summaryrefslogtreecommitdiffstats
path: root/arch/x86/kernel/cpu/bugs.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen2019-04-191-3/+3
* Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2019-03-051-0/+12
|\
| * x86/speculation: Add PR_SPEC_DISABLE_NOEXECWaiman Long2019-01-291-0/+12
* | cpu/hotplug: Fix "SMT disabled by BIOS" detection for KVMJosh Poimboeuf2019-01-301-1/+1
|/
* x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINEWANG Chao2019-01-091-1/+1
* Merge branch 'x86-cleanups-for-linus' of git://git.kernel.org/pub/scm/linux/k...Linus Torvalds2018-12-271-0/+2
|\
| * x86/kernel: Fix more -Wmissing-prototypes warningsBorislav Petkov2018-12-081-0/+2
* | x86/speculation: Add support for STIBP always-on preferred modeThomas Lendacky2018-12-181-6/+22
* | x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=offMichal Hocko2018-12-111-1/+2
* | x86/speculation: Change misspelled STIPB to STIBPWaiman Long2018-12-061-3/+3
|/
* x86/speculation: Provide IBPB always command line optionsThomas Gleixner2018-11-281-11/+23
* x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner2018-11-281-1/+16
* x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner2018-11-281-9/+32
* x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner2018-11-281-0/+67
* x86/speculation: Prepare arch_smt_update() for PRCTL modeThomas Gleixner2018-11-281-21/+25
* x86/speculation: Prevent stale SPEC_CTRL msr contentThomas Gleixner2018-11-281-11/+7
* x86/speculation: Split out TIF updateThomas Gleixner2018-11-281-12/+23
* x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner2018-11-281-5/+24
* x86/speculation: Prepare for per task indirect branch speculation controlTim Chen2018-11-281-0/+4
* x86/speculation: Add command line control for indirect branch speculationThomas Gleixner2018-11-281-17/+116
* x86/speculation: Unify conditional spectre v2 print functionsThomas Gleixner2018-11-281-13/+4
* x86/speculataion: Mark command line parser data __initdataThomas Gleixner2018-11-281-2/+2
* x86/speculation: Mark string arrays const correctlyThomas Gleixner2018-11-281-3/+3
* x86/speculation: Reorder the spec_v2 codeThomas Gleixner2018-11-281-84/+84
* x86/l1tf: Show actual SMT stateThomas Gleixner2018-11-281-2/+3
* x86/speculation: Rework SMT state changeThomas Gleixner2018-11-281-6/+5
* x86/speculation: Rename SSBD update functionsThomas Gleixner2018-11-281-2/+2
* x86/speculation: Disable STIBP when enhanced IBRS is in useTim Chen2018-11-281-0/+7
* x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common()Tim Chen2018-11-281-2/+18
* x86/speculation: Remove unnecessary ret variable in cpu_show_common()Tim Chen2018-11-281-4/+1
* x86/speculation: Clean up spectre_v2_parse_cmdline()Tim Chen2018-11-281-14/+13
* x86/retpoline: Remove minimal retpoline supportZhenzhong Duan2018-11-281-11/+2
* x86/retpoline: Make CONFIG_RETPOLINE depend on compiler supportZhenzhong Duan2018-11-281-1/+1
* Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2018-10-231-6/+52
|\
| * x86/speculation: Propagate information about RSB filling mitigation to sysfsJiri Kosina2018-09-261-1/+2
| * x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigationJiri Kosina2018-09-261-6/+51
* | x86/bugs: Add Hygon Dhyana to the respective mitigation machineryPu Wen2018-09-271-1/+3
|/
* x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+Andi Kleen2018-08-271-5/+41
* x86/speculation/l1tf: Suggest what to do on systems with too much RAMVlastimil Babka2018-08-241-0/+4
* x86/l1tf: Fix build error seen if CONFIG_KVM_INTEL is disabledGuenter Roeck2018-08-151-2/+1
* Merge branch 'l1tf-final' of git://git.kernel.org/pub/scm/linux/kernel/git/ti...Linus Torvalds2018-08-141-0/+133
|\
| * cpu/hotplug: Fix SMT supported evaluationThomas Gleixner2018-08-071-1/+1
| * x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentryPaolo Bonzini2018-08-051-0/+1
| * x86/speculation: Simplify sysfs report of VMX L1TF vulnerabilityPaolo Bonzini2018-08-051-3/+9
| * Merge 4.18-rc7 into master to pick up the KVM dependcyThomas Gleixner2018-08-051-3/+9
| |\
| * | x86/bugs, kvm: Introduce boot-time control of L1TF mitigationsJiri Kosina2018-07-131-0/+44
| * | cpu/hotplug: Set CPU_SMT_NOT_SUPPORTED earlyThomas Gleixner2018-07-131-0/+6
| * | x86/kvm: Allow runtime control of L1D flushThomas Gleixner2018-07-131-1/+1
| * | x86/l1tf: Handle EPT disabled state properThomas Gleixner2018-07-131-4/+5
| * | x86/litf: Introduce vmx status variableThomas Gleixner2018-07-131-2/+34