summaryrefslogtreecommitdiff
path: root/arch
AgeCommit message (Expand)Author
2019-06-11KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writesSean Christopherson
2019-06-11crypto: arm/aes-neonbs - don't access already-freed walk.ivEric Biggers
2019-06-11crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest()Eric Biggers
2019-06-11ARM: exynos: Fix a leaked reference by adding missing of_node_putWen Yang
2019-06-11x86/speculation/mds: Revert CPU buffer clear on double fault exitAndy Lutomirski
2019-05-16powerpc/lib: fix book3s/32 boot failure due to code patchingChristophe Leroy
2019-05-16powerpc/booke64: set RI in default MSRLaurentiu Tudor
2019-05-16powerpc/64s: Include cpu headerBreno Leitao
2019-05-16x86/bugs: Change L1TF mitigation string to match upstreamBen Hutchings
2019-05-16x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf
2019-05-16x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf
2019-05-16x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk
2019-05-16x86/speculation/mds: Fix commentBoris Ostrovsky
2019-05-16x86/speculation/mds: Add SMT warning messageJosh Poimboeuf
2019-05-16x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf
2019-05-16x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen
2019-05-16Documentation: Move L1TF to separate directoryThomas Gleixner
2019-05-16x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner
2019-05-16x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner
2019-05-16x86/speculation/mds: Add mitigation control for MDSThomas Gleixner
2019-05-16x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner
2019-05-16x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner
2019-05-16x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner
2019-05-16x86/kvm: Expose X86_FEATURE_MD_CLEAR to guestsAndi Kleen
2019-05-16x86/speculation/mds: Add BUG_MSBDS_ONLYThomas Gleixner
2019-05-16x86/speculation/mds: Add basic bug infrastructure for MDSAndi Kleen
2019-05-16x86/speculation: Consolidate CPU whitelistsThomas Gleixner
2019-05-16x86/msr-index: Cleanup bit definesThomas Gleixner
2019-05-16kvm: x86: Report STIBP on GET_SUPPORTED_CPUIDEduardo Habkost
2019-05-16x86/speculation: Provide IBPB always command line optionsThomas Gleixner
2019-05-16x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner
2019-05-16x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner
2019-05-16x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner
2019-05-16x86/speculation: Prevent stale SPEC_CTRL msr contentThomas Gleixner
2019-05-16x86/speculation: Prepare arch_smt_update() for PRCTL modeThomas Gleixner
2019-05-16x86/speculation: Split out TIF updateThomas Gleixner
2019-05-16x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner
2019-05-16x86/speculation: Avoid __switch_to_xtra() callsThomas Gleixner
2019-05-16x86/process: Consolidate and simplify switch_to_xtra() codeThomas Gleixner
2019-05-16x86/speculation: Prepare for per task indirect branch speculation controlTim Chen
2019-05-16x86/speculation: Add command line control for indirect branch speculationThomas Gleixner
2019-05-16x86/speculation: Unify conditional spectre v2 print functionsThomas Gleixner
2019-05-16x86/speculataion: Mark command line parser data __initdataThomas Gleixner
2019-05-16x86/speculation: Mark string arrays const correctlyThomas Gleixner
2019-05-16x86/speculation: Reorder the spec_v2 codeThomas Gleixner
2019-05-16x86/speculation: Rework SMT state changeThomas Gleixner
2019-05-16x86/Kconfig: Select SCHED_SMT if SMP enabledThomas Gleixner
2019-05-16x86/speculation: Reorganize speculation control MSRs updateTim Chen
2019-05-16x86/speculation: Rename SSBD update functionsThomas Gleixner
2019-05-16x86/speculation: Disable STIBP when enhanced IBRS is in useTim Chen