summaryrefslogtreecommitdiff
path: root/arch
AgeCommit message (Expand)AuthorFilesLines
2018-03-19cris: Remove old legacy "-traditional" flag from arch-v10/lib/MakefilePaul Gortmaker1-3/+0
2018-03-19x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospecDan Williams4-5/+37
2018-03-19x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospecDan Williams1-0/+5
2018-03-19x86/spectre: Fix an error messageDan Carpenter1-2/+1
2018-03-19x86/cpufeatures: Clean up Spectre v2 related CPUID flagsDavid Woodhouse1-3/+3
2018-03-19x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALLDarren Kenny1-1/+1
2018-03-19x86/spectre: Simplify spectre_v2 command line parsingKarimAllah Ahmed1-30/+56
2018-03-19x86/kvm: Update spectre-v1 mitigationDan Williams1-11/+10
2018-03-19x86/paravirt: Remove 'noreplace-paravirt' cmdline optionJosh Poimboeuf1-14/+0
2018-03-19x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"Colin Ian King1-1/+1
2018-03-19x86/spectre: Report get_user mitigation for spectre_v1Dan Williams1-1/+1
2018-03-19x86/syscall: Sanitize syscall table de-references under speculationBen Hutchings3-18/+34
2018-03-19x86/get_user: Use pointer masking to limit speculationDan Williams1-0/+8
2018-03-19x86: Introduce barrier_nospecDan Williams1-2/+5
2018-03-19x86: Implement array_index_mask_nospecDan Williams1-0/+24
2018-03-19x86/spectre: Check CONFIG_RETPOLINE in command line parserDou Liyang1-3/+3
2018-03-19x86/cpu/bugs: Make retpoline module warning conditionalThomas Gleixner1-2/+10
2018-03-19x86/bugs: Drop one "mitigation" from dmesgBorislav Petkov1-1/+1
2018-03-19x86/nospec: Fix header guards namesBorislav Petkov1-3/+3
2018-03-19module/retpoline: Warn about missing retpoline in moduleAndi Kleen1-1/+16
2018-03-19x86/retpoline: Remove the esp/rsp thunkWaiman Long2-2/+0
2018-03-19x86/retpoline: Fill RSB on context switch for affected CPUsDavid Woodhouse3-0/+74
2018-03-19x86/cpu/intel: Introduce macros for Intel family numbersDave Hansen1-0/+68
2018-03-19x86/retpoline: Optimize inline assembler for vmexit_fill_RSBAndi Kleen1-3/+4
2018-03-19kprobes/x86: Disable optimizing on the function jumps to indirect thunkMasami Hiramatsu1-1/+22
2018-03-19kprobes/x86: Blacklist indirect thunk functions for kprobesMasami Hiramatsu2-0/+2
2018-03-19retpoline: Introduce start/end markers of indirect thunkMasami Hiramatsu3-1/+10
2018-03-19x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macrosTom Lendacky1-1/+5
2018-03-19x86/retpoline: Remove compile time warningThomas Gleixner1-2/+0
2018-03-19x86/retpoline: Fill return stack buffer on vmexitDavid Woodhouse3-1/+83
2018-03-19x86/retpoline/irq32: Convert assembler indirect jumpsAndi Kleen1-4/+5
2018-03-19x86/retpoline/checksum32: Convert assembler indirect jumpsDavid Woodhouse1-3/+4
2018-03-19x86/retpoline/xen: Convert Xen hypercall indirect jumpsDavid Woodhouse1-2/+3
2018-03-19x86/retpoline/ftrace: Convert ftrace assembler indirect jumpsDavid Woodhouse2-5/+6
2018-03-19x86/retpoline/entry: Convert entry assembler indirect jumpsDavid Woodhouse3-4/+42
2018-03-19x86/spectre: Add boot time option to select Spectre v2 mitigationDavid Woodhouse3-5/+167
2018-03-19x86/retpoline: Add initial retpoline supportDavid Woodhouse8-0/+209
2018-03-19x86/asm: Use register variable to get stack pointer valueAndrey Ryabinin2-3/+11
2018-03-19x86/asm: Make asm/alternative.h safe from assemblyAndy Lutomirski1-0/+4
2018-03-19x86/cpu/AMD: Use LFENCE_RDTSC in preference to MFENCE_RDTSCTom Lendacky2-2/+17
2018-03-19x86/cpu/AMD: Make LFENCE a serializing instructionTom Lendacky2-0/+12
2018-03-19x86/alternatives: Fix optimize_nops() checkingBorislav Petkov1-2/+5
2018-03-19x86/alternatives: Make optimize_nops() interrupt safe and syncedThomas Gleixner1-0/+5
2018-03-19x86/alternatives: Fix ALTERNATIVE_2 padding generation properlyBorislav Petkov3-8/+26
2018-03-19x86/alternatives: Guard NOPs optimizationBorislav Petkov1-0/+3
2018-03-19x86/cpu: Implement CPU vulnerabilites sysfs functionsThomas Gleixner2-0/+30
2018-03-19x86/cpu: Merge bugs.c and bugs_64.cBorislav Petkov3-40/+27
2018-03-19x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]David Woodhouse2-0/+5
2018-03-19x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWNThomas Gleixner2-2/+2
2018-03-19x86/cpu, x86/pti: Do not enable PTI on AMD processorsTom Lendacky1-2/+2