summaryrefslogtreecommitdiffstats
path: root/arch/x86
Commit message (Expand)AuthorAgeFilesLines
* x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf2019-05-221-1/+1
* x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-05-222-3/+7
* x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk2019-05-221-1/+2
* x86/speculation/mds: Fix commentBoris Ostrovsky2019-05-221-1/+1
* x86/speculation/mds: Add SMT warning messageJosh Poimboeuf2019-05-221-0/+8
* x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf2019-05-221-3/+2
* Documentation: Move L1TF to separate directoryThomas Gleixner2019-05-221-1/+1
* x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner2019-05-222-6/+13
* x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner2019-05-221-0/+27
* x86/speculation/mds: Add mitigation control for MDSThomas Gleixner2019-05-222-0/+76
* x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner2019-05-224-0/+25
* x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner2019-05-227-1/+57
* x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner2019-05-221-0/+25
* x86/kvm: Expose X86_FEATURE_MD_CLEAR to guestsAndi Kleen2019-05-221-1/+1
* x86/speculation/mds: Add BUG_MSBDS_ONLYThomas Gleixner2019-05-222-8/+13
* x86/speculation/mds: Add basic bug infrastructure for MDSAndi Kleen2019-05-223-8/+22
* x86/speculation: Consolidate CPU whitelistsThomas Gleixner2019-05-221-49/+56
* x86/msr-index: Cleanup bit definesThomas Gleixner2019-05-221-7/+7
* kvm: x86: Report STIBP on GET_SUPPORTED_CPUIDEduardo Habkost2019-05-221-2/+3
* x86/speculation: Provide IBPB always command line optionsThomas Gleixner2019-05-221-11/+23
* x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner2019-05-222-1/+17
* x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner2019-05-221-9/+32
* x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner2019-05-223-0/+73
* x86/speculation: Prevent stale SPEC_CTRL msr contentThomas Gleixner2019-05-224-20/+43
* x86/speculation: Prepare arch_smt_update() for PRCTL modeThomas Gleixner2019-05-221-21/+25
* x86/speculation: Split out TIF updateThomas Gleixner2019-05-221-12/+23
* x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner2019-05-224-22/+117
* x86/speculation: Avoid __switch_to_xtra() callsThomas Gleixner2019-05-222-2/+26
* x86/process: Consolidate and simplify switch_to_xtra() codeThomas Gleixner2019-05-225-20/+37
* x86/speculation: Prepare for per task indirect branch speculation controlTim Chen2019-05-225-7/+44
* x86/speculation: Add command line control for indirect branch speculationThomas Gleixner2019-05-222-17/+124
* x86/speculation: Unify conditional spectre v2 print functionsThomas Gleixner2019-05-221-13/+4
* x86/speculataion: Mark command line parser data __initdataThomas Gleixner2019-05-221-2/+2
* x86/speculation: Mark string arrays const correctlyThomas Gleixner2019-05-221-2/+2
* x86/speculation: Reorder the spec_v2 codeThomas Gleixner2019-05-221-87/+87
* x86/speculation: Rework SMT state changeThomas Gleixner2019-05-221-6/+5
* x86/Kconfig: Select SCHED_SMT if SMP enabledThomas Gleixner2019-05-221-7/+1
* x86/speculation: Reorganize speculation control MSRs updateTim Chen2019-05-221-17/+29
* x86/speculation: Rename SSBD update functionsThomas Gleixner2019-05-223-11/+11
* x86/speculation: Disable STIBP when enhanced IBRS is in useTim Chen2019-05-221-0/+7
* x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common()Tim Chen2019-05-221-2/+18
* x86/speculation: Remove unnecessary ret variable in cpu_show_common()Tim Chen2019-05-221-4/+1
* x86/speculation: Clean up spectre_v2_parse_cmdline()Tim Chen2019-05-221-14/+13
* x86/speculation: Update the TIF_SSBD commentTim Chen2019-05-221-1/+1
* x86/speculation: Propagate information about RSB filling mitigation to sysfsJiri Kosina2019-05-221-1/+2
* x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigationJiri Kosina2019-05-221-5/+50
* x86/speculation: Apply IBPB more strictly to avoid cross-process data leakJiri Kosina2019-05-221-9/+19
* x86/cpu: Sanitize FAM6_ATOM namingPeter Zijlstra2019-05-222-27/+31
* x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigationJiang Biao2019-05-221-1/+0
* x86/speculation: Simplify the CPU bug detection logicDominik Brodowski2019-05-221-15/+7