index
:
linux-stable.git
linux-2.6.11.y
linux-2.6.12.y
linux-2.6.13.y
linux-2.6.14.y
linux-2.6.15.y
linux-2.6.16.y
linux-2.6.17.y
linux-2.6.18.y
linux-2.6.19.y
linux-2.6.20.y
linux-2.6.21.y
linux-2.6.22.y
linux-2.6.23.y
linux-2.6.24.y
linux-2.6.25.y
linux-2.6.26.y
linux-2.6.27.y
linux-2.6.28.y
linux-2.6.29.y
linux-2.6.30.y
linux-2.6.31.y
linux-2.6.32.y
linux-2.6.33.y
linux-2.6.34.y
linux-2.6.35.y
linux-2.6.36.y
linux-2.6.37.y
linux-2.6.38.y
linux-2.6.39.y
linux-3.0.y
linux-3.1.y
linux-3.10.y
linux-3.11.y
linux-3.12.y
linux-3.13.y
linux-3.14.y
linux-3.15.y
linux-3.16.y
linux-3.17.y
linux-3.18.y
linux-3.19.y
linux-3.2.y
linux-3.3.y
linux-3.4.y
linux-3.5.y
linux-3.6.y
linux-3.7.y
linux-3.8.y
linux-3.9.y
linux-4.0.y
linux-4.1.y
linux-4.10.y
linux-4.11.y
linux-4.12.y
linux-4.13.y
linux-4.14.y
linux-4.15.y
linux-4.16.y
linux-4.17.y
linux-4.18.y
linux-4.19.y
linux-4.2.y
linux-4.20.y
linux-4.3.y
linux-4.4.y
linux-4.5.y
linux-4.6.y
linux-4.7.y
linux-4.8.y
linux-4.9.y
linux-5.0.y
linux-5.1.y
linux-5.10.y
linux-5.11.y
linux-5.12.y
linux-5.13.y
linux-5.14.y
linux-5.15.y
linux-5.16.y
linux-5.17.y
linux-5.18.y
linux-5.19.y
linux-5.2.y
linux-5.3.y
linux-5.4.y
linux-5.5.y
linux-5.6.y
linux-5.7.y
linux-5.8.y
linux-5.9.y
linux-6.0.y
linux-6.1.y
linux-6.10.y
linux-6.11.y
linux-6.2.y
linux-6.3.y
linux-6.4.y
linux-6.5.y
linux-6.6.y
linux-6.7.y
linux-6.8.y
linux-6.9.y
linux-rolling-lts
linux-rolling-stable
master
Linux kernel stable tree
Greg Kroah-Hartman
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
arch
/
x86
/
kernel
/
cpu
/
bugs.c
Commit message (
Expand
)
Author
Age
Files
Lines
*
KVM: Add GDS_NO support to KVM
Daniel Sneddon
2023-08-08
1
-0
/
+7
*
x86/speculation: Add Kconfig option for GDS
Daniel Sneddon
2023-08-08
1
-0
/
+4
*
x86/speculation: Add force option to GDS mitigation
Daniel Sneddon
2023-08-08
1
-1
/
+19
*
x86/speculation: Add Gather Data Sampling mitigation
Daniel Sneddon
2023-08-08
1
-0
/
+129
*
x86/cpu: Switch to arch_cpu_finalize_init()
Thomas Gleixner
2023-08-08
1
-50
/
+1
*
x86/speculation: Allow enabling STIBP with legacy IBRS
KP Singh
2023-03-11
1
-7
/
+18
*
x86/bugs: Reset speculation control settings on init
Breno Leitao
2023-03-11
1
-1
/
+9
*
x86/bugs: Flush IBP in ib_prctl_set()
Rodrigo Branco
2023-01-18
1
-0
/
+2
*
x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3
Pawan Gupta
2022-12-08
1
-7
/
+14
*
x86/speculation: Add RSB VM Exit protections
Daniel Sneddon
2022-11-23
1
-23
/
+64
*
x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
Pawan Gupta
2022-11-23
1
-0
/
+3
*
x86/speculation: Disable RRSBA behavior
Pawan Gupta
2022-11-23
1
-0
/
+26
*
x86/speculation: Fill RSB on vmexit for IBRS
Josh Poimboeuf
2022-11-23
1
-5
/
+58
*
KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
Josh Poimboeuf
2022-11-23
1
-0
/
+4
*
x86/speculation: Remove x86_spec_ctrl_mask
Josh Poimboeuf
2022-11-23
1
-30
/
+1
*
x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
Josh Poimboeuf
2022-11-23
1
-11
/
+1
*
x86/speculation: Fix SPEC_CTRL write on SMT state change
Josh Poimboeuf
2022-11-23
1
-1
/
+2
*
intel_idle: Disable IBRS during long idle
Peter Zijlstra
2022-11-23
1
-0
/
+6
*
x86/bugs: Report Intel retbleed vulnerability
Peter Zijlstra
2022-11-23
1
-5
/
+31
*
x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mit...
Peter Zijlstra
2022-11-23
1
-8
/
+17
*
x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
Pawan Gupta
2022-11-23
1
-14
/
+52
*
x86/bugs: Optimize SPEC_CTRL MSR writes
Peter Zijlstra
2022-11-23
1
-6
/
+12
*
x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
Peter Zijlstra
2022-11-23
1
-5
/
+23
*
x86/bugs: Add AMD retbleed= boot parameter
Alexandre Chartre
2022-11-23
1
-1
/
+73
*
x86/bugs: Report AMD retbleed vulnerability
Alexandre Chartre
2022-11-23
1
-0
/
+13
*
Revert "x86/speculation: Add RSB VM Exit protections"
Suleiman Souhlal
2022-11-23
1
-60
/
+1
*
x86/bugs: Add "unknown" reporting for MMIO Stale Data
Pawan Gupta
2022-09-05
1
-2
/
+12
*
x86/speculation: Add RSB VM Exit protections
Daniel Sneddon
2022-08-11
1
-1
/
+60
*
x86/speculation/mmio: Print SMT warning
Josh Poimboeuf
2022-06-16
1
-0
/
+11
*
x86/speculation/srbds: Update SRBDS mitigation selection
Pawan Gupta
2022-06-16
1
-3
/
+5
*
x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data
Pawan Gupta
2022-06-16
1
-0
/
+22
*
x86/speculation/mmio: Enable CPU Fill buffer clearing on idle
Pawan Gupta
2022-06-16
1
-2
/
+14
*
x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations
Pawan Gupta
2022-06-16
1
-10
/
+16
*
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
Pawan Gupta
2022-06-16
1
-4
/
+107
*
x86/speculation: Add a common function for MD_CLEAR mitigation update
Pawan Gupta
2022-06-16
1
-26
/
+33
*
x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
Josh Poimboeuf
2022-03-11
1
-2
/
+25
*
x86/speculation: Warn about Spectre v2 LFENCE mitigation
Josh Poimboeuf
2022-03-11
1
-0
/
+5
*
x86/speculation: Use generic retpoline by default on AMD
Kim Phillips
2022-03-11
1
-8
/
+0
*
x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation re...
Josh Poimboeuf
2022-03-11
1
-6
/
+29
*
x86/speculation: Add eIBRS + Retpoline options
Peter Zijlstra
2022-03-11
1
-36
/
+95
*
x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
Peter Zijlstra (Intel)
2022-03-11
1
-11
/
+18
*
x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
Peter Zijlstra
2022-03-11
1
-6
/
+0
*
x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
Borislav Petkov
2022-03-11
1
-9
/
+4
*
x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb
Anand K Mistry
2020-12-02
1
-2
/
+2
*
x86/speculation: Allow IBPB to be conditionally enabled on CPUs with always-o...
Anand K Mistry
2020-11-18
1
-19
/
+33
*
x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.
Anthony Steinhauser
2020-06-22
1
-2
/
+5
*
x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.
Anthony Steinhauser
2020-06-22
1
-37
/
+50
*
x86/speculation: Add support for STIBP always-on preferred mode
Thomas Lendacky
2020-06-22
1
-6
/
+22
*
x86/speculation: Change misspelled STIPB to STIBP
Waiman Long
2020-06-22
1
-3
/
+3
*
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
Mark Gross
2020-06-10
1
-0
/
+106
[next]