<feed xmlns='http://www.w3.org/2005/Atom'>
<title>xavi/android_kernel_m2note/arch/arm, branch ng-7.1.2</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2</id>
<link rel='self' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/atom?h=ng-7.1.2'/>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/'/>
<updated>2019-07-08T11:36:44+00:00</updated>
<entry>
<title>crypto: arm - replace memset by memzero_explicit</title>
<updated>2019-07-08T11:36:44+00:00</updated>
<author>
<name>Julia Lawall</name>
<email>Julia.Lawall@lip6.fr</email>
</author>
<published>2014-11-30T17:03:48+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=c40adf4802ec6c7b2f2eac7a28f384b3beb3759d'/>
<id>urn:sha1:c40adf4802ec6c7b2f2eac7a28f384b3beb3759d</id>
<content type='text'>
Memset on a local variable may be removed when it is called just before the
variable goes out of scope.  Using memzero_explicit defeats this
optimization.  A simplified version of the semantic patch that makes this
change is as follows: (http://coccinelle.lip6.fr/)

// &lt;smpl&gt;
@@
identifier x;
type T;
@@

{
... when any
T x[...];
... when any
    when exists
- memset
+ memzero_explicit
  (x,
-0,
  ...)
... when != x
    when strict
}
// &lt;/smpl&gt;

This change was suggested by Daniel Borkmann &lt;dborkman@redhat.com&gt;

Signed-off-by: Julia Lawall &lt;Julia.Lawall@lip6.fr&gt;
Acked-by: Ard Biesheuvel &lt;ard.biesheuvel@linaro.org&gt;
Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
Change-Id: I89b5957f922b7e5568a405c212eb186449f1deab
(cherry picked from commit 025f4cbff16e284192b04bfa1f7b19551c1f5af3)
</content>
</entry>
<entry>
<title>crypto: arm/sha256 - Use memzero_explicit to fill memory with 0</title>
<updated>2019-07-08T11:36:43+00:00</updated>
<author>
<name>elektroschmock</name>
<email>elektroschmock78@googlemail.com</email>
</author>
<published>2019-05-08T08:41:59+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=ca1f667748739a6a0bcce8db79531f0f09d6a8cd'/>
<id>urn:sha1:ca1f667748739a6a0bcce8db79531f0f09d6a8cd</id>
<content type='text'>
memzero_explicit should be used instead in order to prevent
the compiler from optimising away zeroing.

Change-Id: I248925e4c3e934a98f1341b6649ca7cb200a7781
(cherry picked from commit af92d4cf4b0a9ffc39fbd242c2659267ea62fb97)
</content>
</entry>
<entry>
<title>Fix "BACKPORT: ARM: wire up getrandom syscall"</title>
<updated>2019-07-07T20:32:50+00:00</updated>
<author>
<name>Michael Bestas</name>
<email>mkbestas@lineageos.org</email>
</author>
<published>2017-09-20T16:31:46+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=41c367fdfd099fd1d2e926169ad3be085ce6a3ac'/>
<id>urn:sha1:41c367fdfd099fd1d2e926169ad3be085ce6a3ac</id>
<content type='text'>
* Syscalls need to be greater than __NR_last_syscall+1 in order to
  account for the padding in the syscall table

Change-Id: Ide15e25e8a2287fff29c75d898c935318b660ea2
</content>
</entry>
<entry>
<title>BACKPORT: ARM: wire up getrandom syscall Clean cherry pick of eb6452537b280652eee66801ec97cc369e27e5d8.</title>
<updated>2019-07-07T20:32:50+00:00</updated>
<author>
<name>Russell King</name>
<email>rmk+kernel@arm.linux.org.uk</email>
</author>
<published>2014-08-08T09:56:34+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=6de88912a0c50f023ac435e7171b81981baab28e'/>
<id>urn:sha1:6de88912a0c50f023ac435e7171b81981baab28e</id>
<content type='text'>
Add the new getrandom syscall for ARM.

Signed-off-by: Russell King &lt;rmk+kernel@arm.linux.org.uk&gt;

Bug: http://b/29621447
Change-Id: I6d50b57f3a61fbf9102c69103b9a5b7ebf239860
(cherry picked from commit eb6452537b280652eee66801ec97cc369e27e5d8)
</content>
</entry>
<entry>
<title>ARM: 7933/1: rename ioremap_cached to ioremap_cache</title>
<updated>2019-05-03T16:34:20+00:00</updated>
<author>
<name>Rob Herring</name>
<email>rob.herring@calxeda.com</email>
</author>
<published>2014-01-03T15:17:44+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=4dd4aeb5cf7276298f9a73645c92fe53d51651fa'/>
<id>urn:sha1:4dd4aeb5cf7276298f9a73645c92fe53d51651fa</id>
<content type='text'>
ioremap_cache is more aligned with other architectures.
There are only 2 users of this in the kernel: pxa2xx-flash and Xen.

This fixes Xen build failures on arm64:

drivers/tty/hvc/hvc_xen.c:233:2: error: implicit declaration of function 'ioremap_cached' [-Werror=implicit-function-declaration]
drivers/xen/grant-table.c:1174:3: error: implicit declaration of function 'ioremap_cached' [-Werror=implicit-function-declaration]
drivers/xen/xenbus/xenbus_probe.c:778:4: error: implicit declaration of function 'ioremap_cached' [-Werror=implicit-function-declaration]

Signed-off-by: Rob Herring &lt;rob.herring@calxeda.com&gt;
Signed-off-by: Stefano Stabellini &lt;stefano.stabellini@eu.citrix.com&gt;
Signed-off-by: Russell King &lt;rmk+kernel@arm.linux.org.uk&gt;
Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
Git-commit: 0a5ccc86507f45b80831dac1049197c4d45be955
[joonwoop@codeaurora.org: fixed trivial merge conflict.]
Signed-off-by: Joonwoo Park &lt;joonwoop@codeaurora.org&gt;

Change-Id: I867b893aa63bc8647ed0d7cbf66b7fbb464ef8f0
</content>
</entry>
<entry>
<title>ARM: spectre-v1: fix syscall entry</title>
<updated>2019-05-03T16:16:05+00:00</updated>
<author>
<name>Russell King</name>
<email>rmk+kernel@armlinux.org.uk</email>
</author>
<published>2018-05-11T10:16:22+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=adad489b52ea99d521312dad5034c945729361e9'/>
<id>urn:sha1:adad489b52ea99d521312dad5034c945729361e9</id>
<content type='text'>
Prevent speculation at the syscall table decoding by clamping the index
used to zero on invalid system call numbers, and using the csdb
speculative barrier.

Change-Id: I59151ce75a3887d88eed852187f05013e665a7cb
Signed-off-by: Russell King &lt;rmk+kernel@armlinux.org.uk&gt;
Acked-by: Mark Rutland &lt;mark.rutland@arm.com&gt;
Boot-tested-by: Tony Lindgren &lt;tony@atomide.com&gt;
Reviewed-by: Tony Lindgren &lt;tony@atomide.com&gt;
</content>
</entry>
<entry>
<title>ARM: spectre-v1: add array_index_mask_nospec() implementation</title>
<updated>2019-05-03T16:15:52+00:00</updated>
<author>
<name>Russell King</name>
<email>rmk+kernel@armlinux.org.uk</email>
</author>
<published>2018-05-11T14:06:58+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=8df7a210bdcb08abfc8fa35e5c8811a28671f9e8'/>
<id>urn:sha1:8df7a210bdcb08abfc8fa35e5c8811a28671f9e8</id>
<content type='text'>
Add an implementation of the array_index_mask_nospec() function for
mitigating Spectre variant 1 throughout the kernel.

Change-Id: I66d16e24b4725df0bf70f53c91a34be9f26fba98
Signed-off-by: Russell King &lt;rmk+kernel@armlinux.org.uk&gt;
Acked-by: Mark Rutland &lt;mark.rutland@arm.com&gt;
Boot-tested-by: Tony Lindgren &lt;tony@atomide.com&gt;
Reviewed-by: Tony Lindgren &lt;tony@atomide.com&gt;
</content>
</entry>
<entry>
<title>ARM: spectre-v1: add speculation barrier (csdb) macros</title>
<updated>2019-05-03T16:15:37+00:00</updated>
<author>
<name>Russell King</name>
<email>rmk+kernel@armlinux.org.uk</email>
</author>
<published>2018-05-11T10:15:29+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=c31a09121e04a757cf4b20efda49187cdd137a6f'/>
<id>urn:sha1:c31a09121e04a757cf4b20efda49187cdd137a6f</id>
<content type='text'>
Add assembly and C macros for the new CSDB instruction.

Change-Id: Iff3490a0ebc290edf22128eba9e367dc5134fb3e
Signed-off-by: Russell King &lt;rmk+kernel@armlinux.org.uk&gt;
Acked-by: Mark Rutland &lt;mark.rutland@arm.com&gt;
Boot-tested-by: Tony Lindgren &lt;tony@atomide.com&gt;
Reviewed-by: Tony Lindgren &lt;tony@atomide.com&gt;
</content>
</entry>
<entry>
<title>ARM: spectre-v2: harden branch predictor on context switches</title>
<updated>2019-05-03T16:15:23+00:00</updated>
<author>
<name>Russell King</name>
<email>rmk+kernel@armlinux.org.uk</email>
</author>
<published>2018-04-20T09:06:27+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=e6094df37fd993af523aa4f66c66b50fb91da468'/>
<id>urn:sha1:e6094df37fd993af523aa4f66c66b50fb91da468</id>
<content type='text'>
Harden the branch predictor against Spectre v2 attacks on context
switches for ARMv7 and later CPUs.  We do this by:

Cortex A9, A12, A17, A73, A75: invalidating the BTB.
Cortex A15, Brahma B15: invalidating the instruction cache.

Cortex A57 and Cortex A72 are not addressed in this patch.

Cortex R7 and Cortex R8 are also not addressed as we do not enforce
memory protection on these cores.

Change-Id: Ic2fb57dd40b6f7fc22a62f267ab24441ab09cc4b
Signed-off-by: Russell King &lt;rmk+kernel@armlinux.org.uk&gt;
Boot-tested-by: Tony Lindgren &lt;tony@atomide.com&gt;
Reviewed-by: Tony Lindgren &lt;tony@atomide.com&gt;
Acked-by: Marc Zyngier &lt;marc.zyngier@arm.com&gt;
</content>
</entry>
<entry>
<title>ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre</title>
<updated>2019-05-03T16:14:49+00:00</updated>
<author>
<name>Russell King</name>
<email>rmk+kernel@armlinux.org.uk</email>
</author>
<published>2018-05-14T10:56:36+00:00</published>
<link rel='alternate' type='text/html' href='https://gitea.privatedns.org/xavi/android_kernel_m2note/commit/?id=a0dfbc67490078c9375de7f85b12018a3c7151ff'/>
<id>urn:sha1:a0dfbc67490078c9375de7f85b12018a3c7151ff</id>
<content type='text'>
Add a Kconfig symbol for CPUs which are vulnerable to the Spectre
attacks.

Change-Id: I63aeb80cb82f9de4ddbb3bf83fefd5b0ce4237ba
Signed-off-by: Russell King &lt;rmk+kernel@armlinux.org.uk&gt;
Reviewed-by: Florian Fainelli &lt;f.fainelli@gmail.com&gt;
Boot-tested-by: Tony Lindgren &lt;tony@atomide.com&gt;
Reviewed-by: Tony Lindgren &lt;tony@atomide.com&gt;
Acked-by: Marc Zyngier &lt;marc.zyngier@arm.com&gt;
</content>
</entry>
</feed>
