summaryrefslogtreecommitdiff
path: root/arch/x86
AgeCommit message (Expand)Author
2019-08-13x86/kprobes: Verify stack frame on kretprobeMasami Hiramatsu
2019-08-13kvm: mmu: Fix overflow on kvm mmu page limit calculationBen Gardon
2019-08-13x86/speculation: Prevent deadlock on ssb_state::lockThomas Gleixner
2019-08-13xen: Prevent buffer overflow in privcmd ioctlDan Carpenter
2019-08-13KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hostsSean Christopherson
2019-08-13kvm: x86: IA32_ARCH_CAPABILITIES is always supportedJim Mattson
2019-07-09KVM: x86/mmu: Do not cache MMIO accesses while memslots are in fluxSean Christopherson
2019-05-22x86/bugs: Change L1TF mitigation string to match upstreamBen Hutchings
2019-05-22x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen
2019-05-22x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf
2019-05-22x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf
2019-05-22x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk
2019-05-22x86/speculation/mds: Fix commentBoris Ostrovsky
2019-05-22x86/speculation/mds: Add SMT warning messageJosh Poimboeuf
2019-05-22x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf
2019-05-22Documentation: Move L1TF to separate directoryThomas Gleixner
2019-05-22x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner
2019-05-22x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner
2019-05-22x86/speculation/mds: Add mitigation control for MDSThomas Gleixner
2019-05-22x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner
2019-05-22x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner
2019-05-22x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner
2019-05-22x86/kvm: Expose X86_FEATURE_MD_CLEAR to guestsAndi Kleen
2019-05-22x86/speculation/mds: Add BUG_MSBDS_ONLYThomas Gleixner
2019-05-22x86/speculation/mds: Add basic bug infrastructure for MDSAndi Kleen
2019-05-22x86/speculation: Consolidate CPU whitelistsThomas Gleixner
2019-05-22x86/msr-index: Cleanup bit definesThomas Gleixner
2019-05-22kvm: x86: Report STIBP on GET_SUPPORTED_CPUIDEduardo Habkost
2019-05-22x86/speculation: Provide IBPB always command line optionsThomas Gleixner
2019-05-22x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner
2019-05-22x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner
2019-05-22x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner
2019-05-22x86/speculation: Prevent stale SPEC_CTRL msr contentThomas Gleixner
2019-05-22x86/speculation: Prepare arch_smt_update() for PRCTL modeThomas Gleixner
2019-05-22x86/speculation: Split out TIF updateThomas Gleixner
2019-05-22x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner
2019-05-22x86/speculation: Avoid __switch_to_xtra() callsThomas Gleixner
2019-05-22x86/process: Consolidate and simplify switch_to_xtra() codeThomas Gleixner
2019-05-22x86/speculation: Prepare for per task indirect branch speculation controlTim Chen
2019-05-22x86/speculation: Add command line control for indirect branch speculationThomas Gleixner
2019-05-22x86/speculation: Unify conditional spectre v2 print functionsThomas Gleixner
2019-05-22x86/speculataion: Mark command line parser data __initdataThomas Gleixner
2019-05-22x86/speculation: Mark string arrays const correctlyThomas Gleixner
2019-05-22x86/speculation: Reorder the spec_v2 codeThomas Gleixner
2019-05-22x86/speculation: Rework SMT state changeThomas Gleixner
2019-05-22x86/Kconfig: Select SCHED_SMT if SMP enabledThomas Gleixner
2019-05-22x86/speculation: Reorganize speculation control MSRs updateTim Chen
2019-05-22x86/speculation: Rename SSBD update functionsThomas Gleixner
2019-05-22x86/speculation: Disable STIBP when enhanced IBRS is in useTim Chen
2019-05-22x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common()Tim Chen