From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-15.2 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PULL_REQUEST, MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED, USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8E19BC4727E for ; Thu, 1 Oct 2020 17:36:32 +0000 (UTC) Received: from merlin.infradead.org (merlin.infradead.org [205.233.59.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 4259920872 for ; Thu, 1 Oct 2020 17:36:29 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="fBmv0YCJ" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 4259920872 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=arm.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:MIME-Version:Message-ID:Subject:To:From:Date: Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender :Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Owner; bh=D2i1Iix8DUceWqUNh3aTn8P/i9M1eVBx4aBLEc4TFlY=; b=fBmv0YCJJjAqnkprYkGEEo2hpa uTF2F+B48PB5JZqSd64r3huXCaT77qajs/1j+B6yNqqWWIxkEstSXDpbYEIFiGu9Svrgttk4yz60f ETPKuaaLRNDrACZXDdx9BN+Hm0cxfs6OU0Xcmy0Au5Gyp7gUtSFXzv/8u6fs+UCcVUJcGvXTAhvGt a9vXuv1NJDm7+bVkAtzUG4h/ckDmb4gnE2W6XsqWOZP0ndV84obf8IZcHhDXB4gcxv0mLJi/VWBFv H2BJPLyAdtCaaST7g6OyeO5leQNAz8clNtOR4ZiIY9Em6lMYmBaE4Kkr5OsCIN6dUZIQPivwRt56O kbSTHODQ==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1kO2UA-00021S-9j; Thu, 01 Oct 2020 17:35:18 +0000 Received: from mail.kernel.org ([198.145.29.99]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1kO2U4-0001yo-6f for linux-arm-kernel@lists.infradead.org; Thu, 01 Oct 2020 17:35:15 +0000 Received: from gaia (unknown [31.124.44.166]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 531512085B; Thu, 1 Oct 2020 17:35:10 +0000 (UTC) Date: Thu, 1 Oct 2020 18:35:07 +0100 From: Catalin Marinas To: Linus Torvalds Subject: [GIT PULL] arm64 fix for 5.9-rc8/final Message-ID: <20201001173505.GA6432@gaia> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20201001_133512_327674_47C6D6FE X-CRM114-Status: GOOD ( 12.85 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Will Deacon , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Hi Linus, Please pull the arm64 fix below. Thanks. The following changes since commit 75df529bec9110dad43ab30e2d9490242529e8b8: arm64: paravirt: Initialize steal time when cpu is online (2020-09-17 18:12:18 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux tags/arm64-fixes for you to fetch changes up to a509a66a9d0d4f4e304d58fad38c078d0336c445: arm64: permit ACPI core to map kernel memory used for table overrides (2020-09-30 22:27:51 +0100) ---------------------------------------------------------------- A previous commit to prevent AML memory opregions from accessing the kernel memory turned out to be too restrictive. Relax the permission check to permit the ACPI core to map kernel memory used for table overrides. ---------------------------------------------------------------- Ard Biesheuvel (1): arm64: permit ACPI core to map kernel memory used for table overrides arch/arm64/kernel/acpi.c | 22 ++++++++++++++++++++-- include/linux/acpi.h | 2 +- 2 files changed, 21 insertions(+), 3 deletions(-) -- Catalin _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel