Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp7026050rdb; Fri, 15 Dec 2023 15:47:37 -0800 (PST) X-Google-Smtp-Source: AGHT+IGnFToc3svMB+ffPGPi69uq3v3u0GXpm8T8mvzU4ZqB3dLYT0oHj+bCq9C1C5kNW0Z8IpEP X-Received: by 2002:a05:6a21:998a:b0:18f:ea5b:683e with SMTP id ve10-20020a056a21998a00b0018fea5b683emr16292202pzb.85.1702684056831; Fri, 15 Dec 2023 15:47:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702684056; cv=none; d=google.com; s=arc-20160816; b=xY2zEnuguEo7R5oxD2SHZHnJuVl4KImP3JVTjIRGweGAmgnztOwUO356BBvH3M2FJ2 BIQWXD/T8Wp9xKbKJxYXlx3wdBcgum/UgNjgm3zfN6LBXXKQpPi2r7yabMThDi1/XVex iOXTRW2t4N0aVh3sQ2DXBq85n20IJwVuwqoSY3YkYk236pFNd/X3VZLIEEHsDxmRYV0m HjvMUnY7YytGBWWWTnBQjZlpzOiyVa78ZoTIINfw1AZJZHgvIsUERuvp2H/8Ji5kOVyq dbmYG2lV1ukmiXHHUZNQrl88islJ6aCCPbvwf0AK2pmZWAL3aCsNlmc14/Fj6zrSUxq8 uurQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-disposition:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:message-id:subject:cc:to:from:date; bh=p6mpbmoZuzn7a/vY0GDoRLQUPjIpdTVzQ5jxxy2bbrM=; fh=ghHFViRiCSZ0gzqstWRWZxjckQxNtZ5gAs01jehtNJc=; b=NlefPa++qhZtdowwvtmak9GHV3Ml3P4N7kx/nJi6kzCcDgzg5fXL66fFT1dapmUvEi 5/s7Aq/sS1Em5BvTiHlhUGGE4W0CLLhkfCsf9dYO54y9an0pgs1HQqMNojotAYJEzqnh iCoa+PuUsBpZElSYnMKkoL1yRFj2mK2p8lKadcj4OyRrcIeTajZtY37TVRx+z2Rk+ufx xhMcbtMqkpXh39MQS6OAQ2oAtIMpeOUQPsh3KL10Zqtf0AO3WNVw9J/UsPJRZzE8DBPw SellRWqCUPt4xZtj9Ud9hDuf8C/mr9FKNM9/fhkTtvsUveCaH7MrwLgOHC/bc6BWo5gB WBiA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-1836-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-1836-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id gk6-20020a17090b118600b0028b31ee26d4si1531426pjb.167.2023.12.15.15.47.36 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Dec 2023 15:47:36 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-1836-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-1836-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-1836-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 93DACB240F0 for ; Fri, 15 Dec 2023 23:47:33 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 98A7656391; Fri, 15 Dec 2023 23:47:24 +0000 (UTC) X-Original-To: linux-kernel@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2DDA056380 for ; Fri, 15 Dec 2023 23:47:23 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C5CBEC433C7; Fri, 15 Dec 2023 23:47:22 +0000 (UTC) Date: Fri, 15 Dec 2023 23:47:20 +0000 From: Catalin Marinas To: Linus Torvalds Cc: Will Deacon , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [GIT PULL] arm64 fixes for 6.7-rc6 Message-ID: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Hi Linus, Please pull the arm64 fixes below. Thanks. The following changes since commit f5259997f3e8d6edfcc2daf5b2c0b34f074d7bc0: arm64: Avoid enabling KPTI unnecessarily (2023-11-30 19:07:33 +0000) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux tags/arm64-fixes for you to fetch changes up to 3c0696076aad60a2f04c019761921954579e1b0e: arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify (2023-12-12 16:25:26 +0000) ---------------------------------------------------------------- arm64 fixes: - Arm CMN perf: fix the DTC allocation failure path which can end up erroneously clearing live counters - arm64/mm: fix hugetlb handling of the dirty page state leading to a continuous fault loop in user on hardware without dirty bit management (DBM). That's caused by the dirty+writeable information not being properly preserved across a series of mprotect(PROT_NONE), mprotect(PROT_READ|PROT_WRITE) ---------------------------------------------------------------- James Houghton (1): arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify Robin Murphy (1): perf/arm-cmn: Fail DTC counter allocation correctly arch/arm64/include/asm/pgtable.h | 6 ++++++ drivers/perf/arm-cmn.c | 2 +- 2 files changed, 7 insertions(+), 1 deletion(-) -- Catalin