summaryrefslogtreecommitdiffstats
path: root/arch/x86/kernel/cpu
Commit message (Expand)AuthorAgeFilesLines
* x86/CPU/AMD: Clear RDRAND CPUID bit on AMD family 15h/16hTom Lendacky2019-08-291-0/+66
* x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGSThomas Gleixner2019-08-062-29/+31
* x86/speculation: Enable Spectre v1 swapgs mitigationsJosh Poimboeuf2019-08-061-9/+106
* x86/cpufeatures: Combine word 11 and 12 into a new scattered features wordFenghua Yu2019-08-063-23/+22
* x86/cpufeatures: Carve out CQM features retrievalBorislav Petkov2019-08-061-27/+33
* x86/speculation/mds: Apply more accurate check on hypervisor platformZhenzhong Duan2019-07-311-1/+1
* x86/build: Add 'set -e' to mkcapflags.sh to delete broken capflags.cMasahiro Yamada2019-07-311-0/+2
* x86/microcode: Fix the microcode load on CPU hotplug for realThomas Gleixner2019-07-031-5/+10
* x86/speculation: Allow guests to use SSBD even if host does notAlejandro Jimenez2019-07-031-1/+10
* x86/CPU/AMD: Don't force the CPB cap when running under a hypervisorFrank van der Linden2019-06-221-2/+5
* x86/microcode, cpuhotplug: Add a microcode loader CPU hotplug callbackBorislav Petkov2019-06-191-1/+1
* x86/mce: Fix machine_check_poll() tests for error typesTony Luck2019-05-311-7/+37
* x86/microcode: Fix the ancient deprecated microcode loading methodBorislav Petkov2019-05-311-1/+2
* x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf2019-05-141-2/+3
* x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-05-141-2/+9
* x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk2019-05-141-1/+2
* x86/speculation/mds: Fix commentBoris Ostrovsky2019-05-141-1/+1
* x86/speculation/mds: Add SMT warning messageJosh Poimboeuf2019-05-141-0/+8
* x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf2019-05-141-3/+2
* x86/speculation/mds: Add mds=full,nosmt cmdline optionJosh Poimboeuf2019-05-141-0/+10
* Documentation: Move L1TF to separate directoryThomas Gleixner2019-05-141-1/+1
* x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner2019-05-141-6/+12
* x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner2019-05-141-0/+26
* x86/speculation/mds: Add mitigation control for MDSThomas Gleixner2019-05-141-0/+70
* x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner2019-05-141-0/+3
* x86/kvm/vmx: Add MDS protection when L1D Flush is not activeThomas Gleixner2019-05-141-0/+1
* x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner2019-05-141-0/+3
* x86/speculation/mds: Add BUG_MSBDS_ONLYThomas Gleixner2019-05-141-8/+12
* x86/speculation/mds: Add basic bug infrastructure for MDSAndi Kleen2019-05-141-8/+15
* x86/speculation: Consolidate CPU whitelistsThomas Gleixner2019-05-141-49/+56
* x86/cpu: Sanitize FAM6_ATOM namingPeter Zijlstra2019-05-141-14/+14
* x86/speculation: Simplify the CPU bug detection logicDominik Brodowski2019-05-141-15/+7
* x86/mce: Improve error message when kernel cannot recover, p2Tony Luck2019-05-081-0/+5
* x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen2019-04-271-3/+3
* x86/cpu/cyrix: Use correct macros for Cyrix calls on Geode processorsMatthew Whitehead2019-04-201-7/+7
* x86/microcode/amd: Don't falsely trick the late loading mechanismThomas Lendacky2019-03-131-1/+1
* x86/CPU/AMD: Set the CPB bit unconditionally on F17hJiaxun Yang2019-03-131-5/+3
* x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out()Tony Luck2019-02-121-0/+1
* cpu/hotplug: Fix "SMT disabled by BIOS" detection for KVMJosh Poimboeuf2019-02-121-1/+1
* x86/mce: Fix -Wmissing-prototypes warningsBorislav Petkov2019-01-263-4/+7
* x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINEWANG Chao2019-01-161-1/+1
* x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=offMichal Hocko2019-01-091-1/+2
* x86/mtrr: Don't copy uninitialized gentry fields back to userspaceColin Ian King2018-12-291-0/+2
* x86/MCE/AMD: Fix the thresholding machinery initialization orderBorislav Petkov2018-12-051-13/+6
* x86/speculation: Provide IBPB always command line optionsThomas Gleixner2018-12-051-11/+23
* x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner2018-12-051-1/+16
* x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner2018-12-051-9/+32
* x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner2018-12-051-0/+67
* x86/speculation: Prepare arch_smt_update() for PRCTL modeThomas Gleixner2018-12-051-21/+25
* x86/speculation: Prevent stale SPEC_CTRL msr contentThomas Gleixner2018-12-051-11/+7