1. e4f3589 x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE by WANG Chao · 6 years ago
  2. 312a466 Merge branch 'x86-cleanups-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip by Linus Torvalds · 6 years ago
  3. 20c3a2c x86/speculation: Add support for STIBP always-on preferred mode by Thomas Lendacky · 6 years ago
  4. 5b5e4d6 x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=off by Michal Hocko · 6 years ago
  5. ad3bc25 x86/kernel: Fix more -Wmissing-prototypes warnings by Borislav Petkov · 6 years ago
  6. aa77bfb x86/speculation: Change misspelled STIPB to STIBP by Waiman Long · 6 years ago
  7. 55a9740 x86/speculation: Provide IBPB always command line options by Thomas Gleixner · 6 years ago
  8. 6b3e64c x86/speculation: Add seccomp Spectre v2 user space protection mode by Thomas Gleixner · 6 years ago
  9. 7cc765a x86/speculation: Enable prctl mode for spectre_v2_user by Thomas Gleixner · 6 years ago
  10. 9137bb2 x86/speculation: Add prctl() control for indirect branch speculation by Thomas Gleixner · 6 years ago
  11. 6893a95 x86/speculation: Prepare arch_smt_update() for PRCTL mode by Thomas Gleixner · 6 years ago
  12. 6d991ba x86/speculation: Prevent stale SPEC_CTRL msr content by Thomas Gleixner · 6 years ago
  13. e6da8bb x86/speculation: Split out TIF update by Thomas Gleixner · 6 years ago
  14. 4c71a2b6 x86/speculation: Prepare for conditional IBPB in switch_mm() by Thomas Gleixner · 6 years ago
  15. 5bfbe3a x86/speculation: Prepare for per task indirect branch speculation control by Tim Chen · 6 years ago
  16. fa1202ef x86/speculation: Add command line control for indirect branch speculation by Thomas Gleixner · 6 years ago
  17. 495d470 x86/speculation: Unify conditional spectre v2 print functions by Thomas Gleixner · 6 years ago
  18. 30ba72a x86/speculataion: Mark command line parser data __initdata by Thomas Gleixner · 6 years ago
  19. 8770709 x86/speculation: Mark string arrays const correctly by Thomas Gleixner · 6 years ago
  20. 15d6b7a x86/speculation: Reorder the spec_v2 code by Thomas Gleixner · 6 years ago
  21. 130d6f9 x86/l1tf: Show actual SMT state by Thomas Gleixner · 6 years ago
  22. a74cfff x86/speculation: Rework SMT state change by Thomas Gleixner · 6 years ago
  23. 26c4d75 x86/speculation: Rename SSBD update functions by Thomas Gleixner · 6 years ago
  24. 34bce7c x86/speculation: Disable STIBP when enhanced IBRS is in use by Tim Chen · 6 years ago
  25. a8f76ae x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common() by Tim Chen · 6 years ago
  26. b86bda0 x86/speculation: Remove unnecessary ret variable in cpu_show_common() by Tim Chen · 6 years ago
  27. 2484850 x86/speculation: Clean up spectre_v2_parse_cmdline() by Tim Chen · 6 years ago
  28. ef014aa x86/retpoline: Remove minimal retpoline support by Zhenzhong Duan · 6 years ago
  29. 4cd24de x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support by Zhenzhong Duan · 6 years ago
  30. d82924c Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip by Linus Torvalds · 6 years ago
  31. 1a576b2 x86/bugs: Add Hygon Dhyana to the respective mitigation machinery by Pu Wen · 6 years ago
  32. bb4b3b7 x86/speculation: Propagate information about RSB filling mitigation to sysfs by Jiri Kosina · 6 years ago
  33. 53c613f x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation by Jiri Kosina · 6 years ago
  34. cc51e54 x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+ by Andi Kleen · 7 years ago
  35. 6a01228 x86/speculation/l1tf: Suggest what to do on systems with too much RAM by Vlastimil Babka · 7 years ago
  36. 1eb4690 x86/l1tf: Fix build error seen if CONFIG_KVM_INTEL is disabled by Guenter Roeck · 7 years ago
  37. 958f338 Merge branch 'l1tf-final' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip by Linus Torvalds · 7 years ago
  38. bc2d8d26 cpu/hotplug: Fix SMT supported evaluation by Thomas Gleixner · 7 years ago
  39. 8e0b2b9 x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry by Paolo Bonzini · 7 years ago
  40. ea156d1 x86/speculation: Simplify sysfs report of VMX L1TF vulnerability by Paolo Bonzini · 7 years ago
  41. f2701b7 Merge 4.18-rc7 into master to pick up the KVM dependcy by Thomas Gleixner · 7 years ago
  42. 706d516 x86/speculation: Support Enhanced IBRS on future CPUs by Sai Praneeth · 7 years ago
  43. fdf82a7 x86/speculation: Protect against userspace-userspace spectreRSB by Jiri Kosina · 7 years ago
  44. d90a7a0 x86/bugs, kvm: Introduce boot-time control of L1TF mitigations by Jiri Kosina · 7 years ago
  45. fee0aed cpu/hotplug: Set CPU_SMT_NOT_SUPPORTED early by Thomas Gleixner · 7 years ago
  46. 895ae47 x86/kvm: Allow runtime control of L1D flush by Thomas Gleixner · 7 years ago
  47. a7b9020 x86/l1tf: Handle EPT disabled state proper by Thomas Gleixner · 7 years ago
  48. 72c6d2d x86/litf: Introduce vmx status variable by Thomas Gleixner · 7 years ago
  49. 612bc3b3 x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR by Tom Lendacky · 7 years ago
  50. 6cb2b08 x86/pti: Don't report XenPV as vulnerable by Jiri Kosina · 7 years ago
  51. 56563f5 x86/bugs: Move the l1tf function and define pr_fmt properly by Konrad Rzeszutek Wilk · 7 years ago
  52. 17dbca1 x86/speculation/l1tf: Add sysfs reporting for l1tf by Andi Kleen · 7 years ago
  53. 108fab4 x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features by Konrad Rzeszutek Wilk · 7 years ago
  54. 6ac2f49 x86/bugs: Add AMD's SPEC_CTRL MSR usage by Konrad Rzeszutek Wilk · 7 years ago
  55. 47c61b3 x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG by Thomas Gleixner · 7 years ago
  56. be6fcb5 x86/bugs: Rework spec_ctrl base and mask logic by Thomas Gleixner · 7 years ago
  57. 4b59bdb x86/bugs: Remove x86_spec_ctrl_set() by Thomas Gleixner · 7 years ago
  58. fa8ac49 x86/bugs: Expose x86_spec_ctrl_base directly by Thomas Gleixner · 7 years ago
  59. cc69b34 x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host} by Borislav Petkov · 7 years ago
  60. 0270be3e x86/speculation: Rework speculative_store_bypass_update() by Thomas Gleixner · 7 years ago
  61. 11fb068 x86/speculation: Add virtualized speculative store bypass disable support by Tom Lendacky · 7 years ago
  62. ccbcd26 x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL by Thomas Gleixner · 7 years ago
  63. 5281758 x86/cpufeatures: Disentangle SSBD enumeration by Thomas Gleixner · 7 years ago
  64. 7eb8956 x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS by Thomas Gleixner · 7 years ago
  65. ffed645e x86/bugs: Fix the parameters alignment and missing void by Konrad Rzeszutek Wilk · 7 years ago
  66. 7bb4d36 x86/bugs: Make cpu_show_common() static by Jiri Kosina · 7 years ago
  67. d66d8ff x86/bugs: Fix __ssb_select_mitigation() return type by Jiri Kosina · 7 years ago
  68. 9f65fb2 x86/bugs: Rename _RDS to _SSBD by Konrad Rzeszutek Wilk · 7 years ago
  69. f21b53b x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass by Kees Cook · 7 years ago
  70. 8bf37d8 seccomp: Move speculation migitation control to arch code by Thomas Gleixner · 7 years ago
  71. 356e4bf prctl: Add force disable speculation by Thomas Gleixner · 7 years ago
  72. f9544b2 x86/bugs: Make boot modes __ro_after_init by Kees Cook · 7 years ago
  73. 7bbf137 nospec: Allow getting/setting on non-current task by Kees Cook · 7 years ago
  74. a73ec77 x86/speculation: Add prctl for Speculative Store Bypass mitigation by Thomas Gleixner · 7 years ago
  75. 885f82b x86/process: Allow runtime control of Speculative Store Bypass by Thomas Gleixner · 7 years ago
  76. 28a2775 x86/speculation: Create spec-ctrl.h to avoid include hell by Thomas Gleixner · 7 years ago
  77. 764f3c2 x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested by Konrad Rzeszutek Wilk · 7 years ago
  78. 1115a85 x86/bugs: Whitelist allowed SPEC_CTRL MSR values by Konrad Rzeszutek Wilk · 7 years ago
  79. 7724397 x86/bugs/intel: Set proper CPU features and setup RDS by Konrad Rzeszutek Wilk · 7 years ago
  80. 24f7fc8 x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation by Konrad Rzeszutek Wilk · 7 years ago
  81. c456442 x86/bugs: Expose /sys/../spec_store_bypass by Konrad Rzeszutek Wilk · 7 years ago
  82. 5cf6875 x86/bugs, KVM: Support the combination of guest and host IBRS by Konrad Rzeszutek Wilk · 7 years ago
  83. 1b86883 x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits by Konrad Rzeszutek Wilk · 7 years ago
  84. d105951 x86/bugs: Concentrate bug reporting into a separate function by Konrad Rzeszutek Wilk · 7 years ago
  85. dd84441 x86/speculation: Use IBRS if available before calling into firmware by David Woodhouse · 7 years ago
  86. 9de29ea x86/spectre: Fix an error message by Dan Carpenter · 7 years ago
  87. 21e433b x86/speculation: Clean up various Spectre related details by Ingo Molnar · 7 years ago
  88. f208820 Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()" by David Woodhouse · 7 years ago
  89. 9005c68 x86/spectre: Simplify spectre_v2 command line parsing by KarimAllah Ahmed · 7 years ago
  90. e698dcd x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable" by Colin Ian King · 7 years ago
  91. edfbae53 x86/spectre: Report get_user mitigation for spectre_v1 by Dan Williams · 7 years ago
  92. 9471eee x86/spectre: Check CONFIG_RETPOLINE in command line parser by Dou Liyang · 7 years ago
  93. 64e1672 x86/speculation: Simplify indirect_branch_prediction_barrier() by Borislav Petkov · 7 years ago
  94. 2961298 x86/cpufeatures: Clean up Spectre v2 related CPUID flags by David Woodhouse · 7 years ago
  95. e383095 x86/cpu/bugs: Make retpoline module warning conditional by Thomas Gleixner · 7 years ago
  96. 55fa19d x86/bugs: Drop one "mitigation" from dmesg by Borislav Petkov · 7 years ago
  97. 20ffa1c x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support by David Woodhouse · 7 years ago
  98. caf7501 module/retpoline: Warn about missing retpoline in module by Andi Kleen · 7 years ago
  99. c995efd x86/retpoline: Fill RSB on context switch for affected CPUs by David Woodhouse · 7 years ago
  100. da28512 x86/spectre: Add boot time option to select Spectre v2 mitigation by David Woodhouse · 7 years ago