summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Linux 4.9.176v4.9.176Greg Kroah-Hartman2019-05-141-1/+1
* x86/cpu/bugs: Use __initconst for 'const' init dataAndi Kleen2019-05-141-3/+3
* x86: stop exporting msr-index.h to userlandNicolas Dichtel2019-05-141-1/+0
* x86/speculation/mds: Fix documentation typoJosh Poimboeuf2019-05-141-1/+1
* Documentation: Correct the possible MDS sysfs valuesTyler Hicks2019-05-141-16/+13
* x86/mds: Add MDSUM variant to the MDS documentationspeck for Pawan Gupta2019-05-142-2/+8
* x86/speculation/mds: Add 'mitigations=' support for MDSJosh Poimboeuf2019-05-142-2/+5
* x86/speculation: Support 'mitigations=' cmdline optionJosh Poimboeuf2019-05-143-8/+23
* cpu/speculation: Add 'mitigations=' cmdline optionJosh Poimboeuf2019-05-143-0/+63
* x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations offKonrad Rzeszutek Wilk2019-05-141-1/+2
* x86/speculation/mds: Fix commentBoris Ostrovsky2019-05-141-1/+1
* x86/speculation/mds: Add SMT warning messageJosh Poimboeuf2019-05-141-0/+8
* x86/speculation: Move arch_smt_update() call to after mitigation decisionsJosh Poimboeuf2019-05-141-3/+2
* x86/speculation/mds: Add mds=full,nosmt cmdline optionJosh Poimboeuf2019-05-143-2/+17
* Documentation: Add MDS vulnerability documentationThomas Gleixner2019-05-145-2/+312
* Documentation: Move L1TF to separate directoryThomas Gleixner2019-05-147-6/+24
* x86/speculation/mds: Add mitigation mode VMWERVThomas Gleixner2019-05-143-6/+40
* x86/speculation/mds: Add sysfs reporting for MDSThomas Gleixner2019-05-144-0/+39
* x86/speculation/mds: Add mitigation control for MDSThomas Gleixner2019-05-143-0/+97
* x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner2019-05-145-0/+68
* x86/kvm/vmx: Add MDS protection when L1D Flush is not activeThomas Gleixner2019-05-142-0/+4
* x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner2019-05-146-0/+83
* x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner2019-05-145-0/+153
* x86/kvm: Expose X86_FEATURE_MD_CLEAR to guestsAndi Kleen2019-05-141-1/+1
* x86/speculation/mds: Add BUG_MSBDS_ONLYThomas Gleixner2019-05-142-8/+13
* x86/speculation/mds: Add basic bug infrastructure for MDSAndi Kleen2019-05-143-8/+22
* x86/speculation: Consolidate CPU whitelistsThomas Gleixner2019-05-141-49/+56
* x86/msr-index: Cleanup bit definesThomas Gleixner2019-05-142-17/+19
* kvm: x86: Report STIBP on GET_SUPPORTED_CPUIDEduardo Habkost2019-05-141-2/+3
* x86/speculation: Provide IBPB always command line optionsThomas Gleixner2019-05-142-11/+35
* x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner2019-05-143-2/+25
* x86/speculation: Enable prctl mode for spectre_v2_userThomas Gleixner2019-05-142-10/+38
* x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner2019-05-146-0/+92
* x86/speculation: Prevent stale SPEC_CTRL msr contentThomas Gleixner2019-05-144-18/+40
* x86/speculation: Prepare arch_smt_update() for PRCTL modeThomas Gleixner2019-05-141-21/+25
* x86/speculation: Split out TIF updateThomas Gleixner2019-05-141-12/+23
* x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner2019-05-144-35/+117
* x86/speculation: Avoid __switch_to_xtra() callsThomas Gleixner2019-05-142-2/+26
* x86/process: Consolidate and simplify switch_to_xtra() codeThomas Gleixner2019-05-145-20/+37
* x86/speculation: Prepare for per task indirect branch speculation controlTim Chen2019-05-145-5/+41
* x86/speculation: Add command line control for indirect branch speculationThomas Gleixner2019-05-143-19/+156
* x86/speculation: Unify conditional spectre v2 print functionsThomas Gleixner2019-05-141-13/+4
* x86/speculataion: Mark command line parser data __initdataThomas Gleixner2019-05-141-2/+2
* x86/speculation: Mark string arrays const correctlyThomas Gleixner2019-05-141-3/+3
* x86/speculation: Reorder the spec_v2 codeThomas Gleixner2019-05-141-88/+88
* x86/l1tf: Show actual SMT stateThomas Gleixner2019-05-141-2/+3
* x86/speculation: Rework SMT state changeThomas Gleixner2019-05-143-12/+16
* sched: Add sched_smt_active()Ben Hutchings2019-05-143-0/+38
* x86/Kconfig: Select SCHED_SMT if SMP enabledThomas Gleixner2019-05-141-7/+1
* x86/speculation: Reorganize speculation control MSRs updateTim Chen2019-05-141-17/+29