summaryrefslogtreecommitdiffstats
path: root/arch/x86/include/asm/nospec-branch.h
Commit message (Expand)AuthorAgeFilesLines
* x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner2019-05-141-0/+12
* x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner2019-05-141-0/+13
* x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner2019-05-141-0/+25
* x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner2018-12-051-0/+1
* x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner2018-12-051-0/+1
* x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner2018-12-051-0/+2
* x86/speculation: Add command line control for indirect branch speculationThomas Gleixner2018-12-051-0/+10
* x86/retpoline: Remove minimal retpoline supportZhenzhong Duan2018-12-051-3/+0
* x86/retpoline: Make CONFIG_RETPOLINE depend on compiler supportZhenzhong Duan2018-12-051-4/+6
* x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variantZhenzhong Duan2018-12-051-4/+13
* x86/speculation: Support Enhanced IBRS on future CPUsSai Praneeth2018-11-131-0/+1
* x86/bugs: Remove x86_spec_ctrl_set()Thomas Gleixner2018-05-221-2/+0
* x86/bugs: Expose x86_spec_ctrl_base directlyThomas Gleixner2018-05-221-11/+5
* x86/cpu: Make alternative_msr_write work for 32-bit codeJim Mattson2018-05-221-2/+2
* x86/speculation: Make "seccomp" the default mode for Speculative Store BypassKees Cook2018-05-221-0/+1
* x86/speculation: Add prctl for Speculative Store Bypass mitigationThomas Gleixner2018-05-221-0/+1
* x86/speculation: Create spec-ctrl.h to avoid include hellThomas Gleixner2018-05-221-14/+0
* x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requestedKonrad Rzeszutek Wilk2018-05-221-0/+4
* x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigationKonrad Rzeszutek Wilk2018-05-221-0/+6
* x86/bugs, KVM: Support the combination of guest and host IBRSKonrad Rzeszutek Wilk2018-05-221-0/+10
* x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bitsKonrad Rzeszutek Wilk2018-05-221-4/+20
* x86/nospec: Simplify alternative_msr_write()Linus Torvalds2018-05-221-9/+10
* x86/speculation, objtool: Annotate indirect calls/jumps for objtool on 32-bit...Andy Whitcroft2018-03-211-1/+4
* x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPPIngo Molnar2018-03-151-12/+14
* x86/speculation, objtool: Annotate indirect calls/jumps for objtoolPeter Zijlstra2018-03-151-4/+23
* x86/speculation: Use IBRS if available before calling into firmwareDavid Woodhouse2018-03-151-9/+30
* Revert "x86/retpoline: Simplify vmexit_fill_RSB()"David Woodhouse2018-03-151-7/+63
* bpf, x64: implement retpoline for tail callDaniel Borkmann2018-03-111-0/+37
* x86/speculation: Add <asm/msr-index.h> dependencyPeter Zijlstra2018-02-221-0/+1
* Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()"David Woodhouse2018-02-221-4/+9
* x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALLDarren Kenny2018-02-071-1/+1
* x86/speculation: Simplify indirect_branch_prediction_barrier()Borislav Petkov2018-02-071-9/+4
* x86/retpoline: Simplify vmexit_fill_RSB()Borislav Petkov2018-02-071-63/+7
* x86/cpufeatures: Clean up Spectre v2 related CPUID flagsDavid Woodhouse2018-02-071-1/+1
* x86/nospec: Fix header guards namesBorislav Petkov2018-02-071-3/+3
* x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) supportDavid Woodhouse2018-02-071-0/+13
* x86/retpoline: Optimize inline assembler for vmexit_fill_RSBAndi Kleen2018-01-231-3/+4
* retpoline: Introduce start/end markers of indirect thunkMasami Hiramatsu2018-01-231-0/+3
* x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macrosTom Lendacky2018-01-231-1/+5
* x86/retpoline: Fill return stack buffer on vmexitDavid Woodhouse2018-01-171-1/+77
* x86/spectre: Add boot time option to select Spectre v2 mitigationDavid Woodhouse2018-01-171-0/+10
* x86/retpoline: Add initial retpoline supportDavid Woodhouse2018-01-171-0/+128