From patchwork Fri Sep 24 17:40:56 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Catalin Marinas X-Patchwork-Id: 12516319 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 72514C433EF for ; Fri, 24 Sep 2021 17:42:48 +0000 (UTC) Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 35AB461260 for ; Fri, 24 Sep 2021 17:42:48 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org 35AB461260 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=arm.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Subject:Cc:To: From:Date:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=YgGJCI7NIFaBRix/rVxJqiAsooJ3EAWDOnQUJqHa0Fc=; b=EMMeWlMhEioe4a ZewFDMf88UW862ASw+zuhpbgG4b6sIG20V4T/H7st8bghn0yFuiV5SQxhWVufgrZQwyKZh5t2itWW +DpOp5OsLmL3BeOVFEfVZbYan0SauHMGZjyNpHj0+mKrtY6DxBPMBVLi0Hw5N6MG+dCqjI42qv41S RPaUMiYOdjYouoIkbJwqqqkoNw4U3ozeUgX7QpBbg+9dSm8W41oIk0p5gjqzkg4s9n1xf4XKv58Zf i8yBloPUuEbuDC7RTWHB/BX4nHWkuDkq8amErchbVTshlUf7mtH+EFBlDyXGVMh02JCdh0n1z+UNe 2dH6jBt6TvuqLtr0QrpQ==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1mTpC8-00FGJe-Ul; Fri, 24 Sep 2021 17:41:09 +0000 Received: from mail.kernel.org ([198.145.29.99]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1mTpC5-00FGJ7-56 for linux-arm-kernel@lists.infradead.org; Fri, 24 Sep 2021 17:41:06 +0000 Received: by mail.kernel.org (Postfix) with ESMTPSA id 04AFF61260; Fri, 24 Sep 2021 17:41:01 +0000 (UTC) Date: Fri, 24 Sep 2021 18:40:56 +0100 From: Catalin Marinas To: Linus Torvalds Cc: Will Deacon , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [GIT PULL] arm64 fixes for 5.15-rc3 Message-ID: MIME-Version: 1.0 Content-Disposition: inline X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20210924_104105_239569_56E3F1D2 X-CRM114-Status: GOOD ( 11.70 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Hi Linus, Please pull the arm64 fixes below. Thanks. The following changes since commit 9fcb2e93f41c07a400885325e7dbdfceba6efaec: arm64: Mark __stack_chk_guard as __ro_after_init (2021-09-16 17:59:17 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux tags/arm64-fixes for you to fetch changes up to 22b70e6f2da0a4c8b1421b00cfc3016bc9d4d9d4: arm64: Restore forced disabling of KPTI on ThunderX (2021-09-23 15:59:15 +0100) ---------------------------------------------------------------- arm64 fixes: - It turns out that the optimised string routines merged in 5.14 are not safe with in-kernel MTE (KASAN_HW_TAGS) because of reading beyond the end of a string (strcmp, strncmp). Such reading may go across a 16 byte tag granule and cause a tag check fault. When KASAN_HW_TAGS is enabled, use the generic strcmp/strncmp C implementation. - An errata workaround for ThunderX relied on the CPU capabilities being enabled in a specific order. This disappeared with the automatic generation of the cpucaps.h file (sorted alphabetically). Fix it by checking the current CPU only rather than the system-wide capability. - Add system_supports_mte() checks on the kernel entry/exit path and thread switching to avoid unnecessary barriers and function calls on systems where MTE is not supported. - kselftests: skip arm64 tests if the required features are missing. ---------------------------------------------------------------- Cristian Marussi (1): kselftest/arm64: signal: Skip tests if required features are missing Peter Collingbourne (1): arm64: add MTE supported check to thread switching and syscall entry/exit Robin Murphy (1): arm64: Mitigate MTE issues with str{n}cmp() dann frazier (1): arm64: Restore forced disabling of KPTI on ThunderX arch/arm64/include/asm/assembler.h | 5 +++++ arch/arm64/include/asm/mte.h | 6 ++++++ arch/arm64/include/asm/string.h | 2 ++ arch/arm64/kernel/cpufeature.c | 8 ++++++-- arch/arm64/kernel/mte.c | 10 ++++------ arch/arm64/lib/strcmp.S | 2 +- arch/arm64/lib/strncmp.S | 2 +- tools/testing/selftests/arm64/signal/test_signals_utils.c | 7 +++++-- 8 files changed, 30 insertions(+), 12 deletions(-)