Sign in
android-kvm
/
linux
/
9624d5c9c7ff6836bbf9f9b230fd1fcf3d56f91a
/
arch
/
x86
/
kernel
/
cpu
/
bugs.c
e4f3589
x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE
by WANG Chao
· 6 years ago
312a466
Merge branch 'x86-cleanups-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
by Linus Torvalds
· 6 years ago
20c3a2c
x86/speculation: Add support for STIBP always-on preferred mode
by Thomas Lendacky
· 6 years ago
5b5e4d6
x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=off
by Michal Hocko
· 6 years ago
ad3bc25
x86/kernel: Fix more -Wmissing-prototypes warnings
by Borislav Petkov
· 6 years ago
aa77bfb
x86/speculation: Change misspelled STIPB to STIBP
by Waiman Long
· 6 years ago
55a9740
x86/speculation: Provide IBPB always command line options
by Thomas Gleixner
· 6 years ago
6b3e64c
x86/speculation: Add seccomp Spectre v2 user space protection mode
by Thomas Gleixner
· 6 years ago
7cc765a
x86/speculation: Enable prctl mode for spectre_v2_user
by Thomas Gleixner
· 6 years ago
9137bb2
x86/speculation: Add prctl() control for indirect branch speculation
by Thomas Gleixner
· 6 years ago
6893a95
x86/speculation: Prepare arch_smt_update() for PRCTL mode
by Thomas Gleixner
· 6 years ago
6d991ba
x86/speculation: Prevent stale SPEC_CTRL msr content
by Thomas Gleixner
· 6 years ago
e6da8bb
x86/speculation: Split out TIF update
by Thomas Gleixner
· 6 years ago
4c71a2b6
x86/speculation: Prepare for conditional IBPB in switch_mm()
by Thomas Gleixner
· 6 years ago
5bfbe3a
x86/speculation: Prepare for per task indirect branch speculation control
by Tim Chen
· 6 years ago
fa1202ef
x86/speculation: Add command line control for indirect branch speculation
by Thomas Gleixner
· 6 years ago
495d470
x86/speculation: Unify conditional spectre v2 print functions
by Thomas Gleixner
· 6 years ago
30ba72a
x86/speculataion: Mark command line parser data __initdata
by Thomas Gleixner
· 6 years ago
8770709
x86/speculation: Mark string arrays const correctly
by Thomas Gleixner
· 6 years ago
15d6b7a
x86/speculation: Reorder the spec_v2 code
by Thomas Gleixner
· 6 years ago
130d6f9
x86/l1tf: Show actual SMT state
by Thomas Gleixner
· 6 years ago
a74cfff
x86/speculation: Rework SMT state change
by Thomas Gleixner
· 6 years ago
26c4d75
x86/speculation: Rename SSBD update functions
by Thomas Gleixner
· 6 years ago
34bce7c
x86/speculation: Disable STIBP when enhanced IBRS is in use
by Tim Chen
· 6 years ago
a8f76ae
x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common()
by Tim Chen
· 6 years ago
b86bda0
x86/speculation: Remove unnecessary ret variable in cpu_show_common()
by Tim Chen
· 6 years ago
2484850
x86/speculation: Clean up spectre_v2_parse_cmdline()
by Tim Chen
· 6 years ago
ef014aa
x86/retpoline: Remove minimal retpoline support
by Zhenzhong Duan
· 6 years ago
4cd24de
x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support
by Zhenzhong Duan
· 6 years ago
d82924c
Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
by Linus Torvalds
· 6 years ago
1a576b2
x86/bugs: Add Hygon Dhyana to the respective mitigation machinery
by Pu Wen
· 6 years ago
bb4b3b7
x86/speculation: Propagate information about RSB filling mitigation to sysfs
by Jiri Kosina
· 6 years ago
53c613f
x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation
by Jiri Kosina
· 6 years ago
cc51e54
x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+
by Andi Kleen
· 7 years ago
6a01228
x86/speculation/l1tf: Suggest what to do on systems with too much RAM
by Vlastimil Babka
· 7 years ago
1eb4690
x86/l1tf: Fix build error seen if CONFIG_KVM_INTEL is disabled
by Guenter Roeck
· 7 years ago
958f338
Merge branch 'l1tf-final' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
by Linus Torvalds
· 7 years ago
bc2d8d26
cpu/hotplug: Fix SMT supported evaluation
by Thomas Gleixner
· 7 years ago
8e0b2b9
x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry
by Paolo Bonzini
· 7 years ago
ea156d1
x86/speculation: Simplify sysfs report of VMX L1TF vulnerability
by Paolo Bonzini
· 7 years ago
f2701b7
Merge 4.18-rc7 into master to pick up the KVM dependcy
by Thomas Gleixner
· 7 years ago
706d516
x86/speculation: Support Enhanced IBRS on future CPUs
by Sai Praneeth
· 7 years ago
fdf82a7
x86/speculation: Protect against userspace-userspace spectreRSB
by Jiri Kosina
· 7 years ago
d90a7a0
x86/bugs, kvm: Introduce boot-time control of L1TF mitigations
by Jiri Kosina
· 7 years ago
fee0aed
cpu/hotplug: Set CPU_SMT_NOT_SUPPORTED early
by Thomas Gleixner
· 7 years ago
895ae47
x86/kvm: Allow runtime control of L1D flush
by Thomas Gleixner
· 7 years ago
a7b9020
x86/l1tf: Handle EPT disabled state proper
by Thomas Gleixner
· 7 years ago
72c6d2d
x86/litf: Introduce vmx status variable
by Thomas Gleixner
· 7 years ago
612bc3b3
x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR
by Tom Lendacky
· 7 years ago
6cb2b08
x86/pti: Don't report XenPV as vulnerable
by Jiri Kosina
· 7 years ago
56563f5
x86/bugs: Move the l1tf function and define pr_fmt properly
by Konrad Rzeszutek Wilk
· 7 years ago
17dbca1
x86/speculation/l1tf: Add sysfs reporting for l1tf
by Andi Kleen
· 7 years ago
108fab4
x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features
by Konrad Rzeszutek Wilk
· 7 years ago
6ac2f49
x86/bugs: Add AMD's SPEC_CTRL MSR usage
by Konrad Rzeszutek Wilk
· 7 years ago
47c61b3
x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
by Thomas Gleixner
· 7 years ago
be6fcb5
x86/bugs: Rework spec_ctrl base and mask logic
by Thomas Gleixner
· 7 years ago
4b59bdb
x86/bugs: Remove x86_spec_ctrl_set()
by Thomas Gleixner
· 7 years ago
fa8ac49
x86/bugs: Expose x86_spec_ctrl_base directly
by Thomas Gleixner
· 7 years ago
cc69b34
x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
by Borislav Petkov
· 7 years ago
0270be3e
x86/speculation: Rework speculative_store_bypass_update()
by Thomas Gleixner
· 7 years ago
11fb068
x86/speculation: Add virtualized speculative store bypass disable support
by Tom Lendacky
· 7 years ago
ccbcd26
x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
by Thomas Gleixner
· 7 years ago
5281758
x86/cpufeatures: Disentangle SSBD enumeration
by Thomas Gleixner
· 7 years ago
7eb8956
x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
by Thomas Gleixner
· 7 years ago
ffed645e
x86/bugs: Fix the parameters alignment and missing void
by Konrad Rzeszutek Wilk
· 7 years ago
7bb4d36
x86/bugs: Make cpu_show_common() static
by Jiri Kosina
· 7 years ago
d66d8ff
x86/bugs: Fix __ssb_select_mitigation() return type
by Jiri Kosina
· 7 years ago
9f65fb2
x86/bugs: Rename _RDS to _SSBD
by Konrad Rzeszutek Wilk
· 7 years ago
f21b53b
x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
by Kees Cook
· 7 years ago
8bf37d8
seccomp: Move speculation migitation control to arch code
by Thomas Gleixner
· 7 years ago
356e4bf
prctl: Add force disable speculation
by Thomas Gleixner
· 7 years ago
f9544b2
x86/bugs: Make boot modes __ro_after_init
by Kees Cook
· 7 years ago
7bbf137
nospec: Allow getting/setting on non-current task
by Kees Cook
· 7 years ago
a73ec77
x86/speculation: Add prctl for Speculative Store Bypass mitigation
by Thomas Gleixner
· 7 years ago
885f82b
x86/process: Allow runtime control of Speculative Store Bypass
by Thomas Gleixner
· 7 years ago
28a2775
x86/speculation: Create spec-ctrl.h to avoid include hell
by Thomas Gleixner
· 7 years ago
764f3c2
x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
by Konrad Rzeszutek Wilk
· 7 years ago
1115a85
x86/bugs: Whitelist allowed SPEC_CTRL MSR values
by Konrad Rzeszutek Wilk
· 7 years ago
7724397
x86/bugs/intel: Set proper CPU features and setup RDS
by Konrad Rzeszutek Wilk
· 7 years ago
24f7fc8
x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
by Konrad Rzeszutek Wilk
· 7 years ago
c456442
x86/bugs: Expose /sys/../spec_store_bypass
by Konrad Rzeszutek Wilk
· 7 years ago
5cf6875
x86/bugs, KVM: Support the combination of guest and host IBRS
by Konrad Rzeszutek Wilk
· 7 years ago
1b86883
x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
by Konrad Rzeszutek Wilk
· 7 years ago
d105951
x86/bugs: Concentrate bug reporting into a separate function
by Konrad Rzeszutek Wilk
· 7 years ago
dd84441
x86/speculation: Use IBRS if available before calling into firmware
by David Woodhouse
· 7 years ago
9de29ea
x86/spectre: Fix an error message
by Dan Carpenter
· 7 years ago
21e433b
x86/speculation: Clean up various Spectre related details
by Ingo Molnar
· 7 years ago
f208820
Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()"
by David Woodhouse
· 7 years ago
9005c68
x86/spectre: Simplify spectre_v2 command line parsing
by KarimAllah Ahmed
· 7 years ago
e698dcd
x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"
by Colin Ian King
· 7 years ago
edfbae53
x86/spectre: Report get_user mitigation for spectre_v1
by Dan Williams
· 7 years ago
9471eee
x86/spectre: Check CONFIG_RETPOLINE in command line parser
by Dou Liyang
· 7 years ago
64e1672
x86/speculation: Simplify indirect_branch_prediction_barrier()
by Borislav Petkov
· 7 years ago
2961298
x86/cpufeatures: Clean up Spectre v2 related CPUID flags
by David Woodhouse
· 7 years ago
e383095
x86/cpu/bugs: Make retpoline module warning conditional
by Thomas Gleixner
· 7 years ago
55fa19d
x86/bugs: Drop one "mitigation" from dmesg
by Borislav Petkov
· 7 years ago
20ffa1c
x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support
by David Woodhouse
· 7 years ago
caf7501
module/retpoline: Warn about missing retpoline in module
by Andi Kleen
· 7 years ago
c995efd
x86/retpoline: Fill RSB on context switch for affected CPUs
by David Woodhouse
· 7 years ago
da28512
x86/spectre: Add boot time option to select Spectre v2 mitigation
by David Woodhouse
· 7 years ago
Next »