summaryrefslogtreecommitdiffstats
path: root/Documentation/admin-guide
Commit message (Expand)AuthorAgeFilesLines
* USB: UAS: introduce a quirk to set no_write_sameOliver Neukum2020-12-291-0/+1
* powerpc/64s: flush L1D after user accessesNicholas Piggin2020-11-221-0/+4
* powerpc/64s: flush L1D on kernel entryNicholas Piggin2020-11-221-0/+3
* xen/events: defer eoi in case of excessive number of eventsJuergen Gross2020-11-181-0/+8
* x86/fpu: Allow multiple bits in clearcpuid= parameterArvind Sankar2020-10-291-1/+1
* x86/speculation: Add Ivy Bridge to affected listJosh Poimboeuf2020-06-111-3/+4
* x86/speculation: Add SRBDS vulnerability and mitigation documentationMark Gross2020-06-112-0/+149
* x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigationMark Gross2020-06-111-0/+20
* ACPI: watchdog: Allow disabling WDAT at bootJean Delvare2020-03-201-0/+4
* Documentation: Document arm64 kpti controlJeremy Linton2020-01-291-0/+6
* USB: documentation: flags on usb-storage versus UASOliver Neukum2019-12-171-10/+12
* x86/speculation: Fix incorrect MDS/TAA mitigation statusWaiman Long2019-12-013-3/+20
* kvm: x86: mmu: Recovery of shattered NX large pagesJunaid Shahid2019-11-121-0/+6
* kvm: mmu: ITLB_MULTIHIT mitigationPaolo Bonzini2019-11-121-0/+19
* Documentation: Add ITLB_MULTIHIT documentationGomez Iglesias, Antonio2019-11-122-0/+164
* x86/speculation/taa: Add documentation for TSX Async AbortPawan Gupta2019-11-123-0/+315
* x86/tsx: Add "auto" option to the tsx= cmdline parameterPawan Gupta2019-11-121-0/+3
* x86/cpu: Add a "tsx=" cmdline option with TSX disabled by defaultPawan Gupta2019-11-121-0/+26
* x86/xen: Return from panic notifierBoris Ostrovsky2019-11-061-0/+4
* arm64/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-10-291-3/+5
* arm64: Provide a command line to disable spectre_v2 mitigationJeremy Linton2019-10-291-4/+4
* x86/CPU/AMD: Clear RDRAND CPUID bit on AMD family 15h/16hTom Lendacky2019-08-291-0/+7
* Documentation: Add swapgs description to the Spectre v1 documentationJosh Poimboeuf2019-08-061-8/+80
* x86/speculation: Enable Spectre v1 swapgs mitigationsJosh Poimboeuf2019-08-061-3/+4
* Documentation: Add section about CPU vulnerabilities for SpectreTim Chen2019-07-212-0/+698
* Documentation: Correct the possible MDS sysfs valuesTyler Hicks2019-05-141-16/+13
* x86/mds: Add MDSUM variant to the MDS documentationspeck for Pawan Gupta2019-05-141-2/+3
* x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf2019-05-141-0/+2
* s390/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-05-141-2/+3
* powerpc/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-05-141-4/+5
* x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-05-141-5/+11
* cpu/speculation: Add 'mitigations=' cmdline optionJosh Poimboeuf2019-05-141-0/+24
* x86/speculation/mds: Add mds=full,nosmt cmdline optionJosh Poimboeuf2019-05-142-2/+7
* Documentation: Add MDS vulnerability documentationThomas Gleixner2019-05-144-0/+311
* Documentation: Move L1TF to separate directoryThomas Gleixner2019-05-144-5/+15
* x86/speculation/mds: Add mitigation control for MDSThomas Gleixner2019-05-141-0/+22
* Documentation/l1tf: Fix small spelling typoSalvatore Bonaccorso2019-05-141-1/+1
* Documentation: Add nospectre_v1 parameterDiana Craciun2019-05-021-0/+4
* powerpc/fsl: Add FSL_PPC_BOOK3E as supported arch for nospectre_v2 boot argDiana Craciun2019-05-021-1/+1
* x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=offMichal Hocko2019-01-092-1/+8
* x86/speculation: Provide IBPB always command line optionsThomas Gleixner2018-12-051-0/+12
* x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner2018-12-051-1/+8
* x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner2018-12-051-1/+6
* x86/speculation: Add command line control for indirect branch speculationThomas Gleixner2018-12-051-2/+30
* x86/earlyprintk: Add a force option for pciserial deviceFeng Tang2018-11-271-1/+5
* KVM: VMX: Tell the nested hypervisor to skip L1D flush on vmentryPaolo Bonzini2018-08-151-0/+21
* Documentation/l1tf: Remove Yonah processors from not vulnerable listThomas Gleixner2018-08-151-2/+0
* Documentation/l1tf: Fix typosTony Luck2018-08-151-7/+7
* Documentation: Add section about CPU vulnerabilitiesThomas Gleixner2018-08-152-0/+600
* x86/bugs, kvm: Introduce boot-time control of L1TF mitigationsJiri Kosina2018-08-151-6/+62