public inbox for stable@vger.kernel.org
 help / color / mirror / Atom feed
* v5.15 backport request
@ 2024-04-11 10:23 Ard Biesheuvel
  2024-04-11 10:30 ` Greg KH
  0 siblings, 1 reply; 11+ messages in thread
From: Ard Biesheuvel @ 2024-04-11 10:23 UTC (permalink / raw)
  To: # 3.4.x

Please consider the commits below for backporting to v5.15. These
patches are prerequisites for the backport of the x86 EFI stub
refactor that is needed for distros to sign v5.15 images for secure
boot in a way that complies with new MS requirements for memory
protections while running in the EFI firmware.

All patches either predate v6.1 or have been backported to it already.
The remaining ~50 changes will be posted as a patch series in due
time, as they will not apply cleanly to v5.15.

Please apply in the order that they appear below.

Thanks,
Ard.


44f155b4b07b8293472c9797d5b39839b91041ca
4da87c51705815fe1fbd41cc61640bb80da5bc54
7c4146e8885512719a50b641e9277a1712e052ff
176db622573f028f85221873ea4577e096785315
950d00558a920227b5703d1fcc4751cfe03853cd
ec1c66af3a30d45c2420da0974c01d3515dba26e
a9ee679b1f8c3803490ed2eeffb688aaee56583f
3ba75c1316390b2bc39c19cb8f0f85922ab3f9ed
82e0d6d76a2a74bd6a31141d555d53b4cc22c2a3
31f1a0edff78c43e8a3bd3692af0db1b25c21b17
9cf42bca30e98a1c6c9e8abf876940a551eaa3d1
cb8bda8ad4438b4bcfcf89697fc84803fb210017
e2ab9eab324cdf240de89741e4a1aa79919f0196
5c3a85f35b583259cf5ca0344cd79c8899ba1bb7
91592b5c0c2f076ff9d8cc0c14aa563448ac9fc4
73a6dec80e2acedaef3ca603d4b5799049f6e9f8
7f22ca396778fea9332d83ec2359dbe8396e9a06
4b52016247aeaa55ca3e3bc2e03cd91114c145c2
630f337f0c4fd80390e8600adcab31550aea33df
db14655ad7854b69a2efda348e30d02dbc19e8a1
bad267f9e18f8e9e628abd1811d2899b1735a4e1
62b71cd73d41ddac6b1760402bbe8c4932e23531
cc3fdda2876e58a7e83e558ab51853cf106afb6a
d2d7a54f69b67cd0a30e0ebb5307cb2de625baac

^ permalink raw reply	[flat|nested] 11+ messages in thread
* v5.15+ backport request
@ 2024-04-16  3:46 dcrady
  2024-04-16  4:37 ` Greg KH
  0 siblings, 1 reply; 11+ messages in thread
From: dcrady @ 2024-04-16  3:46 UTC (permalink / raw)
  To: stable

Please backport the following v6.7 commit:

commit be097997a273 ("KVM: arm64: Always invalidate TLB for stage-2 permission faults")

to stable kernels v5.15 and newer to fix:

It is possible for multiple vCPUs to fault on the same IPA and attempt
to resolve the fault. One of the page table walks will actually update
the PTE and the rest will return -EAGAIN per our race detection scheme.
KVM elides the TLB invalidation on the racing threads as the return
value is nonzero.

Before commit a12ab1378a88 ("KVM: arm64: Use local TLBI on permission
relaxation") KVM always used broadcast TLB invalidations when handling
permission faults, which had the convenient property of making the
stage-2 updates visible to all CPUs in the system. However now we do a
local invalidation, and TLBI elision leads to the vCPU thread faulting
again on the stale entry. Remember that the architecture permits the TLB
to cache translations that precipitate a permission fault.

Invalidate the TLB entry responsible for the permission fault if the
stage-2 descriptor has been relaxed, regardless of which thread actually
did the job.

Thank you!
doug rady


^ permalink raw reply	[flat|nested] 11+ messages in thread
* v5.15+ backport request
@ 2024-04-11  6:43 Ard Biesheuvel
  2024-04-11  6:52 ` Greg KH
  0 siblings, 1 reply; 11+ messages in thread
From: Ard Biesheuvel @ 2024-04-11  6:43 UTC (permalink / raw)
  To: # 3.4.x, Kees Cook

please backport

e7d24c0aa8e678f41
gcc-plugins/stackleak: Avoid .head.text section

to stable kernels v5.15 and newer. This addresses the regression reported here:

https://lkml.kernel.org/r/dc118105-b97c-4e51-9a42-a918fa875967%40hardfalcon.net

On v5.15, there is a dependency that needs to be backported first:

ae978009fc013e3166c9f523f8b17e41a3c0286e
gcc-plugins/stackleak: Ignore .noinstr.text and .entry.text

The particular issue that this patch fixes does not exist [yet] in
v6.1 and v5.15, but I am working on backports that would introduce it.
But even without those backports, this change is important as it
prevents input sections from being instrumented by stackleak that may
not tolerate this for other reasons too.

Thanks,
Ard.

^ permalink raw reply	[flat|nested] 11+ messages in thread

end of thread, other threads:[~2024-04-29 10:50 UTC | newest]

Thread overview: 11+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-04-11 10:23 v5.15 backport request Ard Biesheuvel
2024-04-11 10:30 ` Greg KH
2024-04-11 11:50   ` Greg KH
2024-04-11 13:14     ` Ard Biesheuvel
2024-04-23 17:23       ` Konrad Rzeszutek Wilk
2024-04-29 10:49         ` Greg KH
  -- strict thread matches above, loose matches on Subject: below --
2024-04-16  3:46 v5.15+ " dcrady
2024-04-16  4:37 ` Greg KH
2024-04-18  9:56   ` Greg KH
2024-04-11  6:43 Ard Biesheuvel
2024-04-11  6:52 ` Greg KH

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox