[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190201175141.GB14567@fuggles.cambridge.arm.com>
Date: Fri, 1 Feb 2019 17:51:41 +0000
From: Will Deacon <will.deacon@....com>
To: torvalds@...ux-foundation.org
Cc: linux-kernel@...r.kernel.org, linux-arm-kernel@...ts.infradead.org,
catalin.marinas@....com
Subject: [GIT PULL] arm64: fixes for -rc5
Hi Linus,
Although we're still debugging a few minor arm64-specific issues in
mainline, I didn't want to hold this lot up in the meantime. We've got
an additional KASLR fix after the previous one wasn't quite complete, a
fix for a performance regression when mapping executable pages into
userspace and some fixes for kprobe blacklisting. All candidates for
stable and summarised in the tag.
Please pull. Thanks,
Will
--->8
The following changes since commit f17b5f06cb92ef2250513a1e154c47b78df07d40:
Linux 5.0-rc4 (2019-01-27 15:18:05 -0800)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes
for you to fetch changes up to f7daa9c8fd191724b9ab9580a7be55cd1a67d799:
arm64: hibernate: Clean the __hyp_text to PoC after resume (2019-02-01 14:10:02 +0000)
----------------------------------------------------------------
arm64 fixes for -rc5
- Fix module loading when KASLR is configured but disabled at runtime
- Fix accidental IPI when mapping user executable pages
- Ensure hyp-stub and KVM world switch code cannot be kprobed
----------------------------------------------------------------
Ard Biesheuvel (1):
arm64: kaslr: ensure randomized quantities are clean also when kaslr is off
Catalin Marinas (1):
arm64: Do not issue IPIs for user executable ptes
James Morse (3):
arm64: kprobe: Always blacklist the KVM world-switch code
arm64: hyp-stub: Forbid kprobing of the hyp-stub
arm64: hibernate: Clean the __hyp_text to PoC after resume
arch/arm64/kernel/hibernate.c | 4 +++-
arch/arm64/kernel/hyp-stub.S | 2 ++
arch/arm64/kernel/kaslr.c | 1 +
arch/arm64/kernel/probes/kprobes.c | 6 +++---
arch/arm64/mm/flush.c | 6 +++++-
5 files changed, 14 insertions(+), 5 deletions(-)
Powered by blists - more mailing lists