6.2 Merge window, part 1
The most significant changes merged for 6.2 so far include:
Architecture-specific
- The arm64 architecture can now enable or disable software-implemented shadow stacks at boot time; this is done by patching in the relevant instructions where necessary. This change allows a single kernel to work efficiently on systems both with pointer authentication (where shadow stacks don't really add much) and without.
- The Intel "asynchronous exit notification" mechanism is now supported; this allows code in SGX enclaves to detect single-step attacks.
- There is a new set of operations allowing a hypervisor to support requests from Intel TDX guests; this documentation commit has some more information.
- There is a new sysctl knob to control how x86 systems respond to processes executing split locks; see this commit for an overview and this article for the background.
BPF
- BPF programs have increased access to control-group local storage; see this documentation commit for details.
- BPF programs can now define types, allocate objects, and create their own data structures; this merge message gives an overview.
- It is now possible for BPF code to access and store task_struct objects; see this commit for an overview.
Core kernel
- It is now possible to move a process into a new time namespace when it calls exec(). Among other things, this allows a process to execute the vfork()+exec() sequence after unsharing its time namespace, which does not work in current kernels.
- More Rust infrastructure code has been merged; see this article for details.
Filesystems and block I/O
- Squashfs filesystems can now be mounted with the threads= option to control how parallel decompression is done; see this commit for details.
- Squashfs can also now handle ID-mapped mounts.
- The kernel's handling of POSIX access-control lists has been massively reworked. There should be no user-visible changes. This merge commit contains a detailed overview of what was done.
- The fscrypt mechanism can now make use of the SM4 encryption algorithm though, as detailed in this merge message, the fscrypt maintainer recommends against its use.
- The reliability of the much-maligned Btrfs RAID5 and RAID6 implementation has been improved; this merge message describes the changes that were made. There have also been more performance improvements merged for Btrfs.
- The kernel can now be built without NFSv2 support; this is the next step toward removing that support entirely.
- Permissions checks for access to NVMe devices have changed; operations that read or write a given device will now succeed if the writing process has the appropriate access in the permission bits on the device special file. Previously, CAP_SYS_ADMIN was required for such operations.
- The packet CD/DVD driver, deprecated in 2016, has finally been removed.
Hardware support
- Clock: MStar CPUPLL clocks, Ingenic JZ4755 CGU clocks, MediaTek FHCTL hardware controller clocks, Qualcomm SC8280XP and SM6375 display clock controllers, and Qualcomm SM8550 global clock controllers.
- GPIO and pin control: Qualcomm SDM670 pin controllers, Loongson-2 SoC pin controllers, and Intel Moorefield pin controllers.
- Graphics: Open Firmware display controllers, Renesas RZ/G2L MIPI DSI encoders, Jadard JD9365DA-H3 WXGA DSI panels, and NewVision NV3051D DSI panels.
- Hardware monitoring: Ampere Altra SMpro hardware monitors and OneXPlayer EC fan controllers.
- Input: Hynitron cst3xx touchscreens, Cypress TrueTouch Gen5 touchscreens, and Himax hx83112b touchscreens.
- Media: OmniVision OV08X40 and OV4689 sensors, STmicroelectronics VGXY61 sensors, Toshiba TC358746 parallel-CSI2 bridges, Allwinner A31 image signal processors, Microchip image sensor controllers, Renesas RZ/G2L MIPI CSI-2 receivers, and Renesas RZ/G2L camera data receiving units.
- Miscellaneous: ARM CoreSight performance monitoring units, Amlogic DDR bandwidth performance monitors, Loongson-2 SoC global utilities register blocks, Dell WMI-based platform sensors, ChromeOS human-presence sensors, Apple CPU-frequency controllers, ARM SCMI powercap controllers, Richtek RT6190 4-Switch BuckBoost controllers, MediaTek MT6357 power-management ICs, and Sunplus SP7021 MMC controllers.
- Networking: Realtek 8852BE PCI wireless network adapters, Motorcomm yt8521 gigabit Ethernet PHYs, Renesas R-Car S4-8 Ethernet switches, MediaTek MT7996 wireless interfaces, NVIDIA Tegra multi-gigabit Ethernet controllers, Realtek 8821CU, 8822BU, 8822CU and 8723DU USB wireless network adapters, and Broadcom BCM4377/4378/4387 Bluetooth interfaces.
- Sound: Realtek RT1318 codecs.
- SPI: Microchip pci1xxxx PCIe switches, Socionext F_OSPI SPI flash controllers, and Nuvoton WPCM450 flash interface units.
- Also: the kernel has a new framework for the management of compute-acceleration devices. There are no actual devices using that framework in 6.2; that may change for 6.3. Meanwhile, this documentation commit gives an overview of the new subsystem.
Miscellaneous
- The new rv tool can be used to control the operation of the runtime verification subsystem. See this documentation commit for details.
- The HTML version of the kernel documentation is now built with the Sphinx "alabaster" theme by default.
Networking
- The IPv6 stack has gained support for "protective load balancing", described as:
PLB (Protective Load Balancing) is a host based mechanism for load balancing across switch links. It leverages congestion signals(e.g. ECN) from transport layer to randomly change the path of the connection experiencing congestion.
This paper has more details.
Security-related
- The RANDOM_TRUST_BOOTLOADER and RANDOM_TRUST_CPU configuration options have been removed; the only way to set those parameters now is with a command-line option. See this commit for more information.
- The Landlock security module can now control file truncation operations. This documentation commit has some more information.
Internal kernel changes
- The read-copy-update (RCU) subsystem has a new "lazy" mode (controlled by the RCU_LAZY configuration option). When this mode is active, the handling of RCU callbacks will be delayed so that those callbacks can be run in larger batches. On lightly loaded systems, the result can be a 5-10% power savings. For callbacks that can't wait, there is a new call_rcu_hurry() function. This commit has the details.
- As described in this article, the char type will now default to unsigned on all architectures.
- The SLOB slab allocator, which was designed for small-memory systems, has been deprecated and will likely be removed in a future release. Any remaining users are encouraged to move to SLUB, as the other allocator (SLAB) will eventually be targeted as well. To help on smaller systems, there is a new SLUB_TINY configuration option that reduces the SLUB allocator's memory requirements.
- Support for message-signaled interrupts (MSIs) has been massively reworked to deal with years of technical debt and upcoming technologies. This merge commit describes the situation in great detail.
- There have been changes to the timer subsystem as well. del_timer() and del_timer_sync() have been renamed to timer_delete() and timer_delete_sync() respectively. There are new functions, timer_shutdown() and timer_shutdown_sync(), which are meant to ease the task of cleaning up timers that might be rearmed during that process; once they are called, any attempts to rearm the timer will be ignored.
If the usual two-week schedule is followed, the 6.2 merge window can be
expected to end on December 25. Given the significance of that date
and a number of warnings from Torvalds, though, it would not be at all
surprising if this merge window ended up being shorter than usual.
Whatever happens, LWN will follow up with a summary of the changes that
were pulled once 6.2-rc1 has been released.
Index entries for this article | |
---|---|
Kernel | Releases/6.2 |
Posted Dec 15, 2022 16:09 UTC (Thu)
by smurf (subscriber, #17840)
[Link] (3 responses)
Well, it always could be built without NFSv2. Just turn off NFS entirely. :-P
Posted Dec 15, 2022 16:35 UTC (Thu)
by jhoblitt (subscriber, #77733)
[Link]
Posted Dec 15, 2022 20:39 UTC (Thu)
by jlayton (subscriber, #31672)
[Link] (1 responses)
"The kernel can now be built without NFSv2 server support."
Prior to this, support for NFSv2 and v3 were was always built in. With this change, v3 is always supported, but v2 support is now optional. v4 support has always been optional.
Posted Dec 17, 2022 21:28 UTC (Sat)
by trondmy (subscriber, #28934)
[Link]
Sure, but the NFS client code has been able to do this since 2012, so both statements are correct. :-)
Posted Dec 15, 2022 19:19 UTC (Thu)
by wsy (subscriber, #121706)
[Link] (13 responses)
Posted Dec 15, 2022 23:53 UTC (Thu)
by willy (subscriber, #9762)
[Link] (6 responses)
It's been a published algorithm since 2012. The best known attack is based on a 22-round version instead of the specified 32. Arguably, Rijndael is closer to being broken than SM4.
Posted Dec 16, 2022 4:37 UTC (Fri)
by wsy (subscriber, #121706)
[Link] (5 responses)
The PKI standards built upon these cipher suites are called 双证书体系 or Dual-Certificate System. A user has to use saparate key pairs for encryption and signature. The encryption cert private key is issued by the key authority. The signature cert private key is generated by yourself and signed by the CA like a normal certificate.
So the gov can easily decrypt your communication while you have no plausible deniability. This is crazy. I doubt any sane person will trust those ciphers seeing this dual-cert system.
Posted Dec 16, 2022 6:33 UTC (Fri)
by uudiin (guest, #131856)
[Link]
Posted Dec 18, 2022 2:10 UTC (Sun)
by anselm (subscriber, #2796)
[Link] (2 responses)
Yes, but that approach would work with any asymmetric cryptosystem (such as RSA). It doesn't indicate a weakness in the actual ciphers used in China. On the contrary, if the ciphers themselves were in fact backdoored, the Chinese government wouldn't even need to go through this elaborate “dual-certificate” song-and-dance routine in the first place.
Posted Dec 19, 2022 11:48 UTC (Mon)
by k3ninho (subscriber, #50375)
[Link] (1 responses)
K3n.
Posted Dec 23, 2022 7:25 UTC (Fri)
by anton (subscriber, #25547)
[Link]
OTOH, the PRC government may just want their own cypher for fear of an NSA backdoor in cyphers coming from elsewhere.
Posted Dec 22, 2022 18:05 UTC (Thu)
by flussence (guest, #85566)
[Link]
Don't overestimate people's sanity. After all, OpenSSL is still in use a decade later for some reason.
Posted Dec 16, 2022 0:21 UTC (Fri)
by Cyberax (✭ supporter ✭, #52523)
[Link] (4 responses)
Posted Dec 18, 2022 4:04 UTC (Sun)
by Paf (subscriber, #91811)
[Link] (3 responses)
Posted Dec 18, 2022 6:48 UTC (Sun)
by Cyberax (✭ supporter ✭, #52523)
[Link] (2 responses)
So it's extremely unlikely that SM4 is backdoored. And if it is, then AES is also pretty much guaranteed to be just as vulnerable.
It doesn't mean that everyone should switch to SM4, it's simply not a good modern cipher from a purely practical standpoint.
Posted Dec 20, 2022 1:24 UTC (Tue)
by Paf (subscriber, #91811)
[Link] (1 responses)
Posted Dec 23, 2022 3:45 UTC (Fri)
by Cyberax (✭ supporter ✭, #52523)
[Link]
In contrast, both AES and SM4 use algorithmically generated S-Boxes. The algorithms are very similar, so it's highly unlikely that only one of them is vulnerable.
Posted Dec 16, 2022 9:02 UTC (Fri)
by InfoHunter (guest, #162753)
[Link]
Posted Dec 15, 2022 22:37 UTC (Thu)
by josh (subscriber, #17465)
[Link] (1 responses)
I was following this discussion at length, but didn't see the final patches. Is there a specific reason why `call_rcu_hurry` is not just `call_rcu_expedited`? Do we really need two *separate* flavors of "go faster", for a total of three variants?
Posted Dec 20, 2022 6:38 UTC (Tue)
by calumapplepie (guest, #143655)
[Link]
Posted Dec 22, 2022 18:20 UTC (Thu)
by flussence (guest, #85566)
[Link]
6.2 Merge window, part 1
6.2 Merge window, part 1
6.2 Merge window, part 1
6.2 Merge window, part 1
>
> "The kernel can now be built without NFSv2 server support."
6.2 Merge window, part 1
6.2 Merge window, part 1
6.2 Merge window, part 1
6.2 Merge window, part 1
6.2 Merge window, part 1
So the gov can easily decrypt your communication while you have no plausible deniability. This is crazy. I doubt any sane person will trust those ciphers seeing this dual-cert system.
6.2 Merge window, part 1
That is certainly a possibility. The British planted stories of spies to cover up the existence of Ultra (their successful cryptanalysis).
6.2 Merge window, part 1
6.2 Merge window, part 1
6.2 Merge window, part 1
6.2 Merge window, part 1
6.2 Merge window, part 1
6.2 Merge window, part 1
From Wikipedia. From your description, you know more of the details of S-box creation than I do, but this sure sounds like an S-box could be weak in a way that might not be apparent to others.
6.2 Merge window, part 1
6.2 Merge window, part 1
6.2 Merge window, part 1
6.2 Merge window, part 1
6.2 Merge window, part 1