index
:
kernel/linux.git
linux-2.6.11.y
linux-2.6.12.y
linux-2.6.13.y
linux-2.6.14.y
linux-2.6.15.y
linux-2.6.16.y
linux-2.6.17.y
linux-2.6.18.y
linux-2.6.19.y
linux-2.6.20.y
linux-2.6.21.y
linux-2.6.22.y
linux-2.6.23.y
linux-2.6.24.y
linux-2.6.25.y
linux-2.6.26.y
linux-2.6.27.y
linux-2.6.28.y
linux-2.6.29.y
linux-2.6.30.y
linux-2.6.31.y
linux-2.6.32.y
linux-2.6.33.y
linux-2.6.34.y
linux-2.6.35.y
linux-2.6.36.y
linux-2.6.37.y
linux-2.6.38.y
linux-2.6.39.y
linux-3.0.y
linux-3.1.y
linux-3.10.y
linux-3.11.y
linux-3.12.y
linux-3.13.y
linux-3.14.y
linux-3.15.y
linux-3.16.y
linux-3.17.y
linux-3.18.y
linux-3.19.y
linux-3.2.y
linux-3.3.y
linux-3.4.y
linux-3.5.y
linux-3.6.y
linux-3.7.y
linux-3.8.y
linux-3.9.y
linux-4.0.y
linux-4.1.y
linux-4.10.y
linux-4.11.y
linux-4.12.y
linux-4.13.y
linux-4.14.y
linux-4.15.y
linux-4.16.y
linux-4.17.y
linux-4.18.y
linux-4.19.y
linux-4.2.y
linux-4.20.y
linux-4.3.y
linux-4.4.y
linux-4.5.y
linux-4.6.y
linux-4.7.y
linux-4.8.y
linux-4.9.y
linux-5.0.y
linux-5.1.y
linux-5.10.y
linux-5.11.y
linux-5.12.y
linux-5.13.y
linux-5.14.y
linux-5.15.y
linux-5.16.y
linux-5.17.y
linux-5.18.y
linux-5.19.y
linux-5.2.y
linux-5.3.y
linux-5.4.y
linux-5.5.y
linux-5.6.y
linux-5.7.y
linux-5.8.y
linux-5.9.y
linux-6.0.y
linux-6.1.y
linux-6.10.y
linux-6.11.y
linux-6.12.y
linux-6.2.y
linux-6.3.y
linux-6.4.y
linux-6.5.y
linux-6.6.y
linux-6.7.y
linux-6.8.y
linux-6.9.y
linux-rockchip-6.1.y
linux-rockchip-6.5.y
linux-rolling-lts
linux-rolling-stable
master
Linux kernel stable tree (mirror)
Andrey V.Kosteltsev
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
arch
/
x86
/
include
/
asm
/
nospec-branch.h
Age
Commit message (
Expand
)
Author
Files
Lines
2019-11-12
x86/speculation/taa: Add mitigation for TSX Async Abort
Pawan Gupta
1
-2
/
+2
2019-08-29
x86/retpoline: Don't clobber RFLAGS during CALL_NOSPEC on i386
Sean Christopherson
1
-1
/
+1
2019-05-14
x86/speculation/mds: Conditionally clear CPU buffers on idle entry
Thomas Gleixner
1
-0
/
+12
2019-05-14
x86/speculation/mds: Clear CPU buffers on exit to user
Thomas Gleixner
1
-0
/
+13
2019-05-14
x86/speculation/mds: Add mds_clear_cpu_buffers()
Thomas Gleixner
1
-0
/
+25
2018-12-05
x86/speculation: Add seccomp Spectre v2 user space protection mode
Thomas Gleixner
1
-0
/
+1
2018-12-05
x86/speculation: Add prctl() control for indirect branch speculation
Thomas Gleixner
1
-0
/
+1
2018-12-05
x86/speculation: Prepare for conditional IBPB in switch_mm()
Thomas Gleixner
1
-0
/
+2
2018-12-05
x86/speculation: Add command line control for indirect branch speculation
Thomas Gleixner
1
-0
/
+10
2018-12-05
x86/retpoline: Remove minimal retpoline support
Zhenzhong Duan
1
-2
/
+0
2018-12-05
x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support
Zhenzhong Duan
1
-4
/
+6
2018-12-05
x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant
Zhenzhong Duan
1
-4
/
+13
2018-08-03
x86/speculation: Support Enhanced IBRS on future CPUs
Sai Praneeth
1
-0
/
+1
2018-07-19
x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
Jiang Biao
1
-1
/
+0
2018-05-27
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
David S. Miller
1
-13
/
+30
2018-05-17
x86/bugs: Remove x86_spec_ctrl_set()
Thomas Gleixner
1
-2
/
+0
2018-05-17
x86/bugs: Expose x86_spec_ctrl_base directly
Thomas Gleixner
1
-11
/
+5
2018-05-15
bpf, x64: clean up retpoline emission slightly
Daniel Borkmann
1
-15
/
+14
2018-05-14
x86/cpu: Make alternative_msr_write work for 32-bit code
Jim Mattson
1
-2
/
+2
2018-05-05
x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
Kees Cook
1
-0
/
+1
2018-05-03
bpf, x86_32: add eBPF JIT compiler for ia32
Wang YanQing
1
-3
/
+27
2018-05-03
x86/speculation: Add prctl for Speculative Store Bypass mitigation
Thomas Gleixner
1
-0
/
+1
2018-05-03
x86/speculation: Create spec-ctrl.h to avoid include hell
Thomas Gleixner
1
-14
/
+0
2018-05-03
x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
Konrad Rzeszutek Wilk
1
-0
/
+4
2018-05-03
x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
Konrad Rzeszutek Wilk
1
-0
/
+6
2018-05-03
x86/bugs, KVM: Support the combination of guest and host IBRS
Konrad Rzeszutek Wilk
1
-0
/
+10
2018-05-03
x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
Konrad Rzeszutek Wilk
1
-4
/
+20
2018-05-03
x86/nospec: Simplify alternative_msr_write()
Linus Torvalds
1
-9
/
+10
2018-03-18
Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...
Linus Torvalds
1
-1
/
+4
2018-03-14
x86/speculation, objtool: Annotate indirect calls/jumps for objtool on 32-bit...
Andy Whitcroft
1
-1
/
+4
2018-02-26
Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...
Linus Torvalds
1
-20
/
+118
2018-02-23
bpf, x64: implement retpoline for tail call
Daniel Borkmann
1
-0
/
+37
2018-02-21
x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP
Ingo Molnar
1
-12
/
+14
2018-02-21
x86/speculation, objtool: Annotate indirect calls/jumps for objtool
Peter Zijlstra
1
-4
/
+23
2018-02-20
x86/speculation: Use IBRS if available before calling into firmware
David Woodhouse
1
-9
/
+30
2018-02-20
Revert "x86/retpoline: Simplify vmexit_fill_RSB()"
David Woodhouse
1
-7
/
+63
2018-02-15
x86/speculation: Add <asm/msr-index.h> dependency
Peter Zijlstra
1
-0
/
+1
2018-02-13
Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()"
David Woodhouse
1
-4
/
+9
2018-02-03
x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL
Darren Kenny
1
-1
/
+1
2018-01-27
x86/speculation: Simplify indirect_branch_prediction_barrier()
Borislav Petkov
1
-9
/
+4
2018-01-27
x86/retpoline: Simplify vmexit_fill_RSB()
Borislav Petkov
1
-63
/
+7
2018-01-27
x86/cpufeatures: Clean up Spectre v2 related CPUID flags
David Woodhouse
1
-1
/
+1
2018-01-26
x86/nospec: Fix header guards names
Borislav Petkov
1
-3
/
+3
2018-01-26
x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support
David Woodhouse
1
-0
/
+13
2018-01-19
x86/retpoline: Optimize inline assembler for vmexit_fill_RSB
Andi Kleen
1
-3
/
+4
2018-01-19
retpoline: Introduce start/end markers of indirect thunk
Masami Hiramatsu
1
-0
/
+3
2018-01-15
x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros
Tom Lendacky
1
-1
/
+5
2018-01-12
x86/retpoline: Fill return stack buffer on vmexit
David Woodhouse
1
-1
/
+77
2018-01-12
x86/spectre: Add boot time option to select Spectre v2 mitigation
David Woodhouse
1
-0
/
+10
2018-01-12
x86/retpoline: Add initial retpoline support
David Woodhouse
1
-0
/
+128