mirror of
https://github.com/FEX-Emu/linux.git
synced 2025-01-07 10:03:24 +00:00
More arm64 fixes:
- Fix disabling of kpti on Thunder-X machines - Fix premature BUILD_BUG_ON() found with randconfig -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAABCgAGBQJbWu8qAAoJELescNyEwWM09ugIAKGyQrDM0gEUEuv5eoAU2/qf lpcsUiKKn4J0QNJFf8fEeNDHA/Ji56ev/VG0DZiBupfMIbN/q59IPft/NLcQn44L +XCYunHjIrgDoSuCYjTpvElhaPOD6d1PkMeJKGDoo6GLM9+T7JlIb+tczq+TWnnK YfoowNaq/OJqCk920kvazJ1bi/9KFF67JuP5jP07zvkk2PwI/CaWVFvlovJ/1sZL qtLaC2wx8ViHoONx+HIRuFZBUfckTWd3uAgSGFhZ4yl0gSCxIK1ABQPjUlbGicK/ QiF1Pb7MtdfLyfTgrnOJLbKiH8NAu65boidvJiIRpCu6qWaHXqNvRhZaYm8fmVM= =V+76 -----END PGP SIGNATURE----- Merge tag 'arm64-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux Pull arm64 fixes from Will Deacon: "Inevitably, after saying that I hoped we would be done on the fixes front, a couple of issues have cropped up over the last week. Next time I'll stay schtum. We've fixed an over-eager BUILD_BUG_ON() which Arnd ran into with arndconfig, as well as ensuring that KPTI really is disabled on Thunder-X1, where the cure is worse than the disease (this regressed when we reworked the heterogeneous CPU feature checking). Summary: - Fix disabling of kpti on Thunder-X machines - Fix premature BUILD_BUG_ON() found with randconfig" * tag 'arm64-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux: arm64: fix vmemmap BUILD_BUG_ON() triggering on !vmemmap setups arm64: Check for errata before evaluating cpu features
This commit is contained in:
commit
6284c99cf1
@ -1351,9 +1351,9 @@ static void __update_cpu_capabilities(const struct arm64_cpu_capabilities *caps,
|
|||||||
|
|
||||||
static void update_cpu_capabilities(u16 scope_mask)
|
static void update_cpu_capabilities(u16 scope_mask)
|
||||||
{
|
{
|
||||||
__update_cpu_capabilities(arm64_features, scope_mask, "detected:");
|
|
||||||
__update_cpu_capabilities(arm64_errata, scope_mask,
|
__update_cpu_capabilities(arm64_errata, scope_mask,
|
||||||
"enabling workaround for");
|
"enabling workaround for");
|
||||||
|
__update_cpu_capabilities(arm64_features, scope_mask, "detected:");
|
||||||
}
|
}
|
||||||
|
|
||||||
static int __enable_cpu_capability(void *arg)
|
static int __enable_cpu_capability(void *arg)
|
||||||
@ -1408,8 +1408,8 @@ __enable_cpu_capabilities(const struct arm64_cpu_capabilities *caps,
|
|||||||
|
|
||||||
static void __init enable_cpu_capabilities(u16 scope_mask)
|
static void __init enable_cpu_capabilities(u16 scope_mask)
|
||||||
{
|
{
|
||||||
__enable_cpu_capabilities(arm64_features, scope_mask);
|
|
||||||
__enable_cpu_capabilities(arm64_errata, scope_mask);
|
__enable_cpu_capabilities(arm64_errata, scope_mask);
|
||||||
|
__enable_cpu_capabilities(arm64_features, scope_mask);
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@ -611,11 +611,13 @@ void __init mem_init(void)
|
|||||||
BUILD_BUG_ON(TASK_SIZE_32 > TASK_SIZE_64);
|
BUILD_BUG_ON(TASK_SIZE_32 > TASK_SIZE_64);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#ifdef CONFIG_SPARSEMEM_VMEMMAP
|
||||||
/*
|
/*
|
||||||
* Make sure we chose the upper bound of sizeof(struct page)
|
* Make sure we chose the upper bound of sizeof(struct page)
|
||||||
* correctly.
|
* correctly when sizing the VMEMMAP array.
|
||||||
*/
|
*/
|
||||||
BUILD_BUG_ON(sizeof(struct page) > (1 << STRUCT_PAGE_MAX_SHIFT));
|
BUILD_BUG_ON(sizeof(struct page) > (1 << STRUCT_PAGE_MAX_SHIFT));
|
||||||
|
#endif
|
||||||
|
|
||||||
if (PAGE_SIZE >= 16384 && get_num_physpages() <= 128) {
|
if (PAGE_SIZE >= 16384 && get_num_physpages() <= 128) {
|
||||||
extern int sysctl_overcommit_memory;
|
extern int sysctl_overcommit_memory;
|
||||||
|
Loading…
Reference in New Issue
Block a user