aboutsummaryrefslogtreecommitdiffstats
path: root/arch/x86/kernel/cpu/common.c
Commit message (Expand)AuthorAgeFilesLines
* x86/speculation: Simplify the CPU bug detection logicDominik Brodowski2018-05-231-15/+7
* x86/bugs: Rename SSBD_NO to SSB_NOKonrad Rzeszutek Wilk2018-05-181-1/+1
* KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBDTom Lendacky2018-05-171-1/+2
* x86/cpufeatures: Disentangle SSBD enumerationThomas Gleixner2018-05-171-0/+3
* x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRSThomas Gleixner2018-05-171-2/+7
* x86/speculation: Use synthetic bits for IBRS/IBPB/STIBPBorislav Petkov2018-05-171-4/+10
* x86/bugs: Rename _RDS to _SSBDKonrad Rzeszutek Wilk2018-05-091-1/+1
* x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requestedKonrad Rzeszutek Wilk2018-05-031-0/+4
* x86/bugs/intel: Set proper CPU features and setup RDSKonrad Rzeszutek Wilk2018-05-031-4/+6
* x86/bugs: Expose /sys/../spec_store_bypassKonrad Rzeszutek Wilk2018-05-031-0/+23
* x86/bugs: Concentrate bug detection into a separate functionKonrad Rzeszutek Wilk2018-05-031-10/+11
* x86/cpu: Restore CPUID_8000_0008_EBX reloadThomas Gleixner2018-05-021-1/+5
* Merge branch 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2018-04-151-12/+20
|\
| * x86/cpu: Prevent cpuinfo_x86::x86_phys_bits adjustment corruptionKirill A. Shutemov2018-04-101-12/+20
* | x86/kvm/vmx: avoid expensive rdmsr for MSR_GS_BASEVitaly Kuznetsov2018-03-161-1/+2
|/
* x86/CPU: Check CPU feature bits after microcode upgradeBorislav Petkov2018-02-171-0/+20
* x86/CPU: Add a microcode loader callbackBorislav Petkov2018-02-171-0/+10
* x86/cpu: Change type of x86_cache_size variable to unsigned intGustavo A. R. Silva2018-02-151-1/+1
* x86/cpu: Rename cpu_data.x86_mask to cpu_data.x86_steppingJia Zhang2018-02-151-4/+4
* x86/pti: Mark constant arrays as __initconstArnd Bergmann2018-02-021-2/+2
* x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on IntelDavid Woodhouse2018-01-301-0/+21
* Merge tag 'v4.15' into x86/pti, to be able to merge dependent changesIngo Molnar2018-01-301-3/+28
|\
| * Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2018-01-141-0/+3
| |\
| * \ Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2018-01-051-1/+1
| |\ \
| * \ \ Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2018-01-031-2/+2
| |\ \ \
| * \ \ \ Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2017-12-291-1/+8
| |\ \ \ \
| * \ \ \ \ Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2017-12-231-97/+3
| |\ \ \ \ \
| * \ \ \ \ \ Merge branch 'WIP.x86-pti.entry-for-linus' of git://git.kernel.org/pub/scm/li...Linus Torvalds2017-12-181-46/+124
| |\ \ \ \ \ \
| * | | | | | | x86/umip: Print a line in the boot log that UMIP has been enabledRicardo Neri2017-11-141-0/+2
| * | | | | | | Merge branch 'x86-boot-for-linus' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2017-11-131-2/+2
| |\ \ \ \ \ \ \
| | * | | | | | | x86/boot: Spell out "boot CPU" for BPJean Delvare2017-10-031-2/+2
| * | | | | | | | x86/umip: Enable User-Mode Instruction Prevention at runtimeRicardo Neri2017-11-081-1/+24
* | | | | | | | | x86/pti: Do not enable PTI on CPUs which are not vulnerable to MeltdownDavid Woodhouse2018-01-261-5/+43
* | | | | | | | | x86/cpufeatures: Add CPUID_7_EDX CPUID leafDavid Woodhouse2018-01-261-0/+1
| |_|_|_|_|_|_|/ |/| | | | | | |
* | | | | | | | x86/spectre: Add boot time option to select Spectre v2 mitigationDavid Woodhouse2018-01-121-4/+0
* | | | | | | | x86/retpoline: Add initial retpoline supportDavid Woodhouse2018-01-121-0/+4
* | | | | | | | x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]David Woodhouse2018-01-061-0/+3
| |_|_|_|_|_|/ |/| | | | | |
* | | | | | | x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWNThomas Gleixner2018-01-051-1/+1
| |_|_|_|_|/ |/| | | | |
* | | | | | x86/cpu, x86/pti: Do not enable PTI on AMD processorsTom Lendacky2018-01-031-2/+2
| |_|_|_|/ |/| | | |
* | | | | x86/mm/pti: Force entry through trampoline when PTI activeThomas Gleixner2017-12-231-1/+4
* | | | | x86/cpufeatures: Add X86_BUG_CPU_INSECUREThomas Gleixner2017-12-231-0/+4
| |_|_|/ |/| | |
* | | | x86/cpu_entry_area: Move it to a separate unitThomas Gleixner2017-12-221-94/+0
* | | | x86/entry: Rename SYSENTER_stack to CPU_ENTRY_AREA_entry_stackDave Hansen2017-12-221-7/+7
| |_|/ |/| |
* | | x86/cpufeatures: Make CPU bugs stickyThomas Gleixner2017-12-171-3/+3
* | | x86/entry/64: Make cpu_entry_area.tss read-onlyAndy Lutomirski2017-12-171-10/+19
* | | x86/entry: Clean up the SYSENTER_stack codeAndy Lutomirski2017-12-171-11/+3
* | | x86/entry/64: Move the IST stacks into struct cpu_entry_areaAndy Lutomirski2017-12-171-32/+42
* | | x86/entry/64: Create a per-CPU SYSCALL entry trampolineAndy Lutomirski2017-12-171-1/+14
* | | x86/entry/64: Use a per-CPU trampoline stack for IDT entriesAndy Lutomirski2017-12-171-2/+4
* | | x86/entry: Remap the TSS into the CPU entry areaAndy Lutomirski2017-12-171-6/+35