index
:
linux-stable.git
linux-2.6.11.y
linux-2.6.12.y
linux-2.6.13.y
linux-2.6.14.y
linux-2.6.15.y
linux-2.6.16.y
linux-2.6.17.y
linux-2.6.18.y
linux-2.6.19.y
linux-2.6.20.y
linux-2.6.21.y
linux-2.6.22.y
linux-2.6.23.y
linux-2.6.24.y
linux-2.6.25.y
linux-2.6.26.y
linux-2.6.27.y
linux-2.6.28.y
linux-2.6.29.y
linux-2.6.30.y
linux-2.6.31.y
linux-2.6.32.y
linux-2.6.33.y
linux-2.6.34.y
linux-2.6.35.y
linux-2.6.36.y
linux-2.6.37.y
linux-2.6.38.y
linux-2.6.39.y
linux-3.0.y
linux-3.1.y
linux-3.10.y
linux-3.11.y
linux-3.12.y
linux-3.13.y
linux-3.14.y
linux-3.15.y
linux-3.16.y
linux-3.17.y
linux-3.18.y
linux-3.19.y
linux-3.2.y
linux-3.3.y
linux-3.4.y
linux-3.5.y
linux-3.6.y
linux-3.7.y
linux-3.8.y
linux-3.9.y
linux-4.0.y
linux-4.1.y
linux-4.10.y
linux-4.11.y
linux-4.12.y
linux-4.13.y
linux-4.14.y
linux-4.15.y
linux-4.16.y
linux-4.17.y
linux-4.18.y
linux-4.19.y
linux-4.2.y
linux-4.20.y
linux-4.3.y
linux-4.4.y
linux-4.5.y
linux-4.6.y
linux-4.7.y
linux-4.8.y
linux-4.9.y
linux-5.0.y
linux-5.1.y
linux-5.10.y
linux-5.11.y
linux-5.12.y
linux-5.13.y
linux-5.14.y
linux-5.15.y
linux-5.16.y
linux-5.17.y
linux-5.18.y
linux-5.19.y
linux-5.2.y
linux-5.3.y
linux-5.4.y
linux-5.5.y
linux-5.6.y
linux-5.7.y
linux-5.8.y
linux-5.9.y
linux-6.0.y
linux-6.1.y
linux-6.10.y
linux-6.11.y
linux-6.12.y
linux-6.2.y
linux-6.3.y
linux-6.4.y
linux-6.5.y
linux-6.6.y
linux-6.7.y
linux-6.8.y
linux-6.9.y
linux-rolling-lts
linux-rolling-stable
master
Linux kernel stable tree
Greg Kroah-Hartman
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
arch
/
x86
Commit message (
Expand
)
Author
Age
Files
Lines
*
x86/speculation/mds: Add 'mitigations=' support for MDS
Josh Poimboeuf
2019-05-22
1
-1
/
+1
*
x86/speculation: Support 'mitigations=' cmdline option
Josh Poimboeuf
2019-05-22
2
-3
/
+7
*
x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
Konrad Rzeszutek Wilk
2019-05-22
1
-1
/
+2
*
x86/speculation/mds: Fix comment
Boris Ostrovsky
2019-05-22
1
-1
/
+1
*
x86/speculation/mds: Add SMT warning message
Josh Poimboeuf
2019-05-22
1
-0
/
+8
*
x86/speculation: Move arch_smt_update() call to after mitigation decisions
Josh Poimboeuf
2019-05-22
1
-3
/
+2
*
Documentation: Move L1TF to separate directory
Thomas Gleixner
2019-05-22
1
-1
/
+1
*
x86/speculation/mds: Add mitigation mode VMWERV
Thomas Gleixner
2019-05-22
2
-6
/
+13
*
x86/speculation/mds: Add sysfs reporting for MDS
Thomas Gleixner
2019-05-22
1
-0
/
+27
*
x86/speculation/mds: Add mitigation control for MDS
Thomas Gleixner
2019-05-22
2
-0
/
+76
*
x86/speculation/mds: Conditionally clear CPU buffers on idle entry
Thomas Gleixner
2019-05-22
4
-0
/
+25
*
x86/speculation/mds: Clear CPU buffers on exit to user
Thomas Gleixner
2019-05-22
7
-1
/
+57
*
x86/speculation/mds: Add mds_clear_cpu_buffers()
Thomas Gleixner
2019-05-22
1
-0
/
+25
*
x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
Andi Kleen
2019-05-22
1
-1
/
+1
*
x86/speculation/mds: Add BUG_MSBDS_ONLY
Thomas Gleixner
2019-05-22
2
-8
/
+13
*
x86/speculation/mds: Add basic bug infrastructure for MDS
Andi Kleen
2019-05-22
3
-8
/
+22
*
x86/speculation: Consolidate CPU whitelists
Thomas Gleixner
2019-05-22
1
-49
/
+56
*
x86/msr-index: Cleanup bit defines
Thomas Gleixner
2019-05-22
1
-7
/
+7
*
kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
Eduardo Habkost
2019-05-22
1
-2
/
+3
*
x86/speculation: Provide IBPB always command line options
Thomas Gleixner
2019-05-22
1
-11
/
+23
*
x86/speculation: Add seccomp Spectre v2 user space protection mode
Thomas Gleixner
2019-05-22
2
-1
/
+17
*
x86/speculation: Enable prctl mode for spectre_v2_user
Thomas Gleixner
2019-05-22
1
-9
/
+32
*
x86/speculation: Add prctl() control for indirect branch speculation
Thomas Gleixner
2019-05-22
3
-0
/
+73
*
x86/speculation: Prevent stale SPEC_CTRL msr content
Thomas Gleixner
2019-05-22
4
-20
/
+43
*
x86/speculation: Prepare arch_smt_update() for PRCTL mode
Thomas Gleixner
2019-05-22
1
-21
/
+25
*
x86/speculation: Split out TIF update
Thomas Gleixner
2019-05-22
1
-12
/
+23
*
x86/speculation: Prepare for conditional IBPB in switch_mm()
Thomas Gleixner
2019-05-22
4
-22
/
+117
*
x86/speculation: Avoid __switch_to_xtra() calls
Thomas Gleixner
2019-05-22
2
-2
/
+26
*
x86/process: Consolidate and simplify switch_to_xtra() code
Thomas Gleixner
2019-05-22
5
-20
/
+37
*
x86/speculation: Prepare for per task indirect branch speculation control
Tim Chen
2019-05-22
5
-7
/
+44
*
x86/speculation: Add command line control for indirect branch speculation
Thomas Gleixner
2019-05-22
2
-17
/
+124
*
x86/speculation: Unify conditional spectre v2 print functions
Thomas Gleixner
2019-05-22
1
-13
/
+4
*
x86/speculataion: Mark command line parser data __initdata
Thomas Gleixner
2019-05-22
1
-2
/
+2
*
x86/speculation: Mark string arrays const correctly
Thomas Gleixner
2019-05-22
1
-2
/
+2
*
x86/speculation: Reorder the spec_v2 code
Thomas Gleixner
2019-05-22
1
-87
/
+87
*
x86/speculation: Rework SMT state change
Thomas Gleixner
2019-05-22
1
-6
/
+5
*
x86/Kconfig: Select SCHED_SMT if SMP enabled
Thomas Gleixner
2019-05-22
1
-7
/
+1
*
x86/speculation: Reorganize speculation control MSRs update
Tim Chen
2019-05-22
1
-17
/
+29
*
x86/speculation: Rename SSBD update functions
Thomas Gleixner
2019-05-22
3
-11
/
+11
*
x86/speculation: Disable STIBP when enhanced IBRS is in use
Tim Chen
2019-05-22
1
-0
/
+7
*
x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common()
Tim Chen
2019-05-22
1
-2
/
+18
*
x86/speculation: Remove unnecessary ret variable in cpu_show_common()
Tim Chen
2019-05-22
1
-4
/
+1
*
x86/speculation: Clean up spectre_v2_parse_cmdline()
Tim Chen
2019-05-22
1
-14
/
+13
*
x86/speculation: Update the TIF_SSBD comment
Tim Chen
2019-05-22
1
-1
/
+1
*
x86/speculation: Propagate information about RSB filling mitigation to sysfs
Jiri Kosina
2019-05-22
1
-1
/
+2
*
x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation
Jiri Kosina
2019-05-22
1
-5
/
+50
*
x86/speculation: Apply IBPB more strictly to avoid cross-process data leak
Jiri Kosina
2019-05-22
1
-9
/
+19
*
x86/cpu: Sanitize FAM6_ATOM naming
Peter Zijlstra
2019-05-22
2
-27
/
+31
*
x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
Jiang Biao
2019-05-22
1
-1
/
+0
*
x86/speculation: Simplify the CPU bug detection logic
Dominik Brodowski
2019-05-22
1
-15
/
+7
[next]