Age | Commit message (Expand) | Author | Files | Lines |
2018-01-29 | x86/spectre: report get_user mitigation for spectre_v1nospec-v6 | Dan Williams | 1 | -1/+1 |
2018-01-29 | nl80211: sanitize array index in parse_txq_params | Dan Williams | 1 | -3/+6 |
2018-01-29 | kvm, x86: update spectre-v1 mitigation | Dan Williams | 1 | -4/+10 |
2018-01-29 | vfs, fdtable: prevent bounds-check bypass via speculative execution | Dan Williams | 1 | -1/+4 |
2018-01-29 | x86: sanitize syscall table de-references under speculation | Dan Williams | 1 | -1/+4 |
2018-01-29 | x86, get_user: use pointer masking to limit speculation | Dan Williams | 1 | -0/+10 |
2018-01-29 | x86, __get_user: use __uaccess_begin_nospec | Dan Williams | 4 | -14/+14 |
2018-01-29 | x86, usercopy: replace open coded stac/clac with __uaccess_{begin,end} | Dan Williams | 1 | -4/+4 |
2018-01-29 | x86: introduce __uaccess_begin_nospec | Dan Williams | 1 | -0/+9 |
2018-01-29 | x86: introduce barrier_nospec | Dan Williams | 2 | -2/+5 |
2018-01-29 | x86: implement array_index_mask_nospec | Dan Williams | 1 | -0/+24 |
2018-01-29 | array_index_nospec: sanitize speculative array de-references | Dan Williams | 1 | -0/+72 |
2018-01-25 | Documentation: document array_index_nospec | Mark Rutland | 1 | -0/+90 |
2018-01-25 | KVM: VMX: Make indirect call speculation safe | Peter Zijlstra | 1 | -2/+2 |
2018-01-25 | KVM: x86: Make indirect calls in emulator speculation safe | Peter Zijlstra | 1 | -4/+5 |
2018-01-24 | x86/retpoline: Remove the esp/rsp thunk | Waiman Long | 2 | -2/+0 |
2018-01-19 | x86/retpoline: Optimize inline assembler for vmexit_fill_RSB | Andi Kleen | 1 | -3/+4 |
2018-01-19 | x86/pti: Document fix wrong index | zhenwei.pi | 1 | -1/+1 |
2018-01-19 | kprobes/x86: Disable optimizing on the function jumps to indirect thunk | Masami Hiramatsu | 1 | -1/+22 |
2018-01-19 | kprobes/x86: Blacklist indirect thunk functions for kprobes | Masami Hiramatsu | 1 | -1/+2 |
2018-01-19 | retpoline: Introduce start/end markers of indirect thunk | Masami Hiramatsu | 3 | -1/+10 |
2018-01-19 | x86/mce: Make machine check speculation protected | Thomas Gleixner | 3 | -1/+7 |
2018-01-17 | module: Add retpoline tag to VERMAGIC | Andi Kleen | 1 | -1/+7 |
2018-01-17 | x86/cpufeature: Move processor tracing out of scattered features | Paolo Bonzini | 2 | -2/+1 |
2018-01-16 | objtool: Improve error message for bad file argument | Josh Poimboeuf | 1 | -1/+3 |
2018-01-16 | objtool: Fix seg fault with gold linker | Josh Poimboeuf | 1 | -4/+10 |
2018-01-15 | x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros | Tom Lendacky | 1 | -1/+5 |
2018-01-15 | x86/retpoline: Fill RSB on context switch for affected CPUs | David Woodhouse | 4 | -0/+59 |
2018-01-15 | x86/kasan: Panic if there is not enough memory to boot | Andrey Ryabinin | 1 | -10/+14 |
2018-01-14 | x86/retpoline: Remove compile time warning | Thomas Gleixner | 1 | -2/+0 |
2018-01-14 | x86,perf: Disable intel_bts when PTI | Peter Zijlstra | 1 | -0/+18 |
2018-01-14 | security/Kconfig: Correct the Documentation reference for PTI | W. Trevor King | 1 | -1/+1 |
2018-01-14 | x86/pti: Fix !PCID and sanitize defines | Thomas Gleixner | 3 | -21/+23 |
2018-01-13 | selftests/x86: Add test_vsyscall | Andy Lutomirski | 2 | -1/+501 |
2018-01-12 | x86/retpoline: Fill return stack buffer on vmexit | David Woodhouse | 3 | -1/+85 |
2018-01-12 | x86/retpoline/irq32: Convert assembler indirect jumps | Andi Kleen | 1 | -4/+5 |
2018-01-12 | x86/retpoline/checksum32: Convert assembler indirect jumps | David Woodhouse | 1 | -3/+4 |
2018-01-12 | x86/retpoline/xen: Convert Xen hypercall indirect jumps | David Woodhouse | 1 | -2/+3 |
2018-01-12 | x86/retpoline/hyperv: Convert assembler indirect jumps | David Woodhouse | 1 | -8/+10 |
2018-01-12 | x86/retpoline/ftrace: Convert ftrace assembler indirect jumps | David Woodhouse | 2 | -6/+8 |
2018-01-12 | x86/retpoline/entry: Convert entry assembler indirect jumps | David Woodhouse | 2 | -5/+12 |
2018-01-12 | x86/retpoline/crypto: Convert crypto assembler indirect jumps | David Woodhouse | 4 | -5/+9 |
2018-01-12 | x86/spectre: Add boot time option to select Spectre v2 mitigation | David Woodhouse | 4 | -5/+195 |
2018-01-12 | x86/retpoline: Add initial retpoline support | David Woodhouse | 8 | -0/+231 |
2018-01-12 | objtool: Allow alternatives to be ignored | Josh Poimboeuf | 2 | -7/+57 |
2018-01-12 | objtool: Detect jumps to retpoline thunks | Josh Poimboeuf | 1 | -0/+7 |
2018-01-11 | x86/pti: Make unpoison of pgd for trusted boot work for real | Dave Hansen | 1 | -1/+11 |
2018-01-10 | x86/alternatives: Fix optimize_nops() checking | Borislav Petkov | 1 | -2/+5 |
2018-01-09 | sysfs/cpu: Fix typos in vulnerability documentation | David Woodhouse | 1 | -2/+2 |
2018-01-09 | x86/cpu/AMD: Use LFENCE_RDTSC in preference to MFENCE_RDTSC | Tom Lendacky | 2 | -2/+17 |
2018-01-09 | x86/cpu/AMD: Make LFENCE a serializing instruction | Tom Lendacky | 2 | -0/+12 |
2018-01-08 | x86/mm/pti: Remove dead logic in pti_user_pagetable_walk*() | Jike Song | 1 | -26/+6 |
2018-01-08 | x86/tboot: Unbreak tboot with PTI enabled | Dave Hansen | 1 | -0/+1 |
2018-01-08 | x86/cpu: Implement CPU vulnerabilites sysfs functions | Thomas Gleixner | 2 | -0/+30 |
2018-01-08 | sysfs/cpu: Add vulnerability folder | Thomas Gleixner | 4 | -0/+74 |
2018-01-06 | x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] | David Woodhouse | 2 | -0/+5 |
2018-01-06 | x86/Documentation: Add PTI description | Dave Hansen | 2 | -7/+200 |
2018-01-06 | x86/pti: Unbreak EFI old_memmap | Jiri Kosina | 1 | -0/+2 |
2018-01-05 | x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN | Thomas Gleixner | 3 | -5/+5 |
2018-01-05 | x86/alternatives: Add missing '\n' at end of ALTERNATIVE inline asm | David Woodhouse | 1 | -2/+2 |
2018-01-05 | x86/tlb: Drop the _GPL from the cpu_tlbstate export | Thomas Gleixner | 1 | -1/+1 |
2018-01-05 | x86/events/intel/ds: Use the proper cache flush method for mapping ds buffers | Peter Zijlstra | 1 | -0/+16 |
2018-01-05 | x86/kaslr: Fix the vaddr_end mess | Thomas Gleixner | 3 | -24/+22 |
2018-01-04 | x86/mm: Map cpu_entry_area at the same place on 4/5 level | Thomas Gleixner | 3 | -6/+7 |
2018-01-04 | x86/mm: Set MODULES_END to 0xffffffffff000000 | Andrey Ryabinin | 2 | -5/+2 |
2018-01-03 | x86/process: Define cpu_tss_rw in same section as declaration | Nick Desaulniers | 1 | -1/+1 |
2018-01-03 | x86/pti: Switch to kernel CR3 at early in entry_SYSCALL_compat() | Thomas Gleixner | 1 | -7/+6 |
2018-01-03 | x86/dumpstack: Print registers for first stack frame | Josh Poimboeuf | 1 | -1/+2 |
2018-01-03 | x86/dumpstack: Fix partial register dumps | Josh Poimboeuf | 3 | -13/+34 |
2018-01-03 | x86/pti: Make sure the user/kernel PTEs match | Thomas Gleixner | 1 | -1/+2 |
2018-01-03 | x86/cpu, x86/pti: Do not enable PTI on AMD processors | Tom Lendacky | 1 | -2/+2 |
2018-01-03 | x86/pti: Enable PTI by default | Thomas Gleixner | 1 | -0/+1 |
2017-12-31 | x86/ldt: Make LDT pgtable free conditional | Thomas Gleixner | 1 | -1/+2 |
2017-12-31 | x86/ldt: Plug memory leak in error path | Thomas Gleixner | 1 | -1/+7 |
2017-12-31 | x86/mm: Remove preempt_disable/enable() from __native_flush_tlb() | Thomas Gleixner | 1 | -6/+8 |
2017-12-31 | x86/smpboot: Remove stale TLB flush invocations | Thomas Gleixner | 1 | -9/+0 |
2017-12-23 | x86/ldt: Make the LDT mapping RO | Thomas Gleixner | 4 | -12/+11 |
2017-12-23 | x86/mm/dump_pagetables: Allow dumping current pagetables | Thomas Gleixner | 3 | -6/+73 |
2017-12-23 | x86/mm/dump_pagetables: Check user space page table for WX pages | Thomas Gleixner | 3 | -6/+27 |
2017-12-23 | x86/mm/dump_pagetables: Add page table directory to the debugfs VFS hierarchy | Borislav Petkov | 1 | -5/+10 |
2017-12-23 | x86/mm/pti: Add Kconfig | Dave Hansen | 1 | -0/+10 |
2017-12-23 | x86/dumpstack: Indicate in Oops whether PTI is configured and enabled | Vlastimil Babka | 1 | -2/+4 |
2017-12-23 | x86/mm: Clarify the whole ASID/kernel PCID/user PCID naming | Peter Zijlstra | 1 | -12/+43 |
2017-12-23 | x86/mm: Use INVPCID for __native_flush_tlb_single() | Dave Hansen | 3 | -28/+60 |
2017-12-23 | x86/mm: Optimize RESTORE_CR3 | Peter Zijlstra | 2 | -4/+30 |
2017-12-23 | x86/mm: Use/Fix PCID to optimize user/kernel switches | Peter Zijlstra | 9 | -33/+162 |
2017-12-23 | x86/mm: Abstract switching CR3 | Dave Hansen | 1 | -2/+20 |
2017-12-23 | x86/mm: Allow flushing for future ASID switches | Dave Hansen | 2 | -8/+64 |
2017-12-23 | x86/pti: Map the vsyscall page if needed | Andy Lutomirski | 3 | -3/+69 |
2017-12-23 | x86/pti: Put the LDT in its own PGD if PTI is on | Andy Lutomirski | 6 | -17/+220 |
2017-12-23 | x86/mm/64: Make a full PGD-entry size hole in the memory map | Andy Lutomirski | 2 | -4/+4 |
2017-12-23 | x86/events/intel/ds: Map debug buffers in cpu_entry_area | Hugh Dickins | 2 | -45/+82 |
2017-12-23 | x86/cpu_entry_area: Add debugstore entries to cpu_entry_area | Thomas Gleixner | 5 | -21/+81 |
2017-12-23 | x86/mm/pti: Map ESPFIX into user space | Andy Lutomirski | 1 | -0/+11 |
2017-12-23 | x86/mm/pti: Share entry text PMD | Thomas Gleixner | 1 | -0/+10 |
2017-12-23 | x86/entry: Align entry text section to PMD boundary | Thomas Gleixner | 1 | -0/+8 |
2017-12-23 | x86/mm/pti: Share cpu_entry_area with user space page tables | Andy Lutomirski | 1 | -0/+25 |
2017-12-23 | x86/mm/pti: Force entry through trampoline when PTI active | Thomas Gleixner | 1 | -1/+4 |
2017-12-23 | x86/mm/pti: Add functions to clone kernel PMDs | Andy Lutomirski | 1 | -0/+127 |
2017-12-23 | x86/mm/pti: Populate user PGD | Dave Hansen | 1 | -1/+8 |
2017-12-23 | x86/mm/pti: Allocate a separate user PGD | Dave Hansen | 4 | -6/+45 |
2017-12-23 | x86/mm/pti: Allow NX poison to be set in p4d/pgd | Dave Hansen | 1 | -2/+12 |
2017-12-23 | x86/mm/pti: Add mapping helper functions | Dave Hansen | 3 | -1/+138 |
2017-12-23 | x86/pti: Add the pti= cmdline option and documentation | Borislav Petkov | 2 | -1/+31 |
2017-12-23 | x86/mm/pti: Add infrastructure for page table isolation | Thomas Gleixner | 9 | -3/+130 |
2017-12-23 | x86/mm/pti: Prepare the x86/entry assembly code for entry/exit CR3 switching | Dave Hansen | 3 | -7/+128 |
2017-12-23 | x86/mm/pti: Disable global pages if PAGE_TABLE_ISOLATION=y | Dave Hansen | 1 | -3/+9 |
2017-12-23 | x86/cpufeatures: Add X86_BUG_CPU_INSECURE | Thomas Gleixner | 3 | -2/+13 |
2017-12-23 | x86/cpu_entry_area: Prevent wraparound in setup_cpu_entry_area_ptes() on 32bit | Thomas Gleixner | 1 | -1/+2 |
2017-12-22 | init: Invoke init_espfix_bsp() from mm_init() | Thomas Gleixner | 4 | -12/+12 |
2017-12-22 | x86/cpu_entry_area: Move it out of the fixmap | Thomas Gleixner | 14 | -88/+143 |
2017-12-22 | x86/cpu_entry_area: Move it to a separate unit | Thomas Gleixner | 6 | -135/+159 |
2017-12-22 | x86/mm: Create asm/invpcid.h | Peter Zijlstra | 2 | -48/+54 |
2017-12-22 | x86/mm: Put MMU to hardware ASID translation in one place | Dave Hansen | 1 | -11/+18 |
2017-12-22 | x86/mm: Remove hard-coded ASID limit checks | Dave Hansen | 1 | -2/+18 |
2017-12-22 | x86/mm: Move the CR3 construction functions to tlbflush.h | Dave Hansen | 3 | -32/+31 |
2017-12-22 | x86/mm: Add comments to clarify which TLB-flush functions are supposed to flu... | Peter Zijlstra | 1 | -2/+21 |
2017-12-22 | x86/mm: Remove superfluous barriers | Peter Zijlstra | 1 | -7/+1 |
2017-12-22 | x86/mm: Use __flush_tlb_one() for kernel memory | Peter Zijlstra | 1 | -1/+1 |
2017-12-22 | x86/microcode: Dont abuse the TLB-flush interface | Peter Zijlstra | 2 | -26/+6 |
2017-12-22 | x86/uv: Use the right TLB-flush API | Peter Zijlstra | 1 | -1/+1 |
2017-12-22 | x86/entry: Rename SYSENTER_stack to CPU_ENTRY_AREA_entry_stack | Dave Hansen | 11 | -38/+44 |
2017-12-22 | x86/doc: Remove obvious weirdnesses from the x86 MM layout documentation | Peter Zijlstra | 1 | -9/+3 |
2017-12-22 | x86/mm/64: Improve the memory map documentation | Andy Lutomirski | 1 | -4/+6 |
2017-12-22 | x86/ldt: Prevent LDT inheritance on exec | Thomas Gleixner | 3 | -26/+22 |
2017-12-22 | x86/ldt: Rework locking | Peter Zijlstra | 3 | -13/+26 |
2017-12-22 | arch, mm: Allow arch_dup_mmap() to fail | Thomas Gleixner | 6 | -11/+14 |
2017-12-22 | x86/vsyscall/64: Warn and fail vsyscall emulation in NATIVE mode | Andy Lutomirski | 1 | -0/+4 |
2017-12-22 | x86/vsyscall/64: Explicitly set _PAGE_USER in the pagetable hierarchy | Andy Lutomirski | 1 | -1/+33 |
2017-12-22 | x86/mm/dump_pagetables: Make the address hints correct and readable | Thomas Gleixner | 1 | -37/+53 |
2017-12-22 | x86/mm/dump_pagetables: Check PAGE_PRESENT for real | Thomas Gleixner | 1 | -1/+1 |
2017-12-22 | x86/Kconfig: Limit NR_CPUS on 32-bit to a sane amount | Thomas Gleixner | 1 | -1/+2 |
2017-12-17 | x86/cpufeatures: Make CPU bugs sticky | Thomas Gleixner | 3 | -5/+7 |
2017-12-17 | x86/paravirt: Provide a way to check for hypervisors | Thomas Gleixner | 1 | -10/+15 |
2017-12-17 | x86/paravirt: Dont patch flush_tlb_single | Thomas Gleixner | 1 | -2/+0 |
2017-12-17 | x86/entry/64: Make cpu_entry_area.tss read-only | Andy Lutomirski | 16 | -48/+60 |
2017-12-17 | x86/entry: Clean up the SYSENTER_stack code | Andy Lutomirski | 7 | -23/+21 |
2017-12-17 | x86/entry/64: Remove the SYSENTER stack canary | Andy Lutomirski | 4 | -11/+1 |
2017-12-17 | x86/entry/64: Move the IST stacks into struct cpu_entry_area | Andy Lutomirski | 3 | -32/+57 |
2017-12-17 | x86/entry/64: Create a per-CPU SYSCALL entry trampoline | Andy Lutomirski | 5 | -1/+84 |
2017-12-17 | x86/entry/64: Return to userspace from the trampoline stack | Andy Lutomirski | 1 | -4/+51 |
2017-12-17 | x86/entry/64: Use a per-CPU trampoline stack for IDT entries | Andy Lutomirski | 6 | -32/+72 |
2017-12-17 | x86/espfix/64: Stop assuming that pt_regs is on the entry stack | Andy Lutomirski | 1 | -9/+28 |
2017-12-17 | x86/entry/64: Separate cpu_current_top_of_stack from TSS.sp0 | Andy Lutomirski | 5 | -6/+26 |
2017-12-17 | x86/entry: Remap the TSS into the CPU entry area | Andy Lutomirski | 7 | -15/+58 |
2017-12-17 | x86/entry: Move SYSENTER_stack to the beginning of struct tss_struct | Andy Lutomirski | 2 | -9/+33 |
2017-12-17 | x86/dumpstack: Handle stack overflow on all stacks | Andy Lutomirski | 1 | -10/+14 |
2017-12-17 | x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss | Andy Lutomirski | 6 | -33/+37 |
2017-12-17 | x86/kasan/64: Teach KASAN about the cpu_entry_area | Andy Lutomirski | 1 | -1/+17 |
2017-12-17 | x86/mm/fixmap: Generalize the GDT fixmap mechanism, introduce struct cpu_entr... | Andy Lutomirski | 4 | -18/+44 |
2017-12-17 | x86/entry/gdt: Put per-CPU GDT remaps in ascending order | Andy Lutomirski | 1 | -1/+1 |
2017-12-17 | x86/dumpstack: Add get_stack_info() support for the SYSENTER stack | Andy Lutomirski | 4 | -0/+34 |
2017-12-17 | x86/entry/64: Allocate and enable the SYSENTER stack | Andy Lutomirski | 7 | -14/+10 |
2017-12-17 | x86/irq/64: Print the offending IP in the stack overflow warning | Andy Lutomirski | 1 | -2/+2 |
2017-12-17 | x86/irq: Remove an old outdated comment about context tracking races | Andy Lutomirski | 1 | -12/+0 |
2017-12-17 | x86/unwinder: Handle stack overflows more gracefully | Josh Poimboeuf | 5 | -60/+65 |
2017-12-17 | x86/unwinder/orc: Dont bail on stack overflow | Andy Lutomirski | 1 | -2/+12 |
2017-12-17 | x86/entry/64/paravirt: Use paravirt-safe macro to access eflags | Boris Ostrovsky | 4 | -3/+19 |
2017-12-17 | x86/mm/kasan: Don't use vmemmap_populate() to initialize shadow | Andrey Ryabinin | 2 | -8/+137 |
2017-12-17 | locking/barriers: Convert users of lockless_dereference() to READ_ONCE() | Will Deacon | 13 | -27/+27 |
2017-12-17 | locking/barriers: Add implicit smp_read_barrier_depends() to READ_ONCE() | Will Deacon | 1 | -0/+1 |
2017-12-17 | bpf: fix build issues on um due to mising bpf_perf_event.h | Daniel Borkmann | 1 | -0/+1 |
2017-12-17 | perf/x86: Enable free running PEBS for REGS_USER/INTR | Andi Kleen | 2 | -1/+27 |
2017-12-17 | x86: Make X86_BUG_FXSAVE_LEAK detectable in CPUID on AMD | Rudolf Marek | 2 | -2/+6 |
2017-12-17 | x86/cpufeature: Add User-Mode Instruction Prevention definitions | Ricardo Neri | 1 | -0/+1 |
2017-12-17 | Merge commit 'upstream-x86-virt' into WIP.x86/mm | Ingo Molnar | 17 | -93/+121 |
2017-12-17 | Merge branch 'upstream-acpi-fixes' into WIP.x86/pti.base | Ingo Molnar | 3 | -58/+33 |
2017-12-17 | Merge branch 'upstream-x86-selftests' into WIP.x86/pti.base | Ingo Molnar | 19 | -522/+613 |
2017-12-17 | Merge commit 'upstream-x86-entry' into WIP.x86/mm | Ingo Molnar | 55 | -361/+579 |
2017-12-17 | drivers/misc/intel/pti: Rename the header file to free up the namespace | Ingo Molnar | 2 | -4/+4 |
2017-11-12 | Linux 4.14v4.14 | Linus Torvalds | 1 | -1/+1 |
2017-11-12 | Merge branch 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/ker... | Linus Torvalds | 7 | -19/+20 |
2017-11-12 | Merge branch 'perf-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/ke... | Linus Torvalds | 3 | -2/+14 |
2017-11-11 | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net | Linus Torvalds | 15 | -34/+68 |
2017-11-11 | Merge tag 'linux-can-fixes-for-4.14-20171110' of git://git.kernel.org/pub/scm... | David S. Miller | 5 | -9/+25 |
2017-11-11 | Merge tag 'mlx5-fixes-2017-11-08' of git://git.kernel.org/pub/scm/linux/kerne... | David S. Miller | 5 | -13/+20 |
2017-11-11 | vlan: fix a use-after-free in vlan_device_event() | Cong Wang | 1 | -3/+3 |
2017-11-11 | tooling/headers: Sync the tools/include/uapi/drm/i915_drm.h UAPI header | Ingo Molnar | 1 | -0/+1 |
2017-11-11 | Merge branch 'perf/urgent' of git://git.kernel.org/pub/scm/linux/kernel/git/a... | Ingo Molnar | 2 | -2/+13 |
2017-11-11 | net: dsa: return after vlan prepare phase | Vivien Didelot | 1 | -0/+2 |
2017-11-11 | net: dsa: return after mdb prepare phase | Vivien Didelot | 1 | -0/+2 |
2017-11-10 | Merge tag 'ceph-for-4.14-rc9' of git://github.com/ceph/ceph-client | Linus Torvalds | 1 | -2/+2 |
2017-11-10 | Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/dto... | Linus Torvalds | 3 | -2/+4 |
2017-11-10 | Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm | Linus Torvalds | 2 | -10/+29 |
2017-11-10 | Merge tag 'mips_fixes_4.14_2' of git://git.kernel.org/pub/scm/linux/kernel/gi... | Linus Torvalds | 3 | -4/+7 |
2017-11-10 | .mailmap: Add Maciej W. Rozycki's Imagination e-mail address | Maciej W. Rozycki | 1 | -0/+1 |
2017-11-10 | Revert "x86: CPU: Fix up "cpu MHz" in /proc/cpuinfo" | Linus Torvalds | 3 | -11/+6 |
2017-11-10 | Merge tag 'drm-fixes-for-v4.14-rc9' of git://people.freedesktop.org/~airlied/... | Linus Torvalds | 5 | -18/+20 |
2017-11-10 | can: ifi: Fix transmitter delay calculation | Marek Vasut | 1 | -3/+3 |
2017-11-10 | tcp: fix tcp_fastretrans_alert warning | Yuchung Cheng | 1 | -2/+1 |
2017-11-10 | tcp: gso: avoid refcount_t warning from tcp_gso_segment() | Eric Dumazet | 1 | -2/+10 |
2017-11-10 | x86/virt: Add enum for hypervisors to replace x86_hyper | Juergen Gross | 11 | -31/+40 |
2017-11-10 | x86/virt, x86/platform: Merge 'struct x86_hyper' into 'struct x86_platform' a... | Juergen Gross | 12 | -61/+81 |
2017-11-10 | can: peak: Add support for new PCIe/M2 CAN FD interfaces | Stephane Grosjean | 1 | -2/+12 |
2017-11-10 | can: sun4i: handle overrun in RX FIFO | Gerhard Bertelsmann | 1 | -2/+10 |
2017-11-10 | can: c_can: don't indicate triple sampling support for D_CAN | Richard Schütz | 2 | -2/+0 |
2017-11-10 | Merge branch 'linus' into x86/platform, to refresh the branch | Ingo Molnar | 13200 | -4066/+19822 |
2017-11-10 | x86/debug: Handle warnings before the notifier chain, to fix KGDB crash | Alexander Shishkin | 1 | -3/+7 |
2017-11-10 | net/mlx5e: Increase Striding RQ minimum size limit to 4 multi-packet WQEs | Eugenia Emantayev | 1 | -1/+1 |
2017-11-10 | net/mlx5e: Set page to null in case dma mapping fails | Inbar Karmy | 1 | -7/+5 |