Toggle navigation
Patchwork
Patches credited to Mark Rutland
Login
Register
Mail settings
Current Team Memberships
None
Show patches with
: none
| 993 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Search
Archived
No
Yes
Both
Apply
«
1
2
...
3
4
5
…
9
10
»
▾
Patch
Series
S/W/F
Date
Submitter
Delegate
State
[02/18] arm64: move SCTLR_EL{1,2} assertions to <asm/sysreg.h>
arm64: invoke syscalls with pt_regs
-
-
-
2018-05-14
Mark Rutland
Superseded
[01/18] arm64: consistently use unsigned long for thread flags
arm64: invoke syscalls with pt_regs
-
-
-
2018-05-14
Mark Rutland
Superseded
perf/ring_buffer: ensure atomicity and order of updates
perf/ring_buffer: ensure atomicity and order of updates
-
-
-
2018-05-10
Mark Rutland
New
[6/6] arm64: instrument smp_{load_acquire,store_release}
arm64: add instrumented atomics
-
-
-
2018-05-04
Mark Rutland
Accepted
[5/6] arm64: use instrumented atomics
arm64: add instrumented atomics
-
-
-
2018-05-04
Mark Rutland
New
[4/6] arm64: fix assembly constraints for cmpxchg
arm64: add instrumented atomics
-
-
-
2018-05-04
Mark Rutland
New
[3/6] arm64: use <linux/atomic.h> for cmpxchg
arm64: add instrumented atomics
-
-
-
2018-05-04
Mark Rutland
New
[2/6] locking/atomic, asm-generic: instrument atomic*andnot*()
arm64: add instrumented atomics
-
-
-
2018-05-04
Mark Rutland
New
[1/6] locking/atomic, asm-generic: instrument ordering variants
arm64: add instrumented atomics
-
-
-
2018-05-04
Mark Rutland
New
[3/3] sched/core / kcov: avoid kcov_area during task switch
kcov: fix unexpected faults
-
-
-
2018-05-04
Mark Rutland
New
[2/3] kcov: prefault the kcov_area
kcov: fix unexpected faults
-
-
-
2018-05-04
Mark Rutland
New
[1/3] kcov: ensure irq code sees a valid area
kcov: fix unexpected faults
-
-
-
2018-05-04
Mark Rutland
Accepted
bpf: fix possible spectre-v1 in find_and_alloc_map()
bpf: fix possible spectre-v1 in find_and_alloc_map()
-
-
-
2018-05-03
Mark Rutland
Accepted
[RESEND] SUNRPC: fix include for cmpxchg_relaxed()
[RESEND] SUNRPC: fix include for cmpxchg_relaxed()
-
-
-
2018-05-03
Mark Rutland
New
[PATCHv4,10/10] arm64: docs: document pointer authentication
ARMv8.3 pointer authentication userspace support
-
-
-
2018-05-03
Mark Rutland
New
[PATCHv4,09/10] arm64: enable pointer authentication
ARMv8.3 pointer authentication userspace support
-
-
-
2018-05-03
Mark Rutland
New
[PATCHv4,08/10] arm64: perf: strip PAC when unwinding userspace
ARMv8.3 pointer authentication userspace support
-
-
-
2018-05-03
Mark Rutland
New
[PATCHv4,07/10] arm64: expose user PAC bit positions via ptrace
ARMv8.3 pointer authentication userspace support
-
-
-
2018-05-03
Mark Rutland
New
[PATCHv4,06/10] arm64: add basic pointer authentication support
ARMv8.3 pointer authentication userspace support
-
-
-
2018-05-03
Mark Rutland
New
[PATCHv4,05/10] arm64/cpufeature: detect pointer authentication
ARMv8.3 pointer authentication userspace support
-
-
-
2018-05-03
Mark Rutland
New
[PATCHv4,04/10] arm64: Don't trap host pointer auth use to EL2
ARMv8.3 pointer authentication userspace support
-
-
-
2018-05-03
Mark Rutland
Accepted
[PATCHv4,03/10] arm64/kvm: hide ptrauth from guests
ARMv8.3 pointer authentication userspace support
-
-
-
2018-05-03
Mark Rutland
New
[PATCHv4,02/10] arm64/kvm: consistently handle host HCR_EL2 flags
ARMv8.3 pointer authentication userspace support
-
-
-
2018-05-03
Mark Rutland
New
[PATCHv4,01/10] arm64: add pointer authentication register bits
ARMv8.3 pointer authentication userspace support
-
-
-
2018-05-03
Mark Rutland
New
efi/libstub/arm64: handle randomized TEXT_OFFSET
efi/libstub/arm64: handle randomized TEXT_OFFSET
-
-
-
2018-04-24
Mark Rutland
New
[PATCHv3,11/11] arm64: docs: document pointer authentication
ARMv8.3 pointer authentication userspace support
-
-
-
2018-04-17
Mark Rutland
Superseded
[PATCHv3,10/11] arm64: enable pointer authentication
ARMv8.3 pointer authentication userspace support
-
-
-
2018-04-17
Mark Rutland
Superseded
[PATCHv3,09/11] arm64: perf: strip PAC when unwinding userspace
ARMv8.3 pointer authentication userspace support
-
-
-
2018-04-17
Mark Rutland
Superseded
[PATCHv3,08/11] arm64: expose user PAC bit positions via ptrace
ARMv8.3 pointer authentication userspace support
-
-
-
2018-04-17
Mark Rutland
Superseded
[PATCHv3,07/11] arm64: add basic pointer authentication support
ARMv8.3 pointer authentication userspace support
-
-
-
2018-04-17
Mark Rutland
New
[PATCHv3,06/11] asm-generic: mm_hooks: allow hooks to be overridden individually
ARMv8.3 pointer authentication userspace support
-
-
-
2018-04-17
Mark Rutland
New
[PATCHv3,05/11] arm64/cpufeature: detect pointer authentication
ARMv8.3 pointer authentication userspace support
-
-
-
2018-04-17
Mark Rutland
Superseded
[PATCHv3,04/11] arm64: Don't trap host pointer auth use to EL2
ARMv8.3 pointer authentication userspace support
-
-
-
2018-04-17
Mark Rutland
Superseded
[PATCHv3,03/11] arm64/kvm: hide ptrauth from guests
ARMv8.3 pointer authentication userspace support
-
-
-
2018-04-17
Mark Rutland
Superseded
[PATCHv3,02/11] arm64/kvm: consistently handle host HCR_EL2 flags
ARMv8.3 pointer authentication userspace support
-
-
-
2018-04-17
Mark Rutland
Superseded
[PATCHv3,01/11] arm64: add pointer authentication register bits
ARMv8.3 pointer authentication userspace support
-
-
-
2018-04-17
Mark Rutland
Superseded
[v4.9.y,42/42] arm64: Kill PSCI_GET_VERSION as a variant-2 workaround
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,41/42] arm64: Add ARM_SMCCC_ARCH_WORKAROUND_1 BP hardening support
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,40/42] arm/arm64: smccc: Implement SMCCC v1.1 inline primitive
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,39/42] arm/arm64: smccc: Make function identifiers an unsigned quantity
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,38/42] firmware/psci: Expose SMCCC version through psci_ops
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,37/42] firmware/psci: Expose PSCI conduit
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,36/42] arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,35/42] arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,34/42] arm/arm64: KVM: Turn kvm_psci_version into a static inline
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,33/42] arm64: KVM: Make PSCI_VERSION a fast path
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,32/42] arm/arm64: KVM: Advertise SMCCC v1.1
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,31/42] arm/arm64: KVM: Implement PSCI 1.0 support
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,30/42] arm/arm64: KVM: Add smccc accessors to PSCI code
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,29/42] arm/arm64: KVM: Add PSCI_VERSION helper
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,28/42] arm/arm64: KVM: Consolidate the PSCI include files
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,27/42] arm64: KVM: Increment PC after handling an SMC trap
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,26/42] arm64: Branch predictor hardening for Cavium ThunderX2
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,25/42] arm64: Implement branch predictor hardening for affected Cortex-A CPUs
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,24/42] arm64: cpu_errata: Allow an erratum to be match for all revisions of a core
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,23/42] arm64: cputype: Add missing MIDR values for Cortex-A72 and Cortex-A75
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,22/42] arm64: entry: Apply BP hardening for suspicious interrupts from EL0
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,21/42] arm64: entry: Apply BP hardening for high-priority synchronous exceptions
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,20/42] arm64: KVM: Use per-CPU vector when BP hardening is enabled
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,19/42] mm: Introduce lm_alias
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,18/42] arm64: Move BP hardening to check_and_switch_context
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,17/42] arm64: Add skeleton to harden the branch predictor against aliasing attacks
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,16/42] arm64: Move post_ttbr_update_workaround to C code
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,15/42] arm64: Factor out TTBR0_EL1 post-update workaround into a specific asm macro
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,14/42] drivers/firmware: Expose psci_get_version through psci_ops structure
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,13/42] arm64: cpufeature: Pass capability structure to ->enable callback
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,12/42] arm64: Run enable method for errata work arounds on late CPUs
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,11/42] arm64: cpufeature: __this_cpu_has_cap() shouldn't stop early
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,10/42] arm64: futex: Mask __user pointers prior to dereference
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,09/42] arm64: uaccess: Mask __user pointers for __arch_{clear, copy_*}_user
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,08/42] arm64: uaccess: Don't bother eliding access_ok checks in __{get, put}_user
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,07/42] arm64: uaccess: Prevent speculative use of the current addr_limit
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,06/42] arm64: entry: Ensure branch through syscall table is bounded under speculation
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,05/42] arm64: Use pointer masking to limit uaccess speculation
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,04/42] arm64: Make USER_DS an inclusive limit
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,03/42] arm64: move TASK_* definitions to <asm/processor.h>
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,02/42] arm64: Implement array_index_mask_nospec()
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
[v4.9.y,01/42] arm64: barrier: Add CSDB macros to control data-value prediction
arm64 spectre patches
-
-
-
2018-04-12
Mark Rutland
New
tools: restore READ_ONCE() C++ compatibility
tools: restore READ_ONCE() C++ compatibility
-
-
-
2018-04-04
Mark Rutland
Accepted
[v4.9.y,27/27] arm64: idmap: Use "awx" flags for .idmap.text .pushsection directives
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,26/27] arm64: entry: Reword comment about post_ttbr_update_workaround
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,25/27] arm64: Force KPTI to be disabled on Cavium ThunderX
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,24/27] arm64: kpti: Add ->enable callback to remap swapper using nG mappings
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,23/27] arm64: kpti: Make use of nG dependent on arm64_kernel_unmapped_at_el0()
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,22/27] arm64: Turn on KPTI only on CPUs that need it
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,21/27] arm64: cputype: Add MIDR values for Cavium ThunderX2 CPUs
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,20/27] arm64: capabilities: Handle duplicate entries for a capability
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,19/27] arm64: Allow checking of a CPU-local erratum
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,18/27] arm64: Take into account ID_AA64PFR0_EL1.CSV3
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,17/27] arm64: Kconfig: Reword UNMAP_KERNEL_AT_EL0 kconfig entry
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,16/27] arm64: Kconfig: Add CONFIG_UNMAP_KERNEL_AT_EL0
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,15/27] arm64: use RET instruction for exiting the trampoline
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,14/27] arm64: kaslr: Put kernel vectors address in separate data page
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,13/27] arm64: entry: Add fake CPU feature for unmapping the kernel at EL0
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,12/27] arm64: tls: Avoid unconditional zeroing of tpidrro_el0 for native tasks
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,11/27] arm64: entry: Hook up entry trampoline to exception vectors
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,10/27] arm64: entry: Explicitly pass exception level to kernel_ventry macro
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,09/27] arm64: mm: Map entry trampoline into trampoline and kernel page tables
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,08/27] arm64: entry: Add exception trampoline page for exceptions from EL0
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
[v4.9.y,07/27] module: extend 'rodata=off' boot cmdline parameter to module mappings
arm64 meltdown patches
-
-
-
2018-04-03
Mark Rutland
New
«
1
2
...
3
4
5
…
9
10
»
Bundling
Create bundle: