summaryrefslogtreecommitdiffstats
path: root/arch (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/netdev/netJakub Kicinski2022-07-1581-447/+1535
|\
| * x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_currentNathan Chancellor2022-07-141-1/+2
| * Merge tag 'for-linus' of git://git.armlinux.org.uk/~rmk/linux-armLinus Torvalds2022-07-149-45/+55
| |\
| | * ARM: 9208/1: entry: add .ltorg directive to keep literals in rangeArd Biesheuvel2022-07-141-0/+1
| | * ARM: 9214/1: alignment: advance IT state after emulating Thumb instructionArd Biesheuvel2022-07-063-25/+30
| | * ARM: 9213/1: Print message about disabled Spectre workarounds only onceDmitry Osipenko2022-07-061-2/+1
| | * ARM: 9212/1: domain: Modify Kconfig help textLinus Walleij2022-07-061-1/+5
| | * ARM: 9211/1: domain: drop modify_domain()Linus Walleij2022-07-061-13/+0
| | * ARM: 9210/1: Mark the FDT_FIXED sections as shareableZhen Lei2022-07-062-1/+15
| | * ARM: 9209/1: Spectre-BHB: avoid pr_info() every time a CPU comes out of idleArd Biesheuvel2022-07-061-3/+3
| * | um: Replace to_phys() and to_virt() with less generic function namesGuenter Roeck2022-07-143-7/+7
| * | Merge tag 'x86_bugs_retbleed' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2022-07-121-5/+8
| |\ \
| | * | x86/static_call: Serialize __static_call_fixup() properlyThomas Gleixner2022-07-121-5/+8
| * | | Merge tag 'x86_bugs_retbleed' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2022-07-1252-349/+1408
| |\ \ \
| | * | | x86/speculation: Disable RRSBA behaviorPawan Gupta2022-07-094-1/+37
| | * | | x86/kexec: Disable RET on kexecKonrad Rzeszutek Wilk2022-07-092-12/+36
| | * | | x86/bugs: Do not enable IBPB-on-entry when IBPB is not supportedThadeu Lima de Souza Cascardo2022-07-081-2/+5
| | * | | x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entryPeter Zijlstra2022-07-071-3/+6
| | * | | x86/bugs: Add Cannon lake to RETBleed affected CPU listPawan Gupta2022-07-071-0/+1
| | |/ /
| | * | x86/retbleed: Add fine grained Kconfig knobsPeter Zijlstra2022-06-2913-55/+161
| | * | x86/cpu/amd: Enumerate BTC_NOAndrew Cooper2022-06-273-8/+20
| | * | x86/common: Stamp out the stepping madnessPeter Zijlstra2022-06-271-21/+16
| | * | KVM: VMX: Prevent RSB underflow before vmenterJosh Poimboeuf2022-06-277-15/+42
| | * | x86/speculation: Fill RSB on vmexit for IBRSJosh Poimboeuf2022-06-273-9/+62
| | * | KVM: VMX: Fix IBRS handling after vmexitJosh Poimboeuf2022-06-271-1/+6
| | * | KVM: VMX: Prevent guest RSB poisoning attacks with eIBRSJosh Poimboeuf2022-06-276-31/+73
| | * | KVM: VMX: Convert launched argument to flagsJosh Poimboeuf2022-06-275-9/+31
| | * | KVM: VMX: Flatten __vmx_vcpu_run()Josh Poimboeuf2022-06-271-73/+46
| | * | objtool: Re-add UNWIND_HINT_{SAVE_RESTORE}Josh Poimboeuf2022-06-271-2/+10
| | * | x86/speculation: Remove x86_spec_ctrl_maskJosh Poimboeuf2022-06-271-30/+1
| | * | x86/speculation: Use cached host SPEC_CTRL value for guest entry/exitJosh Poimboeuf2022-06-271-11/+1
| | * | x86/speculation: Fix SPEC_CTRL write on SMT state changeJosh Poimboeuf2022-06-271-1/+2
| | * | x86/speculation: Fix firmware entry SPEC_CTRL handlingJosh Poimboeuf2022-06-271-6/+4
| | * | x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=nJosh Poimboeuf2022-06-273-6/+0
| | * | x86/cpu/amd: Add Spectral ChickenPeter Zijlstra2022-06-274-1/+33
| | * | objtool: Add entry UNRET validationPeter Zijlstra2022-06-276-9/+31
| | * | x86/bugs: Do IBPB fallback check only onceJosh Poimboeuf2022-06-271-10/+5
| | * | x86/bugs: Add retbleed=ibpbPeter Zijlstra2022-06-275-13/+64
| | * | x86/xen: Add UNTRAIN_RETPeter Zijlstra2022-06-271-1/+7
| | * | x86/xen: Rename SYS* entry pointsPeter Zijlstra2022-06-273-16/+16
| | * | objtool: Update Retpoline validationPeter Zijlstra2022-06-273-0/+9
| | * | intel_idle: Disable IBRS during long idlePeter Zijlstra2022-06-272-0/+7
| | * | x86/bugs: Report Intel retbleed vulnerabilityPeter Zijlstra2022-06-273-18/+46
| | * | x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mit...Peter Zijlstra2022-06-271-8/+17
| | * | x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRSPawan Gupta2022-06-272-14/+53
| | * | x86/bugs: Optimize SPEC_CTRL MSR writesPeter Zijlstra2022-06-273-8/+14
| | * | x86/entry: Add kernel IBRS implementationPeter Zijlstra2022-06-274-10/+111
| | * | x86/bugs: Keep a per-CPU IA32_SPEC_CTRL valuePeter Zijlstra2022-06-273-6/+25
| | * | x86/bugs: Enable STIBP for JMP2RETKim Phillips2022-06-271-12/+46
| | * | x86/bugs: Add AMD retbleed= boot parameterAlexandre Chartre2022-06-272-1/+110