summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Linux 4.4.144v4.4.144Greg Kroah-Hartman2018-07-251-1/+1
* ubi: fastmap: Erase outdated anchor PEBs during attachSascha Hauer2018-07-251-20/+57
* ubi: Fix Fastmap's update_vol()Richard Weinberger2018-07-251-0/+1
* ubi: Fix races around ubi_refill_pools()Richard Weinberger2018-07-254-14/+30
* ubi: Be more paranoid while seaching for the most recent FastmapRichard Weinberger2018-07-252-4/+27
* ubi: Rework Fastmap attach base codeRichard Weinberger2018-07-254-42/+162
* ubi: Introduce vol_ignored()Richard Weinberger2018-07-252-6/+33
* clk: tegra: Fix PLL_U post divider and initial rate on Tegra30Lucas Stach2018-07-251-5/+6
* block: do not use interruptible wait anywhereAlan Jenkins2018-07-251-7/+3
* x86/cpu: Re-apply forced caps every time CPU caps are re-readAndy Lutomirski2018-07-251-0/+7
* x86/xen: Add call of speculative_store_bypass_ht_init() to PV pathsJuergen Gross2018-07-251-0/+5
* x86/bugs: Rename SSBD_NO to SSB_NOKonrad Rzeszutek Wilk2018-07-252-2/+2
* x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFGThomas Gleixner2018-07-252-0/+36
* x86/bugs: Rework spec_ctrl base and mask logicThomas Gleixner2018-07-251-7/+19
* x86/bugs: Remove x86_spec_ctrl_set()Thomas Gleixner2018-07-252-13/+2
* x86/bugs: Expose x86_spec_ctrl_base directlyThomas Gleixner2018-07-253-24/+6
* x86/bugs: Unify x86_spec_ctrl_{set_guest, restore_host}Borislav Petkov2018-07-252-49/+44
* x86/speculation: Rework speculative_store_bypass_update()Thomas Gleixner2018-07-253-4/+9
* x86/speculation: Add virtualized speculative store bypass disable supportTom Lendacky2018-07-254-2/+18
* x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRLThomas Gleixner2018-07-252-5/+24
* x86/speculation: Handle HT correctly on AMDThomas Gleixner2018-07-253-6/+130
* x86/cpufeatures: Add FEATURE_ZENThomas Gleixner2018-07-252-0/+3
* x86/cpu/AMD: Fix erratum 1076 (CPB bit)Borislav Petkov2018-07-251-0/+11
* x86/cpufeatures: Disentangle SSBD enumerationThomas Gleixner2018-07-256-14/+15
* x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRSThomas Gleixner2018-07-254-9/+22
* x86/speculation: Use synthetic bits for IBRS/IBPB/STIBPBorislav Petkov2018-07-252-8/+18
* x86/cpu: Make alternative_msr_write work for 32-bit codeJim Mattson2018-07-251-2/+2
* x86/bugs: Fix the parameters alignment and missing voidKonrad Rzeszutek Wilk2018-07-251-2/+2
* x86/bugs: Make cpu_show_common() staticJiri Kosina2018-07-251-1/+1
* x86/bugs: Fix __ssb_select_mitigation() return typeJiri Kosina2018-07-251-1/+1
* Documentation/spec_ctrl: Do some minor cleanupsBorislav Petkov2018-07-251-12/+12
* proc: Use underscores for SSBD in 'status'Konrad Rzeszutek Wilk2018-07-251-1/+1
* x86/bugs: Rename _RDS to _SSBDKonrad Rzeszutek Wilk2018-07-259-47/+47
* x86/speculation: Make "seccomp" the default mode for Speculative Store BypassKees Cook2018-07-253-18/+41
* seccomp: Move speculation migitation control to arch codeThomas Gleixner2018-07-253-24/+22
* seccomp: Add filter flag to opt-out of SSB mitigationKees Cook2018-07-254-11/+93
* seccomp: Use PR_SPEC_FORCE_DISABLEThomas Gleixner2018-07-251-1/+1
* prctl: Add force disable speculationThomas Gleixner2018-07-255-23/+59
* seccomp: Enable speculation flaw mitigationsKees Cook2018-07-251-0/+17
* proc: Provide details on speculation flaw mitigationsKees Cook2018-07-251-0/+23
* nospec: Allow getting/setting on non-current taskKees Cook2018-07-253-17/+26
* x86/speculation: Add prctl for Speculative Store Bypass mitigationThomas Gleixner2018-07-253-11/+79
* x86/process: Allow runtime control of Speculative Store BypassThomas Gleixner2018-07-255-8/+66
* x86/process: Optimize TIF_NOTSC switchThomas Gleixner2018-07-252-18/+14
* x86/process: Correct and optimize TIF_BLOCKSTEP switchKyle Huey2018-07-252-5/+8
* x86/process: Optimize TIF checks in __switch_to_xtra()Kyle Huey2018-07-251-23/+31
* prctl: Add speculation control prctlsThomas Gleixner2018-07-254-0/+122
* x86/speculation: Create spec-ctrl.h to avoid include hellThomas Gleixner2018-07-256-18/+25
* x86/bugs/AMD: Add support to disable RDS on Fam[15, 16, 17]h if requestedDavid Woodhouse2018-07-255-1/+61
* x86/bugs: Whitelist allowed SPEC_CTRL MSR valuesKonrad Rzeszutek Wilk2018-07-251-2/+9