summaryrefslogtreecommitdiffstats
path: root/arch/x86/kernel/cpu/bugs.c
Commit message (Expand)AuthorAgeFilesLines
* x86/speculation: Fix redundant MDS mitigation messageWaiman Long2019-11-291-0/+13
* x86/speculation: Fix incorrect MDS/TAA mitigation statusWaiman Long2019-11-291-2/+15
* kvm: mmu: ITLB_MULTIHIT mitigationPaolo Bonzini2019-11-121-1/+12
* x86/bugs: Add ITLB_MULTIHIT bug infrastructureVineela Tummalapalli2019-11-121-0/+13
* x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUsJosh Poimboeuf2019-11-121-4/+0
* x86/speculation/taa: Add sysfs reporting for TSX Async AbortPawan Gupta2019-11-121-0/+23
* x86/speculation/taa: Add mitigation for TSX Async AbortPawan Gupta2019-11-121-0/+108
* Merge branch master from git://git.kernel.org/pub/scm/linux/kernel/git/torval...Thomas Gleixner2019-07-281-1/+1
|\
| * x86/speculation/mds: Apply more accurate check on hypervisor platformZhenzhong Duan2019-07-251-1/+1
* | x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGSThomas Gleixner2019-07-281-14/+4
* | x86/speculation: Enable Spectre v1 swapgs mitigationsJosh Poimboeuf2019-07-091-9/+106
|/
* x86/speculation: Allow guests to use SSBD even if host does notAlejandro Jimenez2019-06-261-1/+10
* Merge branch 'x86-mds-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2019-05-141-4/+131
|\
| * x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf2019-04-181-2/+3
| * Merge branch 'core/speculation' of git://git.kernel.org/pub/scm/linux/kernel/...Thomas Gleixner2019-04-171-2/+9
| |\
| * | x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk2019-04-171-1/+2
| * | x86/speculation/mds: Fix commentBoris Ostrovsky2019-04-171-1/+1
| * | x86/speculation/mds: Add SMT warning messageJosh Poimboeuf2019-04-021-0/+8
| * | x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf2019-04-021-3/+2
| * | x86/speculation/mds: Add mds=full,nosmt cmdline optionJosh Poimboeuf2019-04-021-0/+10
| * | Documentation: Move L1TF to separate directoryThomas Gleixner2019-03-061-1/+1
| * | x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner2019-03-061-6/+12
| * | x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner2019-03-061-0/+25
| * | x86/speculation/mds: Add mitigation control for MDSThomas Gleixner2019-03-061-0/+70
| * | x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner2019-03-061-0/+3
| * | x86/kvm/vmx: Add MDS protection when L1D Flush is not activeThomas Gleixner2019-03-061-0/+1
| * | x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner2019-03-061-0/+3
* | | Merge branch 'core-speculation-for-linus' of git://git.kernel.org/pub/scm/lin...Linus Torvalds2019-05-061-2/+9
|\ \ \ | | |/ | |/|
| * | x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-04-171-2/+9
| |/
* | x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen2019-04-191-3/+3
* | Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2019-03-051-0/+12
|\ \ | |/ |/|
| * x86/speculation: Add PR_SPEC_DISABLE_NOEXECWaiman Long2019-01-291-0/+12
* | cpu/hotplug: Fix "SMT disabled by BIOS" detection for KVMJosh Poimboeuf2019-01-301-1/+1
|/
* x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINEWANG Chao2019-01-091-1/+1
* Merge branch 'x86-cleanups-for-linus' of git://git.kernel.org/pub/scm/linux/k...Linus Torvalds2018-12-261-0/+2
|\
| * x86/kernel: Fix more -Wmissing-prototypes warningsBorislav Petkov2018-12-081-0/+2
* | x86/speculation: Add support for STIBP always-on preferred modeThomas Lendacky2018-12-181-6/+22
* | x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=offMichal Hocko2018-12-111-1/+2
* | x86/speculation: Change misspelled STIPB to STIBPWaiman Long2018-12-061-3/+3
|/
* x86/speculation: Provide IBPB always command line optionsThomas Gleixner2018-11-281-11/+23
* x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner2018-11-281-1/+16
* x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner2018-11-281-9/+32
* x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner2018-11-281-0/+67
* x86/speculation: Prepare arch_smt_update() for PRCTL modeThomas Gleixner2018-11-281-21/+25
* x86/speculation: Prevent stale SPEC_CTRL msr contentThomas Gleixner2018-11-281-11/+7
* x86/speculation: Split out TIF updateThomas Gleixner2018-11-281-12/+23
* x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner2018-11-281-5/+24
* x86/speculation: Prepare for per task indirect branch speculation controlTim Chen2018-11-281-0/+4
* x86/speculation: Add command line control for indirect branch speculationThomas Gleixner2018-11-281-17/+116
* x86/speculation: Unify conditional spectre v2 print functionsThomas Gleixner2018-11-281-13/+4