aboutsummaryrefslogtreecommitdiffstats
path: root/arch/arm64/kernel/proton-pack.c (follow)
AgeCommit message (Expand)AuthorFilesLines
2025-05-08arm64: proton-pack: Add new CPUs 'k' values for branch mitigationJames Morse1-0/+1
2025-05-08arm64: bpf: Add BHB mitigation to the epilogue for cBPF programsJames Morse1-1/+1
2025-05-08arm64: proton-pack: Expose whether the branchy loop k valueJames Morse1-0/+5
2025-05-08arm64: proton-pack: Expose whether the platform is mitigated by firmwareJames Morse1-0/+5
2025-05-01arm64: errata: Add missing sentinels to Spectre-BHB MIDR arraysWill Deacon1-0/+2
2025-04-03Merge tag 'arm64-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linuxLinus Torvalds1-0/+1
2025-03-28arm64: Add support for HIP09 Spectre-BHB mitigationJinqian Yang1-0/+1
2025-03-25Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds1-10/+10
2025-03-14arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() listsDouglas Anderson1-1/+14
2025-03-14arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe listDouglas Anderson1-0/+3
2025-03-14arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre BHBDouglas Anderson1-101/+102
2025-03-14arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_listDouglas Anderson1-0/+1
2025-02-26arm64: Modify _midr_range() functions to read MIDR/REVIDR internallyShameer Kolothum1-9/+8
2024-06-12arm64: errata: Unify speculative SSBS errata logicMark Rutland1-1/+1
2024-05-10arm64: errata: Add workaround for Arm errata 3194386 and 3312417Mark Rutland1-0/+12
2023-10-16arm64: Avoid cpus_have_const_cap() for ARM64_UNMAP_KERNEL_AT_EL0Mark Rutland1-1/+1
2023-04-20arm64: delete dead code in this_cpu_set_vectors()Dan Carpenter1-3/+0
2022-11-15arm64: factor out EL1 SSBS emulation hookMark Rutland1-19/+7
2022-10-12arm64: Add AMPERE1 to the Spectre-BHB affected listD Scott Phillips1-0/+6
2022-09-30Merge branch 'for-next/misc' into for-next/coreCatalin Marinas1-1/+9
2022-09-30Merge branch 'for-next/alternatives' into for-next/coreCatalin Marinas1-1/+1
2022-09-16arm64: alternatives: proton-pack: prepare for cap changesMark Rutland1-1/+1
2022-09-09arm64: spectre: increase parameters that can be used to turn off bhb mitigation individuallyLiu Song1-1/+9
2022-09-09arm64/sysreg: Standardise naming for ID_AA64MMFR1_EL1 fieldsKristina Martsenko1-1/+1
2022-09-09arm64/sysreg: Add _EL1 into ID_AA64PFR0_EL1 definition namesMark Brown1-1/+1
2022-04-08arm64: Add part number for Arm Cortex-A78AEChanho Park1-0/+1
2022-03-14Merge branch 'for-next/spectre-bhb' into for-next/coreWill Deacon1-5/+386
2022-03-07arm64: prevent instrumentation of bp hardening callbacksMark Rutland1-3/+6
2022-03-07arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation reportingJames Morse1-0/+26
2022-02-24arm64: Use the clearbhb instruction in mitigationsJames Morse1-0/+29
2022-02-24arm64: Mitigate spectre style branch history side channelsJames Morse1-0/+278
2022-02-16arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2James Morse1-2/+34
2022-02-16arm64: entry: Add vectors that have the bhb mitigation sequencesJames Morse1-0/+16
2022-02-15arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduitJames Morse1-3/+3
2020-12-09Merge remote-tracking branch 'origin/kvm-arm64/psci-relay' into kvmarm-master/nextMarc Zyngier1-2/+3
2020-12-02arm64: add C wrappers for SET_PSTATE_*()Mark Rutland1-2/+2
2020-11-27Merge branch 'kvm-arm64/vector-rework' into kvmarm-master/nextMarc Zyngier1-51/+33
2020-11-16arm64: spectre: Consolidate spectre-v3a detectionWill Deacon1-0/+12
2020-11-16arm64: spectre: Rename ARM64_HARDEN_EL2_VECTORS to ARM64_SPECTRE_V3AWill Deacon1-3/+10
2020-11-16KVM: arm64: Allocate hyp vectors staticallyWill Deacon1-50/+13
2020-11-13arm64: proton-pack: Add KRYO2XX silver CPUs to spectre-v2 safe-listKonrad Dybcio1-0/+1
2020-11-09arm64: alternatives: Split up alternative.hWill Deacon1-0/+1
2020-10-28KVM: arm64: ARM_SMCCC_ARCH_WORKAROUND_1 doesn't return SMCCC_RET_NOT_REQUIREDStephen Boyd1-2/+0
2020-10-21arm64: proton-pack: Update comment to reflect new function nameStephen Boyd1-2/+2
2020-10-20arm64: spectre-v2: Favour CPU-specific mitigation at EL2Will Deacon1-19/+17
2020-09-29arm64: Add support for PR_SPEC_DISABLE_NOEXEC prctl() optionWill Deacon1-4/+34
2020-09-29arm64: Pull in task_stack_page() to Spectre-v4 mitigation codeWill Deacon1-0/+1
2020-09-29KVM: arm64: Allow patching EL2 vectors even with KASLR is not enabledWill Deacon1-2/+0
2020-09-29arm64: Rewrite Spectre-v4 mitigation codeWill Deacon1-57/+382
2020-09-29arm64: Move SSBD prctl() handler alongside other spectre mitigation codeWill Deacon1-0/+118