summaryrefslogtreecommitdiffstats
path: root/arch/x86/lib/retpoline.S
Commit message (Expand)AuthorAgeFilesLines
* x86/retpoline: Add NOENDBR annotation to the SRSO dummy return thunkBorislav Petkov (AMD)2024-04-101-0/+1
* x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSOBorislav Petkov (AMD)2024-04-101-1/+4
* x86/bugs: Fix the SRSO mitigation on Zen3/4Borislav Petkov (AMD)2024-04-101-5/+5
* x86/srso: Disentangle rethunk-dependent optionsJosh Poimboeuf2024-04-101-71/+87
* x86/srso: Improve i-cache locality for alias mitigationJosh Poimboeuf2024-04-101-3/+2
* x86/srso: Explain the untraining sequences a bit moreBorislav Petkov (AMD)2023-08-161-0/+19
* x86/cpu: Cleanup the untrain messPeter Zijlstra2023-08-161-0/+7
* x86/cpu: Rename srso_(.*)_alias to srso_alias_\1Peter Zijlstra2023-08-161-13/+13
* x86/cpu: Rename original retbleed methodsPeter Zijlstra2023-08-161-15/+15
* x86/cpu: Clean up SRSO return thunk messPeter Zijlstra2023-08-161-16/+42
* x86/cpu: Fix up srso_safe_ret() and __x86_return_thunk()Peter Zijlstra2023-08-161-2/+2
* x86/cpu: Fix __x86_return_thunk symbol typePeter Zijlstra2023-08-161-1/+3
* x86/retpoline,kprobes: Fix position of thunk sections with CONFIG_LTO_CLANGPetr Pavlu2023-08-141-4/+4
* x86/retpoline: Don't clobber RFLAGS during srso_safe_ret()Sean Christopherson2023-08-141-4/+3
* x86/srso: Add a forgotten NOENDBR annotationBorislav Petkov (AMD)2023-07-291-0/+1
* x86/srso: Add a Speculative RAS Overflow mitigationBorislav Petkov (AMD)2023-07-271-4/+78
* x86/retbleed: Add __x86_return_thunk alignment checksBorislav Petkov (AMD)2023-05-171-1/+1
* x86/retbleed: Fix return thunk alignmentBorislav Petkov (AMD)2023-05-121-2/+2
* x86,objtool: Split UNWIND_HINT_EMPTY in twoJosh Poimboeuf2023-03-231-3/+3
* x86/calldepth: Add ret/call counting for debugThomas Gleixner2022-10-171-1/+6
* x86/retpoline: Add SKL retthunk retpolinesPeter Zijlstra2022-10-171-8/+63
* x86/retbleed: Add SKL return thunkThomas Gleixner2022-10-171-0/+31
* x86/retbleed: Add fine grained Kconfig knobsPeter Zijlstra2022-06-291-0/+4
* x86: Add magic AMD return-thunkPeter Zijlstra2022-06-271-4/+60
* x86/retpoline: Use -mfunction-returnPeter Zijlstra2022-06-271-0/+13
* x86/retpoline: Swizzle retpoline thunkPeter Zijlstra2022-06-271-3/+3
* x86/retpoline: Add ANNOTATE_NOENDBR for retpolinesJosh Poimboeuf2022-04-191-1/+1
* x86/ibt: Annotate text referencesPeter Zijlstra2022-03-151-0/+1
* x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCEPeter Zijlstra (Intel)2022-02-211-1/+1
* x86: Add straight-line-speculation mitigationPeter Zijlstra2021-12-091-1/+1
* x86: Prepare asm files for straight-line-speculationPeter Zijlstra2021-12-081-1/+1
* x86/retpoline: Create a retpoline thunk arrayPeter Zijlstra2021-10-281-5/+9
* x86/asm: Fixup odd GEN-for-each-reg.h usagePeter Zijlstra2021-10-281-2/+2
* x86/retpoline: Remove unused replacement symbolsPeter Zijlstra2021-10-281-42/+0
* objtool/x86: Ignore __x86_indirect_alt_* symbolsPeter Zijlstra2021-06-211-0/+4
* objtool/x86: Rewrite retpoline thunk callsPeter Zijlstra2021-04-021-1/+40
* x86/retpoline: Simplify retpolinesPeter Zijlstra2021-04-021-17/+17
* x86/alternative: Merge include filesJuergen Gross2021-03-111-1/+1
* objtool: Combine UNWIND_HINT_RET_OFFSET and UNWIND_HINT_FUNCJosh Poimboeuf2021-01-261-1/+1
* x86/retpoline: Fix retpoline unwindPeter Zijlstra2020-04-301-3/+23
* x86: Simplify retpoline declarationPeter Zijlstra2020-04-301-21/+16
* x86/asm: Change all ENTRY+ENDPROC to SYM_FUNC_*Jiri Slaby2019-10-181-2/+2
* Revert "x86/retpoline: Simplify vmexit_fill_RSB()"David Woodhouse2018-02-201-56/+0
* x86/retpoline: Simplify vmexit_fill_RSB()Borislav Petkov2018-01-271-0/+56
* x86/retpoline: Remove the esp/rsp thunkWaiman Long2018-01-241-1/+0
* kprobes/x86: Blacklist indirect thunk functions for kprobesMasami Hiramatsu2018-01-191-1/+2
* retpoline: Introduce start/end markers of indirect thunkMasami Hiramatsu2018-01-191-1/+1
* x86/retpoline: Add initial retpoline supportDavid Woodhouse2018-01-121-0/+48