index
:
linux
master
linux
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
arch
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
Merge tag 'microblaze-v5.10' of git://git.monstr.eu/linux-2.6-microblaze
Linus Torvalds
2020-10-12
1
-1
/
+0
|
\
|
*
microblaze: fix kbuild redundant file warning
Randy Dunlap
2020-09-01
1
-1
/
+0
*
|
Merge tag 'arm64-upstream' of git://git.kernel.org/pub/scm/linux/kernel/git/a...
Linus Torvalds
2020-10-12
107
-1646
/
+3135
|
\
\
|
*
|
Revert "arm64: initialize per-cpu offsets earlier"
Will Deacon
2020-10-09
4
-19
/
+11
|
*
|
Merge branch 'for-next/late-arrivals' into for-next/core
Will Deacon
2020-10-07
5
-16
/
+19
|
|
\
\
|
|
*
|
arm64: random: Remove no longer needed prototypes
Andre Przywara
2020-10-07
1
-5
/
+0
|
|
*
|
arm64: initialize per-cpu offsets earlier
Mark Rutland
2020-10-05
4
-11
/
+19
|
*
|
|
Merge branch 'for-next/mte' into for-next/core
Will Deacon
2020-10-02
39
-49
/
+1303
|
|
\
\
\
|
|
*
|
|
arm64: mte: Kconfig entry
Vincenzo Frascino
2020-09-04
1
-0
/
+33
|
|
*
|
|
arm64: mte: Save tags when hibernating
Steven Price
2020-09-04
1
-0
/
+118
|
|
*
|
|
arm64: mte: Enable swap of tagged pages
Steven Price
2020-09-04
6
-1
/
+187
|
|
*
|
|
arm64: mte: ptrace: Add NT_ARM_TAGGED_ADDR_CTRL regset
Catalin Marinas
2020-09-04
1
-0
/
+42
|
|
*
|
|
arm64: mte: ptrace: Add PTRACE_{PEEK,POKE}MTETAGS support
Catalin Marinas
2020-09-04
5
-0
/
+218
|
|
*
|
|
arm64: mte: Allow {set,get}_tagged_addr_ctrl() on non-current tasks
Catalin Marinas
2020-09-04
4
-22
/
+30
|
|
*
|
|
arm64: mte: Restore the GCR_EL1 register after a suspend
Catalin Marinas
2020-09-04
3
-0
/
+16
|
|
*
|
|
arm64: mte: Allow user control of the generated random tags via prctl()
Catalin Marinas
2020-09-04
4
-4
/
+41
|
|
*
|
|
arm64: mte: Allow user control of the tag check mode via prctl()
Catalin Marinas
2020-09-04
4
-3
/
+117
|
|
*
|
|
arm64: mte: Validate the PROT_MTE request via arch_validate_flags()
Catalin Marinas
2020-09-04
1
-1
/
+13
|
|
*
|
|
arm64: mte: Add PROT_MTE support to mmap() and mprotect()
Catalin Marinas
2020-09-04
5
-12
/
+60
|
|
*
|
|
arm64: mte: Tags-aware aware memcmp_pages() implementation
Catalin Marinas
2020-09-04
1
-0
/
+26
|
|
*
|
|
arm64: Avoid unnecessary clear_user_page() indirection
Catalin Marinas
2020-09-04
2
-8
/
+1
|
|
*
|
|
arm64: mte: Tags-aware copy_{user_,}highpage() implementations
Vincenzo Frascino
2020-09-04
4
-7
/
+55
|
|
*
|
|
arm64: mte: Clear the tags when a page is mapped in user-space with PROT_MTE
Catalin Marinas
2020-09-04
6
-0
/
+91
|
|
*
|
|
arm64: mte: Handle synchronous and asynchronous tag check faults
Vincenzo Frascino
2020-09-04
9
-3
/
+119
|
|
*
|
|
arm64: mte: Add specific SIGSEGV codes
Vincenzo Frascino
2020-09-04
1
-1
/
+1
|
|
*
|
|
arm64: kvm: mte: Hide the MTE CPUID information from the guests
Catalin Marinas
2020-09-04
1
-0
/
+16
|
|
*
|
|
arm64: mte: CPU feature detection and initial sysreg configuration
Vincenzo Frascino
2020-09-03
9
-5
/
+54
|
|
*
|
|
arm64: mte: Use Normal Tagged attributes for the linear map
Catalin Marinas
2020-09-03
5
-4
/
+31
|
|
*
|
|
arm64: mte: system register definitions
Vincenzo Frascino
2020-09-03
4
-1
/
+56
|
|
|
/
/
|
*
|
|
Merge branch 'for-next/ghostbusters' into for-next/core
Will Deacon
2020-10-02
32
-1054
/
+981
|
|
\
\
\
|
|
*
|
|
arm64: Add support for PR_SPEC_DISABLE_NOEXEC prctl() option
Will Deacon
2020-09-29
2
-4
/
+40
|
|
*
|
|
arm64: Pull in task_stack_page() to Spectre-v4 mitigation code
Will Deacon
2020-09-29
1
-0
/
+1
|
|
*
|
|
KVM: arm64: Allow patching EL2 vectors even with KASLR is not enabled
Will Deacon
2020-09-29
6
-58
/
+36
|
|
*
|
|
arm64: Get rid of arm64_ssbd_state
Marc Zyngier
2020-09-29
2
-16
/
+0
|
|
*
|
|
KVM: arm64: Convert ARCH_WORKAROUND_2 to arm64_get_spectre_v4_state()
Marc Zyngier
2020-09-29
3
-14
/
+30
|
|
*
|
|
KVM: arm64: Get rid of kvm_arm_have_ssbd()
Marc Zyngier
2020-09-29
1
-23
/
+0
|
|
*
|
|
KVM: arm64: Simplify handling of ARCH_WORKAROUND_2
Marc Zyngier
2020-09-29
14
-163
/
+41
|
|
*
|
|
arm64: Rewrite Spectre-v4 mitigation code
Will Deacon
2020-09-29
9
-352
/
+401
|
|
*
|
|
arm64: Move SSBD prctl() handler alongside other spectre mitigation code
Will Deacon
2020-09-29
3
-130
/
+119
|
|
*
|
|
arm64: Rename ARM64_SSBD to ARM64_SPECTRE_V4
Will Deacon
2020-09-29
3
-3
/
+3
|
|
*
|
|
arm64: Treat SSBS as a non-strict system feature
Will Deacon
2020-09-29
1
-3
/
+3
|
|
*
|
|
arm64: Group start_thread() functions together
Will Deacon
2020-09-29
1
-12
/
+12
|
|
*
|
|
KVM: arm64: Set CSV2 for guests on hardware unaffected by Spectre-v2
Marc Zyngier
2020-09-29
1
-0
/
+3
|
|
*
|
|
arm64: Rewrite Spectre-v2 mitigation code
Will Deacon
2020-09-29
8
-264
/
+327
|
|
*
|
|
arm64: Introduce separate file for spectre mitigations and reporting
Will Deacon
2020-09-29
3
-7
/
+33
|
|
*
|
|
arm64: Rename ARM64_HARDEN_BRANCH_PREDICTOR to ARM64_SPECTRE_V2
Will Deacon
2020-09-29
4
-17
/
+16
|
|
*
|
|
KVM: arm64: Simplify install_bp_hardening_cb()
Will Deacon
2020-09-29
1
-20
/
+7
|
|
*
|
|
KVM: arm64: Replace CONFIG_KVM_INDIRECT_VECTORS with CONFIG_RANDOMIZE_BASE
Will Deacon
2020-09-29
6
-9
/
+6
|
|
*
|
|
arm64: Remove Spectre-related CONFIG_* options
Will Deacon
2020-09-29
11
-80
/
+4
|
|
*
|
|
arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUs
Marc Zyngier
2020-09-29
1
-0
/
+7
[next]