Sign in
kernel
/
pub
/
scm
/
linux
/
kernel
/
git
/
bwh
/
linux-stable-queue
/
refs/heads/master
/
.
/
releases
/
3.16.56
tree: fb5ce7017578f3e07adaef22a7bd7331663d21a9 [
path history
]
[
tgz
]
array_index_nospec-sanitize-speculative-array-de-references.patch
documentation-document-array_index_nospec.patch
kconfig.h-use-__is_defined-to-check-if-module-is-defined.patch
kprobes-x86-blacklist-indirect-thunk-functions-for-kprobes.patch
kprobes-x86-disable-optimizing-on-the-function-jumps-to-indirect.patch
kvm-vmx-make-indirect-call-speculation-safe.patch
kvm-vmx-scrub-hardware-gprs-at-vm-exit.patch
kvm-x86-make-indirect-calls-in-emulator-speculation-safe.patch
module-retpoline-warn-about-missing-retpoline-in-module.patch
nl80211-sanitize-array-index-in-parse_txq_params.patch
nospec-include-asm-barrier.h-dependency.patch
nospec-kill-array_index_nospec_mask_check.patch
nospec-move-array_index_nospec-parameter-checking-into-separate.patch
retpoline-introduce-start-end-markers-of-indirect-thunk.patch
series
sysfs-cpu-add-vulnerability-folder.patch
sysfs-cpu-fix-typos-in-vulnerability-documentation.patch
vfs-fdtable-prevent-bounds-check-bypass-via-speculative-execution.patch
x86-alternatives-fix-alternative_2-padding-generation-properly.patch
x86-alternatives-fix-optimize_nops-checking.patch
x86-alternatives-guard-nops-optimization.patch
x86-alternatives-make-optimize_nops-interrupt-safe-and-synced.patch
x86-asm-make-asm-alternative.h-safe-from-assembly.patch
x86-asm-use-register-variable-to-get-stack-pointer-value.patch
x86-bugs-drop-one-mitigation-from-dmesg.patch
x86-clean-up-current_stack_pointer.patch
x86-cpu-amd-make-lfence-a-serializing-instruction.patch
x86-cpu-amd-use-lfence_rdtsc-in-preference-to-mfence_rdtsc.patch
x86-cpu-bugs-make-retpoline-module-warning-conditional.patch
x86-cpu-change-type-of-x86_cache_size-variable-to-unsigned-int.patch
x86-cpu-factor-out-application-of-forced-cpu-caps.patch
x86-cpu-implement-cpu-vulnerabilites-sysfs-functions.patch
x86-cpu-intel-introduce-macros-for-intel-family-numbers.patch
x86-cpu-merge-bugs.c-and-bugs_64.c.patch
x86-cpu-x86-pti-do-not-enable-pti-on-amd-processors.patch
x86-cpufeatures-add-x86_bug_cpu_insecure.patch
x86-cpufeatures-add-x86_bug_spectre_v.patch
x86-cpufeatures-clean-up-spectre-v2-related-cpuid-flags.patch
x86-cpufeatures-make-cpu-bugs-sticky.patch
x86-documentation-add-pti-description.patch
x86-fix-build-warnign-with-32-bit-pae.patch
x86-fix-smap-in-32-bit-environments.patch
x86-get_user-use-pointer-masking-to-limit-speculation.patch
x86-implement-array_index_mask_nospec.patch
x86-introduce-__uaccess_begin_nospec-and-uaccess_try_nospec.patch
x86-introduce-barrier_nospec.patch
x86-kvm-update-spectre-v1-mitigation.patch
x86-nospec-fix-header-guards-names.patch
x86-paravirt-remove-noreplace-paravirt-cmdline-option.patch
x86-pti-document-fix-wrong-index.patch
x86-pti-rename-bug_cpu_insecure-to-bug_cpu_meltdown.patch
x86-reorganize-smap-handling-in-user-space-accesses.patch
x86-retpoline-add-initial-retpoline-support.patch
x86-retpoline-add-lfence-to-the-retpoline-rsb-filling-rsb-macros.patch
x86-retpoline-avoid-retpolines-for-built-in-__init-functions.patch
x86-retpoline-checksum32-convert-assembler-indirect-jumps.patch
x86-retpoline-crypto-convert-crypto-assembler-indirect-jumps.patch
x86-retpoline-entry-convert-entry-assembler-indirect-jumps.patch
x86-retpoline-fill-return-stack-buffer-on-vmexit.patch
x86-retpoline-fill-rsb-on-context-switch-for-affected-cpus.patch
x86-retpoline-ftrace-convert-ftrace-assembler-indirect-jumps.patch
x86-retpoline-hyperv-convert-assembler-indirect-jumps.patch
x86-retpoline-irq32-convert-assembler-indirect-jumps.patch
x86-retpoline-optimize-inline-assembler-for-vmexit_fill_rsb.patch
x86-retpoline-remove-compile-time-warning.patch
x86-retpoline-remove-the-esp-rsp-thunk.patch
x86-retpoline-xen-convert-xen-hypercall-indirect-jumps.patch
x86-spectre-add-boot-time-option-to-select-spectre-v2-mitigation.patch
x86-spectre-check-config_retpoline-in-command-line-parser.patch
x86-spectre-fix-an-error-message.patch
x86-spectre-fix-spelling-mistake-vunerable-vulnerable.patch
x86-spectre-report-get_user-mitigation-for-spectre_v1.patch
x86-spectre-simplify-spectre_v2-command-line-parsing.patch
x86-speculation-fix-typo-ibrs_att-which-should-be-ibrs_all.patch
x86-syscall-sanitize-syscall-table-de-references-under-speculation-fix.patch
x86-uaccess-use-__uaccess_begin_nospec-and-uaccess_try_nospec.patch
x86-usercopy-replace-open-coded-stac-clac-with-__uaccess_-begin.patch