summaryrefslogtreecommitdiff
path: root/arch/x86/include/asm/nospec-branch.h
AgeCommit message (Expand)AuthorFilesLines
2022-03-11x86/speculation: Add eIBRS + Retpoline optionsPeter Zijlstra1-1/+3
2022-03-11x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCEPeter Zijlstra (Intel)1-6/+6
2022-03-11x86/retpoline: Remove minimal retpoline supportZhenzhong Duan1-2/+0
2022-03-11x86/retpoline: Make CONFIG_RETPOLINE depend on compiler supportZhenzhong Duan1-4/+6
2022-03-11x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variantZhenzhong Duan1-4/+13
2020-10-01x86/speculation/mds: Mark mds_user_clear_cpu_buffers() __always_inlineThomas Gleixner1-2/+2
2020-06-20x86/speculation: Add support for STIBP always-on preferred modeThomas Lendacky1-0/+1
2019-11-16x86/speculation/taa: Add mitigation for TSX Async AbortPawan Gupta1-2/+2
2019-09-06x86/retpoline: Don't clobber RFLAGS during CALL_NOSPEC on i386Sean Christopherson1-1/+1
2019-05-14x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner1-0/+12
2019-05-14x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner1-0/+13
2019-05-14x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner1-0/+25
2019-05-14x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner1-0/+1
2019-05-14x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner1-0/+1
2019-05-14x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner1-0/+2
2019-05-14x86/speculation: Add command line control for indirect branch speculationThomas Gleixner1-0/+10
2019-05-14x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigationJiang Biao1-1/+0
2018-11-13x86/speculation: Support Enhanced IBRS on future CPUsSai Praneeth1-0/+1
2018-05-22x86/bugs: Remove x86_spec_ctrl_set()Thomas Gleixner1-2/+0
2018-05-22x86/bugs: Expose x86_spec_ctrl_base directlyThomas Gleixner1-11/+5
2018-05-22x86/cpu: Make alternative_msr_write work for 32-bit codeJim Mattson1-2/+2
2018-05-22x86/speculation: Make "seccomp" the default mode for Speculative Store BypassKees Cook1-0/+1
2018-05-22x86/speculation: Add prctl for Speculative Store Bypass mitigationThomas Gleixner1-0/+1
2018-05-22x86/speculation: Create spec-ctrl.h to avoid include hellThomas Gleixner1-14/+0
2018-05-22x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requestedDavid Woodhouse1-0/+4
2018-05-22x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigationKonrad Rzeszutek Wilk1-0/+6
2018-05-22x86/bugs, KVM: Support the combination of guest and host IBRSKonrad Rzeszutek Wilk1-0/+10
2018-05-22x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bitsKonrad Rzeszutek Wilk1-4/+20
2018-05-22x86/nospec: Simplify alternative_msr_write()Linus Torvalds1-9/+10
2018-03-22x86/speculation, objtool: Annotate indirect calls/jumps for objtool on 32-bit...Andy Whitcroft1-1/+4
2018-03-18x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPPIngo Molnar1-12/+14
2018-03-18x86/speculation, objtool: Annotate indirect calls/jumps for objtoolPeter Zijlstra1-4/+23
2018-03-18x86/speculation: Use IBRS if available before calling into firmwareDavid Woodhouse1-9/+30
2018-03-18Revert "x86/retpoline: Simplify vmexit_fill_RSB()"David Woodhouse1-7/+63
2018-03-11bpf, x64: implement retpoline for tail callDaniel Borkmann1-0/+37
2018-02-22x86/speculation: Add <asm/msr-index.h> dependencyPeter Zijlstra1-0/+1
2018-02-13x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALLDarren Kenny1-1/+1
2018-02-13x86/retpoline: Simplify vmexit_fill_RSB()Borislav Petkov1-63/+7
2018-02-13x86/cpufeatures: Clean up Spectre v2 related CPUID flagsDavid Woodhouse1-1/+1
2018-02-13x86/nospec: Fix header guards namesBorislav Petkov1-3/+3
2018-02-13x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) supportDavid Woodhouse1-0/+13
2018-01-23x86/retpoline: Optimize inline assembler for vmexit_fill_RSBAndi Kleen1-3/+4
2018-01-23retpoline: Introduce start/end markers of indirect thunkMasami Hiramatsu1-0/+3
2018-01-23x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macrosTom Lendacky1-1/+5
2018-01-17x86/retpoline: Fill return stack buffer on vmexitDavid Woodhouse1-1/+77
2018-01-17x86/spectre: Add boot time option to select Spectre v2 mitigationDavid Woodhouse1-0/+10
2018-01-17x86/retpoline: Add initial retpoline supportDavid Woodhouse1-0/+128