summaryrefslogtreecommitdiffstats
path: root/arch
Commit message (Expand)AuthorAgeFilesLines
* KVM: PPC: Book3S: Use new mutex to synchronize access to rtas token listPaul Mackerras2019-06-223-8/+8
* ia64: fix build errors by exporting paddr_to_nid()Randy Dunlap2019-06-221-0/+1
* x86/CPU/AMD: Don't force the CPB cap when running under a hypervisorFrank van der Linden2019-06-221-2/+5
* KVM: s390: fix memory slot handling for KVM_SET_USER_MEMORY_REGIONChristian Borntraeger2019-06-221-14/+21
* KVM: x86/pmu: do not mask the value that is written to fixed PMUsPaolo Bonzini2019-06-221-5/+8
* ARM: exynos: Fix undefined instruction during Exynos5422 resumeMarek Szyprowski2019-06-221-0/+19
* ARM: dts: exynos: Always enable necessary APIO_1V8 and ABB_1V8 regulators on ...Krzysztof Kozlowski2019-06-221-0/+2
* ARM: dts: imx6qdl: Specify IMX6QDL_CLK_IPG as "ipg" clock to SDMAAndrey Smirnov2019-06-221-1/+1
* ARM: dts: imx6sx: Specify IMX6SX_CLK_IPG as "ipg" clock to SDMAAndrey Smirnov2019-06-221-1/+1
* ARM: dts: imx6sx: Specify IMX6SX_CLK_IPG as "ahb" clock to SDMAAndrey Smirnov2019-06-221-1/+1
* x86/PCI: Fix PCI IRQ routing table memory leakWenwen Wang2019-06-221-2/+8
* perf/x86/intel: Allow PEBS multi-entry in watermark modeStephane Eranian2019-06-221-1/+1
* MIPS: pistachio: Build uImage.gz by defaultPaul Burton2019-06-111-0/+1
* Revert "x86/build: Move _etext to actual end of .text"Greg Kroah-Hartman2019-06-111-3/+3
* sparc64: Fix regression in non-hypervisor TLB flush xcallJames Clarke2019-06-111-2/+2
* x86/ia32: Fix ia32_restore_sigcontext() AC leakPeter Zijlstra2019-06-111-12/+17
* arm64: cpu_ops: fix a leaked reference by adding missing of_node_putWen Yang2019-06-111-0/+1
* x86/build: Keep local relocations with ld.lldKees Cook2019-06-111-1/+1
* x86/irq/64: Limit IST stack overflow check to #DB stackThomas Gleixner2019-06-111-5/+14
* powerpc/numa: improve control of topology updatesNathan Lynch2019-06-111-6/+12
* x86/mm: Remove in_nmi() warning from 64-bit implementation of vmalloc_fault()Jiri Kosina2019-06-111-2/+0
* x86/build: Move _etext to actual end of .textKees Cook2019-06-111-3/+3
* powerpc/boot: Fix missing check of lseek() return valueBo YU2019-06-111-1/+5
* KVM: x86: fix return value for reserved EFERPaolo Bonzini2019-06-111-1/+1
* KVM: arm/arm64: Ensure vcpu target is unset on reset failureAndrew Jones2019-06-111-3/+8
* KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writesSean Christopherson2019-06-111-11/+22
* crypto: arm/aes-neonbs - don't access already-freed walk.ivEric Biggers2019-06-111-0/+4
* crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest()Eric Biggers2019-06-111-8/+5
* ARM: exynos: Fix a leaked reference by adding missing of_node_putWen Yang2019-06-112-0/+3
* x86/speculation/mds: Revert CPU buffer clear on double fault exitAndy Lutomirski2019-06-111-8/+0
* powerpc/lib: fix book3s/32 boot failure due to code patchingChristophe Leroy2019-05-161-1/+1
* powerpc/booke64: set RI in default MSRLaurentiu Tudor2019-05-161-1/+1
* powerpc/64s: Include cpu headerBreno Leitao2019-05-161-0/+1
* x86/bugs: Change L1TF mitigation string to match upstreamBen Hutchings2019-05-161-1/+1
* x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf2019-05-161-1/+1
* x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-05-162-3/+7
* x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk2019-05-161-1/+2
* x86/speculation/mds: Fix commentBoris Ostrovsky2019-05-161-1/+1
* x86/speculation/mds: Add SMT warning messageJosh Poimboeuf2019-05-161-0/+8
* x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf2019-05-161-3/+2
* x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen2019-05-161-3/+3
* Documentation: Move L1TF to separate directoryThomas Gleixner2019-05-161-1/+1
* x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner2019-05-162-6/+13
* x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner2019-05-161-0/+27
* x86/speculation/mds: Add mitigation control for MDSThomas Gleixner2019-05-162-0/+76
* x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner2019-05-164-0/+27
* x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner2019-05-165-0/+31
* x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner2019-05-161-0/+25
* x86/kvm: Expose X86_FEATURE_MD_CLEAR to guestsAndi Kleen2019-05-161-1/+1
* x86/speculation/mds: Add BUG_MSBDS_ONLYThomas Gleixner2019-05-162-8/+13