initialized before use
Dec 11, 2023
a5ab70a
sign-file: Fix incorrect return values check
Dec 13, 2023
444339f
vsock/virtio: Fix unsigned integer wrap around in virtio_transport_ha…
Dec 11, 2023
90715e0
dpaa2-switch: fix size of the dma_unmap
IoanaCiornei Dec 12, 2023
6f3b49a
net: stmmac: use dev_err_probe() for reporting mdio bus registration …
Villemoes Jun 2, 2022
de73f41
net: stmmac: Handle disabled MDIO busses from devicetree
ahalaney Dec 12, 2023
5b87ac2
appletalk: Fix Use-After-Free in atalk_ioctl
ImV4bel Dec 13, 2023
3a14286
net: atlantic: fix double free in ring reinit logic
cail Dec 13, 2023
f21b761
cred: switch to using atomic_long_t
axboe Dec 15, 2023
45f53ca
fuse: dax: set fc->dax to NULL in fuse_dax_conn_free()
HBh25Y Nov 16, 2023
d6df72b
ALSA: hda/hdmi: add force-connect quirk for NUC5CPYB
kv2019i Dec 8, 2023
0239375
ALSA: hda/hdmi: add force-connect quirks for ASUSTeK Z170 variants
kv2019i Dec 8, 2023
2d099b2
ALSA: hda/realtek: Apply mute LED quirk for HP15-db
Dec 9, 2023
4f4a9fc
Revert "PCI: acpiphp: Reassign resources on bridge if necessary"
bjorn-helgaas Dec 14, 2023
6f70990
PCI: loongson: Limit MRRS to 256
FlyGoat Dec 1, 2023
fe13b6a
drm/mediatek: Add spinlock for setting vblank event in atomic_begin
Sep 20, 2023
46412b2
usb: aqc111: check packet for fixup for true limit
oneukum Nov 15, 2023
b7d82e5
stmmac: dwmac-loongson: Add architecture dependency
jdelvare Nov 15, 2023
8146f7a
blk-throttle: fix lockdep warning of "cgroup_mutex or RCU read lock r…
Nov 17, 2023
252c2a4
blk-cgroup: bypass blkcg_deactivate_policy after destroying
Nov 17, 2023
d38288a
bcache: avoid oversize memory allocation by small stripe_size
Nov 20, 2023
8758b05
bcache: remove redundant assignment to variable cur_idx
ColinIanKing Nov 20, 2023
f891bbf
bcache: add code comments for bch_btree_node_get() and __bch_btree_no…
Nov 20, 2023
7020385
bcache: avoid NULL checking to c->root in run_cache_set()
Nov 20, 2023
23b0853
platform/x86: intel_telemetry: Fix kernel doc descriptions
andy-shev Nov 20, 2023
61fc877
HID: glorious: fix Glorious Model I HID report
braye Nov 3, 2023
9f093e1
HID: add ALWAYS_POLL quirk for Apple kb
oneukum Nov 14, 2023
41759fa
HID: hid-asus: reset the backlight brightness level on resume
NeroReflex Nov 17, 2023
0a3f27d
HID: multitouch: Add quirk for HONOR GLO-GXXX touchpad
nexplorer-3e Nov 21, 2023
ca15561
asm-generic: qspinlock: fix queued_spin_value_unlocked() implementation
torvalds Nov 10, 2023
11c17f4
net: usb: qmi_wwan: claim interface 4 for ZTE MF290
Leo-PL Nov 17, 2023
27714a2
HID: hid-asus: add const to read-only outgoing usb buffer
NeroReflex Nov 17, 2023
7b427d8
perf: Fix perf_event_validate_size() lockdep splat
mrutland-arm Dec 15, 2023
5a95499
btrfs: do not allow non subvolume root targets for snapshot
josefbacik Dec 15, 2023
1a4da77
soundwire: stream: fix NULL pointer dereference for multi_link
krzk Nov 24, 2023
1bc9191
ext4: prevent the normalized size from exceeding EXT_MAX_BLOCKS
LiBaokun96 Nov 27, 2023
c2134ed
arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify
48ca Dec 4, 2023
8175dad
team: Fix use-after-free when an option instance allocation fails
FlorentRevest Dec 6, 2023
f949428
drm/amdgpu/sdma5.2: add begin/end_use ring callbacks
alexdeucher Dec 7, 2023
97e70d6
ring-buffer: Fix memory leak of free page
rostedt Dec 11, 2023
5479374
tracing: Update snapshot buffer on resize if it is allocated
rostedt Dec 11, 2023
8ed7d28
ring-buffer: Do not update before stamp when switching sub-buffers
rostedt Dec 11, 2023
e958731
ring-buffer: Have saved event hold the entire event
rostedt Dec 12, 2023
fb63b1f
ring-buffer: Fix writing to the buffer with max_data_size
rostedt Dec 12, 2023
b8d59ea
ring-buffer: Fix a race in rb_time_cmpxchg() for 32 bit archs
rostedt Dec 12, 2023
529f020
ring-buffer: Do not try to put back write_stamp
rostedt Dec 15, 2023
93e7655
USB: gadget: core: adjust uevent timing on gadget unbind
roychl666 Nov 28, 2023
410c05b
RDMA/irdma: Prevent zero-length STAG registration
cnbednar Aug 18, 2023
4624f5f
powerpc/ftrace: Create a dummy stackframe to fix stack unwind
rnav Dec 15, 2023
fa5f992
powerpc/ftrace: Fix stack teardown in ftrace_no_trace
rnav Dec 15, 2023
07ba216
r8152: avoid to change cfg for all devices
hayesorz Jan 17, 2023
aa3cc80
r8152: remove rtl_vendor_mode function
hayesorz Jan 19, 2023
4c11798
r8152: fix the autosuspend doesn't work
hayesorz May 2, 2023
1d146b1
Linux 5.15.144
gregkh Dec 20, 2023
5fed9cb
ksmbd: use ksmbd_req_buf_next() in ksmbd_verify_smb_message()
slowfranklin Dec 18, 2023
a33bb60
ksmdb: use cmd helper variable in smb2_get_ksmbd_tcon()
slowfranklin Dec 18, 2023
84af59b
ksmbd: Remove redundant 'flush_workqueue()' calls
tititiou36 Dec 18, 2023
6cd90c0
ksmbd: remove md4 leftovers
namjaejeon Dec 18, 2023
e0c5842
ksmbd: remove smb2_buf_length in smb2_hdr
namjaejeon Dec 18, 2023
199b8b5
ksmbd: remove smb2_buf_length in smb2_transform_hdr
namjaejeon Dec 18, 2023
7833bd3
ksmbd: change LeaseKey data type to u8 array
namjaejeon Dec 18, 2023
82ae5fe
ksmbd: use oid registry functions to decode OIDs
hclee Dec 18, 2023
de203cd
ksmbd: Remove unused parameter from smb2_get_name()
Dec 18, 2023
a632567
ksmbd: Remove unused fields from ksmbd_file struct definition
Dec 18, 2023
e5b0497
ksmbd: set both ipv4 and ipv6 in FSCTL_QUERY_NETWORK_INTERFACE_INFO
namjaejeon Dec 18, 2023
2fa426c
ksmbd: Fix buffer_check_err() kernel-doc comment
Dec 18, 2023
3616744
ksmbd: Fix smb2_set_info_file() kernel-doc comment
Dec 18, 2023
dd56eb3
ksmbd: Delete an invalid argument description in smb2_populate_readdi…
Dec 18, 2023
91d7307
ksmbd: Fix smb2_get_name() kernel-doc comment
Dec 18, 2023
178ecc3
ksmbd: register ksmbd ib client with ib_register_client()
hclee Dec 18, 2023
8a49ab3
ksmbd: set 445 port to smbdirect port by default
namjaejeon Dec 18, 2023
97b3a08
ksmbd: smbd: call rdma_accept() under CM handler
hclee Dec 18, 2023
ba7c3ff
ksmbd: smbd: create MR pool
hclee Dec 18, 2023
d15077a
ksmbd: smbd: change the default maximum read/write, receive size
hclee Dec 18, 2023
51d0b87
ksmbd: add smb-direct shutdown
namjaejeon Dec 18, 2023
858b964
ksmbd: smbd: fix missing client's memory region invalidation
hclee Dec 18, 2023
09b4c60
ksmbd: smbd: validate buffer descriptor structures
hclee Dec 18, 2023
c5049d2
ksmbd: add support for key exchange
namjaejeon Dec 18, 2023
170598b
ksmbd: use netif_is_bridge_port
tklauser Dec 18, 2023
a5a8c91
ksmbd: store fids as opaque u64 integers
Dec 18, 2023
7ee6f9b
ksmbd: shorten experimental warning on loading the module
smfrench Dec 18, 2023
a521386
ksmbd: Remove a redundant zeroing of memory
tititiou36 Dec 18, 2023
dc23294
ksmbd: replace usage of found with dedicated list iterator variable
Jakob-Koschel Dec 18, 2023
e9a3251
smb3: fix ksmbd bigendian bug in oplock break, and move its struct to…
smfrench Dec 18, 2023
8e32e15
ksmbd: remove filename in ksmbd_file
namjaejeon Dec 18, 2023
6bb4399
ksmbd: validate length in smb2_write()
namjaejeon Dec 18, 2023
982fcde
ksmbd: smbd: change prototypes of RDMA read/write related functions
hclee Dec 18, 2023
f17ed7b
ksmbd: smbd: introduce read/write credits for RDMA read/write
hclee Dec 18, 2023
30bd0df
ksmbd: smbd: simplify tracking pending packets
hclee Dec 18, 2023
673c186
ksmbd: smbd: change the return value of get_sg_list
hclee Dec 18, 2023
918a690
ksmbd: smbd: handle multiple Buffer descriptors
hclee Dec 18, 2023
81602ee
ksmbd: fix wrong smbd max read/write size check
namjaejeon Dec 18, 2023
32af379
ksmbd: Fix some kernel-doc comments
Dec 18, 2023
9d609b5
ksmbd: smbd: fix connection dropped issue
hclee Dec 18, 2023
ff403db
ksmbd: smbd: relax the count of sges required
hclee Dec 18, 2023
d4b374f
ksmbd: smbd: Remove useless license text when SPDX-License-Identifier…
tititiou36 Dec 18, 2023
8d0f823
ksmbd: remove duplicate flag set in smb2_write
hclee Dec 18, 2023
1f82ecb
ksmbd: remove unused ksmbd_share_configs_cleanup function
namjaejeon Dec 18, 2023
c7aff8b
ksmbd: use wait_event instead of schedule_timeout()
namjaejeon Dec 18, 2023
ebb8c61
ksmbd: request update to stale share config
atheik Dec 18, 2023
a7ddc49
ksmbd: remove unnecessary generic_fillattr in smb2_open
hclee Dec 18, 2023
d6686d5
ksmbd: don't open-code file_path()
Dec 18, 2023
b79a9f9
ksmbd: don't open-code %pD
Dec 18, 2023
aa77fc8
ksmbd: constify struct path
Dec 18, 2023
43e2963
ksmbd: remove generic_fillattr use in smb2_open()
namjaejeon Dec 18, 2023
62e6846
ksmbd: casefold utf-8 share names and fix ascii lowercase conversion
atheik Dec 18, 2023
813ef06
ksmbd: change security id to the one samba used for posix extension
namjaejeon Dec 18, 2023
95b72ed
ksmbd: set file permission mode to match Samba server posix extension…
namjaejeon Dec 18, 2023
e925de7
ksmbd: fill sids in SMB_FIND_FILE_POSIX_INFO response
namjaejeon Dec 18, 2023
4d796ff
ksmbd: fix encryption failure issue for session logoff response
namjaejeon Dec 18, 2023
d5a3b10
ksmbd: set NTLMSSP_NEGOTIATE_SEAL flag to challenge blob
namjaejeon Dec 18, 2023
fe4d097
ksmbd: decrease the number of SMB3 smbdirect server SGEs
TTalpey Dec 18, 2023
507cb10
ksmbd: reduce server smbdirect max send/receive segment sizes
TTalpey Dec 18, 2023
131e308
ksmbd: hide socket error message when ipv6 config is disable
namjaejeon Dec 18, 2023
b3e852b
ksmbd: make utf-8 file name comparison work in __caseless_lookup()
atheik Dec 18, 2023
ef97ccd
ksmbd: call ib_drain_qp when disconnected
namjaejeon Dec 18, 2023
2bdd995
ksmbd: validate share name from share config response
atheik Dec 18, 2023
64b4d72
ksmbd: replace one-element arrays with flexible-array members
GustavoARSilva Dec 18, 2023
8263acd
ksmbd: set SMB2_SESSION_FLAG_ENCRYPT_DATA when enforcing data encrypt…
namjaejeon Dec 18, 2023
9ea6b43
ksmbd: use F_SETLK when unlocking a file
jtlayton Dec 18, 2023
46c517b
ksmbd: Fix resource leak in smb2_lock()
Dec 18, 2023
bcab5c8
ksmbd: Convert to use sysfs_emit()/sysfs_emit_at() APIs
Dec 18, 2023
d7f088d
ksmbd: send proper error response in smb2_tree_connect()
Dec 18, 2023
b1caecb
ksmbd: Implements sess->ksmbd_chann_list as xarray
Dec 18, 2023
1f485b5
ksmbd: Implements sess->rpc_handle_list as xarray
Dec 18, 2023
b15734e
ksmbd: fix typo, syncronous->synchronous
Dec 18, 2023
a35ebf6
ksmbd: Remove duplicated codes
Dec 18, 2023
1f1aca1
ksmbd: update Kconfig to note Kerberos support and fix indentation
smfrench Dec 18, 2023
0d3f06f
ksmbd: Fix spelling mistake "excceed" -> "exceeded"
ColinIanKing Dec 18, 2023
d625db8
ksmbd: Fix parameter name and comment mismatch
wb-zjp846396 Dec 18, 2023
bfe8372
ksmbd: fix possible memory leak in smb2_lock()
HBh25Y Dec 18, 2023
289b46f
ksmbd: fix wrong signingkey creation when encryption is AES256
namjaejeon Dec 18, 2023
427caad
ksmbd: remove unused is_char_allowed function
Dec 18, 2023
9494242
ksmbd: delete asynchronous work from list
namjaejeon Dec 18, 2023
9215360
ksmbd: fix slab-out-of-bounds in init_smb2_rsp_hdr
namjaejeon Dec 18, 2023
39f5b4b
ksmbd: avoid out of bounds access in decode_preauth_ctxt()
ddiss Dec 18, 2023
2ca2394
ksmbd: set NegotiateContextCount once instead of every inc
ddiss Dec 18, 2023
0dbfcc3
ksmbd: avoid duplicate negotiate ctx offset increments
ddiss Dec 18, 2023
380a0fe
ksmbd: remove unused compression negotiate ctx packing
ddiss Dec 18, 2023
b31e1ef
fs: introduce lock_rename_child() helper
Dec 18, 2023
019aae4
ksmbd: fix racy issue from using ->d_parent and ->d_name
namjaejeon Dec 18, 2023
708c304
ksmbd: fix racy issue from session setup and logoff
namjaejeon Dec 18, 2023
a6a9601
ksmbd: destroy expired sessions
namjaejeon Dec 18, 2023
dff8790
ksmbd: block asynchronous requests when making a delay on session setup
namjaejeon Dec 18, 2023
ae06b79
ksmbd: fix racy issue from smb2 close and logoff with multichannel
namjaejeon Dec 18, 2023
b36295c
ksmbd: fix racy issue under cocurrent smb2 tree disconnect
namjaejeon Dec 18, 2023
ea799dd
ksmbd: fix uninitialized pointer read in ksmbd_vfs_rename()
namjaejeon Dec 18, 2023
61a306c
ksmbd: fix uninitialized pointer read in smb2_create_link()
namjaejeon Dec 18, 2023
19b2b9a
ksmbd: fix multiple out-of-bounds read during context decoding
HexRabbit Dec 18, 2023
b423dda
ksmbd: fix UAF issue from opinfo->conn
namjaejeon Dec 18, 2023
049ed0f
ksmbd: call putname after using the last component
namjaejeon Dec 18, 2023
4adb4fb
ksmbd: fix out-of-bound read in deassemble_neg_contexts()
namjaejeon Dec 18, 2023
55ceeb4
ksmbd: fix out-of-bound read in parse_lease_state()
namjaejeon Dec 18, 2023
ae33f07
ksmbd: fix posix_acls and acls dereferencing possible ERR_PTR()
namjaejeon Dec 18, 2023
df3a451
ksmbd: check the validation of pdu_size in ksmbd_conn_handler_loop
namjaejeon Dec 18, 2023
0d1a3f9
ksmbd: validate smb request protocol id
namjaejeon Dec 18, 2023
ce95f7d
ksmbd: add mnt_want_write to ksmbd vfs functions
namjaejeon Dec 18, 2023
b657622
ksmbd: remove unused ksmbd_tree_conn_share function
namjaejeon Dec 18, 2023
4910a79
ksmbd: use kzalloc() instead of __GFP_ZERO
namjaejeon Dec 18, 2023
7585898
ksmbd: return a literal instead of 'err' in ksmbd_vfs_kern_path_locked()
namjaejeon Dec 18, 2023
638043b
ksmbd: Change the return value of ksmbd_vfs_query_maximal_access to void
Dec 18, 2023
2222ada
ksmbd: use kvzalloc instead of kvmalloc
namjaejeon Dec 18, 2023
d91ba80
ksmbd: Replace the ternary conditional operator with min()
Dec 18, 2023
6763921
ksmbd: fix out of bounds read in smb2_sess_setup
namjaejeon Dec 18, 2023
97f5c1e
ksmbd: add missing compound request handing in some commands
namjaejeon Dec 18, 2023
d9902ad
ksmbd: Use struct_size() helper in ksmbd_negotiate_smb_dialect()
GustavoARSilva Dec 18, 2023
5f36e22
ksmbd: Replace one-element array with flexible-array member
GustavoARSilva Dec 18, 2023
cf63b94
ksmbd: Fix unsigned expression compared with zero
Dec 18, 2023
4a027b9
ksmbd: check if a mount point is crossed during path lookup
namjaejeon Dec 18, 2023
017d85c
ksmbd: validate session id and tree id in compound request
namjaejeon Dec 18, 2023
5c0df9d
ksmbd: fix out of bounds in init_smb2_rsp_hdr()
namjaejeon Dec 18, 2023
d7ad0ac
ksmbd: switch to use kmemdup_nul() helper
Dec 18, 2023
f228368
ksmbd: add support for read compound
namjaejeon Dec 18, 2023
6f02072
ksmbd: fix wrong interim response on compound
namjaejeon Dec 18, 2023
e12b092
ksmbd: fix `force create mode' and `force directory mode'
atheik Dec 18, 2023
c5aa744
ksmbd: reduce descriptor size if remaining bytes is less than request…
namjaejeon Dec 18, 2023
7019440
ksmbd: Fix one kernel-doc comment
Dec 18, 2023
bd554ed
ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()
namjaejeon Dec 18, 2023
6997fa6
ksmbd: add missing calling smb2_set_err_rsp() on error
namjaejeon Dec 18, 2023
a9128c4
ksmbd: remove experimental warning
smfrench Dec 18, 2023
fbed0ad
ksmbd: remove unneeded mark_inode_dirty in set_info_sec()
namjaejeon Dec 18, 2023
4a67467
ksmbd: fix passing freed memory 'aux_payload_buf'
namjaejeon Dec 18, 2023
01df133
ksmbd: return invalid parameter error response if smb2 request is inv…
namjaejeon Dec 18, 2023
b9a3e45
ksmbd: check iov vector index in ksmbd_conn_write()
namjaejeon Dec 18, 2023
c77fd3e
ksmbd: fix race condition between session lookup and expire
namjaejeon Dec 18, 2023
f99d5d1
ksmbd: fix race condition with fp
namjaejeon Dec 18, 2023
50e1393
ksmbd: fix race condition from parallel smb2 logoff requests
namjaejeon Dec 18, 2023
0901be8
ksmbd: fix race condition from parallel smb2 lock requests
namjaejeon Dec 18, 2023
dd45db4
ksmbd: fix race condition between tree conn lookup and disconnect
namjaejeon Dec 18, 2023
4b9b7ea
ksmbd: fix wrong error response status by using set_smb2_rsp_status()
namjaejeon Dec 18, 2023
ef435de
ksmbd: fix Null pointer dereferences in ksmbd_update_fstate()
namjaejeon Dec 18, 2023
fab0175
ksmbd: fix potential double free on smb2_read_pipe() error path
namjaejeon Dec 18, 2023
845837f
ksmbd: Remove unused field in ksmbd_user struct
WuTa0209 Dec 18, 2023
df79244
ksmbd: reorganize ksmbd_iov_pin_rsp()
namjaejeon Dec 18, 2023
f30a2ff
ksmbd: fix kernel-doc comment of ksmbd_vfs_setxattr()
namjaejeon Dec 18, 2023
20b4f6b
ksmbd: fix recursive locking in vfs helpers
Dec 18, 2023
0eaeb8a
ksmbd: fix missing RDMA-capable flag for IPoIB device in ksmbd_rdma_c…
chaserhkj Dec 18, 2023
841bcad
ksmbd: add support for surrogate pair conversion
namjaejeon Dec 18, 2023
3fecda5
ksmbd: no need to wait for binded connection termination at logoff
namjaejeon Dec 18, 2023
1f50c41
ksmbd: fix kernel-doc comment of ksmbd_vfs_kern_path_locked()
namjaejeon Dec 18, 2023
8dc9eb7
ksmbd: handle malformed smb1 message
namjaejeon Dec 18, 2023
ae3356c
ksmbd: prevent memory leak on error return
Dec 18, 2023
8ed1118
ksmbd: fix possible deadlock in smb2_open
namjaejeon Dec 18, 2023
772d81a
ksmbd: separately allocate ci per dentry
namjaejeon Dec 18, 2023
c21d044
ksmbd: move oplock handling after unlock parent dir
namjaejeon Dec 18, 2023
5e1f313
ksmbd: release interim response after sending status pending response
namjaejeon Dec 18, 2023
bd47f9c
ksmbd: move setting SMB2_FLAGS_ASYNC_COMMAND and AsyncId
namjaejeon Dec 18, 2023
811b5ea
ksmbd: don't update ->op_state as OPLOCK_STATE_NONE on error
namjaejeon Dec 18, 2023
e21817c
Revert "drm/bridge: lt9611uxc: fix the race in the error path"
pundiramit Dec 19, 2023
4a8350a
Revert "drm/bridge: lt9611uxc: Register and attach our DSI device at …
pundiramit Dec 19, 2023
7aa33c9
Revert "drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers"
pundiramit Dec 19, 2023
f30f893
tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols
eiffel-fl Dec 5, 2023
ee41f66
kasan: disable kasan_non_canonical_hook() for HW tags
arndb Oct 16, 2023
d93fa2c
Linux 5.15.145
gregkh Dec 23, 2023
6c4b3db
Merge tag 'v5.15.145' into v5.15-stm32mp
ashishverma2691 Feb 23, 2024
9c6093f
serial: stm32: Ignore return value of uart_remove_one_port() in .remo…
May 12, 2023
6f13fad
crypto: stm32/cryp - add CRYPTO_ALG_KERN_DRIVER_ONLY flag
meremST Aug 2, 2023
8550ec0
spi: stm32: fix Overrun issue at < 8bpw
deepak-STM Jan 30, 2024
82e6132
ARM: configs: enable USB_HIDDEV in fragment-02-multiv7_addons.config
rahulst16 Jan 31, 2024
abb8819
hwrng: stm32 - move max RNG clock rate to compatible data
GseoC Sep 1, 2023
d420da6
hwrng: stm32 - update STM32MP15 max RNG clock frequency
GseoC Jan 22, 2024
aad8be7
hwrng: stm32 - fix clock division application
GseoC Jul 4, 2023
ff85423
hwrng: stm32 - use devm_platform_get_and_ioremap_resource() API
GseoC Sep 1, 2023
24b67f8
hwrng: stm32 - implement error concealment
GseoC Sep 1, 2023
a523673
hwrng: stm32 - rework error handling in stm32_rng_read()
GseoC Sep 1, 2023
d41acc7
hwrng: stm32 - add missing clk_disable_unprepare() in stm32_rng_init()
Dec 1, 2023
814b78d
spi: stm32: perform small transfer in polling mode
Jan 24, 2024
8e3e0ee
remoteproc: stm32_rproc: Fix mailbox interrupts queuing
Mar 26, 2024
74cc379
mfd: stmfx: wait boot time after a regulator enable
VCASTM May 16, 2023
660c5fd
dmaengine: stm32-dma: Fix MDMA channel complete callback
sandhya-sharma-dev Jun 12, 2024
eae4295
dmaengine: stm32-dma: use one workqueue per channel for DMA/MDMA chai…
sandhya-sharma-dev Jun 12, 2024
bf7464f
dmaengine: stm32-dma: Fix MDMA worker complete callback
sandhya-sharma-dev Sep 6, 2024
d6ab414
spi: stm32: perform small transfer in polling mode
Jul 9, 2024
8cb6928
Merge tag 'v5.15-stm32mp-r2.2' into kernel-update-st-v5.15.145
mcarlin-ds Sep 11, 2024
2952b0b
Merge remote-tracking branch 'upstream/v5.15-stm32mp' into kernel-upd…
mcarlin-ds Sep 13, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
The diff you're trying to view is too large. We only load the first 3000 changed files.
9 changes: 9 additions & 0 deletions Documentation/ABI/testing/sysfs-bus-optee-devices
Original file line number Diff line number Diff line change
Expand Up @@ -6,3 +6,12 @@ Description:
OP-TEE bus provides reference to registered drivers under this directory. The <uuid>
matches Trusted Application (TA) driver and corresponding TA in secure OS. Drivers
are free to create needed API under optee-ta-<uuid> directory.

What: /sys/bus/tee/devices/optee-ta-<uuid>/need_supplicant
Date: November 2023
KernelVersion: 6.7
Contact: op-tee@lists.trustedfirmware.org
Description:
Allows to distinguish whether an OP-TEE based TA/device requires user-space
tee-supplicant to function properly or not. This attribute will be present for
devices which depend on tee-supplicant to be running.
13 changes: 7 additions & 6 deletions Documentation/ABI/testing/sysfs-devices-system-cpu
Original file line number Diff line number Diff line change
Expand Up @@ -511,17 +511,18 @@ Description: information about CPUs heterogeneity.
cpu_capacity: capacity of cpu#.

What: /sys/devices/system/cpu/vulnerabilities
/sys/devices/system/cpu/vulnerabilities/gather_data_sampling
/sys/devices/system/cpu/vulnerabilities/itlb_multihit
/sys/devices/system/cpu/vulnerabilities/l1tf
/sys/devices/system/cpu/vulnerabilities/mds
/sys/devices/system/cpu/vulnerabilities/meltdown
/sys/devices/system/cpu/vulnerabilities/mmio_stale_data
/sys/devices/system/cpu/vulnerabilities/retbleed
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass
/sys/devices/system/cpu/vulnerabilities/spectre_v1
/sys/devices/system/cpu/vulnerabilities/spectre_v2
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass
/sys/devices/system/cpu/vulnerabilities/l1tf
/sys/devices/system/cpu/vulnerabilities/mds
/sys/devices/system/cpu/vulnerabilities/srbds
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort
/sys/devices/system/cpu/vulnerabilities/itlb_multihit
/sys/devices/system/cpu/vulnerabilities/mmio_stale_data
/sys/devices/system/cpu/vulnerabilities/retbleed
Date: January 2018
Contact: Linux kernel mailing list <linux-kernel@vger.kernel.org>
Description: Information about CPU vulnerabilities
Expand Down
8 changes: 8 additions & 0 deletions Documentation/admin-guide/device-mapper/dm-init.rst
Original file line number Diff line number Diff line change
Expand Up @@ -123,3 +123,11 @@ Other examples (per target):
0 1638400 verity 1 8:1 8:2 4096 4096 204800 1 sha256
fb1a5a0f00deb908d8b53cb270858975e76cf64105d412ce764225d53b8f3cfd
51934789604d1b92399c52e7cb149d1b3a1b74bbbcb103b2a0aaacbed5c08584

For setups using device-mapper on top of asynchronously probed block
devices (MMC, USB, ..), it may be necessary to tell dm-init to
explicitly wait for them to become available before setting up the
device-mapper tables. This can be done with the "dm-mod.waitfor="
module parameter, which takes a list of devices to wait for::

dm-mod.waitfor=<device1>[,..,<deviceN>]
109 changes: 109 additions & 0 deletions Documentation/admin-guide/hw-vuln/gather_data_sampling.rst
Original file line number Diff line number Diff line change
@@ -0,0 +1,109 @@
.. SPDX-License-Identifier: GPL-2.0
GDS - Gather Data Sampling
==========================

Gather Data Sampling is a hardware vulnerability which allows unprivileged
speculative access to data which was previously stored in vector registers.

Problem
-------
When a gather instruction performs loads from memory, different data elements
are merged into the destination vector register. However, when a gather
instruction that is transiently executed encounters a fault, stale data from
architectural or internal vector registers may get transiently forwarded to the
destination vector register instead. This will allow a malicious attacker to
infer stale data using typical side channel techniques like cache timing
attacks. GDS is a purely sampling-based attack.

The attacker uses gather instructions to infer the stale vector register data.
The victim does not need to do anything special other than use the vector
registers. The victim does not need to use gather instructions to be
vulnerable.

Because the buffers are shared between Hyper-Threads cross Hyper-Thread attacks
are possible.

Attack scenarios
----------------
Without mitigation, GDS can infer stale data across virtually all
permission boundaries:

Non-enclaves can infer SGX enclave data
Userspace can infer kernel data
Guests can infer data from hosts
Guest can infer guest from other guests
Users can infer data from other users

Because of this, it is important to ensure that the mitigation stays enabled in
lower-privilege contexts like guests and when running outside SGX enclaves.

The hardware enforces the mitigation for SGX. Likewise, VMMs should ensure
that guests are not allowed to disable the GDS mitigation. If a host erred and
allowed this, a guest could theoretically disable GDS mitigation, mount an
attack, and re-enable it.

Mitigation mechanism
--------------------
This issue is mitigated in microcode. The microcode defines the following new
bits:

================================ === ============================
IA32_ARCH_CAPABILITIES[GDS_CTRL] R/O Enumerates GDS vulnerability
and mitigation support.
IA32_ARCH_CAPABILITIES[GDS_NO] R/O Processor is not vulnerable.
IA32_MCU_OPT_CTRL[GDS_MITG_DIS] R/W Disables the mitigation
0 by default.
IA32_MCU_OPT_CTRL[GDS_MITG_LOCK] R/W Locks GDS_MITG_DIS=0. Writes
to GDS_MITG_DIS are ignored
Can't be cleared once set.
================================ === ============================

GDS can also be mitigated on systems that don't have updated microcode by
disabling AVX. This can be done by setting gather_data_sampling="force" or
"clearcpuid=avx" on the kernel command-line.

If used, these options will disable AVX use by turning off XSAVE YMM support.
However, the processor will still enumerate AVX support. Userspace that
does not follow proper AVX enumeration to check both AVX *and* XSAVE YMM
support will break.

Mitigation control on the kernel command line
---------------------------------------------
The mitigation can be disabled by setting "gather_data_sampling=off" or
"mitigations=off" on the kernel command line. Not specifying either will default
to the mitigation being enabled. Specifying "gather_data_sampling=force" will
use the microcode mitigation when available or disable AVX on affected systems
where the microcode hasn't been updated to include the mitigation.

GDS System Information
------------------------
The kernel provides vulnerability status information through sysfs. For
GDS this can be accessed by the following sysfs file:

/sys/devices/system/cpu/vulnerabilities/gather_data_sampling

The possible values contained in this file are:

============================== =============================================
Not affected Processor not vulnerable.
Vulnerable Processor vulnerable and mitigation disabled.
Vulnerable: No microcode Processor vulnerable and microcode is missing
mitigation.
Mitigation: AVX disabled,
no microcode Processor is vulnerable and microcode is missing
mitigation. AVX disabled as mitigation.
Mitigation: Microcode Processor is vulnerable and mitigation is in
effect.
Mitigation: Microcode (locked) Processor is vulnerable and mitigation is in
effect and cannot be disabled.
Unknown: Dependent on
hypervisor status Running on a virtual guest processor that is
affected but with no way to know if host
processor is mitigated or vulnerable.
============================== =============================================

GDS Default mitigation
----------------------
The updated microcode will enable the mitigation by default. The kernel's
default action is to leave the mitigation enabled.
2 changes: 2 additions & 0 deletions Documentation/admin-guide/hw-vuln/index.rst
Original file line number Diff line number Diff line change
Expand Up @@ -19,3 +19,5 @@ are configurable at compile, boot or run time.
l1d_flush.rst
processor_mmio_stale_data.rst
cross-thread-rsb.rst
gather_data_sampling.rst
srso
133 changes: 133 additions & 0 deletions Documentation/admin-guide/hw-vuln/srso.rst
Original file line number Diff line number Diff line change
@@ -0,0 +1,133 @@
.. SPDX-License-Identifier: GPL-2.0
Speculative Return Stack Overflow (SRSO)
========================================

This is a mitigation for the speculative return stack overflow (SRSO)
vulnerability found on AMD processors. The mechanism is by now the well
known scenario of poisoning CPU functional units - the Branch Target
Buffer (BTB) and Return Address Predictor (RAP) in this case - and then
tricking the elevated privilege domain (the kernel) into leaking
sensitive data.

AMD CPUs predict RET instructions using a Return Address Predictor (aka
Return Address Stack/Return Stack Buffer). In some cases, a non-architectural
CALL instruction (i.e., an instruction predicted to be a CALL but is
not actually a CALL) can create an entry in the RAP which may be used
to predict the target of a subsequent RET instruction.

The specific circumstances that lead to this varies by microarchitecture
but the concern is that an attacker can mis-train the CPU BTB to predict
non-architectural CALL instructions in kernel space and use this to
control the speculative target of a subsequent kernel RET, potentially
leading to information disclosure via a speculative side-channel.

The issue is tracked under CVE-2023-20569.

Affected processors
-------------------

AMD Zen, generations 1-4. That is, all families 0x17 and 0x19. Older
processors have not been investigated.

System information and options
------------------------------

First of all, it is required that the latest microcode be loaded for
mitigations to be effective.

The sysfs file showing SRSO mitigation status is:

/sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow

The possible values in this file are:

- 'Not affected' The processor is not vulnerable

- 'Vulnerable: no microcode' The processor is vulnerable, no
microcode extending IBPB functionality
to address the vulnerability has been
applied.

- 'Mitigation: microcode' Extended IBPB functionality microcode
patch has been applied. It does not
address User->Kernel and Guest->Host
transitions protection but it does
address User->User and VM->VM attack
vectors.

(spec_rstack_overflow=microcode)

- 'Mitigation: safe RET' Software-only mitigation. It complements
the extended IBPB microcode patch
functionality by addressing User->Kernel
and Guest->Host transitions protection.

Selected by default or by
spec_rstack_overflow=safe-ret

- 'Mitigation: IBPB' Similar protection as "safe RET" above
but employs an IBPB barrier on privilege
domain crossings (User->Kernel,
Guest->Host).

(spec_rstack_overflow=ibpb)

- 'Mitigation: IBPB on VMEXIT' Mitigation addressing the cloud provider
scenario - the Guest->Host transitions
only.

(spec_rstack_overflow=ibpb-vmexit)

In order to exploit vulnerability, an attacker needs to:

- gain local access on the machine

- break kASLR

- find gadgets in the running kernel in order to use them in the exploit

- potentially create and pin an additional workload on the sibling
thread, depending on the microarchitecture (not necessary on fam 0x19)

- run the exploit

Considering the performance implications of each mitigation type, the
default one is 'Mitigation: safe RET' which should take care of most
attack vectors, including the local User->Kernel one.

As always, the user is advised to keep her/his system up-to-date by
applying software updates regularly.

The default setting will be reevaluated when needed and especially when
new attack vectors appear.

As one can surmise, 'Mitigation: safe RET' does come at the cost of some
performance depending on the workload. If one trusts her/his userspace
and does not want to suffer the performance impact, one can always
disable the mitigation with spec_rstack_overflow=off.

Similarly, 'Mitigation: IBPB' is another full mitigation type employing
an indrect branch prediction barrier after having applied the required
microcode patch for one's system. This mitigation comes also at
a performance cost.

Mitigation: safe RET
--------------------

The mitigation works by ensuring all RET instructions speculate to
a controlled location, similar to how speculation is controlled in the
retpoline sequence. To accomplish this, the __x86_return_thunk forces
the CPU to mispredict every function return using a 'safe return'
sequence.

To ensure the safety of this mitigation, the kernel must ensure that the
safe return sequence is itself free from attacker interference. In Zen3
and Zen4, this is accomplished by creating a BTB alias between the
untraining function srso_alias_untrain_ret() and the safe return
function srso_alias_safe_ret() which results in evicting a potentially
poisoned BTB entry and using that safe one for all function returns.

In older Zen1 and Zen2, this is accomplished using a reinterpretation
technique similar to Retbleed one: srso_untrain_ret() and
srso_safe_ret().
Loading