index
:
kernel/linux.git
linux-2.6.11.y
linux-2.6.12.y
linux-2.6.13.y
linux-2.6.14.y
linux-2.6.15.y
linux-2.6.16.y
linux-2.6.17.y
linux-2.6.18.y
linux-2.6.19.y
linux-2.6.20.y
linux-2.6.21.y
linux-2.6.22.y
linux-2.6.23.y
linux-2.6.24.y
linux-2.6.25.y
linux-2.6.26.y
linux-2.6.27.y
linux-2.6.28.y
linux-2.6.29.y
linux-2.6.30.y
linux-2.6.31.y
linux-2.6.32.y
linux-2.6.33.y
linux-2.6.34.y
linux-2.6.35.y
linux-2.6.36.y
linux-2.6.37.y
linux-2.6.38.y
linux-2.6.39.y
linux-3.0.y
linux-3.1.y
linux-3.10.y
linux-3.11.y
linux-3.12.y
linux-3.13.y
linux-3.14.y
linux-3.15.y
linux-3.16.y
linux-3.17.y
linux-3.18.y
linux-3.19.y
linux-3.2.y
linux-3.3.y
linux-3.4.y
linux-3.5.y
linux-3.6.y
linux-3.7.y
linux-3.8.y
linux-3.9.y
linux-4.0.y
linux-4.1.y
linux-4.10.y
linux-4.11.y
linux-4.12.y
linux-4.13.y
linux-4.14.y
linux-4.15.y
linux-4.16.y
linux-4.17.y
linux-4.18.y
linux-4.19.y
linux-4.2.y
linux-4.20.y
linux-4.3.y
linux-4.4.y
linux-4.5.y
linux-4.6.y
linux-4.7.y
linux-4.8.y
linux-4.9.y
linux-5.0.y
linux-5.1.y
linux-5.10.y
linux-5.11.y
linux-5.12.y
linux-5.13.y
linux-5.14.y
linux-5.15.y
linux-5.16.y
linux-5.17.y
linux-5.18.y
linux-5.19.y
linux-5.2.y
linux-5.3.y
linux-5.4.y
linux-5.5.y
linux-5.6.y
linux-5.7.y
linux-5.8.y
linux-5.9.y
linux-6.0.y
linux-6.1.y
linux-6.10.y
linux-6.11.y
linux-6.12.y
linux-6.2.y
linux-6.3.y
linux-6.4.y
linux-6.5.y
linux-6.6.y
linux-6.7.y
linux-6.8.y
linux-6.9.y
linux-rockchip-6.1.y
linux-rockchip-6.5.y
linux-rolling-lts
linux-rolling-stable
master
Linux kernel stable tree (mirror)
Andrey V.Kosteltsev
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
arch
Age
Commit message (
Expand
)
Author
Files
Lines
2019-05-16
x86/speculation: Support 'mitigations=' cmdline option
Josh Poimboeuf
2
-3
/
+7
2019-05-16
x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
Konrad Rzeszutek Wilk
1
-1
/
+2
2019-05-16
x86/speculation/mds: Fix comment
Boris Ostrovsky
1
-1
/
+1
2019-05-16
x86/speculation/mds: Add SMT warning message
Josh Poimboeuf
1
-0
/
+8
2019-05-16
x86/speculation: Move arch_smt_update() call to after mitigation decisions
Josh Poimboeuf
1
-3
/
+2
2019-05-16
x86/cpu/bugs: Use __initconst for 'const' init data
Andi Kleen
1
-3
/
+3
2019-05-16
Documentation: Move L1TF to separate directory
Thomas Gleixner
1
-1
/
+1
2019-05-16
x86/speculation/mds: Add mitigation mode VMWERV
Thomas Gleixner
2
-6
/
+13
2019-05-16
x86/speculation/mds: Add sysfs reporting for MDS
Thomas Gleixner
1
-0
/
+27
2019-05-16
x86/speculation/mds: Add mitigation control for MDS
Thomas Gleixner
2
-0
/
+76
2019-05-16
x86/speculation/mds: Conditionally clear CPU buffers on idle entry
Thomas Gleixner
4
-0
/
+27
2019-05-16
x86/speculation/mds: Clear CPU buffers on exit to user
Thomas Gleixner
5
-0
/
+31
2019-05-16
x86/speculation/mds: Add mds_clear_cpu_buffers()
Thomas Gleixner
1
-0
/
+25
2019-05-16
x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
Andi Kleen
1
-1
/
+1
2019-05-16
x86/speculation/mds: Add BUG_MSBDS_ONLY
Thomas Gleixner
2
-8
/
+13
2019-05-16
x86/speculation/mds: Add basic bug infrastructure for MDS
Andi Kleen
3
-8
/
+22
2019-05-16
x86/speculation: Consolidate CPU whitelists
Thomas Gleixner
1
-49
/
+56
2019-05-16
x86/msr-index: Cleanup bit defines
Thomas Gleixner
1
-11
/
+13
2019-05-16
kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
Eduardo Habkost
1
-2
/
+3
2019-05-16
x86/speculation: Provide IBPB always command line options
Thomas Gleixner
1
-11
/
+23
2019-05-16
x86/speculation: Add seccomp Spectre v2 user space protection mode
Thomas Gleixner
2
-1
/
+17
2019-05-16
x86/speculation: Enable prctl mode for spectre_v2_user
Thomas Gleixner
1
-9
/
+32
2019-05-16
x86/speculation: Add prctl() control for indirect branch speculation
Thomas Gleixner
3
-0
/
+73
2019-05-16
x86/speculation: Prevent stale SPEC_CTRL msr content
Thomas Gleixner
4
-18
/
+40
2019-05-16
x86/speculation: Prepare arch_smt_update() for PRCTL mode
Thomas Gleixner
1
-21
/
+25
2019-05-16
x86/speculation: Split out TIF update
Thomas Gleixner
1
-12
/
+23
2019-05-16
x86/speculation: Prepare for conditional IBPB in switch_mm()
Thomas Gleixner
4
-35
/
+117
2019-05-16
x86/speculation: Avoid __switch_to_xtra() calls
Thomas Gleixner
2
-2
/
+26
2019-05-16
x86/process: Consolidate and simplify switch_to_xtra() code
Thomas Gleixner
5
-20
/
+37
2019-05-16
x86/speculation: Prepare for per task indirect branch speculation control
Tim Chen
5
-5
/
+41
2019-05-16
x86/speculation: Add command line control for indirect branch speculation
Thomas Gleixner
2
-17
/
+124
2019-05-16
x86/speculation: Unify conditional spectre v2 print functions
Thomas Gleixner
1
-13
/
+4
2019-05-16
x86/speculataion: Mark command line parser data __initdata
Thomas Gleixner
1
-2
/
+2
2019-05-16
x86/speculation: Mark string arrays const correctly
Thomas Gleixner
1
-2
/
+2
2019-05-16
x86/speculation: Reorder the spec_v2 code
Thomas Gleixner
1
-87
/
+87
2019-05-16
x86/speculation: Rework SMT state change
Thomas Gleixner
1
-6
/
+5
2019-05-16
x86/Kconfig: Select SCHED_SMT if SMP enabled
Thomas Gleixner
1
-7
/
+1
2019-05-16
x86/speculation: Reorganize speculation control MSRs update
Tim Chen
1
-17
/
+29
2019-05-16
x86/speculation: Rename SSBD update functions
Thomas Gleixner
3
-11
/
+11
2019-05-16
x86/speculation: Disable STIBP when enhanced IBRS is in use
Tim Chen
1
-0
/
+7
2019-05-16
x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common()
Tim Chen
1
-2
/
+18
2019-05-16
x86/speculation: Remove unnecessary ret variable in cpu_show_common()
Tim Chen
1
-4
/
+1
2019-05-16
x86/speculation: Clean up spectre_v2_parse_cmdline()
Tim Chen
1
-14
/
+13
2019-05-16
x86/speculation: Update the TIF_SSBD comment
Tim Chen
1
-1
/
+1
2019-05-16
x86/speculation: Propagate information about RSB filling mitigation to sysfs
Jiri Kosina
1
-1
/
+2
2019-05-16
x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation
Jiri Kosina
1
-5
/
+50
2019-05-16
x86/speculation: Apply IBPB more strictly to avoid cross-process data leak
Jiri Kosina
1
-11
/
+20
2019-05-16
x86/mm: Use WRITE_ONCE() when setting PTEs
Nadav Amit
2
-11
/
+11
2019-05-16
KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled
Thomas Gleixner
1
-4
/
+4
2019-05-16
x86/cpu: Sanitize FAM6_ATOM naming
Peter Zijlstra
2
-27
/
+31
[prev]
[next]