Jiri Kosina
|
6cb2b08ff9
x86/pti: Don't report XenPV as vulnerable
|
7 yıl önce |
Konrad Rzeszutek Wilk
|
108fab4b5c
x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features
|
7 yıl önce |
Konrad Rzeszutek Wilk
|
6ac2f49edb
x86/bugs: Add AMD's SPEC_CTRL MSR usage
|
7 yıl önce |
Thomas Gleixner
|
47c61b3955
x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
|
7 yıl önce |
Thomas Gleixner
|
be6fcb5478
x86/bugs: Rework spec_ctrl base and mask logic
|
7 yıl önce |
Thomas Gleixner
|
4b59bdb569
x86/bugs: Remove x86_spec_ctrl_set()
|
7 yıl önce |
Thomas Gleixner
|
fa8ac49882
x86/bugs: Expose x86_spec_ctrl_base directly
|
7 yıl önce |
Borislav Petkov
|
cc69b34989
x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
|
7 yıl önce |
Thomas Gleixner
|
0270be3e34
x86/speculation: Rework speculative_store_bypass_update()
|
7 yıl önce |
Tom Lendacky
|
11fb068349
x86/speculation: Add virtualized speculative store bypass disable support
|
7 yıl önce |
Thomas Gleixner
|
ccbcd26744
x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
|
7 yıl önce |
Thomas Gleixner
|
52817587e7
x86/cpufeatures: Disentangle SSBD enumeration
|
7 yıl önce |
Thomas Gleixner
|
7eb8956a7f
x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
|
7 yıl önce |
Konrad Rzeszutek Wilk
|
ffed645e3b
x86/bugs: Fix the parameters alignment and missing void
|
7 yıl önce |
Jiri Kosina
|
7bb4d366cb
x86/bugs: Make cpu_show_common() static
|
7 yıl önce |
Jiri Kosina
|
d66d8ff3d2
x86/bugs: Fix __ssb_select_mitigation() return type
|
7 yıl önce |
Konrad Rzeszutek Wilk
|
9f65fb2937
x86/bugs: Rename _RDS to _SSBD
|
7 yıl önce |
Kees Cook
|
f21b53b20c
x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
|
7 yıl önce |
Thomas Gleixner
|
8bf37d8c06
seccomp: Move speculation migitation control to arch code
|
7 yıl önce |
Thomas Gleixner
|
356e4bfff2
prctl: Add force disable speculation
|
7 yıl önce |
Kees Cook
|
f9544b2b07
x86/bugs: Make boot modes __ro_after_init
|
7 yıl önce |
Kees Cook
|
7bbf1373e2
nospec: Allow getting/setting on non-current task
|
7 yıl önce |
Thomas Gleixner
|
a73ec77ee1
x86/speculation: Add prctl for Speculative Store Bypass mitigation
|
7 yıl önce |
Thomas Gleixner
|
885f82bfbc
x86/process: Allow runtime control of Speculative Store Bypass
|
7 yıl önce |
Thomas Gleixner
|
28a2775217
x86/speculation: Create spec-ctrl.h to avoid include hell
|
7 yıl önce |
Konrad Rzeszutek Wilk
|
764f3c2158
x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
|
7 yıl önce |
Konrad Rzeszutek Wilk
|
1115a859f3
x86/bugs: Whitelist allowed SPEC_CTRL MSR values
|
7 yıl önce |
Konrad Rzeszutek Wilk
|
772439717d
x86/bugs/intel: Set proper CPU features and setup RDS
|
7 yıl önce |
Konrad Rzeszutek Wilk
|
24f7fc83b9
x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
|
7 yıl önce |
Konrad Rzeszutek Wilk
|
c456442cd3
x86/bugs: Expose /sys/../spec_store_bypass
|
7 yıl önce |