index
:
bcachefs.git
9p_mempool
alloc_tags
alloc_tags_rfc
alloc_tags_v2
bcache2
bcachefs-5.17
bcachefs-btree-key-cache
bcachefs-buffered-write-locking
bcachefs-dev-lifetime
bcachefs-developer-guide
bcachefs-disk-accounting-rewrite
bcachefs-disk-accounting-rewrite-1
bcachefs-for-6.9
bcachefs-for-upstream
bcachefs-for-v6.7
bcachefs-garbage
bcachefs-icache
bcachefs-memalloc-profiling
bcachefs-sysfs-ioctls
bcachefs-testing
bcachefs-v4.13
bcachefs-v4.15
bcachefs-v4.16
bcachefs-v4.18
bcachefs-v4.19
bcachefs-v4.19-backport
bcachefs-v4.19-backport-2.0
bcachefs-v4.19-backport-2019-hotfix
bcachefs-v4.19-backport-2022-hotfix
bcachefs-v4.19-backport-compat
bcachefs-v4.20
bcachefs-v5.0
bcachefs-v5.10
bcachefs-v5.10-snapshots
bcachefs-v5.11
bcachefs-v5.15
bcachefs-v5.16
bcachefs-v5.19
bcachefs-v5.7
bcachefs-v5.9
bcachefs-v6.0
bcachefs-v6.3
bcachefs-v6.4
bcachefs-v6.5
bcachefs_bi_depth
bcachefs_subvol_ioctls
bio_folio_iter
bkey_unpack
btree_root_fix
buffered-io-2
casefold
codetags
codetags_v0
codetags_v1
compat
folio_iter_batched
for-next
fs-uuid-ioctl
header_cleanup
i_blocks_debug
inode_work
lazy_percpu_counters
lockdep_cmp_fn
lockdep_debug
master
mean_and_variance_fixups
memalloc-prof-v7
memalloc_prof_debug
memalloc_prof_v1
memalloc_prof_v2
memalloc_prof_v3
memalloc_prof_v4
memalloc_prof_v5
printbuf_v2
printbuf_v3
printbuf_v3_bcachefs
printbuf_v4
printbuf_v5
printbuf_v6
rcu_pending
ringbuffer
shrinker_to_text
time_stats_twf
tracing_to_printbuf
u128
vmalloc_size
xfs_no_data_io
zones
Unnamed repository; edit this file 'description' to name the repository.
Kent Overstreet
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
arch
/
x86
/
kernel
/
cpu
/
bugs.c
Age
Commit message (
Expand
)
Author
2020-12-02
x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb
Anand K Mistry
2020-11-18
x86/speculation: Allow IBPB to be conditionally enabled on CPUs with always-o...
Anand K Mistry
2020-06-20
x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.
Anthony Steinhauser
2020-06-20
x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.
Anthony Steinhauser
2020-06-20
x86/speculation: Add support for STIBP always-on preferred mode
Thomas Lendacky
2020-06-20
x86/speculation: Change misspelled STIPB to STIBP
Waiman Long
2020-06-11
x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation
Mark Gross
2020-04-24
x86/mitigations: Clear CPU buffers on the SYSCALL fast path
Borislav Petkov
2019-11-28
x86/speculation: Fix redundant MDS mitigation message
Waiman Long
2019-11-28
x86/speculation: Fix incorrect MDS/TAA mitigation status
Waiman Long
2019-11-16
x86/bugs: Add ITLB_MULTIHIT bug infrastructure
Vineela Tummalapalli
2019-11-16
x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs
Josh Poimboeuf
2019-11-16
x86/speculation/taa: Add sysfs reporting for TSX Async Abort
Pawan Gupta
2019-11-16
x86/speculation/taa: Add mitigation for TSX Async Abort
Pawan Gupta
2019-08-11
x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGS
Thomas Gleixner
2019-08-11
x86/speculation: Enable Spectre v1 swapgs mitigations
Josh Poimboeuf
2019-08-04
x86/speculation/mds: Apply more accurate check on hypervisor platform
Zhenzhong Duan
2019-07-10
x86/speculation: Allow guests to use SSBD even if host does not
Alejandro Jimenez
2019-05-16
x86/bugs: Change L1TF mitigation string to match upstream
Ben Hutchings
2019-05-16
x86/speculation/mds: Add 'mitigations=' support for MDS
Josh Poimboeuf
2019-05-16
x86/speculation: Support 'mitigations=' cmdline option
Josh Poimboeuf
2019-05-16
x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
Konrad Rzeszutek Wilk
2019-05-16
x86/speculation/mds: Fix comment
Boris Ostrovsky
2019-05-16
x86/speculation/mds: Add SMT warning message
Josh Poimboeuf
2019-05-16
x86/speculation: Move arch_smt_update() call to after mitigation decisions
Josh Poimboeuf
2019-05-16
x86/cpu/bugs: Use __initconst for 'const' init data
Andi Kleen
2019-05-16
Documentation: Move L1TF to separate directory
Thomas Gleixner
2019-05-16
x86/speculation/mds: Add mitigation mode VMWERV
Thomas Gleixner
2019-05-16
x86/speculation/mds: Add sysfs reporting for MDS
Thomas Gleixner
2019-05-16
x86/speculation/mds: Add mitigation control for MDS
Thomas Gleixner
2019-05-16
x86/speculation/mds: Conditionally clear CPU buffers on idle entry
Thomas Gleixner
2019-05-16
x86/speculation/mds: Clear CPU buffers on exit to user
Thomas Gleixner
2019-05-16
x86/speculation: Provide IBPB always command line options
Thomas Gleixner
2019-05-16
x86/speculation: Add seccomp Spectre v2 user space protection mode
Thomas Gleixner
2019-05-16
x86/speculation: Enable prctl mode for spectre_v2_user
Thomas Gleixner
2019-05-16
x86/speculation: Add prctl() control for indirect branch speculation
Thomas Gleixner
2019-05-16
x86/speculation: Prevent stale SPEC_CTRL msr content
Thomas Gleixner
2019-05-16
x86/speculation: Prepare arch_smt_update() for PRCTL mode
Thomas Gleixner
2019-05-16
x86/speculation: Split out TIF update
Thomas Gleixner
2019-05-16
x86/speculation: Prepare for conditional IBPB in switch_mm()
Thomas Gleixner
2019-05-16
x86/speculation: Prepare for per task indirect branch speculation control
Tim Chen
2019-05-16
x86/speculation: Add command line control for indirect branch speculation
Thomas Gleixner
2019-05-16
x86/speculation: Unify conditional spectre v2 print functions
Thomas Gleixner
2019-05-16
x86/speculataion: Mark command line parser data __initdata
Thomas Gleixner
2019-05-16
x86/speculation: Mark string arrays const correctly
Thomas Gleixner
2019-05-16
x86/speculation: Reorder the spec_v2 code
Thomas Gleixner
2019-05-16
x86/speculation: Rework SMT state change
Thomas Gleixner
2019-05-16
x86/speculation: Rename SSBD update functions
Thomas Gleixner
2019-05-16
x86/speculation: Disable STIBP when enhanced IBRS is in use
Tim Chen
2019-05-16
x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common()
Tim Chen
[next]