[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <aIIAZiQ6ca3DFHpE@willie-the-truck>
Date: Thu, 24 Jul 2025 10:44:06 +0100
From: Will Deacon <will@...nel.org>
To: torvalds@...ux-foundation.org
Cc: catalin.marinas@....com, linux-arm-kernel@...ts.infradead.org,
linux-kernel@...r.kernel.org, kernel-team@...roid.com,
maz@...nel.org, mark.rutland@....com
Subject: [GIT PULL] arm64 fixes for 6.16
Hi Linus,
Please pull these two important arm64 fixes ahead of the 6.16 release.
The first fixes a regression introduced during the merge window where
the KVM UUID (which is used to advertise KVM-specific hypercalls for
things like time synchronisation in the guest) was corrupted thanks to
an endianness bug introduced when converting the code to use the
UUID_INIT() helper.
The second fixes a stack-pointer corruption issue during context-switch
which has been observed in the wild when taking a pseudo-NMI with
shadow call stack enabled.
Please pull.
Cheers,
Will
--->8
The following changes since commit 9dd1757493416310a5e71146a08bc228869f8dae:
arm64/mm: Drop wrong writes into TCR2_EL1 (2025-07-04 16:46:04 +0100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes
for you to fetch changes up to d42e6c20de6192f8e4ab4cf10be8c694ef27e8cb:
arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() (2025-07-22 16:39:30 +0100)
----------------------------------------------------------------
arm64 fixes for 6.16
- Fix broken UUID value for the KVM/arm64 hypervisor SMCCC interface.
- Fix stack corruption on context-switch, primarily seen on (but not
limited to) configurations with both pNMI and SCS enabled.
----------------------------------------------------------------
Ada Couprie Diaz (1):
arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack()
Jack Thomson (1):
arm64: kvm, smccc: Fix vendor uuid
arch/arm64/include/asm/assembler.h | 5 +++++
arch/arm64/kernel/entry.S | 6 ++++++
include/linux/arm-smccc.h | 2 +-
3 files changed, 12 insertions(+), 1 deletion(-)
Powered by blists - more mailing lists