summaryrefslogtreecommitdiffstats
path: root/arch/arm64/kernel/entry.S
Commit message (Expand)AuthorAgeFilesLines
* arm64: entry: simplify kernel_exit logicMark Rutland2024-01-181-5/+4
* arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOADMark Rutland2024-01-181-9/+13
* arm64: Rename ARM64_WORKAROUND_2966298Rob Herring2024-01-121-1/+1
* arm64: errata: Add Cortex-A520 speculative unprivileged load workaroundRob Herring2023-09-291-0/+4
* arm64: sdei: abort running SDEI handlers during crashD Scott Phillips2023-08-041-2/+25
* arm64: entry: Simplify tramp_alias macro and tramp_exit routineArd Biesheuvel2023-05-251-27/+20
* arm64: entry: Preserve/restore X29 even for compat tasksArd Biesheuvel2023-05-251-10/+0
*-. Merge branches 'for-next/sysreg', 'for-next/sme', 'for-next/kselftest', 'for-...Catalin Marinas2023-02-101-18/+23
|\ \
| | * arm64: add ARM64_HAS_GIC_PRIO_RELAXED_SYNC cpucapMark Rutland2023-01-311-9/+16
| | * arm64: rename ARM64_HAS_IRQ_PRIO_MASKING to ARM64_HAS_GIC_PRIO_MASKINGMark Rutland2023-01-311-2/+2
| |/ |/|
| * arm64: Stash shadow stack pointer in the task struct on interruptArd Biesheuvel2023-01-201-7/+5
| * arm64: Always load shadow stack pointer directly from the task structArd Biesheuvel2023-01-201-2/+2
|/
* arm64: Enable data independent timing (DIT) in the kernelArd Biesheuvel2022-11-081-0/+3
* arm64: alternatives: have callbacks take a capMark Rutland2022-09-161-4/+4
* arm64: Fix comment typoKuan-Ying Lee2022-08-231-1/+1
* arm64: entry: simplify trampoline data pageArd Biesheuvel2022-06-241-31/+22
* arm64: entry: use stackleak_erase_on_task_stack()Mark Rutland2022-05-081-1/+1
* Merge branch 'for-next/spectre-bhb' into for-next/coreWill Deacon2022-03-141-57/+157
|\
| * arm64: Use the clearbhb instruction in mitigationsJames Morse2022-02-241-0/+8
| * arm64: Add percpu vectors for EL1James Morse2022-02-161-6/+6
| * arm64: entry: Add macro for reading symbol addresses from the trampolineJames Morse2022-02-161-21/+16
| * arm64: entry: Add vectors that have the bhb mitigation sequencesJames Morse2022-02-161-9/+44
| * arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigationsJames Morse2022-02-151-1/+34
| * arm64: entry: Allow the trampoline text to occupy multiple pagesJames Morse2022-02-151-1/+1
| * arm64: entry: Make the kpti trampoline's kpti sequence optionalJames Morse2022-02-151-6/+12
| * arm64: entry: Move trampoline macros out of ifdef'd sectionJames Morse2022-02-151-6/+5
| * arm64: entry: Don't assume tramp_vectors is the start of the vectorsJames Morse2022-02-151-13/+15
| * arm64: entry: Allow tramp_alias to access symbols after the 4K boundaryJames Morse2022-02-151-5/+8
| * arm64: entry: Move the trampoline data page before the text pageJames Morse2022-02-151-2/+7
| * arm64: entry: Free up another register on kpti's tramp_exit pathJames Morse2022-02-151-6/+13
| * arm64: entry: Make the trampoline cleanup optionalJames Morse2022-02-151-3/+7
| * arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduitJames Morse2022-02-151-1/+1
| * arm64: entry.S: Add ventry overflow sanity checksJames Morse2022-02-151-0/+3
* | Merge branch 'for-next/mte' into for-next/coreWill Deacon2022-03-141-7/+0
|\ \
| * | arm64: mte: avoid clearing PSTATE.TCO on entry unless necessaryPeter Collingbourne2022-02-221-7/+0
| |/
* / arm64: entry: Save some nops when CONFIG_ARM64_PSEUDO_NMI is not setHe Ying2022-02-151-0/+4
|/
* arm64: entry: Use SDEI event constantsFlorian Fainelli2021-12-061-2/+4
* arm64: kasan: mte: move GCR_EL1 switch to task switch when KASAN disabledPeter Collingbourne2021-09-291-5/+5
* Merge branch 'for-next/entry' into for-next/coreCatalin Marinas2021-08-261-45/+3
|\
| * arm64: entry: call exit_to_user_mode() from CMark Rutland2021-08-051-2/+2
| * arm64: entry: move bulk of ret_to_user to CMark Rutland2021-08-051-45/+3
| |
| \
*-. \ Merge branches 'for-next/mte', 'for-next/misc' and 'for-next/kselftest', remo...Catalin Marinas2021-08-261-24/+42
|\ \ \ | |_|/ |/| |
| | * arm64: entry: Add SYM_CODE annotation for __bad_stackMark Brown2021-08-061-1/+3
| |/ |/|
| * arm64: kasan: mte: use a constant kernel GCR_EL1 valueMark Rutland2021-08-021-3/+2
| * arm64: avoid double ISB on kernel entryPeter Collingbourne2021-07-281-2/+13
| * arm64: mte: optimize GCR_EL1 modification on kernel entry/exitPeter Collingbourne2021-07-281-8/+4
| * arm64: mte: rename gcr_user_excl to mte_ctrlPeter Collingbourne2021-07-281-2/+2
| * arm64: mte: avoid TFSRE0_EL1 related operations unless in async modePeter Collingbourne2021-07-271-9/+19
|/
* Merge branch 'for-next/entry' into for-next/coreWill Deacon2021-06-241-268/+91
|\
| * arm64: entry: handle all vectors with CMark Rutland2021-06-071-101/+45