| Commit message (Collapse) | Author | Age | Files | Lines | |
|---|---|---|---|---|---|
| * | ARM: spectre-v2: harden branch predictor on context switches | Russell King | 2019-05-03 | 1 | -0/+19 |
| | | | | | | | | | | | | | | | | | | | | Harden the branch predictor against Spectre v2 attacks on context switches for ARMv7 and later CPUs. We do this by: Cortex A9, A12, A17, A73, A75: invalidating the BTB. Cortex A15, Brahma B15: invalidating the instruction cache. Cortex A57 and Cortex A72 are not addressed in this patch. Cortex R7 and Cortex R8 are also not addressed as we do not enforce memory protection on these cores. Change-Id: Ic2fb57dd40b6f7fc22a62f267ab24441ab09cc4b Signed-off-by: Russell King <rmk+kernel@armlinux.org.uk> Boot-tested-by: Tony Lindgren <tony@atomide.com> Reviewed-by: Tony Lindgren <tony@atomide.com> Acked-by: Marc Zyngier <marc.zyngier@arm.com> | ||||
| * | ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre | Russell King | 2019-05-03 | 1 | -0/+4 |
| | | | | | | | | | | | | | Add a Kconfig symbol for CPUs which are vulnerable to the Spectre attacks. Change-Id: I63aeb80cb82f9de4ddbb3bf83fefd5b0ce4237ba Signed-off-by: Russell King <rmk+kernel@armlinux.org.uk> Reviewed-by: Florian Fainelli <f.fainelli@gmail.com> Boot-tested-by: Tony Lindgren <tony@atomide.com> Reviewed-by: Tony Lindgren <tony@atomide.com> Acked-by: Marc Zyngier <marc.zyngier@arm.com> | ||||
| * | ARM: mm: Don't force swp_emulate | Chad Cormier Roussel | 2017-09-04 | 1 | -1/+1 |
| | | | | | Signed-off-by: Joe Maples <joe@frap129.org> | ||||
| * | first commit | Meizu OpenSource | 2016-08-15 | 1 | -0/+934 |
