index
:
kernel/linux.git
linux-2.6.11.y
linux-2.6.12.y
linux-2.6.13.y
linux-2.6.14.y
linux-2.6.15.y
linux-2.6.16.y
linux-2.6.17.y
linux-2.6.18.y
linux-2.6.19.y
linux-2.6.20.y
linux-2.6.21.y
linux-2.6.22.y
linux-2.6.23.y
linux-2.6.24.y
linux-2.6.25.y
linux-2.6.26.y
linux-2.6.27.y
linux-2.6.28.y
linux-2.6.29.y
linux-2.6.30.y
linux-2.6.31.y
linux-2.6.32.y
linux-2.6.33.y
linux-2.6.34.y
linux-2.6.35.y
linux-2.6.36.y
linux-2.6.37.y
linux-2.6.38.y
linux-2.6.39.y
linux-3.0.y
linux-3.1.y
linux-3.10.y
linux-3.11.y
linux-3.12.y
linux-3.13.y
linux-3.14.y
linux-3.15.y
linux-3.16.y
linux-3.17.y
linux-3.18.y
linux-3.19.y
linux-3.2.y
linux-3.3.y
linux-3.4.y
linux-3.5.y
linux-3.6.y
linux-3.7.y
linux-3.8.y
linux-3.9.y
linux-4.0.y
linux-4.1.y
linux-4.10.y
linux-4.11.y
linux-4.12.y
linux-4.13.y
linux-4.14.y
linux-4.15.y
linux-4.16.y
linux-4.17.y
linux-4.18.y
linux-4.19.y
linux-4.2.y
linux-4.20.y
linux-4.3.y
linux-4.4.y
linux-4.5.y
linux-4.6.y
linux-4.7.y
linux-4.8.y
linux-4.9.y
linux-5.0.y
linux-5.1.y
linux-5.10.y
linux-5.11.y
linux-5.12.y
linux-5.13.y
linux-5.14.y
linux-5.15.y
linux-5.16.y
linux-5.17.y
linux-5.18.y
linux-5.19.y
linux-5.2.y
linux-5.3.y
linux-5.4.y
linux-5.5.y
linux-5.6.y
linux-5.7.y
linux-5.8.y
linux-5.9.y
linux-6.0.y
linux-6.1.y
linux-6.10.y
linux-6.11.y
linux-6.12.y
linux-6.2.y
linux-6.3.y
linux-6.4.y
linux-6.5.y
linux-6.6.y
linux-6.7.y
linux-6.8.y
linux-6.9.y
linux-rockchip-6.1.y
linux-rockchip-6.5.y
linux-rolling-lts
linux-rolling-stable
master
Linux kernel stable tree (mirror)
Andrey V.Kosteltsev
summary
refs
log
tree
commit
diff
log msg
author
committer
range
Age
Commit message (
Expand
)
Author
Files
Lines
2018-05-19
bpf: Prevent memory disambiguation attack
Alexei Starovoitov
2
-3
/
+57
2018-05-18
x86/bugs: Rename SSBD_NO to SSB_NO
Konrad Rzeszutek Wilk
2
-2
/
+2
2018-05-17
KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD
Tom Lendacky
6
-18
/
+50
2018-05-17
x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
Thomas Gleixner
2
-0
/
+36
2018-05-17
x86/bugs: Rework spec_ctrl base and mask logic
Thomas Gleixner
1
-7
/
+19
2018-05-17
x86/bugs: Remove x86_spec_ctrl_set()
Thomas Gleixner
2
-13
/
+2
2018-05-17
x86/bugs: Expose x86_spec_ctrl_base directly
Thomas Gleixner
3
-24
/
+6
2018-05-17
x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
Borislav Petkov
2
-49
/
+44
2018-05-17
x86/speculation: Rework speculative_store_bypass_update()
Thomas Gleixner
3
-4
/
+9
2018-05-17
x86/speculation: Add virtualized speculative store bypass disable support
Tom Lendacky
4
-2
/
+18
2018-05-17
x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
Thomas Gleixner
4
-9
/
+35
2018-05-17
x86/speculation: Handle HT correctly on AMD
Thomas Gleixner
3
-6
/
+130
2018-05-17
x86/cpufeatures: Add FEATURE_ZEN
Thomas Gleixner
2
-0
/
+2
2018-05-17
x86/cpufeatures: Disentangle SSBD enumeration
Thomas Gleixner
6
-16
/
+14
2018-05-17
x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
Thomas Gleixner
4
-9
/
+20
2018-05-17
x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP
Borislav Petkov
5
-23
/
+26
2018-05-17
KVM: SVM: Move spec control call after restore of GS
Thomas Gleixner
1
-12
/
+12
2018-05-14
x86/cpu: Make alternative_msr_write work for 32-bit code
Jim Mattson
1
-2
/
+2
2018-05-12
x86/bugs: Fix the parameters alignment and missing void
Konrad Rzeszutek Wilk
1
-2
/
+2
2018-05-10
x86/bugs: Make cpu_show_common() static
Jiri Kosina
1
-1
/
+1
2018-05-10
x86/bugs: Fix __ssb_select_mitigation() return type
Jiri Kosina
1
-1
/
+1
2018-05-09
Documentation/spec_ctrl: Do some minor cleanups
Borislav Petkov
1
-12
/
+12
2018-05-09
proc: Use underscores for SSBD in 'status'
Konrad Rzeszutek Wilk
1
-1
/
+1
2018-05-09
x86/bugs: Rename _RDS to _SSBD
Konrad Rzeszutek Wilk
11
-51
/
+51
2018-05-05
x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
Kees Cook
3
-18
/
+41
2018-05-05
seccomp: Move speculation migitation control to arch code
Thomas Gleixner
3
-24
/
+22
2018-05-05
seccomp: Add filter flag to opt-out of SSB mitigation
Kees Cook
4
-15
/
+36
2018-05-05
seccomp: Use PR_SPEC_FORCE_DISABLE
Thomas Gleixner
1
-1
/
+1
2018-05-05
prctl: Add force disable speculation
Thomas Gleixner
5
-24
/
+59
2018-05-05
x86/bugs: Make boot modes __ro_after_init
Kees Cook
1
-2
/
+3
2018-05-03
seccomp: Enable speculation flaw mitigations
Kees Cook
1
-0
/
+17
2018-05-03
proc: Provide details on speculation flaw mitigations
Kees Cook
1
-0
/
+22
2018-05-03
nospec: Allow getting/setting on non-current task
Kees Cook
3
-17
/
+26
2018-05-03
x86/speculation: Add prctl for Speculative Store Bypass mitigation
Thomas Gleixner
3
-11
/
+79
2018-05-03
x86/process: Allow runtime control of Speculative Store Bypass
Thomas Gleixner
5
-7
/
+65
2018-05-03
prctl: Add speculation control prctls
Thomas Gleixner
5
-0
/
+125
2018-05-03
x86/speculation: Create spec-ctrl.h to avoid include hell
Thomas Gleixner
6
-18
/
+25
2018-05-03
x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest
Konrad Rzeszutek Wilk
2
-4
/
+6
2018-05-03
x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
Konrad Rzeszutek Wilk
5
-1
/
+61
2018-05-03
x86/bugs: Whitelist allowed SPEC_CTRL MSR values
Konrad Rzeszutek Wilk
1
-2
/
+9
2018-05-03
x86/bugs/intel: Set proper CPU features and setup RDS
Konrad Rzeszutek Wilk
5
-6
/
+43
2018-05-03
x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
Konrad Rzeszutek Wilk
4
-0
/
+143
2018-05-03
x86/cpufeatures: Add X86_FEATURE_RDS
Konrad Rzeszutek Wilk
1
-0
/
+1
2018-05-03
x86/bugs: Expose /sys/../spec_store_bypass
Konrad Rzeszutek Wilk
6
-0
/
+40
2018-05-03
x86/bugs, KVM: Support the combination of guest and host IBRS
Konrad Rzeszutek Wilk
4
-8
/
+32
2018-05-03
x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
Konrad Rzeszutek Wilk
2
-4
/
+48
2018-05-03
x86/bugs: Concentrate bug reporting into a separate function
Konrad Rzeszutek Wilk
1
-14
/
+32
2018-05-03
x86/bugs: Concentrate bug detection into a separate function
Konrad Rzeszutek Wilk
1
-10
/
+11
2018-05-03
x86/nospec: Simplify alternative_msr_write()
Linus Torvalds
1
-9
/
+10
2018-05-02
x86/cpu: Restore CPUID_8000_0008_EBX reload
Thomas Gleixner
1
-1
/
+5
[next]