Message ID | 20240119160528.GA5336@willie-the-truck |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel+bounces-31338-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7301:2bc4:b0:101:a8e8:374 with SMTP id hx4csp1106481dyb; Fri, 19 Jan 2024 08:05:49 -0800 (PST) X-Google-Smtp-Source: AGHT+IFTgSsblsT9viuoPZ1cRI2tVYztORjIvHEB7l17uCfTdybERC17Jjx8nsuKKSSFmOamdzIS X-Received: by 2002:a05:6a20:da85:b0:19a:757f:2db5 with SMTP id iy5-20020a056a20da8500b0019a757f2db5mr49093pzb.8.1705680349625; Fri, 19 Jan 2024 08:05:49 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1705680349; cv=pass; d=google.com; s=arc-20160816; b=PSPp/F3XV/pnofOcPxirbi0corNaVoRvWnqRG2cKVaHg9rcALz69zwHUUwCa4GeokE +3VjDpNHcsgA7yaAh4MTA5hUwe2HSIKo+Y1lFl92edDF0VT3FPATjHca6H6Nul1Vyots XAWcTOCoZQAivMgt1mWijGsQHGk5FgmXeLvIn/hPnvOfUWJK9+drHk/99Ue+x1ZPlFCp x4iW9yn/P3nsBb0iKw3tyKUXsbEwp027EXy1HH8px1Rk+tUtdbeMHxhD3oyrUmxrbaNW 9b4wflzTQPnxhvmLYH35QFycYu8BECab3Znc0EhyD+JRrKiLr59Gl+bNG0ShLz3D571U T7Ig== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=user-agent:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:subject:cc:to:from :date:dkim-signature; bh=E1Z7D5EDA3WMpqvClFa7AMcesud9HJm5XcXpp069A8c=; fh=L6V9qEdkPu+iq5y3zjaDGrlzk+LOToC9LUobg7R9gIE=; b=Sukp5eqWU2UCRtBQBYDUBNliXaz6HOhUdQXxLZQWzft+0EHjG52r863d6uWyffShY0 EpRKu0t7CEZh4Eeyzd9auuDtRJIm+cPSbIcxctBi4QCyAzOne7x15donwgCA9HPmyDiJ 4nOvx0SAS7KBkkrDhnmaavlHUWFFkhhe3vic6iu6WtLOowWYneAcyIDZDdvK15YteCQP dI1PWYZbtmgaJLVR151GLksKJqljDs9mVhqvqyfdYTyqe1wlFa8WawDYFHe8Iog3aJUc S/F3yyv873lXQusrNSurbIa/vGXZOrJxB+f7fAJEuiTwma6jvK6FwLJSk3bKE7S1jdLX kv3g== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=cqAGzaJD; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-31338-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-31338-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id bq7-20020a056a02044700b005b8f61fcba6si3632197pgb.452.2024.01.19.08.05.49 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 19 Jan 2024 08:05:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-31338-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=cqAGzaJD; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-31338-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-31338-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 877A22888F9 for <ouuuleilei@gmail.com>; Fri, 19 Jan 2024 16:05:48 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id ECF4254F90; Fri, 19 Jan 2024 16:05:36 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="cqAGzaJD" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4750452F61 for <linux-kernel@vger.kernel.org>; Fri, 19 Jan 2024 16:05:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705680334; cv=none; b=Ga4JTfFsVeIQz+UPd9uCKQI59s/Nod8gAb47cpdJLZ/UFlQ7p1wzcWJnu6+l1oW/N6jVszO4hbI7LYSoipM2GZS7qhT/dfc+VAPS+FF9jSI88pKXxe5Ie5a1APOqfpQeJ0q8oo9+l+nbEeg/hrZ6idQ/5gIAF4D8kxB9S6HvcXk= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705680334; c=relaxed/simple; bh=0vsHCEB7uarmRqxKL7SMqn2/4sulPPxduy3Gu7w9gBY=; h=Date:From:To:Cc:Subject:Message-ID:MIME-Version:Content-Type: Content-Disposition; b=POftR1ycKvNrLqHFes7cGydZPMbmavCU54bLbSO+LVGWRh6E44sqpN7bqZ7PhEu+pEjVyOBezA6rcbS3F3+VyBKlHA5PM4qDT3hifnukFN/DE3mJRgPBSX6xViF44cFKPcnL9suqjEf41/AfgF/9sJm/gcSy2Qq8HpafwrbFNVQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=cqAGzaJD; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 80513C433F1; Fri, 19 Jan 2024 16:05:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1705680333; bh=0vsHCEB7uarmRqxKL7SMqn2/4sulPPxduy3Gu7w9gBY=; h=Date:From:To:Cc:Subject:From; b=cqAGzaJDT85GFYQboa5RY7etRf5pZD3PUJvf670EaTTN6cL+Rl/tgkEIjqB5U//Lt 5Xnf7HcZ9nowHWIfmwbnoqb/5hZ5iGCBUYUtcRtoi/1XZQFbqU5HKOytORJgvEwZZk HJmb4PNAq9QRgm6dQJ2ioPFc1qladJCzSUYr65zmeJdSTB9xKjqTZ41nPp/zpS8VBZ tFLQRv/V5ePy0r2qFLi5l/37Ub2J1CSfD32OqWM4wfJSksYy07MvN82ua2zBiPxNB/ z6+jPfpKGH2CcFb/YInEyPp07iY1YdZt1W3/vtt5m6qQ+lI5+4XBSs2B7KZVUnVXMU xYjS+RtRWU9gw== Date: Fri, 19 Jan 2024 16:05:28 +0000 From: Will Deacon <will@kernel.org> To: torvalds@linux-foundation.org Cc: catalin.marinas@arm.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kernel-team@android.com Subject: [GIT PULL] arm64 fixes for -rc1 Message-ID: <20240119160528.GA5336@willie-the-truck> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1788535478041677452 X-GMAIL-MSGID: 1788535478041677452 |
Series |
[GIT,PULL] arm64 fixes for -rc1
|
|
Pull-request
git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixesMessage
Will Deacon
Jan. 19, 2024, 4:05 p.m. UTC
Hi Linus, Please pull these arm64 fixes for -rc1. I think the main one is fixing the dynamic SCS patching when full LTO is enabled (clang was silently getting this horribly wrong), but it's all good stuff. Rob just pointed out that the fix to the workaround for erratum #2966298 might not be necessary, but in the worst case it's harmless and since the official description leaves a little to be desired here, I've left it in. Cheers, Will --->8 The following changes since commit db32cf8e280b46726065c518e90761bb0229bacf: Merge branch 'for-next/fixes' into for-next/core (2024-01-04 12:32:33 +0000) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes for you to fetch changes up to 1b20d0486a602417defb5bf33320d31b2a7a47f8: arm64: Fix silcon-errata.rst formatting (2024-01-18 11:15:43 +0000) ---------------------------------------------------------------- arm64 fixes for -rc1 - Fix shadow call stack patching with LTO=full - Fix voluntary preemption of the FPSIMD registers from assembly code - Fix workaround for A520 CPU erratum #2966298 and extend to A510 - Fix SME issues that resulted in corruption of the register state - Minor fixes (missing includes, formatting) ---------------------------------------------------------------- Ard Biesheuvel (2): arm64: scs: Work around full LTO issue with dynamic SCS arm64: fpsimd: Bring cond_yield asm macro in line with new rules Mark Brown (3): arm64/ptrace: Don't flush ZA/ZT storage when writing ZA via ptrace arm64/fpsimd: Remove spurious check for SVE support arm64/sme: Always exit sme_alloc() early with existing storage Mark Rutland (2): arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD arm64: entry: simplify kernel_exit logic Rob Herring (2): arm64: Rename ARM64_WORKAROUND_2966298 arm64: errata: Add Cortex-A510 speculative unprivileged load workaround Robin Murphy (1): arm64: Fix silcon-errata.rst formatting Tudor Ambarus (1): arm64: irq: include <linux/cpumask.h> Documentation/arch/arm64/silicon-errata.rst | 4 ++-- arch/arm64/Kconfig | 18 ++++++++++++++++++ arch/arm64/include/asm/assembler.h | 25 +++++++++---------------- arch/arm64/include/asm/irq.h | 2 ++ arch/arm64/kernel/Makefile | 8 +++++++- arch/arm64/kernel/asm-offsets.c | 2 -- arch/arm64/kernel/cpu_errata.c | 21 +++++++++++++++++---- arch/arm64/kernel/entry.S | 25 ++++++++++++++----------- arch/arm64/kernel/fpsimd.c | 12 ++++++------ arch/arm64/kernel/ptrace.c | 13 +++++++------ arch/arm64/tools/cpucaps | 2 +- 11 files changed, 83 insertions(+), 49 deletions(-)
Comments
On Fri, Jan 19, 2024 at 04:05:28PM +0000, Will Deacon wrote: > Hi Linus, > > Please pull these arm64 fixes for -rc1. I think the main one is fixing > the dynamic SCS patching when full LTO is enabled (clang was silently > getting this horribly wrong), but it's all good stuff. Rob just pointed > out that the fix to the workaround for erratum #2966298 might not be > necessary, but in the worst case it's harmless and since the official > description leaves a little to be desired here, I've left it in. > > Cheers, > > Will > > --->8 > > The following changes since commit db32cf8e280b46726065c518e90761bb0229bacf: > > Merge branch 'for-next/fixes' into for-next/core (2024-01-04 12:32:33 +0000) > > are available in the Git repository at: > > git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes > > for you to fetch changes up to 1b20d0486a602417defb5bf33320d31b2a7a47f8: > > arm64: Fix silcon-errata.rst formatting (2024-01-18 11:15:43 +0000) > > ---------------------------------------------------------------- > arm64 fixes for -rc1 > > - Fix shadow call stack patching with LTO=full > > - Fix voluntary preemption of the FPSIMD registers from assembly code > > - Fix workaround for A520 CPU erratum #2966298 and extend to A510 > > - Fix SME issues that resulted in corruption of the register state > > - Minor fixes (missing includes, formatting) > > ---------------------------------------------------------------- > Ard Biesheuvel (2): > arm64: scs: Work around full LTO issue with dynamic SCS > arm64: fpsimd: Bring cond_yield asm macro in line with new rules > > Mark Brown (3): > arm64/ptrace: Don't flush ZA/ZT storage when writing ZA via ptrace > arm64/fpsimd: Remove spurious check for SVE support > arm64/sme: Always exit sme_alloc() early with existing storage > > Mark Rutland (2): > arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD I've commented on the patch, but this doesn't fix anything. The original work-around was fine. Rob
On Fri, Jan 19, 2024 at 10:34 AM Rob Herring <robh@kernel.org> wrote: > > On Fri, Jan 19, 2024 at 04:05:28PM +0000, Will Deacon wrote: > > Hi Linus, > > > > Please pull these arm64 fixes for -rc1. I think the main one is fixing > > the dynamic SCS patching when full LTO is enabled (clang was silently > > getting this horribly wrong), but it's all good stuff. Rob just pointed > > out that the fix to the workaround for erratum #2966298 might not be > > necessary, but in the worst case it's harmless and since the official > > description leaves a little to be desired here, I've left it in. > > > > Cheers, > > > > Will > > > > --->8 > > > > The following changes since commit db32cf8e280b46726065c518e90761bb0229bacf: > > > > Merge branch 'for-next/fixes' into for-next/core (2024-01-04 12:32:33 +0000) > > > > are available in the Git repository at: > > > > git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes > > > > for you to fetch changes up to 1b20d0486a602417defb5bf33320d31b2a7a47f8: > > > > arm64: Fix silcon-errata.rst formatting (2024-01-18 11:15:43 +0000) > > > > ---------------------------------------------------------------- > > arm64 fixes for -rc1 > > > > - Fix shadow call stack patching with LTO=full > > > > - Fix voluntary preemption of the FPSIMD registers from assembly code > > > > - Fix workaround for A520 CPU erratum #2966298 and extend to A510 > > > > - Fix SME issues that resulted in corruption of the register state > > > > - Minor fixes (missing includes, formatting) > > > > ---------------------------------------------------------------- > > Ard Biesheuvel (2): > > arm64: scs: Work around full LTO issue with dynamic SCS > > arm64: fpsimd: Bring cond_yield asm macro in line with new rules > > > > Mark Brown (3): > > arm64/ptrace: Don't flush ZA/ZT storage when writing ZA via ptrace > > arm64/fpsimd: Remove spurious check for SVE support > > arm64/sme: Always exit sme_alloc() early with existing storage > > > > Mark Rutland (2): > > arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD > > I've commented on the patch, but this doesn't fix anything. The original > work-around was fine. Sorry, failed to read your commentary at the top. I suppose all this is fine. It would be nice to have a chance to see all this before it gets sent upstream. Rob
The pull request you sent on Fri, 19 Jan 2024 16:05:28 +0000:
> git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/18b5cb6cb85c2ac96b8e94e698d11b909225ce4a
Thank you!