From patchwork Fri May 13 16:52:35 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Will Deacon X-Patchwork-Id: 1630839 Return-Path: X-Original-To: incoming-imx@patchwork.ozlabs.org Delivered-To: patchwork-incoming-imx@bilbo.ozlabs.org Authentication-Results: bilbo.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=lHUU0oZ+; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=k20201202 header.b=mI+7RmCY; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:e::133; helo=bombadil.infradead.org; envelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org; receiver=) Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by bilbo.ozlabs.org (Postfix) with ESMTPS id 4L0F864GMLz9sBF for ; Sat, 14 May 2022 02:53:10 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Subject:Cc:To: From:Date:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=WMctfOqBbABiTQLDN0wa9x3orCd6e9OLvGq0dTI1xBE=; b=lHUU0oZ+ZhW+gU SE7KhDD2GTjvlN7i1km5X6OkHPohl//yDk4hD+wODjl3rKb5M+2HM3PD7bs5/tUaeTP798ord70Qd exU+D+FB2Ts2lymSDHCc6MtfYNU9tpyty9pxfXB6p63hpLrQM/MMknueKlyrGYIh7gjE06GJ3YeaS kzmofKIAADaGp/NPuvg4HE7eP/es0gYxoyx5S2Lrkpj12Dnm/vldqbxhHbtbfW8OY+NmpCA6MciGP zrOHwUK2Op7Uu7cUnyi/ZQVmw/FiOaO66Kodm2dV+UfcU5n3QqhEQGVvSwKc6Clu9pKW/O2rICLCv WAGU+mI1RHqTgXJ646IQ==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1npYXA-00GvcL-FG; Fri, 13 May 2022 16:52:56 +0000 Received: from dfw.source.kernel.org ([2604:1380:4641:c500::1]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1npYWw-00GvSR-J3 for linux-arm-kernel@lists.infradead.org; Fri, 13 May 2022 16:52:43 +0000 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 703B361E83; Fri, 13 May 2022 16:52:41 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A8104C34100; Fri, 13 May 2022 16:52:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1652460760; bh=9+uLG6DacTmT7ZHwIV8mCWTe/BIRO1BxcapPZy6v4h0=; h=Date:From:To:Cc:Subject:From; b=mI+7RmCYSuJY3Mph3/sGxsm9laPe+0mCazl4YiIgEh3EkFQLpIKYqF29IBeAMFtup UGAyZP8Bip0kWab+Kk3nQhYvLhyBsFZZLo8XRs/GR/h0L2JEFhNa8eR3iwTor8AMdp 7DQx+DXF0xLbKVs/NEoBC8/gBlhOEkYE1VZIO1LKn61gSqglRwBow+F3WsJ9hTA9Dx IiX6Xd3+5/tCzvFuegNRcy9ttSNbcw7PSAsfEJ/EUy+kYFUakFWogTV5PM0h32Hoda nvEary/1E08u4yZ4Pr73OkfChbCqjY09WiHNwqaev9/zzwl4M9DTuydb1z9kBsHSdu hVBA9H65vDi7A== Date: Fri, 13 May 2022 17:52:35 +0100 From: Will Deacon To: torvalds@linux-foundation.org Cc: catalin.marinas@arm.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kernel-team@android.com Subject: [GIT PULL] arm64 fixes for -rc7 Message-ID: <20220513165233.GA32168@willie-the-truck> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220513_095242_680137_A17C79CD X-CRM114-Status: GOOD ( 11.22 ) X-Spam-Score: -5.4 (-----) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hi Linus, Please pull these three arm64 fixes for -rc7. The summary is in the tag but it's all pretty straightforward. Thanks, Content analysis details: (-5.4 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -5.0 RCVD_IN_DNSWL_HI RBL: Sender listed at https://www.dnswl.org/, high trust [2604:1380:4641:c500:0:0:0:1 listed in] [list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain -0.2 DKIMWL_WL_HIGH DKIMwl.org - High trust sender X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org Hi Linus, Please pull these three arm64 fixes for -rc7. The summary is in the tag but it's all pretty straightforward. Thanks, Will --->8 The following changes since commit c35fe2a68f29a0bda15ae994154cacaae5f69791: elf: Fix the arm64 MTE ELF segment name and value (2022-04-28 11:37:06 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes for you to fetch changes up to 51f559d66527e238f9a5f82027bff499784d4eac: arm64: Enable repeat tlbi workaround on KRYO4XX gold CPUs (2022-05-12 13:15:38 +0100) ---------------------------------------------------------------- arm64 fixes for -rc7 - TLB invalidation workaround for Qualcomm Kryo-4xx "gold" CPUs - Fix broken dependency in the vDSO Makefile - Fix pointer authentication overrides in ISAR2 ID register ---------------------------------------------------------------- Joey Gouly (1): arm64: vdso: fix makefile dependency on vdso.so Kristina Martsenko (1): arm64: cpufeature: remove duplicate ID_AA64ISAR2_EL1 entry Shreyas K K (1): arm64: Enable repeat tlbi workaround on KRYO4XX gold CPUs Documentation/arm64/silicon-errata.rst | 3 +++ arch/arm64/kernel/Makefile | 4 ++++ arch/arm64/kernel/cpu_errata.c | 2 ++ arch/arm64/kernel/cpufeature.c | 3 +-- arch/arm64/kernel/vdso/Makefile | 3 --- arch/arm64/kernel/vdso32/Makefile | 3 --- 6 files changed, 10 insertions(+), 8 deletions(-)