aboutsummaryrefslogtreecommitdiff
path: root/arch/x86/include/asm/nospec-branch.h
AgeCommit message (Expand)AuthorFilesLines
2022-08-01Merge tag 'x86_core_for_v6.0_rc1' of git://git.kernel.org/pub/scm/linux/kerne...Gravatar Linus Torvalds 1-6/+18
2022-07-21x86,nospec: Simplify {JMP,CALL}_NOSPECGravatar Peter Zijlstra 1-6/+18
2022-07-18x86/amd: Use IBPB for firmware callsGravatar Peter Zijlstra 1-0/+2
2022-07-14x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_currentGravatar Nathan Chancellor 1-1/+2
2022-06-29x86/retbleed: Add fine grained Kconfig knobsGravatar Peter Zijlstra 1-2/+8
2022-06-27KVM: VMX: Prevent guest RSB poisoning attacks with eIBRSGravatar Josh Poimboeuf 1-0/+1
2022-06-27x86/speculation: Fix firmware entry SPEC_CTRL handlingGravatar Josh Poimboeuf 1-6/+4
2022-06-27x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=nGravatar Josh Poimboeuf 1-2/+0
2022-06-27objtool: Add entry UNRET validationGravatar Peter Zijlstra 1-0/+12
2022-06-27x86/bugs: Add retbleed=ibpbGravatar Peter Zijlstra 1-2/+6
2022-06-27objtool: Update Retpoline validationGravatar Peter Zijlstra 1-0/+6
2022-06-27intel_idle: Disable IBRS during long idleGravatar Peter Zijlstra 1-0/+1
2022-06-27x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRSGravatar Pawan Gupta 1-0/+1
2022-06-27x86/bugs: Optimize SPEC_CTRL MSR writesGravatar Peter Zijlstra 1-1/+1
2022-06-27x86/bugs: Keep a per-CPU IA32_SPEC_CTRL valueGravatar Peter Zijlstra 1-0/+1
2022-06-27x86: Add magic AMD return-thunkGravatar Peter Zijlstra 1-0/+17
2022-06-27x86/retpoline: Use -mfunction-returnGravatar Peter Zijlstra 1-0/+2
2022-06-27x86/retpoline: Cleanup some #ifdeferyGravatar Peter Zijlstra 1-4/+3
2022-05-21x86/speculation/mmio: Add mitigation for Processor MMIO Stale DataGravatar Pawan Gupta 1-0/+2
2022-02-21x86/speculation: Add eIBRS + Retpoline optionsGravatar Peter Zijlstra 1-1/+3
2022-02-21x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCEGravatar Peter Zijlstra (Intel) 1-6/+6
2021-10-28bpf,x86: Respect X86_FEATURE_RETPOLINE*Gravatar Peter Zijlstra 1-59/+0
2021-10-28x86/retpoline: Create a retpoline thunk arrayGravatar Peter Zijlstra 1-1/+7
2021-10-28x86/retpoline: Move the retpoline thunk declarations to nospec-branch.hGravatar Peter Zijlstra 1-0/+7
2021-07-28x86/mm: Prepare for opt-in based L1D flush in switch_mm()Gravatar Balbir Singh 1-0/+2
2021-04-27Merge tag 'x86_core_for_v5.13' of git://git.kernel.org/pub/scm/linux/kernel/g...Gravatar Linus Torvalds 1-3/+3
2021-04-26Merge tag 'x86_cleanups_for_v5.13' of git://git.kernel.org/pub/scm/linux/kern...Gravatar Linus Torvalds 1-1/+1
2021-04-02x86/retpoline: Simplify retpolinesGravatar Peter Zijlstra 1-3/+3
2021-03-21x86: Remove unusual Unicode characters from commentsGravatar Ingo Molnar 1-1/+1
2021-03-11x86/alternative: Merge include filesGravatar Juergen Gross 1-1/+0
2020-10-15Merge tag 'net-next-5.10' of git://git.kernel.org/pub/scm/linux/kernel/git/ne...Gravatar Linus Torvalds 1-8/+8
2020-09-17bpf, x64: use %rcx instead of %rax for tail call retpolinesGravatar Maciej Fijalkowski 1-8/+8
2020-09-10objtool: Rename frame.h -> objtool.hGravatar Julien Thierry 1-1/+1
2020-06-11x86/speculation/mds: Mark mds_user_clear_cpu_buffers() __always_inlineGravatar Thomas Gleixner 1-2/+2
2020-04-30x86/retpoline: Fix retpoline unwindGravatar Peter Zijlstra 1-48/+8
2020-04-30x86: Change {JMP,CALL}_NOSPEC argumentGravatar Peter Zijlstra 1-8/+8
2020-04-30x86/speculation: Change FILL_RETURN_BUFFER to work with objtoolGravatar Peter Zijlstra 1-6/+10
2020-04-14KVM: SVM: move more vmentry code to assemblyGravatar Paolo Bonzini 1-21/+0
2020-01-02x86/nospec: Remove unused RSB_FILL_LOOPSGravatar Anthony Steinhauser 1-1/+0
2019-10-28x86/speculation/taa: Add mitigation for TSX Async AbortGravatar Pawan Gupta 1-2/+2
2019-08-23x86/retpoline: Don't clobber RFLAGS during CALL_NOSPEC on i386Gravatar Sean Christopherson 1-1/+1
2019-05-14Merge branch 'x86-mds-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Gravatar Linus Torvalds 1-0/+50
2019-04-03x86/nospec, objtool: Introduce ANNOTATE_IGNORE_ALTERNATIVEGravatar Peter Zijlstra 1-19/+9
2019-03-06x86/speculation/mds: Conditionally clear CPU buffers on idle entryGravatar Thomas Gleixner 1-0/+12
2019-03-06x86/speculation/mds: Clear CPU buffers on exit to userGravatar Thomas Gleixner 1-0/+13
2019-03-06x86/speculation/mds: Add mds_clear_cpu_buffers()Gravatar Thomas Gleixner 1-0/+25
2018-12-18x86/speculation: Add support for STIBP always-on preferred modeGravatar Thomas Lendacky 1-0/+1
2018-11-28x86/speculation: Add seccomp Spectre v2 user space protection modeGravatar Thomas Gleixner 1-0/+1
2018-11-28x86/speculation: Add prctl() control for indirect branch speculationGravatar Thomas Gleixner 1-0/+1
2018-11-28x86/speculation: Prepare for conditional IBPB in switch_mm()Gravatar Thomas Gleixner 1-0/+2