diff options
Diffstat (limited to 'v4.19/5105e7687ad3dffde77f6e4393b5530e83d672dc')
-rw-r--r-- | v4.19/5105e7687ad3dffde77f6e4393b5530e83d672dc | 19 |
1 files changed, 19 insertions, 0 deletions
diff --git a/v4.19/5105e7687ad3dffde77f6e4393b5530e83d672dc b/v4.19/5105e7687ad3dffde77f6e4393b5530e83d672dc new file mode 100644 index 00000000000..df20170c0a5 --- /dev/null +++ b/v4.19/5105e7687ad3dffde77f6e4393b5530e83d672dc @@ -0,0 +1,19 @@ +5105e7687ad3 ("x86/fred: Fixup fault on ERETU by jumping to fred_entrypoint_user") +14619d912b65 ("x86/fred: FRED entry/exit and dispatch code") +32b09c230392 ("x86/fred: Add a new header file for FRED definitions") +1da5c9bc119d ("x86: Introduce ia32_enabled()") +e12ad468c220 ("x86/gsseg: Add the new <asm/gsseg.h> header to <asm/asm-prototypes.h>") +c4e34dd99f2e ("x86: simplify load_unaligned_zeropad() implementation") +de979c83574a ("x86/entry: Build thunk_$(BITS) only if CONFIG_PREEMPTION=y") +3ebc17006888 ("x86/bugs: Add retbleed=ibpb") +6ad0ad2bf8a6 ("x86/bugs: Report Intel retbleed vulnerability") +e8ec1b6e08a2 ("x86/bugs: Enable STIBP for JMP2RET") +7fbf47c7ce50 ("x86/bugs: Add AMD retbleed= boot parameter") +6b80b59b3555 ("x86/bugs: Report AMD retbleed vulnerability") +a149180fbcf3 ("x86: Add magic AMD return-thunk") +d9e9d2300681 ("x86,objtool: Create .return_sites") +15e67227c49a ("x86: Undo return-thunk damage") +0b53c374b9ef ("x86/retpoline: Use -mfunction-return") +369ae6ffc41a ("x86/retpoline: Cleanup some #ifdefery") +a883d624aed4 ("x86/cpufeatures: Move RETPOLINE flags to word 11") +8e8afafb0b55 ("Merge tag 'x86-bugs-2022-06-01' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip") |