index
:
starfive-tech/linux.git
JH7100_VisionFive_OH_dev
JH7110_VisionFive2_510_devel
JH7110_VisionFive2_6.1.y_devel
JH7110_VisionFive2_6.6.y_devel
JH7110_VisionFive2_devel
JH7110_VisionFive2_upstream
beaglev-5.13.y
beaglev_fedora_devel
buildroot-upstream
esmil_starlight
fedora-vic-7100_5.10.6
master
openwrt-6.1.y
rt-ethercat-release
rt-linux-6.6.y-release
rt-linux-release
rtthread_AMP
starfive-5.13
starfive-5.15-dubhe
starfive-6.1-dubhe
starfive-6.1.65-dubhe
starfive-6.6.10-dubhe
starfive-6.6.31-dubhe
starfive-6.6.48-dubhe
starlight-5.14.y
visionfive
visionfive-5.13.y-devel
visionfive-5.15.y
visionfive-5.15.y-devel
visionfive-5.15.y_fedora_devel
visionfive-5.16.y
visionfive-5.17.y
visionfive-5.18.y
visionfive-5.19.y
visionfive-6.4.y
visionfive_fedora_devel
StarFive Tech Linux Kernel for VisionFive (JH7110) boards (mirror)
Andrey V.Kosteltsev
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
arch
/
x86
/
kernel
/
cpu
/
bugs.c
Age
Commit message (
Expand
)
Author
Files
Lines
2022-07-29
x86/bugs: Do not enable IBPB at firmware entry when IBPB is not available
Thadeu Lima de Souza Cascardo
1
-0
/
+1
2022-07-20
x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
Pawan Gupta
1
-0
/
+3
2022-07-18
x86/amd: Use IBPB for firmware calls
Peter Zijlstra
1
-1
/
+10
2022-07-16
x86/bugs: Remove apostrophe typo
Kim Phillips
1
-1
/
+1
2022-07-14
x86/bugs: Mark retbleed_strings static
Jiapeng Chong
1
-1
/
+1
2022-07-09
x86/speculation: Disable RRSBA behavior
Pawan Gupta
1
-0
/
+26
2022-07-08
x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported
Thadeu Lima de Souza Cascardo
1
-2
/
+5
2022-06-29
x86/retbleed: Add fine grained Kconfig knobs
Peter Zijlstra
1
-15
/
+27
2022-06-27
KVM: VMX: Prevent RSB underflow before vmenter
Josh Poimboeuf
1
-2
/
+2
2022-06-27
x86/speculation: Fill RSB on vmexit for IBRS
Josh Poimboeuf
1
-5
/
+58
2022-06-27
KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
Josh Poimboeuf
1
-0
/
+4
2022-06-27
x86/speculation: Remove x86_spec_ctrl_mask
Josh Poimboeuf
1
-30
/
+1
2022-06-27
x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
Josh Poimboeuf
1
-11
/
+1
2022-06-27
x86/speculation: Fix SPEC_CTRL write on SMT state change
Josh Poimboeuf
1
-1
/
+2
2022-06-27
x86/bugs: Do IBPB fallback check only once
Josh Poimboeuf
1
-10
/
+5
2022-06-27
x86/bugs: Add retbleed=ibpb
Peter Zijlstra
1
-9
/
+34
2022-06-27
intel_idle: Disable IBRS during long idle
Peter Zijlstra
1
-0
/
+6
2022-06-27
x86/bugs: Report Intel retbleed vulnerability
Peter Zijlstra
1
-6
/
+33
2022-06-27
x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mit...
Peter Zijlstra
1
-8
/
+17
2022-06-27
x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
Pawan Gupta
1
-14
/
+52
2022-06-27
x86/bugs: Optimize SPEC_CTRL MSR writes
Peter Zijlstra
1
-6
/
+12
2022-06-27
x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
Peter Zijlstra
1
-5
/
+23
2022-06-27
x86/bugs: Enable STIBP for JMP2RET
Kim Phillips
1
-12
/
+46
2022-06-27
x86/bugs: Add AMD retbleed= boot parameter
Alexandre Chartre
1
-1
/
+107
2022-06-27
x86/bugs: Report AMD retbleed vulnerability
Alexandre Chartre
1
-0
/
+13
2022-06-14
Merge tag 'x86-bugs-2022-06-01' of git://git.kernel.org/pub/scm/linux/kernel/...
Linus Torvalds
1
-36
/
+199
2022-06-01
x86/speculation/mmio: Print SMT warning
Josh Poimboeuf
1
-0
/
+11
2022-05-21
x86/speculation/srbds: Update SRBDS mitigation selection
Pawan Gupta
1
-3
/
+5
2022-05-21
x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale Data
Pawan Gupta
1
-0
/
+22
2022-05-21
x86/speculation/mmio: Enable CPU Fill buffer clearing on idle
Pawan Gupta
1
-2
/
+14
2022-05-21
x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigations
Pawan Gupta
1
-10
/
+16
2022-05-21
x86/speculation/mmio: Add mitigation for Processor MMIO Stale Data
Pawan Gupta
1
-4
/
+107
2022-05-21
x86/speculation: Add a common function for MD_CLEAR mitigation update
Pawan Gupta
1
-26
/
+33
2022-04-05
x86/speculation/srbds: Do not try to turn mitigation off when not supported
Ricardo CaƱuelo
1
-0
/
+7
2022-03-05
x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
Josh Poimboeuf
1
-2
/
+25
2022-03-05
x86/speculation: Warn about Spectre v2 LFENCE mitigation
Josh Poimboeuf
1
-0
/
+5
2022-02-28
x86/speculation: Use generic retpoline by default on AMD
Kim Phillips
1
-9
/
+0
2022-02-21
x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation re...
Josh Poimboeuf
1
-6
/
+29
2022-02-21
x86/speculation: Add eIBRS + Retpoline options
Peter Zijlstra
1
-37
/
+96
2022-02-21
x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
Peter Zijlstra (Intel)
1
-11
/
+18
2021-11-02
Merge tag 'seccomp-v5.16-rc1' of git://git.kernel.org/pub/scm/linux/kernel/gi...
Linus Torvalds
1
-2
/
+2
2021-11-02
Merge tag 'x86-fpu-2021-11-01' of git://git.kernel.org/pub/scm/linux/kernel/g...
Linus Torvalds
1
-1
/
+1
2021-10-29
x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
Peter Zijlstra
1
-7
/
+0
2021-10-20
x86/fpu: Replace the includes of fpu/internal.h
Thomas Gleixner
1
-1
/
+1
2021-10-04
x86: change default to spec_store_bypass_disable=prctl spectre_v2_user=prctl
Andrea Arcangeli
1
-2
/
+2
2021-07-28
x86, prctl: Hook L1D flushing in via prctl
Balbir Singh
1
-0
/
+33
2021-07-28
x86/mm: Prepare for opt-in based L1D flush in switch_mm()
Balbir Singh
1
-0
/
+37
2020-11-25
x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb
Anand K Mistry
1
-2
/
+2
2020-11-05
x86/speculation: Allow IBPB to be conditionally enabled on CPUs with always-o...
Anand K Mistry
1
-18
/
+33
2020-08-07
x86/bugs/multihit: Fix mitigation reporting when VMX is not in use
Pawan Gupta
1
-1
/
+7
[next]