Hi Linus,

Although we're still debugging a few minor arm64-specific issues in
mainline, I didn't want to hold this lot up in the meantime. We've got
an additional KASLR fix after the previous one wasn't quite complete, a
fix for a performance regression when mapping executable pages into
userspace and some fixes for kprobe blacklisting. All candidates for
stable and summarised in the tag.

Please pull. Thanks,

Will

--->8

The following changes since commit f17b5f06cb92ef2250513a1e154c47b78df07d40:

  Linux 5.0-rc4 (2019-01-27 15:18:05 -0800)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes

for you to fetch changes up to f7daa9c8fd191724b9ab9580a7be55cd1a67d799:

  arm64: hibernate: Clean the __hyp_text to PoC after resume (2019-02-01 
14:10:02 +0000)

----------------------------------------------------------------
arm64 fixes for -rc5

- Fix module loading when KASLR is configured but disabled at runtime

- Fix accidental IPI when mapping user executable pages

- Ensure hyp-stub and KVM world switch code cannot be kprobed

----------------------------------------------------------------
Ard Biesheuvel (1):
      arm64: kaslr: ensure randomized quantities are clean also when kaslr is 
off

Catalin Marinas (1):
      arm64: Do not issue IPIs for user executable ptes

James Morse (3):
      arm64: kprobe: Always blacklist the KVM world-switch code
      arm64: hyp-stub: Forbid kprobing of the hyp-stub
      arm64: hibernate: Clean the __hyp_text to PoC after resume

 arch/arm64/kernel/hibernate.c      | 4 +++-
 arch/arm64/kernel/hyp-stub.S       | 2 ++
 arch/arm64/kernel/kaslr.c          | 1 +
 arch/arm64/kernel/probes/kprobes.c | 6 +++---
 arch/arm64/mm/flush.c              | 6 +++++-
 5 files changed, 14 insertions(+), 5 deletions(-)

Reply via email to