-
66fe0d8...
by
Andy Whitcroft
-
UBUNTU: [Config] retpoine -- switch to new format
BugLink: http://bugs.launchpad.net/bugs/1758856
Signed-off-by: Andy Whitcroft <email address hidden>
-
facae62...
by
Andy Whitcroft
-
UBUNTU: SAUCE: vga_set_mode -- avoid jump tables
BugLink: http://bugs.launchpad.net/bugs/1758856
Signed-off-by: Andy Whitcroft <email address hidden>
-
ff64c3d...
by
Andy Whitcroft
-
UBUNTU: SAUCE: early/late -- annotate indirect calls in early/late initialisation code
BugLink: http://bugs.launchpad.net/bugs/1758856
Signed-off-by: Andy Whitcroft <email address hidden>
-
eac3a40...
by
Peter Zijlstra <email address hidden>
-
x86/boot, objtool: Annotate indirect jump in secondary_startup_64()
BugLink: http://bugs.launchpad.net/bugs/1758856
The objtool retpoline validation found this indirect jump. Seeing how
it's on CPU bringup before we run userspace it should be safe, annotate
it.
Signed-off-by: Peter Zijlstra (Intel) <email address hidden>
Reviewed-by: David Woodhouse <email address hidden>
Acked-by: Thomas Gleixner <email address hidden>
Acked-by: Josh Poimboeuf <email address hidden>
Cc: Andy Lutomirski <email address hidden>
Cc: Arjan van de Ven <email address hidden>
Cc: Borislav Petkov <email address hidden>
Cc: Dan Williams <email address hidden>
Cc: Dave Hansen <email address hidden>
Cc: David Woodhouse <email address hidden>
Cc: Greg Kroah-Hartman <email address hidden>
Cc: Linus Torvalds <email address hidden>
Cc: Peter Zijlstra <email address hidden>
Signed-off-by: Ingo Molnar <email address hidden>
(cherry picked from commit bd89004f6305cbf7352238f61da093207ee518d6)
Signed-off-by: Andy Whitcroft <email address hidden>
-
65f0b22...
by
Peter Zijlstra <email address hidden>
-
KVM: VMX: Make indirect call speculation safe
BugLink: http://bugs.launchpad.net/bugs/1758856
Replace indirect call with CALL_NOSPEC.
Signed-off-by: Peter Zijlstra (Intel) <email address hidden>
Signed-off-by: Thomas Gleixner <email address hidden>
Reviewed-by: David Woodhouse <email address hidden>
Cc: Andrea Arcangeli <email address hidden>
Cc: Andi Kleen <email address hidden>
Cc: Ashok Raj <email address hidden>
Cc: Greg KH <email address hidden>
Cc: Jun Nakajima <email address hidden>
Cc: David Woodhouse <email address hidden>
Cc: Linus Torvalds <email address hidden>
Cc: <email address hidden>
Cc: Dave Hansen <email address hidden>
Cc: Asit Mallick <email address hidden>
Cc: Andy Lutomirski <email address hidden>
Cc: Josh Poimboeuf <email address hidden>
Cc: Jason Baron <email address hidden>
Cc: Paolo Bonzini <email address hidden>
Cc: Dan Williams <email address hidden>
Cc: Arjan Van De Ven <email address hidden>
Cc: Tim Chen <email address hidden>
Link: https://<email address hidden>
(cherry picked from commit c940a3fb1e2e9b7d03228ab28f375fb5a47ff699)
Signed-off-by: Andy Whitcroft <email address hidden>
-
2e5537b...
by
Peter Zijlstra <email address hidden>
-
KVM: x86: Make indirect calls in emulator speculation safe
BugLink: http://bugs.launchpad.net/bugs/1758856
Replace the indirect calls with CALL_NOSPEC.
Signed-off-by: Peter Zijlstra (Intel) <email address hidden>
Signed-off-by: Thomas Gleixner <email address hidden>
Reviewed-by: David Woodhouse <email address hidden>
Cc: Andrea Arcangeli <email address hidden>
Cc: Andi Kleen <email address hidden>
Cc: Ashok Raj <email address hidden>
Cc: Greg KH <email address hidden>
Cc: Jun Nakajima <email address hidden>
Cc: David Woodhouse <email address hidden>
Cc: Linus Torvalds <email address hidden>
Cc: <email address hidden>
Cc: Dave Hansen <email address hidden>
Cc: Asit Mallick <email address hidden>
Cc: Andy Lutomirski <email address hidden>
Cc: Josh Poimboeuf <email address hidden>
Cc: Jason Baron <email address hidden>
Cc: Paolo Bonzini <email address hidden>
Cc: Dan Williams <email address hidden>
Cc: Arjan Van De Ven <email address hidden>
Cc: Tim Chen <email address hidden>
Link: https://<email address hidden>
(cherry picked from commit 1a29b5b7f347a1a9230c1e0af5b37e3e571588ab)
Signed-off-by: Andy Whitcroft <email address hidden>
-
9a07377...
by
Andy Whitcroft
-
UBUNTU: [Packaging] retpoline -- clear hint information from packages
BugLink: http://bugs.launchpad.net/bugs/1758856
Signed-off-by: Andy Whitcroft <email address hidden>
-
34500f7...
by
Andy Whitcroft
-
UBUNTU: [Packaging] retpoline -- elide %rip relative indirections
BugLink: http://bugs.launchpad.net/bugs/1758856
These are always safe because there is no way rip can be an unknown.
Signed-off-by: Andy Whitcroft <email address hidden>
-
71274a5...
by
Andy Whitcroft
-
UBUNTU: [Packaging] retpoline -- widen indirect call/jmp detection
BugLink: http://bugs.launchpad.net/bugs/1758856
Signed-off-by: Andy Whitcroft <email address hidden>
-
89e39bf...
by
Andy Whitcroft
-
UBUNTU: [Packaging] retpoline-check -- only report additions
BugLink: http://bugs.launchpad.net/bugs/1758856
Signed-off-by: Andy Whitcroft <email address hidden>