public inbox for linux-arm-kernel@lists.infradead.org
 help / color / mirror / Atom feed
From: Will Deacon <will@kernel.org>
To: torvalds@linux-foundation.org
Cc: catalin.marinas@arm.com, linux-arm-kernel@lists.infradead.org,
	linux-kernel@vger.kernel.org, kernel-team@android.com
Subject: [GIT PULL] arm64 fixes for -rc6
Date: Wed, 9 Jul 2025 16:08:48 +0100	[thread overview]
Message-ID: <aG6GAKc8EV0cERsn@willie-the-truck> (raw)

Hi Linus,

Please pull these arm64 fixes for -rc6. We've had a steady trickle of
relatively minor fixes since -rc3 but they're all self-contained 6.16
material and confined to the arch code.

There's the usual summary in the tag.

Cheers,

Will

--->8

The following changes since commit 39dfc971e42d886e7df01371cd1bef505076d84c:

  arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth() (2025-06-12 17:28:18 +0100)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes

for you to fetch changes up to 9dd1757493416310a5e71146a08bc228869f8dae:

  arm64/mm: Drop wrong writes into TCR2_EL1 (2025-07-04 16:46:04 +0100)

----------------------------------------------------------------
arm64 fixes for -rc6

- Fix bogus KASAN splat on EFI runtime stack

- Select JUMP_LABEL unconditionally to avoid boot failure with pKVM
  and the legacy implementation of static keys

- Avoid touching GCS registers when 'arm64.nogcs' has been passed on the
  command-line

- Move a 'cpumask_t' off the stack in smp_send_stop()

- Don't advertise SME-related hwcaps to userspace when ID_AA64PFR1_EL1
  indicates that SME is not implemented

- Always check the VMA when handling an Overlay fault

- Avoid corrupting TCR2_EL1 during boot

----------------------------------------------------------------
Anshuman Khandual (1):
      arm64/mm: Drop wrong writes into TCR2_EL1

Arnd Bergmann (1):
      arm64: move smp_send_stop() cpu mask off stack

Breno Leitao (1):
      arm64: efi: Fix KASAN false positive for EFI runtime stack

Kevin Brodsky (1):
      arm64: poe: Handle spurious Overlay faults

Marc Zyngier (1):
      arm64: Unconditionally select CONFIG_JUMP_LABEL

Mark Brown (2):
      arm64/gcs: Don't try to access GCS registers if arm64.nogcs is enabled
      arm64: Filter out SME hwcaps when FEAT_SME isn't implemented

 arch/arm64/Kconfig                 |  1 +
 arch/arm64/include/asm/el2_setup.h | 19 +++++--------
 arch/arm64/kernel/Makefile         |  3 +-
 arch/arm64/kernel/cpufeature.c     | 57 +++++++++++++++++++++-----------------
 arch/arm64/kernel/efi.c            | 11 ++++++--
 arch/arm64/kernel/process.c        |  5 ++++
 arch/arm64/kernel/smp.c            |  2 +-
 arch/arm64/mm/fault.c              | 30 ++++++++++++++------
 arch/arm64/mm/proc.S               |  1 -
 9 files changed, 76 insertions(+), 53 deletions(-)


             reply	other threads:[~2025-07-09 19:04 UTC|newest]

Thread overview: 33+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-07-09 15:08 Will Deacon [this message]
2025-07-09 18:37 ` [GIT PULL] arm64 fixes for -rc6 pr-tracker-bot
  -- strict thread matches above, loose matches on Subject: below --
2025-11-11 18:07 Will Deacon
2025-11-11 19:10 ` pr-tracker-bot
2024-11-01 11:22 Will Deacon
2024-11-01 18:34 ` pr-tracker-bot
2024-06-28  8:59 Will Deacon
2024-06-28 17:01 ` pr-tracker-bot
2024-02-23 10:25 Will Deacon
2024-02-23 18:44 ` pr-tracker-bot
2023-06-08 20:51 Will Deacon
2023-06-08 21:49 ` pr-tracker-bot
2021-12-15 11:19 Will Deacon
2021-12-15 16:00 ` Catalin Marinas
2021-12-15 18:49   ` Linus Torvalds
2020-11-27 11:40 Will Deacon
2020-11-27 19:19 ` pr-tracker-bot
2020-07-17 15:20 Will Deacon
2020-07-17 23:45 ` pr-tracker-bot
2019-11-01 14:32 [GIT PULL] arm64: Fixes " Will Deacon
2019-11-01 17:10 ` pr-tracker-bot
2019-08-24 12:12 Will Deacon
2019-08-24 18:45 ` pr-tracker-bot
2019-06-20 16:59 [GIT PULL] arm64: fixes " Will Deacon
2019-06-20 19:10 ` pr-tracker-bot
2019-02-08 17:35 Will Deacon
2019-02-09  0:40 ` pr-tracker-bot
2017-04-07 16:02 Will Deacon
2017-04-11 19:12 ` Jon Masters
2017-04-12  9:14   ` Will Deacon
2017-04-12 10:18     ` Punit Agrawal
2015-10-15 13:38 Will Deacon
2015-01-23 16:44 Will Deacon

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=aG6GAKc8EV0cERsn@willie-the-truck \
    --to=will@kernel.org \
    --cc=catalin.marinas@arm.com \
    --cc=kernel-team@android.com \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox