1. 29 5月, 2014 6 次提交
  2. 23 5月, 2014 7 次提交
  3. 22 5月, 2014 1 次提交
  4. 21 5月, 2014 1 次提交
  5. 17 5月, 2014 6 次提交
  6. 16 5月, 2014 2 次提交
    • C
      Revert "arm64: Introduce execute-only page access permissions" · 5a0fdfad
      Catalin Marinas 提交于
      This reverts commit bc07c2c6.
      
      While the aim is increased security for --x memory maps, it does not
      protect against kernel level reads. Until SECCOMP is implemented for
      arm64, revert this patch to avoid giving a false idea of execute-only
      mappings.
      Signed-off-by: NCatalin Marinas <catalin.marinas@arm.com>
      5a0fdfad
    • C
      Merge tag 'for-3.16' of git://git.linaro.org/people/ard.biesheuvel/linux-arm into upstream · cf5c95db
      Catalin Marinas 提交于
      FPSIMD register bank context switching and crypto algorithms
      optimisations for arm64 from Ard Biesheuvel.
      
      * tag 'for-3.16' of git://git.linaro.org/people/ard.biesheuvel/linux-arm:
        arm64/crypto: AES-ECB/CBC/CTR/XTS using ARMv8 NEON and Crypto Extensions
        arm64: pull in <asm/simd.h> from asm-generic
        arm64/crypto: AES in CCM mode using ARMv8 Crypto Extensions
        arm64/crypto: AES using ARMv8 Crypto Extensions
        arm64/crypto: GHASH secure hash using ARMv8 Crypto Extensions
        arm64/crypto: SHA-224/SHA-256 using ARMv8 Crypto Extensions
        arm64/crypto: SHA-1 using ARMv8 Crypto Extensions
        arm64: add support for kernel mode NEON in interrupt context
        arm64: defer reloading a task's FPSIMD state to userland resume
        arm64: add abstractions for FPSIMD state manipulation
        asm-generic: allow generic unaligned access if the arch supports it
      
      Conflicts:
      	arch/arm64/include/asm/thread_info.h
      cf5c95db
  7. 15 5月, 2014 7 次提交
  8. 12 5月, 2014 5 次提交
  9. 10 5月, 2014 5 次提交
    • L
      Linux 3.15-rc5 · d6d211db
      Linus Torvalds 提交于
      d6d211db
    • L
      Merge branch 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip · 181da3c3
      Linus Torvalds 提交于
      Pull x86 fixes from Peter Anvin:
       "A somewhat unpleasantly large collection of small fixes.  The big ones
        are the __visible tree sweep and a fix for 'earlyprintk=efi,keep'.  It
        was using __init functions with predictably suboptimal results.
      
        Another key fix is a build fix which would produce output that simply
        would not decompress correctly in some configuration, due to the
        existing Makefiles picking up an unfortunate local label and mistaking
        it for the global symbol _end.
      
        Additional fixes include the handling of 64-bit numbers when setting
        the vdso data page (a latent bug which became manifest when i386
        started exporting a vdso with time functions), a fix to the new MSR
        manipulation accessors which would cause features to not get properly
        unblocked, a build fix for 32-bit userland, and a few new platform
        quirks"
      
      * 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
        x86, vdso, time: Cast tv_nsec to u64 for proper shifting in update_vsyscall()
        x86: Fix typo in MSR_IA32_MISC_ENABLE_LIMIT_CPUID macro
        x86: Fix typo preventing msr_set/clear_bit from having an effect
        x86/intel: Add quirk to disable HPET for the Baytrail platform
        x86/hpet: Make boot_hpet_disable extern
        x86-64, build: Fix stack protector Makefile breakage with 32-bit userland
        x86/reboot: Add reboot quirk for Certec BPC600
        asmlinkage: Add explicit __visible to drivers/*, lib/*, kernel/*
        asmlinkage, x86: Add explicit __visible to arch/x86/*
        asmlinkage: Revert "lto: Make asmlinkage __visible"
        x86, build: Don't get confused by local symbols
        x86/efi: earlyprintk=efi,keep fix
      181da3c3
    • W
      arm64: mm: use inner-shareable barriers for inner-shareable maintenance · dc60b777
      Will Deacon 提交于
      In order to ensure ordering and completion of inner-shareable maintenance
      instructions (cache and TLB) on AArch64, we can use the -ish suffix to
      the dmb and dsb instructions respectively.
      
      This patch updates our low-level cache and tlb maintenance routines to
      use the inner-shareable barrier variants where appropriate.
      Acked-by: NCatalin Marinas <catalin.marinas@arm.com>
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      Signed-off-by: NCatalin Marinas <catalin.marinas@arm.com>
      dc60b777
    • W
      arm64: kvm: use inner-shareable barriers for inner-shareable maintenance · ee9e101c
      Will Deacon 提交于
      In order to ensure completion of inner-shareable maintenance instructions
      (cache and TLB) on AArch64, we can use the -ish suffix to the dsb
      instruction.
      
      This patch relaxes our dsb sy instructions to dsb ish where possible.
      Acked-by: NCatalin Marinas <catalin.marinas@arm.com>
      Acked-by: NMarc Zyngier <marc.zyngier@arm.com>
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      Signed-off-by: NCatalin Marinas <catalin.marinas@arm.com>
      ee9e101c
    • W
      arm64: head: fix cache flushing and barriers in set_cpu_boot_mode_flag · d0488597
      Will Deacon 提交于
      set_cpu_boot_mode_flag is used to identify which exception levels are
      encountered across the system by CPUs trying to enter the kernel. The
      basic algorithm is: if a CPU is booting at EL2, it will set a flag at
      an offset of #4 from __boot_cpu_mode, a cacheline-aligned variable.
      Otherwise, a flag is set at an offset of zero into the same cacheline.
      This enables us to check that all CPUs booted at the same exception
      level.
      
      This cacheline is written with the stage-1 MMU off (that is, via a
      strongly-ordered mapping) and will bypass any clean lines in the cache,
      leading to potential coherence problems when the variable is later
      checked via the normal, cacheable mapping of the kernel image.
      
      This patch reworks the broken flushing code so that we:
      
        (1) Use a DMB to order the strongly-ordered write of the cacheline
            against the subsequent cache-maintenance operation (by-VA
            operations only hazard against normal, cacheable accesses).
      
        (2) Use a single dc ivac instruction to invalidate any clean lines
            containing a stale copy of the line after it has been updated.
      Acked-by: NCatalin Marinas <catalin.marinas@arm.com>
      Signed-off-by: NWill Deacon <will.deacon@arm.com>
      Signed-off-by: NCatalin Marinas <catalin.marinas@arm.com>
      d0488597