summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* sample/bpf: fix erspan metadataWilliam Tu2018-02-062-27/+18
* net: erspan: fix erspan config overwriteWilliam Tu2018-02-062-18/+0
* net: erspan: fix metadata extractionWilliam Tu2018-02-063-16/+21
* cls_u32: fix use after free in u32_destroy_key()Paolo Abeni2018-02-061-10/+11
* net: amd-xgbe: fix comparison to bitshift when dealing with a maskWolfram Sang2018-02-061-1/+1
* net: phy: Handle not having GPIO enabled in the kernelAndrew Lunn2018-02-061-1/+2
* ibmvnic: fix empty firmware version and errors cleanupDesnes Augusto Nunes do Rosario2018-02-061-10/+4
* sctp: fix dst refcnt leak in sctp_v4_get_dstTommi Rantala2018-02-061-6/+4
* sctp: fix dst refcnt leak in sctp_v6_get_dst()Alexey Kodanev2018-02-061-3/+7
* dwc-xlgmac: remove Jie Deng as co-maintainerJie Deng2018-02-051-1/+0
* doc: Change the min default value of tcp_wmem/tcp_rmem.Tonghao Zhang2018-02-051-2/+2
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpfDavid S. Miller2018-02-0428-141/+1716
|\
| * Merge branch 'libbpf-xdp-support'Alexei Starovoitov2018-02-0320-128/+1632
| |\
| | * samples/bpf: use bpf_set_link_xdp_fdEric Leblond2018-02-039-126/+24
| | * libbpf: add missing SPDX-License-IdentifierEric Leblond2018-02-034-0/+8
| | * libbpf: add error reporting in XDPEric Leblond2018-02-035-2/+272
| | * libbpf: add function to setup XDPEric Leblond2018-02-033-0/+128
| | * tools: add netlink.h and if_link.h in tools uapiEric Leblond2018-02-033-0/+1200
| |/
| * bpf: fix bpf_prog_array_copy_to_user() issuesAlexei Starovoitov2018-02-031-8/+24
| * bpf: add documentation to compare clang "-target bpf" and default targetYonghong Song2018-02-021-0/+31
| * bpf: fix null pointer deref in bpf_prog_test_run_xdpDaniel Borkmann2018-02-013-0/+24
| * tools/bpf: permit selftests/bpf to be built in a different directoryYonghong Song2018-02-012-2/+3
| * netdevsim: fix overflow on the error pathJakub Kicinski2018-02-011-3/+2
* | Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2018-02-0438-554/+977
|\ \
| * | KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRLKarimAllah Ahmed2018-02-031-0/+88
| * | KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRLKarimAllah Ahmed2018-02-033-6/+110
| * | KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIESKarimAllah Ahmed2018-02-033-1/+17
| * | KVM/x86: Add IBPB supportAshok Raj2018-02-033-3/+116
| * | KVM/x86: Update the reverse_cpuid list to include CPUID_7_EDXKarimAllah Ahmed2018-02-032-5/+4
| * | Merge branch 'msr-bitmaps' of git://git.kernel.org/pub/scm/virt/kvm/kvm into ...Thomas Gleixner2018-02-031-254/+186
| |\ \
| | * | KVM: VMX: make MSR bitmaps per-VCPUPaolo Bonzini2018-01-311-123/+147
| | * | KVM: VMX: introduce alloc_loaded_vmcsPaolo Bonzini2018-01-271-14/+22
| | * | KVM: nVMX: Eliminate vmcs02 poolJim Mattson2018-01-271-123/+23
| * | | x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALLDarren Kenny2018-02-021-1/+1
| * | | x86/pti: Mark constant arrays as __initconstArnd Bergmann2018-02-021-2/+2
| * | | x86/spectre: Simplify spectre_v2 command line parsingKarimAllah Ahmed2018-02-021-30/+56
| * | | x86/retpoline: Avoid retpolines for built-in __init functionsDavid Woodhouse2018-02-021-1/+8
| * | | x86/kvm: Update spectre-v1 mitigationDan Williams2018-02-011-11/+9
| * | | x86/paravirt: Remove 'noreplace-paravirt' cmdline optionJosh Poimboeuf2018-01-312-16/+0
| * | | x86/speculation: Use Indirect Branch Prediction Barrier in context switchTim Chen2018-01-302-1/+34
| * | | x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on IntelDavid Woodhouse2018-01-302-19/+29
| * | | x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"Colin Ian King2018-01-301-1/+1
| * | | x86/spectre: Report get_user mitigation for spectre_v1Dan Williams2018-01-301-1/+1
| * | | nl80211: Sanitize array index in parse_txq_paramsDan Williams2018-01-301-3/+6
| * | | vfs, fdtable: Prevent bounds-check bypass via speculative executionDan Williams2018-01-301-1/+4
| * | | x86/syscall: Sanitize syscall table de-references under speculationDan Williams2018-01-301-1/+4
| * | | x86/get_user: Use pointer masking to limit speculationDan Williams2018-01-301-0/+10
| * | | x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospecDan Williams2018-01-304-14/+14
| * | | x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}Dan Williams2018-01-301-4/+4
| * | | x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospecDan Williams2018-01-301-0/+9