summaryrefslogtreecommitdiffstats
path: root/arch/arm64/kernel/cpu_errata.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 234Thomas Gleixner2019-06-191-12/+1
* arm64: Handle erratum 1418040 as a superset of erratum 1188873Marc Zyngier2019-05-231-10/+14
* arm64: errata: Add workaround for Cortex-A76 erratum #1463225Will Deacon2019-05-231-0/+24
* Merge branch 'for-next/timers' of git://git.kernel.org/pub/scm/linux/kernel/g...Will Deacon2019-05-011-2/+11
|\
| * arm64: Apply ARM64_ERRATUM_1188873 to Neoverse-N1Marc Zyngier2019-04-301-2/+11
* | arm64/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-05-011-1/+5
* | arm64: ssbs: Don't treat CPUs with SSBS as unaffected by SSBWill Deacon2019-05-011-4/+6
* | arm64: add sysfs vulnerability show for speculative store bypassJeremy Linton2019-05-011-0/+42
* | arm64: Always enable ssb vulnerability detectionJeremy Linton2019-04-261-4/+5
* | arm64: add sysfs vulnerability show for spectre-v2Jeremy Linton2019-04-261-1/+26
* | arm64: Always enable spectre-v2 vulnerability detectionJeremy Linton2019-04-261-7/+8
* | arm64: Use firmware to detect CPUs that are not affected by Spectre-v2Marc Zyngier2019-04-261-9/+23
* | arm64: Advertise mitigation of Spectre-v2, or lack thereofMarc Zyngier2019-04-261-53/+56
* | arm64: Add sysfs vulnerability show for spectre-v1Mian Yousaf Kaukab2019-04-261-0/+6
* | arm64: Provide a command line to disable spectre_v2 mitigationJeremy Linton2019-04-261-0/+13
|/
* arm64: kpti: Avoid rewriting early page tables when KASLR is enabledWill Deacon2019-01-101-1/+1
* Merge tag 'arm64-upstream' of git://git.kernel.org/pub/scm/linux/kernel/git/a...Linus Torvalds2018-12-261-82/+67
|\
| * arm64: cpufeature: Rework ptr auth hwcaps using multi_entry_cap_matchesWill Deacon2018-12-131-33/+1
| * Merge branch 'kvm/cortex-a76-erratum-1165522' into aarch64/for-next/coreWill Deacon2018-12-101-0/+8
| |\
| | * arm64: KVM: Force VHE for systems affected by erratum 1165522Marc Zyngier2018-12-101-0/+8
| * | arm64: capabilities: Merge duplicate entries for Qualcomm erratum 1003Suzuki K Poulose2018-12-061-9/+16
| * | arm64: capabilities: Merge duplicate Cavium erratum entriesSuzuki K Poulose2018-12-061-26/+24
| * | arm64: capabilities: Merge entries for ARM64_WORKAROUND_CLEAN_CACHESuzuki K Poulose2018-12-061-12/+16
| * | arm64: Use a raw spinlock in __install_bp_hardening_cb()James Morse2018-11-271-3/+3
| |/
* / arm64: Add workaround for Cortex-A76 erratum 1286807Catalin Marinas2018-11-291-3/+17
|/
* arm64: KVM: Guests can skip __install_bp_hardening_cb()s HYP workJames Morse2018-10-191-0/+9
* arm64: cpufeature: Trap CTR_EL0 access only where it is necessarySuzuki K Poulose2018-10-161-1/+6
* arm64: cpufeature: Fix handling of CTR_EL0.IDC fieldSuzuki K Poulose2018-10-161-3/+24
* arm64: arch_timer: Add workaround for ARM erratum 1188873Marc Zyngier2018-10-011-0/+8
* arm64: cpu_errata: Remove ARM64_MISMATCHED_CACHE_LINE_SIZEWill Deacon2018-09-191-13/+2
* arm64: cpu: Move errata and feature enable callbacks closer to callersWill Deacon2018-09-141-0/+6
* arm64: ssbd: Add support for PSTATE.SSBS rather than trapping to EL3Will Deacon2018-09-141-2/+24
* arm64: kill config_sctlr_el1()Mark Rutland2018-07-121-2/+1
* arm64: errata: Don't define type field twice for arm64_errata[] entriesWill Deacon2018-07-061-2/+0
* arm64: IPI each CPU after invalidating the I-cache for kernel mappingsWill Deacon2018-07-051-1/+1
* arm64: Handle mismatched cache typeSuzuki K Poulose2018-07-051-3/+14
* arm64: Fix mismatched cache line size detectionSuzuki K Poulose2018-07-051-2/+4
* Merge tag 'arm64-upstream' of git://git.kernel.org/pub/scm/linux/kernel/git/a...Linus Torvalds2018-06-081-0/+182
|\
| * arm64: cpu_errata: include required headersArnd Bergmann2018-06-051-0/+2
| * arm64: ssbd: Restore mitigation status on CPU resumeMarc Zyngier2018-05-311-1/+1
| * arm64: ssbd: Skip apply_ssbd if not using dynamic mitigationMarc Zyngier2018-05-311-0/+14
| * arm64: Add 'ssbd' command-line optionMarc Zyngier2018-05-311-16/+87
| * arm64: Add ARCH_WORKAROUND_2 probingMarc Zyngier2018-05-311-0/+69
| * arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2Marc Zyngier2018-05-311-0/+2
| * arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1Marc Zyngier2018-05-311-0/+24
* | arm64: capabilities: Add NVIDIA Denver CPU to bp_harden listDavid Gilhooley2018-05-091-0/+1
|/
* arm64: Move the content of bpi.S to hyp-entry.SMarc Zyngier2018-04-111-2/+2
* arm64: Get rid of __smccc_workaround_1_hvc_*Marc Zyngier2018-04-111-6/+3
* arm64: capabilities: Rework EL2 vector hardening entryMarc Zyngier2018-04-111-9/+11
* arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardeningShanker Donthineni2018-04-111-47/+19