summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Linux 3.2.101v3.2.101Ben Hutchings2018-03-191-1/+1
* cris: Remove old legacy "-traditional" flag from arch-v10/lib/MakefilePaul Gortmaker2018-03-191-3/+0
* x86: fix build warnign with 32-bit PAEArnd Bergmann2018-03-191-1/+1
* x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospecDan Williams2018-03-194-5/+37
* x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospecDan Williams2018-03-191-0/+5
* nospec: Include <asm/barrier.h> dependencyDan Williams2018-03-191-0/+1
* nospec: Kill array_index_nospec_mask_check()Dan Williams2018-03-191-21/+1
* nospec: Move array_index_nospec() parameter checking into separate macroWill Deacon2018-03-191-15/+21
* x86/spectre: Fix an error messageDan Carpenter2018-03-191-2/+1
* x86/cpufeatures: Clean up Spectre v2 related CPUID flagsDavid Woodhouse2018-03-191-3/+3
* x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALLDarren Kenny2018-03-191-1/+1
* x86/spectre: Simplify spectre_v2 command line parsingKarimAllah Ahmed2018-03-191-30/+56
* x86/retpoline: Avoid retpolines for built-in __init functionsDavid Woodhouse2018-03-191-1/+8
* x86/kvm: Update spectre-v1 mitigationDan Williams2018-03-191-11/+10
* x86/paravirt: Remove 'noreplace-paravirt' cmdline optionJosh Poimboeuf2018-03-192-16/+0
* x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"Colin Ian King2018-03-191-1/+1
* x86/spectre: Report get_user mitigation for spectre_v1Dan Williams2018-03-191-1/+1
* vfs, fdtable: Prevent bounds-check bypass via speculative executionDan Williams2018-03-191-1/+4
* x86/syscall: Sanitize syscall table de-references under speculationBen Hutchings2018-03-193-18/+34
* x86/get_user: Use pointer masking to limit speculationDan Williams2018-03-191-0/+8
* x86: Introduce barrier_nospecDan Williams2018-03-191-2/+5
* x86: Implement array_index_mask_nospecDan Williams2018-03-191-0/+24
* array_index_nospec: Sanitize speculative array de-referencesDan Williams2018-03-191-0/+72
* Documentation: Document array_index_nospecMark Rutland2018-03-191-0/+90
* x86/spectre: Check CONFIG_RETPOLINE in command line parserDou Liyang2018-03-191-3/+3
* x86/cpu/bugs: Make retpoline module warning conditionalThomas Gleixner2018-03-191-2/+10
* x86/bugs: Drop one "mitigation" from dmesgBorislav Petkov2018-03-191-1/+1
* x86/nospec: Fix header guards namesBorislav Petkov2018-03-191-3/+3
* module/retpoline: Warn about missing retpoline in moduleAndi Kleen2018-03-194-1/+45
* x86/retpoline: Remove the esp/rsp thunkWaiman Long2018-03-192-2/+0
* x86/retpoline: Fill RSB on context switch for affected CPUsDavid Woodhouse2018-03-193-0/+74
* x86/cpu/intel: Introduce macros for Intel family numbersDave Hansen2018-03-191-0/+68
* x86/retpoline: Optimize inline assembler for vmexit_fill_RSBAndi Kleen2018-03-191-3/+4
* x86/pti: Document fix wrong indexzhenwei.pi2018-03-191-1/+1
* kprobes/x86: Disable optimizing on the function jumps to indirect thunkMasami Hiramatsu2018-03-191-1/+22
* kprobes/x86: Blacklist indirect thunk functions for kprobesMasami Hiramatsu2018-03-193-1/+11
* retpoline: Introduce start/end markers of indirect thunkMasami Hiramatsu2018-03-193-1/+10
* x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macrosTom Lendacky2018-03-191-1/+5
* x86/retpoline: Remove compile time warningThomas Gleixner2018-03-191-2/+0
* x86/retpoline: Fill return stack buffer on vmexitDavid Woodhouse2018-03-193-1/+83
* x86/retpoline/irq32: Convert assembler indirect jumpsAndi Kleen2018-03-191-4/+5
* x86/retpoline/checksum32: Convert assembler indirect jumpsDavid Woodhouse2018-03-191-3/+4
* x86/retpoline/xen: Convert Xen hypercall indirect jumpsDavid Woodhouse2018-03-191-2/+3
* x86/retpoline/hyperv: Convert assembler indirect jumpsDavid Woodhouse2018-03-191-9/+16
* x86/retpoline/ftrace: Convert ftrace assembler indirect jumpsDavid Woodhouse2018-03-192-5/+6
* x86/retpoline/entry: Convert entry assembler indirect jumpsDavid Woodhouse2018-03-193-4/+42
* x86/spectre: Add boot time option to select Spectre v2 mitigationDavid Woodhouse2018-03-194-5/+195
* x86/retpoline: Add initial retpoline supportDavid Woodhouse2018-03-198-0/+209
* x86/asm: Use register variable to get stack pointer valueAndrey Ryabinin2018-03-192-3/+11
* kconfig.h: use __is_defined() to check if MODULE is definedMasahiro Yamada2018-03-191-4/+5