index
:
laptop-kernel
master
Linux kernel tree for laptop
Jason A. Donenfeld
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
arch
/
arm64
/
kernel
/
proton-pack.c
(
follow
)
Age
Commit message (
Expand
)
Author
Files
Lines
2025-05-08
arm64: proton-pack: Add new CPUs 'k' values for branch mitigation
James Morse
1
-0
/
+1
2025-05-08
arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs
James Morse
1
-1
/
+1
2025-05-08
arm64: proton-pack: Expose whether the branchy loop k value
James Morse
1
-0
/
+5
2025-05-08
arm64: proton-pack: Expose whether the platform is mitigated by firmware
James Morse
1
-0
/
+5
2025-05-01
arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays
Will Deacon
1
-0
/
+2
2025-04-03
Merge tag 'arm64-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux
Linus Torvalds
1
-0
/
+1
2025-03-28
arm64: Add support for HIP09 Spectre-BHB mitigation
Jinqian Yang
1
-0
/
+1
2025-03-25
Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm
Linus Torvalds
1
-10
/
+10
2025-03-14
arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() lists
Douglas Anderson
1
-1
/
+14
2025-03-14
arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe list
Douglas Anderson
1
-0
/
+3
2025-03-14
arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre BHB
Douglas Anderson
1
-101
/
+102
2025-03-14
arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list
Douglas Anderson
1
-0
/
+1
2025-02-26
arm64: Modify _midr_range() functions to read MIDR/REVIDR internally
Shameer Kolothum
1
-9
/
+8
2024-06-12
arm64: errata: Unify speculative SSBS errata logic
Mark Rutland
1
-1
/
+1
2024-05-10
arm64: errata: Add workaround for Arm errata 3194386 and 3312417
Mark Rutland
1
-0
/
+12
2023-10-16
arm64: Avoid cpus_have_const_cap() for ARM64_UNMAP_KERNEL_AT_EL0
Mark Rutland
1
-1
/
+1
2023-04-20
arm64: delete dead code in this_cpu_set_vectors()
Dan Carpenter
1
-3
/
+0
2022-11-15
arm64: factor out EL1 SSBS emulation hook
Mark Rutland
1
-19
/
+7
2022-10-12
arm64: Add AMPERE1 to the Spectre-BHB affected list
D Scott Phillips
1
-0
/
+6
2022-09-30
Merge branch 'for-next/misc' into for-next/core
Catalin Marinas
1
-1
/
+9
2022-09-30
Merge branch 'for-next/alternatives' into for-next/core
Catalin Marinas
1
-1
/
+1
2022-09-16
arm64: alternatives: proton-pack: prepare for cap changes
Mark Rutland
1
-1
/
+1
2022-09-09
arm64: spectre: increase parameters that can be used to turn off bhb mitigation individually
Liu Song
1
-1
/
+9
2022-09-09
arm64/sysreg: Standardise naming for ID_AA64MMFR1_EL1 fields
Kristina Martsenko
1
-1
/
+1
2022-09-09
arm64/sysreg: Add _EL1 into ID_AA64PFR0_EL1 definition names
Mark Brown
1
-1
/
+1
2022-04-08
arm64: Add part number for Arm Cortex-A78AE
Chanho Park
1
-0
/
+1
2022-03-14
Merge branch 'for-next/spectre-bhb' into for-next/core
Will Deacon
1
-5
/
+386
2022-03-07
arm64: prevent instrumentation of bp hardening callbacks
Mark Rutland
1
-3
/
+6
2022-03-07
arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation reporting
James Morse
1
-0
/
+26
2022-02-24
arm64: Use the clearbhb instruction in mitigations
James Morse
1
-0
/
+29
2022-02-24
arm64: Mitigate spectre style branch history side channels
James Morse
1
-0
/
+278
2022-02-16
arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2
James Morse
1
-2
/
+34
2022-02-16
arm64: entry: Add vectors that have the bhb mitigation sequences
James Morse
1
-0
/
+16
2022-02-15
arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
James Morse
1
-3
/
+3
2020-12-09
Merge remote-tracking branch 'origin/kvm-arm64/psci-relay' into kvmarm-master/next
Marc Zyngier
1
-2
/
+3
2020-12-02
arm64: add C wrappers for SET_PSTATE_*()
Mark Rutland
1
-2
/
+2
2020-11-27
Merge branch 'kvm-arm64/vector-rework' into kvmarm-master/next
Marc Zyngier
1
-51
/
+33
2020-11-16
arm64: spectre: Consolidate spectre-v3a detection
Will Deacon
1
-0
/
+12
2020-11-16
arm64: spectre: Rename ARM64_HARDEN_EL2_VECTORS to ARM64_SPECTRE_V3A
Will Deacon
1
-3
/
+10
2020-11-16
KVM: arm64: Allocate hyp vectors statically
Will Deacon
1
-50
/
+13
2020-11-13
arm64: proton-pack: Add KRYO2XX silver CPUs to spectre-v2 safe-list
Konrad Dybcio
1
-0
/
+1
2020-11-09
arm64: alternatives: Split up alternative.h
Will Deacon
1
-0
/
+1
2020-10-28
KVM: arm64: ARM_SMCCC_ARCH_WORKAROUND_1 doesn't return SMCCC_RET_NOT_REQUIRED
Stephen Boyd
1
-2
/
+0
2020-10-21
arm64: proton-pack: Update comment to reflect new function name
Stephen Boyd
1
-2
/
+2
2020-10-20
arm64: spectre-v2: Favour CPU-specific mitigation at EL2
Will Deacon
1
-19
/
+17
2020-09-29
arm64: Add support for PR_SPEC_DISABLE_NOEXEC prctl() option
Will Deacon
1
-4
/
+34
2020-09-29
arm64: Pull in task_stack_page() to Spectre-v4 mitigation code
Will Deacon
1
-0
/
+1
2020-09-29
KVM: arm64: Allow patching EL2 vectors even with KASLR is not enabled
Will Deacon
1
-2
/
+0
2020-09-29
arm64: Rewrite Spectre-v4 mitigation code
Will Deacon
1
-57
/
+382
2020-09-29
arm64: Move SSBD prctl() handler alongside other spectre mitigation code
Will Deacon
1
-0
/
+118
[next]