summaryrefslogtreecommitdiffstats
path: root/arch/arm64 (follow)
Commit message (Expand)AuthorAgeFilesLines
...
| | * | | | | | | arm64: mte: Tags-aware aware memcmp_pages() implementationCatalin Marinas2020-09-041-0/+26
| | * | | | | | | arm64: Avoid unnecessary clear_user_page() indirectionCatalin Marinas2020-09-042-8/+1
| | * | | | | | | arm64: mte: Tags-aware copy_{user_,}highpage() implementationsVincenzo Frascino2020-09-044-7/+55
| | * | | | | | | arm64: mte: Clear the tags when a page is mapped in user-space with PROT_MTECatalin Marinas2020-09-046-0/+91
| | * | | | | | | arm64: mte: Handle synchronous and asynchronous tag check faultsVincenzo Frascino2020-09-049-3/+119
| | * | | | | | | arm64: kvm: mte: Hide the MTE CPUID information from the guestsCatalin Marinas2020-09-041-0/+16
| | * | | | | | | arm64: mte: CPU feature detection and initial sysreg configurationVincenzo Frascino2020-09-039-5/+54
| | * | | | | | | arm64: mte: Use Normal Tagged attributes for the linear mapCatalin Marinas2020-09-035-4/+31
| | * | | | | | | arm64: mte: system register definitionsVincenzo Frascino2020-09-034-1/+56
| | |/ / / / / /
| * | | | | | | Merge branch 'for-next/ghostbusters' into for-next/coreWill Deacon2020-10-0232-1054/+981
| |\ \ \ \ \ \ \
| | * | | | | | | arm64: Add support for PR_SPEC_DISABLE_NOEXEC prctl() optionWill Deacon2020-09-292-4/+40
| | * | | | | | | arm64: Pull in task_stack_page() to Spectre-v4 mitigation codeWill Deacon2020-09-291-0/+1
| | * | | | | | | KVM: arm64: Allow patching EL2 vectors even with KASLR is not enabledWill Deacon2020-09-296-58/+36
| | * | | | | | | arm64: Get rid of arm64_ssbd_stateMarc Zyngier2020-09-292-16/+0
| | * | | | | | | KVM: arm64: Convert ARCH_WORKAROUND_2 to arm64_get_spectre_v4_state()Marc Zyngier2020-09-293-14/+30
| | * | | | | | | KVM: arm64: Get rid of kvm_arm_have_ssbd()Marc Zyngier2020-09-291-23/+0
| | * | | | | | | KVM: arm64: Simplify handling of ARCH_WORKAROUND_2Marc Zyngier2020-09-2914-163/+41
| | * | | | | | | arm64: Rewrite Spectre-v4 mitigation codeWill Deacon2020-09-299-352/+401
| | * | | | | | | arm64: Move SSBD prctl() handler alongside other spectre mitigation codeWill Deacon2020-09-293-130/+119
| | * | | | | | | arm64: Rename ARM64_SSBD to ARM64_SPECTRE_V4Will Deacon2020-09-293-3/+3
| | * | | | | | | arm64: Treat SSBS as a non-strict system featureWill Deacon2020-09-291-3/+3
| | * | | | | | | arm64: Group start_thread() functions togetherWill Deacon2020-09-291-12/+12
| | * | | | | | | KVM: arm64: Set CSV2 for guests on hardware unaffected by Spectre-v2Marc Zyngier2020-09-291-0/+3
| | * | | | | | | arm64: Rewrite Spectre-v2 mitigation codeWill Deacon2020-09-298-264/+327
| | * | | | | | | arm64: Introduce separate file for spectre mitigations and reportingWill Deacon2020-09-293-7/+33
| | * | | | | | | arm64: Rename ARM64_HARDEN_BRANCH_PREDICTOR to ARM64_SPECTRE_V2Will Deacon2020-09-294-17/+16
| | * | | | | | | KVM: arm64: Simplify install_bp_hardening_cb()Will Deacon2020-09-291-20/+7
| | * | | | | | | KVM: arm64: Replace CONFIG_KVM_INDIRECT_VECTORS with CONFIG_RANDOMIZE_BASEWill Deacon2020-09-296-9/+6
| | * | | | | | | arm64: Remove Spectre-related CONFIG_* optionsWill Deacon2020-09-2911-80/+4
| | * | | | | | | arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUsMarc Zyngier2020-09-291-0/+7
| | * | | | | | | arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUsMarc Zyngier2020-09-211-0/+8
| | * | | | | | | arm64: Make use of ARCH_WORKAROUND_1 even when KVM is not enabledMarc Zyngier2020-09-211-2/+5
| | |/ / / / / /
| | | | | | | |
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| | \ \ \ \ \ \
| *-------------------------. \ \ \ \ \ \ Merge branches 'for-next/acpi', 'for-next/boot', 'for-next/bpf', 'for-next/cp...Will Deacon2020-10-0262-532/+845
| |\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | | |_|_|_|_|_|_|_|_|_|_|_|_|_|/ / / / / / | |/| | | | | | | | | | | | | | | | | | |
| | | | | | | | | | | | | | | * | | | | | arm64: vdso: Fix unusual formatting in *setup_additional_pages()Will Deacon2020-09-011-10/+3
| | | | | | | | | | | | | | | * | | | | | arm64: vdso32: Remove a bunch of #ifdef CONFIG_COMPAT_VDSO guardsWill Deacon2020-09-011-27/+17
| | |_|_|_|_|_|_|_|_|_|_|_|_|/ / / / / / | |/| | | | | | | | | | | | | | | | | |
| | | | | | | | | | | | | | * | | | | | arm64/numa: Fix a typo in comment of arm64_numa_initYanfei Xu2020-09-071-1/+1
| | | | | | | | | | | | | | * | | | | | arm64: fix some spelling mistakes in the comments by codespellXiaoming Ni2020-09-076-8/+8
| | |_|_|_|_|_|_|_|_|_|_|_|/ / / / / / | |/| | | | | | | | | | | | | | | | |
| | | | | | | | | | | | | * | | | | | arm64: topology: Stop using MPIDR for topology informationValentin Schneider2020-09-071-15/+17
| | |_|_|_|_|_|_|_|_|_|_|/ / / / / / | |/| | | | | | | | | | | | | | | |
| | | | | | | | | | | | * | | | | | arm64: cpufeature: Export symbol read_sanitised_ftr_reg()Jean-Philippe Brucker2020-09-281-0/+1
| | | | | | | | | | | | * | | | | | arm64: mm: Pin down ASIDs for sharing mm with devicesJean-Philippe Brucker2020-09-283-7/+112
| | |_|_|_|_|_|_|_|_|_|/ / / / / / | |/| | | | | | | | | | | | | | |
| | | | | | | | | | | * | | | | | arm64: Move console stack display code to stacktrace.cMark Brown2020-09-212-65/+65
| | | | | | | | | | | * | | | | | arm64: stacktrace: Convert to ARCH_STACKWALKMark Brown2020-09-182-69/+11
| | | | | | | | | | | * | | | | | arm64: stacktrace: Make stack walk callback consistent with generic codeMark Brown2020-09-184-14/+13
| | |_|_|_|_|_|_|_|_|/ / / / / / | |/| | | | | | | | | | | | | |
| | | | | | | | | | * | | | | | arm64: kprobe: clarify the comment of steppable hint instructionsAmit Daniel Kachhap2020-09-141-2/+4
| | | | | | | | | | * | | | | | arm64: kprobe: disable probe of fault prone ptrauth instructionAmit Daniel Kachhap2020-09-141-6/+0
| | | | | | | | | | * | | | | | arm64: cpufeature: Modify address authentication cpufeature to exactAmit Daniel Kachhap2020-09-141-9/+35
| | | | | | | | | | * | | | | | arm64: ptrauth: Introduce Armv8.3 pointer authentication enhancementsAmit Daniel Kachhap2020-09-145-9/+53
| | | | | | | | | | * | | | | | arm64: traps: Allow force_signal_inject to pass esr error codeAmit Daniel Kachhap2020-09-143-10/+10
| | | | | | | | | | * | | | | | arm64: kprobe: add checks for ARMv8.3-PAuth combined instructionsAmit Daniel Kachhap2020-09-143-2/+10
| | |_|_|_|_|_|_|_|/ / / / / / | |/| | | | | | | | | | | | |
| | | | | | | | | * | | | | | KVM: arm64: pmu: Make overflow handler NMI safeJulien Thierry2020-09-281-1/+25