summaryrefslogtreecommitdiffstats
path: root/arch/x86
Commit message (Expand)AuthorAgeFilesLines
...
* x86/bugs: Add ITLB_MULTIHIT bug infrastructureVineela Tummalapalli2019-11-154-28/+54
* x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUsJosh Poimboeuf2019-11-151-4/+0
* x86/tsx: Add config options to set tsx=on|off|autoMichal Hocko2019-11-152-6/+61
* x86/tsx: Add "auto" option to the tsx= cmdline parameterPawan Gupta2019-11-151-1/+6
* kvm/x86: Export MDS_NO=0 to guests when TSX is enabledPawan Gupta2019-11-151-0/+19
* x86/speculation/taa: Add sysfs reporting for TSX Async AbortPawan Gupta2019-11-151-0/+23
* x86/speculation/taa: Add mitigation for TSX Async AbortPawan Gupta2019-11-156-2/+132
* x86/cpu: Add a "tsx=" cmdline option with TSX disabled by defaultPawan Gupta2019-11-155-1/+149
* x86/cpu: Add a helper function x86_read_arch_cap_msr()Pawan Gupta2019-11-152-4/+13
* x86/msr: Add the IA32_TSX_CTRL MSRPawan Gupta2019-11-151-0/+5
* KVM: x86: use Intel speculation bugs and features as derived in generic x86 codePaolo Bonzini2019-11-152-0/+15
* KVM: Introduce kvm_get_arch_capabilities()Ben Hutchings2019-11-152-2/+12
* KVM: x86/vPMU: refine kvm_pmu err msg when event creation failedLike Xu2019-10-311-2/+2
* x86/tls: Fix possible spectre-v1 in do_get_thread_area()Dianzhang Chen2019-10-311-2/+7
* x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()Dianzhang Chen2019-10-311-1/+3
* x86/speculation: Allow guests to use SSBD even if host does notAlejandro Jimenez2019-10-051-1/+10
* x86/apic: Fix integer overflow on 10 bit left shift of cpu_khzColin Ian King2019-10-051-1/+2
* x86/speculation/mds: Revert CPU buffer clear on double fault exitAndy Lutomirski2019-09-231-8/+0
* x86/uaccess: Dont leak the AC flag into __put_user() argument evaluationPeter Zijlstra2019-09-231-3/+4
* crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest()Eric Biggers2019-09-231-8/+5
* x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGSThomas Gleixner2019-08-133-29/+32
* x86/entry/64: Use JMP instead of JMPQJosh Poimboeuf2019-08-131-1/+1
* x86/speculation: Enable Spectre v1 swapgs mitigationsJosh Poimboeuf2019-08-131-9/+106
* x86/speculation: Prepare entry code for Spectre v1 swapgs mitigationsJosh Poimboeuf2019-08-133-3/+49
* x86/entry/64: Fix context tracking state warning when load_gs_index failsWanpeng Li2019-08-131-2/+2
* x86/entry/64: Really create an error-entry-from-usermode code pathAndy Lutomirski2019-08-131-12/+16
* x86/asm/entry/64: Disentangle error_entry/exit gsbase/ebx/usermode codeAndy Lutomirski2019-08-131-5/+23
* x86: cpufeatures: Renumber feature word 7Ben Hutchings2019-08-131-18/+21
* x86/kprobes: Avoid kretprobe recursion bugMasami Hiramatsu2019-08-131-2/+20
* x86/kprobes: Verify stack frame on kretprobeMasami Hiramatsu2019-08-131-0/+26
* kvm: mmu: Fix overflow on kvm mmu page limit calculationBen Gardon2019-08-134-16/+15
* x86/speculation: Prevent deadlock on ssb_state::lockThomas Gleixner2019-08-131-2/+6
* xen: Prevent buffer overflow in privcmd ioctlDan Carpenter2019-08-131-0/+3
* KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hostsSean Christopherson2019-08-133-15/+15
* kvm: x86: IA32_ARCH_CAPABILITIES is always supportedJim Mattson2019-08-131-0/+5
* KVM: x86/mmu: Do not cache MMIO accesses while memslots are in fluxSean Christopherson2019-07-091-1/+6
* x86/bugs: Change L1TF mitigation string to match upstreamBen Hutchings2019-05-221-1/+1
* x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen2019-05-221-3/+3
* x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf2019-05-221-1/+1
* x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-05-222-3/+7
* x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk2019-05-221-1/+2
* x86/speculation/mds: Fix commentBoris Ostrovsky2019-05-221-1/+1
* x86/speculation/mds: Add SMT warning messageJosh Poimboeuf2019-05-221-0/+8
* x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf2019-05-221-3/+2
* Documentation: Move L1TF to separate directoryThomas Gleixner2019-05-221-1/+1
* x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner2019-05-222-6/+13
* x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner2019-05-221-0/+27
* x86/speculation/mds: Add mitigation control for MDSThomas Gleixner2019-05-222-0/+76
* x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner2019-05-224-0/+25
* x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner2019-05-227-1/+57