From patchwork Fri Aug 26 17:58:58 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Will Deacon X-Patchwork-Id: 1670978 Return-Path: X-Original-To: incoming-imx@patchwork.ozlabs.org Delivered-To: patchwork-incoming-imx@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org; envelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=rEro7oae; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=k20201202 header.b=n0YHMPnL; dkim-atps=neutral Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4MDnfH376mz1yhN for ; Sat, 27 Aug 2022 03:59:33 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Subject:Cc:To: From:Date:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=VsVHXPrf8hzciXrr6/191/z2kJJLAWf2dEEJqGqrP3g=; b=rEro7oaehp1o0B aj6ZDZeXJbGO309f9TjsibxjeSuuTixu0e/XU2T+ndmwaOiDBGOkIRO13uW2gp+XT6EeKxKckyLBj 1+CNOlLhWxWg/hDnb6Bgamk6Y2RYj9tH9ImT7V6P6H9CZpj2ekrhubJ5ewBjvrk2lQRHjN391hKSC Shjew69qLiBI4YtGKHdvYEXojmTPHuq8VzhAVpp9w/x43I5+YZeCkNtJY2H6Qqa2BaNAPt6zzptWm 5FA1k47gmuzgDZAegkTv6ag2F+LllTUFVh+gUF14mGnYkMZMjfXwZzfwvW3RuSkT8U798OXoNSXss 5ff6bfTkZhFJ18j7owew==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1oRdbp-009VZQ-Aw; Fri, 26 Aug 2022 17:59:09 +0000 Received: from ams.source.kernel.org ([2604:1380:4601:e00::1]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1oRdbm-009VWm-2J for linux-arm-kernel@lists.infradead.org; Fri, 26 Aug 2022 17:59:07 +0000 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id B07A5B82EFF; Fri, 26 Aug 2022 17:59:04 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 53A8DC433D6; Fri, 26 Aug 2022 17:59:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1661536743; bh=ML00VXZq74rLsWSCPX4qAUs7nJr27zkTJK9wwnNrUbE=; h=Date:From:To:Cc:Subject:From; b=n0YHMPnLk7UG56gX/qdLwzPEa70Y4IgWbTREGMm3zHRclNTr3of4ek0ZL0n1ICowK WPjwvomEi6DTN7QDnQS6QkVfl/mdkjzcavgBaJO24j1kW8u4F7n/geHGy15PvgkcNX L4w4ijS2dDOhlmSLgY50uY7cMdWrvgjWHLxXwESyTU8BCJQAOxTWZMduT31BC+GyoV OFtEIGLdCe7iQSRitdJwANCwsDLKKbve/DimVPx4P0PJYnV9Mpq9OQn60Z869iDcfo LsBh6UlOUPwPqP7knO7vCNkh9fnJwHqkjQ7iQvTsEdJWaauPNYhIXTAZ1at4TFdabU 9Sip9ejz4KodQ== Date: Fri, 26 Aug 2022 18:58:58 +0100 From: Will Deacon To: torvalds@linux-foundation.org Cc: catalin.marinas@arm.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kernel-team@android.com Subject: [GIT PULL] arm64 fixes for -rc3 Message-ID: <20220826175857.GA20431@willie-the-truck> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220826_105906_419583_CA372A1B X-CRM114-Status: GOOD ( 16.56 ) X-Spam-Score: -5.4 (-----) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hi Linus, Please pull this bumper crop of arm64 fixes for -rc3. The usual summary is in the tag, but the largest change is fixing our parsing of the 'rodata=full' command line option, which kstrtobool() started [...] Content analysis details: (-5.4 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -5.0 RCVD_IN_DNSWL_HI RBL: Sender listed at https://www.dnswl.org/, high trust [2604:1380:4601:e00:0:0:0:1 listed in] [list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain -0.2 DKIMWL_WL_HIGH DKIMwl.org - High trust sender X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org Hi Linus, Please pull this bumper crop of arm64 fixes for -rc3. The usual summary is in the tag, but the largest change is fixing our parsing of the 'rodata=full' command line option, which kstrtobool() started treating as 'rodata=false'. The fix actually makes the parsing of that option much less fragile and updates the documentation at the same time. We still have a boot issue pending when KASLR is disabled at compile time, but there's a fresh fix on the list which I'll send next week if it holds up to testing. Cheers, Will --->8 The following changes since commit 568035b01cfb107af8d2e4bd2fb9aea22cf5b868: Linux 6.0-rc1 (2022-08-14 15:50:18 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes for you to fetch changes up to 714f3cbd70a4db9f9b7fe5b8a032896ed33fb824: arm64/sme: Don't flush SVE register state when handling SME traps (2022-08-23 11:29:12 +0100) ---------------------------------------------------------------- arm64 fixes for -rc3 - Fix workaround for Cortex-A76 erratum #1286807 - Add workaround for AMU erratum #2457168 on Cortex-A510 - Drop reference to removed CONFIG_ARCH_RANDOM #define - Fix parsing of the "rodata=full" cmdline option - Fix a bunch of issues in the SME register state switching and sigframe code - Fix incorrect extraction of the CTR_EL0.CWG register field - Fix ACPI cache topology probing when the PPTT is not present - Trivial comment and whitespace fixes ---------------------------------------------------------------- Ionela Voinescu (1): arm64: errata: add detection for AMEVCNTR01 incrementing incorrectly Kuan-Ying Lee (1): arm64: Fix comment typo Lukas Bulwahn (1): arm64: adjust KASLR relocation after ARCH_RANDOM removal Mark Brown (7): arm64/sysreg: Directly include bitfield.h arm64/sysreg: Guard SYS_FIELD_ macros for asm arm64/cache: Fix cache_type_cwg() for register generation arm64/signal: Raise limit on stack frames arm64/signal: Flush FPSIMD register state when disabling streaming mode arm64/sme: Don't flush SVE register state when allocating SME storage arm64/sme: Don't flush SVE register state when handling SME traps Mark Rutland (1): arm64: fix rodata=full Martin Liška (1): docs/arm64: elf_hwcaps: unify newlines in HWCAP lists Sudeep Holla (1): arm64: cacheinfo: Fix incorrect assignment of signed error value to unsigned fw_level Zenghui Yu (1): arm64: Fix match_list for erratum 1286807 on Arm Cortex-A76 Documentation/admin-guide/kernel-parameters.txt | 2 ++ Documentation/arm64/elf_hwcaps.rst | 10 -------- Documentation/arm64/silicon-errata.rst | 2 ++ arch/arm64/Kconfig | 17 +++++++++++++ arch/arm64/include/asm/cache.h | 2 +- arch/arm64/include/asm/fpsimd.h | 4 ++-- arch/arm64/include/asm/setup.h | 17 +++++++++++++ arch/arm64/include/asm/sysreg.h | 5 ++-- arch/arm64/kernel/cacheinfo.c | 6 ++++- arch/arm64/kernel/cpu_errata.c | 12 ++++++++++ arch/arm64/kernel/cpufeature.c | 5 +++- arch/arm64/kernel/entry.S | 2 +- arch/arm64/kernel/fpsimd.c | 21 +++++----------- arch/arm64/kernel/pi/kaslr_early.c | 8 +++---- arch/arm64/kernel/ptrace.c | 6 ++--- arch/arm64/kernel/signal.c | 14 +++++++++-- arch/arm64/kernel/topology.c | 32 +++++++++++++++++++++++-- arch/arm64/mm/mmu.c | 18 -------------- arch/arm64/tools/cpucaps | 1 + init/main.c | 18 +++++++++++--- 20 files changed, 136 insertions(+), 66 deletions(-)