-
- Downloads
Merge tag 'x86_urgent_for_v6.5_rc4' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 fixes from Borislav Petkov: - AMD's automatic IBRS doesn't enable cross-thread branch target injection protection (STIBP) for user processes. Enable STIBP on such systems. - Do not delete (but put the ref instead) of AMD MCE error thresholding sysfs kobjects when destroying them in order not to delete the kernfs pointer prematurely - Restore annotation in ret_from_fork_asm() in order to fix kthread stack unwinding from being marked as unreliable and thus breaking livepatching * tag 'x86_urgent_for_v6.5_rc4' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled x86/MCE/AMD: Decrement threshold_bank refcount when removing threshold blocks x86: Fix kthread unwind
Showing
- Documentation/admin-guide/hw-vuln/spectre.rst 7 additions, 4 deletionsDocumentation/admin-guide/hw-vuln/spectre.rst
- arch/x86/entry/entry_64.S 15 additions, 1 deletionarch/x86/entry/entry_64.S
- arch/x86/kernel/cpu/bugs.c 9 additions, 6 deletionsarch/x86/kernel/cpu/bugs.c
- arch/x86/kernel/cpu/mce/amd.c 2 additions, 2 deletionsarch/x86/kernel/cpu/mce/amd.c
Loading
Please register or sign in to comment