index
:
Linux Stable
linux-2.6.11.y
linux-2.6.12.y
linux-2.6.13.y
linux-2.6.14.y
linux-2.6.15.y
linux-2.6.16.y
linux-2.6.17.y
linux-2.6.18.y
linux-2.6.19.y
linux-2.6.20.y
linux-2.6.21.y
linux-2.6.22.y
linux-2.6.23.y
linux-2.6.24.y
linux-2.6.25.y
linux-2.6.26.y
linux-2.6.27.y
linux-2.6.28.y
linux-2.6.29.y
linux-2.6.30.y
linux-2.6.31.y
linux-2.6.32.y
linux-2.6.33.y
linux-2.6.34.y
linux-2.6.35.y
linux-2.6.36.y
linux-2.6.37.y
linux-2.6.38.y
linux-2.6.39.y
linux-3.0.y
linux-3.1.y
linux-3.10.y
linux-3.11.y
linux-3.12.y
linux-3.13.y
linux-3.14.y
linux-3.15.y
linux-3.16.y
linux-3.17.y
linux-3.18.y
linux-3.19.y
linux-3.2.y
linux-3.3.y
linux-3.4.y
linux-3.5.y
linux-3.6.y
linux-3.7.y
linux-3.8.y
linux-3.9.y
linux-4.0.y
linux-4.1.y
linux-4.10.y
linux-4.11.y
linux-4.12.y
linux-4.13.y
linux-4.14.y
linux-4.15.y
linux-4.16.y
linux-4.17.y
linux-4.18.y
linux-4.19.y
linux-4.2.y
linux-4.20.y
linux-4.3.y
linux-4.4.y
linux-4.5.y
linux-4.6.y
linux-4.7.y
linux-4.8.y
linux-4.9.y
linux-5.0.y
linux-5.1.y
linux-5.10.y
linux-5.11.y
linux-5.12.y
linux-5.13.y
linux-5.14.y
linux-5.15.y
linux-5.16.y
linux-5.17.y
linux-5.18.y
linux-5.19.y
linux-5.2.y
linux-5.3.y
linux-5.4.y
linux-5.5.y
linux-5.6.y
linux-5.7.y
linux-5.8.y
linux-5.9.y
linux-6.0.y
linux-6.1.y
linux-6.10.y
linux-6.11.y
linux-6.12.y
linux-6.13.y
linux-6.14.y
linux-6.2.y
linux-6.3.y
linux-6.4.y
linux-6.5.y
linux-6.6.y
linux-6.7.y
linux-6.8.y
linux-6.9.y
linux-rolling-lts
linux-rolling-stable
master
Linux kernel stable tree
Greg Kroah-Hartman
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
arch
/
x86
/
kernel
/
cpu
Commit message (
Expand
)
Author
Age
Files
Lines
*
x86/speculation: Allow guests to use SSBD even if host does not
Alejandro Jimenez
2019-07-10
1
-1
/
+10
*
x86/CPU/AMD: Don't force the CPB cap when running under a hypervisor
Frank van der Linden
2019-06-22
1
-2
/
+5
*
perf/x86/intel: Allow PEBS multi-entry in watermark mode
Stephane Eranian
2019-06-22
1
-1
/
+1
*
x86/bugs: Change L1TF mitigation string to match upstream
Ben Hutchings
2019-05-16
1
-1
/
+1
*
x86/speculation/mds: Add 'mitigations=' support for MDS
Josh Poimboeuf
2019-05-16
1
-1
/
+1
*
x86/speculation: Support 'mitigations=' cmdline option
Josh Poimboeuf
2019-05-16
1
-2
/
+4
*
x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
Konrad Rzeszutek Wilk
2019-05-16
1
-1
/
+2
*
x86/speculation/mds: Fix comment
Boris Ostrovsky
2019-05-16
1
-1
/
+1
*
x86/speculation/mds: Add SMT warning message
Josh Poimboeuf
2019-05-16
1
-0
/
+8
*
x86/speculation: Move arch_smt_update() call to after mitigation decisions
Josh Poimboeuf
2019-05-16
1
-3
/
+2
*
x86/cpu/bugs: Use __initconst for 'const' init data
Andi Kleen
2019-05-16
1
-3
/
+3
*
Documentation: Move L1TF to separate directory
Thomas Gleixner
2019-05-16
1
-1
/
+1
*
x86/speculation/mds: Add mitigation mode VMWERV
Thomas Gleixner
2019-05-16
1
-6
/
+12
*
x86/speculation/mds: Add sysfs reporting for MDS
Thomas Gleixner
2019-05-16
1
-0
/
+27
*
x86/speculation/mds: Add mitigation control for MDS
Thomas Gleixner
2019-05-16
1
-0
/
+70
*
x86/speculation/mds: Conditionally clear CPU buffers on idle entry
Thomas Gleixner
2019-05-16
1
-0
/
+3
*
x86/speculation/mds: Clear CPU buffers on exit to user
Thomas Gleixner
2019-05-16
1
-0
/
+3
*
x86/speculation/mds: Add BUG_MSBDS_ONLY
Thomas Gleixner
2019-05-16
1
-8
/
+12
*
x86/speculation/mds: Add basic bug infrastructure for MDS
Andi Kleen
2019-05-16
1
-8
/
+15
*
x86/speculation: Consolidate CPU whitelists
Thomas Gleixner
2019-05-16
1
-49
/
+56
*
x86/speculation: Provide IBPB always command line options
Thomas Gleixner
2019-05-16
1
-11
/
+23
*
x86/speculation: Add seccomp Spectre v2 user space protection mode
Thomas Gleixner
2019-05-16
1
-1
/
+16
*
x86/speculation: Enable prctl mode for spectre_v2_user
Thomas Gleixner
2019-05-16
1
-9
/
+32
*
x86/speculation: Add prctl() control for indirect branch speculation
Thomas Gleixner
2019-05-16
1
-0
/
+67
*
x86/speculation: Prevent stale SPEC_CTRL msr content
Thomas Gleixner
2019-05-16
1
-11
/
+7
*
x86/speculation: Prepare arch_smt_update() for PRCTL mode
Thomas Gleixner
2019-05-16
1
-21
/
+25
*
x86/speculation: Split out TIF update
Thomas Gleixner
2019-05-16
1
-12
/
+23
*
x86/speculation: Prepare for conditional IBPB in switch_mm()
Thomas Gleixner
2019-05-16
1
-5
/
+24
*
x86/speculation: Prepare for per task indirect branch speculation control
Tim Chen
2019-05-16
1
-0
/
+4
*
x86/speculation: Add command line control for indirect branch speculation
Thomas Gleixner
2019-05-16
1
-17
/
+114
*
x86/speculation: Unify conditional spectre v2 print functions
Thomas Gleixner
2019-05-16
1
-13
/
+4
*
x86/speculataion: Mark command line parser data __initdata
Thomas Gleixner
2019-05-16
1
-2
/
+2
*
x86/speculation: Mark string arrays const correctly
Thomas Gleixner
2019-05-16
1
-2
/
+2
*
x86/speculation: Reorder the spec_v2 code
Thomas Gleixner
2019-05-16
1
-87
/
+87
*
x86/speculation: Rework SMT state change
Thomas Gleixner
2019-05-16
1
-6
/
+5
*
x86/speculation: Rename SSBD update functions
Thomas Gleixner
2019-05-16
1
-2
/
+2
*
x86/speculation: Disable STIBP when enhanced IBRS is in use
Tim Chen
2019-05-16
1
-0
/
+7
*
x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common()
Tim Chen
2019-05-16
1
-2
/
+18
*
x86/speculation: Remove unnecessary ret variable in cpu_show_common()
Tim Chen
2019-05-16
1
-4
/
+1
*
x86/speculation: Clean up spectre_v2_parse_cmdline()
Tim Chen
2019-05-16
1
-14
/
+13
*
x86/speculation: Propagate information about RSB filling mitigation to sysfs
Jiri Kosina
2019-05-16
1
-1
/
+2
*
x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation
Jiri Kosina
2019-05-16
1
-5
/
+50
*
x86/cpu: Sanitize FAM6_ATOM naming
Peter Zijlstra
2019-05-16
1
-14
/
+14
*
x86/microcode: Update the new microcode revision unconditionally
Filippo Sironi
2019-05-16
2
-16
/
+14
*
x86/microcode: Make sure boot_cpu_data.microcode is up-to-date
Prarit Bhargava
2019-05-16
2
-0
/
+8
*
x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR
Tom Lendacky
2019-05-16
1
-3
/
+5
*
x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features
Konrad Rzeszutek Wilk
2019-05-16
1
-8
/
+3
*
x86/bugs: Add AMD's SPEC_CTRL MSR usage
Konrad Rzeszutek Wilk
2019-05-16
2
-5
/
+13
*
x86/bugs: Add AMD's variant of SSB_NO
Konrad Rzeszutek Wilk
2019-05-16
1
-1
/
+2
*
x86/speculation: Simplify the CPU bug detection logic
Dominik Brodowski
2019-05-16
1
-15
/
+7
[next]