1. 54ed261 x86/build: Add 'set -e' to mkcapflags.sh to delete broken capflags.c by Masahiro Yamada · 5 years ago
  2. 0ad94dc x86/tls: Fix possible spectre-v1 in do_get_thread_area() by Dianzhang Chen · 5 years ago
  3. bbc8031 x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg() by Dianzhang Chen · 5 years ago
  4. 997ef64 KVM: LAPIC: Fix pending interrupt in IRR blocked by software disable LAPIC by Wanpeng Li · 5 years ago
  5. d271f22 KVM: x86: degrade WARN to pr_warn_ratelimited by Paolo Bonzini · 5 years ago
  6. bed8647 x86/speculation: Allow guests to use SSBD even if host does not by Alejandro Jimenez · 5 years ago
  7. b28e794 x86/CPU/AMD: Don't force the CPB cap when running under a hypervisor by Frank van der Linden · 5 years ago
  8. 20850f8 perf/x86/intel/ds: Fix EVENT vs. UEVENT PEBS constraints by Stephane Eranian · 5 years ago
  9. 438f4dc0 KVM: x86/pmu: do not mask the value that is written to fixed PMUs by Paolo Bonzini · 5 years ago
  10. f460e08 x86/PCI: Fix PCI IRQ routing table memory leak by Wenwen Wang · 5 years ago
  11. 35dd88b perf/x86/intel: Allow PEBS multi-entry in watermark mode by Stephane Eranian · 5 years ago
  12. 5bdc536 x86/power: Fix 'nosmt' vs hibernation triple fault during resume by Jiri Kosina · 5 years ago
  13. e193f24 Revert "x86/build: Move _etext to actual end of .text" by Greg Kroah-Hartman · 5 years ago
  14. 9305bac x86/mce: Fix machine_check_poll() tests for error types by Tony Luck · 6 years ago
  15. de90525 x86/ia32: Fix ia32_restore_sigcontext() AC leak by Peter Zijlstra · 6 years ago
  16. c8fb42b x86/uaccess, signal: Fix AC=1 bloat by Peter Zijlstra · 5 years ago
  17. c5e8fa7 x86/build: Keep local relocations with ld.lld by Kees Cook · 5 years ago
  18. fad8d76 x86/irq/64: Limit IST stack overflow check to #DB stack by Thomas Gleixner · 5 years ago
  19. f08f10f x86/mm: Remove in_nmi() warning from 64-bit implementation of vmalloc_fault() by Jiri Kosina · 5 years ago
  20. 8738676 x86/build: Move _etext to actual end of .text by Kees Cook · 5 years ago
  21. 42fee5b kvm: svm/avic: fix off-by-one in checking host APIC ID by Suthikulpanit, Suravee · 5 years ago
  22. 11cf36c KVM: x86: fix return value for reserved EFER by Paolo Bonzini · 5 years ago
  23. 0dd8bef KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes by Sean Christopherson · 5 years ago
  24. ec51ec9 crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() by Eric Biggers · 5 years ago
  25. 45fe6de sched/x86: Save [ER]FLAGS on context switch by Peter Zijlstra · 6 years ago
  26. f7154aa x86/speculation/mds: Revert CPU buffer clear on double fault exit by Andy Lutomirski · 5 years ago
  27. d66ee57 x86/vdso: Pass --eh-frame-hdr to the linker by Alistair Strachan · 6 years ago
  28. e8e1c54 x86/vdso: Drop implicit common-page-size linker flag by Nick Desaulniers · 6 years ago
  29. e56aeab x86: vdso: Use $LD instead of $CC to link by Alistair Strachan · 6 years ago
  30. 40c03e8 Revert "x86: vdso: Use $LD instead of $CC to link" by Sasha Levin · 5 years ago
  31. ca6c34a Revert "x86/vdso: Drop implicit common-page-size linker flag" by Sasha Levin · 5 years ago
  32. 016ac59 KVM: x86: avoid misreporting level-triggered irqs as edge-triggered in tracing by Vitaly Kuznetsov · 5 years ago
  33. 906b45f x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T by Jian-Hong Pan · 5 years ago
  34. 192d197 x86/cpu/bugs: Use __initconst for 'const' init data by Andi Kleen · 5 years ago
  35. 626743f x86: stop exporting msr-index.h to userland by Nicolas Dichtel · 7 years ago
  36. 025b9cf x86/speculation/mds: Add 'mitigations=' support for MDS by Josh Poimboeuf · 5 years ago
  37. 1709284 x86/speculation: Support 'mitigations=' cmdline option by Josh Poimboeuf · 5 years ago
  38. 3645b36 x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off by Konrad Rzeszutek Wilk · 5 years ago
  39. 450aa01 x86/speculation/mds: Fix comment by Boris Ostrovsky · 5 years ago
  40. f8a0bbe x86/speculation/mds: Add SMT warning message by Josh Poimboeuf · 5 years ago
  41. 98c4b3c x86/speculation: Move arch_smt_update() call to after mitigation decisions by Josh Poimboeuf · 5 years ago
  42. f02eee6 x86/speculation/mds: Add mds=full,nosmt cmdline option by Josh Poimboeuf · 5 years ago
  43. cb10603 Documentation: Move L1TF to separate directory by Thomas Gleixner · 6 years ago
  44. 81ea109 x86/speculation/mds: Add mitigation mode VMWERV by Thomas Gleixner · 6 years ago
  45. ba08d56 x86/speculation/mds: Add sysfs reporting for MDS by Thomas Gleixner · 6 years ago
  46. 4e722ae x86/speculation/mds: Add mitigation control for MDS by Thomas Gleixner · 6 years ago
  47. 2394f59 x86/speculation/mds: Conditionally clear CPU buffers on idle entry by Thomas Gleixner · 6 years ago
  48. 3a8e7f6 x86/kvm/vmx: Add MDS protection when L1D Flush is not active by Thomas Gleixner · 6 years ago
  49. 20041a0 x86/speculation/mds: Clear CPU buffers on exit to user by Thomas Gleixner · 6 years ago
  50. 96ef7af x86/speculation/mds: Add mds_clear_cpu_buffers() by Thomas Gleixner · 6 years ago
  51. eb2aa33 x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests by Andi Kleen · 6 years ago
  52. 1cdffec x86/speculation/mds: Add BUG_MSBDS_ONLY by Thomas Gleixner · 6 years ago
  53. fbf6ad08fd x86/speculation/mds: Add basic bug infrastructure for MDS by Andi Kleen · 6 years ago
  54. d5272d0 x86/speculation: Consolidate CPU whitelists by Thomas Gleixner · 6 years ago
  55. b76f8af x86/msr-index: Cleanup bit defines by Thomas Gleixner · 6 years ago
  56. 6198041 kvm: x86: Report STIBP on GET_SUPPORTED_CPUID by Eduardo Habkost · 6 years ago
  57. e58cf37 x86/speculation: Provide IBPB always command line options by Thomas Gleixner · 6 years ago
  58. 6f4b925 x86/speculation: Add seccomp Spectre v2 user space protection mode by Thomas Gleixner · 6 years ago
  59. 91d9bbd x86/speculation: Enable prctl mode for spectre_v2_user by Thomas Gleixner · 6 years ago
  60. 2d99bc0 x86/speculation: Add prctl() control for indirect branch speculation by Thomas Gleixner · 6 years ago
  61. 6febf94 x86/speculation: Prevent stale SPEC_CTRL msr content by Thomas Gleixner · 6 years ago
  62. 6596ca9 x86/speculation: Prepare arch_smt_update() for PRCTL mode by Thomas Gleixner · 6 years ago
  63. 607a3b3 x86/speculation: Split out TIF update by Thomas Gleixner · 6 years ago
  64. c89ef65 x86/speculation: Prepare for conditional IBPB in switch_mm() by Thomas Gleixner · 6 years ago
  65. 1cca4d2 x86/speculation: Avoid __switch_to_xtra() calls by Thomas Gleixner · 6 years ago
  66. b5741ef x86/process: Consolidate and simplify switch_to_xtra() code by Thomas Gleixner · 6 years ago
  67. a35a8c6 x86/speculation: Prepare for per task indirect branch speculation control by Tim Chen · 6 years ago
  68. dda365c x86/speculation: Add command line control for indirect branch speculation by Thomas Gleixner · 6 years ago
  69. d343a94 x86/speculation: Unify conditional spectre v2 print functions by Thomas Gleixner · 6 years ago
  70. d073799 x86/speculataion: Mark command line parser data __initdata by Thomas Gleixner · 6 years ago
  71. 8d33157 x86/speculation: Mark string arrays const correctly by Thomas Gleixner · 6 years ago
  72. 5fdb123 x86/speculation: Reorder the spec_v2 code by Thomas Gleixner · 6 years ago
  73. 9d6f23f x86/l1tf: Show actual SMT state by Thomas Gleixner · 6 years ago
  74. a3c901b x86/speculation: Rework SMT state change by Thomas Gleixner · 6 years ago
  75. 4cc1549 x86/Kconfig: Select SCHED_SMT if SMP enabled by Thomas Gleixner · 6 years ago
  76. dbbc533 x86/speculation: Reorganize speculation control MSRs update by Tim Chen · 6 years ago
  77. fd8d77e x86/speculation: Rename SSBD update functions by Thomas Gleixner · 6 years ago
  78. 8a7723d x86/speculation: Disable STIBP when enhanced IBRS is in use by Tim Chen · 6 years ago
  79. 20ba13a x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common() by Tim Chen · 6 years ago
  80. 66c0d89 x86/speculation: Remove unnecessary ret variable in cpu_show_common() by Tim Chen · 6 years ago
  81. 6154981 x86/speculation: Clean up spectre_v2_parse_cmdline() by Tim Chen · 6 years ago
  82. e8891b7 x86/speculation: Update the TIF_SSBD comment by Tim Chen · 6 years ago
  83. c369258 x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=off by Michal Hocko · 6 years ago
  84. 787b367 x86/speculation: Propagate information about RSB filling mitigation to sysfs by Jiri Kosina · 6 years ago
  85. b410c57 x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation by Jiri Kosina · 6 years ago
  86. 822e5d5 x86/speculation: Apply IBPB more strictly to avoid cross-process data leak by Jiri Kosina · 6 years ago
  87. 1739ba8 x86/cpu: Sanitize FAM6_ATOM naming by Peter Zijlstra · 6 years ago
  88. 26d422c x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation by Jiang Biao · 6 years ago
  89. ef0efbb x86/speculation: Simplify the CPU bug detection logic by Dominik Brodowski · 6 years ago
  90. 08e501b x86/mm: Use WRITE_ONCE() when setting PTEs by Nadav Amit · 6 years ago
  91. e160f1d x86/microcode: Update the new microcode revision unconditionally by Filippo Sironi · 6 years ago
  92. 9e99161 x86/microcode: Make sure boot_cpu_data.microcode is up-to-date by Prarit Bhargava · 6 years ago
  93. 97d7075 x86/microcode/intel: Check microcode revision before updating sibling threads by Ashok Raj · 7 years ago
  94. 2678bc5 x86/microcode/intel: Add a helper which gives the microcode revision by Borislav Petkov · 8 years ago
  95. a7501dc x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR by Tom Lendacky · 6 years ago
  96. c2185a4 x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features by Konrad Rzeszutek Wilk · 6 years ago
  97. 9ad0558 x86/bugs: Add AMD's SPEC_CTRL MSR usage by Konrad Rzeszutek Wilk · 6 years ago
  98. 98ccdae x86/bugs: Add AMD's variant of SSB_NO by Konrad Rzeszutek Wilk · 6 years ago
  99. 7a47330 x86/cpufeatures: Hide AMD-specific speculation flags by Ben Hutchings · 6 years ago
  100. 125a6a6 x86/MCE: Save microcode revision in machine check records by Tony Luck · 7 years ago