summaryrefslogtreecommitdiffstats
path: root/arch
Commit message (Expand)AuthorAgeFilesLines
* arm64/sve: Fix wrong free for task->thread.sve_stateMasayoshi Mizuma2019-10-171-17/+15
* arm64: topology: Use PPTT to determine if PE is a threadJeremy Linton2019-10-171-4/+15
* MIPS: elf_hwcap: Export userspace ASEsJiaxun Yang2019-10-172-0/+44
* MIPS: Disable Loongson MMI instructions for kernel buildPaul Burton2019-10-172-0/+5
* USB: rio500: Remove Rio 500 kernel driverBastien Nocera2019-10-177-7/+0
* arm64/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-10-112-2/+12
* arm64: Use firmware to detect CPUs that are not affected by Spectre-v2Marc Zyngier2019-10-111-9/+23
* arm64: Force SSBS on context switchMarc Zyngier2019-10-112-3/+40
* arm64: ssbs: Don't treat CPUs with SSBS as unaffected by SSBWill Deacon2019-10-111-4/+6
* arm64: add sysfs vulnerability show for speculative store bypassJeremy Linton2019-10-111-0/+42
* arm64: add sysfs vulnerability show for spectre-v2Jeremy Linton2019-10-111-1/+26
* arm64: Always enable spectre-v2 vulnerability detectionJeremy Linton2019-10-111-7/+8
* arm64: Advertise mitigation of Spectre-v2, or lack thereofMarc Zyngier2019-10-111-53/+56
* arm64: Provide a command line to disable spectre_v2 mitigationJeremy Linton2019-10-111-0/+13
* arm64: Always enable ssb vulnerability detectionJeremy Linton2019-10-112-8/+5
* arm64: enable generic CPU vulnerabilites supportMian Yousaf Kaukab2019-10-111-0/+1
* arm64: add sysfs vulnerability show for meltdownJeremy Linton2019-10-111-14/+44
* arm64: Add sysfs vulnerability show for spectre-v1Mian Yousaf Kaukab2019-10-111-0/+6
* arm64: fix SSBS sanitizationMark Rutland2019-10-111-7/+8
* KVM: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vheWill Deacon2019-10-112-0/+22
* arm64: ssbd: Add support for PSTATE.SSBS rather than trapping to EL3Will Deacon2019-10-118-2/+106
* riscv: Avoid interrupts being erroneously enabled in handle_exception()Vincent Chen2019-10-111-1/+5
* powerpc/book3s64/radix: Rename CPU_FTR_P9_TLBIE_BUG feature flagAneesh Kumar K.V2019-10-115-9/+9
* powerpc/pseries: Fix cpu_hotplug_lock acquisition in resize_hpt()Gautham R. Shenoy2019-10-112-3/+14
* KVM: nVMX: Fix consistency check on injected exception error codeSean Christopherson2019-10-111-1/+1
* KVM: PPC: Book3S HV: XIVE: Free escalation interrupts before disabling the VPCédric Le Goater2019-10-111-8/+10
* x86/purgatory: Disable the stackleak GCC plugin for the purgatoryArvind Sankar2019-10-111-0/+1
* arm64: cpufeature: Detect SSBS and advertise to userspaceWill Deacon2019-10-115-7/+33
* MIPS: Treat Loongson Extensions as ASEsJiaxun Yang2019-10-114-0/+30
* powerpc/book3s64/mm: Don't do tlbie fixup for some hardware revisionsAneesh Kumar K.V2019-10-111-2/+28
* powerpc/powernv/ioda: Fix race in TCE level allocationAlexey Kardashevskiy2019-10-111-5/+13
* powerpc/powernv: Restrict OPAL symbol map to only be readable by rootAndrew Donnellan2019-10-111-4/+7
* powerpc/mce: Schedule work from irq_workSantosh Sivaraj2019-10-111-1/+10
* powerpc/mce: Fix MCE handling for huge pagesBalbir Singh2019-10-111-6/+13
* KVM: nVMX: handle page fault in vmread fixJack Wang2019-10-111-1/+1
* KVM: X86: Fix userspace set invalid CR4Wanpeng Li2019-10-111-17/+21
* KVM: PPC: Book3S HV: Don't lose pending doorbell request on migration on P9Paul Mackerras2019-10-111-1/+8
* KVM: PPC: Book3S HV: Check for MMU ready on piggybacked virtual coresPaul Mackerras2019-10-111-5/+10
* KVM: PPC: Book3S HV: Fix race in re-enabling XIVE escalation interruptsPaul Mackerras2019-10-111-13/+23
* s390/topology: avoid firing events before kobjs are createdVasily Gorbik2019-10-111-1/+2
* KVM: s390: Test for bad access register and size at the start of S390_MEM_OPThomas Huth2019-10-111-1/+1
* s390/process: avoid potential reading of freed stackVasily Gorbik2019-10-111-6/+16
* arm: use STACK_TOP when computing mmap base addressAlexandre Ghiti2019-10-071-2/+2
* arm: properly account for stack randomization and stack guard gapAlexandre Ghiti2019-10-071-2/+12
* mips: properly account for stack randomization and stack guard gapAlexandre Ghiti2019-10-071-2/+12
* arm64: consider stack randomization for mmap base only when necessaryAlexandre Ghiti2019-10-071-1/+5
* hypfs: Fix error number left in struct pointer memberDavid Howells2019-10-071-4/+5
* ARM: 8903/1: ensure that usable memory in bank 0 starts from a PMD-aligned ad...Mike Rapoport2019-10-071-0/+16
* ARM: 8875/1: Kconfig: default to AEABI w/ ClangNick Desaulniers2019-10-071-2/+3
* ARM: 8898/1: mm: Don't treat faults reported from cache maintenance as writesWill Deacon2019-10-072-2/+3