diff options
| author | Linus Torvalds <torvalds@linux-foundation.org> | 2019-02-02 03:54:25 +0300 | 
|---|---|---|
| committer | Linus Torvalds <torvalds@linux-foundation.org> | 2019-02-02 03:54:25 +0300 | 
| commit | 8b050fe42d8ad1a2219201ba6d773e5b0eff1a29 (patch) | |
| tree | 9233f2331a440712a3d353cbb8a22205a8cad7c0 /tools/lib/api/debug.c | |
| parent | 33640d718c5ec9dccdeea49fd23bd9acfc537ce7 (diff) | |
| parent | f7daa9c8fd191724b9ab9580a7be55cd1a67d799 (diff) | |
| download | linux-8b050fe42d8ad1a2219201ba6d773e5b0eff1a29.tar.xz | |
Merge tag 'arm64-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux
Pull arm64 fixes from Will Deacon:
 "Although we're still debugging a few minor arm64-specific issues in
  mainline, I didn't want to hold this lot up in the meantime.
  We've got an additional KASLR fix after the previous one wasn't quite
  complete, a fix for a performance regression when mapping executable
  pages into userspace and some fixes for kprobe blacklisting. All
  candidates for stable.
  Summary:
   - Fix module loading when KASLR is configured but disabled at runtime
   - Fix accidental IPI when mapping user executable pages
   - Ensure hyp-stub and KVM world switch code cannot be kprobed"
* tag 'arm64-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux:
  arm64: hibernate: Clean the __hyp_text to PoC after resume
  arm64: hyp-stub: Forbid kprobing of the hyp-stub
  arm64: kprobe: Always blacklist the KVM world-switch code
  arm64: kaslr: ensure randomized quantities are clean also when kaslr is off
  arm64: Do not issue IPIs for user executable ptes
Diffstat (limited to 'tools/lib/api/debug.c')
0 files changed, 0 insertions, 0 deletions
