summaryrefslogtreecommitdiffstats
path: root/arch/x86/kernel
Commit message (Expand)AuthorAgeFilesLines
...
* x86/microcode: Fix the ancient deprecated microcode loading methodBorislav Petkov2019-05-311-1/+2
* x86/irq/64: Limit IST stack overflow check to #DB stackThomas Gleixner2019-05-311-5/+14
* x86/build: Move _etext to actual end of .textKees Cook2019-05-311-3/+3
* x86/modules: Avoid breaking W^X while loading modulesNadav Amit2019-05-312-8/+22
* ftrace/x86_64: Emulate call function while updating in breakpoint handlerPeter Zijlstra2019-05-251-5/+27
* sched/x86: Save [ER]FLAGS on context switchPeter Zijlstra2019-05-222-0/+15
* x86/speculation/mds: Revert CPU buffer clear on double fault exitAndy Lutomirski2019-05-221-8/+0
* x86/kprobes: Avoid kretprobe recursion bugMasami Hiramatsu2019-05-161-2/+20
* x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51TJian-Hong Pan2019-05-161-0/+21
* x86/build/lto: Fix truncated .bss with -fdata-sectionsSami Tolvanen2019-05-161-1/+1
* x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf2019-05-141-2/+3
* x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-05-141-2/+9
* x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk2019-05-141-1/+2
* x86/speculation/mds: Fix commentBoris Ostrovsky2019-05-141-1/+1
* x86/speculation/mds: Add SMT warning messageJosh Poimboeuf2019-05-141-0/+8
* x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf2019-05-141-3/+2
* x86/speculation/mds: Add mds=full,nosmt cmdline optionJosh Poimboeuf2019-05-141-0/+10
* Documentation: Move L1TF to separate directoryThomas Gleixner2019-05-141-1/+1
* x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner2019-05-141-6/+12
* x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner2019-05-141-0/+25
* x86/speculation/mds: Add mitigation control for MDSThomas Gleixner2019-05-141-0/+70
* x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner2019-05-141-0/+3
* x86/kvm/vmx: Add MDS protection when L1D Flush is not activeThomas Gleixner2019-05-141-0/+1
* x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner2019-05-143-0/+15
* x86/speculation/mds: Add BUG_MSBDS_ONLYThomas Gleixner2019-05-141-8/+12
* x86/speculation/mds: Add basic bug infrastructure for MDSAndi Kleen2019-05-141-8/+15
* x86/speculation: Consolidate CPU whitelistsThomas Gleixner2019-05-141-49/+56
* x86/cpu: Sanitize FAM6_ATOM namingPeter Zijlstra2019-05-144-22/+22
* x86/mce: Improve error message when kernel cannot recover, p2Tony Luck2019-05-081-0/+5
* x86/fpu: Don't export __kernel_fpu_{begin,end}()Sebastian Andrzej Siewior2019-05-021-4/+2
* x86/speculation: Prevent deadlock on ssb_state::lockThomas Gleixner2019-04-271-2/+6
* x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen2019-04-271-3/+3
* x86/kprobes: Verify stack frame on kretprobeMasami Hiramatsu2019-04-271-0/+26
* x86/gart: Exclude GART aperture from kcoreKairui Song2019-04-201-7/+13
* x86/hw_breakpoints: Make default case in hw_breakpoint_arch_parse() return an...Nathan Chancellor2019-04-201-0/+1
* x86/cpu/cyrix: Use correct macros for Cyrix calls on Geode processorsMatthew Whitehead2019-04-201-7/+7
* x86/hpet: Prevent potential NULL pointer dereferenceAditya Pakki2019-04-201-0/+2
* x86/mm: Don't leak kernel addressesMatteo Croce2019-04-201-2/+2
* x86/build: Mark per-CPU symbols as absolute explicitly for LLDRafael Ávila de Espíndola2019-04-051-1/+1
* x86/unwind: Add hardcoded ORC entry for NULLJann Horn2019-03-271-0/+17
* x86/unwind: Handle NULL pointer calls better in frame unwinderJann Horn2019-03-271-3/+22
* x86/kprobes: Prohibit probing on optprobe template codeMasami Hiramatsu2019-03-231-0/+5
* x86/kexec: Don't setup EFI info if EFI runtime is not enabledKairui Song2019-03-131-0/+3
* x86/microcode/amd: Don't falsely trick the late loading mechanismThomas Lendacky2019-03-131-1/+1
* x86/CPU/AMD: Set the CPB bit unconditionally on F17hJiaxun Yang2019-03-101-5/+3
* irq/matrix: Spread managed interrupts on allocationDou Liyang2019-03-051-5/+4
* x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out()Tony Luck2019-02-121-0/+1
* cpu/hotplug: Fix "SMT disabled by BIOS" detection for KVMJosh Poimboeuf2019-02-121-1/+1
* KVM: x86: WARN_ONCE if sending a PV IPI returns a fatal errorSean Christopherson2019-01-311-2/+5
* x86/topology: Use total_cpus for max logical packages calculationHui Wang2019-01-261-1/+1