From patchwork Fri Nov 26 13:22:46 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Will Deacon X-Patchwork-Id: 1560143 Return-Path: X-Original-To: incoming-imx@patchwork.ozlabs.org Delivered-To: patchwork-incoming-imx@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=iY9l7sWl; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=k20201202 header.b=ULJqGfoJ; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:e::133; helo=bombadil.infradead.org; envelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org; receiver=) Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4J0wRg3QmNz9t54 for ; Sat, 27 Nov 2021 00:23:27 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Subject:Cc:To: From:Date:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=b5RJAF/1PzezVEJIURDORIRtWtdpOvoXCLEzuLWPa1w=; b=iY9l7sWlJdl4xG Yaa46adj9TgsSK5Tk9EHc441bNwDQq7m0XPWgIrOvaESFKo1O29hpM6o2k2MwMLaC9lAKOJHRJnO9 hgCbJVhgu978aNTQeOc6qKxc1wDYpVCavgjyqb1idNCiJTtpmQcaQiOR6qYpqVKUJRfUe4Py7Bnla u580TIyuM5h4Bp/0Fwrj7Xouhvq/j4FyC95yVn4N9M/rZ9OlF4IKHs8Tk7xiu/eoPFsbnzevDkMyY FAWkEjOz+7psbFPBLfzS8pSM9PtMSEfkP4CR0l35gz6fzlXiHIEPuvZo8LFYSl8yCoRJ4zZq/dgUY /wuDU0skB0AnJ9lTx40A==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1mqbBo-00AaHb-Vi; Fri, 26 Nov 2021 13:22:57 +0000 Received: from mail.kernel.org ([198.145.29.99]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1mqbBl-00AaGi-6J for linux-arm-kernel@lists.infradead.org; Fri, 26 Nov 2021 13:22:54 +0000 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7ADC360E53; Fri, 26 Nov 2021 13:22:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1637932970; bh=PNB+pY2UTXPBHUsNInngg94qXAVwoG1OVtOEIHyZKM8=; h=Date:From:To:Cc:Subject:From; b=ULJqGfoJnRpCE3ncR+zoG8Nq+ze/4yDi52VwViCr+B0S56Iaqg2tWm+elIo8ZHZrz nJmLdYWCplCIxEokdIxALsuhqH38Iozu7NvJzFcCOBcUM2y37ufY9zeP/LfS/gsJOQ XsAaIP5NpI47mKmyWBwFFk0iviKwh1oACncZX6gVNs3DhzdX51y1l87NuhD6LDkwpS HKjGILrxu4Ud7EMFcWJkAL1TPNR1mJB/NMv0HnuxWvUGdPuniMY8LdRACRX5bklWfz g2tFAV4dOnM392/akeJdIyDmOLDkoEFJohCSCNnnsK1EAKOMCDHxdKkn4cxNJQj+m0 FdXlm4p45Pd4Q== Date: Fri, 26 Nov 2021 13:22:46 +0000 From: Will Deacon To: torvalds@linux-foundation.org Cc: catalin.marinas@arm.com, mark.rutland@arm.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kernel-team@android.com Subject: [GIT PULL] arm64 fixes for -rc3 Message-ID: <20211126132245.GA20204@willie-the-truck> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20211126_052253_278101_8DF16420 X-CRM114-Status: UNSURE ( 8.12 ) X-CRM114-Notice: Please train this message. X-Spam-Score: -5.4 (-----) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hi Linus, When you get a chance, please can you pull these three arm64 fixes? The main one is a fix to the way in which we evaluate the macro arguments to our uaccess routines, which we _think_ might be the roo [...] Content analysis details: (-5.4 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -5.0 RCVD_IN_DNSWL_HI RBL: Sender listed at https://www.dnswl.org/, high trust [198.145.29.99 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain -0.2 DKIMWL_WL_HIGH DKIMwl.org - High trust sender X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org Hi Linus, When you get a chance, please can you pull these three arm64 fixes? The main one is a fix to the way in which we evaluate the macro arguments to our uaccess routines, which we _think_ might be the root cause behind some unkillable tasks we've seen in the Android arm64 CI farm (testing is ongoing). In any case, it's worth fixing. Other than that, we've toned down an over-zealous VM_BUG_ON() and fixed ftrace stack unwinding in a bunch of cases. Please pull. Thanks, Will --->8 The following changes since commit fa55b7dcdc43c1aa1ba12bca9d2dd4318c2a0dbf: Linux 5.16-rc1 (2021-11-14 13:56:52 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes for you to fetch changes up to 94902d849e85093aafcdbea2be8e2beff47233e6: arm64: uaccess: avoid blocking within critical sections (2021-11-24 09:16:26 +0000) ---------------------------------------------------------------- arm64 fixes for -rc3 - Evaluate uaccess macro arguments outside of the critical section - Tighten up VM_BUG_ON() in pmd_populate_kernel() to avoid false positive - Fix ftrace stack unwinding using HAVE_FUNCTION_GRAPH_RET_ADDR_PTR ---------------------------------------------------------------- Mark Rutland (2): arm64: ftrace: use HAVE_FUNCTION_GRAPH_RET_ADDR_PTR arm64: uaccess: avoid blocking within critical sections Pingfan Liu (1): arm64: mm: Fix VM_BUG_ON(mm != &init_mm) for trans_pgd arch/arm64/include/asm/ftrace.h | 11 +++++++++ arch/arm64/include/asm/pgalloc.h | 2 +- arch/arm64/include/asm/stacktrace.h | 6 ----- arch/arm64/include/asm/uaccess.h | 48 +++++++++++++++++++++++++++++++------ arch/arm64/kernel/ftrace.c | 6 ++--- arch/arm64/kernel/stacktrace.c | 18 +++++++------- 6 files changed, 64 insertions(+), 27 deletions(-)