summaryrefslogtreecommitdiffstats
path: root/arch (follow)
Commit message (Expand)AuthorAgeFilesLines
* x86/entry/64: Indent PUSH_AND_CLEAR_REGS and POP_REGS properlyDominik Brodowski2018-02-131-4/+4
* x86/entry/64: Get rid of the ALLOC_PT_GPREGS_ON_STACK and SAVE_AND_CLEAR_REGS...Dominik Brodowski2018-02-132-52/+10
* x86/entry/64: Use PUSH_AND_CLEAN_REGS in more casesDominik Brodowski2018-02-132-65/+6
* x86/entry/64: Introduce the PUSH_AND_CLEAN_REGS macroDominik Brodowski2018-02-132-4/+38
* x86/entry/64: Interleave XOR register clearing with PUSH instructionsDominik Brodowski2018-02-132-30/+40
* x86/entry/64: Merge the POP_C_REGS and POP_EXTRA_REGS macros into a single PO...Dominik Brodowski2018-02-132-26/+15
* x86/entry/64: Merge SAVE_C_REGS and SAVE_EXTRA_REGS, remove unused extensionsDominik Brodowski2018-02-132-50/+19
* x86/speculation: Clean up various Spectre related detailsIngo Molnar2018-02-131-17/+11
* KVM/nVMX: Set the CPU_BASED_USE_MSR_BITMAPS if we have a valid L02 MSR bitmapKarimAllah Ahmed2018-02-131-1/+2
* X86/nVMX: Properly set spec_ctrl and pred_cmd before merging MSRsKarimAllah Ahmed2018-02-131-2/+2
* KVM/x86: Reduce retpoline performance impact in slot_handle_level_range(), by...David Woodhouse2018-02-131-5/+5
* Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()"David Woodhouse2018-02-133-13/+9
* x86/speculation: Correct Speculation Control microcode blacklist againDavid Woodhouse2018-02-131-5/+6
* x86/speculation: Update Speculation Control microcode blacklistDavid Woodhouse2018-02-111-4/+0
* x86/mm/pti: Fix PTI comment in entry_SYSCALL_64()Nadav Amit2018-02-101-1/+1
* x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculati...Dan Williams2018-02-061-0/+30
* x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculatio...Dan Williams2018-02-062-1/+24
* x86/entry/64: Clear extra registers beyond syscall arguments, to reduce specu...Dan Williams2018-02-061-0/+13
* KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRLKarimAllah Ahmed2018-02-031-0/+88
* KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRLKarimAllah Ahmed2018-02-033-6/+110
* KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIESKarimAllah Ahmed2018-02-033-1/+17
* KVM/x86: Add IBPB supportAshok Raj2018-02-033-3/+116
* KVM/x86: Update the reverse_cpuid list to include CPUID_7_EDXKarimAllah Ahmed2018-02-032-5/+4
* Merge branch 'msr-bitmaps' of git://git.kernel.org/pub/scm/virt/kvm/kvm into ...Thomas Gleixner2018-02-031-254/+186
|\
| * KVM: VMX: make MSR bitmaps per-VCPUPaolo Bonzini2018-01-311-123/+147
| * KVM: VMX: introduce alloc_loaded_vmcsPaolo Bonzini2018-01-271-14/+22
| * KVM: nVMX: Eliminate vmcs02 poolJim Mattson2018-01-271-123/+23
* | x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALLDarren Kenny2018-02-021-1/+1
* | x86/pti: Mark constant arrays as __initconstArnd Bergmann2018-02-021-2/+2
* | x86/spectre: Simplify spectre_v2 command line parsingKarimAllah Ahmed2018-02-021-30/+56
* | x86/kvm: Update spectre-v1 mitigationDan Williams2018-02-011-11/+9
* | x86/paravirt: Remove 'noreplace-paravirt' cmdline optionJosh Poimboeuf2018-01-311-14/+0
* | x86/speculation: Use Indirect Branch Prediction Barrier in context switchTim Chen2018-01-302-1/+34
* | x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on IntelDavid Woodhouse2018-01-302-19/+29
* | x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"Colin Ian King2018-01-301-1/+1
* | x86/spectre: Report get_user mitigation for spectre_v1Dan Williams2018-01-301-1/+1
* | x86/syscall: Sanitize syscall table de-references under speculationDan Williams2018-01-301-1/+4
* | x86/get_user: Use pointer masking to limit speculationDan Williams2018-01-301-0/+10
* | x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospecDan Williams2018-01-304-14/+14
* | x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}Dan Williams2018-01-301-4/+4
* | x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospecDan Williams2018-01-301-0/+9
* | x86: Introduce barrier_nospecDan Williams2018-01-302-2/+5
* | x86: Implement array_index_mask_nospecDan Williams2018-01-301-0/+24
* | x86/asm: Move 'status' from thread_struct to thread_infoAndy Lutomirski2018-01-307-12/+11
* | x86/entry/64: Push extra regs right awayAndy Lutomirski2018-01-301-3/+7
* | x86/entry/64: Remove the SYSCALL64 fast pathAndy Lutomirski2018-01-302-122/+2
* | x86/spectre: Check CONFIG_RETPOLINE in command line parserDou Liyang2018-01-301-3/+3
* | x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAPWilliam Grant2018-01-302-4/+7
* | Merge tag 'v4.15' into x86/pti, to be able to merge dependent changesIngo Molnar2018-01-302139-30631/+68378
|\ \
| * \ Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2018-01-282-2/+0
| |\ \