summaryrefslogtreecommitdiff
path: root/arch/x86
AgeCommit message (Expand)AuthorFilesLines
2019-05-16x86/vdso: Pass --eh-frame-hdr to the linkerAlistair Strachan1-1/+2
2019-05-16x86/vdso: Drop implicit common-page-size linker flagNick Desaulniers1-2/+2
2019-05-16x86: vdso: Use $LD instead of $CC to linkAlistair Strachan1-13/+9
2019-05-16Revert "x86: vdso: Use $LD instead of $CC to link"Sasha Levin1-9/+13
2019-05-16Revert "x86/vdso: Drop implicit common-page-size linker flag"Sasha Levin1-2/+2
2019-05-16KVM: x86: avoid misreporting level-triggered irqs as edge-triggered in tracingVitaly Kuznetsov1-2/+2
2019-05-16x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51TJian-Hong Pan1-0/+21
2019-05-14x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen1-3/+3
2019-05-14x86: stop exporting msr-index.h to userlandNicolas Dichtel1-1/+0
2019-05-14x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf1-2/+3
2019-05-14x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2-3/+12
2019-05-14x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk1-1/+2
2019-05-14x86/speculation/mds: Fix commentBoris Ostrovsky1-1/+1
2019-05-14x86/speculation/mds: Add SMT warning messageJosh Poimboeuf1-0/+8
2019-05-14x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf1-3/+2
2019-05-14x86/speculation/mds: Add mds=full,nosmt cmdline optionJosh Poimboeuf1-0/+10
2019-05-14Documentation: Move L1TF to separate directoryThomas Gleixner2-3/+3
2019-05-14x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner2-6/+13
2019-05-14x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner1-0/+28
2019-05-14x86/speculation/mds: Add mitigation control for MDSThomas Gleixner2-0/+75
2019-05-14x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner4-0/+26
2019-05-14x86/kvm/vmx: Add MDS protection when L1D Flush is not activeThomas Gleixner2-0/+4
2019-05-14x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner5-0/+31
2019-05-14x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner1-0/+25
2019-05-14x86/kvm: Expose X86_FEATURE_MD_CLEAR to guestsAndi Kleen1-1/+1
2019-05-14x86/speculation/mds: Add BUG_MSBDS_ONLYThomas Gleixner2-8/+13
2019-05-14x86/speculation/mds: Add basic bug infrastructure for MDSAndi Kleen3-8/+22
2019-05-14x86/speculation: Consolidate CPU whitelistsThomas Gleixner1-49/+56
2019-05-14x86/msr-index: Cleanup bit definesThomas Gleixner1-16/+18
2019-05-14kvm: x86: Report STIBP on GET_SUPPORTED_CPUIDEduardo Habkost1-2/+3
2019-05-14x86/speculation: Provide IBPB always command line optionsThomas Gleixner1-11/+23
2019-05-14x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner2-1/+17
2019-05-14x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner1-9/+32
2019-05-14x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner3-0/+73
2019-05-14x86/speculation: Prevent stale SPEC_CTRL msr contentThomas Gleixner4-18/+40
2019-05-14x86/speculation: Prepare arch_smt_update() for PRCTL modeThomas Gleixner1-21/+25
2019-05-14x86/speculation: Split out TIF updateThomas Gleixner1-12/+23
2019-05-14x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner4-35/+117
2019-05-14x86/speculation: Avoid __switch_to_xtra() callsThomas Gleixner2-2/+26
2019-05-14x86/process: Consolidate and simplify switch_to_xtra() codeThomas Gleixner5-20/+37
2019-05-14x86/speculation: Prepare for per task indirect branch speculation controlTim Chen5-5/+41
2019-05-14x86/speculation: Add command line control for indirect branch speculationThomas Gleixner2-17/+126
2019-05-14x86/speculation: Unify conditional spectre v2 print functionsThomas Gleixner1-13/+4
2019-05-14x86/speculataion: Mark command line parser data __initdataThomas Gleixner1-2/+2
2019-05-14x86/speculation: Mark string arrays const correctlyThomas Gleixner1-3/+3
2019-05-14x86/speculation: Reorder the spec_v2 codeThomas Gleixner1-88/+88
2019-05-14x86/l1tf: Show actual SMT stateThomas Gleixner1-2/+3
2019-05-14x86/speculation: Rework SMT state changeThomas Gleixner1-6/+5
2019-05-14x86/Kconfig: Select SCHED_SMT if SMP enabledThomas Gleixner1-7/+1
2019-05-14x86/speculation: Reorganize speculation control MSRs updateTim Chen1-17/+29