index
:
linux
master
linux
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
arch
/
x86
/
include
/
asm
/
nospec-branch.h
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
x86/speculation: Add eIBRS + Retpoline options
Peter Zijlstra
2022-02-21
1
-1
/
+3
*
x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
Peter Zijlstra (Intel)
2022-02-21
1
-6
/
+6
*
bpf,x86: Respect X86_FEATURE_RETPOLINE*
Peter Zijlstra
2021-10-28
1
-59
/
+0
*
x86/retpoline: Create a retpoline thunk array
Peter Zijlstra
2021-10-28
1
-1
/
+7
*
x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h
Peter Zijlstra
2021-10-28
1
-0
/
+7
*
x86/mm: Prepare for opt-in based L1D flush in switch_mm()
Balbir Singh
2021-07-28
1
-0
/
+2
*
Merge tag 'x86_core_for_v5.13' of git://git.kernel.org/pub/scm/linux/kernel/g...
Linus Torvalds
2021-04-28
1
-3
/
+3
|
\
|
*
x86/retpoline: Simplify retpolines
Peter Zijlstra
2021-04-02
1
-3
/
+3
*
|
Merge tag 'x86_cleanups_for_v5.13' of git://git.kernel.org/pub/scm/linux/kern...
Linus Torvalds
2021-04-26
1
-1
/
+1
|
\
\
|
|
/
|
/
|
|
*
x86: Remove unusual Unicode characters from comments
Ingo Molnar
2021-03-21
1
-1
/
+1
*
|
x86/alternative: Merge include files
Juergen Gross
2021-03-11
1
-1
/
+0
|
/
*
Merge tag 'net-next-5.10' of git://git.kernel.org/pub/scm/linux/kernel/git/ne...
Linus Torvalds
2020-10-16
1
-8
/
+8
|
\
|
*
bpf, x64: use %rcx instead of %rax for tail call retpolines
Maciej Fijalkowski
2020-09-17
1
-8
/
+8
*
|
objtool: Rename frame.h -> objtool.h
Julien Thierry
2020-09-10
1
-1
/
+1
|
/
*
x86/speculation/mds: Mark mds_user_clear_cpu_buffers() __always_inline
Thomas Gleixner
2020-06-11
1
-2
/
+2
*
x86/retpoline: Fix retpoline unwind
Peter Zijlstra
2020-04-30
1
-48
/
+8
*
x86: Change {JMP,CALL}_NOSPEC argument
Peter Zijlstra
2020-04-30
1
-8
/
+8
*
x86/speculation: Change FILL_RETURN_BUFFER to work with objtool
Peter Zijlstra
2020-04-30
1
-6
/
+10
*
KVM: SVM: move more vmentry code to assembly
Paolo Bonzini
2020-04-14
1
-21
/
+0
*
x86/nospec: Remove unused RSB_FILL_LOOPS
Anthony Steinhauser
2020-01-02
1
-1
/
+0
*
x86/speculation/taa: Add mitigation for TSX Async Abort
Pawan Gupta
2019-10-28
1
-2
/
+2
*
x86/retpoline: Don't clobber RFLAGS during CALL_NOSPEC on i386
Sean Christopherson
2019-08-23
1
-1
/
+1
*
Merge branch 'x86-mds-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...
Linus Torvalds
2019-05-14
1
-0
/
+50
|
\
|
*
x86/speculation/mds: Conditionally clear CPU buffers on idle entry
Thomas Gleixner
2019-03-06
1
-0
/
+12
|
*
x86/speculation/mds: Clear CPU buffers on exit to user
Thomas Gleixner
2019-03-06
1
-0
/
+13
|
*
x86/speculation/mds: Add mds_clear_cpu_buffers()
Thomas Gleixner
2019-03-06
1
-0
/
+25
*
|
x86/nospec, objtool: Introduce ANNOTATE_IGNORE_ALTERNATIVE
Peter Zijlstra
2019-04-03
1
-19
/
+9
|
/
*
x86/speculation: Add support for STIBP always-on preferred mode
Thomas Lendacky
2018-12-18
1
-0
/
+1
*
x86/speculation: Add seccomp Spectre v2 user space protection mode
Thomas Gleixner
2018-11-28
1
-0
/
+1
*
x86/speculation: Add prctl() control for indirect branch speculation
Thomas Gleixner
2018-11-28
1
-0
/
+1
*
x86/speculation: Prepare for conditional IBPB in switch_mm()
Thomas Gleixner
2018-11-28
1
-0
/
+2
*
x86/speculation: Add command line control for indirect branch speculation
Thomas Gleixner
2018-11-28
1
-0
/
+10
*
x86/retpoline: Remove minimal retpoline support
Zhenzhong Duan
2018-11-28
1
-2
/
+0
*
x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support
Zhenzhong Duan
2018-11-28
1
-4
/
+6
*
x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant
Zhenzhong Duan
2018-09-23
1
-4
/
+13
*
x86/speculation: Support Enhanced IBRS on future CPUs
Sai Praneeth
2018-08-03
1
-0
/
+1
*
x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
Jiang Biao
2018-07-19
1
-1
/
+0
*
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
David S. Miller
2018-05-27
1
-13
/
+30
|
\
|
*
x86/bugs: Remove x86_spec_ctrl_set()
Thomas Gleixner
2018-05-17
1
-2
/
+0
|
*
x86/bugs: Expose x86_spec_ctrl_base directly
Thomas Gleixner
2018-05-17
1
-11
/
+5
|
*
x86/cpu: Make alternative_msr_write work for 32-bit code
Jim Mattson
2018-05-14
1
-2
/
+2
|
*
x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
Kees Cook
2018-05-05
1
-0
/
+1
|
*
x86/speculation: Add prctl for Speculative Store Bypass mitigation
Thomas Gleixner
2018-05-03
1
-0
/
+1
|
*
x86/speculation: Create spec-ctrl.h to avoid include hell
Thomas Gleixner
2018-05-03
1
-14
/
+0
|
*
x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
Konrad Rzeszutek Wilk
2018-05-03
1
-0
/
+4
|
*
x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
Konrad Rzeszutek Wilk
2018-05-03
1
-0
/
+6
|
*
x86/bugs, KVM: Support the combination of guest and host IBRS
Konrad Rzeszutek Wilk
2018-05-03
1
-0
/
+10
|
*
x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
Konrad Rzeszutek Wilk
2018-05-03
1
-4
/
+20
|
*
x86/nospec: Simplify alternative_msr_write()
Linus Torvalds
2018-05-03
1
-9
/
+10
*
|
bpf, x64: clean up retpoline emission slightly
Daniel Borkmann
2018-05-15
1
-15
/
+14
[next]