index
:
blaster4385/linux-IllusionX
main
v6.12.1
v6.12.10
v6.13
Linux kernel with personal config changes for arch linux
Blaster4385
about
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
arch
/
x86
/
kernel
/
cpu
/
bugs.c
Age
Commit message (
Expand
)
Author
Files
Lines
2018-05-17
x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
Thomas Gleixner
1
-0
/
+30
2018-05-17
x86/bugs: Rework spec_ctrl base and mask logic
Thomas Gleixner
1
-7
/
+19
2018-05-17
x86/bugs: Remove x86_spec_ctrl_set()
Thomas Gleixner
1
-11
/
+2
2018-05-17
x86/bugs: Expose x86_spec_ctrl_base directly
Thomas Gleixner
1
-10
/
+1
2018-05-17
x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
Borislav Petkov
1
-45
/
+15
2018-05-17
x86/speculation: Rework speculative_store_bypass_update()
Thomas Gleixner
1
-1
/
+1
2018-05-17
x86/speculation: Add virtualized speculative store bypass disable support
Tom Lendacky
1
-1
/
+3
2018-05-17
x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
Thomas Gleixner
1
-2
/
+18
2018-05-17
x86/cpufeatures: Disentangle SSBD enumeration
Thomas Gleixner
1
-5
/
+5
2018-05-17
x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
Thomas Gleixner
1
-7
/
+11
2018-05-12
x86/bugs: Fix the parameters alignment and missing void
Konrad Rzeszutek Wilk
1
-2
/
+2
2018-05-10
x86/bugs: Make cpu_show_common() static
Jiri Kosina
1
-1
/
+1
2018-05-10
x86/bugs: Fix __ssb_select_mitigation() return type
Jiri Kosina
1
-1
/
+1
2018-05-09
x86/bugs: Rename _RDS to _SSBD
Konrad Rzeszutek Wilk
1
-18
/
+18
2018-05-05
x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
Kees Cook
1
-9
/
+23
2018-05-05
seccomp: Move speculation migitation control to arch code
Thomas Gleixner
1
-11
/
+18
2018-05-05
prctl: Add force disable speculation
Thomas Gleixner
1
-10
/
+25
2018-05-05
x86/bugs: Make boot modes __ro_after_init
Kees Cook
1
-2
/
+3
2018-05-03
nospec: Allow getting/setting on non-current task
Kees Cook
1
-11
/
+16
2018-05-03
x86/speculation: Add prctl for Speculative Store Bypass mitigation
Thomas Gleixner
1
-10
/
+73
2018-05-03
x86/process: Allow runtime control of Speculative Store Bypass
Thomas Gleixner
1
-5
/
+21
2018-05-03
x86/speculation: Create spec-ctrl.h to avoid include hell
Thomas Gleixner
1
-1
/
+1
2018-05-03
x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
Konrad Rzeszutek Wilk
1
-1
/
+26
2018-05-03
x86/bugs: Whitelist allowed SPEC_CTRL MSR values
Konrad Rzeszutek Wilk
1
-2
/
+9
2018-05-03
x86/bugs/intel: Set proper CPU features and setup RDS
Konrad Rzeszutek Wilk
1
-2
/
+28
2018-05-03
x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
Konrad Rzeszutek Wilk
1
-0
/
+103
2018-05-03
x86/bugs: Expose /sys/../spec_store_bypass
Konrad Rzeszutek Wilk
1
-0
/
+5
2018-05-03
x86/bugs, KVM: Support the combination of guest and host IBRS
Konrad Rzeszutek Wilk
1
-0
/
+18
2018-05-03
x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
Konrad Rzeszutek Wilk
1
-0
/
+28
2018-05-03
x86/bugs: Concentrate bug reporting into a separate function
Konrad Rzeszutek Wilk
1
-14
/
+32
2018-02-20
x86/speculation: Use IBRS if available before calling into firmware
David Woodhouse
1
-1
/
+11
2018-02-15
x86/spectre: Fix an error message
Dan Carpenter
1
-1
/
+1
2018-02-13
x86/speculation: Clean up various Spectre related details
Ingo Molnar
1
-17
/
+11
2018-02-13
Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()"
David Woodhouse
1
-6
/
+0
2018-02-02
x86/spectre: Simplify spectre_v2 command line parsing
KarimAllah Ahmed
1
-30
/
+56
2018-01-30
x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"
Colin Ian King
1
-1
/
+1
2018-01-30
x86/spectre: Report get_user mitigation for spectre_v1
Dan Williams
1
-1
/
+1
2018-01-30
x86/spectre: Check CONFIG_RETPOLINE in command line parser
Dou Liyang
1
-3
/
+3
2018-01-27
x86/speculation: Simplify indirect_branch_prediction_barrier()
Borislav Petkov
1
-0
/
+6
2018-01-27
x86/cpufeatures: Clean up Spectre v2 related CPUID flags
David Woodhouse
1
-4
/
+3
2018-01-27
x86/cpu/bugs: Make retpoline module warning conditional
Thomas Gleixner
1
-3
/
+11
2018-01-26
x86/bugs: Drop one "mitigation" from dmesg
Borislav Petkov
1
-1
/
+1
2018-01-26
x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support
David Woodhouse
1
-1
/
+9
2018-01-26
module/retpoline: Warn about missing retpoline in module
Andi Kleen
1
-1
/
+16
2018-01-15
x86/retpoline: Fill RSB on context switch for affected CPUs
David Woodhouse
1
-0
/
+36
2018-01-12
x86/spectre: Add boot time option to select Spectre v2 mitigation
David Woodhouse
1
-1
/
+157
2018-01-08
x86/cpu: Implement CPU vulnerabilites sysfs functions
Thomas Gleixner
1
-0
/
+29
2017-11-02
License cleanup: add SPDX GPL-2.0 license identifier to files with no license
Greg Kroah-Hartman
1
-0
/
+1
2017-09-17
x86/mm/32: Move setup_clear_cpu_cap(X86_FEATURE_PCID) earlier
Andy Lutomirski
1
-8
/
+0
2017-07-05
x86/mm: Disable PCID on 32-bit kernels
Andy Lutomirski
1
-0
/
+8
[next]