summaryrefslogtreecommitdiff
path: root/arch/x86/include/asm/nospec-branch.h
AgeCommit message (Expand)AuthorFilesLines
2025-09-11x86/vmscape: Add conditional IBPB mitigationPawan Gupta1-0/+2
2025-07-10x86/bugs: Add a Transient Scheduler Attacks mitigationBorislav Petkov (AMD)1-3/+9
2025-07-10x86/bugs: Rename MDS machinery to something more genericBorislav Petkov (AMD)1-14/+15
2025-05-22x86/its: Add support for ITS-safe return thunkPawan Gupta1-0/+6
2025-05-22x86/its: Add support for ITS-safe indirect thunkPawan Gupta1-0/+5
2025-05-22x86/speculation: Remove the extra #ifdef around CALL_NOSPECPawan Gupta1-4/+0
2025-05-22x86/speculation: Add a conditional CS prefix to CALL_NOSPECPawan Gupta1-4/+15
2025-05-22x86/speculation: Simplify and make CALL_NOSPEC consistentPawan Gupta1-10/+5
2025-05-22x86,nospec: Simplify {JMP,CALL}_NOSPECPeter Zijlstra1-6/+18
2024-11-08x86/bugs: Use code segment selector for VERW operandPawan Gupta1-1/+10
2024-04-10x86/bhi: Mitigate KVM by defaultPawan Gupta1-0/+5
2024-04-10x86/bhi: Add support for clearing branch history at syscall entryPawan Gupta1-0/+12
2024-04-10x86/bugs: Fix the SRSO mitigation on Zen3/4Borislav Petkov (AMD)1-6/+14
2024-04-10x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static keyPawan Gupta1-12/+0
2024-04-10x86/bugs: Add asm helpers for executing VERWPawan Gupta1-0/+15
2024-03-01x86/alternative: Make custom return thunk unconditionalPeter Zijlstra1-4/+4
2024-03-01Revert "x86/alternative: Make custom return thunk unconditional"Borislav Petkov (AMD)1-4/+0
2024-03-01x86/returnthunk: Allow different return thunksPeter Zijlstra1-0/+6
2023-08-26x86/cpu: Cleanup the untrain messPeter Zijlstra1-8/+4
2023-08-26x86/cpu: Rename srso_(.*)_alias to srso_alias_\1Peter Zijlstra1-2/+2
2023-08-26x86/cpu: Rename original retbleed methodsPeter Zijlstra1-4/+4
2023-08-26x86/cpu: Clean up SRSO return thunk messPeter Zijlstra1-0/+5
2023-08-26x86/alternative: Make custom return thunk unconditionalPeter Zijlstra1-0/+5
2023-08-08x86/srso: Add IBPBBorislav Petkov (AMD)1-1/+2
2023-08-08x86/srso: Add SRSO_NO supportBorislav Petkov (AMD)1-3/+3
2023-08-08x86/srso: Add a Speculative RAS Overflow mitigationBorislav Petkov (AMD)1-1/+8
2022-12-08x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3Pawan Gupta1-1/+1
2022-08-31x86/nospec: Fix i386 RSB stuffingPeter Zijlstra1-0/+12
2022-08-31x86/nospec: Unwreck the RSB stuffingPeter Zijlstra1-41/+39
2022-08-11x86/speculation: Add LFENCE to RSB fill sequencePawan Gupta1-1/+3
2022-08-11x86/speculation: Add RSB VM Exit protectionsDaniel Sneddon1-1/+16
2022-07-29x86/amd: Use IBPB for firmware callsPeter Zijlstra1-0/+2
2022-07-23x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_currentNathan Chancellor1-1/+2
2022-07-23x86/retbleed: Add fine grained Kconfig knobsPeter Zijlstra1-2/+8
2022-07-23KVM: VMX: Prevent guest RSB poisoning attacks with eIBRSJosh Poimboeuf1-0/+1
2022-07-23x86/speculation: Fix firmware entry SPEC_CTRL handlingJosh Poimboeuf1-6/+4
2022-07-23x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=nJosh Poimboeuf1-2/+0
2022-07-23objtool: Add entry UNRET validationPeter Zijlstra1-0/+12
2022-07-23x86/bugs: Add retbleed=ibpbPeter Zijlstra1-2/+6
2022-07-23objtool: Update Retpoline validationPeter Zijlstra1-0/+6
2022-07-23intel_idle: Disable IBRS during long idlePeter Zijlstra1-0/+1
2022-07-23x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRSPawan Gupta1-0/+1
2022-07-23x86/bugs: Optimize SPEC_CTRL MSR writesPeter Zijlstra1-1/+1
2022-07-23x86/bugs: Keep a per-CPU IA32_SPEC_CTRL valuePeter Zijlstra1-0/+1
2022-07-23x86: Add magic AMD return-thunkPeter Zijlstra1-0/+17
2022-07-23x86/retpoline: Use -mfunction-returnPeter Zijlstra1-0/+2
2022-07-23bpf,x86: Respect X86_FEATURE_RETPOLINE*Peter Zijlstra1-59/+0
2022-07-23x86/retpoline: Create a retpoline thunk arrayPeter Zijlstra1-1/+7
2022-07-23x86/retpoline: Move the retpoline thunk declarations to nospec-branch.hPeter Zijlstra1-0/+7
2022-06-16x86/speculation/mmio: Add mitigation for Processor MMIO Stale DataPawan Gupta1-0/+2