Home Home > GIT Browse
AgeCommit message (Expand)Author
2019-05-14Linux 4.9.176v4.9.176Greg Kroah-Hartman
2019-05-14x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen
2019-05-14x86: stop exporting msr-index.h to userlandNicolas Dichtel
2019-05-14x86/speculation/mds: Fix documentation typoJosh Poimboeuf
2019-05-14Documentation: Correct the possible MDS sysfs valuesTyler Hicks
2019-05-14x86/mds: Add MDSUM variant to the MDS documentationspeck for Pawan Gupta
2019-05-14x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf
2019-05-14x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf
2019-05-14cpu/speculation: Add 'mitigations=' cmdline optionJosh Poimboeuf
2019-05-14x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk
2019-05-14x86/speculation/mds: Fix commentBoris Ostrovsky
2019-05-14x86/speculation/mds: Add SMT warning messageJosh Poimboeuf
2019-05-14x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf
2019-05-14x86/speculation/mds: Add mds=full,nosmt cmdline optionJosh Poimboeuf
2019-05-14Documentation: Add MDS vulnerability documentationThomas Gleixner
2019-05-14Documentation: Move L1TF to separate directoryThomas Gleixner
2019-05-14x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner
2019-05-14x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner
2019-05-14x86/speculation/mds: Add mitigation control for MDSThomas Gleixner
2019-05-14x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner
2019-05-14x86/kvm/vmx: Add MDS protection when L1D Flush is not activeThomas Gleixner
2019-05-14x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner
2019-05-14x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner
2019-05-14x86/kvm: Expose X86_FEATURE_MD_CLEAR to guestsAndi Kleen
2019-05-14x86/speculation/mds: Add BUG_MSBDS_ONLYThomas Gleixner
2019-05-14x86/speculation/mds: Add basic bug infrastructure for MDSAndi Kleen
2019-05-14x86/speculation: Consolidate CPU whitelistsThomas Gleixner
2019-05-14x86/msr-index: Cleanup bit definesThomas Gleixner
2019-05-14kvm: x86: Report STIBP on GET_SUPPORTED_CPUIDEduardo Habkost
2019-05-14x86/speculation: Provide IBPB always command line optionsThomas Gleixner
2019-05-14x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner
2019-05-14x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner
2019-05-14x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner
2019-05-14x86/speculation: Prevent stale SPEC_CTRL msr contentThomas Gleixner
2019-05-14x86/speculation: Prepare arch_smt_update() for PRCTL modeThomas Gleixner
2019-05-14x86/speculation: Split out TIF updateThomas Gleixner
2019-05-14x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner
2019-05-14x86/speculation: Avoid __switch_to_xtra() callsThomas Gleixner
2019-05-14x86/process: Consolidate and simplify switch_to_xtra() codeThomas Gleixner
2019-05-14x86/speculation: Prepare for per task indirect branch speculation controlTim Chen
2019-05-14x86/speculation: Add command line control for indirect branch speculationThomas Gleixner
2019-05-14x86/speculation: Unify conditional spectre v2 print functionsThomas Gleixner
2019-05-14x86/speculataion: Mark command line parser data __initdataThomas Gleixner
2019-05-14x86/speculation: Mark string arrays const correctlyThomas Gleixner
2019-05-14x86/speculation: Reorder the spec_v2 codeThomas Gleixner
2019-05-14x86/l1tf: Show actual SMT stateThomas Gleixner
2019-05-14x86/speculation: Rework SMT state changeThomas Gleixner
2019-05-14sched: Add sched_smt_active()Ben Hutchings
2019-05-14x86/Kconfig: Select SCHED_SMT if SMP enabledThomas Gleixner
2019-05-14x86/speculation: Reorganize speculation control MSRs updateTim Chen