index
:
op-kernel-dev
raptor-dma-dev-4.18-pre
raptor-dma-dev-current
Development kernel branch for OpenPOWER systems
Raptor Engineering, LLC
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
arch
/
x86
/
kernel
/
cpu
/
bugs.c
Commit message (
Expand
)
Author
Age
Files
Lines
*
x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+
Andi Kleen
2018-08-27
1
-5
/
+41
*
x86/speculation/l1tf: Suggest what to do on systems with too much RAM
Vlastimil Babka
2018-08-24
1
-0
/
+4
*
x86/l1tf: Fix build error seen if CONFIG_KVM_INTEL is disabled
Guenter Roeck
2018-08-15
1
-2
/
+1
*
Merge branch 'l1tf-final' of git://git.kernel.org/pub/scm/linux/kernel/git/ti...
Linus Torvalds
2018-08-14
1
-0
/
+133
|
\
|
*
cpu/hotplug: Fix SMT supported evaluation
Thomas Gleixner
2018-08-07
1
-1
/
+1
|
*
x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry
Paolo Bonzini
2018-08-05
1
-0
/
+1
|
*
x86/speculation: Simplify sysfs report of VMX L1TF vulnerability
Paolo Bonzini
2018-08-05
1
-3
/
+9
|
*
Merge 4.18-rc7 into master to pick up the KVM dependcy
Thomas Gleixner
2018-08-05
1
-3
/
+9
|
|
\
|
*
|
x86/bugs, kvm: Introduce boot-time control of L1TF mitigations
Jiri Kosina
2018-07-13
1
-0
/
+44
|
*
|
cpu/hotplug: Set CPU_SMT_NOT_SUPPORTED early
Thomas Gleixner
2018-07-13
1
-0
/
+6
|
*
|
x86/kvm: Allow runtime control of L1D flush
Thomas Gleixner
2018-07-13
1
-1
/
+1
|
*
|
x86/l1tf: Handle EPT disabled state proper
Thomas Gleixner
2018-07-13
1
-4
/
+5
|
*
|
x86/litf: Introduce vmx status variable
Thomas Gleixner
2018-07-13
1
-2
/
+34
|
*
|
x86/bugs: Move the l1tf function and define pr_fmt properly
Konrad Rzeszutek Wilk
2018-06-21
1
-26
/
+29
|
*
|
x86/speculation/l1tf: Add sysfs reporting for l1tf
Andi Kleen
2018-06-20
1
-0
/
+40
*
|
|
x86/speculation: Support Enhanced IBRS on future CPUs
Sai Praneeth
2018-08-03
1
-2
/
+18
*
|
|
x86/speculation: Protect against userspace-userspace spectreRSB
Jiri Kosina
2018-07-31
1
-31
/
+7
|
|
/
|
/
|
*
|
x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR
Tom Lendacky
2018-07-03
1
-3
/
+5
*
|
x86/pti: Don't report XenPV as vulnerable
Jiri Kosina
2018-06-21
1
-0
/
+4
|
/
*
x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features
Konrad Rzeszutek Wilk
2018-06-06
1
-8
/
+3
*
x86/bugs: Add AMD's SPEC_CTRL MSR usage
Konrad Rzeszutek Wilk
2018-06-06
1
-5
/
+7
*
x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
Thomas Gleixner
2018-05-17
1
-0
/
+30
*
x86/bugs: Rework spec_ctrl base and mask logic
Thomas Gleixner
2018-05-17
1
-7
/
+19
*
x86/bugs: Remove x86_spec_ctrl_set()
Thomas Gleixner
2018-05-17
1
-11
/
+2
*
x86/bugs: Expose x86_spec_ctrl_base directly
Thomas Gleixner
2018-05-17
1
-10
/
+1
*
x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
Borislav Petkov
2018-05-17
1
-45
/
+15
*
x86/speculation: Rework speculative_store_bypass_update()
Thomas Gleixner
2018-05-17
1
-1
/
+1
*
x86/speculation: Add virtualized speculative store bypass disable support
Tom Lendacky
2018-05-17
1
-1
/
+3
*
x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
Thomas Gleixner
2018-05-17
1
-2
/
+18
*
x86/cpufeatures: Disentangle SSBD enumeration
Thomas Gleixner
2018-05-17
1
-5
/
+5
*
x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
Thomas Gleixner
2018-05-17
1
-7
/
+11
*
x86/bugs: Fix the parameters alignment and missing void
Konrad Rzeszutek Wilk
2018-05-12
1
-2
/
+2
*
x86/bugs: Make cpu_show_common() static
Jiri Kosina
2018-05-10
1
-1
/
+1
*
x86/bugs: Fix __ssb_select_mitigation() return type
Jiri Kosina
2018-05-10
1
-1
/
+1
*
x86/bugs: Rename _RDS to _SSBD
Konrad Rzeszutek Wilk
2018-05-09
1
-18
/
+18
*
x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
Kees Cook
2018-05-05
1
-9
/
+23
*
seccomp: Move speculation migitation control to arch code
Thomas Gleixner
2018-05-05
1
-11
/
+18
*
prctl: Add force disable speculation
Thomas Gleixner
2018-05-05
1
-10
/
+25
*
x86/bugs: Make boot modes __ro_after_init
Kees Cook
2018-05-05
1
-2
/
+3
*
nospec: Allow getting/setting on non-current task
Kees Cook
2018-05-03
1
-11
/
+16
*
x86/speculation: Add prctl for Speculative Store Bypass mitigation
Thomas Gleixner
2018-05-03
1
-10
/
+73
*
x86/process: Allow runtime control of Speculative Store Bypass
Thomas Gleixner
2018-05-03
1
-5
/
+21
*
x86/speculation: Create spec-ctrl.h to avoid include hell
Thomas Gleixner
2018-05-03
1
-1
/
+1
*
x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
Konrad Rzeszutek Wilk
2018-05-03
1
-1
/
+26
*
x86/bugs: Whitelist allowed SPEC_CTRL MSR values
Konrad Rzeszutek Wilk
2018-05-03
1
-2
/
+9
*
x86/bugs/intel: Set proper CPU features and setup RDS
Konrad Rzeszutek Wilk
2018-05-03
1
-2
/
+28
*
x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
Konrad Rzeszutek Wilk
2018-05-03
1
-0
/
+103
*
x86/bugs: Expose /sys/../spec_store_bypass
Konrad Rzeszutek Wilk
2018-05-03
1
-0
/
+5
*
x86/bugs, KVM: Support the combination of guest and host IBRS
Konrad Rzeszutek Wilk
2018-05-03
1
-0
/
+18
*
x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
Konrad Rzeszutek Wilk
2018-05-03
1
-0
/
+28
[next]