summaryrefslogtreecommitdiff
path: root/arch
AgeCommit message (Expand)Author
2019-05-16x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner
2019-05-16x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner
2019-05-16x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner
2019-05-16x86/kvm: Expose X86_FEATURE_MD_CLEAR to guestsAndi Kleen
2019-05-16x86/speculation/mds: Add BUG_MSBDS_ONLYThomas Gleixner
2019-05-16x86/speculation/mds: Add basic bug infrastructure for MDSAndi Kleen
2019-05-16x86/speculation: Consolidate CPU whitelistsThomas Gleixner
2019-05-16x86/msr-index: Cleanup bit definesThomas Gleixner
2019-05-16kvm: x86: Report STIBP on GET_SUPPORTED_CPUIDEduardo Habkost
2019-05-16x86/speculation: Provide IBPB always command line optionsThomas Gleixner
2019-05-16x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner
2019-05-16x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner
2019-05-16x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner
2019-05-16x86/speculation: Prevent stale SPEC_CTRL msr contentThomas Gleixner
2019-05-16x86/speculation: Prepare arch_smt_update() for PRCTL modeThomas Gleixner
2019-05-16x86/speculation: Split out TIF updateThomas Gleixner
2019-05-16x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner
2019-05-16x86/speculation: Avoid __switch_to_xtra() callsThomas Gleixner
2019-05-16x86/process: Consolidate and simplify switch_to_xtra() codeThomas Gleixner
2019-05-16x86/speculation: Prepare for per task indirect branch speculation controlTim Chen
2019-05-16x86/speculation: Add command line control for indirect branch speculationThomas Gleixner
2019-05-16x86/speculation: Unify conditional spectre v2 print functionsThomas Gleixner
2019-05-16x86/speculataion: Mark command line parser data __initdataThomas Gleixner
2019-05-16x86/speculation: Mark string arrays const correctlyThomas Gleixner
2019-05-16x86/speculation: Reorder the spec_v2 codeThomas Gleixner
2019-05-16x86/speculation: Rework SMT state changeThomas Gleixner
2019-05-16x86/Kconfig: Select SCHED_SMT if SMP enabledThomas Gleixner
2019-05-16x86/speculation: Reorganize speculation control MSRs updateTim Chen
2019-05-16x86/speculation: Rename SSBD update functionsThomas Gleixner
2019-05-16x86/speculation: Disable STIBP when enhanced IBRS is in useTim Chen
2019-05-16x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common()Tim Chen
2019-05-16x86/speculation: Remove unnecessary ret variable in cpu_show_common()Tim Chen
2019-05-16x86/speculation: Clean up spectre_v2_parse_cmdline()Tim Chen
2019-05-16x86/speculation: Update the TIF_SSBD commentTim Chen
2019-05-16x86/speculation: Propagate information about RSB filling mitigation to sysfsJiri Kosina
2019-05-16x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigationJiri Kosina
2019-05-16x86/speculation: Apply IBPB more strictly to avoid cross-process data leakJiri Kosina
2019-05-16x86/mm: Use WRITE_ONCE() when setting PTEsNadav Amit
2019-05-16KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabledThomas Gleixner
2019-05-16x86/cpu: Sanitize FAM6_ATOM namingPeter Zijlstra
2019-05-16x86/microcode: Update the new microcode revision unconditionallyFilippo Sironi
2019-05-16x86/microcode: Make sure boot_cpu_data.microcode is up-to-datePrarit Bhargava
2019-05-16x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigationJiang Biao
2019-05-16x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSRTom Lendacky
2019-05-16x86/bugs: Switch the selection of mitigation from CPU vendor to CPU featuresKonrad Rzeszutek Wilk
2019-05-16x86/bugs: Add AMD's SPEC_CTRL MSR usageKonrad Rzeszutek Wilk
2019-05-16x86/bugs: Add AMD's variant of SSB_NOKonrad Rzeszutek Wilk
2019-05-16x86/speculation: Simplify the CPU bug detection logicDominik Brodowski
2019-05-16x86/speculation: Support Enhanced IBRS on future CPUsSai Praneeth
2019-05-16x86/cpufeatures: Hide AMD-specific speculation flagsBen Hutchings