1. 83b8ce0 Merge android-4.9.178 (df08e34) into msm-4.9 by jianzhou · 5 years ago
  2. a931344 Merge android-4.9.177 (e6d81da) into msm-4.9 by jianzhou · 5 years ago
  3. 4d2fd5d Merge android-4.9.176 (e0625b3) into msm-4.9 by jianzhou · 5 years ago
  4. 9034c87 Merge android-4.9.175 (e2171b6) into msm-4.9 by Tengfei Fan · 5 years ago
  5. cabdf6b Merge android-4.9-174 (d47e38b) into msm-4.9 by Tengfei Fan · 5 years ago
  6. a56988d Merge commit android-4.9.171 (3383326) into msm-4.9 by Tengfei Fan · 5 years ago
  7. 7b323f5 Merge android-4.9.170 (1ef64da) into msm-4.9 by jianzhou · 5 years ago
  8. 45728c3 Merge android-4.9.169 (1ef64da) into msm-4.9 by jianzhou · 5 years ago
  9. 685434d Merge android-4.9.168 (286f971) into msm-4.9 by jianzhou · 5 years ago
  10. d64b2c0 Merge android-4.9.167 (e1a8bab) into msm-4.9 by jianzhou · 5 years ago
  11. 19d550f Merge android-4.9.166 (0166b9e) into msm-4.9 by jianzhou · 5 years ago
  12. df08e34 Merge 4.9.178 into android-4.9 by Greg Kroah-Hartman · 5 years ago
  13. 0dd8bef KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes by Sean Christopherson · 6 years ago
  14. ec51ec9 crypto: x86/crct10dif-pcl - fix use via crypto_shash_digest() by Eric Biggers · 6 years ago
  15. 45fe6de sched/x86: Save [ER]FLAGS on context switch by Peter Zijlstra · 6 years ago
  16. f7154aa x86/speculation/mds: Revert CPU buffer clear on double fault exit by Andy Lutomirski · 6 years ago
  17. b82a5df Merge android-4.9.165 (72b54df) into msm-4.9 by jianzhou · 6 years ago
  18. e6d81da Merge 4.9.177 into android-4.9 by Greg Kroah-Hartman · 5 years ago
  19. d66ee57 x86/vdso: Pass --eh-frame-hdr to the linker by Alistair Strachan · 6 years ago
  20. e8e1c54 x86/vdso: Drop implicit common-page-size linker flag by Nick Desaulniers · 6 years ago
  21. e56aeab x86: vdso: Use $LD instead of $CC to link by Alistair Strachan · 6 years ago
  22. 40c03e8 Revert "x86: vdso: Use $LD instead of $CC to link" by Sasha Levin · 6 years ago
  23. ca6c34a Revert "x86/vdso: Drop implicit common-page-size linker flag" by Sasha Levin · 6 years ago
  24. 016ac59 KVM: x86: avoid misreporting level-triggered irqs as edge-triggered in tracing by Vitaly Kuznetsov · 6 years ago
  25. 906b45f x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T by Jian-Hong Pan · 6 years ago
  26. 25b6851 ANDROID: cuttlefish_defconfig: Disable DEVTMPFS by Alistair Strachan · 5 years ago
  27. e0625b3 Merge 4.9.176 into android-4.9 by Greg Kroah-Hartman · 6 years ago
  28. 192d197 x86/cpu/bugs: Use __initconst for 'const' init data by Andi Kleen · 6 years ago
  29. 626743f x86: stop exporting msr-index.h to userland by Nicolas Dichtel · 8 years ago
  30. 025b9cf x86/speculation/mds: Add 'mitigations=' support for MDS by Josh Poimboeuf · 6 years ago
  31. 1709284 x86/speculation: Support 'mitigations=' cmdline option by Josh Poimboeuf · 6 years ago
  32. 3645b36 x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off by Konrad Rzeszutek Wilk · 6 years ago
  33. 450aa01 x86/speculation/mds: Fix comment by Boris Ostrovsky · 6 years ago
  34. f8a0bbe x86/speculation/mds: Add SMT warning message by Josh Poimboeuf · 6 years ago
  35. 98c4b3c x86/speculation: Move arch_smt_update() call to after mitigation decisions by Josh Poimboeuf · 6 years ago
  36. f02eee6 x86/speculation/mds: Add mds=full,nosmt cmdline option by Josh Poimboeuf · 6 years ago
  37. cb10603 Documentation: Move L1TF to separate directory by Thomas Gleixner · 6 years ago
  38. 81ea109 x86/speculation/mds: Add mitigation mode VMWERV by Thomas Gleixner · 6 years ago
  39. ba08d56 x86/speculation/mds: Add sysfs reporting for MDS by Thomas Gleixner · 6 years ago
  40. 4e722ae x86/speculation/mds: Add mitigation control for MDS by Thomas Gleixner · 6 years ago
  41. 2394f59 x86/speculation/mds: Conditionally clear CPU buffers on idle entry by Thomas Gleixner · 6 years ago
  42. 3a8e7f6 x86/kvm/vmx: Add MDS protection when L1D Flush is not active by Thomas Gleixner · 6 years ago
  43. 20041a0 x86/speculation/mds: Clear CPU buffers on exit to user by Thomas Gleixner · 6 years ago
  44. 96ef7af x86/speculation/mds: Add mds_clear_cpu_buffers() by Thomas Gleixner · 6 years ago
  45. eb2aa33 x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests by Andi Kleen · 6 years ago
  46. 1cdffec x86/speculation/mds: Add BUG_MSBDS_ONLY by Thomas Gleixner · 6 years ago
  47. fbf6ad08fd x86/speculation/mds: Add basic bug infrastructure for MDS by Andi Kleen · 6 years ago
  48. d5272d0 x86/speculation: Consolidate CPU whitelists by Thomas Gleixner · 6 years ago
  49. b76f8af x86/msr-index: Cleanup bit defines by Thomas Gleixner · 6 years ago
  50. 6198041 kvm: x86: Report STIBP on GET_SUPPORTED_CPUID by Eduardo Habkost · 6 years ago
  51. e58cf37 x86/speculation: Provide IBPB always command line options by Thomas Gleixner · 6 years ago
  52. 6f4b925 x86/speculation: Add seccomp Spectre v2 user space protection mode by Thomas Gleixner · 6 years ago
  53. 91d9bbd x86/speculation: Enable prctl mode for spectre_v2_user by Thomas Gleixner · 6 years ago
  54. 2d99bc0 x86/speculation: Add prctl() control for indirect branch speculation by Thomas Gleixner · 6 years ago
  55. 6febf94 x86/speculation: Prevent stale SPEC_CTRL msr content by Thomas Gleixner · 6 years ago
  56. 6596ca9 x86/speculation: Prepare arch_smt_update() for PRCTL mode by Thomas Gleixner · 6 years ago
  57. 607a3b3 x86/speculation: Split out TIF update by Thomas Gleixner · 6 years ago
  58. c89ef65 x86/speculation: Prepare for conditional IBPB in switch_mm() by Thomas Gleixner · 6 years ago
  59. 1cca4d2 x86/speculation: Avoid __switch_to_xtra() calls by Thomas Gleixner · 6 years ago
  60. b5741ef x86/process: Consolidate and simplify switch_to_xtra() code by Thomas Gleixner · 6 years ago
  61. a35a8c6 x86/speculation: Prepare for per task indirect branch speculation control by Tim Chen · 6 years ago
  62. dda365c x86/speculation: Add command line control for indirect branch speculation by Thomas Gleixner · 6 years ago
  63. d343a94 x86/speculation: Unify conditional spectre v2 print functions by Thomas Gleixner · 6 years ago
  64. d073799 x86/speculataion: Mark command line parser data __initdata by Thomas Gleixner · 6 years ago
  65. 8d33157 x86/speculation: Mark string arrays const correctly by Thomas Gleixner · 6 years ago
  66. 5fdb123 x86/speculation: Reorder the spec_v2 code by Thomas Gleixner · 6 years ago
  67. 9d6f23f x86/l1tf: Show actual SMT state by Thomas Gleixner · 6 years ago
  68. a3c901b x86/speculation: Rework SMT state change by Thomas Gleixner · 6 years ago
  69. 4cc1549 x86/Kconfig: Select SCHED_SMT if SMP enabled by Thomas Gleixner · 6 years ago
  70. dbbc533 x86/speculation: Reorganize speculation control MSRs update by Tim Chen · 6 years ago
  71. fd8d77e x86/speculation: Rename SSBD update functions by Thomas Gleixner · 6 years ago
  72. 8a7723d x86/speculation: Disable STIBP when enhanced IBRS is in use by Tim Chen · 6 years ago
  73. 20ba13a x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common() by Tim Chen · 6 years ago
  74. 66c0d89 x86/speculation: Remove unnecessary ret variable in cpu_show_common() by Tim Chen · 6 years ago
  75. 6154981 x86/speculation: Clean up spectre_v2_parse_cmdline() by Tim Chen · 6 years ago
  76. e8891b7 x86/speculation: Update the TIF_SSBD comment by Tim Chen · 6 years ago
  77. c369258 x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=off by Michal Hocko · 6 years ago
  78. 787b367 x86/speculation: Propagate information about RSB filling mitigation to sysfs by Jiri Kosina · 6 years ago
  79. b410c57 x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation by Jiri Kosina · 6 years ago
  80. 822e5d5 x86/speculation: Apply IBPB more strictly to avoid cross-process data leak by Jiri Kosina · 6 years ago
  81. 1739ba8 x86/cpu: Sanitize FAM6_ATOM naming by Peter Zijlstra · 6 years ago
  82. 26d422c x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation by Jiang Biao · 6 years ago
  83. ef0efbb x86/speculation: Simplify the CPU bug detection logic by Dominik Brodowski · 6 years ago
  84. 08e501b x86/mm: Use WRITE_ONCE() when setting PTEs by Nadav Amit · 6 years ago
  85. e160f1d x86/microcode: Update the new microcode revision unconditionally by Filippo Sironi · 6 years ago
  86. 9e99161 x86/microcode: Make sure boot_cpu_data.microcode is up-to-date by Prarit Bhargava · 6 years ago
  87. 97d7075 x86/microcode/intel: Check microcode revision before updating sibling threads by Ashok Raj · 7 years ago
  88. 2678bc5 x86/microcode/intel: Add a helper which gives the microcode revision by Borislav Petkov · 8 years ago
  89. a7501dc x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR by Tom Lendacky · 6 years ago
  90. c2185a4 x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features by Konrad Rzeszutek Wilk · 6 years ago
  91. 9ad0558 x86/bugs: Add AMD's SPEC_CTRL MSR usage by Konrad Rzeszutek Wilk · 6 years ago
  92. 98ccdae x86/bugs: Add AMD's variant of SSB_NO by Konrad Rzeszutek Wilk · 6 years ago
  93. 7a47330 x86/cpufeatures: Hide AMD-specific speculation flags by Ben Hutchings · 6 years ago
  94. 125a6a6 x86/MCE: Save microcode revision in machine check records by Tony Luck · 7 years ago
  95. e2171b6 Merge 4.9.175 into android-4.9 by Greg Kroah-Hartman · 6 years ago
  96. 88338ee perf/x86/intel: Fix handling of wakeup_events for multi-entry PEBS by Stephane Eranian · 6 years ago
  97. a85e969 ANDROID: cuttlefish_defconfig: Enable CONFIG_CPUSETS and CONFIG_CGROUP_SCHEDTUNE by Suren Baghdasaryan · 6 years ago
  98. d47e38b Merge 4.9.174 into android-4.9 by Greg Kroah-Hartman · 6 years ago
  99. bbf8a84 x86/mce: Improve error message when kernel cannot recover, p2 by Tony Luck · 6 years ago
  100. fdeec03 perf/x86/amd: Update generic hardware cache events for Family 17h by Kim Phillips · 6 years ago