summaryrefslogtreecommitdiffstats
path: root/arch/x86/include/asm/nospec-branch.h
Commit message (Expand)AuthorAgeFilesLines
* bpf, x64: clean up retpoline emission slightlyDaniel Borkmann2018-05-141-15/+14
* bpf, x86_32: add eBPF JIT compiler for ia32Wang YanQing2018-05-031-3/+27
* Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2018-03-181-1/+4
|\
| * x86/speculation, objtool: Annotate indirect calls/jumps for objtool on 32-bit...Andy Whitcroft2018-03-141-1/+4
* | Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2018-02-261-20/+118
|\|
| * x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPPIngo Molnar2018-02-211-12/+14
| * x86/speculation, objtool: Annotate indirect calls/jumps for objtoolPeter Zijlstra2018-02-211-4/+23
| * x86/speculation: Use IBRS if available before calling into firmwareDavid Woodhouse2018-02-201-9/+30
| * Revert "x86/retpoline: Simplify vmexit_fill_RSB()"David Woodhouse2018-02-201-7/+63
* | bpf, x64: implement retpoline for tail callDaniel Borkmann2018-02-221-0/+37
|/
* x86/speculation: Add <asm/msr-index.h> dependencyPeter Zijlstra2018-02-151-0/+1
* Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()"David Woodhouse2018-02-131-4/+9
* x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALLDarren Kenny2018-02-021-1/+1
* x86/speculation: Simplify indirect_branch_prediction_barrier()Borislav Petkov2018-01-271-9/+4
* x86/retpoline: Simplify vmexit_fill_RSB()Borislav Petkov2018-01-271-63/+7
* x86/cpufeatures: Clean up Spectre v2 related CPUID flagsDavid Woodhouse2018-01-271-1/+1
* x86/nospec: Fix header guards namesBorislav Petkov2018-01-261-3/+3
* x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) supportDavid Woodhouse2018-01-261-0/+13
* x86/retpoline: Optimize inline assembler for vmexit_fill_RSBAndi Kleen2018-01-191-3/+4
* retpoline: Introduce start/end markers of indirect thunkMasami Hiramatsu2018-01-191-0/+3
* x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macrosTom Lendacky2018-01-151-1/+5
* x86/retpoline: Fill return stack buffer on vmexitDavid Woodhouse2018-01-121-1/+77
* x86/spectre: Add boot time option to select Spectre v2 mitigationDavid Woodhouse2018-01-121-0/+10
* x86/retpoline: Add initial retpoline supportDavid Woodhouse2018-01-121-0/+128