summaryrefslogtreecommitdiff
path: root/arch/x86/include/asm/nospec-branch.h
AgeCommit message (Expand)AuthorFilesLines
2025-09-11x86/vmscape: Add conditional IBPB mitigationPawan Gupta1-0/+2
2025-07-10x86/bugs: Add a Transient Scheduler Attacks mitigationBorislav Petkov (AMD)1-3/+9
2025-07-10x86/bugs: Rename MDS machinery to something more genericBorislav Petkov (AMD)1-14/+15
2025-05-18x86/its: Add support for ITS-safe return thunkPawan Gupta1-0/+6
2025-05-18x86/its: Add support for ITS-safe indirect thunkPawan Gupta1-0/+4
2025-05-18x86/speculation: Remove the extra #ifdef around CALL_NOSPECPawan Gupta1-4/+0
2025-05-18x86/speculation: Add a conditional CS prefix to CALL_NOSPECPawan Gupta1-4/+15
2025-05-18x86/speculation: Simplify and make CALL_NOSPEC consistentPawan Gupta1-10/+5
2024-11-08x86/bugs: Use code segment selector for VERW operandPawan Gupta1-1/+10
2024-04-10x86/bhi: Mitigate KVM by defaultPawan Gupta1-0/+5
2024-04-10x86/bhi: Add support for clearing branch history at syscall entryPawan Gupta1-0/+12
2024-04-10x86/bugs: Fix the SRSO mitigation on Zen3/4Borislav Petkov (AMD)1-6/+14
2024-03-06x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static keyPawan Gupta1-12/+0
2024-03-06x86/bugs: Add asm helpers for executing VERWPawan Gupta1-0/+15
2024-03-01x86/alternative: Make custom return thunk unconditionalPeter Zijlstra1-4/+4
2024-03-01Revert "x86/alternative: Make custom return thunk unconditional"Borislav Petkov (AMD)1-4/+0
2024-03-01x86/returnthunk: Allow different return thunksPeter Zijlstra1-0/+6
2023-08-26x86/cpu: Cleanup the untrain messPeter Zijlstra1-8/+4
2023-08-26x86/cpu: Rename srso_(.*)_alias to srso_alias_\1Peter Zijlstra1-2/+2
2023-08-26x86/cpu: Rename original retbleed methodsPeter Zijlstra1-4/+4
2023-08-26x86/cpu: Clean up SRSO return thunk messPeter Zijlstra1-0/+5
2023-08-26x86/alternative: Make custom return thunk unconditionalPeter Zijlstra1-0/+5
2023-08-08x86/srso: Add IBPBBorislav Petkov (AMD)1-1/+2
2023-08-08x86/srso: Add SRSO_NO supportBorislav Petkov (AMD)1-3/+3
2023-08-08x86/srso: Add a Speculative RAS Overflow mitigationBorislav Petkov (AMD)1-1/+8
2022-12-03x86/bugs: Make sure MSR_SPEC_CTRL is updated properly upon resume from S3Pawan Gupta1-1/+1
2022-08-19x86/nospec: Fix i386 RSB stuffingPeter Zijlstra1-0/+12
2022-08-19x86/nospec: Unwreck the RSB stuffingPeter Zijlstra1-41/+39
2022-08-09Merge tag 'x86_bugs_pbrsb' of git://git.kernel.org/pub/scm/linux/kernel/git/t...Linus Torvalds1-2/+19
2022-08-03x86/speculation: Add LFENCE to RSB fill sequencePawan Gupta1-1/+3
2022-08-03x86/speculation: Add RSB VM Exit protectionsDaniel Sneddon1-1/+16
2022-08-01Merge tag 'x86_core_for_v6.0_rc1' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds1-6/+18
2022-07-21x86,nospec: Simplify {JMP,CALL}_NOSPECPeter Zijlstra1-6/+18
2022-07-18x86/amd: Use IBPB for firmware callsPeter Zijlstra1-0/+2
2022-07-15x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_currentNathan Chancellor1-1/+2
2022-06-29x86/retbleed: Add fine grained Kconfig knobsPeter Zijlstra1-2/+8
2022-06-27KVM: VMX: Prevent guest RSB poisoning attacks with eIBRSJosh Poimboeuf1-0/+1
2022-06-27x86/speculation: Fix firmware entry SPEC_CTRL handlingJosh Poimboeuf1-6/+4
2022-06-27x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=nJosh Poimboeuf1-2/+0
2022-06-27objtool: Add entry UNRET validationPeter Zijlstra1-0/+12
2022-06-27x86/bugs: Add retbleed=ibpbPeter Zijlstra1-2/+6
2022-06-27objtool: Update Retpoline validationPeter Zijlstra1-0/+6
2022-06-27intel_idle: Disable IBRS during long idlePeter Zijlstra1-0/+1
2022-06-27x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRSPawan Gupta1-0/+1
2022-06-27x86/bugs: Optimize SPEC_CTRL MSR writesPeter Zijlstra1-1/+1
2022-06-27x86/bugs: Keep a per-CPU IA32_SPEC_CTRL valuePeter Zijlstra1-0/+1
2022-06-27x86: Add magic AMD return-thunkPeter Zijlstra1-0/+17
2022-06-27x86/retpoline: Use -mfunction-returnPeter Zijlstra1-0/+2
2022-06-27x86/retpoline: Cleanup some #ifdeferyPeter Zijlstra1-4/+3
2022-05-21x86/speculation/mmio: Add mitigation for Processor MMIO Stale DataPawan Gupta1-0/+2