lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <aG6GAKc8EV0cERsn@willie-the-truck>
Date: Wed, 9 Jul 2025 16:08:48 +0100
From: Will Deacon <will@...nel.org>
To: torvalds@...ux-foundation.org
Cc: catalin.marinas@....com, linux-arm-kernel@...ts.infradead.org,
	linux-kernel@...r.kernel.org, kernel-team@...roid.com
Subject: [GIT PULL] arm64 fixes for -rc6

Hi Linus,

Please pull these arm64 fixes for -rc6. We've had a steady trickle of
relatively minor fixes since -rc3 but they're all self-contained 6.16
material and confined to the arch code.

There's the usual summary in the tag.

Cheers,

Will

--->8

The following changes since commit 39dfc971e42d886e7df01371cd1bef505076d84c:

  arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth() (2025-06-12 17:28:18 +0100)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes

for you to fetch changes up to 9dd1757493416310a5e71146a08bc228869f8dae:

  arm64/mm: Drop wrong writes into TCR2_EL1 (2025-07-04 16:46:04 +0100)

----------------------------------------------------------------
arm64 fixes for -rc6

- Fix bogus KASAN splat on EFI runtime stack

- Select JUMP_LABEL unconditionally to avoid boot failure with pKVM
  and the legacy implementation of static keys

- Avoid touching GCS registers when 'arm64.nogcs' has been passed on the
  command-line

- Move a 'cpumask_t' off the stack in smp_send_stop()

- Don't advertise SME-related hwcaps to userspace when ID_AA64PFR1_EL1
  indicates that SME is not implemented

- Always check the VMA when handling an Overlay fault

- Avoid corrupting TCR2_EL1 during boot

----------------------------------------------------------------
Anshuman Khandual (1):
      arm64/mm: Drop wrong writes into TCR2_EL1

Arnd Bergmann (1):
      arm64: move smp_send_stop() cpu mask off stack

Breno Leitao (1):
      arm64: efi: Fix KASAN false positive for EFI runtime stack

Kevin Brodsky (1):
      arm64: poe: Handle spurious Overlay faults

Marc Zyngier (1):
      arm64: Unconditionally select CONFIG_JUMP_LABEL

Mark Brown (2):
      arm64/gcs: Don't try to access GCS registers if arm64.nogcs is enabled
      arm64: Filter out SME hwcaps when FEAT_SME isn't implemented

 arch/arm64/Kconfig                 |  1 +
 arch/arm64/include/asm/el2_setup.h | 19 +++++--------
 arch/arm64/kernel/Makefile         |  3 +-
 arch/arm64/kernel/cpufeature.c     | 57 +++++++++++++++++++++-----------------
 arch/arm64/kernel/efi.c            | 11 ++++++--
 arch/arm64/kernel/process.c        |  5 ++++
 arch/arm64/kernel/smp.c            |  2 +-
 arch/arm64/mm/fault.c              | 30 ++++++++++++++------
 arch/arm64/mm/proc.S               |  1 -
 9 files changed, 76 insertions(+), 53 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ