summaryrefslogtreecommitdiffstats
path: root/arch (unfollow)
Commit message (Expand)AuthorFilesLines
2018-02-13x86/entry/64: Indent PUSH_AND_CLEAR_REGS and POP_REGS properlyDominik Brodowski1-4/+4
2018-02-13x86/entry/64: Get rid of the ALLOC_PT_GPREGS_ON_STACK and SAVE_AND_CLEAR_REGS...Dominik Brodowski2-52/+10
2018-02-13x86/entry/64: Use PUSH_AND_CLEAN_REGS in more casesDominik Brodowski2-65/+6
2018-02-13x86/entry/64: Introduce the PUSH_AND_CLEAN_REGS macroDominik Brodowski2-4/+38
2018-02-13x86/entry/64: Interleave XOR register clearing with PUSH instructionsDominik Brodowski2-30/+40
2018-02-13x86/entry/64: Merge the POP_C_REGS and POP_EXTRA_REGS macros into a single PO...Dominik Brodowski2-26/+15
2018-02-13x86/entry/64: Merge SAVE_C_REGS and SAVE_EXTRA_REGS, remove unused extensionsDominik Brodowski2-50/+19
2018-02-13x86/speculation: Clean up various Spectre related detailsIngo Molnar1-17/+11
2018-02-13KVM/nVMX: Set the CPU_BASED_USE_MSR_BITMAPS if we have a valid L02 MSR bitmapKarimAllah Ahmed1-1/+2
2018-02-13X86/nVMX: Properly set spec_ctrl and pred_cmd before merging MSRsKarimAllah Ahmed1-2/+2
2018-02-13KVM/x86: Reduce retpoline performance impact in slot_handle_level_range(), by...David Woodhouse1-5/+5
2018-02-13Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()"David Woodhouse3-13/+9
2018-02-13x86/speculation: Correct Speculation Control microcode blacklist againDavid Woodhouse1-5/+6
2018-02-11x86/speculation: Update Speculation Control microcode blacklistDavid Woodhouse1-4/+0
2018-02-10x86/mm/pti: Fix PTI comment in entry_SYSCALL_64()Nadav Amit1-1/+1
2018-02-09MAINTAINERS: Add Peter Zijlstra as objtool co-maintainerPeter Zijlstra1-0/+1
2018-02-09objtool: Fix switch-table detectionPeter Zijlstra2-2/+40
2018-02-06x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculati...Dan Williams1-0/+30
2018-02-06x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculatio...Dan Williams2-1/+24
2018-02-06x86/entry/64: Clear extra registers beyond syscall arguments, to reduce specu...Dan Williams1-0/+13
2018-02-03KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRLKarimAllah Ahmed1-0/+88
2018-02-03KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRLKarimAllah Ahmed3-6/+110
2018-02-03KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIESKarimAllah Ahmed3-1/+17
2018-02-03KVM/x86: Add IBPB supportAshok Raj3-3/+116
2018-02-03KVM/x86: Update the reverse_cpuid list to include CPUID_7_EDXKarimAllah Ahmed2-5/+4
2018-02-02x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALLDarren Kenny1-1/+1
2018-02-02x86/pti: Mark constant arrays as __initconstArnd Bergmann1-2/+2
2018-02-02x86/spectre: Simplify spectre_v2 command line parsingKarimAllah Ahmed1-30/+56
2018-02-02x86/retpoline: Avoid retpolines for built-in __init functionsDavid Woodhouse1-1/+8
2018-02-01x86/kvm: Update spectre-v1 mitigationDan Williams1-11/+9
2018-01-31KVM: VMX: make MSR bitmaps per-VCPUPaolo Bonzini1-123/+147
2018-01-31x86/paravirt: Remove 'noreplace-paravirt' cmdline optionJosh Poimboeuf2-16/+0
2018-01-30x86/speculation: Use Indirect Branch Prediction Barrier in context switchTim Chen2-1/+34
2018-01-30x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on IntelDavid Woodhouse2-19/+29
2018-01-30x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"Colin Ian King1-1/+1
2018-01-30x86/spectre: Report get_user mitigation for spectre_v1Dan Williams1-1/+1
2018-01-30nl80211: Sanitize array index in parse_txq_paramsDan Williams1-3/+6
2018-01-30vfs, fdtable: Prevent bounds-check bypass via speculative executionDan Williams1-1/+4
2018-01-30x86/syscall: Sanitize syscall table de-references under speculationDan Williams1-1/+4
2018-01-30x86/get_user: Use pointer masking to limit speculationDan Williams1-0/+10
2018-01-30x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospecDan Williams4-14/+14
2018-01-30x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}Dan Williams1-4/+4
2018-01-30x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospecDan Williams1-0/+9
2018-01-30x86: Introduce barrier_nospecDan Williams2-2/+5
2018-01-30x86: Implement array_index_mask_nospecDan Williams1-0/+24