aboutsummaryrefslogtreecommitdiffstats
path: root/main/linux-vanilla/config-vanilla.ppc
Commit message (Collapse)AuthorAgeFilesLines
* main/linux-vanilla: enable NFS v4.1 & v4.2Jake Buchholz2018-10-041-1/+8
| | | | | AWS Elastic File System works best with NFS v4.1, Docker's cloudstor:aws plugin requires it. This is already enabled in config-vanilla.s390x; simply enabling it in the other configs.
* main/linux-vanilla: enable auditNatanael Copa2018-02-051-1/+1
| | | | fixes #8401
* main/linux-vanilla: upgrade to 4.14.13William Pitcock2018-01-101-206/+546
|
* main/linux-vanilla: Update 4.9.73 --> 4.9.75 (Fix for Meltdown)Marian Buschsieweke2018-01-071-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | This commit updates to kernel version 4.9.75 and enables CONFIG_PAGE_TABLE_ISOLATION for x86, x86_64 and aarch64. For all other architectures, CONFIG_PAGE_TABLE_ISOLATION is disabled. CONFIG_PAGE_TABLE_ISOLATION mitigates the Meltdown security flaw almost all Intel CPUs and some ARM CPUs are suspect to [1,2]. (This patch does not solve the Spectre security threat [2], which affects also non-Intel CPUs [3].) I believe this commit will cause some discussion, especially the following points seem worth discussing: a) CONFIG_PAGE_TABLE_ISOLATION has a performance impact on syscalls, which can slow down specific applications significantly. AMD users might benefit from a kernel without KPTI (unless Meltdown turns out to affect them as well) b) Is disabling this feature a reasonable choice for CPU architectures different from x86, x86_64 and aarch64? [1]: https://meltdownattack.com/#faq-systems-meltdown [2]: http://kroah.com/log/blog/2018/01/06/meltdown-status/ [3]: https://meltdownattack.com/#faq-systems-spectre
* main/linux-vanilla: enable Yama (provides some protections like grsecurity)William Pitcock2017-01-311-2/+10
|
* main/linux-vanilla: add powerpc (32-bit) default configWilliam Pitcock2017-01-241-0/+3375