From patchwork Fri Sep 2 11:12:05 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Will Deacon X-Patchwork-Id: 1673539 Return-Path: X-Original-To: incoming-imx@patchwork.ozlabs.org Delivered-To: patchwork-incoming-imx@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org; envelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=j7GORUa7; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256 header.s=k20201202 header.b=ZYfpC2CG; dkim-atps=neutral Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4MJwHM48cCz1yhK for ; Fri, 2 Sep 2022 21:12:31 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Subject:Cc:To: From:Date:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=kAk4gYGFwYQJ7K3wUYraRml0LH3rUbANdlnjYO3DgLs=; b=j7GORUa7UwBjbX VG2MQ2irzCjDezClsmWheZhzZs1oJuZn/2lZOjLOgIhQf30GcHEmCNuRftMUEq8PE0frvFyg4ZPCa W01zE7jeTxy3ZQe80fLF0AiNtAiGnYemlevBbJxtcOTiItDvBvNpMfgEfEYuNiHwxPWzxQkycPKha dneyObgA2QdNoGGCWMZ5BvxayyWvMr4p2XwHBdFvT01v19JxL3n+15oEYBHMv+PIfNz7l9qbYYOkp MzOSN5JB4u5U8AqJS9XN5/A9esGAqOm+kRlAONJFy1+a/liVSqGAjdRaU6D7e76+BOmdYzV7SDszW R1QZEnFoygS8tvvA56HA==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1oU4as-003r2O-Ai; Fri, 02 Sep 2022 11:12:14 +0000 Received: from dfw.source.kernel.org ([2604:1380:4641:c500::1]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1oU4ao-003r0h-Uu for linux-arm-kernel@lists.infradead.org; Fri, 02 Sep 2022 11:12:12 +0000 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 585336203D; Fri, 2 Sep 2022 11:12:10 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0D1E9C433C1; Fri, 2 Sep 2022 11:12:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1662117130; bh=/QVsmuyia5+3J+DfDubjMTWJVlKxzCNx6ax9d23OoFg=; h=Date:From:To:Cc:Subject:From; b=ZYfpC2CGyWQI6Ze09dVx2SYgZAcRtIIT4T3T4nTLST09EWuFf4GtZCRhIDSABoK/I 5bIus93l7FMrjC/9zYtm+LnelsY/8FaNty080+hwkEv1Gh3jUy04tN5RHbDhqNZWrY HZUeYC60tX2rvfCdALS+RF6HyIDcNaagRgOllGGL8tPaigxY5+pADghf1GJPZ32q6c Df96EeysqHPf7f+JzonQB+tv8R81RZsSM5jLuRD2uc2MZk+Oqx0zY3aJ6rbQ/e1DzG Xijd4C/AvE0f5WvIkPNtrF5fmKMTInbrHoxsStiClXiBXR1Bcrln6Hk9nksqqEETMh iBOlttVzNuGog== Date: Fri, 2 Sep 2022 12:12:05 +0100 From: Will Deacon To: torvalds@linux-foundation.org Cc: catalin.marinas@arm.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kernel-team@android.com Subject: [GIT PULL] arm64 fixes for -rc4 Message-ID: <20220902111204.GA25902@willie-the-truck> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220902_041211_055741_432D0B2E X-CRM114-Status: GOOD ( 13.63 ) X-Spam-Score: -5.4 (-----) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hi Linus, Please pull these arm64 fixes for -rc4. It's a lot smaller than last week, with the star of the show being a couple of fixes to head.S addressing a boot regression introduced by the recent overhaul of that code in non-default configurations [...] Content analysis details: (-5.4 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -5.0 RCVD_IN_DNSWL_HI RBL: Sender listed at https://www.dnswl.org/, high trust [2604:1380:4641:c500:0:0:0:1 listed in] [list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from envelope-from domain -0.2 DKIMWL_WL_HIGH DKIMwl.org - High trust sender X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org Hi Linus, Please pull these arm64 fixes for -rc4. It's a lot smaller than last week, with the star of the show being a couple of fixes to head.S addressing a boot regression introduced by the recent overhaul of that code in non-default configurations (i.e. KASLR disabled). The first of those two resolves the issue reported (and bisected) by Mikulus in the wait_on_bit() thread. Cheers, Will --->8 The following changes since commit 714f3cbd70a4db9f9b7fe5b8a032896ed33fb824: arm64/sme: Don't flush SVE register state when handling SME traps (2022-08-23 11:29:12 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes for you to fetch changes up to 5fbc49cef91916140a305f22f7430e9a7ea0c6b4: arm64: mm: Reserve enough pages for the initial ID map (2022-09-01 12:02:39 +0100) ---------------------------------------------------------------- arm64 fixes for -rc4 - Fix two boot issues caused by the recent head.S rework when !KASLR - Fix calculation of crashkernel memory reservation - Fix bogus error check in PMU IRQ probing code ---------------------------------------------------------------- Ard Biesheuvel (2): arm64: head: Ignore bogus KASLR displacement on non-relocatable kernels arm64: mm: Reserve enough pages for the initial ID map Levi Yun (1): arm64/kexec: Fix missing extra range for crashkres_low. Yu Zhe (1): perf/arm_pmu_platform: fix tests for platform_get_irq() failure arch/arm64/include/asm/kernel-pgtable.h | 26 +++++++++++++------------- arch/arm64/kernel/head.S | 2 ++ arch/arm64/kernel/machine_kexec_file.c | 2 +- drivers/perf/arm_pmu_platform.c | 2 +- 4 files changed, 17 insertions(+), 15 deletions(-)