Skip to content

Commit fc3a281

Browse files
committed
Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net
Cross-merge networking fixes after downstream PR (net-6.17-rc6). Conflicts: net/netfilter/nft_set_pipapo.c net/netfilter/nft_set_pipapo_avx2.c c4eaca2 ("netfilter: nft_set_pipapo: don't check genbit from packetpath lookups") 84c1da7 ("netfilter: nft_set_pipapo: use avx2 algorithm for insertions too") Only trivial adjacent changes (in a doc and a Makefile). Signed-off-by: Jakub Kicinski <[email protected]>
2 parents 5f79020 + db87bd2 commit fc3a281

File tree

269 files changed

+2632
-1129
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

269 files changed

+2632
-1129
lines changed

Documentation/ABI/testing/sysfs-devices-system-cpu

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -586,6 +586,7 @@ What: /sys/devices/system/cpu/vulnerabilities
586586
/sys/devices/system/cpu/vulnerabilities/srbds
587587
/sys/devices/system/cpu/vulnerabilities/tsa
588588
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort
589+
/sys/devices/system/cpu/vulnerabilities/vmscape
589590
Date: January 2018
590591
Contact: Linux kernel mailing list <[email protected]>
591592
Description: Information about CPU vulnerabilities

Documentation/admin-guide/hw-vuln/index.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,3 +26,4 @@ are configurable at compile, boot or run time.
2626
rsb
2727
old_microcode
2828
indirect-target-selection
29+
vmscape
Lines changed: 110 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,110 @@
1+
.. SPDX-License-Identifier: GPL-2.0
2+
3+
VMSCAPE
4+
=======
5+
6+
VMSCAPE is a vulnerability that may allow a guest to influence the branch
7+
prediction in host userspace. It particularly affects hypervisors like QEMU.
8+
9+
Even if a hypervisor may not have any sensitive data like disk encryption keys,
10+
guest-userspace may be able to attack the guest-kernel using the hypervisor as
11+
a confused deputy.
12+
13+
Affected processors
14+
-------------------
15+
16+
The following CPU families are affected by VMSCAPE:
17+
18+
**Intel processors:**
19+
- Skylake generation (Parts without Enhanced-IBRS)
20+
- Cascade Lake generation - (Parts affected by ITS guest/host separation)
21+
- Alder Lake and newer (Parts affected by BHI)
22+
23+
Note that, BHI affected parts that use BHB clearing software mitigation e.g.
24+
Icelake are not vulnerable to VMSCAPE.
25+
26+
**AMD processors:**
27+
- Zen series (families 0x17, 0x19, 0x1a)
28+
29+
** Hygon processors:**
30+
- Family 0x18
31+
32+
Mitigation
33+
----------
34+
35+
Conditional IBPB
36+
----------------
37+
38+
Kernel tracks when a CPU has run a potentially malicious guest and issues an
39+
IBPB before the first exit to userspace after VM-exit. If userspace did not run
40+
between VM-exit and the next VM-entry, no IBPB is issued.
41+
42+
Note that the existing userspace mitigation against Spectre-v2 is effective in
43+
protecting the userspace. They are insufficient to protect the userspace VMMs
44+
from a malicious guest. This is because Spectre-v2 mitigations are applied at
45+
context switch time, while the userspace VMM can run after a VM-exit without a
46+
context switch.
47+
48+
Vulnerability enumeration and mitigation is not applied inside a guest. This is
49+
because nested hypervisors should already be deploying IBPB to isolate
50+
themselves from nested guests.
51+
52+
SMT considerations
53+
------------------
54+
55+
When Simultaneous Multi-Threading (SMT) is enabled, hypervisors can be
56+
vulnerable to cross-thread attacks. For complete protection against VMSCAPE
57+
attacks in SMT environments, STIBP should be enabled.
58+
59+
The kernel will issue a warning if SMT is enabled without adequate STIBP
60+
protection. Warning is not issued when:
61+
62+
- SMT is disabled
63+
- STIBP is enabled system-wide
64+
- Intel eIBRS is enabled (which implies STIBP protection)
65+
66+
System information and options
67+
------------------------------
68+
69+
The sysfs file showing VMSCAPE mitigation status is:
70+
71+
/sys/devices/system/cpu/vulnerabilities/vmscape
72+
73+
The possible values in this file are:
74+
75+
* 'Not affected':
76+
77+
The processor is not vulnerable to VMSCAPE attacks.
78+
79+
* 'Vulnerable':
80+
81+
The processor is vulnerable and no mitigation has been applied.
82+
83+
* 'Mitigation: IBPB before exit to userspace':
84+
85+
Conditional IBPB mitigation is enabled. The kernel tracks when a CPU has
86+
run a potentially malicious guest and issues an IBPB before the first
87+
exit to userspace after VM-exit.
88+
89+
* 'Mitigation: IBPB on VMEXIT':
90+
91+
IBPB is issued on every VM-exit. This occurs when other mitigations like
92+
RETBLEED or SRSO are already issuing IBPB on VM-exit.
93+
94+
Mitigation control on the kernel command line
95+
----------------------------------------------
96+
97+
The mitigation can be controlled via the ``vmscape=`` command line parameter:
98+
99+
* ``vmscape=off``:
100+
101+
Disable the VMSCAPE mitigation.
102+
103+
* ``vmscape=ibpb``:
104+
105+
Enable conditional IBPB mitigation (default when CONFIG_MITIGATION_VMSCAPE=y).
106+
107+
* ``vmscape=force``:
108+
109+
Force vulnerability detection and mitigation even on processors that are
110+
not known to be affected.

Documentation/admin-guide/kernel-parameters.txt

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3829,6 +3829,7 @@
38293829
srbds=off [X86,INTEL]
38303830
ssbd=force-off [ARM64]
38313831
tsx_async_abort=off [X86]
3832+
vmscape=off [X86]
38323833

38333834
Exceptions:
38343835
This does not have any effect on
@@ -8041,6 +8042,16 @@
80418042
vmpoff= [KNL,S390] Perform z/VM CP command after power off.
80428043
Format: <command>
80438044

8045+
vmscape= [X86] Controls mitigation for VMscape attacks.
8046+
VMscape attacks can leak information from a userspace
8047+
hypervisor to a guest via speculative side-channels.
8048+
8049+
off - disable the mitigation
8050+
ibpb - use Indirect Branch Prediction Barrier
8051+
(IBPB) mitigation (default)
8052+
force - force vulnerability detection even on
8053+
unaffected processors
8054+
80448055
vsyscall= [X86-64,EARLY]
80458056
Controls the behavior of vsyscalls (i.e. calls to
80468057
fixed addresses of 0xffffffffff600x00 from legacy

Documentation/devicetree/bindings/spi/spi-fsl-lpspi.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,13 +20,18 @@ properties:
2020
- enum:
2121
- fsl,imx7ulp-spi
2222
- fsl,imx8qxp-spi
23+
- nxp,s32g2-lpspi
2324
- items:
2425
- enum:
2526
- fsl,imx8ulp-spi
2627
- fsl,imx93-spi
2728
- fsl,imx94-spi
2829
- fsl,imx95-spi
2930
- const: fsl,imx7ulp-spi
31+
- items:
32+
- const: nxp,s32g3-lpspi
33+
- const: nxp,s32g2-lpspi
34+
3035
reg:
3136
maxItems: 1
3237

Documentation/netlink/specs/mptcp_pm.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -256,7 +256,7 @@ attribute-sets:
256256
type: u32
257257
-
258258
name: if-idx
259-
type: u32
259+
type: s32
260260
-
261261
name: reset-reason
262262
type: u32

Documentation/networking/can.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -742,7 +742,7 @@ The broadcast manager sends responses to user space in the same form:
742742
struct timeval ival1, ival2; /* count and subsequent interval */
743743
canid_t can_id; /* unique can_id for task */
744744
__u32 nframes; /* number of can_frames following */
745-
struct can_frame frames[0];
745+
struct can_frame frames[];
746746
};
747747
748748
The aligned payload 'frames' uses the same basic CAN frame structure defined

Documentation/networking/mptcp.rst

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -60,10 +60,10 @@ address announcements. Typically, it is the client side that initiates subflows,
6060
and the server side that announces additional addresses via the ``ADD_ADDR`` and
6161
``REMOVE_ADDR`` options.
6262

63-
Path managers are controlled by the ``net.mptcp.pm_type`` sysctl knob -- see
64-
mptcp-sysctl.rst. There are two types: the in-kernel one (type ``0``) where the
65-
same rules are applied for all the connections (see: ``ip mptcp``) ; and the
66-
userspace one (type ``1``), controlled by a userspace daemon (i.e. `mptcpd
63+
Path managers are controlled by the ``net.mptcp.path_manager`` sysctl knob --
64+
see mptcp-sysctl.rst. There are two types: the in-kernel one (``kernel``) where
65+
the same rules are applied for all the connections (see: ``ip mptcp``) ; and the
66+
userspace one (``userspace``), controlled by a userspace daemon (i.e. `mptcpd
6767
<https://mptcpd.mptcp.dev/>`_) where different rules can be applied for each
6868
connection. The path managers can be controlled via a Netlink API; see
6969
../netlink/specs/mptcp_pm.rst.

MAINTAINERS

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4683,7 +4683,6 @@ F: security/bpf/
46834683
BPF [SELFTESTS] (Test Runners & Infrastructure)
46844684
M: Andrii Nakryiko <[email protected]>
46854685
M: Eduard Zingerman <[email protected]>
4686-
R: Mykola Lysenko <[email protected]>
46874686
46884687
S: Maintained
46894688
F: tools/testing/selftests/bpf/
@@ -5259,7 +5258,6 @@ F: drivers/gpio/gpio-bt8xx.c
52595258

52605259
BTRFS FILE SYSTEM
52615260
M: Chris Mason <[email protected]>
5262-
M: Josef Bacik <[email protected]>
52635261
M: David Sterba <[email protected]>
52645262
52655263
S: Maintained
@@ -7822,7 +7820,7 @@ Q: https://patchwork.freedesktop.org/project/nouveau/
78227820
Q: https://gitlab.freedesktop.org/drm/nouveau/-/merge_requests
78237821
B: https://gitlab.freedesktop.org/drm/nouveau/-/issues
78247822
C: irc://irc.oftc.net/nouveau
7825-
T: git https://gitlab.freedesktop.org/drm/nouveau.git
7823+
T: git https://gitlab.freedesktop.org/drm/misc/kernel.git
78267824
F: drivers/gpu/drm/nouveau/
78277825
F: include/uapi/drm/nouveau_drm.h
78287826

@@ -16127,6 +16125,7 @@ M: Andrew Morton <[email protected]>
1612716125
M: Mike Rapoport <[email protected]>
1612816126
1612916127
S: Maintained
16128+
T: git git://git.kernel.org/pub/scm/linux/kernel/git/rppt/memblock.git
1613016129
F: include/linux/numa_memblks.h
1613116130
F: mm/numa.c
1613216131
F: mm/numa_emulation.c
@@ -17479,6 +17478,7 @@ NETFILTER
1747917478
M: Pablo Neira Ayuso <[email protected]>
1748017479
M: Jozsef Kadlecsik <[email protected]>
1748117480
M: Florian Westphal <[email protected]>
17481+
R: Phil Sutter <[email protected]>
1748217482
1748317483
1748417484
S: Maintained

Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
VERSION = 6
33
PATCHLEVEL = 17
44
SUBLEVEL = 0
5-
EXTRAVERSION = -rc4
5+
EXTRAVERSION = -rc5
66
NAME = Baby Opossum Posse
77

88
# *DOCUMENTATION*

0 commit comments

Comments
 (0)