summaryrefslogtreecommitdiffstats
path: root/arch
Commit message (Expand)AuthorAgeFilesLines
* arm64: Ensure VM_WRITE|VM_SHARED ptes are clean by defaultCatalin Marinas2019-11-061-7/+8
* s390/idle: fix cpu idle time calculationHeiko Carstens2019-11-061-7/+22
* s390/cmm: fix information leak in cmm_timeout_handler()Yihui ZENG2019-11-061-6/+6
* s390/uaccess: avoid (false positive) compiler warningsChristian Borntraeger2019-11-061-2/+2
* MIPS: fw: sni: Fix out of bounds init of o32 stackThomas Bogendoerfer2019-11-061-1/+1
* MIPS: include: Mark __xchg as __always_inlineThomas Bogendoerfer2019-11-061-2/+2
* perf/x86/amd: Change/fix NMI latency mitigation to use a timestampTom Lendacky2019-11-061-13/+17
* x86/xen: Return from panic notifierBoris Ostrovsky2019-11-061-3/+25
* MIPS: include: Mark __cmpxchg as __always_inlineThomas Bogendoerfer2019-11-061-2/+3
* efi/x86: Do not clean dummy variable in kexec pathDave Young2019-11-061-3/+0
* arm64: ftrace: Ensure synchronisation in PLT setup for Neoverse-N1 #1542419James Morse2019-11-061-1/+7
* x86/cpu: Add Atom Tremont (Jacobsville)Kan Liang2019-11-061-1/+2
* powerpc/powernv: hold device_hotplug_lock when calling memtrace_offline_pages()David Hildenbrand2019-11-061-1/+3
* kvm: vmx: Basic APIC virtualization controls have three settingsJim Mattson2019-10-294-28/+38
* kvm: apic: Flush TLB after APIC mode/address change if VPIDs are in useJunaid Shahid2019-10-291-10/+4
* kvm: vmx: Introduce lapic_mode enumerationJim Mattson2019-10-292-11/+29
* KVM: X86: introduce invalidate_gpa argument to tlb flushWanpeng Li2019-10-294-21/+22
* x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel areaSteve Wahl2019-10-291-2/+20
* parisc: Fix vmap memory leak in ioremap()/iounmap()Helge Deller2019-10-291-5/+7
* xtensa: drop EXPORT_SYMBOL for outs*/ins*Max Filippov2019-10-291-7/+0
* MIPS: tlbex: Fix build_restore_pagemask KScratch restorePaul Burton2019-10-291-8/+15
* arm64/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-10-292-2/+12
* arm64: Use firmware to detect CPUs that are not affected by Spectre-v2Marc Zyngier2019-10-291-9/+23
* arm64: Force SSBS on context switchMarc Zyngier2019-10-292-3/+40
* arm64: ssbs: Don't treat CPUs with SSBS as unaffected by SSBWill Deacon2019-10-291-4/+6
* arm64: add sysfs vulnerability show for speculative store bypassJeremy Linton2019-10-291-0/+42
* arm64: add sysfs vulnerability show for spectre-v2Jeremy Linton2019-10-291-1/+26
* arm64: Always enable spectre-v2 vulnerability detectionJeremy Linton2019-10-291-7/+8
* arm64: Advertise mitigation of Spectre-v2, or lack thereofMarc Zyngier2019-10-291-52/+56
* arm64: Provide a command line to disable spectre_v2 mitigationJeremy Linton2019-10-291-0/+13
* arm64: Always enable ssb vulnerability detectionJeremy Linton2019-10-292-8/+5
* arm64: enable generic CPU vulnerabilites supportMian Yousaf Kaukab2019-10-291-0/+1
* arm64: add sysfs vulnerability show for meltdownJeremy Linton2019-10-291-14/+44
* arm64: Add sysfs vulnerability show for spectre-v1Mian Yousaf Kaukab2019-10-291-0/+6
* arm64: fix SSBS sanitizationMark Rutland2019-10-291-7/+8
* KVM: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vheWill Deacon2019-10-292-0/+22
* arm64: ssbd: Add support for PSTATE.SSBS rather than trapping to EL3Will Deacon2019-10-298-2/+107
* arm64: cpufeature: Detect SSBS and advertise to userspaceWill Deacon2019-10-295-7/+33
* arm64: Get rid of __smccc_workaround_1_hvc_*Marc Zyngier2019-10-292-16/+5
* arm64: don't zero DIT on signal returnMark Rutland2019-10-291-4/+8
* arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardeningShanker Donthineni2019-10-296-72/+20
* arm64: capabilities: Add support for checks based on a list of MIDRsSuzuki K Poulose2019-10-294-46/+66
* arm64: Add MIDR encoding for Arm Cortex-A55 and Cortex-A35Suzuki K Poulose2019-10-291-0/+4
* arm64: Add helpers for checking CPU MIDR against a rangeSuzuki K Poulose2019-10-293-13/+39
* arm64: capabilities: Clean up midr range helpersSuzuki K Poulose2019-10-291-47/+62
* arm64: capabilities: Change scope of VHE to Boot CPU featureSuzuki K Poulose2019-10-294-46/+9
* arm64: capabilities: Add support for features enabled earlySuzuki K Poulose2019-10-292-22/+83
* arm64: capabilities: Restrict KPTI detection to boot-time CPUsSuzuki K Poulose2019-10-292-5/+20
* arm64: capabilities: Introduce weak features based on local CPUSuzuki K Poulose2019-10-292-1/+9
* arm64: capabilities: Group handling of features and errata workaroundsSuzuki K Poulose2019-10-291-31/+42