summaryrefslogtreecommitdiffstats
path: root/arch/x86/kernel/cpu/bugs.c
Commit message (Expand)AuthorAgeFilesLines
...
* x86/speculation: Fix redundant MDS mitigation messageWaiman Long2019-12-011-0/+13
* x86/speculation: Fix incorrect MDS/TAA mitigation statusWaiman Long2019-12-011-2/+15
* kvm: mmu: ITLB_MULTIHIT mitigationPaolo Bonzini2019-11-121-1/+12
* x86/bugs: Add ITLB_MULTIHIT bug infrastructureVineela Tummalapalli2019-11-121-0/+13
* x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUsJosh Poimboeuf2019-11-121-4/+0
* x86/speculation/taa: Add sysfs reporting for TSX Async AbortPawan Gupta2019-11-121-0/+23
* x86/speculation/taa: Add mitigation for TSX Async AbortPawan Gupta2019-11-121-0/+110
* x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGSThomas Gleixner2019-08-061-14/+4
* x86/speculation: Enable Spectre v1 swapgs mitigationsJosh Poimboeuf2019-08-061-9/+106
* x86/speculation/mds: Apply more accurate check on hypervisor platformZhenzhong Duan2019-07-311-1/+1
* x86/speculation: Allow guests to use SSBD even if host does notAlejandro Jimenez2019-07-031-1/+10
* x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf2019-05-141-2/+3
* x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-05-141-2/+9
* x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk2019-05-141-1/+2
* x86/speculation/mds: Fix commentBoris Ostrovsky2019-05-141-1/+1
* x86/speculation/mds: Add SMT warning messageJosh Poimboeuf2019-05-141-0/+8
* x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf2019-05-141-3/+2
* x86/speculation/mds: Add mds=full,nosmt cmdline optionJosh Poimboeuf2019-05-141-0/+10
* Documentation: Move L1TF to separate directoryThomas Gleixner2019-05-141-1/+1
* x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner2019-05-141-6/+12
* x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner2019-05-141-0/+25
* x86/speculation/mds: Add mitigation control for MDSThomas Gleixner2019-05-141-0/+70
* x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner2019-05-141-0/+3
* x86/kvm/vmx: Add MDS protection when L1D Flush is not activeThomas Gleixner2019-05-141-0/+1
* x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner2019-05-141-0/+3
* x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen2019-04-271-3/+3
* cpu/hotplug: Fix "SMT disabled by BIOS" detection for KVMJosh Poimboeuf2019-02-121-1/+1
* x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINEWANG Chao2019-01-161-1/+1
* x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=offMichal Hocko2019-01-091-1/+2
* x86/speculation: Provide IBPB always command line optionsThomas Gleixner2018-12-051-11/+23
* x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner2018-12-051-1/+16
* x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner2018-12-051-9/+32
* x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner2018-12-051-0/+67
* x86/speculation: Prepare arch_smt_update() for PRCTL modeThomas Gleixner2018-12-051-21/+25
* x86/speculation: Prevent stale SPEC_CTRL msr contentThomas Gleixner2018-12-051-11/+7
* x86/speculation: Split out TIF updateThomas Gleixner2018-12-051-12/+23
* x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner2018-12-051-5/+24
* x86/speculation: Prepare for per task indirect branch speculation controlTim Chen2018-12-051-0/+4
* x86/speculation: Add command line control for indirect branch speculationThomas Gleixner2018-12-051-17/+116
* x86/speculation: Unify conditional spectre v2 print functionsThomas Gleixner2018-12-051-13/+4
* x86/speculataion: Mark command line parser data __initdataThomas Gleixner2018-12-051-2/+2
* x86/speculation: Mark string arrays const correctlyThomas Gleixner2018-12-051-3/+3
* x86/speculation: Reorder the spec_v2 codeThomas Gleixner2018-12-051-84/+84
* x86/l1tf: Show actual SMT stateThomas Gleixner2018-12-051-2/+3
* x86/speculation: Rework SMT state changeThomas Gleixner2018-12-051-6/+5
* x86/speculation: Rename SSBD update functionsThomas Gleixner2018-12-051-2/+2
* x86/speculation: Disable STIBP when enhanced IBRS is in useTim Chen2018-12-051-0/+7
* x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common()Tim Chen2018-12-051-2/+18
* x86/speculation: Remove unnecessary ret variable in cpu_show_common()Tim Chen2018-12-051-4/+1
* x86/speculation: Clean up spectre_v2_parse_cmdline()Tim Chen2018-12-051-14/+13