)]}' { "commit": "b2ed99894d326993961680fb8e786c267a712400", "tree": "f0798f505b34cb8200ad426f6a750bf2d29c7295", "parents": [ "453abc80b2eacbf2816c838e47e40f063227d934" ], "author": { "name": "Varun Wadekar", "email": "vwadekar@nvidia.com", "time": "Tue May 24 15:00:06 2022 +0100" }, "committer": { "name": "Varun Wadekar", "email": "vwadekar@nvidia.com", "time": "Tue May 24 15:32:33 2022 +0100" }, "message": "fix(cpus/denver): use CPU_NO_EXTRA3_FUNC for all variants\n\nDenver CPUs use the same workaround for CVE-2017-5715 and CVE-2022-23960\nvulnerabilities. The workaround for CVE-2017-5715 is always enabled, so\nall Denver variants use CPU_NO_EXTRA3_FUNC as a placeholder for the\nmitigation for CVE-2022-23960. This patch implements the approach.\n\nSigned-off-by: Varun Wadekar \u003cvwadekar@nvidia.com\u003e\nChange-Id: I0863541ce19b6b3b6d1b2f901d3fb6a77f315189\n", "tree_diff": [ { "type": "modify", "old_id": "224ee2676c78a21bd3a831ee5f667da6cb97f043", "old_mode": 33188, "old_path": "lib/cpus/aarch64/denver.S", "new_id": "3c54a6fe232207d2eae3dec8be70db1ed44ffbc9", "new_mode": 33188, "new_path": "lib/cpus/aarch64/denver.S" } ] }