| Commit message (Expand) | Author | Age | Files | Lines |
* | x86/retpoline: Fix retpoline unwind | Peter Zijlstra | 2020-04-30 | 1 | -48/+8 |
* | x86: Change {JMP,CALL}_NOSPEC argument | Peter Zijlstra | 2020-04-30 | 1 | -8/+8 |
* | x86/speculation: Change FILL_RETURN_BUFFER to work with objtool | Peter Zijlstra | 2020-04-30 | 1 | -6/+10 |
* | KVM: SVM: move more vmentry code to assembly | Paolo Bonzini | 2020-04-14 | 1 | -21/+0 |
* | x86/nospec: Remove unused RSB_FILL_LOOPS | Anthony Steinhauser | 2020-01-02 | 1 | -1/+0 |
* | x86/speculation/taa: Add mitigation for TSX Async Abort | Pawan Gupta | 2019-10-28 | 1 | -2/+2 |
* | x86/retpoline: Don't clobber RFLAGS during CALL_NOSPEC on i386 | Sean Christopherson | 2019-08-23 | 1 | -1/+1 |
* | Merge branch 'x86-mds-for-linus' of git://git.kernel.org/pub/scm/linux/kernel... | Linus Torvalds | 2019-05-14 | 1 | -0/+50 |
|\ |
|
| * | x86/speculation/mds: Conditionally clear CPU buffers on idle entry | Thomas Gleixner | 2019-03-06 | 1 | -0/+12 |
| * | x86/speculation/mds: Clear CPU buffers on exit to user | Thomas Gleixner | 2019-03-06 | 1 | -0/+13 |
| * | x86/speculation/mds: Add mds_clear_cpu_buffers() | Thomas Gleixner | 2019-03-06 | 1 | -0/+25 |
* | | x86/nospec, objtool: Introduce ANNOTATE_IGNORE_ALTERNATIVE | Peter Zijlstra | 2019-04-03 | 1 | -19/+9 |
|/ |
|
* | x86/speculation: Add support for STIBP always-on preferred mode | Thomas Lendacky | 2018-12-18 | 1 | -0/+1 |
* | x86/speculation: Add seccomp Spectre v2 user space protection mode | Thomas Gleixner | 2018-11-28 | 1 | -0/+1 |
* | x86/speculation: Add prctl() control for indirect branch speculation | Thomas Gleixner | 2018-11-28 | 1 | -0/+1 |
* | x86/speculation: Prepare for conditional IBPB in switch_mm() | Thomas Gleixner | 2018-11-28 | 1 | -0/+2 |
* | x86/speculation: Add command line control for indirect branch speculation | Thomas Gleixner | 2018-11-28 | 1 | -0/+10 |
* | x86/retpoline: Remove minimal retpoline support | Zhenzhong Duan | 2018-11-28 | 1 | -2/+0 |
* | x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support | Zhenzhong Duan | 2018-11-28 | 1 | -4/+6 |
* | x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant | Zhenzhong Duan | 2018-09-23 | 1 | -4/+13 |
* | x86/speculation: Support Enhanced IBRS on future CPUs | Sai Praneeth | 2018-08-03 | 1 | -0/+1 |
* | x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation | Jiang Biao | 2018-07-19 | 1 | -1/+0 |
* | Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net | David S. Miller | 2018-05-27 | 1 | -13/+30 |
|\ |
|
| * | x86/bugs: Remove x86_spec_ctrl_set() | Thomas Gleixner | 2018-05-17 | 1 | -2/+0 |
| * | x86/bugs: Expose x86_spec_ctrl_base directly | Thomas Gleixner | 2018-05-17 | 1 | -11/+5 |
| * | x86/cpu: Make alternative_msr_write work for 32-bit code | Jim Mattson | 2018-05-14 | 1 | -2/+2 |
| * | x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass | Kees Cook | 2018-05-05 | 1 | -0/+1 |
| * | x86/speculation: Add prctl for Speculative Store Bypass mitigation | Thomas Gleixner | 2018-05-03 | 1 | -0/+1 |
| * | x86/speculation: Create spec-ctrl.h to avoid include hell | Thomas Gleixner | 2018-05-03 | 1 | -14/+0 |
| * | x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested | Konrad Rzeszutek Wilk | 2018-05-03 | 1 | -0/+4 |
| * | x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation | Konrad Rzeszutek Wilk | 2018-05-03 | 1 | -0/+6 |
| * | x86/bugs, KVM: Support the combination of guest and host IBRS | Konrad Rzeszutek Wilk | 2018-05-03 | 1 | -0/+10 |
| * | x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits | Konrad Rzeszutek Wilk | 2018-05-03 | 1 | -4/+20 |
| * | x86/nospec: Simplify alternative_msr_write() | Linus Torvalds | 2018-05-03 | 1 | -9/+10 |
* | | bpf, x64: clean up retpoline emission slightly | Daniel Borkmann | 2018-05-15 | 1 | -15/+14 |
* | | bpf, x86_32: add eBPF JIT compiler for ia32 | Wang YanQing | 2018-05-03 | 1 | -3/+27 |
|/ |
|
* | Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel... | Linus Torvalds | 2018-03-18 | 1 | -1/+4 |
|\ |
|
| * | x86/speculation, objtool: Annotate indirect calls/jumps for objtool on 32-bit... | Andy Whitcroft | 2018-03-14 | 1 | -1/+4 |
* | | Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel... | Linus Torvalds | 2018-02-26 | 1 | -20/+118 |
|\| |
|
| * | x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP | Ingo Molnar | 2018-02-21 | 1 | -12/+14 |
| * | x86/speculation, objtool: Annotate indirect calls/jumps for objtool | Peter Zijlstra | 2018-02-21 | 1 | -4/+23 |
| * | x86/speculation: Use IBRS if available before calling into firmware | David Woodhouse | 2018-02-20 | 1 | -9/+30 |
| * | Revert "x86/retpoline: Simplify vmexit_fill_RSB()" | David Woodhouse | 2018-02-20 | 1 | -7/+63 |
* | | bpf, x64: implement retpoline for tail call | Daniel Borkmann | 2018-02-23 | 1 | -0/+37 |
|/ |
|
* | x86/speculation: Add <asm/msr-index.h> dependency | Peter Zijlstra | 2018-02-15 | 1 | -0/+1 |
* | Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()" | David Woodhouse | 2018-02-13 | 1 | -4/+9 |
* | x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL | Darren Kenny | 2018-02-02 | 1 | -1/+1 |
* | x86/speculation: Simplify indirect_branch_prediction_barrier() | Borislav Petkov | 2018-01-27 | 1 | -9/+4 |
* | x86/retpoline: Simplify vmexit_fill_RSB() | Borislav Petkov | 2018-01-27 | 1 | -63/+7 |
* | x86/cpufeatures: Clean up Spectre v2 related CPUID flags | David Woodhouse | 2018-01-27 | 1 | -1/+1 |