Show patches with: Series = None       |    Archived = No       |   11 patches
Patch Series S/W/F Date Submitter Delegate State
[4.19,104/114] arm64: Use firmware to detect CPUs that are not affected by Spectre-v2 Untitled series #24005 --- 2019-10-10 Greg Kroah-Hartman Superseded
[4.19,103/114] arm64: Force SSBS on context switch Untitled series #24005 --- 2019-10-10 Greg Kroah-Hartman Superseded
[4.19,102/114] arm64: ssbs: Dont treat CPUs with SSBS as unaffected by SSB Untitled series #24005 --- 2019-10-10 Greg Kroah-Hartman New
[4.19,101/114] arm64: add sysfs vulnerability show for speculative store bypass Untitled series #24005 --- 2019-10-10 Greg Kroah-Hartman New
[4.19,100/114] arm64: add sysfs vulnerability show for spectre-v2 Untitled series #24005 --- 2019-10-10 Greg Kroah-Hartman New
[4.19,099/114] arm64: Always enable spectre-v2 vulnerability detection Untitled series #24005 --- 2019-10-10 Greg Kroah-Hartman New
[4.19,098/114] arm64: Advertise mitigation of Spectre-v2, or lack thereof Untitled series #24005 --- 2019-10-10 Greg Kroah-Hartman New
[4.19,097/114] arm64: Provide a command line to disable spectre_v2 mitigation Untitled series #24005 --- 2019-10-10 Greg Kroah-Hartman Superseded
[4.19,092/114] arm64: fix SSBS sanitization Untitled series #24005 --- 2019-10-10 Greg Kroah-Hartman New
[4.19,090/114] KVM: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vhe Untitled series #24005 --- 2019-10-10 Greg Kroah-Hartman New
[4.19,089/114] arm64: ssbd: Add support for PSTATE.SSBS rather than trapping to EL3 Untitled series #24005 --- 2019-10-10 Greg Kroah-Hartman Superseded