index
:
linux-dev
linus/master
master
Linux kernel development work - see feature branches
Jason A. Donenfeld
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
arch
/
x86
/
include
/
asm
/
nospec-branch.h
(
follow
)
Age
Commit message (
Expand
)
Author
Files
Lines
2022-02-21
x86/speculation: Add eIBRS + Retpoline options
Peter Zijlstra
1
-1
/
+3
2022-02-21
x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
Peter Zijlstra (Intel)
1
-6
/
+6
2021-10-28
bpf,x86: Respect X86_FEATURE_RETPOLINE*
Peter Zijlstra
1
-59
/
+0
2021-10-28
x86/retpoline: Create a retpoline thunk array
Peter Zijlstra
1
-1
/
+7
2021-10-28
x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h
Peter Zijlstra
1
-0
/
+7
2021-07-28
x86/mm: Prepare for opt-in based L1D flush in switch_mm()
Balbir Singh
1
-0
/
+2
2021-04-27
Merge tag 'x86_core_for_v5.13' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Linus Torvalds
1
-3
/
+3
2021-04-26
Merge tag 'x86_cleanups_for_v5.13' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Linus Torvalds
1
-1
/
+1
2021-04-02
x86/retpoline: Simplify retpolines
Peter Zijlstra
1
-3
/
+3
2021-03-21
x86: Remove unusual Unicode characters from comments
Ingo Molnar
1
-1
/
+1
2021-03-11
x86/alternative: Merge include files
Juergen Gross
1
-1
/
+0
2020-10-15
Merge tag 'net-next-5.10' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next
Linus Torvalds
1
-8
/
+8
2020-09-17
bpf, x64: use %rcx instead of %rax for tail call retpolines
Maciej Fijalkowski
1
-8
/
+8
2020-09-10
objtool: Rename frame.h -> objtool.h
Julien Thierry
1
-1
/
+1
2020-06-11
x86/speculation/mds: Mark mds_user_clear_cpu_buffers() __always_inline
Thomas Gleixner
1
-2
/
+2
2020-04-30
x86/retpoline: Fix retpoline unwind
Peter Zijlstra
1
-48
/
+8
2020-04-30
x86: Change {JMP,CALL}_NOSPEC argument
Peter Zijlstra
1
-8
/
+8
2020-04-30
x86/speculation: Change FILL_RETURN_BUFFER to work with objtool
Peter Zijlstra
1
-6
/
+10
2020-04-14
KVM: SVM: move more vmentry code to assembly
Paolo Bonzini
1
-21
/
+0
2020-01-02
x86/nospec: Remove unused RSB_FILL_LOOPS
Anthony Steinhauser
1
-1
/
+0
2019-10-28
x86/speculation/taa: Add mitigation for TSX Async Abort
Pawan Gupta
1
-2
/
+2
2019-08-23
x86/retpoline: Don't clobber RFLAGS during CALL_NOSPEC on i386
Sean Christopherson
1
-1
/
+1
2019-05-14
Merge branch 'x86-mds-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Linus Torvalds
1
-0
/
+50
2019-04-03
x86/nospec, objtool: Introduce ANNOTATE_IGNORE_ALTERNATIVE
Peter Zijlstra
1
-19
/
+9
2019-03-06
x86/speculation/mds: Conditionally clear CPU buffers on idle entry
Thomas Gleixner
1
-0
/
+12
2019-03-06
x86/speculation/mds: Clear CPU buffers on exit to user
Thomas Gleixner
1
-0
/
+13
2019-03-06
x86/speculation/mds: Add mds_clear_cpu_buffers()
Thomas Gleixner
1
-0
/
+25
2018-12-18
x86/speculation: Add support for STIBP always-on preferred mode
Thomas Lendacky
1
-0
/
+1
2018-11-28
x86/speculation: Add seccomp Spectre v2 user space protection mode
Thomas Gleixner
1
-0
/
+1
2018-11-28
x86/speculation: Add prctl() control for indirect branch speculation
Thomas Gleixner
1
-0
/
+1
2018-11-28
x86/speculation: Prepare for conditional IBPB in switch_mm()
Thomas Gleixner
1
-0
/
+2
2018-11-28
x86/speculation: Add command line control for indirect branch speculation
Thomas Gleixner
1
-0
/
+10
2018-11-28
x86/retpoline: Remove minimal retpoline support
Zhenzhong Duan
1
-2
/
+0
2018-11-28
x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support
Zhenzhong Duan
1
-4
/
+6
2018-09-23
x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant
Zhenzhong Duan
1
-4
/
+13
2018-08-03
x86/speculation: Support Enhanced IBRS on future CPUs
Sai Praneeth
1
-0
/
+1
2018-07-19
x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
Jiang Biao
1
-1
/
+0
2018-05-26
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
David S. Miller
1
-13
/
+30
2018-05-17
x86/bugs: Remove x86_spec_ctrl_set()
Thomas Gleixner
1
-2
/
+0
2018-05-17
x86/bugs: Expose x86_spec_ctrl_base directly
Thomas Gleixner
1
-11
/
+5
2018-05-14
bpf, x64: clean up retpoline emission slightly
Daniel Borkmann
1
-15
/
+14
2018-05-14
x86/cpu: Make alternative_msr_write work for 32-bit code
Jim Mattson
1
-2
/
+2
2018-05-05
x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
Kees Cook
1
-0
/
+1
2018-05-03
bpf, x86_32: add eBPF JIT compiler for ia32
Wang YanQing
1
-3
/
+27
2018-05-03
x86/speculation: Add prctl for Speculative Store Bypass mitigation
Thomas Gleixner
1
-0
/
+1
2018-05-03
x86/speculation: Create spec-ctrl.h to avoid include hell
Thomas Gleixner
1
-14
/
+0
2018-05-03
x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
Konrad Rzeszutek Wilk
1
-0
/
+4
2018-05-03
x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
Konrad Rzeszutek Wilk
1
-0
/
+6
2018-05-03
x86/bugs, KVM: Support the combination of guest and host IBRS
Konrad Rzeszutek Wilk
1
-0
/
+10
2018-05-03
x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
Konrad Rzeszutek Wilk
1
-4
/
+20
[next]