summaryrefslogtreecommitdiffstats
path: root/arch/x86/kernel/cpu/bugs.c
Commit message (Expand)AuthorAgeFilesLines
* x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3Pawan Gupta2022-12-081-7/+14
* x86/speculation: Add RSB VM Exit protectionsDaniel Sneddon2022-10-071-23/+63
* x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS partsPawan Gupta2022-10-071-0/+3
* x86/speculation: Disable RRSBA behaviorPawan Gupta2022-10-071-0/+26
* x86/speculation: Fill RSB on vmexit for IBRSJosh Poimboeuf2022-10-071-5/+58
* KVM: VMX: Prevent guest RSB poisoning attacks with eIBRSJosh Poimboeuf2022-10-071-0/+4
* x86/speculation: Remove x86_spec_ctrl_maskJosh Poimboeuf2022-10-071-30/+1
* x86/speculation: Use cached host SPEC_CTRL value for guest entry/exitJosh Poimboeuf2022-10-071-11/+1
* x86/speculation: Fix SPEC_CTRL write on SMT state changeJosh Poimboeuf2022-10-071-1/+2
* intel_idle: Disable IBRS during long idlePeter Zijlstra2022-10-071-0/+6
* x86/bugs: Report Intel retbleed vulnerabilityPeter Zijlstra2022-10-071-5/+31
* x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mit...Peter Zijlstra2022-10-071-8/+17
* x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRSPawan Gupta2022-10-071-14/+52
* x86/bugs: Optimize SPEC_CTRL MSR writesPeter Zijlstra2022-10-071-6/+12
* x86/bugs: Keep a per-CPU IA32_SPEC_CTRL valuePeter Zijlstra2022-10-071-5/+23
* x86/bugs: Add AMD retbleed= boot parameterAlexandre Chartre2022-10-071-1/+73
* x86/bugs: Report AMD retbleed vulnerabilityAlexandre Chartre2022-10-071-0/+13
* Revert "x86/speculation: Add RSB VM Exit protections"Thadeu Lima de Souza Cascardo2022-10-071-60/+1
* x86/bugs: Add "unknown" reporting for MMIO Stale DataPawan Gupta2022-09-051-2/+12
* x86/speculation: Add RSB VM Exit protectionsDaniel Sneddon2022-08-111-1/+60
* x86/speculation/mmio: Print SMT warningJosh Poimboeuf2022-06-161-0/+11
* x86/speculation/srbds: Update SRBDS mitigation selectionPawan Gupta2022-06-161-3/+5
* x86/speculation/mmio: Add sysfs reporting for Processor MMIO Stale DataPawan Gupta2022-06-161-0/+22
* x86/speculation/mmio: Enable CPU Fill buffer clearing on idlePawan Gupta2022-06-161-2/+14
* x86/bugs: Group MDS, TAA & Processor MMIO Stale Data mitigationsPawan Gupta2022-06-161-10/+16
* x86/speculation/mmio: Add mitigation for Processor MMIO Stale DataPawan Gupta2022-06-161-4/+107
* x86/speculation: Add a common function for MD_CLEAR mitigation updatePawan Gupta2022-06-161-26/+33
* x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMTJosh Poimboeuf2022-03-111-2/+25
* x86/speculation: Warn about Spectre v2 LFENCE mitigationJosh Poimboeuf2022-03-111-0/+5
* x86/speculation: Use generic retpoline by default on AMDKim Phillips2022-03-111-9/+0
* x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation re...Josh Poimboeuf2022-03-111-6/+29
* x86/speculation: Add eIBRS + Retpoline optionsPeter Zijlstra2022-03-111-37/+96
* x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCEPeter Zijlstra (Intel)2022-03-111-11/+18
* x86,bugs: Unconditionally allow spectre_v2=retpoline,amdPeter Zijlstra2022-03-111-7/+0
* x86/speculation: Merge one test in spectre_v2_user_select_mitigation()Borislav Petkov2022-03-111-9/+4
* x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpbAnand K Mistry2020-12-021-2/+2
* x86/speculation: Allow IBPB to be conditionally enabled on CPUs with always-o...Anand K Mistry2020-11-181-19/+33
* x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches.Anthony Steinhauser2020-06-171-2/+5
* x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS.Anthony Steinhauser2020-06-171-37/+50
* x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigationMark Gross2020-06-101-0/+106
* x86/speculation: Fix redundant MDS mitigation messageWaiman Long2019-11-291-0/+13
* x86/speculation: Fix incorrect MDS/TAA mitigation statusWaiman Long2019-11-291-2/+15
* x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUsJosh Poimboeuf2019-11-071-4/+0
* kvm: mmu: ITLB_MULTIHIT mitigationPaolo Bonzini2019-11-041-1/+12
* x86/bugs: Add ITLB_MULTIHIT bug infrastructureVineela Tummalapalli2019-11-041-0/+13
* x86/speculation/taa: Add sysfs reporting for TSX Async AbortPawan Gupta2019-10-281-0/+23
* x86/speculation/taa: Add mitigation for TSX Async AbortPawan Gupta2019-10-281-0/+108
* Merge branch 'x86-apic-for-linus' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2019-09-171-1/+1
|\
| * x86/cpu: Move arch_smt_update() to a neutral placeThomas Gleixner2019-07-251-1/+1
* | x86/intel: Aggregate big core graphics namingPeter Zijlstra2019-08-281-2/+2