summaryrefslogtreecommitdiff
path: root/arch/x86/include/asm/nospec-branch.h
AgeCommit message (Expand)Author
2019-11-16x86/speculation/taa: Add mitigation for TSX Async AbortPawan Gupta
2019-09-06x86/retpoline: Don't clobber RFLAGS during CALL_NOSPEC on i386Sean Christopherson
2019-05-14x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner
2019-05-14x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner
2019-05-14x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner
2019-05-14x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner
2019-05-14x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner
2019-05-14x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner
2019-05-14x86/speculation: Add command line control for indirect branch speculationThomas Gleixner
2019-05-14x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigationJiang Biao
2018-11-13x86/speculation: Support Enhanced IBRS on future CPUsSai Praneeth
2018-05-22x86/bugs: Remove x86_spec_ctrl_set()Thomas Gleixner
2018-05-22x86/bugs: Expose x86_spec_ctrl_base directlyThomas Gleixner
2018-05-22x86/cpu: Make alternative_msr_write work for 32-bit codeJim Mattson
2018-05-22x86/speculation: Make "seccomp" the default mode for Speculative Store BypassKees Cook
2018-05-22x86/speculation: Add prctl for Speculative Store Bypass mitigationThomas Gleixner
2018-05-22x86/speculation: Create spec-ctrl.h to avoid include hellThomas Gleixner
2018-05-22x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requestedDavid Woodhouse
2018-05-22x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigationKonrad Rzeszutek Wilk
2018-05-22x86/bugs, KVM: Support the combination of guest and host IBRSKonrad Rzeszutek Wilk
2018-05-22x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bitsKonrad Rzeszutek Wilk
2018-05-22x86/nospec: Simplify alternative_msr_write()Linus Torvalds
2018-03-22x86/speculation, objtool: Annotate indirect calls/jumps for objtool on 32-bit...Andy Whitcroft
2018-03-18x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPPIngo Molnar
2018-03-18x86/speculation, objtool: Annotate indirect calls/jumps for objtoolPeter Zijlstra
2018-03-18x86/speculation: Use IBRS if available before calling into firmwareDavid Woodhouse
2018-03-18Revert "x86/retpoline: Simplify vmexit_fill_RSB()"David Woodhouse
2018-03-11bpf, x64: implement retpoline for tail callDaniel Borkmann
2018-02-22x86/speculation: Add <asm/msr-index.h> dependencyPeter Zijlstra
2018-02-13x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALLDarren Kenny
2018-02-13x86/retpoline: Simplify vmexit_fill_RSB()Borislav Petkov
2018-02-13x86/cpufeatures: Clean up Spectre v2 related CPUID flagsDavid Woodhouse
2018-02-13x86/nospec: Fix header guards namesBorislav Petkov
2018-02-13x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) supportDavid Woodhouse
2018-01-23x86/retpoline: Optimize inline assembler for vmexit_fill_RSBAndi Kleen
2018-01-23retpoline: Introduce start/end markers of indirect thunkMasami Hiramatsu
2018-01-23x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macrosTom Lendacky
2018-01-17x86/retpoline: Fill return stack buffer on vmexitDavid Woodhouse
2018-01-17x86/spectre: Add boot time option to select Spectre v2 mitigationDavid Woodhouse
2018-01-17x86/retpoline: Add initial retpoline supportDavid Woodhouse