summaryrefslogtreecommitdiff
AgeCommit message (Expand)AuthorFilesLines
2018-03-19Linux 3.2.101v3.2.101Ben Hutchings1-1/+1
2018-03-19cris: Remove old legacy "-traditional" flag from arch-v10/lib/MakefilePaul Gortmaker1-3/+0
2018-03-19x86: fix build warnign with 32-bit PAEArnd Bergmann1-1/+1
2018-03-19x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospecDan Williams4-5/+37
2018-03-19x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospecDan Williams1-0/+5
2018-03-19nospec: Include <asm/barrier.h> dependencyDan Williams1-0/+1
2018-03-19nospec: Kill array_index_nospec_mask_check()Dan Williams1-21/+1
2018-03-19nospec: Move array_index_nospec() parameter checking into separate macroWill Deacon1-15/+21
2018-03-19x86/spectre: Fix an error messageDan Carpenter1-2/+1
2018-03-19x86/cpufeatures: Clean up Spectre v2 related CPUID flagsDavid Woodhouse1-3/+3
2018-03-19x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALLDarren Kenny1-1/+1
2018-03-19x86/spectre: Simplify spectre_v2 command line parsingKarimAllah Ahmed1-30/+56
2018-03-19x86/retpoline: Avoid retpolines for built-in __init functionsDavid Woodhouse1-1/+8
2018-03-19x86/kvm: Update spectre-v1 mitigationDan Williams1-11/+10
2018-03-19x86/paravirt: Remove 'noreplace-paravirt' cmdline optionJosh Poimboeuf2-16/+0
2018-03-19x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"Colin Ian King1-1/+1
2018-03-19x86/spectre: Report get_user mitigation for spectre_v1Dan Williams1-1/+1
2018-03-19vfs, fdtable: Prevent bounds-check bypass via speculative executionDan Williams1-1/+4
2018-03-19x86/syscall: Sanitize syscall table de-references under speculationBen Hutchings3-18/+34
2018-03-19x86/get_user: Use pointer masking to limit speculationDan Williams1-0/+8
2018-03-19x86: Introduce barrier_nospecDan Williams1-2/+5
2018-03-19x86: Implement array_index_mask_nospecDan Williams1-0/+24
2018-03-19array_index_nospec: Sanitize speculative array de-referencesDan Williams1-0/+72
2018-03-19Documentation: Document array_index_nospecMark Rutland1-0/+90
2018-03-19x86/spectre: Check CONFIG_RETPOLINE in command line parserDou Liyang1-3/+3
2018-03-19x86/cpu/bugs: Make retpoline module warning conditionalThomas Gleixner1-2/+10
2018-03-19x86/bugs: Drop one "mitigation" from dmesgBorislav Petkov1-1/+1
2018-03-19x86/nospec: Fix header guards namesBorislav Petkov1-3/+3
2018-03-19module/retpoline: Warn about missing retpoline in moduleAndi Kleen4-1/+45
2018-03-19x86/retpoline: Remove the esp/rsp thunkWaiman Long2-2/+0
2018-03-19x86/retpoline: Fill RSB on context switch for affected CPUsDavid Woodhouse3-0/+74
2018-03-19x86/cpu/intel: Introduce macros for Intel family numbersDave Hansen1-0/+68
2018-03-19x86/retpoline: Optimize inline assembler for vmexit_fill_RSBAndi Kleen1-3/+4
2018-03-19x86/pti: Document fix wrong indexzhenwei.pi1-1/+1
2018-03-19kprobes/x86: Disable optimizing on the function jumps to indirect thunkMasami Hiramatsu1-1/+22
2018-03-19kprobes/x86: Blacklist indirect thunk functions for kprobesMasami Hiramatsu3-1/+11
2018-03-19retpoline: Introduce start/end markers of indirect thunkMasami Hiramatsu3-1/+10
2018-03-19x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macrosTom Lendacky1-1/+5
2018-03-19x86/retpoline: Remove compile time warningThomas Gleixner1-2/+0
2018-03-19x86/retpoline: Fill return stack buffer on vmexitDavid Woodhouse3-1/+83
2018-03-19x86/retpoline/irq32: Convert assembler indirect jumpsAndi Kleen1-4/+5
2018-03-19x86/retpoline/checksum32: Convert assembler indirect jumpsDavid Woodhouse1-3/+4
2018-03-19x86/retpoline/xen: Convert Xen hypercall indirect jumpsDavid Woodhouse1-2/+3
2018-03-19x86/retpoline/hyperv: Convert assembler indirect jumpsDavid Woodhouse1-9/+16
2018-03-19x86/retpoline/ftrace: Convert ftrace assembler indirect jumpsDavid Woodhouse2-5/+6
2018-03-19x86/retpoline/entry: Convert entry assembler indirect jumpsDavid Woodhouse3-4/+42
2018-03-19x86/spectre: Add boot time option to select Spectre v2 mitigationDavid Woodhouse4-5/+195
2018-03-19x86/retpoline: Add initial retpoline supportDavid Woodhouse8-0/+209
2018-03-19x86/asm: Use register variable to get stack pointer valueAndrey Ryabinin2-3/+11
2018-03-19kconfig.h: use __is_defined() to check if MODULE is definedMasahiro Yamada1-4/+5