summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* x86/speculation: Support Enhanced IBRS on future CPUsSai Praneeth2018-08-034-2/+23
* x86/speculation: Protect against userspace-userspace spectreRSBJiri Kosina2018-07-311-31/+7
* x86/kexec: Allocate 8k PGDs for PTIJoerg Roedel2018-07-301-2/+3
* Revert "perf/core: Make sure the ring-buffer is mapped in all page-tables"Joerg Roedel2018-07-301-16/+0
* x86/mm: Remove in_nmi() warning from vmalloc_fault()Joerg Roedel2018-07-301-2/+0
* x86/entry/32: Check for VM86 mode in slow-path checkJoerg Roedel2018-07-201-2/+10
* perf/core: Make sure the ring-buffer is mapped in all page-tablesJoerg Roedel2018-07-201-0/+16
* x86/pti: Check the return value of pti_user_pagetable_walk_pmd()Jiang Biao2018-07-201-3/+7
* x86/pti: Check the return value of pti_user_pagetable_walk_p4d()Jiang Biao2018-07-201-2/+9
* x86/entry/32: Add debug code to check entry/exit CR3Joerg Roedel2018-07-201-0/+43
* x86/mm/pti: Add Warning when booting on a PCID capable CPUJoerg Roedel2018-07-201-0/+22
* x86/pti: Allow CONFIG_PAGE_TABLE_ISOLATION for x86_32Joerg Roedel2018-07-201-1/+1
* x86/ldt: Enable LDT user-mapping for PAEJoerg Roedel2018-07-202-5/+53
* x86/ldt: Split out sanity check in map_ldt_struct()Joerg Roedel2018-07-201-24/+58
* x86/ldt: Define LDT_END_ADDRJoerg Roedel2018-07-203-1/+4
* x86/ldt: Reserve address-space range on 32 bit for the LDTJoerg Roedel2018-07-202-2/+14
* x86/pgtable/pae: Use separate kernel PMDs for user page-tableJoerg Roedel2018-07-201-19/+81
* x86/mm/dump_pagetables: Define INIT_PGDJoerg Roedel2018-07-201-6/+6
* x86/mm/pti: Clone entry-text again in pti_finalize()Joerg Roedel2018-07-201-4/+9
* x86/mm/pti: Introduce pti_finalize()Joerg Roedel2018-07-205-9/+22
* x86/mm/pti: Keep permissions when cloning kernel text in pti_clone_kernel_text()Joerg Roedel2018-07-201-1/+1
* x86/mm/pti: Make pti_clone_kernel_text() compile on 32 bitJoerg Roedel2018-07-203-8/+12
* x86/mm/pti: Clone CPU_ENTRY_AREA on PMD level on x86_32Joerg Roedel2018-07-201-0/+20
* x86/mm/pti: Define X86_CR3_PTI_PCID_USER_BIT on x86_32Joerg Roedel2018-07-201-4/+4
* x86/mm/pti: Add an overflow check to pti_clone_pmds()Joerg Roedel2018-07-201-0/+4
* x86/mm/legacy: Populate the user page-table with user pgd'sJoerg Roedel2018-07-201-0/+9
* x86/mm/pae: Populate the user page-table with user pgd'sJoerg Roedel2018-07-201-0/+7
* x86/mm/pae: Populate valid user PGD entriesJoerg Roedel2018-07-201-2/+26
* x86/pgtable: Move two more functions from pgtable_64.h to pgtable.hJoerg Roedel2018-07-206-38/+21
* x86/pgtable: Move pti_set_user_pgtbl() to pgtable.hJoerg Roedel2018-07-201-0/+23
* x86/pgtable: Move pgdp kernel/user conversion functions to pgtable.hJoerg Roedel2018-07-202-49/+49
* x86/pgtable/32: Allocate 8k page-tables when PTI is enabledJoerg Roedel2018-07-202-7/+18
* x86/pgtable/pae: Unshare kernel PMDs when PTI is enabledJoerg Roedel2018-07-201-2/+3
* x86/pgtable: Rename pti_set_user_pgd() to pti_set_user_pgtbl()Joerg Roedel2018-07-202-7/+7
* x86/entry: Rename update_sp0 to update_task_stackJoerg Roedel2018-07-204-5/+5
* x86/entry/32: Add PTI CR3 switches to NMI handler codeJoerg Roedel2018-07-201-6/+33
* x86/entry/32: Add PTI cr3 switch to non-NMI entry/exit pointsJoerg Roedel2018-07-201-4/+82
* x86/entry/32: Simplify debug entry pointJoerg Roedel2018-07-201-32/+3
* x86/entry/32: Handle Entry from Kernel-Mode on Entry-StackJoerg Roedel2018-07-201-1/+115
* x86/entry/32: Introduce SAVE_ALL_NMI and RESTORE_ALL_NMIJoerg Roedel2018-07-201-4/+11
* x86/entry/32: Leave the kernel via trampoline stackJoerg Roedel2018-07-201-2/+77
* x86/entry/32: Enter the kernel via trampoline stackJoerg Roedel2018-07-206-28/+115
* x86/entry/32: Split off return-to-kernel pathJoerg Roedel2018-07-201-3/+8
* x86/entry/32: Unshare NMI return pathJoerg Roedel2018-07-201-2/+6
* x86/entry/32: Put ESPFIX code into a macroJoerg Roedel2018-07-201-48/+49
* x86/entry/32: Load task stack from x86_tss.sp1 in SYSENTER handlerJoerg Roedel2018-07-202-2/+9
* x86/entry/32: Rename TSS_sysenter_sp0 to TSS_entry2task_stackJoerg Roedel2018-07-202-3/+4
* x86/asm-offsets: Move TSS_sp0 and TSS_sp1 to asm-offsets.cJoerg Roedel2018-07-202-2/+4
* x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigationJiang Biao2018-07-191-1/+0
* x86/pti: Make pti_set_kernel_image_nonglobal() staticJiang Biao2018-07-161-1/+1