summaryrefslogtreecommitdiffstats
path: root/arch (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'microblaze-v5.10' of git://git.monstr.eu/linux-2.6-microblazeLinus Torvalds2020-10-121-1/+0
|\
| * microblaze: fix kbuild redundant file warningRandy Dunlap2020-09-011-1/+0
* | Merge tag 'arm64-upstream' of git://git.kernel.org/pub/scm/linux/kernel/git/a...Linus Torvalds2020-10-12107-1646/+3135
|\ \
| * | Revert "arm64: initialize per-cpu offsets earlier"Will Deacon2020-10-094-19/+11
| * | Merge branch 'for-next/late-arrivals' into for-next/coreWill Deacon2020-10-075-16/+19
| |\ \
| | * | arm64: random: Remove no longer needed prototypesAndre Przywara2020-10-071-5/+0
| | * | arm64: initialize per-cpu offsets earlierMark Rutland2020-10-054-11/+19
| * | | Merge branch 'for-next/mte' into for-next/coreWill Deacon2020-10-0239-49/+1303
| |\ \ \
| | * | | arm64: mte: Kconfig entryVincenzo Frascino2020-09-041-0/+33
| | * | | arm64: mte: Save tags when hibernatingSteven Price2020-09-041-0/+118
| | * | | arm64: mte: Enable swap of tagged pagesSteven Price2020-09-046-1/+187
| | * | | arm64: mte: ptrace: Add NT_ARM_TAGGED_ADDR_CTRL regsetCatalin Marinas2020-09-041-0/+42
| | * | | arm64: mte: ptrace: Add PTRACE_{PEEK,POKE}MTETAGS supportCatalin Marinas2020-09-045-0/+218
| | * | | arm64: mte: Allow {set,get}_tagged_addr_ctrl() on non-current tasksCatalin Marinas2020-09-044-22/+30
| | * | | arm64: mte: Restore the GCR_EL1 register after a suspendCatalin Marinas2020-09-043-0/+16
| | * | | arm64: mte: Allow user control of the generated random tags via prctl()Catalin Marinas2020-09-044-4/+41
| | * | | arm64: mte: Allow user control of the tag check mode via prctl()Catalin Marinas2020-09-044-3/+117
| | * | | arm64: mte: Validate the PROT_MTE request via arch_validate_flags()Catalin Marinas2020-09-041-1/+13
| | * | | arm64: mte: Add PROT_MTE support to mmap() and mprotect()Catalin Marinas2020-09-045-12/+60
| | * | | arm64: mte: Tags-aware aware memcmp_pages() implementationCatalin Marinas2020-09-041-0/+26
| | * | | arm64: Avoid unnecessary clear_user_page() indirectionCatalin Marinas2020-09-042-8/+1
| | * | | arm64: mte: Tags-aware copy_{user_,}highpage() implementationsVincenzo Frascino2020-09-044-7/+55
| | * | | arm64: mte: Clear the tags when a page is mapped in user-space with PROT_MTECatalin Marinas2020-09-046-0/+91
| | * | | arm64: mte: Handle synchronous and asynchronous tag check faultsVincenzo Frascino2020-09-049-3/+119
| | * | | arm64: mte: Add specific SIGSEGV codesVincenzo Frascino2020-09-041-1/+1
| | * | | arm64: kvm: mte: Hide the MTE CPUID information from the guestsCatalin Marinas2020-09-041-0/+16
| | * | | arm64: mte: CPU feature detection and initial sysreg configurationVincenzo Frascino2020-09-039-5/+54
| | * | | arm64: mte: Use Normal Tagged attributes for the linear mapCatalin Marinas2020-09-035-4/+31
| | * | | arm64: mte: system register definitionsVincenzo Frascino2020-09-034-1/+56
| | |/ /
| * | | Merge branch 'for-next/ghostbusters' into for-next/coreWill Deacon2020-10-0232-1054/+981
| |\ \ \
| | * | | arm64: Add support for PR_SPEC_DISABLE_NOEXEC prctl() optionWill Deacon2020-09-292-4/+40
| | * | | arm64: Pull in task_stack_page() to Spectre-v4 mitigation codeWill Deacon2020-09-291-0/+1
| | * | | KVM: arm64: Allow patching EL2 vectors even with KASLR is not enabledWill Deacon2020-09-296-58/+36
| | * | | arm64: Get rid of arm64_ssbd_stateMarc Zyngier2020-09-292-16/+0
| | * | | KVM: arm64: Convert ARCH_WORKAROUND_2 to arm64_get_spectre_v4_state()Marc Zyngier2020-09-293-14/+30
| | * | | KVM: arm64: Get rid of kvm_arm_have_ssbd()Marc Zyngier2020-09-291-23/+0
| | * | | KVM: arm64: Simplify handling of ARCH_WORKAROUND_2Marc Zyngier2020-09-2914-163/+41
| | * | | arm64: Rewrite Spectre-v4 mitigation codeWill Deacon2020-09-299-352/+401
| | * | | arm64: Move SSBD prctl() handler alongside other spectre mitigation codeWill Deacon2020-09-293-130/+119
| | * | | arm64: Rename ARM64_SSBD to ARM64_SPECTRE_V4Will Deacon2020-09-293-3/+3
| | * | | arm64: Treat SSBS as a non-strict system featureWill Deacon2020-09-291-3/+3
| | * | | arm64: Group start_thread() functions togetherWill Deacon2020-09-291-12/+12
| | * | | KVM: arm64: Set CSV2 for guests on hardware unaffected by Spectre-v2Marc Zyngier2020-09-291-0/+3
| | * | | arm64: Rewrite Spectre-v2 mitigation codeWill Deacon2020-09-298-264/+327
| | * | | arm64: Introduce separate file for spectre mitigations and reportingWill Deacon2020-09-293-7/+33
| | * | | arm64: Rename ARM64_HARDEN_BRANCH_PREDICTOR to ARM64_SPECTRE_V2Will Deacon2020-09-294-17/+16
| | * | | KVM: arm64: Simplify install_bp_hardening_cb()Will Deacon2020-09-291-20/+7
| | * | | KVM: arm64: Replace CONFIG_KVM_INDIRECT_VECTORS with CONFIG_RANDOMIZE_BASEWill Deacon2020-09-296-9/+6
| | * | | arm64: Remove Spectre-related CONFIG_* optionsWill Deacon2020-09-2911-80/+4
| | * | | arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUsMarc Zyngier2020-09-291-0/+7