index
:
linux
master
linux
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
arch
/
x86
/
kernel
/
cpu
/
bugs.c
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
...
|
*
|
x86/bugs: Move the l1tf function and define pr_fmt properly
Konrad Rzeszutek Wilk
2018-06-21
1
-26
/
+29
|
*
|
x86/speculation/l1tf: Add sysfs reporting for l1tf
Andi Kleen
2018-06-20
1
-0
/
+40
*
|
|
x86/speculation: Support Enhanced IBRS on future CPUs
Sai Praneeth
2018-08-03
1
-2
/
+18
*
|
|
x86/speculation: Protect against userspace-userspace spectreRSB
Jiri Kosina
2018-07-31
1
-31
/
+7
|
|
/
|
/
|
*
|
x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR
Tom Lendacky
2018-07-03
1
-3
/
+5
*
|
x86/pti: Don't report XenPV as vulnerable
Jiri Kosina
2018-06-21
1
-0
/
+4
|
/
*
x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features
Konrad Rzeszutek Wilk
2018-06-06
1
-8
/
+3
*
x86/bugs: Add AMD's SPEC_CTRL MSR usage
Konrad Rzeszutek Wilk
2018-06-06
1
-5
/
+7
*
x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
Thomas Gleixner
2018-05-17
1
-0
/
+30
*
x86/bugs: Rework spec_ctrl base and mask logic
Thomas Gleixner
2018-05-17
1
-7
/
+19
*
x86/bugs: Remove x86_spec_ctrl_set()
Thomas Gleixner
2018-05-17
1
-11
/
+2
*
x86/bugs: Expose x86_spec_ctrl_base directly
Thomas Gleixner
2018-05-17
1
-10
/
+1
*
x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
Borislav Petkov
2018-05-17
1
-45
/
+15
*
x86/speculation: Rework speculative_store_bypass_update()
Thomas Gleixner
2018-05-17
1
-1
/
+1
*
x86/speculation: Add virtualized speculative store bypass disable support
Tom Lendacky
2018-05-17
1
-1
/
+3
*
x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
Thomas Gleixner
2018-05-17
1
-2
/
+18
*
x86/cpufeatures: Disentangle SSBD enumeration
Thomas Gleixner
2018-05-17
1
-5
/
+5
*
x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
Thomas Gleixner
2018-05-17
1
-7
/
+11
*
x86/bugs: Fix the parameters alignment and missing void
Konrad Rzeszutek Wilk
2018-05-12
1
-2
/
+2
*
x86/bugs: Make cpu_show_common() static
Jiri Kosina
2018-05-10
1
-1
/
+1
*
x86/bugs: Fix __ssb_select_mitigation() return type
Jiri Kosina
2018-05-10
1
-1
/
+1
*
x86/bugs: Rename _RDS to _SSBD
Konrad Rzeszutek Wilk
2018-05-09
1
-18
/
+18
*
x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
Kees Cook
2018-05-05
1
-9
/
+23
*
seccomp: Move speculation migitation control to arch code
Thomas Gleixner
2018-05-05
1
-11
/
+18
*
prctl: Add force disable speculation
Thomas Gleixner
2018-05-05
1
-10
/
+25
*
x86/bugs: Make boot modes __ro_after_init
Kees Cook
2018-05-05
1
-2
/
+3
*
nospec: Allow getting/setting on non-current task
Kees Cook
2018-05-03
1
-11
/
+16
*
x86/speculation: Add prctl for Speculative Store Bypass mitigation
Thomas Gleixner
2018-05-03
1
-10
/
+73
*
x86/process: Allow runtime control of Speculative Store Bypass
Thomas Gleixner
2018-05-03
1
-5
/
+21
*
x86/speculation: Create spec-ctrl.h to avoid include hell
Thomas Gleixner
2018-05-03
1
-1
/
+1
*
x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
Konrad Rzeszutek Wilk
2018-05-03
1
-1
/
+26
*
x86/bugs: Whitelist allowed SPEC_CTRL MSR values
Konrad Rzeszutek Wilk
2018-05-03
1
-2
/
+9
*
x86/bugs/intel: Set proper CPU features and setup RDS
Konrad Rzeszutek Wilk
2018-05-03
1
-2
/
+28
*
x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
Konrad Rzeszutek Wilk
2018-05-03
1
-0
/
+103
*
x86/bugs: Expose /sys/../spec_store_bypass
Konrad Rzeszutek Wilk
2018-05-03
1
-0
/
+5
*
x86/bugs, KVM: Support the combination of guest and host IBRS
Konrad Rzeszutek Wilk
2018-05-03
1
-0
/
+18
*
x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
Konrad Rzeszutek Wilk
2018-05-03
1
-0
/
+28
*
x86/bugs: Concentrate bug reporting into a separate function
Konrad Rzeszutek Wilk
2018-05-03
1
-14
/
+32
*
x86/speculation: Use IBRS if available before calling into firmware
David Woodhouse
2018-02-20
1
-1
/
+11
*
x86/spectre: Fix an error message
Dan Carpenter
2018-02-15
1
-1
/
+1
*
x86/speculation: Clean up various Spectre related details
Ingo Molnar
2018-02-13
1
-17
/
+11
*
Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()"
David Woodhouse
2018-02-13
1
-6
/
+0
*
x86/spectre: Simplify spectre_v2 command line parsing
KarimAllah Ahmed
2018-02-02
1
-30
/
+56
*
x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"
Colin Ian King
2018-01-30
1
-1
/
+1
*
x86/spectre: Report get_user mitigation for spectre_v1
Dan Williams
2018-01-30
1
-1
/
+1
*
x86/spectre: Check CONFIG_RETPOLINE in command line parser
Dou Liyang
2018-01-30
1
-3
/
+3
*
x86/speculation: Simplify indirect_branch_prediction_barrier()
Borislav Petkov
2018-01-27
1
-0
/
+6
*
x86/cpufeatures: Clean up Spectre v2 related CPUID flags
David Woodhouse
2018-01-27
1
-4
/
+3
*
x86/cpu/bugs: Make retpoline module warning conditional
Thomas Gleixner
2018-01-27
1
-3
/
+11
*
x86/bugs: Drop one "mitigation" from dmesg
Borislav Petkov
2018-01-26
1
-1
/
+1
[prev]
[next]