lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20210226110916.GA14247@willie-the-truck>
Date:   Fri, 26 Feb 2021 11:09:16 +0000
From:   Will Deacon <will@...nel.org>
To:     torvalds@...ux-foundation.org
Cc:     Catalin Marinas <catalin.marinas@....com>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Linux ARM Kernel Mailing List 
        <linux-arm-kernel@...ts.infradead.org>, kernel-team@...roid.com,
        maz@...nel.org
Subject: [GIT PULL] arm64: Fixes for -rc1

Hi Linus,

Please pull these arm64 fixes for -rc1. The big one is a fix for the VHE
enabling path during early boot, where the code enabling the MMU wasn't
necessarily in the identity map of the new page-tables, resulting in a
consistent crash with 64k pages. In fixing that, we noticed some missing
barriers too, so we added those for the sake of architectural compliance.

Other than that, just the usual merge window trickle. There'll be more
to come, too.

Cheers,

Will

--->8

The following changes since commit 1ffa9763828cf73a4d4eaa04c29a4a89fb0708c7:

  Merge branch 'for-next/vdso' into for-next/core (2021-02-12 15:17:42 +0000)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes

for you to fetch changes up to 3c02600144bdb0a1280a9090d3a7e37e2f9fdcc8:

  arm64: stacktrace: Report when we reach the end of the stack (2021-02-25 10:34:51 +0000)

----------------------------------------------------------------
arm64 fixes for -rc1

- Fix lockdep false alarm on resume-from-cpuidle path

- Fix memory leak in kexec_file

- Fix module linker script to work with GDB

- Fix error code when trying to use uprobes with AArch32 instructions

- Fix late VHE enabling with 64k pages

- Add missing ISBs after TLB invalidation

- Fix seccomp when tracing syscall -1

- Fix stacktrace return code at end of stack

- Fix inconsistent whitespace for pointer return values

- Fix compiler warnings when building with W=1

----------------------------------------------------------------
He Zhe (1):
      arm64: uprobe: Return EOPNOTSUPP for AARCH32 instruction probing

Joey Gouly (1):
      KVM: arm64: make the hyp vector table entries local

Marc Zyngier (3):
      arm64: VHE: Enable EL2 MMU from the idmap
      arm64: Add missing ISB after invalidating TLB in __primary_switch
      arm64: Add missing ISB after invalidating TLB in enter_vhe

Mark Brown (1):
      arm64: stacktrace: Report when we reach the end of the stack

Pavel Tatashin (1):
      kexec: move machine_kexec_post_load() to public interface

Shaoying Xu (1):
      arm64 module: set plt* section addresses to 0x0

Timothy E Baldwin (1):
      arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL)

Will Deacon (1):
      arm64: spectre: Prevent lockdep splat on v4 mitigation enable path

Zhiyuan Dai (1):
      arm64/mm: Fixed some coding style issues

qiuguorui1 (1):
      arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails

 arch/arm64/include/asm/module.lds.h    |  6 ++---
 arch/arm64/kernel/head.S               |  1 +
 arch/arm64/kernel/hyp-stub.S           | 40 +++++++++++++++++++++++-----------
 arch/arm64/kernel/machine_kexec_file.c |  4 +++-
 arch/arm64/kernel/probes/uprobes.c     |  2 +-
 arch/arm64/kernel/ptrace.c             |  2 +-
 arch/arm64/kernel/stacktrace.c         |  2 +-
 arch/arm64/kernel/suspend.c            |  2 +-
 arch/arm64/kvm/hyp/hyp-entry.S         |  2 +-
 arch/arm64/mm/mmu.c                    |  6 ++---
 include/linux/kexec.h                  |  2 ++
 kernel/kexec_internal.h                |  2 --
 12 files changed, 44 insertions(+), 27 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ