From patchwork Fri Jan 13 10:29:37 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Will Deacon X-Patchwork-Id: 13100447 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 662DAC54EBD for ; Fri, 13 Jan 2023 10:30:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Subject:Cc:To: From:Date:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=2MEaDI2Py/tR3IRKq8AJvA4nMIcEBL8zAj91rbO/JjU=; b=uTQrkaP6Vtfz+V c9cY9L4hSepzulSybnqfXw/lE1/Q5gqSwmZWuKB1csU18GbPbcpBHkCRqO0fsawlEvS1XNlhLtzFO 4pRbKA0RyHo0aGwhaNeqSzONsxirJJ/8WrZCTNk/PKa47tvC3AFwjlglaJYUwj25i4FebJlZeLxkA bQ9vFBZo6A+9OpIlTQYgOis+z2fpBrKKBv0KDMe6ZpQwERQZiBwh91YdKNuU6yRbqMSh4RHtqS1NP R+sz6SGMGCtcTlbMdr6BhCaimtRwz85AyVx+JIuT4kJNpeu+48CjN8CQ3XpdTEAyRe6OOAJE1qIBz MrTWKL0q/6GANAWVRqbw==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1pGHJm-001mDw-9p; Fri, 13 Jan 2023 10:29:50 +0000 Received: from ams.source.kernel.org ([2604:1380:4601:e00::1]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1pGHJh-001mCg-3J for linux-arm-kernel@lists.infradead.org; Fri, 13 Jan 2023 10:29:46 +0000 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 957BFB82047; Fri, 13 Jan 2023 10:29:43 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3E572C433D2; Fri, 13 Jan 2023 10:29:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1673605782; bh=YDvQoWJ7edXI9gdF4qw6CZaWr1jswR3Pv0hDCq9hXuc=; h=Date:From:To:Cc:Subject:From; b=KJbHHgYMMetrNfn/P3eGoP9kwRxTrQ3cEhvUTs3UgHDCl4HiVmDMmtYS5UYxNKn2e N49h9Y8Mmm6AdAu+4AxRo11ZZTy3tOjVLYQa8hL6hLdqtrtEEzB7ijjKqZh61VHMfX tw8UlozW64Ma96DGLGW3bNYy578pCRxdpxi2c3Bwt11WaUTfAgEwJ21vnbN4q4ObpA gEimhv8gIuQsH6MBRwegXfMOgPNeZqaX7zAc6XjizXYGgywnX7Khh64PcfuR3Hzxee Yiz10Wq0aoKknpRe6p669Hd7oxj4okJgWXO3ue2cz9EbFtiIvzaKLl15hzscXuXABJ PgJl9WNcwfqOA== Date: Fri, 13 Jan 2023 10:29:37 +0000 From: Will Deacon To: torvalds@linux-foundation.org Cc: catalin.marinas@arm.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kernel-team@android.com Subject: [GIT PULL] arm64 fixes for -rc4 Message-ID: <20230113102936.GA12734@willie-the-truck> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20230113_022945_447012_7C8654C7 X-CRM114-Status: GOOD ( 17.47 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Hi Linus, Here's a sizeable batch of Friday the 13th arm64 fixes for -rc4. What could possibly go wrong? The obvious reason we have so much here is because of the holiday season right after the merge window, but we've also brought back an erratum workaround that was previously dropped at the last minute and there's an MTE coredumping fix that strays outside of the arch/arm64 directory. Anyway, it's all been in -next, the CI robots seem happy enough and there's the usual summary in the tag. Please pull. Cheers, Will --->8 The following changes since commit 1b929c02afd37871d5afb9d498426f83432e71c2: Linux 6.2-rc1 (2022-12-25 13:41:39 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes for you to fetch changes up to 68a63a412d18bd2e2577c8928139f92541afa7a6: arm64: Fix build with CC=clang, CONFIG_FTRACE=y and CONFIG_STACK_TRACER=y (2023-01-09 15:59:42 +0000) ---------------------------------------------------------------- arm64 fixes for -rc4 - Fix PAGE_TABLE_CHECK failures on hugepage splitting path - Fix PSCI encoding of MEM_PROTECT_RANGE function in UAPI header - Fix NULL deref when accessing debugfs node if PSCI is not present - Fix MTE core dumping when VMA list is being updated concurrently - Fix SME signal frame handling when SVE is not implemented by the CPU - Fix asm constraints for cmpxchg_double() to hazard both words - Fix build failure with stack tracer and older versions of Clang - Bring back workaround for Cortex-A715 erratum 2645198 ---------------------------------------------------------------- Anshuman Khandual (1): arm64: errata: Workaround possible Cortex-A715 [ESR|FAR]_ELx corruption Catalin Marinas (3): arm64: mte: Fix double-freeing of the temporary tag storage during coredump elfcore: Add a cprm parameter to elf_core_extra_{phdrs,data_size} arm64: mte: Avoid the racy walk of the vma list during core dump James Clark (1): arm64: Fix build with CC=clang, CONFIG_FTRACE=y and CONFIG_STACK_TRACER=y Liu Shixin (2): arm64/mm: fix incorrect file_map_count for invalid pmd arm64/mm: add pud_user_exec() check in pud_user_accessible_page() Marc Zyngier (1): firmware/psci: Don't register with debugfs if PSCI isn't available Mark Brown (3): arm64/sme: Fix context switch for SME only systems arm64/signal: Always accept SVE signal frames on SME only systems arm64/signal: Always allocate SVE signal frames on SME only systems Mark Rutland (1): arm64: cmpxchg_double*: hazard against entire exchange variable Will Deacon (2): firmware/psci: Fix MEM_PROTECT_RANGE function numbers arm64/mm: Define dummy pud_user_exec() when using 2-level page-table Zenghui Yu (1): arm64: ptrace: Use ARM64_SME to guard the SME register enumerations junhua huang (1): arm64/uprobes: change the uprobe_opcode_t typedef to fix the sparse warning Documentation/arm64/silicon-errata.rst | 2 ++ arch/arm64/Kconfig | 18 ++++++++-- arch/arm64/include/asm/atomic_ll_sc.h | 2 +- arch/arm64/include/asm/atomic_lse.h | 2 +- arch/arm64/include/asm/hugetlb.h | 9 +++++ arch/arm64/include/asm/pgtable.h | 16 +++++++-- arch/arm64/include/asm/uprobes.h | 2 +- arch/arm64/kernel/cpu_errata.c | 7 ++++ arch/arm64/kernel/elfcore.c | 61 ++++++++++++++++------------------ arch/arm64/kernel/fpsimd.c | 2 +- arch/arm64/kernel/ptrace.c | 2 +- arch/arm64/kernel/signal.c | 9 +++-- arch/arm64/mm/hugetlbpage.c | 21 ++++++++++++ arch/arm64/mm/mmu.c | 21 ++++++++++++ arch/arm64/tools/cpucaps | 1 + arch/ia64/kernel/elfcore.c | 4 +-- arch/x86/um/elfcore.c | 4 +-- drivers/firmware/psci/psci.c | 3 ++ fs/binfmt_elf.c | 4 +-- fs/binfmt_elf_fdpic.c | 4 +-- include/linux/elfcore.h | 8 ++--- include/uapi/linux/psci.h | 4 +-- 22 files changed, 147 insertions(+), 59 deletions(-)