index
:
linux-stable.git
linux-2.6.11.y
linux-2.6.12.y
linux-2.6.13.y
linux-2.6.14.y
linux-2.6.15.y
linux-2.6.16.y
linux-2.6.17.y
linux-2.6.18.y
linux-2.6.19.y
linux-2.6.20.y
linux-2.6.21.y
linux-2.6.22.y
linux-2.6.23.y
linux-2.6.24.y
linux-2.6.25.y
linux-2.6.26.y
linux-2.6.27.y
linux-2.6.28.y
linux-2.6.29.y
linux-2.6.30.y
linux-2.6.31.y
linux-2.6.32.y
linux-2.6.33.y
linux-2.6.34.y
linux-2.6.35.y
linux-2.6.36.y
linux-2.6.37.y
linux-2.6.38.y
linux-2.6.39.y
linux-3.0.y
linux-3.1.y
linux-3.10.y
linux-3.11.y
linux-3.12.y
linux-3.13.y
linux-3.14.y
linux-3.15.y
linux-3.16.y
linux-3.17.y
linux-3.18.y
linux-3.19.y
linux-3.2.y
linux-3.3.y
linux-3.4.y
linux-3.5.y
linux-3.6.y
linux-3.7.y
linux-3.8.y
linux-3.9.y
linux-4.0.y
linux-4.1.y
linux-4.10.y
linux-4.11.y
linux-4.12.y
linux-4.13.y
linux-4.14.y
linux-4.15.y
linux-4.16.y
linux-4.17.y
linux-4.18.y
linux-4.19.y
linux-4.2.y
linux-4.20.y
linux-4.3.y
linux-4.4.y
linux-4.5.y
linux-4.6.y
linux-4.7.y
linux-4.8.y
linux-4.9.y
linux-5.0.y
linux-5.1.y
linux-5.10.y
linux-5.11.y
linux-5.12.y
linux-5.13.y
linux-5.14.y
linux-5.15.y
linux-5.16.y
linux-5.17.y
linux-5.18.y
linux-5.19.y
linux-5.2.y
linux-5.3.y
linux-5.4.y
linux-5.5.y
linux-5.6.y
linux-5.7.y
linux-5.8.y
linux-5.9.y
linux-6.0.y
linux-6.1.y
linux-6.10.y
linux-6.11.y
linux-6.12.y
linux-6.2.y
linux-6.3.y
linux-6.4.y
linux-6.5.y
linux-6.6.y
linux-6.7.y
linux-6.8.y
linux-6.9.y
linux-rolling-lts
linux-rolling-stable
master
Linux kernel stable tree
Greg Kroah-Hartman
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
arch
/
x86
Commit message (
Expand
)
Author
Age
Files
Lines
*
x86/PCI: Fix PCI IRQ routing table memory leak
Wenwen Wang
2019-06-22
1
-2
/
+8
*
perf/x86/intel: Allow PEBS multi-entry in watermark mode
Stephane Eranian
2019-06-22
1
-1
/
+1
*
Revert "x86/build: Move _etext to actual end of .text"
Greg Kroah-Hartman
2019-06-11
1
-3
/
+3
*
x86/ia32: Fix ia32_restore_sigcontext() AC leak
Peter Zijlstra
2019-06-11
1
-12
/
+17
*
x86/build: Keep local relocations with ld.lld
Kees Cook
2019-06-11
1
-1
/
+1
*
x86/irq/64: Limit IST stack overflow check to #DB stack
Thomas Gleixner
2019-06-11
1
-5
/
+14
*
x86/mm: Remove in_nmi() warning from 64-bit implementation of vmalloc_fault()
Jiri Kosina
2019-06-11
1
-2
/
+0
*
x86/build: Move _etext to actual end of .text
Kees Cook
2019-06-11
1
-3
/
+3
*
KVM: x86: fix return value for reserved EFER
Paolo Bonzini
2019-06-11
1
-1
/
+1
*
KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes
Sean Christopherson
2019-06-11
1
-11
/
+22
*
crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest()
Eric Biggers
2019-06-11
1
-8
/
+5
*
x86/speculation/mds: Revert CPU buffer clear on double fault exit
Andy Lutomirski
2019-06-11
1
-8
/
+0
*
x86/bugs: Change L1TF mitigation string to match upstream
Ben Hutchings
2019-05-16
1
-1
/
+1
*
x86/speculation/mds: Add 'mitigations=' support for MDS
Josh Poimboeuf
2019-05-16
1
-1
/
+1
*
x86/speculation: Support 'mitigations=' cmdline option
Josh Poimboeuf
2019-05-16
2
-3
/
+7
*
x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
Konrad Rzeszutek Wilk
2019-05-16
1
-1
/
+2
*
x86/speculation/mds: Fix comment
Boris Ostrovsky
2019-05-16
1
-1
/
+1
*
x86/speculation/mds: Add SMT warning message
Josh Poimboeuf
2019-05-16
1
-0
/
+8
*
x86/speculation: Move arch_smt_update() call to after mitigation decisions
Josh Poimboeuf
2019-05-16
1
-3
/
+2
*
x86/cpu/bugs: Use __initconst for 'const' init data
Andi Kleen
2019-05-16
1
-3
/
+3
*
Documentation: Move L1TF to separate directory
Thomas Gleixner
2019-05-16
1
-1
/
+1
*
x86/speculation/mds: Add mitigation mode VMWERV
Thomas Gleixner
2019-05-16
2
-6
/
+13
*
x86/speculation/mds: Add sysfs reporting for MDS
Thomas Gleixner
2019-05-16
1
-0
/
+27
*
x86/speculation/mds: Add mitigation control for MDS
Thomas Gleixner
2019-05-16
2
-0
/
+76
*
x86/speculation/mds: Conditionally clear CPU buffers on idle entry
Thomas Gleixner
2019-05-16
4
-0
/
+27
*
x86/speculation/mds: Clear CPU buffers on exit to user
Thomas Gleixner
2019-05-16
5
-0
/
+31
*
x86/speculation/mds: Add mds_clear_cpu_buffers()
Thomas Gleixner
2019-05-16
1
-0
/
+25
*
x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
Andi Kleen
2019-05-16
1
-1
/
+1
*
x86/speculation/mds: Add BUG_MSBDS_ONLY
Thomas Gleixner
2019-05-16
2
-8
/
+13
*
x86/speculation/mds: Add basic bug infrastructure for MDS
Andi Kleen
2019-05-16
3
-8
/
+22
*
x86/speculation: Consolidate CPU whitelists
Thomas Gleixner
2019-05-16
1
-49
/
+56
*
x86/msr-index: Cleanup bit defines
Thomas Gleixner
2019-05-16
1
-11
/
+13
*
kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
Eduardo Habkost
2019-05-16
1
-2
/
+3
*
x86/speculation: Provide IBPB always command line options
Thomas Gleixner
2019-05-16
1
-11
/
+23
*
x86/speculation: Add seccomp Spectre v2 user space protection mode
Thomas Gleixner
2019-05-16
2
-1
/
+17
*
x86/speculation: Enable prctl mode for spectre_v2_user
Thomas Gleixner
2019-05-16
1
-9
/
+32
*
x86/speculation: Add prctl() control for indirect branch speculation
Thomas Gleixner
2019-05-16
3
-0
/
+73
*
x86/speculation: Prevent stale SPEC_CTRL msr content
Thomas Gleixner
2019-05-16
4
-18
/
+40
*
x86/speculation: Prepare arch_smt_update() for PRCTL mode
Thomas Gleixner
2019-05-16
1
-21
/
+25
*
x86/speculation: Split out TIF update
Thomas Gleixner
2019-05-16
1
-12
/
+23
*
x86/speculation: Prepare for conditional IBPB in switch_mm()
Thomas Gleixner
2019-05-16
4
-35
/
+117
*
x86/speculation: Avoid __switch_to_xtra() calls
Thomas Gleixner
2019-05-16
2
-2
/
+26
*
x86/process: Consolidate and simplify switch_to_xtra() code
Thomas Gleixner
2019-05-16
5
-20
/
+37
*
x86/speculation: Prepare for per task indirect branch speculation control
Tim Chen
2019-05-16
5
-5
/
+41
*
x86/speculation: Add command line control for indirect branch speculation
Thomas Gleixner
2019-05-16
2
-17
/
+124
*
x86/speculation: Unify conditional spectre v2 print functions
Thomas Gleixner
2019-05-16
1
-13
/
+4
*
x86/speculataion: Mark command line parser data __initdata
Thomas Gleixner
2019-05-16
1
-2
/
+2
*
x86/speculation: Mark string arrays const correctly
Thomas Gleixner
2019-05-16
1
-2
/
+2
*
x86/speculation: Reorder the spec_v2 code
Thomas Gleixner
2019-05-16
1
-87
/
+87
*
x86/speculation: Rework SMT state change
Thomas Gleixner
2019-05-16
1
-6
/
+5
[next]