Age | Commit message (Expand) | Author | Files | Lines |
2018-02-10 | x86/mm/pti: Fix PTI comment in entry_SYSCALL_64() | Nadav Amit | 1 | -1/+1 |
2018-02-06 | x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculati... | Dan Williams | 1 | -0/+30 |
2018-02-06 | x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculatio... | Dan Williams | 2 | -1/+24 |
2018-02-06 | x86/entry/64: Clear extra registers beyond syscall arguments, to reduce specu... | Dan Williams | 1 | -0/+13 |
2018-02-04 | KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL | KarimAllah Ahmed | 1 | -0/+88 |
2018-02-04 | KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL | KarimAllah Ahmed | 3 | -6/+110 |
2018-02-04 | KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES | KarimAllah Ahmed | 3 | -1/+17 |
2018-02-04 | KVM/x86: Add IBPB support | Ashok Raj | 3 | -3/+116 |
2018-02-04 | KVM/x86: Update the reverse_cpuid list to include CPUID_7_EDX | KarimAllah Ahmed | 2 | -5/+4 |
2018-02-04 | Merge branch 'msr-bitmaps' of git://git.kernel.org/pub/scm/virt/kvm/kvm into ... | Thomas Gleixner | 1 | -254/+186 |
2018-02-03 | x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL | Darren Kenny | 1 | -1/+1 |
2018-02-03 | x86/pti: Mark constant arrays as __initconst | Arnd Bergmann | 1 | -2/+2 |
2018-02-02 | x86/spectre: Simplify spectre_v2 command line parsing | KarimAllah Ahmed | 1 | -30/+56 |
2018-02-01 | x86/kvm: Update spectre-v1 mitigation | Dan Williams | 1 | -11/+9 |
2018-01-31 | KVM: VMX: make MSR bitmaps per-VCPU | Paolo Bonzini | 1 | -123/+147 |
2018-01-31 | x86/paravirt: Remove 'noreplace-paravirt' cmdline option | Josh Poimboeuf | 1 | -14/+0 |
2018-01-31 | x86/speculation: Use Indirect Branch Prediction Barrier in context switch | Tim Chen | 2 | -1/+34 |
2018-01-31 | x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel | David Woodhouse | 2 | -19/+29 |
2018-01-31 | x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable" | Colin Ian King | 1 | -1/+1 |
2018-01-30 | x86/spectre: Report get_user mitigation for spectre_v1 | Dan Williams | 1 | -1/+1 |
2018-01-30 | x86/syscall: Sanitize syscall table de-references under speculation | Dan Williams | 1 | -1/+4 |
2018-01-30 | x86/get_user: Use pointer masking to limit speculation | Dan Williams | 1 | -0/+10 |
2018-01-30 | x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec | Dan Williams | 4 | -14/+14 |
2018-01-30 | x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end} | Dan Williams | 1 | -4/+4 |
2018-01-30 | x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec | Dan Williams | 1 | -0/+9 |
2018-01-30 | x86: Introduce barrier_nospec | Dan Williams | 2 | -2/+5 |
2018-01-30 | x86: Implement array_index_mask_nospec | Dan Williams | 1 | -0/+24 |
2018-01-30 | x86/asm: Move 'status' from thread_struct to thread_info | Andy Lutomirski | 7 | -12/+11 |
2018-01-30 | x86/entry/64: Push extra regs right away | Andy Lutomirski | 1 | -3/+7 |
2018-01-30 | x86/entry/64: Remove the SYSCALL64 fast path | Andy Lutomirski | 2 | -122/+2 |
2018-01-30 | x86/spectre: Check CONFIG_RETPOLINE in command line parser | Dou Liyang | 1 | -3/+3 |
2018-01-30 | x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP | William Grant | 2 | -4/+7 |
2018-01-30 | Merge tag 'v4.15' into x86/pti, to be able to merge dependent changes | Ingo Molnar | 2139 | -30631/+68378 |
2018-01-28 | Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel... | Linus Torvalds | 2 | -2/+0 |
2018-01-28 | Merge branch 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/ker... | Linus Torvalds | 6 | -23/+59 |
2018-01-28 | Merge branch 'perf-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/ke... | Linus Torvalds | 1 | -15/+18 |
2018-01-28 | x86/ftrace: Add one more ENDPROC annotation | Josh Poimboeuf | 1 | -1/+1 |
2018-01-27 | x86/speculation: Simplify indirect_branch_prediction_barrier() | Borislav Petkov | 3 | -9/+13 |
2018-01-27 | x86/retpoline: Simplify vmexit_fill_RSB() | Borislav Petkov | 6 | -65/+71 |
2018-01-27 | x86/cpufeatures: Clean up Spectre v2 related CPUID flags | David Woodhouse | 4 | -24/+34 |
2018-01-27 | x86/cpu/bugs: Make retpoline module warning conditional | Thomas Gleixner | 1 | -3/+11 |
2018-01-27 | KVM: VMX: introduce alloc_loaded_vmcs | Paolo Bonzini | 1 | -14/+22 |
2018-01-27 | KVM: nVMX: Eliminate vmcs02 pool | Jim Mattson | 1 | -123/+23 |
2018-01-26 | x86/mm/64: Tighten up vmalloc_fault() sanity checks on 5-level kernels | Andy Lutomirski | 1 | -13/+9 |
2018-01-26 | x86/mm/64: Fix vmapped stack syncing on very-large-memory 4-level systems | Andy Lutomirski | 1 | -5/+29 |
2018-01-26 | x86/bugs: Drop one "mitigation" from dmesg | Borislav Petkov | 1 | -1/+1 |
2018-01-26 | x86/nospec: Fix header guards names | Borislav Petkov | 1 | -3/+3 |
2018-01-26 | x86/alternative: Print unadorned pointers | Borislav Petkov | 1 | -7/+7 |
2018-01-26 | x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support | David Woodhouse | 3 | -1/+24 |
2018-01-26 | x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes | David Woodhouse | 1 | -0/+66 |