Skip to content

Upstream merge #11

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 1,431 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
1431 commits
Select commit Hold shift + click to select a range
526ebda
UBUNTU: [Config] aws: updateconfigs for EFI_CUSTOM_SSDT_OVERLAYS
ianmay81 Aug 11, 2020
2fdf916
UBUNTU: Ubuntu-aws-5.4.0-1022.22
ianmay81 Aug 11, 2020
0b0a528
UBUNTU: Start new release
ianmay81 Sep 4, 2020
3186950
UBUNTU: link-to-tracker: update tracking bug
ianmay81 Sep 4, 2020
3aab86a
UBUNTU: Ubuntu-aws-5.4.0-1024.24
ianmay81 Sep 4, 2020
94bcdaa
UBUNTU: Start new release
ianmay81 Sep 10, 2020
435d2e1
UBUNTU: link-to-tracker: update tracking bug
ianmay81 Sep 10, 2020
e208f9c
UBUNTU: Ubuntu-aws-5.4.0-1025.25
ianmay81 Sep 10, 2020
85d7c65
UBUNTU: Start new release
Sep 21, 2020
4f53938
UBUNTU: link-to-tracker: update tracking bug
Sep 21, 2020
35ed97c
UBUNTU: aws: [Config] update config for SPI_DYNAMIC
Sep 21, 2020
621d258
UBUNTU: Ubuntu-aws-5.4.0-1026.26
Sep 21, 2020
7dd4f6a
UBUNTU: Start new release
Sep 30, 2020
d21b495
UBUNTU: Ubuntu-aws-5.4.0-1027.28
Sep 30, 2020
415a9cd
UBUNTU: Start new release
ksacilotto Oct 5, 2020
6d851ff
UBUNTU: Ubuntu-aws-5.4.0-1028.29
ksacilotto Oct 5, 2020
e6f9114
UBUNTU: [Config] aws: enable FPGA for amd64 also
kamalmostafa Oct 6, 2020
6115163
UBUNTU: SAUCE: arm64: Enable PCI write-combine resources under sysfs
csbisa Oct 7, 2020
9d81f1d
UBUNTU: Start new release
Oct 20, 2020
23440dc
UBUNTU: link-to-tracker: update tracking bug
Oct 20, 2020
e5d71b6
UBUNTU: [Config] [aws] Disable BlueZ highspeed support
Oct 20, 2020
3e6bb8c
UBUNTU: Ubuntu-aws-5.4.0-1029.30
Oct 20, 2020
50d6561
cpu/hotplug: Add new {add,remove}_cpu() functions
Mar 23, 2020
e98696b
UBUNTU: [Config][aws] update config for NITRO_ENCLAVES
kamalmostafa Nov 5, 2020
3c0b8f9
nitro_enclaves: Add ioctl interface definition
andraprs Sep 21, 2020
64eecd0
nitro_enclaves: Define the PCI device interface
andraprs Sep 21, 2020
c72f809
nitro_enclaves: Define enclave info for internal bookkeeping
andraprs Sep 21, 2020
6674eb8
nitro_enclaves: Init PCI device driver
andraprs Sep 21, 2020
0794a18
nitro_enclaves: Handle PCI device command requests
andraprs Sep 21, 2020
a9e628e
nitro_enclaves: Handle out-of-band PCI device events
andraprs Sep 21, 2020
a45a42d
nitro_enclaves: Init misc device providing the ioctl interface
andraprs Sep 21, 2020
190ce5f
nitro_enclaves: Add logic for creating an enclave VM
andraprs Sep 21, 2020
2080124
nitro_enclaves: Add logic for setting an enclave vCPU
andraprs Sep 21, 2020
f65f160
nitro_enclaves: Add logic for getting the enclave image load info
andraprs Sep 21, 2020
e757d57
nitro_enclaves: Add logic for setting an enclave memory region
andraprs Sep 21, 2020
abd8115
nitro_enclaves: Add logic for starting an enclave
andraprs Sep 21, 2020
ebac4e9
nitro_enclaves: Add logic for terminating an enclave
andraprs Sep 21, 2020
dcffcc3
nitro_enclaves: Add Kconfig for the Nitro Enclaves driver
andraprs Sep 21, 2020
fe177e2
nitro_enclaves: Add Makefile for the Nitro Enclaves driver
andraprs Sep 21, 2020
b963f98
nitro_enclaves: Add sample for ioctl interface usage
andraprs Sep 21, 2020
0add8ef
nitro_enclaves: Add overview documentation
andraprs Sep 21, 2020
8c5d4b3
MAINTAINERS: Add entry for the Nitro Enclaves driver
andraprs Sep 21, 2020
8791576
UBUNTU: SAUCE: [aws] iommu: set the default iommu-dma mode as non-strict
Oct 30, 2020
4eed495
UBUNTU: Start new release
ksacilotto Nov 12, 2020
02e4fe1
UBUNTU: link-to-tracker: update tracking bug
ksacilotto Nov 12, 2020
a34213d
UBUNTU: [Config] [aws] updateconfigs for VGACON_SOFT_SCROLLBACK
ksacilotto Nov 12, 2020
596dcd3
UBUNTU: Ubuntu-aws-5.4.0-1030.31
ksacilotto Nov 12, 2020
281d485
UBUNTU: Start new release
marcelocerri Dec 9, 2020
1303d05
UBUNTU: link-to-tracker: update tracking bug
marcelocerri Dec 9, 2020
3d36bf9
UBUNTU: Ubuntu-aws-5.4.0-1032.33
marcelocerri Dec 9, 2020
aaba317
UBUNTU: Start new release
ksacilotto Dec 14, 2020
b07e2cd
UBUNTU: link-to-tracker: update tracking bug
ksacilotto Dec 14, 2020
022db97
UBUNTU: [Config] aws: update config for DW_APB_TIMER
ksacilotto Dec 14, 2020
48c5bbb
UBUNTU: Ubuntu-aws-5.4.0-1033.34
ksacilotto Dec 14, 2020
d73fe71
UBUNTU: Start new release
kelmously Dec 17, 2020
1f02a6f
UBUNTU: link-to-tracker: update tracking bug
kelmously Dec 17, 2020
85ee10c
UBUNTU: Ubuntu-aws-5.4.0-1034.35
kelmously Dec 17, 2020
743dec0
UBUNTU: Start new release
marcelocerri Jan 6, 2021
a807a69
UBUNTU: Ubuntu-aws-5.4.0-1035.37
marcelocerri Jan 6, 2021
adcc6f1
UBUNTU: SAUCE: xen-netfront: prevent unnecessary close on hibernate
Dec 4, 2020
f9583e9
UBUNTU: [Config] Disable Atari partition support
hrasiq Dec 15, 2020
4b6968b
UBUNTU: Start new release
Jan 14, 2021
5ff3fdf
UBUNTU: link-to-tracker: update tracking bug
Jan 14, 2021
a08796a
UBUNTU: Ubuntu-aws-5.4.0-1037.39
Jan 14, 2021
3b21cd1
UBUNTU: aws: [Config] disable CONFIG_BT
kamalmostafa Jan 26, 2021
e58101d
UBUNTU: Start new release
Feb 5, 2021
4d409a0
UBUNTU: aws: [Config] remove disabled BT modules
kamalmostafa Feb 3, 2021
f69b826
UBUNTU: link-to-tracker: update tracking bug
Feb 5, 2021
a6fa2bb
UBUNTU: [Config] aws: updateconfigs for INFINIBAND_VIRT_DMA
Feb 5, 2021
05a6d86
UBUNTU: [Config] aws: updateconfigs for PGTABLE_MAPPING
Feb 5, 2021
e845039
UBUNTU: [Config] aws: updateconfigs for USB_SISUSBVGA_CON
Feb 5, 2021
d2bdb7a
UBUNTU: Ubuntu-aws-5.4.0-1038.40
Feb 5, 2021
180b85f
UBUNTU: Start new release
ianmay81 Feb 24, 2021
61df050
UBUNTU: link-to-tracker: update tracking bug
ianmay81 Feb 24, 2021
b8b1329
UBUNTU: aws: [Config] enable CONFIG_MODVERSIONS=y
ianmay81 Feb 24, 2021
2b873df
UBUNTU: aws: [Packaging] build canonical-certs.pem from branch/arch c…
ianmay81 Feb 24, 2021
9e77594
UBUNTU: aws: [Config] Allow ASM_MODVERSIONS
ianmay81 Feb 24, 2021
0d14932
UBUNTU: aws: [Config] updateconfigs for USB_BDC_PCI
ianmay81 Feb 24, 2021
24041e0
UBUNTU: Ubuntu-aws-5.4.0-1039.41
ianmay81 Feb 24, 2021
d369a31
UBUNTU: Start new release
ksacilotto Mar 17, 2021
711e1d9
UBUNTU: Ubuntu-aws-5.4.0-1040.42
ksacilotto Mar 17, 2021
b544245
UBUNTU: Start new release
ianmay81 Mar 19, 2021
f56c828
UBUNTU: Ubuntu-aws-5.4.0-1041.43
ianmay81 Mar 19, 2021
359c38d
Revert "UBUNTU: SAUCE: [aws] PM / hibernate: Speed up hibernation by …
Jan 23, 2021
052cee7
PM: hibernate: Batch hibernate and resume IO requests
cxiaoyi Sep 22, 2020
3466465
Revert "UBUNTU: SAUCE: xen-netfront: prevent unnecessary close on hib…
Jan 14, 2021
6570a9b
Revert "UBUNTU: SAUCE: xen: Update sched clock offset to avoid system…
Jan 14, 2021
f0b4d65
Revert "UBUNTU: SAUCE: xen: Introduce wrapper for save/restore sched …
Jan 14, 2021
c083232
Revert "UBUNTU: SAUCE: x86/xen: save and restore steal clock"
Jan 14, 2021
f134f7d
Revert "UBUNTU: SAUCE: xen/time: introduce xen_{save,restore}_steal_c…
Jan 14, 2021
30d6ece
Revert "UBUNTU: SAUCE: xen-netfront: add callbacks for PM suspend and…
Jan 14, 2021
71aa7a5
Revert "UBUNTU: SAUCE: xen-blkfront: add callbacks for PM suspend and…
Jan 14, 2021
091dd6d
Revert "UBUNTU: SAUCE: genirq: Shutdown irq chips in suspend/resume d…
Jan 14, 2021
15d7091
Revert "UBUNTU: SAUCE: x86/xen: add system core suspend and resume ca…
Jan 14, 2021
6cf9ba0
Revert "UBUNTU: SAUCE: x86/xen: Introduce new function to map HYPERVI…
Jan 14, 2021
66e26c2
Revert "UBUNTU: SAUCE: xenbus: add freeze/thaw/restore callbacks supp…
Jan 14, 2021
60ab2ee
Revert "UBUNTU: SAUCE: xen/manage: keep track of the on-going suspend…
Jan 14, 2021
5ce82ef
UBUNTU: SAUCE: xen/manage: keep track of the on-going suspend mode
kamatam9 Jul 12, 2017
a27a085
UBUNTU: SAUCE: xen/manage: introduce helper function to know the on-g…
kamatam9 Jul 13, 2017
13b5e3a
UBUNTU: SAUCE: xenbus: add freeze/thaw/restore callbacks support
kamatam9 Jul 13, 2017
4f11a99
UBUNTU: SAUCE: x86/xen: Introduce new function to map HYPERVISOR_shar…
anchalag Feb 22, 2018
1bce637
UBUNTU: SAUCE: x86/xen: add system core suspend and resume callbacks
kamatam9 Feb 11, 2017
0bf527f
UBUNTU: SAUCE: xen-blkfront: add callbacks for PM suspend and hiberna…
kamatam9 Jun 8, 2017
b089b95
UBUNTU: SAUCE: xen-netfront: add callbacks for PM suspend and hiberna…
kamatam9 Jan 9, 2017
3902f0a
UBUNTU: SAUCE: xen/time: introduce xen_{save,restore}_steal_clock
kamatam9 Jul 13, 2017
5b9647e
UBUNTU: SAUCE: x86/xen: save and restore steal clock
kamatam9 Jul 21, 2017
a819a0a
UBUNTU: SAUCE: xen/events: add xen_shutdown_pirqs helper function
kamatam9 Aug 24, 2017
8fac949
UBUNTU: SAUCE: x86/xen: close event channels for PIRQs in system core…
kamatam9 Aug 24, 2017
91fe6cd
UBUNTU: SAUCE: xen-blkfront: add 'persistent_grants' parameter
Apr 26, 2016
4115938
UBUNTU: SAUCE: Revert "xen: dont fiddle with event channel masking in…
anchalag Mar 27, 2018
eea104b
UBUNTU: SAUCE: xen-blkfront: Fixed blkfront_restore to remove a call …
anchalag Jun 5, 2018
059ce46
UBUNTU: SAUCE: block: xen-blkfront: consider new dom0 features on res…
Oct 18, 2018
1a07a96
UBUNTU: SAUCE: xen: restore pirqs on resume from hibernation.
fllinden Oct 26, 2018
27d13dc
UBUNTU: SAUCE: xen: Only restore the ACPI SCI interrupt in xen_restor…
fllinden Nov 10, 2018
74dab7d
UBUNTU: SAUCE: xen-netfront: call netif_device_attach on resume
fllinden Jan 31, 2019
876a058
UBUNTU: SAUCE: xen: Restore xen-pirqs on resume from hibernation
anchalag Aug 15, 2019
0278f8d
UBUNTU: SAUCE: block/xen-blkfront: bump the maximum number of indirec…
fllinden Nov 27, 2019
787c539
UBUNTU: SAUCE: x86: tsc: avoid system instability in hibernation
Apr 9, 2018
eb0d246
UBUNTU: SAUCE: ACPICA: Enable sleep button on ACPI legacy wake
anchalag Oct 29, 2018
d0db6d5
UBUNTU: SAUCE: xen-netfront: prevent unnecessary close on hibernate
Dec 4, 2020
a325143
UBUNTU: SAUCE: aws: kvm: double the size of hv_clock_boot
Mar 11, 2021
bd9059a
UBUNTU: Start new release
rtg-canonical Mar 26, 2021
61ae188
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Mar 26, 2021
d654718
UBUNTU: [Config] aws: Enforce CONFIG_DRM_BOCHS=m
rtg-canonical Mar 26, 2021
0adfade
UBUNTU: Ubuntu-aws-5.4.0-1042.44
rtg-canonical Mar 26, 2021
da7a118
UBUNTU: Start new release
rtg-canonical Apr 9, 2021
ad632a6
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Apr 9, 2021
670f30d
UBUNTU: Ubuntu-aws-5.4.0-1043.45
rtg-canonical Apr 9, 2021
5ae2c12
UBUNTU: Start new release
ianmay81 Apr 13, 2021
9ecad28
UBUNTU: Ubuntu-aws-5.4.0-1045.47
ianmay81 Apr 13, 2021
57bb8f1
UBUNTU: Start new release
Apr 28, 2021
dbe9275
UBUNTU: link-to-tracker: update tracking bug
Apr 28, 2021
765e6be
UBUNTU: Ubuntu-aws-5.4.0-1047.49
Apr 28, 2021
c028341
UBUNTU: Start new release
rtg-canonical May 3, 2021
42ea029
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical May 3, 2021
de780ae
UBUNTU: [Config] aws: fix various annotations syntax errors
rtg-canonical May 3, 2021
8dcfd1d
UBUNTU: [Config] aws: update abi for rc-cec
rtg-canonical May 3, 2021
a9af24e
UBUNTU: Ubuntu-aws-5.4.0-1048.50
rtg-canonical May 3, 2021
630bdcf
random: add GRND_INSECURE to return best-effort non-cryptographic bytes
amluto May 7, 2021
6cdc1de
random: Don't wake crng_init_wait when crng_init == 1
amluto May 7, 2021
8735908
random: Add a urandom_read_nowait() for random APIs that don't warn
amluto May 7, 2021
0c1fea0
random: ignore GRND_RANDOM in getentropy(2)
amluto May 7, 2021
d06453e
random: make /dev/random be almost like /dev/urandom
amluto May 7, 2021
c9fbd48
UBUNTU: Start new release
rtg-canonical May 11, 2021
5511b1d
UBUNTU: [Packaging] aws: Disable nvidia builds
rtg-canonical May 11, 2021
0a02425
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical May 11, 2021
17cbc5c
UBUNTU: [Config] aws: Update annotations to include missing options
rtg-canonical May 11, 2021
0d9c8da
UBUNTU: Ubuntu-aws-5.4.0-1049.51
rtg-canonical May 11, 2021
d39b253
Revert "UBUNTU: SAUCE: aws: kvm: double the size of hv_clock_boot"
May 19, 2021
8b8f6c0
UBUNTU: [Packaging] update variants
ianmay81 Jun 11, 2021
a8a3683
UBUNTU: Start new release
ianmay81 Jun 11, 2021
4944d58
UBUNTU: link-to-tracker: update tracking bug
ianmay81 Jun 11, 2021
4114d65
UBUNTU: Ubuntu-aws-5.4.0-1050.52
ianmay81 Jun 11, 2021
cea2fd7
UBUNTU: Start new release
smb49 Jun 17, 2021
cf11749
UBUNTU: Ubuntu-aws-5.4.0-1051.53
smb49 Jun 17, 2021
9f0a310
UBUNTU: Start new release
rtg-canonical Jun 23, 2021
f5ad150
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Jun 23, 2021
ec532b4
UBUNTU: Ubuntu-aws-5.4.0-1052.54
rtg-canonical Jun 23, 2021
35db5ce
UBUNTU: Start new release
smb49 Jul 2, 2021
2ced1fe
UBUNTU: link-to-tracker: update tracking bug
smb49 Jul 2, 2021
b798675
UBUNTU: Ubuntu-aws-5.4.0-1053.55
smb49 Jul 2, 2021
445c17b
UBUNTU: Start new release
Jul 14, 2021
9631dc4
UBUNTU: Ubuntu-aws-5.4.0-1054.57
Jul 14, 2021
0c1aa35
UBUNTU: [Config] aws: CONFIG_MEDIA_CAMERA_SUPPORT=y
rtg-canonical Jul 8, 2021
ee381cd
UBUNTU: Start new release
rtg-canonical Jul 23, 2021
62bfbf7
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Jul 23, 2021
dab4906
UBUNTU: Ubuntu-aws-5.4.0-1055.58
rtg-canonical Jul 23, 2021
026ef17
UBUNTU: Start new release
rtg-canonical Aug 20, 2021
c17faf2
UBUNTU: [Config] aws: enable CONFIG_SYSTEM_REVOCATION_LIST
rtg-canonical Aug 20, 2021
d3f475c
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Aug 20, 2021
60eb2e7
UBUNTU: Ubuntu-aws-5.4.0-1056.59
rtg-canonical Aug 20, 2021
13d77ca
UBUNTU: Start new release
rtg-canonical Sep 7, 2021
8475d63
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Sep 7, 2021
476510e
UBUNTU: Ubuntu-aws-5.4.0-1057.60
rtg-canonical Sep 7, 2021
0cf4cf0
UBUNTU: [Packaging] aws: Support building libperf-jvmti.so
rtg-canonical Sep 24, 2021
ab1caba
UBUNTU: Start new release
rtg-canonical Sep 28, 2021
ab8708a
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Sep 28, 2021
c111567
UBUNTU: Ubuntu-aws-5.4.0-1058.61
rtg-canonical Sep 28, 2021
463f1c8
UBUNTU: [Packaging] update Ubuntu.md
rtg-canonical Oct 21, 2021
0212df1
UBUNTU: Start new release
rtg-canonical Oct 21, 2021
2070977
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Oct 21, 2021
d31a65a
UBUNTU: Ubuntu-aws-5.4.0-1059.62
rtg-canonical Oct 21, 2021
39fbd3e
UBUNTU: Start new release
rtg-canonical Nov 12, 2021
13f2a39
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Nov 12, 2021
90b061b
UBUNTU: Ubuntu-aws-5.4.0-1060.63
rtg-canonical Nov 12, 2021
9c49232
UBUNTU: [Packaging] aws: Enable signed kernel
rtg-canonical Nov 15, 2021
dfbbf21
UBUNTU: [Config] aws: Configure CONFIG_SYSTEM_REVOCATION_KEYS with re…
rtg-canonical Dec 2, 2021
3a74af2
UBUNTU: Start new release
rtg-canonical Dec 2, 2021
6f818bd
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Dec 2, 2021
cdc0582
UBUNTU: [Config] aws: Enable CONFIG_DEBUG_INFO_BTF on all arches
rtg-canonical Dec 2, 2021
dd3012f
UBUNTU: Ubuntu-aws-5.4.0-1061.64
rtg-canonical Dec 2, 2021
15b7e3c
UBUNTU: Start new release
smb49 Jan 12, 2022
e9334c6
UBUNTU: Ubuntu-aws-5.4.0-1063.66
smb49 Jan 12, 2022
3787092
UBUNTU: Start new release
ksacilotto Jan 17, 2022
4ea43be
nitro_enclaves: Fixup type and simplify logic of the poll mask setup
andraprs Nov 2, 2020
2162dc0
nitro_enclaves: Fix stale file descriptors on failed usercopy
minipli-oss Apr 29, 2021
ffd33ae
nitro_enclaves: Set Bus Master for the NE PCI device
Jun 21, 2021
81fb1e5
nitro_enclaves: Enable Arm64 support
andraprs Aug 27, 2021
ce4da52
nitro_enclaves: Update documentation for Arm64 support
andraprs Aug 27, 2021
9c444c0
nitro_enclaves: Add fix for the kernel-doc report
andraprs Aug 27, 2021
0a1ec83
nitro_enclaves: Update copyright statement to include 2021
andraprs Aug 27, 2021
64bef15
nitro_enclaves: Add fixes for checkpatch match open parenthesis reports
andraprs Aug 27, 2021
4361386
nitro_enclaves: Add fixes for checkpatch spell check reports
andraprs Aug 27, 2021
abc01fc
nitro_enclaves: Add fixes for checkpatch blank line reports
andraprs Aug 27, 2021
edd7624
UBUNTU: link-to-tracker: update tracking bug
ksacilotto Jan 17, 2022
998bad0
UBUNTU: Ubuntu-aws-5.4.0-1064.67
ksacilotto Jan 17, 2022
9e28af4
UBUNTU: Start new release
rtg-canonical Feb 3, 2022
80fd718
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Feb 3, 2022
25cc319
UBUNTU: Ubuntu-aws-5.4.0-1065.68
rtg-canonical Feb 3, 2022
8c8318f
UBUNTU: Start new release
rtg-canonical Feb 9, 2022
7fd737d
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Feb 9, 2022
0ef9cc5
UBUNTU: [Packaging] aws: Include tcm_loop.ko
rtg-canonical Feb 1, 2022
1f382a3
UBUNTU: Ubuntu-aws-5.4.0-1066.69
rtg-canonical Feb 9, 2022
aa9e314
UBUNTU: Start new release
Mar 2, 2022
4562cec
UBUNTU: [Config] update configs and annotations with security options
Mar 2, 2022
5a65885
UBUNTU: SAUCE: arm64: fix build error in cpu_errata
Mar 2, 2022
4fa3682
UBUNTU: Ubuntu-aws-5.4.0-1068.72
Mar 2, 2022
2a75d51
UBUNTU: Start new release
rtg-canonical Mar 14, 2022
0d557e1
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Mar 14, 2022
a1f1d3f
UBUNTU: [Config]: aws: Update gcc version to 90400
rtg-canonical Mar 14, 2022
54e33d1
UBUNTU: Ubuntu-aws-5.4.0-1069.73
rtg-canonical Mar 14, 2022
656e5ca
UBUNTU: Start new release
rtg-canonical Mar 28, 2022
4dd7183
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Mar 28, 2022
e7e1faa
PM: hibernate: Allow ACPI hardware signature to be honoured
dwmw2 Mar 19, 2022
fab5c21
PM: hibernate: Honour ACPI hardware signature by default for virtual …
dwmw2 Mar 19, 2022
62c16c1
UBUNTU: Ubuntu-aws-5.4.0-1071.76
rtg-canonical Mar 28, 2022
f4bc181
UBUNTU: Start new release
rtg-canonical Apr 7, 2022
5a976cc
UBUNTU: debian/dkms-versions -- update from kernel-versions (main/202…
rtg-canonical Apr 7, 2022
773479e
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Apr 7, 2022
7a0f347
UBUNTU: Ubuntu-aws-5.4.0-1072.77
rtg-canonical Apr 7, 2022
f4810f3
UBUNTU: Start new release
rtg-canonical Apr 25, 2022
ecd2416
UBUNTU: debian/dkms-versions -- update from kernel-versions (main/202…
rtg-canonical Apr 25, 2022
dd8f7d8
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical Apr 25, 2022
81c0f1d
UBUNTU: Ubuntu-aws-5.4.0-1073.78
rtg-canonical Apr 25, 2022
a4902e6
UBUNTU: Start new release
rtg-canonical May 19, 2022
0179232
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical May 19, 2022
d5c9ac3
UBUNTU: Ubuntu-aws-5.4.0-1075.80
rtg-canonical May 19, 2022
016c65c
UBUNTU: [Config] aws: CONFIG_HISI_PMU=m
rtg-canonical May 11, 2022
4edf697
UBUNTU: Start new release
rtg-canonical May 26, 2022
27bd054
UBUNTU: link-to-tracker: update tracking bug
rtg-canonical May 26, 2022
da1bde9
UBUNTU: Ubuntu-aws-5.4.0-1076.81
rtg-canonical May 26, 2022
5244411
UBUNTU: Start new release
Jun 2, 2022
5d08e70
UBUNTU: Ubuntu-aws-5.4.0-1078.84
Jun 2, 2022
f96dc8e
UBUNTU: Start new release
Jun 10, 2022
2e34777
UBUNTU: Ubuntu-aws-5.4.0-1080.87
Jun 10, 2022
cdc2e93
@@DELPHIX_PATCHSET_START@@
Apr 1, 2021
210998d
DLPX-71852 iSCSI: journal flooded with "Unable to locate Target IQN" …
pzakha Feb 9, 2021
fd247ad
DLPX-74216 nfs-server restarts fail when order-5 allocations are exha…
Feb 26, 2021
3a49482
DLPX-72065 Aborted iSCSI command never completes after LUN reset (#4)
pzakha Mar 8, 2021
db45efc
DLPX-75524 avoid unnecessary nfserr_jukebox returns from nfsd_file_ac…
May 11, 2021
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
1 change: 1 addition & 0 deletions Documentation/ABI/testing/sysfs-devices-system-cpu
Original file line number Diff line number Diff line change
Expand Up @@ -489,6 +489,7 @@ What: /sys/devices/system/cpu/vulnerabilities
/sys/devices/system/cpu/vulnerabilities/srbds
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort
/sys/devices/system/cpu/vulnerabilities/itlb_multihit
/sys/devices/system/cpu/vulnerabilities/mmio_stale_data
Date: January 2018
Contact: Linux kernel mailing list <[email protected]>
Description: Information about CPU vulnerabilities
Expand Down
10 changes: 10 additions & 0 deletions Documentation/DMA-attributes.txt
Original file line number Diff line number Diff line change
Expand Up @@ -138,3 +138,13 @@ accesses to DMA buffers in both privileged "supervisor" and unprivileged
subsystem that the buffer is fully accessible at the elevated privilege
level (and ideally inaccessible or at least read-only at the
lesser-privileged levels).

DMA_ATTR_PRIVILEGED
-------------------

Some advanced peripherals such as remote processors and GPUs perform
accesses to DMA buffers in both privileged "supervisor" and unprivileged
"user" modes. This attribute is used to indicate to the DMA-mapping
subsystem that the buffer is fully accessible at the elevated privilege
level (and ideally inaccessible or at least read-only at the
lesser-privileged levels).
1 change: 1 addition & 0 deletions Documentation/admin-guide/hw-vuln/index.rst
Original file line number Diff line number Diff line change
Expand Up @@ -15,3 +15,4 @@ are configurable at compile, boot or run time.
tsx_async_abort
multihit.rst
special-register-buffer-data-sampling.rst
processor_mmio_stale_data.rst
246 changes: 246 additions & 0 deletions Documentation/admin-guide/hw-vuln/processor_mmio_stale_data.rst
Original file line number Diff line number Diff line change
@@ -0,0 +1,246 @@
=========================================
Processor MMIO Stale Data Vulnerabilities
=========================================

Processor MMIO Stale Data Vulnerabilities are a class of memory-mapped I/O
(MMIO) vulnerabilities that can expose data. The sequences of operations for
exposing data range from simple to very complex. Because most of the
vulnerabilities require the attacker to have access to MMIO, many environments
are not affected. System environments using virtualization where MMIO access is
provided to untrusted guests may need mitigation. These vulnerabilities are
not transient execution attacks. However, these vulnerabilities may propagate
stale data into core fill buffers where the data can subsequently be inferred
by an unmitigated transient execution attack. Mitigation for these
vulnerabilities includes a combination of microcode update and software
changes, depending on the platform and usage model. Some of these mitigations
are similar to those used to mitigate Microarchitectural Data Sampling (MDS) or
those used to mitigate Special Register Buffer Data Sampling (SRBDS).

Data Propagators
================
Propagators are operations that result in stale data being copied or moved from
one microarchitectural buffer or register to another. Processor MMIO Stale Data
Vulnerabilities are operations that may result in stale data being directly
read into an architectural, software-visible state or sampled from a buffer or
register.

Fill Buffer Stale Data Propagator (FBSDP)
-----------------------------------------
Stale data may propagate from fill buffers (FB) into the non-coherent portion
of the uncore on some non-coherent writes. Fill buffer propagation by itself
does not make stale data architecturally visible. Stale data must be propagated
to a location where it is subject to reading or sampling.

Sideband Stale Data Propagator (SSDP)
-------------------------------------
The sideband stale data propagator (SSDP) is limited to the client (including
Intel Xeon server E3) uncore implementation. The sideband response buffer is
shared by all client cores. For non-coherent reads that go to sideband
destinations, the uncore logic returns 64 bytes of data to the core, including
both requested data and unrequested stale data, from a transaction buffer and
the sideband response buffer. As a result, stale data from the sideband
response and transaction buffers may now reside in a core fill buffer.

Primary Stale Data Propagator (PSDP)
------------------------------------
The primary stale data propagator (PSDP) is limited to the client (including
Intel Xeon server E3) uncore implementation. Similar to the sideband response
buffer, the primary response buffer is shared by all client cores. For some
processors, MMIO primary reads will return 64 bytes of data to the core fill
buffer including both requested data and unrequested stale data. This is
similar to the sideband stale data propagator.

Vulnerabilities
===============
Device Register Partial Write (DRPW) (CVE-2022-21166)
-----------------------------------------------------
Some endpoint MMIO registers incorrectly handle writes that are smaller than
the register size. Instead of aborting the write or only copying the correct
subset of bytes (for example, 2 bytes for a 2-byte write), more bytes than
specified by the write transaction may be written to the register. On
processors affected by FBSDP, this may expose stale data from the fill buffers
of the core that created the write transaction.

Shared Buffers Data Sampling (SBDS) (CVE-2022-21125)
----------------------------------------------------
After propagators may have moved data around the uncore and copied stale data
into client core fill buffers, processors affected by MFBDS can leak data from
the fill buffer. It is limited to the client (including Intel Xeon server E3)
uncore implementation.

Shared Buffers Data Read (SBDR) (CVE-2022-21123)
------------------------------------------------
It is similar to Shared Buffer Data Sampling (SBDS) except that the data is
directly read into the architectural software-visible state. It is limited to
the client (including Intel Xeon server E3) uncore implementation.

Affected Processors
===================
Not all the CPUs are affected by all the variants. For instance, most
processors for the server market (excluding Intel Xeon E3 processors) are
impacted by only Device Register Partial Write (DRPW).

Below is the list of affected Intel processors [#f1]_:

=================== ============ =========
Common name Family_Model Steppings
=================== ============ =========
HASWELL_X 06_3FH 2,4
SKYLAKE_L 06_4EH 3
BROADWELL_X 06_4FH All
SKYLAKE_X 06_55H 3,4,6,7,11
BROADWELL_D 06_56H 3,4,5
SKYLAKE 06_5EH 3
ICELAKE_X 06_6AH 4,5,6
ICELAKE_D 06_6CH 1
ICELAKE_L 06_7EH 5
ATOM_TREMONT_D 06_86H All
LAKEFIELD 06_8AH 1
KABYLAKE_L 06_8EH 9 to 12
ATOM_TREMONT 06_96H 1
ATOM_TREMONT_L 06_9CH 0
KABYLAKE 06_9EH 9 to 13
COMETLAKE 06_A5H 2,3,5
COMETLAKE_L 06_A6H 0,1
ROCKETLAKE 06_A7H 1
=================== ============ =========

If a CPU is in the affected processor list, but not affected by a variant, it
is indicated by new bits in MSR IA32_ARCH_CAPABILITIES. As described in a later
section, mitigation largely remains the same for all the variants, i.e. to
clear the CPU fill buffers via VERW instruction.

New bits in MSRs
================
Newer processors and microcode update on existing affected processors added new
bits to IA32_ARCH_CAPABILITIES MSR. These bits can be used to enumerate
specific variants of Processor MMIO Stale Data vulnerabilities and mitigation
capability.

MSR IA32_ARCH_CAPABILITIES
--------------------------
Bit 13 - SBDR_SSDP_NO - When set, processor is not affected by either the
Shared Buffers Data Read (SBDR) vulnerability or the sideband stale
data propagator (SSDP).
Bit 14 - FBSDP_NO - When set, processor is not affected by the Fill Buffer
Stale Data Propagator (FBSDP).
Bit 15 - PSDP_NO - When set, processor is not affected by Primary Stale Data
Propagator (PSDP).
Bit 17 - FB_CLEAR - When set, VERW instruction will overwrite CPU fill buffer
values as part of MD_CLEAR operations. Processors that do not
enumerate MDS_NO (meaning they are affected by MDS) but that do
enumerate support for both L1D_FLUSH and MD_CLEAR implicitly enumerate
FB_CLEAR as part of their MD_CLEAR support.
Bit 18 - FB_CLEAR_CTRL - Processor supports read and write to MSR
IA32_MCU_OPT_CTRL[FB_CLEAR_DIS]. On such processors, the FB_CLEAR_DIS
bit can be set to cause the VERW instruction to not perform the
FB_CLEAR action. Not all processors that support FB_CLEAR will support
FB_CLEAR_CTRL.

MSR IA32_MCU_OPT_CTRL
---------------------
Bit 3 - FB_CLEAR_DIS - When set, VERW instruction does not perform the FB_CLEAR
action. This may be useful to reduce the performance impact of FB_CLEAR in
cases where system software deems it warranted (for example, when performance
is more critical, or the untrusted software has no MMIO access). Note that
FB_CLEAR_DIS has no impact on enumeration (for example, it does not change
FB_CLEAR or MD_CLEAR enumeration) and it may not be supported on all processors
that enumerate FB_CLEAR.

Mitigation
==========
Like MDS, all variants of Processor MMIO Stale Data vulnerabilities have the
same mitigation strategy to force the CPU to clear the affected buffers before
an attacker can extract the secrets.

This is achieved by using the otherwise unused and obsolete VERW instruction in
combination with a microcode update. The microcode clears the affected CPU
buffers when the VERW instruction is executed.

Kernel reuses the MDS function to invoke the buffer clearing:

mds_clear_cpu_buffers()

On MDS affected CPUs, the kernel already invokes CPU buffer clear on
kernel/userspace, hypervisor/guest and C-state (idle) transitions. No
additional mitigation is needed on such CPUs.

For CPUs not affected by MDS or TAA, mitigation is needed only for the attacker
with MMIO capability. Therefore, VERW is not required for kernel/userspace. For
virtualization case, VERW is only needed at VMENTER for a guest with MMIO
capability.

Mitigation points
-----------------
Return to user space
^^^^^^^^^^^^^^^^^^^^
Same mitigation as MDS when affected by MDS/TAA, otherwise no mitigation
needed.

C-State transition
^^^^^^^^^^^^^^^^^^
Control register writes by CPU during C-state transition can propagate data
from fill buffer to uncore buffers. Execute VERW before C-state transition to
clear CPU fill buffers.

Guest entry point
^^^^^^^^^^^^^^^^^
Same mitigation as MDS when processor is also affected by MDS/TAA, otherwise
execute VERW at VMENTER only for MMIO capable guests. On CPUs not affected by
MDS/TAA, guest without MMIO access cannot extract secrets using Processor MMIO
Stale Data vulnerabilities, so there is no need to execute VERW for such guests.

Mitigation control on the kernel command line
---------------------------------------------
The kernel command line allows to control the Processor MMIO Stale Data
mitigations at boot time with the option "mmio_stale_data=". The valid
arguments for this option are:

========== =================================================================
full If the CPU is vulnerable, enable mitigation; CPU buffer clearing
on exit to userspace and when entering a VM. Idle transitions are
protected as well. It does not automatically disable SMT.
full,nosmt Same as full, with SMT disabled on vulnerable CPUs. This is the
complete mitigation.
off Disables mitigation completely.
========== =================================================================

If the CPU is affected and mmio_stale_data=off is not supplied on the kernel
command line, then the kernel selects the appropriate mitigation.

Mitigation status information
-----------------------------
The Linux kernel provides a sysfs interface to enumerate the current
vulnerability status of the system: whether the system is vulnerable, and
which mitigations are active. The relevant sysfs file is:

/sys/devices/system/cpu/vulnerabilities/mmio_stale_data

The possible values in this file are:

.. list-table::

* - 'Not affected'
- The processor is not vulnerable
* - 'Vulnerable'
- The processor is vulnerable, but no mitigation enabled
* - 'Vulnerable: Clear CPU buffers attempted, no microcode'
- The processor is vulnerable, but microcode is not updated. The
mitigation is enabled on a best effort basis.
* - 'Mitigation: Clear CPU buffers'
- The processor is vulnerable and the CPU buffer clearing mitigation is
enabled.

If the processor is vulnerable then the following information is appended to
the above information:

======================== ===========================================
'SMT vulnerable' SMT is enabled
'SMT disabled' SMT is disabled
'SMT Host state unknown' Kernel runs in a VM, Host SMT state unknown
======================== ===========================================

References
----------
.. [#f1] Affected Processors
https://www.intel.com/content/www/us/en/developer/topic-technology/software-security-guidance/processors-affected-consolidated-product-cpu-model.html
Loading