tree: ac3dc6d2594fad82ff4e562ca34c4f447d8b1d15 [path history] [tgz]
  1. array_index_nospec-sanitize-speculative-array-de-references.patch
  2. documentation-document-array_index_nospec.patch
  3. EXPORT_SYMBOL-for-asm.patch
  4. fork-Add-generic-vmalloced-stack-support.patch
  5. fork-Optimize-task-creation-by-caching-two-thread-st.patch
  6. kaiser-add-nokaiser-boot-option-using-alternative.patch
  7. kaiser-align-addition-to-x86-mm-makefile.patch
  8. kaiser-asm-tlbflush.h-handle-nopge-at-lower-level.patch
  9. kaiser-cleanups-while-trying-for-gold-link.patch
  10. kaiser-delete-kaiser_real_switch-option.patch
  11. kaiser-disabled-on-xen-pv.patch
  12. kaiser-do-not-set-_page_nx-on-pgd_none.patch
  13. kaiser-drop-is_atomic-arg-to-kaiser_pagetable_walk.patch
  14. kaiser-enhanced-by-kernel-and-user-pcids.patch
  15. kaiser-enomem-if-kaiser_pagetable_walk-null.patch
  16. kaiser-fix-build-and-fixme-in-alloc_ldt_struct.patch
  17. kaiser-fix-compile-error-without-vsyscall.patch
  18. kaiser-fix-intel_bts-perf-crashes.patch
  19. kaiser-fix-perf-crashes.patch
  20. kaiser-fix-regs-to-do_nmi-ifndef-config_kaiser.patch
  21. kaiser-fix-unlikely-error-in-alloc_ldt_struct.patch
  22. kaiser-kaiser-depends-on-smp.patch
  23. kaiser-kaiser_flush_tlb_on_return_to_user-check-pcid.patch
  24. kaiser-kaiser_remove_mapping-move-along-the-pgd.patch
  25. kaiser-kernel-address-isolation.patch
  26. kaiser-load_new_mm_cr3-let-switch_user_cr3-flush-user.patch
  27. kaiser-merged-update.patch
  28. kaiser-name-that-0x1000-kaiser_shadow_pgd_offset.patch
  29. kaiser-paranoid_entry-pass-cr3-need-to-paranoid_exit.patch
  30. kaiser-pcid-0-for-kernel-and-128-for-user.patch
  31. kaiser-set-_page_nx-only-if-supported.patch
  32. kaiser-stack-map-page_size-at-thread_size-page_size.patch
  33. kaiser-tidied-up-asm-kaiser.h-somewhat.patch
  34. kaiser-tidied-up-kaiser_add-remove_mapping-slightly.patch
  35. kaiser-use-alternative-instead-of-x86_cr3_pcid_noflush.patch
  36. kaiser-vmstat-show-nr_kaisertable-as-nr_overhead.patch
  37. kaiser-x86_cr3_pcid_noflush-and-x86_cr3_pcid_user.patch
  38. kbuild-add-fno-stack-check-to-kernel-build-options.patch
  39. kprobes-x86-blacklist-indirect-thunk-functions-for-kprobes.patch
  40. kprobes-x86-disable-optimizing-on-the-function-jumps-to-indirect-thunk.patch
  41. kpti-rename-to-page_table_isolation.patch
  42. kpti-report-when-enabled.patch
  43. kvm-vmx-make-indirect-call-speculation-safe.patch
  44. kvm-x86-make-indirect-calls-in-emulator-speculation-safe.patch
  45. Linux-4.8.27.patch
  46. locking-static_keys-Provide-DECLARE-and-well-as-DEFI.patch
  47. map-the-vsyscall-page-with-_page_user.patch
  48. mm-vmstat-make-nr_tlb_remote_flush_received-available-even-on-up.patch
  49. module-add-retpoline-tag-to-vermagic.patch
  50. module-retpoline-warn-about-missing-retpoline-in-module.patch
  51. nl80211-sanitize-array-index-in-parse_txq_params.patch
  52. objtool-allow-alternatives-to-be-ignored.patch
  53. objtool-detect-jumps-to-retpoline-thunks.patch
  54. objtool-fix-retpoline-support-for-pre-orc-objtool.patch
  55. objtool-modules-discard-objtool-annotation-sections-for-modules.patch
  56. retpoline-introduce-start-end-markers-of-indirect-thunk.patch
  57. sched-core-Add-try_get_task_stack-and-put_task_stack.patch
  58. sched-core-Allow-putting-thread_info-into-task_struc.patch
  59. sched-core-Free-the-stack-early-if-CONFIG_THREAD_INF.patch
  60. sched-core-x86-Make-struct-thread_info-arch-specific.patch
  61. sched-x86-32-kgdb-Don-t-use-thread.ip-in-sleeping_th.patch
  62. sched-x86-Add-struct-inactive_task_frame-to-better-d.patch
  63. sched-x86-Pass-kernel-thread-parameters-in-struct-fo.patch
  64. sched-x86-Rewrite-the-switch_to-code.patch
  65. selftests-x86-add-test_vsyscall.patch
  66. series
  67. sysfs-cpu-add-vulnerability-folder.patch
  68. sysfs-cpu-fix-typos-in-vulnerability-documentation.patch
  69. thread_info-Use-unsigned-long-for-flags.patch
  70. um-Stop-conflating-task_struct-stack-with-thread_inf.patch
  71. vfs-fdtable-prevent-bounds-check-bypass-via-speculative-execution.patch
  72. vsyscall-fix-permissions-for-emulate-mode-with-kaiser-pti.patch
  73. x86-alternatives-add-missing-n-at-end-of-alternative-inline-asm.patch
  74. x86-alternatives-fix-optimize_nops-checking.patch
  75. x86-asm-Get-rid-of-__read_cr4_safe.patch
  76. x86-asm-move-status-from-thread_struct-to-thread_info.patch
  77. x86-asm-Move-the-thread_info-status-field-to-thread_.patch
  78. x86-asm-use-register-variable-to-get-stack-pointer-value.patch
  79. x86-boot-add-early-cmdline-parsing-for-options-with-arguments.patch
  80. x86-bugs-drop-one-mitigation-from-dmesg.patch
  81. x86-cpu-amd-make-lfence-a-serializing-instruction.patch
  82. x86-cpu-amd-use-lfence_rdtsc-in-preference-to-mfence_rdtsc.patch
  83. x86-cpu-bugs-make-retpoline-module-warning-conditional.patch
  84. x86-cpu-factor-out-application-of-forced-cpu-caps.patch
  85. x86-cpu-implement-cpu-vulnerabilites-sysfs-functions.patch
  86. x86-cpu-merge-bugs.c-and-bugs_64.c.patch
  87. x86-cpu-x86-pti-do-not-enable-pti-on-amd-processors.patch
  88. x86-cpufeature-Add-AVX512_4VNNIW-and-AVX512_4FMAPS-f.patch
  89. x86-cpufeature-blacklist-spec_ctrl-pred_cmd-on-early-spectre-v2-microcodes.patch
  90. x86-cpufeature-move-processor-tracing-out-of-scattered-features.patch
  91. x86-cpufeatures-add-amd-feature-bits-for-speculation-control.patch
  92. x86-cpufeatures-add-cpuid_7_edx-cpuid-leaf.patch
  93. x86-cpufeatures-add-intel-feature-bits-for-speculation-control.patch
  94. x86-cpufeatures-add-x86_bug_cpu_insecure.patch
  95. x86-cpufeatures-add-x86_bug_spectre_v.patch
  96. x86-cpufeatures-clean-up-spectre-v2-related-cpuid-flags.patch
  97. x86-cpufeatures-make-cpu-bugs-sticky.patch
  98. x86-cpuid-fix-up-virtual-ibrs-ibpb-stibp-feature-bits-on-intel.patch
  99. x86-documentation-add-pti-description.patch
  100. x86-entry-64-Clean-up-and-document-espfix64-stack-se.patch
  101. x86-entry-64-Fix-a-minor-comment-rebase-error.patch
  102. x86-entry-64-push-extra-regs-right-away.patch
  103. x86-entry-64-remove-the-syscall64-fast-path.patch
  104. x86-entry-Get-rid-of-pt_regs_to_thread_info.patch
  105. x86-entry-Remove-duplicated-comment.patch
  106. x86-entry-spell-EBX-register-correctly-in-documentat.patch
  107. x86-get_user-use-pointer-masking-to-limit-speculation.patch
  108. x86-implement-array_index_mask_nospec.patch
  109. x86-introduce-__uaccess_begin_nospec-and-uaccess_try_nospec.patch
  110. x86-introduce-barrier_nospec.patch
  111. x86-kaiser-check-boottime-cmdline-params.patch
  112. x86-kaiser-move-feature-detection-up.patch
  113. x86-kaiser-reenable-paravirt.patch
  114. x86-kaiser-rename-and-simplify-x86_feature_kaiser-handling.patch
  115. x86-kbuild-enable-modversions-for-symbols-exported-f.patch
  116. x86-mce-Add-PCI-quirks-to-identify-Xeons-with-machin.patch
  117. x86-mce-Drop-X86_FEATURE_MCE_RECOVERY-and-the-relate.patch
  118. x86-mce-Improve-memcpy_mcsafe.patch
  119. x86-mm-32-move-setup_clear_cpu_cap-x86_feature_pcid-earlier.patch
  120. x86-mm-64-Enable-vmapped-stacks-CONFIG_HAVE_ARCH_VMA.patch
  121. x86-mm-64-fix-reboot-interaction-with-cr4.pcide.patch
  122. x86-mm-add-the-nopcid-boot-option-to-turn-off-pcid.patch
  123. x86-mm-disable-pcid-on-32-bit-kernels.patch
  124. x86-mm-enable-cr4.pcide-on-supported-systems.patch
  125. x86-mm-make-flush_tlb_mm_range-more-predictable.patch
  126. x86-mm-reimplement-flush_tlb_page-using-flush_tlb_mm_range.patch
  127. x86-mm-remove-flush_tlb-and-flush_tlb_current_task.patch
  128. x86-mm-remove-the-up-asm-tlbflush.h-code-always-use-the-formerly-smp-code.patch
  129. x86-move-exports-to-actual-definitions.patch
  130. x86-Move-thread_info-into-task_struct.patch
  131. x86-msr-add-definitions-for-new-speculation-control-msrs.patch
  132. x86-nospec-fix-header-guards-names.patch
  133. x86-paravirt-dont-patch-flush_tlb_single.patch
  134. x86-paravirt-remove-noreplace-paravirt-cmdline-option.patch
  135. x86-pti-do-not-enable-pti-on-cpus-which-are-not-vulnerable-to-meltdown.patch
  136. x86-pti-document-fix-wrong-index.patch
  137. x86-pti-efi-broken-conversion-from-efi-to-kernel-page-table.patch
  138. x86-pti-mark-constant-arrays-as-__initconst.patch
  139. x86-pti-rename-bug_cpu_insecure-to-bug_cpu_meltdown.patch
  140. x86-retpoline-add-initial-retpoline-support.patch
  141. x86-retpoline-add-lfence-to-the-retpoline-rsb-filling-rsb-macros.patch
  142. x86-retpoline-avoid-retpolines-for-built-in-__init-functions.patch
  143. x86-retpoline-checksum32-convert-assembler-indirect-jumps.patch
  144. x86-retpoline-crypto-convert-crypto-assembler-indirect-jumps.patch
  145. x86-retpoline-entry-convert-entry-assembler-indirect-jumps.patch
  146. x86-retpoline-fill-return-stack-buffer-on-vmexit.patch
  147. x86-retpoline-fill-rsb-on-context-switch-for-affected-cpus.patch
  148. x86-retpoline-ftrace-convert-ftrace-assembler-indirect-jumps.patch
  149. x86-retpoline-hyperv-convert-assembler-indirect-jumps.patch
  150. x86-retpoline-irq32-convert-assembler-indirect-jumps.patch
  151. x86-retpoline-optimize-inline-assembler-for-vmexit_fill_rsb.patch
  152. x86-retpoline-remove-compile-time-warning.patch
  153. x86-retpoline-remove-the-esp-rsp-thunk.patch
  154. x86-retpoline-simplify-vmexit_fill_rsb.patch
  155. x86-retpoline-xen-convert-xen-hypercall-indirect-jumps.patch
  156. x86-smpboot-remove-stale-tlb-flush-invocations.patch
  157. x86-spectre-add-boot-time-option-to-select-spectre-v2-mitigation.patch
  158. x86-spectre-check-config_retpoline-in-command-line-parser.patch
  159. x86-spectre-fix-spelling-mistake-vunerable-vulnerable.patch
  160. x86-spectre-report-get_user-mitigation-for-spectre_v1.patch
  161. x86-spectre-simplify-spectre_v2-command-line-parsing.patch
  162. x86-speculation-add-basic-ibpb-indirect-branch-prediction-barrier-support.patch
  163. x86-speculation-fix-typo-ibrs_att-which-should-be-ibrs_all.patch
  164. x86-syscall-sanitize-syscall-table-de-references-under-speculation.patch
  165. x86-tlb-drop-the-_gpl-from-the-cpu_tlbstate-export.patch
  166. x86-uaccess-use-__uaccess_begin_nospec-and-uaccess_try_nospec.patch
  167. x86-usercopy-replace-open-coded-stac-clac-with-__uaccess_-begin-end.patch
  168. x86-vm86-32-switch-to-flush_tlb_mm_range-in-mark_screen_rdonly.patch