[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230113102936.GA12734@willie-the-truck>
Date: Fri, 13 Jan 2023 10:29:37 +0000
From: Will Deacon <will@...nel.org>
To: torvalds@...ux-foundation.org
Cc: catalin.marinas@....com, linux-arm-kernel@...ts.infradead.org,
linux-kernel@...r.kernel.org, kernel-team@...roid.com
Subject: [GIT PULL] arm64 fixes for -rc4
Hi Linus,
Here's a sizeable batch of Friday the 13th arm64 fixes for -rc4.
What could possibly go wrong?
The obvious reason we have so much here is because of the holiday season
right after the merge window, but we've also brought back an erratum
workaround that was previously dropped at the last minute and there's an
MTE coredumping fix that strays outside of the arch/arm64 directory.
Anyway, it's all been in -next, the CI robots seem happy enough and
there's the usual summary in the tag.
Please pull.
Cheers,
Will
--->8
The following changes since commit 1b929c02afd37871d5afb9d498426f83432e71c2:
Linux 6.2-rc1 (2022-12-25 13:41:39 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes
for you to fetch changes up to 68a63a412d18bd2e2577c8928139f92541afa7a6:
arm64: Fix build with CC=clang, CONFIG_FTRACE=y and CONFIG_STACK_TRACER=y (2023-01-09 15:59:42 +0000)
----------------------------------------------------------------
arm64 fixes for -rc4
- Fix PAGE_TABLE_CHECK failures on hugepage splitting path
- Fix PSCI encoding of MEM_PROTECT_RANGE function in UAPI header
- Fix NULL deref when accessing debugfs node if PSCI is not present
- Fix MTE core dumping when VMA list is being updated concurrently
- Fix SME signal frame handling when SVE is not implemented by the CPU
- Fix asm constraints for cmpxchg_double() to hazard both words
- Fix build failure with stack tracer and older versions of Clang
- Bring back workaround for Cortex-A715 erratum 2645198
----------------------------------------------------------------
Anshuman Khandual (1):
arm64: errata: Workaround possible Cortex-A715 [ESR|FAR]_ELx corruption
Catalin Marinas (3):
arm64: mte: Fix double-freeing of the temporary tag storage during coredump
elfcore: Add a cprm parameter to elf_core_extra_{phdrs,data_size}
arm64: mte: Avoid the racy walk of the vma list during core dump
James Clark (1):
arm64: Fix build with CC=clang, CONFIG_FTRACE=y and CONFIG_STACK_TRACER=y
Liu Shixin (2):
arm64/mm: fix incorrect file_map_count for invalid pmd
arm64/mm: add pud_user_exec() check in pud_user_accessible_page()
Marc Zyngier (1):
firmware/psci: Don't register with debugfs if PSCI isn't available
Mark Brown (3):
arm64/sme: Fix context switch for SME only systems
arm64/signal: Always accept SVE signal frames on SME only systems
arm64/signal: Always allocate SVE signal frames on SME only systems
Mark Rutland (1):
arm64: cmpxchg_double*: hazard against entire exchange variable
Will Deacon (2):
firmware/psci: Fix MEM_PROTECT_RANGE function numbers
arm64/mm: Define dummy pud_user_exec() when using 2-level page-table
Zenghui Yu (1):
arm64: ptrace: Use ARM64_SME to guard the SME register enumerations
junhua huang (1):
arm64/uprobes: change the uprobe_opcode_t typedef to fix the sparse warning
Documentation/arm64/silicon-errata.rst | 2 ++
arch/arm64/Kconfig | 18 ++++++++--
arch/arm64/include/asm/atomic_ll_sc.h | 2 +-
arch/arm64/include/asm/atomic_lse.h | 2 +-
arch/arm64/include/asm/hugetlb.h | 9 +++++
arch/arm64/include/asm/pgtable.h | 16 +++++++--
arch/arm64/include/asm/uprobes.h | 2 +-
arch/arm64/kernel/cpu_errata.c | 7 ++++
arch/arm64/kernel/elfcore.c | 61 ++++++++++++++++------------------
arch/arm64/kernel/fpsimd.c | 2 +-
arch/arm64/kernel/ptrace.c | 2 +-
arch/arm64/kernel/signal.c | 9 +++--
arch/arm64/mm/hugetlbpage.c | 21 ++++++++++++
arch/arm64/mm/mmu.c | 21 ++++++++++++
arch/arm64/tools/cpucaps | 1 +
arch/ia64/kernel/elfcore.c | 4 +--
arch/x86/um/elfcore.c | 4 +--
drivers/firmware/psci/psci.c | 3 ++
fs/binfmt_elf.c | 4 +--
fs/binfmt_elf_fdpic.c | 4 +--
include/linux/elfcore.h | 8 ++---
include/uapi/linux/psci.h | 4 +--
22 files changed, 147 insertions(+), 59 deletions(-)
Powered by blists - more mailing lists