summaryrefslogtreecommitdiff
path: root/arch
AgeCommit message (Expand)AuthorFilesLines
2019-05-25KVM: arm/arm64: Ensure vcpu target is unset on reset failureAndrew Jones1-3/+8
2019-05-25parisc: Rename LEVEL to PA_ASM_LEVEL to avoid name clash with DRBD codeHelge Deller3-6/+6
2019-05-25parisc: Export running_on_qemu symbol for modulesHelge Deller1-0/+1
2019-05-21KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writesSean Christopherson1-11/+22
2019-05-21crypto: arm/aes-neonbs - don't access already-freed walk.ivEric Biggers1-0/+4
2019-05-21crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest()Eric Biggers1-8/+5
2019-05-21sched/x86: Save [ER]FLAGS on context switchPeter Zijlstra5-0/+20
2019-05-21arm64: Clear OSDLR_EL1 on CPU bootJean-Philippe Brucker1-0/+1
2019-05-21arm64: compat: Reduce address limitVincenzo Frascino1-0/+8
2019-05-21ARM: exynos: Fix a leaked reference by adding missing of_node_putWen Yang2-0/+3
2019-05-21x86/speculation/mds: Revert CPU buffer clear on double fault exitAndy Lutomirski1-8/+0
2019-05-16powerpc/booke64: set RI in default MSRLaurentiu Tudor1-1/+1
2019-05-16powerpc/lib: fix book3s/32 boot failure due to code patchingChristophe Leroy1-1/+1
2019-05-16powerpc/64s: Include cpu headerBreno Leitao1-0/+1
2019-05-16x86/vdso: Pass --eh-frame-hdr to the linkerAlistair Strachan1-1/+2
2019-05-16x86/vdso: Drop implicit common-page-size linker flagNick Desaulniers1-2/+2
2019-05-16x86: vdso: Use $LD instead of $CC to linkAlistair Strachan1-13/+9
2019-05-16Revert "x86: vdso: Use $LD instead of $CC to link"Sasha Levin1-9/+13
2019-05-16Revert "x86/vdso: Drop implicit common-page-size linker flag"Sasha Levin1-2/+2
2019-05-16MIPS: perf: ath79: Fix perfcount IRQ assignmentPetr Štetiar1-6/+0
2019-05-16KVM: x86: avoid misreporting level-triggered irqs as edge-triggered in tracingVitaly Kuznetsov1-2/+2
2019-05-16x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51TJian-Hong Pan1-0/+21
2019-05-14x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen1-3/+3
2019-05-14x86: stop exporting msr-index.h to userlandNicolas Dichtel1-1/+0
2019-05-14x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf1-2/+3
2019-05-14x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2-3/+12
2019-05-14x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk1-1/+2
2019-05-14x86/speculation/mds: Fix commentBoris Ostrovsky1-1/+1
2019-05-14x86/speculation/mds: Add SMT warning messageJosh Poimboeuf1-0/+8
2019-05-14x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf1-3/+2
2019-05-14x86/speculation/mds: Add mds=full,nosmt cmdline optionJosh Poimboeuf1-0/+10
2019-05-14Documentation: Move L1TF to separate directoryThomas Gleixner2-3/+3
2019-05-14x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner2-6/+13
2019-05-14x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner1-0/+28
2019-05-14x86/speculation/mds: Add mitigation control for MDSThomas Gleixner2-0/+75
2019-05-14x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner4-0/+26
2019-05-14x86/kvm/vmx: Add MDS protection when L1D Flush is not activeThomas Gleixner2-0/+4
2019-05-14x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner5-0/+31
2019-05-14x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner1-0/+25
2019-05-14x86/kvm: Expose X86_FEATURE_MD_CLEAR to guestsAndi Kleen1-1/+1
2019-05-14x86/speculation/mds: Add BUG_MSBDS_ONLYThomas Gleixner2-8/+13
2019-05-14x86/speculation/mds: Add basic bug infrastructure for MDSAndi Kleen3-8/+22
2019-05-14x86/speculation: Consolidate CPU whitelistsThomas Gleixner1-49/+56
2019-05-14x86/msr-index: Cleanup bit definesThomas Gleixner1-16/+18
2019-05-14kvm: x86: Report STIBP on GET_SUPPORTED_CPUIDEduardo Habkost1-2/+3
2019-05-14x86/speculation: Provide IBPB always command line optionsThomas Gleixner1-11/+23
2019-05-14x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner2-1/+17
2019-05-14x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner1-9/+32
2019-05-14x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner3-0/+73
2019-05-14x86/speculation: Prevent stale SPEC_CTRL msr contentThomas Gleixner4-18/+40