summaryrefslogtreecommitdiff
path: root/arch
AgeCommit message (Expand)Author
2019-05-16Merge 4.4.180 into android-4.4-pGreg Kroah-Hartman
2019-05-16powerpc/lib: fix book3s/32 boot failure due to code patchingChristophe Leroy
2019-05-16powerpc/booke64: set RI in default MSRLaurentiu Tudor
2019-05-16powerpc/64s: Include cpu headerBreno Leitao
2019-05-16x86/bugs: Change L1TF mitigation string to match upstreamBen Hutchings
2019-05-16x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf
2019-05-16x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf
2019-05-16x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk
2019-05-16x86/speculation/mds: Fix commentBoris Ostrovsky
2019-05-16x86/speculation/mds: Add SMT warning messageJosh Poimboeuf
2019-05-16x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf
2019-05-16x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen
2019-05-16Documentation: Move L1TF to separate directoryThomas Gleixner
2019-05-16x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner
2019-05-16x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner
2019-05-16x86/speculation/mds: Add mitigation control for MDSThomas Gleixner
2019-05-16x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner
2019-05-16x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner
2019-05-16x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner
2019-05-16x86/kvm: Expose X86_FEATURE_MD_CLEAR to guestsAndi Kleen
2019-05-16x86/speculation/mds: Add BUG_MSBDS_ONLYThomas Gleixner
2019-05-16x86/speculation/mds: Add basic bug infrastructure for MDSAndi Kleen
2019-05-16x86/speculation: Consolidate CPU whitelistsThomas Gleixner
2019-05-16x86/msr-index: Cleanup bit definesThomas Gleixner
2019-05-16kvm: x86: Report STIBP on GET_SUPPORTED_CPUIDEduardo Habkost
2019-05-16x86/speculation: Provide IBPB always command line optionsThomas Gleixner
2019-05-16x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner
2019-05-16x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner
2019-05-16x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner
2019-05-16x86/speculation: Prevent stale SPEC_CTRL msr contentThomas Gleixner
2019-05-16x86/speculation: Prepare arch_smt_update() for PRCTL modeThomas Gleixner
2019-05-16x86/speculation: Split out TIF updateThomas Gleixner
2019-05-16x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner
2019-05-16x86/speculation: Avoid __switch_to_xtra() callsThomas Gleixner
2019-05-16x86/process: Consolidate and simplify switch_to_xtra() codeThomas Gleixner
2019-05-16x86/speculation: Prepare for per task indirect branch speculation controlTim Chen
2019-05-16x86/speculation: Add command line control for indirect branch speculationThomas Gleixner
2019-05-16x86/speculation: Unify conditional spectre v2 print functionsThomas Gleixner
2019-05-16x86/speculataion: Mark command line parser data __initdataThomas Gleixner
2019-05-16x86/speculation: Mark string arrays const correctlyThomas Gleixner
2019-05-16x86/speculation: Reorder the spec_v2 codeThomas Gleixner
2019-05-16x86/speculation: Rework SMT state changeThomas Gleixner
2019-05-16x86/Kconfig: Select SCHED_SMT if SMP enabledThomas Gleixner
2019-05-16x86/speculation: Reorganize speculation control MSRs updateTim Chen
2019-05-16x86/speculation: Rename SSBD update functionsThomas Gleixner
2019-05-16x86/speculation: Disable STIBP when enhanced IBRS is in useTim Chen
2019-05-16x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common()Tim Chen
2019-05-16x86/speculation: Remove unnecessary ret variable in cpu_show_common()Tim Chen
2019-05-16x86/speculation: Clean up spectre_v2_parse_cmdline()Tim Chen
2019-05-16x86/speculation: Update the TIF_SSBD commentTim Chen