1. 22 1月, 2019 3 次提交
  2. 20 1月, 2019 2 次提交
  3. 17 1月, 2019 3 次提交
  4. 16 1月, 2019 6 次提交
    • M
      ia64: remove redundant 'export AWK' · be3bb599
      Masahiro Yamada 提交于
      This is exported by the top Makefile.
      Signed-off-by: NMasahiro Yamada <yamada.masahiro@socionext.com>
      be3bb599
    • M
      kbuild: remove unused archmrproper · b421b8a6
      Masahiro Yamada 提交于
      No one uses archmrproper.
      Signed-off-by: NMasahiro Yamada <yamada.masahiro@socionext.com>
      b421b8a6
    • A
      kasan, arm64: remove redundant ARCH_SLAB_MINALIGN define · 7fa1e2e6
      Andrey Konovalov 提交于
      Defining ARCH_SLAB_MINALIGN in arch/arm64/include/asm/cache.h when KASAN
      is off is not needed, as it is defined in defined in include/linux/slab.h
      as ifndef.
      Signed-off-by: NAndrey Konovalov <andreyknvl@google.com>
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      7fa1e2e6
    • A
      arm64: kaslr: ensure randomized quantities are clean to the PoC · 1598ecda
      Ard Biesheuvel 提交于
      kaslr_early_init() is called with the kernel mapped at its
      link time offset, and if it returns with a non-zero offset,
      the kernel is unmapped and remapped again at the randomized
      offset.
      
      During its execution, kaslr_early_init() also randomizes the
      base of the module region and of the linear mapping of DRAM,
      and sets two variables accordingly. However, since these
      variables are assigned with the caches on, they may get lost
      during the cache maintenance that occurs when unmapping and
      remapping the kernel, so ensure that these values are cleaned
      to the PoC.
      Acked-by: NCatalin Marinas <catalin.marinas@arm.com>
      Fixes: f80fb3a3 ("arm64: add support for kernel ASLR")
      Cc: <stable@vger.kernel.org> # v4.6+
      Signed-off-by: NArd Biesheuvel <ard.biesheuvel@linaro.org>
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      1598ecda
    • J
      arm64: kpti: Update arm64_kernel_use_ng_mappings() when forced on · 2f979675
      James Morse 提交于
      Since commit b89d82ef ("arm64: kpti: Avoid rewriting early page
      tables when KASLR is enabled"), a kernel built with CONFIG_RANDOMIZE_BASE
      can decide early whether to use non-global mappings by checking the
      kaslr_offset().
      
      A kernel built without CONFIG_RANDOMIZE_BASE, instead checks the
      cpufeature static-key.
      
      This leaves a gap where CONFIG_RANDOMIZE_BASE was enabled, no
      kaslr seed was provided, but kpti was forced on using the cmdline
      option.
      
      When the decision is made late, kpti_install_ng_mappings() will re-write
      the page tables, but arm64_kernel_use_ng_mappings()'s value does not
      change as it only tests the cpufeature static-key if
      CONFIG_RANDOMIZE_BASE is disabled.
      This function influences PROT_DEFAULT via PTE_MAYBE_NG, and causes
      pgattr_change_is_safe() to catch nG->G transitions when the unchanged
      PROT_DEFAULT is used as part of PAGE_KERNEL_RO:
      [    1.942255] alternatives: patching kernel code
      [    1.998288] ------------[ cut here ]------------
      [    2.000693] kernel BUG at arch/arm64/mm/mmu.c:165!
      [    2.019215] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
      [    2.020257] Modules linked in:
      [    2.020807] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.0.0-rc2 #51
      [    2.021917] Hardware name: linux,dummy-virt (DT)
      [    2.022790] pstate: 40000005 (nZcv daif -PAN -UAO)
      [    2.023742] pc : __create_pgd_mapping+0x508/0x6d0
      [    2.024671] lr : __create_pgd_mapping+0x500/0x6d0
      
      [    2.058059] Process swapper/0 (pid: 1, stack limit = 0x(____ptrval____))
      [    2.059369] Call trace:
      [    2.059845]  __create_pgd_mapping+0x508/0x6d0
      [    2.060684]  update_mapping_prot+0x48/0xd0
      [    2.061477]  mark_linear_text_alias_ro+0xdc/0xe4
      [    2.070502]  smp_cpus_done+0x90/0x98
      [    2.071216]  smp_init+0x100/0x114
      [    2.071878]  kernel_init_freeable+0xd4/0x220
      [    2.072750]  kernel_init+0x10/0x100
      [    2.073455]  ret_from_fork+0x10/0x18
      
      [    2.075414] ---[ end trace 3572f3a7782292de ]---
      [    2.076389] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
      
      If arm64_kernel_unmapped_at_el0() is true, arm64_kernel_use_ng_mappings()
      should also be true.
      Signed-off-by: NJames Morse <james.morse@arm.com>
      CC: Ard Biesheuvel <ard.biesheuvel@linaro.org>
      CC: John Garry <john.garry@huawei.com>
      CC: Will Deacon <will.deacon@arm.com>
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      2f979675
    • S
      x86/intel/lpss: Make PCI dependency explicit · e9820d6b
      Sinan Kaya 提交于
      After commit 5d32a665 (PCI/ACPI: Allow ACPI to be built without
      CONFIG_PCI set) dependencies on CONFIG_PCI that previously were
      satisfied implicitly through dependencies on CONFIG_ACPI have to be
      specified directly.
      
      LPSS code relies on PCI infrastructure but this dependency has not
      been called out explicitly yet.
      
      Fixes: 5d32a665 ("PCI/ACPI: Allow ACPI to be built without CONFIG_PCI set")
      Signed-off-by: NSinan Kaya <okaya@kernel.org>
      Signed-off-by: NRafael J. Wysocki <rafael.j.wysocki@intel.com>
      e9820d6b
  5. 15 1月, 2019 3 次提交
    • M
      powerpc/syscalls: Fix syscall tracing · 7bea7ac0
      Michael Ellerman 提交于
      Recently in commit fbf508da ("powerpc: split compat syscall table
      out from native table") we changed the layout of the system call
      table. Instead of having two entries for each syscall number, one for
      the regular entry point and one for the compat entry point, we now
      have separate tables for regular and compat entry points.
      
      This inadvertently broke syscall tracing (CONFIG_FTRACE_SYSCALLS),
      because our implementation of arch_syscall_addr() knew about the
      layout of the table (it did nr * 2).
      
      We can fix it just by dropping our version of arch_syscall_addr() and
      using the generic version which does:
      
      	return (unsigned long)sys_call_table[nr];
      
      Fixes: fbf508da ("powerpc: split compat syscall table out from native table")
      Signed-off-by: NMichael Ellerman <mpe@ellerman.id.au>
      7bea7ac0
    • J
      powerpc/pseries: Fix build break due to pnv_npu2_init() · da727097
      Jason A. Donenfeld 提交于
      Commit 3be2df00 ("powerpc/pseries/npu: Enable platform support")
      added a call to pnv_npu2_init() in pseries code. This causes a build
      break if we build with CONFIG_PPC_PSERIES && !CONFIG_PPC_POWERNV:
      
        powerpc64le-pc-linux-gnu-ld: arch/powerpc/platforms/pseries/pci.o: in function `pSeries_final_fixup':
        pci.c:(.init.text+0x1b0): undefined reference to `pnv_npu2_init'
      
      This commit therefore wraps that line in an ifdef, so that pseries
      builds without powernv.
      
      Fixes: 3be2df00 ("powerpc/pseries/npu: Enable platform support")
      Signed-off-by: NJason A. Donenfeld <Jason@zx2c4.com>
      Reviewed-by: NAlexey Kardashevskiy <aik@ozlabs.ru>
      [mpe: Frob change log a bit to blame a different commit]
      Signed-off-by: NMichael Ellerman <mpe@ellerman.id.au>
      da727097
    • A
      MIPS: OCTEON: fix kexec support · 8a644c64
      Aurelien Jarno 提交于
      Commit 62cac480 ("MIPS: kexec: Make a framework for both jumping and
      halting on nonboot CPUs") broke the build of the OCTEON platform as
      the relocated_kexec_smp_wait() is now static and not longer exported in
      kexec.h.
      
      Replace it by kexec_reboot() like it has been done in other places.
      
      Fixes: 62cac480 ("MIPS: kexec: Make a framework for both jumping and halting on nonboot CPUs")
      Signed-off-by: NAurelien Jarno <aurelien@aurel32.net>
      Signed-off-by: NPaul Burton <paul.burton@mips.com>
      Cc: linux-mips@vger.kernel.org
      Cc: Dengcheng Zhu <dzhu@wavecomp.com>
      Cc: ralf@linux-mips.org
      Cc: stable@vger.kernel.org # 4.20+
      8a644c64
  6. 14 1月, 2019 1 次提交
  7. 12 1月, 2019 5 次提交
  8. 11 1月, 2019 9 次提交
  9. 10 1月, 2019 8 次提交