summaryrefslogtreecommitdiffstats
path: root/arch/x86/include/asm/nospec-branch.h
Commit message (Expand)AuthorAgeFilesLines
* x86/amd: Use IBPB for firmware callsPeter Zijlstra2022-07-181-0/+2
* x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_currentNathan Chancellor2022-07-141-1/+2
* x86/retbleed: Add fine grained Kconfig knobsPeter Zijlstra2022-06-291-2/+8
* KVM: VMX: Prevent guest RSB poisoning attacks with eIBRSJosh Poimboeuf2022-06-271-0/+1
* x86/speculation: Fix firmware entry SPEC_CTRL handlingJosh Poimboeuf2022-06-271-6/+4
* x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=nJosh Poimboeuf2022-06-271-2/+0
* objtool: Add entry UNRET validationPeter Zijlstra2022-06-271-0/+12
* x86/bugs: Add retbleed=ibpbPeter Zijlstra2022-06-271-2/+6
* objtool: Update Retpoline validationPeter Zijlstra2022-06-271-0/+6
* intel_idle: Disable IBRS during long idlePeter Zijlstra2022-06-271-0/+1
* x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRSPawan Gupta2022-06-271-0/+1
* x86/bugs: Optimize SPEC_CTRL MSR writesPeter Zijlstra2022-06-271-1/+1
* x86/bugs: Keep a per-CPU IA32_SPEC_CTRL valuePeter Zijlstra2022-06-271-0/+1
* x86: Add magic AMD return-thunkPeter Zijlstra2022-06-271-0/+17
* x86/retpoline: Use -mfunction-returnPeter Zijlstra2022-06-271-0/+2
* x86/retpoline: Cleanup some #ifdeferyPeter Zijlstra2022-06-271-4/+3
* x86/speculation/mmio: Add mitigation for Processor MMIO Stale DataPawan Gupta2022-05-211-0/+2
* x86/speculation: Add eIBRS + Retpoline optionsPeter Zijlstra2022-02-211-1/+3
* x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCEPeter Zijlstra (Intel)2022-02-211-6/+6
* bpf,x86: Respect X86_FEATURE_RETPOLINE*Peter Zijlstra2021-10-281-59/+0
* x86/retpoline: Create a retpoline thunk arrayPeter Zijlstra2021-10-281-1/+7
* x86/retpoline: Move the retpoline thunk declarations to nospec-branch.hPeter Zijlstra2021-10-281-0/+7
* x86/mm: Prepare for opt-in based L1D flush in switch_mm()Balbir Singh2021-07-281-0/+2
* Merge tag 'x86_core_for_v5.13' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds2021-04-271-3/+3
|\
| * x86/retpoline: Simplify retpolinesPeter Zijlstra2021-04-021-3/+3
* | Merge tag 'x86_cleanups_for_v5.13' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2021-04-261-1/+1
|\ \ | |/ |/|
| * x86: Remove unusual Unicode characters from commentsIngo Molnar2021-03-211-1/+1
* | x86/alternative: Merge include filesJuergen Gross2021-03-111-1/+0
|/
* Merge tag 'net-next-5.10' of git://git.kernel.org/pub/scm/linux/kernel/git/ne...Linus Torvalds2020-10-151-8/+8
|\
| * bpf, x64: use %rcx instead of %rax for tail call retpolinesMaciej Fijalkowski2020-09-171-8/+8
* | objtool: Rename frame.h -> objtool.hJulien Thierry2020-09-101-1/+1
|/
* x86/speculation/mds: Mark mds_user_clear_cpu_buffers() __always_inlineThomas Gleixner2020-06-111-2/+2
* x86/retpoline: Fix retpoline unwindPeter Zijlstra2020-04-301-48/+8
* x86: Change {JMP,CALL}_NOSPEC argumentPeter Zijlstra2020-04-301-8/+8
* x86/speculation: Change FILL_RETURN_BUFFER to work with objtoolPeter Zijlstra2020-04-301-6/+10
* KVM: SVM: move more vmentry code to assemblyPaolo Bonzini2020-04-141-21/+0
* x86/nospec: Remove unused RSB_FILL_LOOPSAnthony Steinhauser2020-01-021-1/+0
* x86/speculation/taa: Add mitigation for TSX Async AbortPawan Gupta2019-10-281-2/+2
* x86/retpoline: Don't clobber RFLAGS during CALL_NOSPEC on i386Sean Christopherson2019-08-231-1/+1
* Merge branch 'x86-mds-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2019-05-141-0/+50
|\
| * x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner2019-03-061-0/+12
| * x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner2019-03-061-0/+13
| * x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner2019-03-061-0/+25
* | x86/nospec, objtool: Introduce ANNOTATE_IGNORE_ALTERNATIVEPeter Zijlstra2019-04-031-19/+9
|/
* x86/speculation: Add support for STIBP always-on preferred modeThomas Lendacky2018-12-181-0/+1
* x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner2018-11-281-0/+1
* x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner2018-11-281-0/+1
* x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner2018-11-281-0/+2
* x86/speculation: Add command line control for indirect branch speculationThomas Gleixner2018-11-281-0/+10
* x86/retpoline: Remove minimal retpoline supportZhenzhong Duan2018-11-281-2/+0