summaryrefslogtreecommitdiffstats
path: root/arch/arm64/kernel/proton-pack.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* arm64: errata: Unify speculative SSBS errata logicMark Rutland2024-06-121-1/+1
* arm64: errata: Add workaround for Arm errata 3194386 and 3312417Mark Rutland2024-05-101-0/+12
* arm64: Avoid cpus_have_const_cap() for ARM64_UNMAP_KERNEL_AT_EL0Mark Rutland2023-10-161-1/+1
* arm64: delete dead code in this_cpu_set_vectors()Dan Carpenter2023-04-201-3/+0
* arm64: factor out EL1 SSBS emulation hookMark Rutland2022-11-151-19/+7
* arm64: Add AMPERE1 to the Spectre-BHB affected listD Scott Phillips2022-10-121-0/+6
* Merge branch 'for-next/misc' into for-next/coreCatalin Marinas2022-09-301-1/+9
|\
| * arm64: spectre: increase parameters that can be used to turn off bhb mitigati...Liu Song2022-09-091-1/+9
* | Merge branch 'for-next/alternatives' into for-next/coreCatalin Marinas2022-09-301-1/+1
|\ \
| * | arm64: alternatives: proton-pack: prepare for cap changesMark Rutland2022-09-161-1/+1
| |/
* | arm64/sysreg: Standardise naming for ID_AA64MMFR1_EL1 fieldsKristina Martsenko2022-09-091-1/+1
* | arm64/sysreg: Add _EL1 into ID_AA64PFR0_EL1 definition namesMark Brown2022-09-091-1/+1
|/
* arm64: Add part number for Arm Cortex-A78AEChanho Park2022-04-081-0/+1
* Merge branch 'for-next/spectre-bhb' into for-next/coreWill Deacon2022-03-141-5/+386
|\
| * arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation...James Morse2022-03-071-0/+26
| * arm64: Use the clearbhb instruction in mitigationsJames Morse2022-02-241-0/+29
| * arm64: Mitigate spectre style branch history side channelsJames Morse2022-02-241-0/+278
| * arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2James Morse2022-02-161-2/+34
| * arm64: entry: Add vectors that have the bhb mitigation sequencesJames Morse2022-02-161-0/+16
| * arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduitJames Morse2022-02-151-3/+3
* | arm64: prevent instrumentation of bp hardening callbacksMark Rutland2022-03-071-3/+6
|/
* Merge remote-tracking branch 'origin/kvm-arm64/psci-relay' into kvmarm-master...Marc Zyngier2020-12-091-2/+3
|\
| * arm64: add C wrappers for SET_PSTATE_*()Mark Rutland2020-12-021-2/+2
| * arm64: alternatives: Split up alternative.hWill Deacon2020-11-091-0/+1
* | Merge branch 'kvm-arm64/vector-rework' into kvmarm-master/nextMarc Zyngier2020-11-271-51/+33
|\ \
| * | arm64: spectre: Consolidate spectre-v3a detectionWill Deacon2020-11-161-0/+12
| * | arm64: spectre: Rename ARM64_HARDEN_EL2_VECTORS to ARM64_SPECTRE_V3AWill Deacon2020-11-161-3/+10
| * | KVM: arm64: Allocate hyp vectors staticallyWill Deacon2020-11-161-50/+13
| |/
* / arm64: proton-pack: Add KRYO2XX silver CPUs to spectre-v2 safe-listKonrad Dybcio2020-11-131-0/+1
|/
* KVM: arm64: ARM_SMCCC_ARCH_WORKAROUND_1 doesn't return SMCCC_RET_NOT_REQUIREDStephen Boyd2020-10-281-2/+0
* arm64: proton-pack: Update comment to reflect new function nameStephen Boyd2020-10-211-2/+2
* arm64: spectre-v2: Favour CPU-specific mitigation at EL2Will Deacon2020-10-201-19/+17
* arm64: Add support for PR_SPEC_DISABLE_NOEXEC prctl() optionWill Deacon2020-09-291-4/+34
* arm64: Pull in task_stack_page() to Spectre-v4 mitigation codeWill Deacon2020-09-291-0/+1
* KVM: arm64: Allow patching EL2 vectors even with KASLR is not enabledWill Deacon2020-09-291-2/+0
* arm64: Rewrite Spectre-v4 mitigation codeWill Deacon2020-09-291-57/+382
* arm64: Move SSBD prctl() handler alongside other spectre mitigation codeWill Deacon2020-09-291-0/+118
* arm64: Rewrite Spectre-v2 mitigation codeWill Deacon2020-09-291-0/+288
* arm64: Introduce separate file for spectre mitigations and reportingWill Deacon2020-09-291-0/+32