From patchwork Fri Oct 30 17:05:52 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Will Deacon X-Patchwork-Id: 1391168 Return-Path: X-Original-To: incoming-imx@patchwork.ozlabs.org Delivered-To: patchwork-incoming-imx@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2001:8b0:10b:1231::1; helo=merlin.infradead.org; envelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=merlin.20170209 header.b=ozdKNS4l; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=default header.b=XpJ1VNQu; dkim-atps=neutral Received: from merlin.infradead.org (merlin.infradead.org [IPv6:2001:8b0:10b:1231::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4CN7xq4f7Zz9sRK for ; Sat, 31 Oct 2020 04:06:23 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:MIME-Version:Message-ID:Subject:To:From:Date: Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender :Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Owner; bh=khTnNeEb87JO03N+uOd2spazfr8wK2yxq82a3TydqNI=; b=ozdKNS4lDL9GtF9sBaeYvFO90s hu4HSlyE90Ear2prwEJ5CTFhP0jGQhgcLKY7PmuBObw7DoIIRGspEBUhg87x8CuMY4xsDO6+AP9q8 SMByrxKXnX/Gwh6NNYpyoA8e+Jop+ClZhdQCWZAIEo7nGpQphmLh8OcOczvxiEoMehfw0UKw60W/p YN1b5AuRx3ZN4kBd1cYCJ1v0L4+O0roaelFtMKI2Pymih/QqYjCp5uPlbuzzG5rgUmr4gMuoKbg05 n+mHfVGWxf3erL94fn/eRkD87tH1F4MniadM6ZO2mD5lfzNnbzgkTCWKWE3Yga/P9k0V82PfrEvNq CTTTf1DQ==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1kYXql-0001cD-2G; Fri, 30 Oct 2020 17:06:03 +0000 Received: from mail.kernel.org ([198.145.29.99]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1kYXqf-0001ax-OV for linux-arm-kernel@lists.infradead.org; Fri, 30 Oct 2020 17:06:00 +0000 Received: from willie-the-truck (236.31.169.217.in-addr.arpa [217.169.31.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id CE9402075E; Fri, 30 Oct 2020 17:05:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604077556; bh=Njl1f7sTJUGbIkrVcDP2LAdv9SVEBuYpzSiBvEHmwRY=; h=Date:From:To:Cc:Subject:From; b=XpJ1VNQuDe5/glAfCLZ5zczErpPzp8K1wXe/a8JAuBkDWL21fXzVQnzGNamagQ1Jw pB+zbwtm1AkGgsDdxfeDjJ7y+AhWLNZSPKHAfmNDFbhuVV0PiQrnU0J3wV39OKwIG5 s23carmio4OvFX7ZJDYIKDHZBMyKx+4PXY9P2n+0= Date: Fri, 30 Oct 2020 17:05:52 +0000 From: Will Deacon To: torvalds@linux-foundation.org Subject: [GIT PULL] arm64 fixes for -rc2 Message-ID: <20201030170551.GA531@willie-the-truck> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20201030_130557_983965_B5D39B8C X-CRM114-Status: GOOD ( 17.18 ) X-Spam-Score: -5.2 (-----) X-Spam-Report: SpamAssassin version 3.4.4 on merlin.infradead.org summary: Content analysis details: (-5.2 points) pts rule name description ---- ---------------------- -------------------------------------------------- -5.0 RCVD_IN_DNSWL_HI RBL: Sender listed at https://www.dnswl.org/, high trust [198.145.29.99 listed in list.dnswl.org] 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.0 SPF_PASS SPF: sender matches SPF record -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.0 DKIMWL_WL_HIGH DKIMwl.org - High trust sender X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: catalin.marinas@arm.com, kernel-team@android.com, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org Hi Linus, Please pull these arm64 fixes for -rc2. The diffstat is a bit spread out thanks to an invasive CPU erratum workaround which missed the merge window and also a bunch of fixes to the recently added MTE selftests. We're aware of an arm64 kprobes regression and have a tentative fix [1], but I'd like it to sit in -next for a bit before sending it to you for -rc3. Summary in the tag. Cheers, Will [1] https://lore.kernel.org/r/20201029173440.117174-1-jean-philippe@linaro.org --->8 The following changes since commit 3650b228f83adda7e5ee532e2b90429c03f7b9ec: Linux 5.10-rc1 (2020-10-25 15:14:11 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes for you to fetch changes up to ec9d78070de986ecf581ea204fd322af4d2477ec: arm64: Change .weak to SYM_FUNC_START_WEAK_PI for arch/arm64/lib/mem*.S (2020-10-30 08:32:31 +0000) ---------------------------------------------------------------- arm64 fixes for -rc2 - Fixes to MTE kselftests - Fix return code from KVM Spectre-v2 hypercall - Build fixes for ld.lld and Clang's infamous integrated assembler - Ensure RCU is up and running before we use printk() - Workaround for Cortex-A77 erratum 1508412 - Fix linker warnings from unexpected ELF sections - Ensure PE/COFF sections are 64k aligned ---------------------------------------------------------------- Ard Biesheuvel (3): arm64: vmlinux.lds: account for spurious empty .igot.plt sections arm64: efi: increase EFI PE/COFF header padding to 64 KB module: use hidden visibility for weak symbol references Arnd Bergmann (1): arm64: avoid -Woverride-init warning Catalin Marinas (1): arm64: mte: Document that user PSTATE.TCO is ignored by kernel uaccess Fangrui Song (1): arm64: Change .weak to SYM_FUNC_START_WEAK_PI for arch/arm64/lib/mem*.S Nathan Chancellor (1): arm64: vdso32: Allow ld.lld to properly link the VDSO Qian Cai (1): arm64/smp: Move rcu_cpu_starting() earlier Rob Herring (2): arm64: Add part number for Arm Cortex-A77 arm64: Add workaround for Arm Cortex-A77 erratum 1508412 Stephen Boyd (1): KVM: arm64: ARM_SMCCC_ARCH_WORKAROUND_1 doesn't return SMCCC_RET_NOT_REQUIRED Vincenzo Frascino (6): kselftest/arm64: Fix check_buffer_fill test kselftest/arm64: Fix check_tags_inclusion test kselftest/arm64: Fix check_child_memory test kselftest/arm64: Fix check_mmap_options test kselftest/arm64: Fix check_ksm_options test kselftest/arm64: Fix check_user_mem test Documentation/arm64/memory-tagging-extension.rst | 4 +++- Documentation/arm64/silicon-errata.rst | 2 ++ arch/arm64/Kconfig | 20 +++++++++++++++++++ arch/arm64/include/asm/cache.h | 1 + arch/arm64/include/asm/cpucaps.h | 3 ++- arch/arm64/include/asm/cputype.h | 2 ++ arch/arm64/include/asm/sysreg.h | 9 +++++++++ arch/arm64/kernel/cpu_errata.c | 10 ++++++++++ arch/arm64/kernel/cpuinfo.c | 7 ++++--- arch/arm64/kernel/efi-header.S | 2 +- arch/arm64/kernel/entry.S | 3 +++ arch/arm64/kernel/proton-pack.c | 2 -- arch/arm64/kernel/smp.c | 1 + arch/arm64/kernel/vdso32/Makefile | 23 +++++++++++----------- arch/arm64/kernel/vmlinux.lds.S | 2 +- arch/arm64/kvm/arm.c | 3 ++- arch/arm64/kvm/hyp/include/hyp/switch.h | 21 ++++++++++++-------- arch/arm64/kvm/hyp/include/hyp/sysreg-sr.h | 2 +- arch/arm64/kvm/hyp/nvhe/switch.c | 2 +- arch/arm64/kvm/hyp/vhe/switch.c | 2 +- arch/arm64/kvm/hypercalls.c | 2 +- arch/arm64/kvm/sys_regs.c | 2 +- arch/arm64/lib/memcpy.S | 3 +-- arch/arm64/lib/memmove.S | 3 +-- arch/arm64/lib/memset.S | 3 +-- arch/arm64/mm/fault.c | 2 +- include/linux/arm-smccc.h | 2 ++ include/linux/module.h | 2 +- .../selftests/arm64/mte/check_buffer_fill.c | 3 +++ .../selftests/arm64/mte/check_child_memory.c | 3 +++ .../selftests/arm64/mte/check_ksm_options.c | 4 ++++ .../selftests/arm64/mte/check_mmap_options.c | 4 ++++ .../selftests/arm64/mte/check_tags_inclusion.c | 3 +++ tools/testing/selftests/arm64/mte/check_user_mem.c | 4 ++++ 34 files changed, 119 insertions(+), 42 deletions(-)