summaryrefslogtreecommitdiffstats
path: root/arch/x86/kernel
Commit message (Expand)AuthorAgeFilesLines
...
* x86/apic: Include the LDR when clearing out APIC registersBandan Das2019-09-061-0/+4
* x86/apic: Do not initialize LDR and DFR for bigsmpBandan Das2019-09-061-22/+2
* x86/CPU/AMD: Clear RDRAND CPUID bit on AMD family 15h/16hTom Lendacky2019-09-061-0/+66
* x86/apic: Handle missing global clockevent gracefullyThomas Gleixner2019-09-061-15/+53
* x86/vdso: Remove direct HPET access through the vDSOAndy Lutomirski2019-08-251-1/+0
* x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGSThomas Gleixner2019-08-112-29/+31
* x86/speculation: Enable Spectre v1 swapgs mitigationsJosh Poimboeuf2019-08-111-9/+106
* x86/apic: Silence -Wtype-limits compiler warningsQian Cai2019-08-061-1/+1
* x86/speculation/mds: Apply more accurate check on hypervisor platformZhenzhong Duan2019-08-041-1/+1
* x86/sysfb_efi: Add quirks for some devices with swapped width and heightHans de Goede2019-08-041-0/+46
* x86/build: Add 'set -e' to mkcapflags.sh to delete broken capflags.cMasahiro Yamada2019-08-041-0/+2
* x86/tls: Fix possible spectre-v1 in do_get_thread_area()Dianzhang Chen2019-07-211-2/+7
* x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()Dianzhang Chen2019-07-211-1/+4
* x86/speculation: Allow guests to use SSBD even if host does notAlejandro Jimenez2019-07-101-1/+10
* x86/CPU/AMD: Don't force the CPB cap when running under a hypervisorFrank van der Linden2019-06-221-2/+5
* perf/x86/intel: Allow PEBS multi-entry in watermark modeStephane Eranian2019-06-221-1/+1
* Revert "x86/build: Move _etext to actual end of .text"Greg Kroah-Hartman2019-06-111-3/+3
* x86/irq/64: Limit IST stack overflow check to #DB stackThomas Gleixner2019-06-111-5/+14
* x86/build: Move _etext to actual end of .textKees Cook2019-06-111-3/+3
* x86/speculation/mds: Revert CPU buffer clear on double fault exitAndy Lutomirski2019-06-111-8/+0
* x86/bugs: Change L1TF mitigation string to match upstreamBen Hutchings2019-05-161-1/+1
* x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf2019-05-161-1/+1
* x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-05-161-2/+4
* x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk2019-05-161-1/+2
* x86/speculation/mds: Fix commentBoris Ostrovsky2019-05-161-1/+1
* x86/speculation/mds: Add SMT warning messageJosh Poimboeuf2019-05-161-0/+8
* x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf2019-05-161-3/+2
* x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen2019-05-161-3/+3
* Documentation: Move L1TF to separate directoryThomas Gleixner2019-05-161-1/+1
* x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner2019-05-161-6/+12
* x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner2019-05-161-0/+27
* x86/speculation/mds: Add mitigation control for MDSThomas Gleixner2019-05-161-0/+70
* x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner2019-05-161-0/+3
* x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner2019-05-163-0/+15
* x86/speculation/mds: Add BUG_MSBDS_ONLYThomas Gleixner2019-05-161-8/+12
* x86/speculation/mds: Add basic bug infrastructure for MDSAndi Kleen2019-05-161-8/+15
* x86/speculation: Consolidate CPU whitelistsThomas Gleixner2019-05-161-49/+56
* x86/speculation: Provide IBPB always command line optionsThomas Gleixner2019-05-161-11/+23
* x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner2019-05-161-1/+16
* x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner2019-05-161-9/+32
* x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner2019-05-162-0/+72
* x86/speculation: Prevent stale SPEC_CTRL msr contentThomas Gleixner2019-05-162-12/+36
* x86/speculation: Prepare arch_smt_update() for PRCTL modeThomas Gleixner2019-05-161-21/+25
* x86/speculation: Split out TIF updateThomas Gleixner2019-05-161-12/+23
* x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner2019-05-161-5/+24
* x86/speculation: Avoid __switch_to_xtra() callsThomas Gleixner2019-05-161-0/+15
* x86/process: Consolidate and simplify switch_to_xtra() codeThomas Gleixner2019-05-164-17/+37
* x86/speculation: Prepare for per task indirect branch speculation controlTim Chen2019-05-162-2/+22
* x86/speculation: Add command line control for indirect branch speculationThomas Gleixner2019-05-161-17/+114
* x86/speculation: Unify conditional spectre v2 print functionsThomas Gleixner2019-05-161-13/+4