Age | Commit message (Expand) | Author | Files | Lines |
2019-05-14 | Merge branch 'x86-mds-for-linus' of git://git.kernel.org/pub/scm/linux/kernel... | Linus Torvalds | 1 | -0/+50 |
2019-04-03 | x86/nospec, objtool: Introduce ANNOTATE_IGNORE_ALTERNATIVE | Peter Zijlstra | 1 | -19/+9 |
2019-03-06 | x86/speculation/mds: Conditionally clear CPU buffers on idle entry | Thomas Gleixner | 1 | -0/+12 |
2019-03-06 | x86/speculation/mds: Clear CPU buffers on exit to user | Thomas Gleixner | 1 | -0/+13 |
2019-03-06 | x86/speculation/mds: Add mds_clear_cpu_buffers() | Thomas Gleixner | 1 | -0/+25 |
2018-12-18 | x86/speculation: Add support for STIBP always-on preferred mode | Thomas Lendacky | 1 | -0/+1 |
2018-11-28 | x86/speculation: Add seccomp Spectre v2 user space protection mode | Thomas Gleixner | 1 | -0/+1 |
2018-11-28 | x86/speculation: Add prctl() control for indirect branch speculation | Thomas Gleixner | 1 | -0/+1 |
2018-11-28 | x86/speculation: Prepare for conditional IBPB in switch_mm() | Thomas Gleixner | 1 | -0/+2 |
2018-11-28 | x86/speculation: Add command line control for indirect branch speculation | Thomas Gleixner | 1 | -0/+10 |
2018-11-28 | x86/retpoline: Remove minimal retpoline support | Zhenzhong Duan | 1 | -2/+0 |
2018-11-28 | x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support | Zhenzhong Duan | 1 | -4/+6 |
2018-09-23 | x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant | Zhenzhong Duan | 1 | -4/+13 |
2018-08-03 | x86/speculation: Support Enhanced IBRS on future CPUs | Sai Praneeth | 1 | -0/+1 |
2018-07-19 | x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation | Jiang Biao | 1 | -1/+0 |
2018-05-27 | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net | David S. Miller | 1 | -13/+30 |
2018-05-17 | x86/bugs: Remove x86_spec_ctrl_set() | Thomas Gleixner | 1 | -2/+0 |
2018-05-17 | x86/bugs: Expose x86_spec_ctrl_base directly | Thomas Gleixner | 1 | -11/+5 |
2018-05-15 | bpf, x64: clean up retpoline emission slightly | Daniel Borkmann | 1 | -15/+14 |
2018-05-14 | x86/cpu: Make alternative_msr_write work for 32-bit code | Jim Mattson | 1 | -2/+2 |
2018-05-05 | x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass | Kees Cook | 1 | -0/+1 |
2018-05-03 | bpf, x86_32: add eBPF JIT compiler for ia32 | Wang YanQing | 1 | -3/+27 |
2018-05-03 | x86/speculation: Add prctl for Speculative Store Bypass mitigation | Thomas Gleixner | 1 | -0/+1 |
2018-05-03 | x86/speculation: Create spec-ctrl.h to avoid include hell | Thomas Gleixner | 1 | -14/+0 |
2018-05-03 | x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested | Konrad Rzeszutek Wilk | 1 | -0/+4 |
2018-05-03 | x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation | Konrad Rzeszutek Wilk | 1 | -0/+6 |
2018-05-03 | x86/bugs, KVM: Support the combination of guest and host IBRS | Konrad Rzeszutek Wilk | 1 | -0/+10 |
2018-05-03 | x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits | Konrad Rzeszutek Wilk | 1 | -4/+20 |
2018-05-03 | x86/nospec: Simplify alternative_msr_write() | Linus Torvalds | 1 | -9/+10 |
2018-03-18 | Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel... | Linus Torvalds | 1 | -1/+4 |
2018-03-14 | x86/speculation, objtool: Annotate indirect calls/jumps for objtool on 32-bit... | Andy Whitcroft | 1 | -1/+4 |
2018-02-26 | Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel... | Linus Torvalds | 1 | -20/+118 |
2018-02-23 | bpf, x64: implement retpoline for tail call | Daniel Borkmann | 1 | -0/+37 |
2018-02-21 | x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP | Ingo Molnar | 1 | -12/+14 |
2018-02-21 | x86/speculation, objtool: Annotate indirect calls/jumps for objtool | Peter Zijlstra | 1 | -4/+23 |
2018-02-20 | x86/speculation: Use IBRS if available before calling into firmware | David Woodhouse | 1 | -9/+30 |
2018-02-20 | Revert "x86/retpoline: Simplify vmexit_fill_RSB()" | David Woodhouse | 1 | -7/+63 |
2018-02-15 | x86/speculation: Add <asm/msr-index.h> dependency | Peter Zijlstra | 1 | -0/+1 |
2018-02-13 | Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()" | David Woodhouse | 1 | -4/+9 |
2018-02-03 | x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL | Darren Kenny | 1 | -1/+1 |
2018-01-27 | x86/speculation: Simplify indirect_branch_prediction_barrier() | Borislav Petkov | 1 | -9/+4 |
2018-01-27 | x86/retpoline: Simplify vmexit_fill_RSB() | Borislav Petkov | 1 | -63/+7 |
2018-01-27 | x86/cpufeatures: Clean up Spectre v2 related CPUID flags | David Woodhouse | 1 | -1/+1 |
2018-01-26 | x86/nospec: Fix header guards names | Borislav Petkov | 1 | -3/+3 |
2018-01-26 | x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support | David Woodhouse | 1 | -0/+13 |
2018-01-19 | x86/retpoline: Optimize inline assembler for vmexit_fill_RSB | Andi Kleen | 1 | -3/+4 |
2018-01-19 | retpoline: Introduce start/end markers of indirect thunk | Masami Hiramatsu | 1 | -0/+3 |
2018-01-15 | x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros | Tom Lendacky | 1 | -1/+5 |
2018-01-12 | x86/retpoline: Fill return stack buffer on vmexit | David Woodhouse | 1 | -1/+77 |
2018-01-12 | x86/spectre: Add boot time option to select Spectre v2 mitigation | David Woodhouse | 1 | -0/+10 |