aboutsummaryrefslogtreecommitdiffstats
path: root/arch
AgeCommit message (Expand)Author
2019-11-18Merge tag 'v4.14.151' into v4.14/standard/baseBruce Ashfield
2019-11-18Merge tag 'v4.14.150' into v4.14/standard/baseBruce Ashfield
2019-11-18Merge tag 'v4.14.149' into v4.14/standard/baseBruce Ashfield
2019-10-29kvm: vmx: Basic APIC virtualization controls have three settingsJim Mattson
2019-10-29kvm: apic: Flush TLB after APIC mode/address change if VPIDs are in useJunaid Shahid
2019-10-29kvm: vmx: Introduce lapic_mode enumerationJim Mattson
2019-10-29KVM: X86: introduce invalidate_gpa argument to tlb flushWanpeng Li
2019-10-29x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel areaSteve Wahl
2019-10-29parisc: Fix vmap memory leak in ioremap()/iounmap()Helge Deller
2019-10-29xtensa: drop EXPORT_SYMBOL for outs*/ins*Max Filippov
2019-10-29MIPS: tlbex: Fix build_restore_pagemask KScratch restorePaul Burton
2019-10-29arm64/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf
2019-10-29arm64: Use firmware to detect CPUs that are not affected by Spectre-v2Marc Zyngier
2019-10-29arm64: Force SSBS on context switchMarc Zyngier
2019-10-29arm64: ssbs: Don't treat CPUs with SSBS as unaffected by SSBWill Deacon
2019-10-29arm64: add sysfs vulnerability show for speculative store bypassJeremy Linton
2019-10-29arm64: add sysfs vulnerability show for spectre-v2Jeremy Linton
2019-10-29arm64: Always enable spectre-v2 vulnerability detectionJeremy Linton
2019-10-29arm64: Advertise mitigation of Spectre-v2, or lack thereofMarc Zyngier
2019-10-29arm64: Provide a command line to disable spectre_v2 mitigationJeremy Linton
2019-10-29arm64: Always enable ssb vulnerability detectionJeremy Linton
2019-10-29arm64: enable generic CPU vulnerabilites supportMian Yousaf Kaukab
2019-10-29arm64: add sysfs vulnerability show for meltdownJeremy Linton
2019-10-29arm64: Add sysfs vulnerability show for spectre-v1Mian Yousaf Kaukab
2019-10-29arm64: fix SSBS sanitizationMark Rutland
2019-10-29KVM: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vheWill Deacon
2019-10-29arm64: ssbd: Add support for PSTATE.SSBS rather than trapping to EL3Will Deacon
2019-10-29arm64: cpufeature: Detect SSBS and advertise to userspaceWill Deacon
2019-10-29arm64: Get rid of __smccc_workaround_1_hvc_*Marc Zyngier
2019-10-29arm64: don't zero DIT on signal returnMark Rutland
2019-10-29arm64: KVM: Use SMCCC_ARCH_WORKAROUND_1 for Falkor BP hardeningShanker Donthineni
2019-10-29arm64: capabilities: Add support for checks based on a list of MIDRsSuzuki K Poulose
2019-10-29arm64: Add MIDR encoding for Arm Cortex-A55 and Cortex-A35Suzuki K Poulose
2019-10-29arm64: Add helpers for checking CPU MIDR against a rangeSuzuki K Poulose
2019-10-29arm64: capabilities: Clean up midr range helpersSuzuki K Poulose
2019-10-29arm64: capabilities: Change scope of VHE to Boot CPU featureSuzuki K Poulose
2019-10-29arm64: capabilities: Add support for features enabled earlySuzuki K Poulose
2019-10-29arm64: capabilities: Restrict KPTI detection to boot-time CPUsSuzuki K Poulose
2019-10-29arm64: capabilities: Introduce weak features based on local CPUSuzuki K Poulose
2019-10-29arm64: capabilities: Group handling of features and errata workaroundsSuzuki K Poulose
2019-10-29arm64: capabilities: Allow features based on local CPU scopeSuzuki K Poulose
2019-10-29arm64: capabilities: Split the processing of errata work aroundsSuzuki K Poulose
2019-10-29arm64: capabilities: Prepare for grouping features and errata work aroundsSuzuki K Poulose
2019-10-29arm64: capabilities: Filter the entries based on a given maskSuzuki K Poulose
2019-10-29arm64: capabilities: Unify the verificationSuzuki K Poulose
2019-10-29arm64: capabilities: Add flags to handle the conflicts on late CPUSuzuki K Poulose
2019-10-29arm64: capabilities: Prepare for fine grained capabilitiesSuzuki K Poulose
2019-10-29arm64: capabilities: Move errata processing codeSuzuki K Poulose
2019-10-29arm64: capabilities: Move errata work around check on boot CPUSuzuki K Poulose
2019-10-29arm64: capabilities: Update prototype for enable call backDave Martin