aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/arch/x86/include/asm/nospec-branch.h (follow)
AgeCommit message (Expand)AuthorFilesLines
2022-02-21x86/speculation: Add eIBRS + Retpoline optionsPeter Zijlstra1-1/+3
2022-02-21x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCEPeter Zijlstra (Intel)1-6/+6
2021-10-28bpf,x86: Respect X86_FEATURE_RETPOLINE*Peter Zijlstra1-59/+0
2021-10-28x86/retpoline: Create a retpoline thunk arrayPeter Zijlstra1-1/+7
2021-10-28x86/retpoline: Move the retpoline thunk declarations to nospec-branch.hPeter Zijlstra1-0/+7
2021-07-28x86/mm: Prepare for opt-in based L1D flush in switch_mm()Balbir Singh1-0/+2
2021-04-27Merge tag 'x86_core_for_v5.13' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tipLinus Torvalds1-3/+3
2021-04-26Merge tag 'x86_cleanups_for_v5.13' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tipLinus Torvalds1-1/+1
2021-04-02x86/retpoline: Simplify retpolinesPeter Zijlstra1-3/+3
2021-03-21x86: Remove unusual Unicode characters from commentsIngo Molnar1-1/+1
2021-03-11x86/alternative: Merge include filesJuergen Gross1-1/+0
2020-10-15Merge tag 'net-next-5.10' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-nextLinus Torvalds1-8/+8
2020-09-17bpf, x64: use %rcx instead of %rax for tail call retpolinesMaciej Fijalkowski1-8/+8
2020-09-10objtool: Rename frame.h -> objtool.hJulien Thierry1-1/+1
2020-06-11x86/speculation/mds: Mark mds_user_clear_cpu_buffers() __always_inlineThomas Gleixner1-2/+2
2020-04-30x86/retpoline: Fix retpoline unwindPeter Zijlstra1-48/+8
2020-04-30x86: Change {JMP,CALL}_NOSPEC argumentPeter Zijlstra1-8/+8
2020-04-30x86/speculation: Change FILL_RETURN_BUFFER to work with objtoolPeter Zijlstra1-6/+10
2020-04-14KVM: SVM: move more vmentry code to assemblyPaolo Bonzini1-21/+0
2020-01-02x86/nospec: Remove unused RSB_FILL_LOOPSAnthony Steinhauser1-1/+0
2019-10-28x86/speculation/taa: Add mitigation for TSX Async AbortPawan Gupta1-2/+2
2019-08-23x86/retpoline: Don't clobber RFLAGS during CALL_NOSPEC on i386Sean Christopherson1-1/+1
2019-05-14Merge branch 'x86-mds-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tipLinus Torvalds1-0/+50
2019-04-03x86/nospec, objtool: Introduce ANNOTATE_IGNORE_ALTERNATIVEPeter Zijlstra1-19/+9
2019-03-06x86/speculation/mds: Conditionally clear CPU buffers on idle entryThomas Gleixner1-0/+12
2019-03-06x86/speculation/mds: Clear CPU buffers on exit to userThomas Gleixner1-0/+13
2019-03-06x86/speculation/mds: Add mds_clear_cpu_buffers()Thomas Gleixner1-0/+25
2018-12-18x86/speculation: Add support for STIBP always-on preferred modeThomas Lendacky1-0/+1
2018-11-28x86/speculation: Add seccomp Spectre v2 user space protection modeThomas Gleixner1-0/+1
2018-11-28x86/speculation: Add prctl() control for indirect branch speculationThomas Gleixner1-0/+1
2018-11-28x86/speculation: Prepare for conditional IBPB in switch_mm()Thomas Gleixner1-0/+2
2018-11-28x86/speculation: Add command line control for indirect branch speculationThomas Gleixner1-0/+10
2018-11-28x86/retpoline: Remove minimal retpoline supportZhenzhong Duan1-2/+0
2018-11-28x86/retpoline: Make CONFIG_RETPOLINE depend on compiler supportZhenzhong Duan1-4/+6
2018-09-23x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variantZhenzhong Duan1-4/+13
2018-08-03x86/speculation: Support Enhanced IBRS on future CPUsSai Praneeth1-0/+1
2018-07-19x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigationJiang Biao1-1/+0
2018-05-26Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/netDavid S. Miller1-13/+30
2018-05-17x86/bugs: Remove x86_spec_ctrl_set()Thomas Gleixner1-2/+0
2018-05-17x86/bugs: Expose x86_spec_ctrl_base directlyThomas Gleixner1-11/+5
2018-05-14bpf, x64: clean up retpoline emission slightlyDaniel Borkmann1-15/+14
2018-05-14x86/cpu: Make alternative_msr_write work for 32-bit codeJim Mattson1-2/+2
2018-05-05x86/speculation: Make "seccomp" the default mode for Speculative Store BypassKees Cook1-0/+1
2018-05-03bpf, x86_32: add eBPF JIT compiler for ia32Wang YanQing1-3/+27
2018-05-03x86/speculation: Add prctl for Speculative Store Bypass mitigationThomas Gleixner1-0/+1
2018-05-03x86/speculation: Create spec-ctrl.h to avoid include hellThomas Gleixner1-14/+0
2018-05-03x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requestedKonrad Rzeszutek Wilk1-0/+4
2018-05-03x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigationKonrad Rzeszutek Wilk1-0/+6
2018-05-03x86/bugs, KVM: Support the combination of guest and host IBRSKonrad Rzeszutek Wilk1-0/+10
2018-05-03x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bitsKonrad Rzeszutek Wilk1-4/+20