summaryrefslogtreecommitdiffstats
path: root/v5.12/5105e7687ad3dffde77f6e4393b5530e83d672dc
diff options
context:
space:
mode:
Diffstat (limited to 'v5.12/5105e7687ad3dffde77f6e4393b5530e83d672dc')
-rw-r--r--v5.12/5105e7687ad3dffde77f6e4393b5530e83d672dc19
1 files changed, 19 insertions, 0 deletions
diff --git a/v5.12/5105e7687ad3dffde77f6e4393b5530e83d672dc b/v5.12/5105e7687ad3dffde77f6e4393b5530e83d672dc
new file mode 100644
index 00000000000..df20170c0a5
--- /dev/null
+++ b/v5.12/5105e7687ad3dffde77f6e4393b5530e83d672dc
@@ -0,0 +1,19 @@
+5105e7687ad3 ("x86/fred: Fixup fault on ERETU by jumping to fred_entrypoint_user")
+14619d912b65 ("x86/fred: FRED entry/exit and dispatch code")
+32b09c230392 ("x86/fred: Add a new header file for FRED definitions")
+1da5c9bc119d ("x86: Introduce ia32_enabled()")
+e12ad468c220 ("x86/gsseg: Add the new <asm/gsseg.h> header to <asm/asm-prototypes.h>")
+c4e34dd99f2e ("x86: simplify load_unaligned_zeropad() implementation")
+de979c83574a ("x86/entry: Build thunk_$(BITS) only if CONFIG_PREEMPTION=y")
+3ebc17006888 ("x86/bugs: Add retbleed=ibpb")
+6ad0ad2bf8a6 ("x86/bugs: Report Intel retbleed vulnerability")
+e8ec1b6e08a2 ("x86/bugs: Enable STIBP for JMP2RET")
+7fbf47c7ce50 ("x86/bugs: Add AMD retbleed= boot parameter")
+6b80b59b3555 ("x86/bugs: Report AMD retbleed vulnerability")
+a149180fbcf3 ("x86: Add magic AMD return-thunk")
+d9e9d2300681 ("x86,objtool: Create .return_sites")
+15e67227c49a ("x86: Undo return-thunk damage")
+0b53c374b9ef ("x86/retpoline: Use -mfunction-return")
+369ae6ffc41a ("x86/retpoline: Cleanup some #ifdefery")
+a883d624aed4 ("x86/cpufeatures: Move RETPOLINE flags to word 11")
+8e8afafb0b55 ("Merge tag 'x86-bugs-2022-06-01' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip")