From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id E35E6C433EF for ; Fri, 26 Nov 2021 13:24:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Subject:Cc:To: From:Date:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=b5RJAF/1PzezVEJIURDORIRtWtdpOvoXCLEzuLWPa1w=; b=iY9l7sWlJdl4xG Yaa46adj9TgsSK5Tk9EHc441bNwDQq7m0XPWgIrOvaESFKo1O29hpM6o2k2MwMLaC9lAKOJHRJnO9 hgCbJVhgu978aNTQeOc6qKxc1wDYpVCavgjyqb1idNCiJTtpmQcaQiOR6qYpqVKUJRfUe4Py7Bnla u580TIyuM5h4Bp/0Fwrj7Xouhvq/j4FyC95yVn4N9M/rZ9OlF4IKHs8Tk7xiu/eoPFsbnzevDkMyY FAWkEjOz+7psbFPBLfzS8pSM9PtMSEfkP4CR0l35gz6fzlXiHIEPuvZo8LFYSl8yCoRJ4zZq/dgUY /wuDU0skB0AnJ9lTx40A==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1mqbBo-00AaHb-Vi; Fri, 26 Nov 2021 13:22:57 +0000 Received: from mail.kernel.org ([198.145.29.99]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1mqbBl-00AaGi-6J for linux-arm-kernel@lists.infradead.org; Fri, 26 Nov 2021 13:22:54 +0000 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7ADC360E53; Fri, 26 Nov 2021 13:22:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1637932970; bh=PNB+pY2UTXPBHUsNInngg94qXAVwoG1OVtOEIHyZKM8=; h=Date:From:To:Cc:Subject:From; b=ULJqGfoJnRpCE3ncR+zoG8Nq+ze/4yDi52VwViCr+B0S56Iaqg2tWm+elIo8ZHZrz nJmLdYWCplCIxEokdIxALsuhqH38Iozu7NvJzFcCOBcUM2y37ufY9zeP/LfS/gsJOQ XsAaIP5NpI47mKmyWBwFFk0iviKwh1oACncZX6gVNs3DhzdX51y1l87NuhD6LDkwpS HKjGILrxu4Ud7EMFcWJkAL1TPNR1mJB/NMv0HnuxWvUGdPuniMY8LdRACRX5bklWfz g2tFAV4dOnM392/akeJdIyDmOLDkoEFJohCSCNnnsK1EAKOMCDHxdKkn4cxNJQj+m0 FdXlm4p45Pd4Q== Date: Fri, 26 Nov 2021 13:22:46 +0000 From: Will Deacon To: torvalds@linux-foundation.org Cc: catalin.marinas@arm.com, mark.rutland@arm.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kernel-team@android.com Subject: [GIT PULL] arm64 fixes for -rc3 Message-ID: <20211126132245.GA20204@willie-the-truck> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20211126_052253_278101_8DF16420 X-CRM114-Status: UNSURE ( 8.12 ) X-CRM114-Notice: Please train this message. X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Hi Linus, When you get a chance, please can you pull these three arm64 fixes? The main one is a fix to the way in which we evaluate the macro arguments to our uaccess routines, which we _think_ might be the root cause behind some unkillable tasks we've seen in the Android arm64 CI farm (testing is ongoing). In any case, it's worth fixing. Other than that, we've toned down an over-zealous VM_BUG_ON() and fixed ftrace stack unwinding in a bunch of cases. Please pull. Thanks, Will --->8 The following changes since commit fa55b7dcdc43c1aa1ba12bca9d2dd4318c2a0dbf: Linux 5.16-rc1 (2021-11-14 13:56:52 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes for you to fetch changes up to 94902d849e85093aafcdbea2be8e2beff47233e6: arm64: uaccess: avoid blocking within critical sections (2021-11-24 09:16:26 +0000) ---------------------------------------------------------------- arm64 fixes for -rc3 - Evaluate uaccess macro arguments outside of the critical section - Tighten up VM_BUG_ON() in pmd_populate_kernel() to avoid false positive - Fix ftrace stack unwinding using HAVE_FUNCTION_GRAPH_RET_ADDR_PTR ---------------------------------------------------------------- Mark Rutland (2): arm64: ftrace: use HAVE_FUNCTION_GRAPH_RET_ADDR_PTR arm64: uaccess: avoid blocking within critical sections Pingfan Liu (1): arm64: mm: Fix VM_BUG_ON(mm != &init_mm) for trans_pgd arch/arm64/include/asm/ftrace.h | 11 +++++++++ arch/arm64/include/asm/pgalloc.h | 2 +- arch/arm64/include/asm/stacktrace.h | 6 ----- arch/arm64/include/asm/uaccess.h | 48 +++++++++++++++++++++++++++++++------ arch/arm64/kernel/ftrace.c | 6 ++--- arch/arm64/kernel/stacktrace.c | 18 +++++++------- 6 files changed, 64 insertions(+), 27 deletions(-) _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel