summaryrefslogtreecommitdiff
path: root/arch
AgeCommit message (Expand)AuthorFilesLines
2019-05-16x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2-3/+7
2019-05-16x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk1-1/+2
2019-05-16x86/speculation/mds: Fix commentBoris Ostrovsky1-1/+1
2019-05-16x86/speculation/mds: Add SMT warning messageJosh Poimboeuf1-0/+8
2019-05-16x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf1-3/+2
2019-05-16x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen1-3/+3
2019-05-16Documentation: Move L1TF to separate directoryThomas Gleixner1-1/+1
2019-05-16x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner2-6/+13
2019-05-16x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner1-0/+27
2019-05-16x86/speculation/mds: Add mitigation control for MDSThomas Gleixner2-0/+76
2019-05-16x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner4-0/+27
2019-05-16x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner5-0/+31
2019-05-16x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner1-0/+25
2019-05-16x86/kvm: Expose X86_FEATURE_MD_CLEAR to guestsAndi Kleen1-1/+1
2019-05-16x86/speculation/mds: Add BUG_MSBDS_ONLYThomas Gleixner2-8/+13
2019-05-16x86/speculation/mds: Add basic bug infrastructure for MDSAndi Kleen3-8/+22
2019-05-16x86/speculation: Consolidate CPU whitelistsThomas Gleixner1-49/+56
2019-05-16x86/msr-index: Cleanup bit definesThomas Gleixner1-11/+13
2019-05-16kvm: x86: Report STIBP on GET_SUPPORTED_CPUIDEduardo Habkost1-2/+3
2019-05-16x86/speculation: Provide IBPB always command line optionsThomas Gleixner1-11/+23
2019-05-16x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner2-1/+17
2019-05-16x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner1-9/+32
2019-05-16x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner3-0/+73
2019-05-16x86/speculation: Prevent stale SPEC_CTRL msr contentThomas Gleixner4-18/+40
2019-05-16x86/speculation: Prepare arch_smt_update() for PRCTL modeThomas Gleixner1-21/+25
2019-05-16x86/speculation: Split out TIF updateThomas Gleixner1-12/+23
2019-05-16x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner4-35/+117
2019-05-16x86/speculation: Avoid __switch_to_xtra() callsThomas Gleixner2-2/+26
2019-05-16x86/process: Consolidate and simplify switch_to_xtra() codeThomas Gleixner5-20/+37
2019-05-16x86/speculation: Prepare for per task indirect branch speculation controlTim Chen5-5/+41
2019-05-16x86/speculation: Add command line control for indirect branch speculationThomas Gleixner2-17/+124
2019-05-16x86/speculation: Unify conditional spectre v2 print functionsThomas Gleixner1-13/+4
2019-05-16x86/speculataion: Mark command line parser data __initdataThomas Gleixner1-2/+2
2019-05-16x86/speculation: Mark string arrays const correctlyThomas Gleixner1-2/+2
2019-05-16x86/speculation: Reorder the spec_v2 codeThomas Gleixner1-87/+87
2019-05-16x86/speculation: Rework SMT state changeThomas Gleixner1-6/+5
2019-05-16x86/Kconfig: Select SCHED_SMT if SMP enabledThomas Gleixner1-7/+1
2019-05-16x86/speculation: Reorganize speculation control MSRs updateTim Chen1-17/+29
2019-05-16x86/speculation: Rename SSBD update functionsThomas Gleixner3-11/+11
2019-05-16x86/speculation: Disable STIBP when enhanced IBRS is in useTim Chen1-0/+7
2019-05-16x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common()Tim Chen1-2/+18
2019-05-16x86/speculation: Remove unnecessary ret variable in cpu_show_common()Tim Chen1-4/+1
2019-05-16x86/speculation: Clean up spectre_v2_parse_cmdline()Tim Chen1-14/+13
2019-05-16x86/speculation: Update the TIF_SSBD commentTim Chen1-1/+1
2019-05-16x86/speculation: Propagate information about RSB filling mitigation to sysfsJiri Kosina1-1/+2
2019-05-16x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigationJiri Kosina1-5/+50
2019-05-16x86/speculation: Apply IBPB more strictly to avoid cross-process data leakJiri Kosina1-11/+20
2019-05-16x86/mm: Use WRITE_ONCE() when setting PTEsNadav Amit2-11/+11
2019-05-16KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabledThomas Gleixner1-4/+4
2019-05-16x86/cpu: Sanitize FAM6_ATOM namingPeter Zijlstra2-27/+31