Hi Linus, Although we're still debugging a few minor arm64-specific issues in mainline, I didn't want to hold this lot up in the meantime. We've got an additional KASLR fix after the previous one wasn't quite complete, a fix for a performance regression when mapping executable pages into userspace and some fixes for kprobe blacklisting. All candidates for stable and summarised in the tag.
Please pull. Thanks, Will --->8 The following changes since commit f17b5f06cb92ef2250513a1e154c47b78df07d40: Linux 5.0-rc4 (2019-01-27 15:18:05 -0800) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git tags/arm64-fixes for you to fetch changes up to f7daa9c8fd191724b9ab9580a7be55cd1a67d799: arm64: hibernate: Clean the __hyp_text to PoC after resume (2019-02-01 14:10:02 +0000) ---------------------------------------------------------------- arm64 fixes for -rc5 - Fix module loading when KASLR is configured but disabled at runtime - Fix accidental IPI when mapping user executable pages - Ensure hyp-stub and KVM world switch code cannot be kprobed ---------------------------------------------------------------- Ard Biesheuvel (1): arm64: kaslr: ensure randomized quantities are clean also when kaslr is off Catalin Marinas (1): arm64: Do not issue IPIs for user executable ptes James Morse (3): arm64: kprobe: Always blacklist the KVM world-switch code arm64: hyp-stub: Forbid kprobing of the hyp-stub arm64: hibernate: Clean the __hyp_text to PoC after resume arch/arm64/kernel/hibernate.c | 4 +++- arch/arm64/kernel/hyp-stub.S | 2 ++ arch/arm64/kernel/kaslr.c | 1 + arch/arm64/kernel/probes/kprobes.c | 6 +++--- arch/arm64/mm/flush.c | 6 +++++- 5 files changed, 14 insertions(+), 5 deletions(-)