From patchwork Thu Oct 1 17:35:07 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Catalin Marinas X-Patchwork-Id: 1375339 Return-Path: X-Original-To: incoming-imx@patchwork.ozlabs.org Delivered-To: patchwork-incoming-imx@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2001:8b0:10b:1231::1; helo=merlin.infradead.org; envelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=arm.com Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=merlin.20170209 header.b=fBmv0YCJ; dkim-atps=neutral Received: from merlin.infradead.org (merlin.infradead.org [IPv6:2001:8b0:10b:1231::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4C2Kyx67sQz9sVH for ; Fri, 2 Oct 2020 03:35:37 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:MIME-Version:Message-ID:Subject:To:From:Date: Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender :Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Owner; bh=D2i1Iix8DUceWqUNh3aTn8P/i9M1eVBx4aBLEc4TFlY=; b=fBmv0YCJJjAqnkprYkGEEo2hpa uTF2F+B48PB5JZqSd64r3huXCaT77qajs/1j+B6yNqqWWIxkEstSXDpbYEIFiGu9Svrgttk4yz60f ETPKuaaLRNDrACZXDdx9BN+Hm0cxfs6OU0Xcmy0Au5Gyp7gUtSFXzv/8u6fs+UCcVUJcGvXTAhvGt a9vXuv1NJDm7+bVkAtzUG4h/ckDmb4gnE2W6XsqWOZP0ndV84obf8IZcHhDXB4gcxv0mLJi/VWBFv H2BJPLyAdtCaaST7g6OyeO5leQNAz8clNtOR4ZiIY9Em6lMYmBaE4Kkr5OsCIN6dUZIQPivwRt56O kbSTHODQ==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1kO2UA-00021S-9j; Thu, 01 Oct 2020 17:35:18 +0000 Received: from mail.kernel.org ([198.145.29.99]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1kO2U4-0001yo-6f for linux-arm-kernel@lists.infradead.org; Thu, 01 Oct 2020 17:35:15 +0000 Received: from gaia (unknown [31.124.44.166]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 531512085B; Thu, 1 Oct 2020 17:35:10 +0000 (UTC) Date: Thu, 1 Oct 2020 18:35:07 +0100 From: Catalin Marinas To: Linus Torvalds Subject: [GIT PULL] arm64 fix for 5.9-rc8/final Message-ID: <20201001173505.GA6432@gaia> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20201001_133512_327674_47C6D6FE X-CRM114-Status: GOOD ( 12.85 ) X-Spam-Score: -4.8 (----) X-Spam-Report: SpamAssassin version 3.4.4 on merlin.infradead.org summary: Content analysis details: (-4.8 points) pts rule name description ---- ---------------------- -------------------------------------------------- -5.0 RCVD_IN_DNSWL_HI RBL: Sender listed at https://www.dnswl.org/, high trust [198.145.29.99 listed in list.dnswl.org] 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.0 SPF_PASS SPF: sender matches SPF record 0.2 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail domains are different X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Will Deacon , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org Hi Linus, Please pull the arm64 fix below. Thanks. The following changes since commit 75df529bec9110dad43ab30e2d9490242529e8b8: arm64: paravirt: Initialize steal time when cpu is online (2020-09-17 18:12:18 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux tags/arm64-fixes for you to fetch changes up to a509a66a9d0d4f4e304d58fad38c078d0336c445: arm64: permit ACPI core to map kernel memory used for table overrides (2020-09-30 22:27:51 +0100) ---------------------------------------------------------------- A previous commit to prevent AML memory opregions from accessing the kernel memory turned out to be too restrictive. Relax the permission check to permit the ACPI core to map kernel memory used for table overrides. ---------------------------------------------------------------- Ard Biesheuvel (1): arm64: permit ACPI core to map kernel memory used for table overrides arch/arm64/kernel/acpi.c | 22 ++++++++++++++++++++-- include/linux/acpi.h | 2 +- 2 files changed, 21 insertions(+), 3 deletions(-)