Commit message (Expand) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
| | * | | | | | | | arm64: mte: Tags-aware aware memcmp_pages() implementation | Catalin Marinas | 2020-09-04 | 1 | -0/+26 | |
| | * | | | | | | | arm64: Avoid unnecessary clear_user_page() indirection | Catalin Marinas | 2020-09-04 | 2 | -8/+1 | |
| | * | | | | | | | arm64: mte: Tags-aware copy_{user_,}highpage() implementations | Vincenzo Frascino | 2020-09-04 | 4 | -7/+55 | |
| | * | | | | | | | arm64: mte: Clear the tags when a page is mapped in user-space with PROT_MTE | Catalin Marinas | 2020-09-04 | 6 | -0/+91 | |
| | * | | | | | | | arm64: mte: Handle synchronous and asynchronous tag check faults | Vincenzo Frascino | 2020-09-04 | 9 | -3/+119 | |
| | * | | | | | | | arm64: kvm: mte: Hide the MTE CPUID information from the guests | Catalin Marinas | 2020-09-04 | 1 | -0/+16 | |
| | * | | | | | | | arm64: mte: CPU feature detection and initial sysreg configuration | Vincenzo Frascino | 2020-09-03 | 9 | -5/+54 | |
| | * | | | | | | | arm64: mte: Use Normal Tagged attributes for the linear map | Catalin Marinas | 2020-09-03 | 5 | -4/+31 | |
| | * | | | | | | | arm64: mte: system register definitions | Vincenzo Frascino | 2020-09-03 | 4 | -1/+56 | |
| | |/ / / / / / | ||||||
| * | | | | | | | Merge branch 'for-next/ghostbusters' into for-next/core | Will Deacon | 2020-10-02 | 32 | -1054/+981 | |
| |\ \ \ \ \ \ \ | ||||||
| | * | | | | | | | arm64: Add support for PR_SPEC_DISABLE_NOEXEC prctl() option | Will Deacon | 2020-09-29 | 2 | -4/+40 | |
| | * | | | | | | | arm64: Pull in task_stack_page() to Spectre-v4 mitigation code | Will Deacon | 2020-09-29 | 1 | -0/+1 | |
| | * | | | | | | | KVM: arm64: Allow patching EL2 vectors even with KASLR is not enabled | Will Deacon | 2020-09-29 | 6 | -58/+36 | |
| | * | | | | | | | arm64: Get rid of arm64_ssbd_state | Marc Zyngier | 2020-09-29 | 2 | -16/+0 | |
| | * | | | | | | | KVM: arm64: Convert ARCH_WORKAROUND_2 to arm64_get_spectre_v4_state() | Marc Zyngier | 2020-09-29 | 3 | -14/+30 | |
| | * | | | | | | | KVM: arm64: Get rid of kvm_arm_have_ssbd() | Marc Zyngier | 2020-09-29 | 1 | -23/+0 | |
| | * | | | | | | | KVM: arm64: Simplify handling of ARCH_WORKAROUND_2 | Marc Zyngier | 2020-09-29 | 14 | -163/+41 | |
| | * | | | | | | | arm64: Rewrite Spectre-v4 mitigation code | Will Deacon | 2020-09-29 | 9 | -352/+401 | |
| | * | | | | | | | arm64: Move SSBD prctl() handler alongside other spectre mitigation code | Will Deacon | 2020-09-29 | 3 | -130/+119 | |
| | * | | | | | | | arm64: Rename ARM64_SSBD to ARM64_SPECTRE_V4 | Will Deacon | 2020-09-29 | 3 | -3/+3 | |
| | * | | | | | | | arm64: Treat SSBS as a non-strict system feature | Will Deacon | 2020-09-29 | 1 | -3/+3 | |
| | * | | | | | | | arm64: Group start_thread() functions together | Will Deacon | 2020-09-29 | 1 | -12/+12 | |
| | * | | | | | | | KVM: arm64: Set CSV2 for guests on hardware unaffected by Spectre-v2 | Marc Zyngier | 2020-09-29 | 1 | -0/+3 | |
| | * | | | | | | | arm64: Rewrite Spectre-v2 mitigation code | Will Deacon | 2020-09-29 | 8 | -264/+327 | |
| | * | | | | | | | arm64: Introduce separate file for spectre mitigations and reporting | Will Deacon | 2020-09-29 | 3 | -7/+33 | |
| | * | | | | | | | arm64: Rename ARM64_HARDEN_BRANCH_PREDICTOR to ARM64_SPECTRE_V2 | Will Deacon | 2020-09-29 | 4 | -17/+16 | |
| | * | | | | | | | KVM: arm64: Simplify install_bp_hardening_cb() | Will Deacon | 2020-09-29 | 1 | -20/+7 | |
| | * | | | | | | | KVM: arm64: Replace CONFIG_KVM_INDIRECT_VECTORS with CONFIG_RANDOMIZE_BASE | Will Deacon | 2020-09-29 | 6 | -9/+6 | |
| | * | | | | | | | arm64: Remove Spectre-related CONFIG_* options | Will Deacon | 2020-09-29 | 11 | -80/+4 | |
| | * | | | | | | | arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUs | Marc Zyngier | 2020-09-29 | 1 | -0/+7 | |
| | * | | | | | | | arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUs | Marc Zyngier | 2020-09-21 | 1 | -0/+8 | |
| | * | | | | | | | arm64: Make use of ARCH_WORKAROUND_1 even when KVM is not enabled | Marc Zyngier | 2020-09-21 | 1 | -2/+5 | |
| | |/ / / / / / | ||||||
| | | | | | | | | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| | \ \ \ \ \ \ | ||||||
| *-------------------------. \ \ \ \ \ \ | Merge branches 'for-next/acpi', 'for-next/boot', 'for-next/bpf', 'for-next/cp... | Will Deacon | 2020-10-02 | 62 | -532/+845 | |
| |\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ | | |_|_|_|_|_|_|_|_|_|_|_|_|_|/ / / / / / | |/| | | | | | | | | | | | | | | | | | | | ||||||
| | | | | | | | | | | | | | | * | | | | | | arm64: vdso: Fix unusual formatting in *setup_additional_pages() | Will Deacon | 2020-09-01 | 1 | -10/+3 | |
| | | | | | | | | | | | | | | * | | | | | | arm64: vdso32: Remove a bunch of #ifdef CONFIG_COMPAT_VDSO guards | Will Deacon | 2020-09-01 | 1 | -27/+17 | |
| | |_|_|_|_|_|_|_|_|_|_|_|_|/ / / / / / | |/| | | | | | | | | | | | | | | | | | | ||||||
| | | | | | | | | | | | | | * | | | | | | arm64/numa: Fix a typo in comment of arm64_numa_init | Yanfei Xu | 2020-09-07 | 1 | -1/+1 | |
| | | | | | | | | | | | | | * | | | | | | arm64: fix some spelling mistakes in the comments by codespell | Xiaoming Ni | 2020-09-07 | 6 | -8/+8 | |
| | |_|_|_|_|_|_|_|_|_|_|_|/ / / / / / | |/| | | | | | | | | | | | | | | | | | ||||||
| | | | | | | | | | | | | * | | | | | | arm64: topology: Stop using MPIDR for topology information | Valentin Schneider | 2020-09-07 | 1 | -15/+17 | |
| | |_|_|_|_|_|_|_|_|_|_|/ / / / / / | |/| | | | | | | | | | | | | | | | | ||||||
| | | | | | | | | | | | * | | | | | | arm64: cpufeature: Export symbol read_sanitised_ftr_reg() | Jean-Philippe Brucker | 2020-09-28 | 1 | -0/+1 | |
| | | | | | | | | | | | * | | | | | | arm64: mm: Pin down ASIDs for sharing mm with devices | Jean-Philippe Brucker | 2020-09-28 | 3 | -7/+112 | |
| | |_|_|_|_|_|_|_|_|_|/ / / / / / | |/| | | | | | | | | | | | | | | | ||||||
| | | | | | | | | | | * | | | | | | arm64: Move console stack display code to stacktrace.c | Mark Brown | 2020-09-21 | 2 | -65/+65 | |
| | | | | | | | | | | * | | | | | | arm64: stacktrace: Convert to ARCH_STACKWALK | Mark Brown | 2020-09-18 | 2 | -69/+11 | |
| | | | | | | | | | | * | | | | | | arm64: stacktrace: Make stack walk callback consistent with generic code | Mark Brown | 2020-09-18 | 4 | -14/+13 | |
| | |_|_|_|_|_|_|_|_|/ / / / / / | |/| | | | | | | | | | | | | | | ||||||
| | | | | | | | | | * | | | | | | arm64: kprobe: clarify the comment of steppable hint instructions | Amit Daniel Kachhap | 2020-09-14 | 1 | -2/+4 | |
| | | | | | | | | | * | | | | | | arm64: kprobe: disable probe of fault prone ptrauth instruction | Amit Daniel Kachhap | 2020-09-14 | 1 | -6/+0 | |
| | | | | | | | | | * | | | | | | arm64: cpufeature: Modify address authentication cpufeature to exact | Amit Daniel Kachhap | 2020-09-14 | 1 | -9/+35 | |
| | | | | | | | | | * | | | | | | arm64: ptrauth: Introduce Armv8.3 pointer authentication enhancements | Amit Daniel Kachhap | 2020-09-14 | 5 | -9/+53 | |
| | | | | | | | | | * | | | | | | arm64: traps: Allow force_signal_inject to pass esr error code | Amit Daniel Kachhap | 2020-09-14 | 3 | -10/+10 | |
| | | | | | | | | | * | | | | | | arm64: kprobe: add checks for ARMv8.3-PAuth combined instructions | Amit Daniel Kachhap | 2020-09-14 | 3 | -2/+10 | |
| | |_|_|_|_|_|_|_|/ / / / / / | |/| | | | | | | | | | | | | | ||||||
| | | | | | | | | * | | | | | | KVM: arm64: pmu: Make overflow handler NMI safe | Julien Thierry | 2020-09-28 | 1 | -1/+25 |