mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-26 22:24:09 +08:00
5515114211
Pull x86 pti fixes from Thomas Gleixner: "A small set of fixes for the meltdown/spectre mitigations: - Make kprobes aware of retpolines to prevent probes in the retpoline thunks. - Make the machine check exception speculation protected. MCE used to issue an indirect call directly from the ASM entry code. Convert that to a direct call into a C-function and issue the indirect call from there so the compiler can add the retpoline protection, - Make the vmexit_fill_RSB() assembly less stupid - Fix a typo in the PTI documentation" * 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: x86/retpoline: Optimize inline assembler for vmexit_fill_RSB x86/pti: Document fix wrong index kprobes/x86: Disable optimizing on the function jumps to indirect thunk kprobes/x86: Blacklist indirect thunk functions for kprobes retpoline: Introduce start/end markers of indirect thunk x86/mce: Make machine check speculation protected |
||
---|---|---|
.. | ||
i386 | ||
x86_64 | ||
00-INDEX | ||
amd-memory-encryption.txt | ||
boot.txt | ||
earlyprintk.txt | ||
entry_64.txt | ||
exception-tables.txt | ||
intel_mpx.txt | ||
intel_rdt_ui.txt | ||
kernel-stacks | ||
microcode.txt | ||
mtrr.txt | ||
orc-unwinder.txt | ||
pat.txt | ||
protection-keys.txt | ||
pti.txt | ||
tlb.txt | ||
topology.txt | ||
usb-legacy-support.txt | ||
zero-page.txt |