Age | Commit message (Expand) | Author | Files | Lines |
2019-10-28 | x86/speculation/taa: Add mitigation for TSX Async Abort | ![](https://seccdn.libravatar.org/avatar/9884e147b06e5a164c113162c1fc2cdf?s=13&d=retro) Pawan Gupta | 1 | -2/+2 |
2019-08-23 | x86/retpoline: Don't clobber RFLAGS during CALL_NOSPEC on i386 | ![](https://seccdn.libravatar.org/avatar/0721c2c814c4113f899db25794235417?s=13&d=retro) Sean Christopherson | 1 | -1/+1 |
2019-05-14 | Merge branch 'x86-mds-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip | ![](https://seccdn.libravatar.org/avatar/fb47627bc8c0bcdb36321edfbf02e916?s=13&d=retro) Linus Torvalds | 1 | -0/+50 |
2019-04-03 | x86/nospec, objtool: Introduce ANNOTATE_IGNORE_ALTERNATIVE | ![](https://seccdn.libravatar.org/avatar/5006c7a9e83a6090be8e8086eb432e1c?s=13&d=retro) Peter Zijlstra | 1 | -19/+9 |
2019-03-06 | x86/speculation/mds: Conditionally clear CPU buffers on idle entry | ![](https://seccdn.libravatar.org/avatar/655933b9bf9ea16efc37f6cf1438efaa?s=13&d=retro) Thomas Gleixner | 1 | -0/+12 |
2019-03-06 | x86/speculation/mds: Clear CPU buffers on exit to user | ![](https://seccdn.libravatar.org/avatar/655933b9bf9ea16efc37f6cf1438efaa?s=13&d=retro) Thomas Gleixner | 1 | -0/+13 |
2019-03-06 | x86/speculation/mds: Add mds_clear_cpu_buffers() | ![](https://seccdn.libravatar.org/avatar/655933b9bf9ea16efc37f6cf1438efaa?s=13&d=retro) Thomas Gleixner | 1 | -0/+25 |
2018-12-18 | x86/speculation: Add support for STIBP always-on preferred mode | ![](https://seccdn.libravatar.org/avatar/af8a4423801b0639a1adf6daca93390a?s=13&d=retro) Thomas Lendacky | 1 | -0/+1 |
2018-11-28 | x86/speculation: Add seccomp Spectre v2 user space protection mode | ![](https://seccdn.libravatar.org/avatar/655933b9bf9ea16efc37f6cf1438efaa?s=13&d=retro) Thomas Gleixner | 1 | -0/+1 |
2018-11-28 | x86/speculation: Add prctl() control for indirect branch speculation | ![](https://seccdn.libravatar.org/avatar/655933b9bf9ea16efc37f6cf1438efaa?s=13&d=retro) Thomas Gleixner | 1 | -0/+1 |
2018-11-28 | x86/speculation: Prepare for conditional IBPB in switch_mm() | ![](https://seccdn.libravatar.org/avatar/655933b9bf9ea16efc37f6cf1438efaa?s=13&d=retro) Thomas Gleixner | 1 | -0/+2 |
2018-11-28 | x86/speculation: Add command line control for indirect branch speculation | ![](https://seccdn.libravatar.org/avatar/655933b9bf9ea16efc37f6cf1438efaa?s=13&d=retro) Thomas Gleixner | 1 | -0/+10 |
2018-11-28 | x86/retpoline: Remove minimal retpoline support | ![](https://seccdn.libravatar.org/avatar/98fcb30451f0413cc7d63c834d52df61?s=13&d=retro) Zhenzhong Duan | 1 | -2/+0 |
2018-11-28 | x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support | ![](https://seccdn.libravatar.org/avatar/98fcb30451f0413cc7d63c834d52df61?s=13&d=retro) Zhenzhong Duan | 1 | -4/+6 |
2018-09-23 | x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant | ![](https://seccdn.libravatar.org/avatar/98fcb30451f0413cc7d63c834d52df61?s=13&d=retro) Zhenzhong Duan | 1 | -4/+13 |
2018-08-03 | x86/speculation: Support Enhanced IBRS on future CPUs | ![](https://seccdn.libravatar.org/avatar/cca66adea419b28c52b8db69a300be40?s=13&d=retro) Sai Praneeth | 1 | -0/+1 |
2018-07-19 | x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation | ![](https://seccdn.libravatar.org/avatar/49228e6647089e99ee054a90127fd13d?s=13&d=retro) Jiang Biao | 1 | -1/+0 |
2018-05-26 | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net | ![](https://seccdn.libravatar.org/avatar/81279c43ce60f56aea992763d1ed612b?s=13&d=retro) David S. Miller | 1 | -13/+30 |
2018-05-17 | x86/bugs: Remove x86_spec_ctrl_set() | ![](https://seccdn.libravatar.org/avatar/655933b9bf9ea16efc37f6cf1438efaa?s=13&d=retro) Thomas Gleixner | 1 | -2/+0 |
2018-05-17 | x86/bugs: Expose x86_spec_ctrl_base directly | ![](https://seccdn.libravatar.org/avatar/655933b9bf9ea16efc37f6cf1438efaa?s=13&d=retro) Thomas Gleixner | 1 | -11/+5 |
2018-05-14 | bpf, x64: clean up retpoline emission slightly | ![](https://seccdn.libravatar.org/avatar/7d90a31a92f614abfab8f69ca8201029?s=13&d=retro) Daniel Borkmann | 1 | -15/+14 |
2018-05-14 | x86/cpu: Make alternative_msr_write work for 32-bit code | ![](https://seccdn.libravatar.org/avatar/d50bb5d87bc66efcf98538f45a1fe81f?s=13&d=retro) Jim Mattson | 1 | -2/+2 |
2018-05-05 | x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass | ![](https://seccdn.libravatar.org/avatar/1b45cc190ad060a47c5518963894c4c0?s=13&d=retro) Kees Cook | 1 | -0/+1 |
2018-05-03 | bpf, x86_32: add eBPF JIT compiler for ia32 | ![](https://seccdn.libravatar.org/avatar/5fca3786a1b180c5c483c375e516ea0e?s=13&d=retro) Wang YanQing | 1 | -3/+27 |
2018-05-03 | x86/speculation: Add prctl for Speculative Store Bypass mitigation | ![](https://seccdn.libravatar.org/avatar/655933b9bf9ea16efc37f6cf1438efaa?s=13&d=retro) Thomas Gleixner | 1 | -0/+1 |
2018-05-03 | x86/speculation: Create spec-ctrl.h to avoid include hell | ![](https://seccdn.libravatar.org/avatar/655933b9bf9ea16efc37f6cf1438efaa?s=13&d=retro) Thomas Gleixner | 1 | -14/+0 |
2018-05-03 | x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested | ![](https://seccdn.libravatar.org/avatar/3951a62cd7ed36690d9cd225e63a8872?s=13&d=retro) Konrad Rzeszutek Wilk | 1 | -0/+4 |
2018-05-03 | x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation | ![](https://seccdn.libravatar.org/avatar/3951a62cd7ed36690d9cd225e63a8872?s=13&d=retro) Konrad Rzeszutek Wilk | 1 | -0/+6 |
2018-05-03 | x86/bugs, KVM: Support the combination of guest and host IBRS | ![](https://seccdn.libravatar.org/avatar/3951a62cd7ed36690d9cd225e63a8872?s=13&d=retro) Konrad Rzeszutek Wilk | 1 | -0/+10 |
2018-05-03 | x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits | ![](https://seccdn.libravatar.org/avatar/3951a62cd7ed36690d9cd225e63a8872?s=13&d=retro) Konrad Rzeszutek Wilk | 1 | -4/+20 |
2018-05-03 | x86/nospec: Simplify alternative_msr_write() | ![](https://seccdn.libravatar.org/avatar/fb47627bc8c0bcdb36321edfbf02e916?s=13&d=retro) Linus Torvalds | 1 | -9/+10 |
2018-03-18 | Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip | ![](https://seccdn.libravatar.org/avatar/fb47627bc8c0bcdb36321edfbf02e916?s=13&d=retro) Linus Torvalds | 1 | -1/+4 |
2018-03-14 | x86/speculation, objtool: Annotate indirect calls/jumps for objtool on 32-bit kernels | ![](https://seccdn.libravatar.org/avatar/0a16f01e573766c31c81c6cf45f1eb25?s=13&d=retro) Andy Whitcroft | 1 | -1/+4 |
2018-02-26 | Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip | ![](https://seccdn.libravatar.org/avatar/fb47627bc8c0bcdb36321edfbf02e916?s=13&d=retro) Linus Torvalds | 1 | -20/+118 |
2018-02-22 | bpf, x64: implement retpoline for tail call | ![](https://seccdn.libravatar.org/avatar/7d90a31a92f614abfab8f69ca8201029?s=13&d=retro) Daniel Borkmann | 1 | -0/+37 |
2018-02-21 | x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP | ![](https://seccdn.libravatar.org/avatar/32bf2b7caf423ebd4d5cc5c6288af416?s=13&d=retro) Ingo Molnar | 1 | -12/+14 |
2018-02-21 | x86/speculation, objtool: Annotate indirect calls/jumps for objtool | ![](https://seccdn.libravatar.org/avatar/5006c7a9e83a6090be8e8086eb432e1c?s=13&d=retro) Peter Zijlstra | 1 | -4/+23 |
2018-02-20 | x86/speculation: Use IBRS if available before calling into firmware | ![](https://seccdn.libravatar.org/avatar/4728edec69bde67cf0f8a4f5568b747e?s=13&d=retro) David Woodhouse | 1 | -9/+30 |
2018-02-20 | Revert "x86/retpoline: Simplify vmexit_fill_RSB()" | ![](https://seccdn.libravatar.org/avatar/4728edec69bde67cf0f8a4f5568b747e?s=13&d=retro) David Woodhouse | 1 | -7/+63 |
2018-02-15 | x86/speculation: Add <asm/msr-index.h> dependency | ![](https://seccdn.libravatar.org/avatar/5006c7a9e83a6090be8e8086eb432e1c?s=13&d=retro) Peter Zijlstra | 1 | -0/+1 |
2018-02-13 | Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()" | ![](https://seccdn.libravatar.org/avatar/4728edec69bde67cf0f8a4f5568b747e?s=13&d=retro) David Woodhouse | 1 | -4/+9 |
2018-02-02 | x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL | ![](https://seccdn.libravatar.org/avatar/cba99b1bec4b263bc65e76e04ceee4b1?s=13&d=retro) Darren Kenny | 1 | -1/+1 |
2018-01-27 | x86/speculation: Simplify indirect_branch_prediction_barrier() | ![](https://seccdn.libravatar.org/avatar/0a4791ebefc39fc25d7c1a53796aca36?s=13&d=retro) Borislav Petkov | 1 | -9/+4 |
2018-01-27 | x86/retpoline: Simplify vmexit_fill_RSB() | ![](https://seccdn.libravatar.org/avatar/df98730dcb6654f0d1cc57e69813e0fd?s=13&d=retro) Borislav Petkov | 1 | -63/+7 |
2018-01-27 | x86/cpufeatures: Clean up Spectre v2 related CPUID flags | ![](https://seccdn.libravatar.org/avatar/4728edec69bde67cf0f8a4f5568b747e?s=13&d=retro) David Woodhouse | 1 | -1/+1 |
2018-01-26 | x86/nospec: Fix header guards names | ![](https://seccdn.libravatar.org/avatar/0a4791ebefc39fc25d7c1a53796aca36?s=13&d=retro) Borislav Petkov | 1 | -3/+3 |
2018-01-26 | x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support | ![](https://seccdn.libravatar.org/avatar/4728edec69bde67cf0f8a4f5568b747e?s=13&d=retro) David Woodhouse | 1 | -0/+13 |
2018-01-19 | x86/retpoline: Optimize inline assembler for vmexit_fill_RSB | ![](https://seccdn.libravatar.org/avatar/0e48472655adee42d99178b9d6ce77a1?s=13&d=retro) Andi Kleen | 1 | -3/+4 |
2018-01-19 | retpoline: Introduce start/end markers of indirect thunk | ![](https://seccdn.libravatar.org/avatar/0993a3d10b0003a299b59d107fb360a3?s=13&d=retro) Masami Hiramatsu | 1 | -0/+3 |
2018-01-15 | x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros | ![](https://seccdn.libravatar.org/avatar/af8a4423801b0639a1adf6daca93390a?s=13&d=retro) Tom Lendacky | 1 | -1/+5 |