From patchwork Fri Aug 16 22:37:49 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Catalin Marinas X-Patchwork-Id: 13766855 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 0B7EFC3DA4A for ; Fri, 16 Aug 2024 22:38:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:Content-Type:MIME-Version: Message-ID:Subject:Cc:To:From:Date:Reply-To:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Owner; bh=EbtENCsZ5kI8bY8BDvBus/U2HAh+S+p1OMH8ndRduTU=; b=b4ImudSDI1rC6xlByio1IkKQO5 U9r7ktxg84MVzN7/5IBt/lBNhEZ0qMriGP1iAjl7bezIZS5SfetFQ0oI3BLuG7pc8mu7YIneXyhSV cej9ajNULonsWb2gOoycbXN9vQKJXtEkIWIAVT6UTQVLACLwXAwgobMV4ZmM9UIwksAqsQibjmgNn SS5awTZEO2C0iBziQWUCoccWdewbZwDjE6K29gIOEFh+yyZjizdVpVTehVqyas3s/yyXdsEHUHOhj wTeFk53CxImLIjdPwd/I/RjW1YbJ1GDHKJcGdKIUk/xV1lB7JXO/tFCS0lsbA8bqKvn7maYWM9WzW RPYh/rBg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.97.1 #2 (Red Hat Linux)) id 1sf5ah-0000000EDV3-0PmF; Fri, 16 Aug 2024 22:38:39 +0000 Received: from sin.source.kernel.org ([145.40.73.55]) by bombadil.infradead.org with esmtps (Exim 4.97.1 #2 (Red Hat Linux)) id 1sf5a0-0000000EDMp-0QEr for linux-arm-kernel@lists.infradead.org; Fri, 16 Aug 2024 22:37:57 +0000 Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by sin.source.kernel.org (Postfix) with ESMTP id E13ABCE20CB; Fri, 16 Aug 2024 22:37:53 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 41791C32782; Fri, 16 Aug 2024 22:37:52 +0000 (UTC) Date: Fri, 16 Aug 2024 23:37:49 +0100 From: Catalin Marinas To: Linus Torvalds Cc: Will Deacon , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [GIT PULL] arm64 fixes for 6.11-rc4 Message-ID: MIME-Version: 1.0 Content-Disposition: inline X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20240816_153756_335551_0A83B960 X-CRM114-Status: GOOD ( 10.65 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Hi Linus, Please pull the arm64 fixes below. Thanks. The following changes since commit cfb00a35786414e7c0e6226b277d9f09657eae74: arm64: jump_label: Ensure patched jump_labels are visible to all CPUs (2024-08-02 15:07:01 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux tags/arm64-fixes for you to fetch changes up to f75c235565f90c4a17b125e47f1c68ef6b8c2bce: arm64: Fix KASAN random tag seed initialization (2024-08-15 11:04:56 +0100) ---------------------------------------------------------------- arm64 fixes: - Fix the arm64 __get_mem_asm() to use the _ASM_EXTABLE_##type##ACCESS() macro instead of the *_ERR() one in order to avoid writing -EFAULT to the value register in case of a fault - Initialise all elements of the acpi_early_node_map[] to NUMA_NO_NODE. Prior to this fix, only the first element was initialised - Move the KASAN random tag seed initialisation after the per-CPU areas have been initialised (prng_state is __percpu) ---------------------------------------------------------------- Haibo Xu (1): arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to NUMA_NO_NODE Mark Rutland (1): arm64: uaccess: correct thinko in __get_mem_asm() Samuel Holland (1): arm64: Fix KASAN random tag seed initialization arch/arm64/include/asm/uaccess.h | 2 +- arch/arm64/kernel/acpi_numa.c | 2 +- arch/arm64/kernel/setup.c | 3 --- arch/arm64/kernel/smp.c | 2 ++ 4 files changed, 4 insertions(+), 5 deletions(-)