summaryrefslogtreecommitdiffstats
path: root/arch/x86/kernel/cpu/common.c
Commit message (Expand)AuthorAgeFilesLines
* x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigationMark Gross2020-06-111-0/+31
* x86/cpu: Add 'table' argument to cpu_matches()Mark Gross2020-06-111-10/+13
* x86/cpu: Rename cpu_data.x86_mask to cpu_data.x86_steppingJia Zhang2020-06-111-4/+4
* x86/bugs: Add ITLB_MULTIHIT bug infrastructureVineela Tummalapalli2019-11-151-28/+33
* x86/speculation/taa: Add mitigation for TSX Async AbortPawan Gupta2019-11-151-0/+15
* x86/cpu: Add a "tsx=" cmdline option with TSX disabled by defaultPawan Gupta2019-11-151-0/+2
* x86/cpu: Add a helper function x86_read_arch_cap_msr()Pawan Gupta2019-11-151-4/+11
* x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGSThomas Gleixner2019-08-131-15/+27
* x86/speculation/mds: Add BUG_MSBDS_ONLYThomas Gleixner2019-05-221-8/+12
* x86/speculation/mds: Add basic bug infrastructure for MDSAndi Kleen2019-05-221-8/+15
* x86/speculation: Consolidate CPU whitelistsThomas Gleixner2019-05-221-49/+56
* x86/cpu: Sanitize FAM6_ATOM namingPeter Zijlstra2019-05-221-14/+14
* x86/speculation: Simplify the CPU bug detection logicDominik Brodowski2019-05-221-15/+7
* x86/speculation: Support Enhanced IBRS on future CPUsSai Praneeth2019-05-221-0/+3
* x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+Andi Kleen2018-12-161-0/+1
* x86/bugs: Add AMD's SPEC_CTRL MSR usageKonrad Rzeszutek Wilk2018-11-201-0/+6
* x86/bugs: Add AMD's variant of SSB_NOKonrad Rzeszutek Wilk2018-11-201-1/+2
* arch/x86/kernel/cpu/common.c: fix unused symbol warningAndrew Morton2018-11-201-1/+3
* x86/speculation/l1tf: Add sysfs reporting for l1tfAndi Kleen2018-10-031-0/+20
* x86/bugs: Rename SSBD_NO to SSB_NOKonrad Rzeszutek Wilk2018-10-031-1/+1
* KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBDTom Lendacky2018-10-031-1/+2
* x86/cpufeatures: Disentangle SSBD enumerationThomas Gleixner2018-10-031-0/+3
* x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRSThomas Gleixner2018-10-031-2/+7
* x86/speculation: Use synthetic bits for IBRS/IBPB/STIBPBorislav Petkov2018-10-031-4/+10
* x86/bugs: Rename _RDS to _SSBDKonrad Rzeszutek Wilk2018-10-031-1/+1
* x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requestedKonrad Rzeszutek Wilk2018-10-031-0/+4
* x86/bugs/intel: Set proper CPU features and setup RDSKonrad Rzeszutek Wilk2018-10-031-4/+6
* x86/bugs: Expose /sys/../spec_store_bypassKonrad Rzeszutek Wilk2018-10-031-0/+23
* x86/bugs: Concentrate bug detection into a separate functionKonrad Rzeszutek Wilk2018-10-031-10/+11
* x86/fpu: Fix the 'nofxsr' boot parameter to also clear X86_FEATURE_FXSR_OPTIngo Molnar2018-09-251-8/+9
* x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on IntelDavid Woodhouse2018-06-161-0/+21
* x86/pti: Mark constant arrays as __initconstArnd Bergmann2018-06-161-2/+2
* x86/pti: Do not enable PTI on CPUs which are not vulnerable to MeltdownDavid Woodhouse2018-06-161-5/+43
* x86/cpufeatures: Add AMD feature bits for Speculation ControlDavid Woodhouse2018-06-161-1/+4
* x86/cpufeatures: Add Intel feature bits for Speculation ControlDavid Woodhouse2018-06-161-0/+1
* x86/cpu: Change type of x86_cache_size variable to unsigned intGustavo A. R. Silva2018-03-191-1/+1
* x86/spectre: Add boot time option to select Spectre v2 mitigationDavid Woodhouse2018-03-191-4/+0
* x86/retpoline: Add initial retpoline supportDavid Woodhouse2018-03-191-0/+4
* x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]David Woodhouse2018-03-191-0/+3
* x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWNThomas Gleixner2018-03-191-1/+1
* x86/cpu, x86/pti: Do not enable PTI on AMD processorsTom Lendacky2018-03-191-2/+2
* x86/cpufeatures: Add X86_BUG_CPU_INSECUREThomas Gleixner2018-03-191-0/+3
* x86/cpufeatures: Make CPU bugs stickyThomas Gleixner2018-03-191-3/+3
* x86/cpu: Factor out application of forced CPU capsAndy Lutomirski2018-03-191-8/+12
* kaiser: x86: Fix NMI handlingJiri Kosina2018-01-091-1/+1
* x86/kaiser: Rename and simplify X86_FEATURE_KAISER handlingBorislav Petkov2018-01-091-18/+0
* kaiser: add "nokaiser" boot option, using ALTERNATIVEHugh Dickins2018-01-091-1/+28
* KAISER: Kernel Address IsolationRichard Fellner2018-01-091-2/+16
* x86/mm: Enable CR4.PCIDE on supported systemsAndy Lutomirski2018-01-091-0/+22
* x86/mm: Add the 'nopcid' boot option to turn off PCIDAndy Lutomirski2018-01-091-0/+18