1. 6dd1f69 x86/pti: Mark constant arrays as __initconst by Arnd Bergmann · 7 years ago
  2. ebaf227 x86/spectre: Simplify spectre_v2 command line parsing by KarimAllah Ahmed · 7 years ago
  3. ad368e5 x86/paravirt: Remove 'noreplace-paravirt' cmdline option by Josh Poimboeuf · 7 years ago
  4. 85543d7 x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel by David Woodhouse · 7 years ago
  5. c962dfa x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable" by Colin Ian King · 7 years ago
  6. 863b308 x86/spectre: Report get_user mitigation for spectre_v1 by Dan Williams · 7 years ago
  7. fb9f2d9 x86/asm: Move 'status' from thread_struct to thread_info by Andy Lutomirski · 7 years ago
  8. 74ae346 x86/spectre: Check CONFIG_RETPOLINE in command line parser by Dou Liyang · 7 years ago
  9. 9f8955f x86/speculation: Simplify indirect_branch_prediction_barrier() by Borislav Petkov · 7 years ago
  10. 7f3e0da x86/cpufeatures: Clean up Spectre v2 related CPUID flags by David Woodhouse · 7 years ago
  11. 249b1f7 x86/cpu/bugs: Make retpoline module warning conditional by Thomas Gleixner · 7 years ago
  12. 91ff9a7 x86/bugs: Drop one "mitigation" from dmesg by Borislav Petkov · 7 years ago
  13. 67eb59b x86/alternative: Print unadorned pointers by Borislav Petkov · 7 years ago
  14. dbbbafc x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support by David Woodhouse · 7 years ago
  15. 0fd222b x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes by David Woodhouse · 7 years ago
  16. d9b47a4 x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown by David Woodhouse · 7 years ago
  17. 76c4bd5 x86/cpufeatures: Add CPUID_7_EDX CPUID leaf by David Woodhouse · 7 years ago
  18. 86b5b1e module/retpoline: Warn about missing retpoline in module by Andi Kleen · 7 years ago
  19. cbfb351 x86/microcode: Fix again accessing initrd after having been freed by Borislav Petkov · 7 years ago
  20. ac2cc88 x86/microcode/intel: Extend BDW late-loading further with LLC size check by Jia Zhang · 7 years ago
  21. 9cc86f9 x86/mm: Rework wbinvd, hlt operation in stop_this_cpu() by Tom Lendacky · 7 years ago
  22. 4fb8368 kprobes/x86: Disable optimizing on the function jumps to indirect thunk by Masami Hiramatsu · 7 years ago
  23. 22371c4 retpoline: Introduce start/end markers of indirect thunk by Masami Hiramatsu · 7 years ago
  24. 020c755 x86/mce: Make machine check speculation protected by Thomas Gleixner · 7 years ago
  25. e0f82cb x86/mm: Encrypt the initrd earlier for BSP microcode update by Tom Lendacky · 7 years ago
  26. 0062c10 x86/apic/vector: Fix off by one in error path by Thomas Gleixner · 7 years ago
  27. 8352a3f x86/tsc: Fix erroneous TSC rate on Skylake Xeon by Len Brown · 7 years ago
  28. a5ab7b5 x86/tsc: Future-proof native_calibrate_tsc() by Len Brown · 7 years ago
  29. ad2d620 x86/idt: Mark IDT tables __initconst by Andi Kleen · 7 years ago
  30. 929e4b3 x86/intel_rdt/cqm: Prevent use after free by Thomas Gleixner · 7 years ago
  31. 4d9c9ab x86/cpufeature: Move processor tracing out of scattered features by Paolo Bonzini · 7 years ago
  32. 05154758 x86/retpoline: Fill RSB on context switch for affected CPUs by David Woodhouse · 7 years ago
  33. b0edc2d x86/retpoline/irq32: Convert assembler indirect jumps by Andi Kleen · 7 years ago
  34. 82de930 x86/retpoline/ftrace: Convert ftrace assembler indirect jumps by David Woodhouse · 7 years ago
  35. dcd4311 x86/spectre: Add boot time option to select Spectre v2 mitigation by David Woodhouse · 7 years ago
  36. 3a72bd4 x86/retpoline: Add initial retpoline support by David Woodhouse · 7 years ago
  37. 22e64ef x86/pti: Make unpoison of pgd for trusted boot work for real by Dave Hansen · 7 years ago
  38. b50f563 x86/alternatives: Fix optimize_nops() checking by Borislav Petkov · 7 years ago
  39. 268114c x86/cpu/AMD: Use LFENCE_RDTSC in preference to MFENCE_RDTSC by Tom Lendacky · 7 years ago
  40. 649c1de x86/cpu/AMD: Make LFENCE a serializing instruction by Tom Lendacky · 7 years ago
  41. 968a3bb x86/tboot: Unbreak tboot with PTI enabled by Dave Hansen · 7 years ago
  42. e0d7535 x86/cpu: Implement CPU vulnerabilites sysfs functions by Thomas Gleixner · 7 years ago
  43. 9298e86 x86/cpufeatures: Add X86_BUG_SPECTRE_V[12] by David Woodhouse · 7 years ago
  44. d98309d x86/microcode/intel: Extend BDW late-loading with a revision check by Jia Zhang · 7 years ago
  45. 0ed11aa x86/acpi: Reduce code duplication in mp_override_legacy_irq() by Vikas C Sajjan · 7 years ago
  46. 5bdc95c x86/acpi: Handle SCI interrupts above legacy space gracefully by Vikas C Sajjan · 7 years ago
  47. 4678964 x86/microcode/AMD: Add support for fam17h microcode loading by Tom Lendacky · 7 years ago
  48. 22af48b x86 / CPU: Always show current CPU frequency in /proc/cpuinfo by Rafael J. Wysocki · 7 years ago
  49. eff3e4f x86 / CPU: Avoid unnecessary IPIs in arch_freq_get_on_cpu() by Rafael J. Wysocki · 7 years ago
  50. aea4ead x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN by Thomas Gleixner · 7 years ago
  51. 88dff1a x86/process: Define cpu_tss_rw in same section as declaration by Nick Desaulniers · 7 years ago
  52. 89c9623 x86/dumpstack: Print registers for first stack frame by Josh Poimboeuf · 7 years ago
  53. a841ba8 x86/dumpstack: Fix partial register dumps by Josh Poimboeuf · 7 years ago
  54. 151d703 x86/cpu, x86/pti: Do not enable PTI on AMD processors by Tom Lendacky · 7 years ago
  55. 57849de x86/ldt: Make LDT pgtable free conditional by Thomas Gleixner · 7 years ago
  56. 3e13315 x86/ldt: Plug memory leak in error path by Thomas Gleixner · 7 years ago
  57. cf6c3f7 x86/espfix/64: Fix espfix double-fault handling on 5-level systems by Andy Lutomirski · 7 years ago
  58. 530f5fa x86-32: Fix kexec with stack canary (CONFIG_CC_STACKPROTECTOR) by Linus Torvalds · 7 years ago
  59. b5bef29 x86/smpboot: Remove stale TLB flush invocations by Thomas Gleixner · 7 years ago
  60. e08acdb x86/ldt: Make the LDT mapping RO by Thomas Gleixner · 7 years ago
  61. 33d9d78 x86/dumpstack: Indicate in Oops whether PTI is configured and enabled by Vlastimil Babka · 7 years ago
  62. b63812b x86/mm: Use/Fix PCID to optimize user/kernel switches by Peter Zijlstra · 7 years ago
  63. 7aef823 x86/pti: Put the LDT in its own PGD if PTI is on by Andy Lutomirski · 7 years ago
  64. 088baf5 x86/entry: Align entry text section to PMD boundary by Thomas Gleixner · 7 years ago
  65. 3553113 x86/mm/pti: Force entry through trampoline when PTI active by Thomas Gleixner · 7 years ago
  66. 61fd404 x86/mm/pti: Allocate a separate user PGD by Dave Hansen · 7 years ago
  67. 72a2bed x86/cpufeatures: Add X86_BUG_CPU_INSECURE by Thomas Gleixner · 7 years ago
  68. 763f7ea init: Invoke init_espfix_bsp() from mm_init() by Thomas Gleixner · 7 years ago
  69. 34400932 x86/cpu_entry_area: Move it out of the fixmap by Thomas Gleixner · 7 years ago
  70. 1b0eddf x86/cpu_entry_area: Move it to a separate unit by Thomas Gleixner · 7 years ago
  71. de4c8bb x86/microcode: Dont abuse the TLB-flush interface by Peter Zijlstra · 7 years ago
  72. 06f9acf x86/entry: Rename SYSENTER_stack to CPU_ENTRY_AREA_entry_stack by Dave Hansen · 7 years ago
  73. 2c8e909 x86/ldt: Prevent LDT inheritance on exec by Thomas Gleixner · 7 years ago
  74. b174593 x86/ldt: Rework locking by Peter Zijlstra · 7 years ago
  75. 8388d28 x86/cpufeatures: Make CPU bugs sticky by Thomas Gleixner · 7 years ago
  76. 96e6342 x86/paravirt: Dont patch flush_tlb_single by Thomas Gleixner · 7 years ago
  77. 25e2999 x86/entry/64: Make cpu_entry_area.tss read-only by Andy Lutomirski · 7 years ago
  78. e313437 x86/entry: Clean up the SYSENTER_stack code by Andy Lutomirski · 7 years ago
  79. b25ca49 x86/entry/64: Remove the SYSENTER stack canary by Andy Lutomirski · 7 years ago
  80. bb56839 x86/entry/64: Move the IST stacks into struct cpu_entry_area by Andy Lutomirski · 7 years ago
  81. c631a16 x86/entry/64: Create a per-CPU SYSCALL entry trampoline by Andy Lutomirski · 7 years ago
  82. 2bc9fa0 x86/entry/64: Use a per-CPU trampoline stack for IDT entries by Andy Lutomirski · 7 years ago
  83. c3dbef1b x86/espfix/64: Stop assuming that pt_regs is on the entry stack by Andy Lutomirski · 7 years ago
  84. d120cd7 x86/entry/64: Separate cpu_current_top_of_stack from TSS.sp0 by Andy Lutomirski · 7 years ago
  85. 5bb40c6 x86/entry: Remap the TSS into the CPU entry area by Andy Lutomirski · 7 years ago
  86. 969f570 x86/entry: Move SYSENTER_stack to the beginning of struct tss_struct by Andy Lutomirski · 7 years ago
  87. 41964ef x86/dumpstack: Handle stack overflow on all stacks by Andy Lutomirski · 7 years ago
  88. 5be1369 x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss by Andy Lutomirski · 7 years ago
  89. ece614d x86/mm/fixmap: Generalize the GDT fixmap mechanism, introduce struct cpu_entry_area by Andy Lutomirski · 7 years ago
  90. 2329da3 x86/dumpstack: Add get_stack_info() support for the SYSENTER stack by Andy Lutomirski · 7 years ago
  91. 9b654ab x86/entry/64: Allocate and enable the SYSENTER stack by Andy Lutomirski · 7 years ago
  92. e9b7b11 x86/irq/64: Print the offending IP in the stack overflow warning by Andy Lutomirski · 7 years ago
  93. 996d087 x86/irq: Remove an old outdated comment about context tracking races by Andy Lutomirski · 7 years ago
  94. 5209e8a x86/unwinder: Handle stack overflows more gracefully by Josh Poimboeuf · 7 years ago
  95. 40ddc69 x86/unwinder/orc: Dont bail on stack overflow by Andy Lutomirski · 7 years ago
  96. 21ddc15 x86/entry/64/paravirt: Use paravirt-safe macro to access eflags by Boris Ostrovsky · 7 years ago
  97. 5383f45 locking/barriers: Convert users of lockless_dereference() to READ_ONCE() by Will Deacon · 7 years ago
  98. e918424 x86: Make X86_BUG_FXSAVE_LEAK detectable in CPUID on AMD by Rudolf Marek · 7 years ago
  99. 399bbc9 x86/virt: Add enum for hypervisors to replace x86_hyper by Juergen Gross · 7 years ago
  100. 04d2670 x86/virt, x86/platform: Merge 'struct x86_hyper' into 'struct x86_platform' and 'struct x86_init' by Juergen Gross · 7 years ago