summaryrefslogtreecommitdiff
path: root/arch
AgeCommit message (Expand)Author
2018-05-29arm64: introduce binfmt_elf32.cYury Norov
2018-05-29arm64: ilp32: add is_ilp32_compat_{task,thread} and TIF_32BIT_AARCH64Yury Norov
2018-05-29arm64: introduce is_a32_task and is_a32_thread (for AArch32 compat)Yury Norov
2018-05-29arm64: uapi: set __BITS_PER_LONG correctly for ILP32 and LP64Andrew Pinski
2018-05-29arm64: rename functions that reference compat termYury Norov
2018-05-29arm64: rename COMPAT to AARCH32_EL0 in KconfigAndrew Pinski
2018-05-29asm-generic: Drop getrlimit and setrlimit syscalls from default listYury Norov
2018-05-2932-bit userspace ABI: introduce ARCH_32BIT_OFF_T config optionYury Norov
2018-05-29compat ABI: use non-compat openat and open_by_handle_at variantsYury Norov
2018-05-29arm64: signal: Make parse_user_sigframe() independent of rt_sigframe layoutDave Martin
2018-05-25x86/kexec: Avoid double free_page() upon do_kexec_load() failureTetsuo Handa
2018-05-25s390: use expoline thunks in the BPF JITMartin Schwidefsky
2018-05-25s390: extend expoline to BC instructionsMartin Schwidefsky
2018-05-25s390: move spectre sysfs attribute codeMartin Schwidefsky
2018-05-25s390/kernel: use expoline for indirect branchesMartin Schwidefsky
2018-05-25s390/ftrace: use expoline for indirect branchesMartin Schwidefsky
2018-05-25s390/lib: use expoline for indirect branchesMartin Schwidefsky
2018-05-25s390/crc32-vx: use expoline for indirect branchesMartin Schwidefsky
2018-05-25s390: move expoline assembler macros to a headerMartin Schwidefsky
2018-05-25s390: correct module section names for expoline code revertMartin Schwidefsky
2018-05-25s390: correct nospec auto detection init orderMartin Schwidefsky
2018-05-25s390: add assembler macros for CPU alternativesMartin Schwidefsky
2018-05-25s390: add sysfs attributes for spectreMartin Schwidefsky
2018-05-25s390: report spectre mitigation via syslogMartin Schwidefsky
2018-05-25s390: add automatic detection of the spectre defenseMartin Schwidefsky
2018-05-25s390: move nobp parameter functions to nospec-branch.cMartin Schwidefsky
2018-05-25powerpc/64s: Add support for a store forwarding barrier at kernel entry/exitNicholas Piggin
2018-05-25powerpc: Move default security feature flagsMauricio Faria de Oliveira
2018-05-25powerpc/pseries: Fix clearing of security feature flagsMauricio Faria de Oliveira
2018-05-25powerpc/64s: Wire up cpu_show_spectre_v2()Michael Ellerman
2018-05-25powerpc/64s: Wire up cpu_show_spectre_v1()Michael Ellerman
2018-05-25powerpc/pseries: Use the security flags in pseries_setup_rfi_flush()Michael Ellerman
2018-05-25powerpc/powernv: Use the security flags in pnv_setup_rfi_flush()Michael Ellerman
2018-05-25powerpc/64s: Enhance the information in cpu_show_meltdown()Michael Ellerman
2018-05-25powerpc/64s: Move cpu_show_meltdown()Michael Ellerman
2018-05-25powerpc/powernv: Set or clear security feature flagsMichael Ellerman
2018-05-25powerpc/pseries: Set or clear security feature flagsMichael Ellerman
2018-05-25powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flagsMichael Ellerman
2018-05-25powerpc: Add security feature flags for Spectre/MeltdownMichael Ellerman
2018-05-25powerpc/rfi-flush: Always enable fallback flush on pseriesMichael Ellerman
2018-05-25sparc: vio: use put_device() instead of kfree()Arvind Yadav
2018-05-22x86/bugs: Rename SSBD_NO to SSB_NOKonrad Rzeszutek Wilk
2018-05-22KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBDTom Lendacky
2018-05-22x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFGThomas Gleixner
2018-05-22x86/bugs: Rework spec_ctrl base and mask logicThomas Gleixner
2018-05-22x86/bugs: Remove x86_spec_ctrl_set()Thomas Gleixner
2018-05-22x86/bugs: Expose x86_spec_ctrl_base directlyThomas Gleixner
2018-05-22x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}Borislav Petkov
2018-05-22x86/speculation: Rework speculative_store_bypass_update()Thomas Gleixner
2018-05-22x86/speculation: Add virtualized speculative store bypass disable supportTom Lendacky