From patchwork Fri Jun 26 13:21:32 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Will Deacon X-Patchwork-Id: 11627613 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id E6A741392 for ; Fri, 26 Jun 2020 13:23:40 +0000 (UTC) Received: from merlin.infradead.org (merlin.infradead.org [205.233.59.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id BFCCC2078D for ; Fri, 26 Jun 2020 13:23:40 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="q1zlK+1n"; dkim=fail reason="signature verification failed" (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="e6WKxY4b" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org BFCCC2078D Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+patchwork-linux-arm=patchwork.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:MIME-Version:Message-ID:Subject:To:From:Date: Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender :Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Owner; bh=jFM3IFMeoPQSTswd85voxPl954TKnlp88I600xRZ+mc=; b=q1zlK+1nveNT2KgvCOT5OR3gQf GzgXxHAhYFb6r409YCbCnhMQe2SkW+dLdxiV4diBN2iu9xPt4cUiRPg2z0hTGNwJXyKSC+6v6rzn7 f01Lq/Z2JcRbpDLqBkkNYcLlNQ7/OYWdC/ScQUn+D4WkAYOZ6sf/ezc7oePJJIaNy8Qacw2Bg+ode XZujOwATQSKGAU/tWyXD3bjttckZL90yh9mKIjmfLgUt2oeBi+nxQTtPppc/ru1pJiy8+z2/XoLk1 pnGIoiBSDNSevshlfc2vdTq22ibBpRhlQYD8CfXaxSHEwX4v1IAv/3kvFif4QJvkcBYk1WnYBUfzP IegAgN1A==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1jooIW-0000pb-J2; Fri, 26 Jun 2020 13:21:40 +0000 Received: from mail.kernel.org ([198.145.29.99]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1jooIT-0000or-VJ for linux-arm-kernel@lists.infradead.org; Fri, 26 Jun 2020 13:21:38 +0000 Received: from willie-the-truck (236.31.169.217.in-addr.arpa [217.169.31.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 654FA2075D; Fri, 26 Jun 2020 13:21:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593177696; bh=Yuu27O3cGM+oVV8EJpqBsCHR3fqy5evaivCR9Hq+UPc=; h=Date:From:To:Cc:Subject:From; b=e6WKxY4b4Y8FEccwwo5l9eexcUxRYmEcdycBViJHwIOsrow+yvWUS0cC2E1mD46EA OWrfa7o3HQ9/1fAY/moAqhfidwYK71inloiGl/TnCgzUyNJITWo/pzn3+ziebXzBKq 6ET4skFrFLpC8t1MikoxCZHlEkYw/nKPpfQiGx00= Date: Fri, 26 Jun 2020 14:21:32 +0100 From: Will Deacon To: torvalds@linux-foundation.org Subject: [GIT PULL] arm64 fixes for -rc3 Message-ID: <20200626132131.GA9750@willie-the-truck> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Note: CRM114 invocation failed X-Spam-Score: -5.2 (-----) X-Spam-Report: SpamAssassin version 3.4.4 on merlin.infradead.org summary: Content analysis details: (-5.2 points) pts rule name description ---- ---------------------- -------------------------------------------------- -5.0 RCVD_IN_DNSWL_HI RBL: Sender listed at https://www.dnswl.org/, high trust [198.145.29.99 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature -0.0 DKIMWL_WL_HIGH DKIMwl.org - Whitelisted High sender X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: catalin.marinas@arm.com, kernel-team@android.com, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+patchwork-linux-arm=patchwork.kernel.org@lists.infradead.org Hi Linus, Please pull these arm64 fixes for -rc3. The big fix here is to our vDSO sigreturn trampoline as, after a painfully long stint of debugging, it turned out that fixing some of our CFI directives in the merge window lit up a bunch of logic in libgcc which has been shown to SEGV in some cases during asynchronous pthread cancellation. It looks like we can fix this by extending the directives to restore most of the interrupted register state from the sigcontext, but it's risky and hard to test so we opted to remove the CFI directives for now and rely on the unwinder fallback path like we used to. Cheers, Will --->8 The following changes since commit 24ebec25fb270100e252b19c288e21bd7d8cc7f7: arm64: hw_breakpoint: Don't invoke overflow handler on uaccess watchpoints (2020-06-18 11:10:00 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes for you to fetch changes up to 108447fd0d1a34b0929cd26dc637c917a734ebab: arm64: Add KRYO{3,4}XX silver CPU cores to SSB safelist (2020-06-25 20:18:57 +0100) ---------------------------------------------------------------- arm64 fixes for -rc3 - Fix unwinding through vDSO sigreturn trampoline - Fix build warnings by raising minimum LD version for PAC - Whitelist some Kryo Cortex-A55 derivatives for Meltdown and SSB - Fix perf register PC reporting for compat tasks - Fix 'make clean' warning for arm64 signal selftests - Fix ftrace when BTI is compiled in - Avoid building the compat vDSO using GCC plugins ---------------------------------------------------------------- Alexander Popov (1): arm64: vdso: Don't use gcc plugins for building vgettimeofday.c Jean-Philippe Brucker (1): arm64: Don't insert a BTI instruction at inner labels Jiping Ma (1): arm64: perf: Report the PC value in REGS_ABI_32 mode Mark Brown (2): arm64: Depend on newer binutils when building PAC kselftest: arm64: Remove redundant clean target Sai Prakash Ranjan (2): arm64: kpti: Add KRYO{3, 4}XX silver CPU cores to kpti safelist arm64: Add KRYO{3,4}XX silver CPU cores to SSB safelist Will Deacon (5): arm64: vdso: Disable dwarf unwinding through the sigreturn trampoline arm64: compat: Allow 32-bit vdso and sigpage to co-exist arm64: compat: Always use sigpage for sigreturn trampoline arm64: compat: Remove 32-bit sigreturn code from the vDSO arm64: vdso: Only pass --no-eh-frame-hdr when linker supports it arch/arm64/Kconfig | 4 +- arch/arm64/include/asm/linkage.h | 6 --- arch/arm64/include/asm/mmu.h | 3 ++ arch/arm64/kernel/Makefile | 2 - arch/arm64/kernel/cpu_errata.c | 2 + arch/arm64/kernel/cpufeature.c | 2 + arch/arm64/kernel/perf_regs.c | 25 +++++++++-- arch/arm64/kernel/signal32.c | 27 +----------- arch/arm64/kernel/vdso.c | 61 ++++++++++++--------------- arch/arm64/kernel/vdso/Makefile | 7 +-- arch/arm64/kernel/vdso/sigreturn.S | 54 +++++++++++++++--------- arch/arm64/kernel/vdso32/Makefile | 1 - arch/arm64/kernel/vdso32/sigreturn.S | 58 ------------------------- arch/arm64/kernel/vdso32/vdso.lds.S | 12 ------ tools/testing/selftests/arm64/signal/Makefile | 4 -- 15 files changed, 98 insertions(+), 170 deletions(-) delete mode 100644 arch/arm64/kernel/vdso32/sigreturn.S