diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2019-02-02 03:54:25 +0300 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2019-02-02 03:54:25 +0300 |
commit | 8b050fe42d8ad1a2219201ba6d773e5b0eff1a29 (patch) | |
tree | 9233f2331a440712a3d353cbb8a22205a8cad7c0 /arch/xtensa/Kconfig | |
parent | 33640d718c5ec9dccdeea49fd23bd9acfc537ce7 (diff) | |
parent | f7daa9c8fd191724b9ab9580a7be55cd1a67d799 (diff) | |
download | linux-8b050fe42d8ad1a2219201ba6d773e5b0eff1a29.tar.xz |
Merge tag 'arm64-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux
Pull arm64 fixes from Will Deacon:
"Although we're still debugging a few minor arm64-specific issues in
mainline, I didn't want to hold this lot up in the meantime.
We've got an additional KASLR fix after the previous one wasn't quite
complete, a fix for a performance regression when mapping executable
pages into userspace and some fixes for kprobe blacklisting. All
candidates for stable.
Summary:
- Fix module loading when KASLR is configured but disabled at runtime
- Fix accidental IPI when mapping user executable pages
- Ensure hyp-stub and KVM world switch code cannot be kprobed"
* tag 'arm64-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux:
arm64: hibernate: Clean the __hyp_text to PoC after resume
arm64: hyp-stub: Forbid kprobing of the hyp-stub
arm64: kprobe: Always blacklist the KVM world-switch code
arm64: kaslr: ensure randomized quantities are clean also when kaslr is off
arm64: Do not issue IPIs for user executable ptes
Diffstat (limited to 'arch/xtensa/Kconfig')
0 files changed, 0 insertions, 0 deletions