linux/arch/arm64
Will Deacon d4647f0a2a arm64: Rewrite Spectre-v2 mitigation code
The Spectre-v2 mitigation code is pretty unwieldy and hard to maintain.
This is largely due to it being written hastily, without much clue as to
how things would pan out, and also because it ends up mixing policy and
state in such a way that it is very difficult to figure out what's going
on.

Rewrite the Spectre-v2 mitigation so that it clearly separates state from
policy and follows a more structured approach to handling the mitigation.

Signed-off-by: Will Deacon <will@kernel.org>
2020-09-29 16:08:15 +01:00
..
boot arm64: dts: k3-am65: Update the RM resource types 2020-08-16 22:01:20 +01:00
configs ARM: SoC driver updates for v5.9 2020-08-03 19:30:59 -07:00
crypto crypto: arm64/gcm - use inline helper to suppress indirect calls 2020-07-09 22:14:32 +10:00
include arm64: Rewrite Spectre-v2 mitigation code 2020-09-29 16:08:15 +01:00
kernel arm64: Rewrite Spectre-v2 mitigation code 2020-09-29 16:08:15 +01:00
kvm arm64: Rewrite Spectre-v2 mitigation code 2020-09-29 16:08:15 +01:00
lib Merge branch 'rwonce/rework' of git://git.kernel.org/pub/scm/linux/kernel/git/will/linux 2020-06-10 14:46:54 -07:00
mm treewide: Use fallthrough pseudo-keyword 2020-08-23 17:36:59 -05:00
net bpf, arm64: Add BPF exception tables 2020-07-31 00:43:40 +02:00
xen arm64: xen: Use modern annotations for assembly functions 2020-01-09 16:09:42 +00:00
Kbuild
Kconfig arm64: Remove Spectre-related CONFIG_* options 2020-09-29 16:08:15 +01:00
Kconfig.debug arm64: remove TEXT_OFFSET randomization 2020-06-15 13:10:59 +01:00
Kconfig.platforms ARM: new SoC support for v5.9 2020-08-03 19:38:30 -07:00
Makefile arm64: vdso32: make vdso32 install conditional 2020-08-28 13:18:48 +01:00