Series |
V4.4 backport of arm32 Spectre patches
|
expand
-
[ARM32,v4.4,V2,00/47] V4.4 backport of arm32 Spectre patches
-
[ARM32,v4.4,V2,01/47] ARM: 8478/2: arm/arm64: add arm-smccc
-
[ARM32,v4.4,V2,02/47] arm/arm64: KVM: Advertise SMCCC v1.1
-
[ARM32,v4.4,V2,03/47] arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support
-
[ARM32,v4.4,V2,04/47] drivers/firmware: Expose psci_get_version through psci_ops structure
-
[ARM32,v4.4,V2,05/47] firmware/psci: Expose PSCI conduit
-
[ARM32,v4.4,V2,06/47] firmware/psci: Expose SMCCC version through psci_ops
-
[ARM32,v4.4,V2,07/47] arm/arm64: smccc: Make function identifiers an unsigned quantity
-
[ARM32,v4.4,V2,08/47] arm/arm64: smccc: Implement SMCCC v1.1 inline primitive
-
[ARM32,v4.4,V2,09/47] ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs
-
[ARM32,v4.4,V2,10/47] ARM: bugs: prepare processor bug infrastructure
-
[ARM32,v4.4,V2,11/47] ARM: bugs: hook processor bug checking into SMP and suspend paths
-
[ARM32,v4.4,V2,12/47] ARM: bugs: add support for per-processor bug checking
-
[ARM32,v4.4,V2,13/47] ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
-
[ARM32,v4.4,V2,14/47] ARM: spectre-v2: harden branch predictor on context switches
-
[ARM32,v4.4,V2,15/47] ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
-
[ARM32,v4.4,V2,16/47] ARM: spectre-v2: harden user aborts in kernel space
-
[ARM32,v4.4,V2,17/47] ARM: spectre-v2: add firmware based hardening
-
[ARM32,v4.4,V2,18/47] ARM: spectre-v2: warn about incorrect context switching functions
-
[ARM32,v4.4,V2,19/47] ARM: spectre-v1: add speculation barrier (csdb) macros
-
[ARM32,v4.4,V2,20/47] ARM: spectre-v1: add array_index_mask_nospec() implementation
-
[ARM32,v4.4,V2,21/47] ARM: spectre-v1: fix syscall entry
-
[ARM32,v4.4,V2,22/47] ARM: signal: copy registers using __copy_from_user()
-
[ARM32,v4.4,V2,23/47] ARM: vfp: use __copy_from_user() when restoring VFP state
-
[ARM32,v4.4,V2,24/47] ARM: oabi-compat: copy semops using __copy_from_user()
-
[ARM32,v4.4,V2,25/47] ARM: use __inttype() in get_user()
-
[ARM32,v4.4,V2,26/47] ARM: spectre-v1: use get_user() for __get_user()
-
[ARM32,v4.4,V2,27/47] ARM: spectre-v1: mitigate user accesses
-
[ARM32,v4.4,V2,28/47] ARM: 8789/1: signal: copy registers using __copy_to_user()
-
[ARM32,v4.4,V2,29/47] ARM: 8791/1: vfp: use __copy_to_user() when saving VFP state
-
[ARM32,v4.4,V2,30/47] ARM: 8792/1: oabi-compat: copy oabi events using __copy_to_user()
-
[ARM32,v4.4,V2,31/47] ARM: 8793/1: signal: replace __put_user_error with __put_user
-
[ARM32,v4.4,V2,32/47] ARM: 8794/1: uaccess: Prevent speculative use of the current addr_limit
-
[ARM32,v4.4,V2,33/47] ARM: uaccess: remove put_user() code duplication
-
[ARM32,v4.4,V2,34/47] ARM: 8795/1: spectre-v1.1: use put_user() for __put_user()
-
[ARM32,v4.4,V2,35/47] ARM: 8796/1: spectre-v1, v1.1: provide helpers for address sanitization
-
[ARM32,v4.4,V2,36/47] ARM: 8797/1: spectre-v1.1: harden __copy_to_user
-
[ARM32,v4.4,V2,37/47] ARM: 8809/1: proc-v7: fix Thumb annotation of cpu_v7_hvc_switch_mm
-
[ARM32,v4.4,V2,38/47] ARM: 8810/1: vfp: Fix wrong assignement to ufp_exc
-
[ARM32,v4.4,V2,39/47] ARM: make lookup_processor_type() non-__init
-
[ARM32,v4.4,V2,40/47] ARM: split out processor lookup
-
[ARM32,v4.4,V2,41/47] ARM: clean up per-processor check_bugs method call
-
[ARM32,v4.4,V2,42/47] ARM: add PROC_VTABLE and PROC_TABLE macros
-
[ARM32,v4.4,V2,43/47] arch: Introduce post-init read-only memory
-
[ARM32,v4.4,V2,44/47] ARM: 8595/2: apply more __ro_after_init
-
[ARM32,v4.4,V2,45/47] ARM: spectre-v2: per-CPU vtables to work around big.Little systems
-
[ARM32,v4.4,V2,46/47] ARM: ensure that processor vtables is not lost after boot
-
[ARM32,v4.4,V2,47/47] ARM: fix the cockup in the previous patch
|