summaryrefslogtreecommitdiffstats
path: root/arch/x86/include/asm/nospec-branch.h
Commit message (Expand)AuthorAgeFilesLines
* x86/speculation: Add support for STIBP always-on preferred modeThomas Lendacky2018-12-181-0/+1
* x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner2018-11-281-0/+1
* x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner2018-11-281-0/+1
* x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner2018-11-281-0/+2
* x86/speculation: Add command line control for indirect branch speculationThomas Gleixner2018-11-281-0/+10
* x86/retpoline: Remove minimal retpoline supportZhenzhong Duan2018-11-281-2/+0
* x86/retpoline: Make CONFIG_RETPOLINE depend on compiler supportZhenzhong Duan2018-11-281-4/+6
* x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variantZhenzhong Duan2018-09-231-4/+13
* x86/speculation: Support Enhanced IBRS on future CPUsSai Praneeth2018-08-031-0/+1
* x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigationJiang Biao2018-07-191-1/+0
* Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller2018-05-261-13/+30
|\
| * x86/bugs: Remove x86_spec_ctrl_set()Thomas Gleixner2018-05-171-2/+0
| * x86/bugs: Expose x86_spec_ctrl_base directlyThomas Gleixner2018-05-171-11/+5
| * x86/cpu: Make alternative_msr_write work for 32-bit codeJim Mattson2018-05-141-2/+2
| * x86/speculation: Make "seccomp" the default mode for Speculative Store BypassKees Cook2018-05-051-0/+1
| * x86/speculation: Add prctl for Speculative Store Bypass mitigationThomas Gleixner2018-05-031-0/+1
| * x86/speculation: Create spec-ctrl.h to avoid include hellThomas Gleixner2018-05-031-14/+0
| * x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requestedKonrad Rzeszutek Wilk2018-05-031-0/+4
| * x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigationKonrad Rzeszutek Wilk2018-05-031-0/+6
| * x86/bugs, KVM: Support the combination of guest and host IBRSKonrad Rzeszutek Wilk2018-05-031-0/+10
| * x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bitsKonrad Rzeszutek Wilk2018-05-031-4/+20
| * x86/nospec: Simplify alternative_msr_write()Linus Torvalds2018-05-031-9/+10
* | bpf, x64: clean up retpoline emission slightlyDaniel Borkmann2018-05-141-15/+14
* | bpf, x86_32: add eBPF JIT compiler for ia32Wang YanQing2018-05-031-3/+27
|/
* Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2018-03-181-1/+4
|\
| * x86/speculation, objtool: Annotate indirect calls/jumps for objtool on 32-bit...Andy Whitcroft2018-03-141-1/+4
* | Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2018-02-261-20/+118
|\|
| * x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPPIngo Molnar2018-02-211-12/+14
| * x86/speculation, objtool: Annotate indirect calls/jumps for objtoolPeter Zijlstra2018-02-211-4/+23
| * x86/speculation: Use IBRS if available before calling into firmwareDavid Woodhouse2018-02-201-9/+30
| * Revert "x86/retpoline: Simplify vmexit_fill_RSB()"David Woodhouse2018-02-201-7/+63
* | bpf, x64: implement retpoline for tail callDaniel Borkmann2018-02-221-0/+37
|/
* x86/speculation: Add <asm/msr-index.h> dependencyPeter Zijlstra2018-02-151-0/+1
* Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()"David Woodhouse2018-02-131-4/+9
* x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALLDarren Kenny2018-02-021-1/+1
* x86/speculation: Simplify indirect_branch_prediction_barrier()Borislav Petkov2018-01-271-9/+4
* x86/retpoline: Simplify vmexit_fill_RSB()Borislav Petkov2018-01-271-63/+7
* x86/cpufeatures: Clean up Spectre v2 related CPUID flagsDavid Woodhouse2018-01-271-1/+1
* x86/nospec: Fix header guards namesBorislav Petkov2018-01-261-3/+3
* x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) supportDavid Woodhouse2018-01-261-0/+13
* x86/retpoline: Optimize inline assembler for vmexit_fill_RSBAndi Kleen2018-01-191-3/+4
* retpoline: Introduce start/end markers of indirect thunkMasami Hiramatsu2018-01-191-0/+3
* x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macrosTom Lendacky2018-01-151-1/+5
* x86/retpoline: Fill return stack buffer on vmexitDavid Woodhouse2018-01-121-1/+77
* x86/spectre: Add boot time option to select Spectre v2 mitigationDavid Woodhouse2018-01-121-0/+10
* x86/retpoline: Add initial retpoline supportDavid Woodhouse2018-01-121-0/+128