Files
linux/include/linux
Linus Torvalds 35277995e1 Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull spectre/meltdown updates from Thomas Gleixner:
 "The next round of updates related to melted spectrum:

   - The initial set of spectre V1 mitigations:

       - Array index speculation blocker and its usage for syscall,
         fdtable and the n180211 driver.

       - Speculation barrier and its usage in user access functions

   - Make indirect calls in KVM speculation safe

   - Blacklisting of known to be broken microcodes so IPBP/IBSR are not
     touched.

   - The initial IBPB support and its usage in context switch

   - The exposure of the new speculation MSRs to KVM guests.

   - A fix for a regression in x86/32 related to the cpu entry area

   - Proper whitelisting for known to be safe CPUs from the mitigations.

   - objtool fixes to deal proper with retpolines and alternatives

   - Exclude __init functions from retpolines which speeds up the boot
     process.

   - Removal of the syscall64 fast path and related cleanups and
     simplifications

   - Removal of the unpatched paravirt mode which is yet another source
     of indirect unproteced calls.

   - A new and undisputed version of the module mismatch warning

   - A couple of cleanup and correctness fixes all over the place

  Yet another step towards full mitigation. There are a few things still
  missing like the RBS underflow mitigation for Skylake and other small
  details, but that's being worked on.

  That said, I'm taking a belated christmas vacation for a week and hope
  that everything is magically solved when I'm back on Feb 12th"

* 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: (37 commits)
  KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL
  KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL
  KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
  KVM/x86: Add IBPB support
  KVM/x86: Update the reverse_cpuid list to include CPUID_7_EDX
  x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL
  x86/pti: Mark constant arrays as __initconst
  x86/spectre: Simplify spectre_v2 command line parsing
  x86/retpoline: Avoid retpolines for built-in __init functions
  x86/kvm: Update spectre-v1 mitigation
  KVM: VMX: make MSR bitmaps per-VCPU
  x86/paravirt: Remove 'noreplace-paravirt' cmdline option
  x86/speculation: Use Indirect Branch Prediction Barrier in context switch
  x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel
  x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"
  x86/spectre: Report get_user mitigation for spectre_v1
  nl80211: Sanitize array index in parse_txq_params
  vfs, fdtable: Prevent bounds-check bypass via speculative execution
  x86/syscall: Sanitize syscall table de-references under speculation
  x86/get_user: Use pointer masking to limit speculation
  ...
2018-02-04 11:45:55 -08:00
..
2017-11-28 16:30:38 +01:00
2018-01-01 22:54:42 -08:00
2018-01-02 13:59:16 -05:00
2017-11-30 16:55:35 +00:00
2017-12-19 16:35:34 -08:00
2018-01-03 14:03:48 +01:00
2017-11-27 16:19:56 -05:00
2018-01-01 12:40:27 -07:00
2018-01-25 14:10:39 -08:00
2018-01-16 00:04:19 +01:00
2018-01-17 11:30:16 +00:00
2017-12-29 21:13:04 +01:00
2017-11-17 16:10:04 -08:00
2017-12-01 13:09:40 -08:00
2018-01-03 11:00:22 -05:00
2018-01-31 17:18:38 -08:00
2018-01-31 17:18:37 -08:00
2017-11-17 16:10:00 -08:00
2018-01-28 22:17:24 -05:00
2018-01-08 08:22:45 -06:00
2018-01-08 08:22:45 -06:00
2017-12-14 16:00:49 -08:00
2018-01-31 17:18:40 -08:00
2018-01-31 17:18:37 -08:00
2017-11-17 16:10:04 -08:00
2017-11-17 16:10:04 -08:00
2017-12-16 02:05:48 +01:00
2017-11-27 16:19:55 -05:00
2017-12-11 14:37:11 -07:00
2017-11-29 22:16:31 +01:00
2017-11-27 16:19:55 -05:00
2018-01-29 12:02:54 -05:00
2018-01-18 11:56:49 +01:00
2018-01-15 12:07:46 -08:00
2018-01-15 09:35:45 +01:00
2018-01-09 16:27:43 +01:00
2017-12-20 09:53:54 -07:00
2017-11-27 16:19:54 -05:00