index
:
kernel_google_msm-4.9.git
r11.1
s12.1
t13.0
u14.0
v15.0
kernel_google_msm-4.9
about
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
arch
/
x86
/
kernel
/
cpu
Commit message (
Expand
)
Author
Age
Files
Lines
*
x86/tsx: Add a feature bit for TSX control MSR support
Pawan Gupta
2022-12-08
1
-19
/
+14
*
x86/cpu: Restore AMD's DE_CFG MSR after resume
Borislav Petkov
2022-11-25
1
-6
/
+4
*
x86/bugs: Add "unknown" reporting for MMIO Stale Data
Pawan Gupta
2022-09-05
2
-13
/
+35
*
x86/speculation/mmio: Print SMT warning
Josh Poimboeuf
2022-06-16
1
-0
/
+11
*
x86/speculation/mmio: Reuse SRBDS mitigation for SBDS
Pawan Gupta
2022-06-16
1
-7
/
+14
*
x86/speculation/srbds: Update SRBDS mitigation selection
Pawan Gupta
2022-06-16
1
-3
/
+5
*
x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data
Pawan Gupta
2022-06-16
1
-0
/
+22
*
x86/speculation/mmio: Enable CPU Fill buffer clearing on idle
Pawan Gupta
2022-06-16
1
-2
/
+14
*
x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations
Pawan Gupta
2022-06-16
1
-10
/
+16
*
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
Pawan Gupta
2022-06-16
1
-4
/
+107
*
x86/speculation: Add a common function for MD_CLEAR mitigation update
Pawan Gupta
2022-06-16
1
-26
/
+33
*
x86/speculation/mmio: Enumerate Processor MMIO Stale Data bug
Pawan Gupta
2022-06-16
1
-2
/
+41
*
x86/cpu: Load microcode during restore_processor_state()
Borislav Petkov
2022-05-12
1
-3
/
+3
*
x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE
WANG Chao
2022-03-11
1
-1
/
+1
*
x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
Josh Poimboeuf
2022-03-11
1
-2
/
+25
*
x86/speculation: Warn about Spectre v2 LFENCE mitigation
Josh Poimboeuf
2022-03-11
1
-0
/
+5
*
x86/speculation: Use generic retpoline by default on AMD
Kim Phillips
2022-03-11
1
-8
/
+0
*
x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation re...
Josh Poimboeuf
2022-03-11
1
-6
/
+29
*
x86/speculation: Add eIBRS + Retpoline options
Peter Zijlstra
2022-03-11
1
-36
/
+95
*
x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
Peter Zijlstra (Intel)
2022-03-11
1
-11
/
+18
*
x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
Peter Zijlstra
2022-03-11
1
-6
/
+0
*
x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
Borislav Petkov
2022-03-11
1
-9
/
+4
*
x86/retpoline: Remove minimal retpoline support
Zhenzhong Duan
2022-03-11
1
-11
/
+2
*
x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support
Zhenzhong Duan
2022-03-11
1
-1
/
+1
*
x86/mtrr: Correct the range check before performing MTRR type lookups
Ying-Tsun Huang
2021-01-12
1
-3
/
+3
*
x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb
Anand K Mistry
2020-12-02
1
-2
/
+2
*
x86/microcode/intel: Check patch signature before saving microcode for early ...
Chen Yu
2020-11-24
1
-46
/
+2
*
x86/speculation: Allow IBPB to be conditionally enabled on CPUs with always-o...
Anand K Mistry
2020-11-18
1
-19
/
+33
*
x86/cpu: Move x86_cache_bits settings
Suraj Jitindar Singh
2020-07-22
1
-1
/
+1
*
x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.
Anthony Steinhauser
2020-06-20
1
-2
/
+5
*
x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.
Anthony Steinhauser
2020-06-20
1
-37
/
+50
*
x86/speculation: Add support for STIBP always-on preferred mode
Thomas Lendacky
2020-06-20
1
-6
/
+22
*
x86/speculation: Change misspelled STIPB to STIBP
Waiman Long
2020-06-20
1
-3
/
+3
*
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
Mark Gross
2020-06-11
3
-0
/
+138
*
x86/cpu: Add 'table' argument to cpu_matches()
Mark Gross
2020-06-11
1
-10
/
+13
*
x86/cpu: Add a steppings field to struct x86_cpu_id
Mark Gross
2020-06-11
1
-1
/
+6
*
x86/pkeys: Manually set X86_FEATURE_OSPKE to preserve existing changes
Sean Christopherson
2020-03-11
1
-1
/
+1
*
x86/mce/amd: Fix kobject lifetime
Thomas Gleixner
2020-02-28
1
-6
/
+11
*
x86/mce/amd: Publish the bank pointer only after setup has succeeded
Borislav Petkov
2020-02-28
1
-17
/
+16
*
x86/cpu: Update cached HLE state on write to TSX_CTRL_CPUID_CLEAR
Pawan Gupta
2020-02-14
1
-6
/
+7
*
x86/mce: Fix possibly incorrect severity calculation on AMD
Jan H. Schönherr
2020-01-04
1
-1
/
+1
*
x86/mce: Lower throttling MCE messages' priority to warning
Benjamin Berg
2020-01-04
1
-1
/
+1
*
x86/MCE/AMD: Carve out the MC4_MISC thresholding quirk
Shirish S
2019-12-21
2
-29
/
+36
*
x86/MCE/AMD: Turn off MC4_MISC thresholding on all family 0x15 models
Shirish S
2019-12-21
1
-3
/
+2
*
x86/speculation: Fix redundant MDS mitigation message
Waiman Long
2019-11-28
1
-0
/
+13
*
x86/speculation: Fix incorrect MDS/TAA mitigation status
Waiman Long
2019-11-28
1
-2
/
+15
*
x86/CPU: Use correct macros for Cyrix calls
Matthew Whitehead
2019-11-25
1
-1
/
+1
*
kvm: mmu: ITLB_MULTIHIT mitigation
Paolo Bonzini
2019-11-16
1
-1
/
+12
*
x86/bugs: Add ITLB_MULTIHIT bug infrastructure
Vineela Tummalapalli
2019-11-16
2
-28
/
+46
*
x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs
Josh Poimboeuf
2019-11-16
1
-4
/
+0
[next]