index
:
linux
WIP-syscall
master
mmu_gather-race-fix
n900-dt
n900-dt-with-ssi
n900-dts-twl5030
n900-modem-rework
n900-omapdrm
next
proc-cmdline
sc18is600
ssi
ssi-cleaned
ssi-cleaned-dt
ssi-cleaned-dt2
ssi-cleaned-dt3
tty-splice
twl4030-madc-cleanup
Linux Kernel (branches are rebased on master from time to time)
Linus Torvalds
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
arch
/
x86
/
kernel
/
cpu
/
bugs.c
Age
Commit message (
Expand
)
Author
Files
Lines
2018-08-15
x86/l1tf: Fix build error seen if CONFIG_KVM_INTEL is disabled
Guenter Roeck
1
-2
/
+1
2018-08-14
Merge branch 'l1tf-final' of git://git.kernel.org/pub/scm/linux/kernel/git/ti...
Linus Torvalds
1
-0
/
+133
2018-08-07
cpu/hotplug: Fix SMT supported evaluation
Thomas Gleixner
1
-1
/
+1
2018-08-05
x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry
Paolo Bonzini
1
-0
/
+1
2018-08-05
x86/speculation: Simplify sysfs report of VMX L1TF vulnerability
Paolo Bonzini
1
-3
/
+9
2018-08-05
Merge 4.18-rc7 into master to pick up the KVM dependcy
Thomas Gleixner
1
-3
/
+9
2018-08-03
x86/speculation: Support Enhanced IBRS on future CPUs
Sai Praneeth
1
-2
/
+18
2018-07-31
x86/speculation: Protect against userspace-userspace spectreRSB
Jiri Kosina
1
-31
/
+7
2018-07-13
x86/bugs, kvm: Introduce boot-time control of L1TF mitigations
Jiri Kosina
1
-0
/
+44
2018-07-13
cpu/hotplug: Set CPU_SMT_NOT_SUPPORTED early
Thomas Gleixner
1
-0
/
+6
2018-07-13
x86/kvm: Allow runtime control of L1D flush
Thomas Gleixner
1
-1
/
+1
2018-07-13
x86/l1tf: Handle EPT disabled state proper
Thomas Gleixner
1
-4
/
+5
2018-07-13
x86/litf: Introduce vmx status variable
Thomas Gleixner
1
-2
/
+34
2018-07-03
x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR
Tom Lendacky
1
-3
/
+5
2018-06-21
x86/pti: Don't report XenPV as vulnerable
Jiri Kosina
1
-0
/
+4
2018-06-21
x86/bugs: Move the l1tf function and define pr_fmt properly
Konrad Rzeszutek Wilk
1
-26
/
+29
2018-06-20
x86/speculation/l1tf: Add sysfs reporting for l1tf
Andi Kleen
1
-0
/
+40
2018-06-06
x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features
Konrad Rzeszutek Wilk
1
-8
/
+3
2018-06-06
x86/bugs: Add AMD's SPEC_CTRL MSR usage
Konrad Rzeszutek Wilk
1
-5
/
+7
2018-05-17
x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
Thomas Gleixner
1
-0
/
+30
2018-05-17
x86/bugs: Rework spec_ctrl base and mask logic
Thomas Gleixner
1
-7
/
+19
2018-05-17
x86/bugs: Remove x86_spec_ctrl_set()
Thomas Gleixner
1
-11
/
+2
2018-05-17
x86/bugs: Expose x86_spec_ctrl_base directly
Thomas Gleixner
1
-10
/
+1
2018-05-17
x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
Borislav Petkov
1
-45
/
+15
2018-05-17
x86/speculation: Rework speculative_store_bypass_update()
Thomas Gleixner
1
-1
/
+1
2018-05-17
x86/speculation: Add virtualized speculative store bypass disable support
Tom Lendacky
1
-1
/
+3
2018-05-17
x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
Thomas Gleixner
1
-2
/
+18
2018-05-17
x86/cpufeatures: Disentangle SSBD enumeration
Thomas Gleixner
1
-5
/
+5
2018-05-17
x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
Thomas Gleixner
1
-7
/
+11
2018-05-12
x86/bugs: Fix the parameters alignment and missing void
Konrad Rzeszutek Wilk
1
-2
/
+2
2018-05-10
x86/bugs: Make cpu_show_common() static
Jiri Kosina
1
-1
/
+1
2018-05-10
x86/bugs: Fix __ssb_select_mitigation() return type
Jiri Kosina
1
-1
/
+1
2018-05-09
x86/bugs: Rename _RDS to _SSBD
Konrad Rzeszutek Wilk
1
-18
/
+18
2018-05-05
x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
Kees Cook
1
-9
/
+23
2018-05-05
seccomp: Move speculation migitation control to arch code
Thomas Gleixner
1
-11
/
+18
2018-05-05
prctl: Add force disable speculation
Thomas Gleixner
1
-10
/
+25
2018-05-05
x86/bugs: Make boot modes __ro_after_init
Kees Cook
1
-2
/
+3
2018-05-03
nospec: Allow getting/setting on non-current task
Kees Cook
1
-11
/
+16
2018-05-03
x86/speculation: Add prctl for Speculative Store Bypass mitigation
Thomas Gleixner
1
-10
/
+73
2018-05-03
x86/process: Allow runtime control of Speculative Store Bypass
Thomas Gleixner
1
-5
/
+21
2018-05-03
x86/speculation: Create spec-ctrl.h to avoid include hell
Thomas Gleixner
1
-1
/
+1
2018-05-03
x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
Konrad Rzeszutek Wilk
1
-1
/
+26
2018-05-03
x86/bugs: Whitelist allowed SPEC_CTRL MSR values
Konrad Rzeszutek Wilk
1
-2
/
+9
2018-05-03
x86/bugs/intel: Set proper CPU features and setup RDS
Konrad Rzeszutek Wilk
1
-2
/
+28
2018-05-03
x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
Konrad Rzeszutek Wilk
1
-0
/
+103
2018-05-03
x86/bugs: Expose /sys/../spec_store_bypass
Konrad Rzeszutek Wilk
1
-0
/
+5
2018-05-03
x86/bugs, KVM: Support the combination of guest and host IBRS
Konrad Rzeszutek Wilk
1
-0
/
+18
2018-05-03
x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
Konrad Rzeszutek Wilk
1
-0
/
+28
2018-05-03
x86/bugs: Concentrate bug reporting into a separate function
Konrad Rzeszutek Wilk
1
-14
/
+32
2018-02-20
x86/speculation: Use IBRS if available before calling into firmware
David Woodhouse
1
-1
/
+11
[next]