From patchwork Thu Oct 17 15:34:08 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Will Deacon X-Patchwork-Id: 13840235 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 18E2DD374B0 for ; Thu, 17 Oct 2024 15:37:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:Content-Type:MIME-Version: Message-ID:Subject:Cc:To:From:Date:Reply-To:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Owner; bh=8CN/FOFtYi57Ruxb/axwf5VnvueUnqGw0Y9QK+WfN6I=; b=3CgIZzWBw5XoT53j75mkR0zdSF 77h/3WQIn0v2UgfUkaO4CLh4anfIaa3KMOLJtvU6cRiT4dQ953y40M/Ug6jXLDx6GPu3ucC072aQO Usy6Ix0e3W1k5Xq0FCZV2wpB4YjUigad9kMOE5UqjKPCvmS0nDMmSuoGLxT9WSky02oCvq3Iv+Wur M0A7xodpsoW87WkSkyLm4QYX8TbmZ3Y04siu1qDpcrVfa+4zeQ6fbFHM+w6Yz/nfAmFpo8Am28uiZ DMwa2/F5OMHkhUuMliJw7A1hv4WQx2VQ4X3DP8iEF1qtHuFq9J8L+rII3OaeH9AJd63gGefVhyHXY ecbieYxg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.98 #2 (Red Hat Linux)) id 1t1SZC-0000000FJN8-3hJT; Thu, 17 Oct 2024 15:37:35 +0000 Received: from dfw.source.kernel.org ([139.178.84.217]) by bombadil.infradead.org with esmtps (Exim 4.98 #2 (Red Hat Linux)) id 1t1SVx-0000000FIMT-3esb for linux-arm-kernel@lists.infradead.org; Thu, 17 Oct 2024 15:34:15 +0000 Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by dfw.source.kernel.org (Postfix) with ESMTP id 803345C57DD; Thu, 17 Oct 2024 15:34:08 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 89271C4CEC7; Thu, 17 Oct 2024 15:34:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1729179252; bh=V1nvvkLpIs5sD2OFrJ2euHz95qyDMltWcmHdJi8Yxew=; h=Date:From:To:Cc:Subject:From; b=N+p4fgfg8QbVlO0mXs4I+LGKT9ri0wD9wAaQMDGFTdhr0cAPRCDq2mkozxce/GB/c K/4gtA7CqZsC0k2yK2dTAEj09Yrjg9Dw4n+nRGNmGtebcu6oGjOs6li1S491PwMFeU uzGsbXFMXhkkcuC/yFwwGhVtSq7epmBX+CLSBCPcIcgjPW2ImzBAmxMiw7FjVX//3+ h2Rv1DaR/g+cuJcSYI9LGCegNm1kjJukJ+C9smPUPWuv2d1MRHYdRQ8Y44ZN6FEQFN J22PE7TSSjcBqFmCzTtV5yV4/PJwDgh4wjNsfs9GY8loJHntG1pzkrCJfiDJRv7ZiM td93Gj97K/QLQ== Date: Thu, 17 Oct 2024 16:34:08 +0100 From: Will Deacon To: torvalds@linux-foundation.org Cc: catalin.marinas@arm.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kernel-team@android.com Subject: [GIT PULL] arm64 fixes for -rc4 Message-ID: <20241017153407.GA22230@willie-the-truck> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20241017_083413_974463_6DB40AAF X-CRM114-Status: GOOD ( 10.48 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Hi Linus, Please pull this crop of arm64 fixes for 6.12-rc4. The summary is in the tag, but we will have some more POE fixes relating to signal delivery in the next week or so. Cheers, Will --->8 The following changes since commit 3eddb108abe3de6723cc4b77e8558ce1b3047987: arm64: Subscribe Microsoft Azure Cobalt 100 to erratum 3194386 (2024-10-04 12:38:03 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes for you to fetch changes up to 7aed6a2c51ffc97a126e0ea0c270fab7af97ae18: kasan: Disable Software Tag-Based KASAN with GCC (2024-10-15 11:38:10 +0100) ---------------------------------------------------------------- arm64 fixes for -rc4 - Disable software tag-based KASAN when compiling with GCC, as functions are incorrectly instrumented leading to a crash early during boot. - Fix pkey configuration for kernel threads when POE is enabled. - Fix invalid memory accesses in uprobes when targetting load-literal instructions. ---------------------------------------------------------------- Joey Gouly (2): arm64: set POR_EL0 for kernel threads Documentation/protection-keys: add AArch64 to documentation Mark Rutland (3): arm64: probes: Remove broken LDR (literal) uprobe support arm64: probes: Fix simulate_ldr*_literal() arm64: probes: Fix uprobes for big-endian kernels Will Deacon (1): kasan: Disable Software Tag-Based KASAN with GCC Documentation/core-api/protection-keys.rst | 38 +++++++++++++++++++++++------- arch/arm64/include/asm/uprobes.h | 8 +++---- arch/arm64/kernel/probes/decode-insn.c | 16 +++++++++---- arch/arm64/kernel/probes/simulate-insn.c | 18 ++++++-------- arch/arm64/kernel/probes/uprobes.c | 4 ++-- arch/arm64/kernel/process.c | 3 +++ lib/Kconfig.kasan | 7 ++++-- 7 files changed, 61 insertions(+), 33 deletions(-)