summaryrefslogtreecommitdiff
AgeCommit message (Expand)AuthorFilesLines
2018-07-25proc: Provide details on speculation flaw mitigationsKees Cook1-0/+23
2018-07-25nospec: Allow getting/setting on non-current taskKees Cook3-17/+26
2018-07-25x86/speculation: Add prctl for Speculative Store Bypass mitigationThomas Gleixner3-11/+79
2018-07-25x86/process: Allow runtime control of Speculative Store BypassThomas Gleixner5-8/+66
2018-07-25x86/process: Optimize TIF_NOTSC switchThomas Gleixner2-18/+14
2018-07-25x86/process: Correct and optimize TIF_BLOCKSTEP switchKyle Huey2-5/+8
2018-07-25x86/process: Optimize TIF checks in __switch_to_xtra()Kyle Huey1-23/+31
2018-07-25prctl: Add speculation control prctlsThomas Gleixner4-0/+122
2018-07-25x86/speculation: Create spec-ctrl.h to avoid include hellThomas Gleixner6-18/+25
2018-07-25x86/bugs/AMD: Add support to disable RDS on Fam[15, 16, 17]h if requestedDavid Woodhouse5-1/+61
2018-07-25x86/bugs: Whitelist allowed SPEC_CTRL MSR valuesKonrad Rzeszutek Wilk1-2/+9
2018-07-25x86/bugs/intel: Set proper CPU features and setup RDSKonrad Rzeszutek Wilk5-6/+44
2018-07-25x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigationKonrad Rzeszutek Wilk4-0/+143
2018-07-25x86/cpufeatures: Add X86_FEATURE_RDSKonrad Rzeszutek Wilk1-0/+1
2018-07-25x86/bugs: Expose /sys/../spec_store_bypassKonrad Rzeszutek Wilk6-0/+40
2018-07-25x86/cpu/intel: Add Knights Mill to Intel familyPiotr Luc1-0/+1
2018-07-25x86/cpu: Rename Merrifield2 to MoorefieldAndy Shevchenko1-2/+2
2018-07-25x86/bugs, KVM: Support the combination of guest and host IBRSKonrad Rzeszutek Wilk2-0/+28
2018-07-25x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bitsKonrad Rzeszutek Wilk2-4/+47
2018-07-25x86/bugs: Concentrate bug reporting into a separate functionKonrad Rzeszutek Wilk1-14/+32
2018-07-25x86/bugs: Concentrate bug detection into a separate functionKonrad Rzeszutek Wilk1-10/+11
2018-07-25x86/nospec: Simplify alternative_msr_write()Linus Torvalds1-9/+10
2018-07-25x86/amd: don't set X86_BUG_SYSRET_SS_ATTRS when running under XenDavid Woodhouse2-5/+4
2018-07-25xen: set cpu capabilities from xen_start_kernel()Juergen Gross1-9/+9
2018-07-25selftest/seccomp: Fix the seccomp(2) signatureMickaël Salaün1-2/+2
2018-07-25selftest/seccomp: Fix the flag name SECCOMP_FILTER_FLAG_TSYNCMickaël Salaün1-9/+9
2018-07-25x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklistAlexander Sergeyev1-2/+1
2018-07-25x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPPIngo Molnar1-12/+14
2018-07-25x86/speculation: Use IBRS if available before calling into firmwareDavid Woodhouse6-10/+58
2018-07-25x86/spectre_v2: Don't check microcode versions when running under hypervisorsKonrad Rzeszutek Wilk1-0/+7
2018-07-25x86/speculation: Use Indirect Branch Prediction Barrier in context switchTim Chen2-0/+33
2018-07-25x86/mm: Give each mm TLB flush generation a unique IDAndy Lutomirski3-2/+19
2018-07-25x86/mm: Factor out LDT init from context initDave Hansen2-7/+18
2018-07-25x86/xen: Zero MSR_IA32_SPEC_CTRL before suspendJuergen Gross1-0/+16
2018-07-25x86/speculation: Add <asm/msr-index.h> dependencyPeter Zijlstra1-0/+1
2018-07-25x86/speculation: Fix up array_index_nospec_mask() asm constraintDan Williams1-1/+1
2018-07-25x86/speculation: Clean up various Spectre related detailsIngo Molnar1-15/+10
2018-07-25x86/speculation: Correct Speculation Control microcode blacklist againDavid Woodhouse1-5/+6
2018-07-25x86/speculation: Update Speculation Control microcode blacklistDavid Woodhouse1-4/+0
2018-07-25x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculati...Dan Williams1-0/+30
2018-07-25x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGsDenys Vlasenko1-24/+21
2018-07-25x86/pti: Mark constant arrays as __initconstArnd Bergmann1-2/+2
2018-07-25x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on IntelDavid Woodhouse2-19/+29
2018-07-25x86/cpufeatures: Clean up Spectre v2 related CPUID flagsDavid Woodhouse4-24/+34
2018-07-25x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) supportDavid Woodhouse3-1/+24
2018-07-25x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodesDavid Woodhouse2-1/+71
2018-07-25x86/pti: Do not enable PTI on CPUs which are not vulnerable to MeltdownDavid Woodhouse1-5/+43
2018-07-25x86/msr: Add definitions for new speculation control MSRsDavid Woodhouse1-0/+12
2018-07-25x86/cpufeatures: Add AMD feature bits for Speculation ControlDavid Woodhouse1-0/+3
2018-07-25x86/cpufeatures: Add Intel feature bits for Speculation ControlDavid Woodhouse1-0/+3