lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20241101112207.GA8472@willie-the-truck>
Date: Fri, 1 Nov 2024 11:22:08 +0000
From: Will Deacon <will@...nel.org>
To: torvalds@...ux-foundation.org
Cc: catalin.marinas@....com, linux-arm-kernel@...ts.infradead.org,
	linux-kernel@...r.kernel.org, kernel-team@...roid.com
Subject: [GIT PULL] arm64 fixes for -rc6

Hi Linus,

Please pull these arm64 fixes for -rc6. The important one is a change to
the way in which we handle protection keys around signal delivery so that
we're more closely aligned with the x86 behaviour, however there is also
a revert of the previous fix to disable software tag-based KASAN with
GCC, since a workaround materialised shortly afterwards.

I'd love to say we're done with 6.12, but we're aware of some longstanding
fpsimd register corruption issues that we're almost at the bottom of
resolving. Hopefully we'll be done reviewing the fixes next week, so
there'll be one more pull from me before the merge window opens.

Cheers,

Will

--->8

The following changes since commit 7aed6a2c51ffc97a126e0ea0c270fab7af97ae18:

  kasan: Disable Software Tag-Based KASAN with GCC (2024-10-15 11:38:10 +0100)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes

for you to fetch changes up to 2e8a1acea8597ff42189ea94f0a63fa58640223d:

  arm64: signal: Improve POR_EL0 handling to avoid uaccess failures (2024-10-29 17:59:12 +0000)

----------------------------------------------------------------
arm64 fixes for -rc6

- Fix handling of POR_EL0 during signal delivery so that pushing the
  signal context doesn't fail based on the pkey configuration of the
  interrupted context and align our user-visible behaviour with that of
  x86.

- Fix a bogus pointer being passed to the CPU hotplug code from the
  Arm SDEI driver.

- Re-enable software tag-based KASAN with GCC by using an alternative
  implementation of '__no_sanitize_address'.

----------------------------------------------------------------
Kevin Brodsky (1):
      arm64: signal: Improve POR_EL0 handling to avoid uaccess failures

Marco Elver (2):
      kasan: Fix Software Tag-Based KASAN with GCC
      Revert "kasan: Disable Software Tag-Based KASAN with GCC"

Xiongfeng Wang (1):
      firmware: arm_sdei: Fix the input parameter of cpuhp_remove_state()

 arch/arm64/kernel/signal.c   | 92 +++++++++++++++++++++++++++++++++++++-------
 drivers/firmware/arm_sdei.c  |  2 +-
 include/linux/compiler-gcc.h |  4 ++
 lib/Kconfig.kasan            |  7 +---
 4 files changed, 85 insertions(+), 20 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ