1. 04dcbdb x86/speculation/mds: Clear CPU buffers on exit to user by Thomas Gleixner · 6 years ago
  2. 6a9e529 x86/speculation/mds: Add mds_clear_cpu_buffers() by Thomas Gleixner · 6 years ago
  3. 20c3a2c x86/speculation: Add support for STIBP always-on preferred mode by Thomas Lendacky · 6 years ago
  4. 6b3e64c x86/speculation: Add seccomp Spectre v2 user space protection mode by Thomas Gleixner · 6 years ago
  5. 9137bb2 x86/speculation: Add prctl() control for indirect branch speculation by Thomas Gleixner · 6 years ago
  6. 4c71a2b6 x86/speculation: Prepare for conditional IBPB in switch_mm() by Thomas Gleixner · 6 years ago
  7. fa1202e x86/speculation: Add command line control for indirect branch speculation by Thomas Gleixner · 6 years ago
  8. ef014aa x86/retpoline: Remove minimal retpoline support by Zhenzhong Duan · 6 years ago
  9. 4cd24de x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support by Zhenzhong Duan · 6 years ago
  10. 0cbb76d x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant by Zhenzhong Duan · 6 years ago
  11. 706d516 x86/speculation: Support Enhanced IBRS on future CPUs by Sai Praneeth · 6 years ago
  12. d9f4426 x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation by Jiang Biao · 6 years ago
  13. 5b79c2a Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net by David S. Miller · 7 years ago
  14. 4b59bdb x86/bugs: Remove x86_spec_ctrl_set() by Thomas Gleixner · 7 years ago
  15. fa8ac49 x86/bugs: Expose x86_spec_ctrl_base directly by Thomas Gleixner · 7 years ago
  16. 3625600 bpf, x64: clean up retpoline emission slightly by Daniel Borkmann · 7 years ago
  17. 5f2b745 x86/cpu: Make alternative_msr_write work for 32-bit code by Jim Mattson · 7 years ago
  18. f21b53b x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass by Kees Cook · 7 years ago
  19. 03f5781 bpf, x86_32: add eBPF JIT compiler for ia32 by Wang YanQing · 7 years ago
  20. a73ec77 x86/speculation: Add prctl for Speculative Store Bypass mitigation by Thomas Gleixner · 7 years ago
  21. 28a2775 x86/speculation: Create spec-ctrl.h to avoid include hell by Thomas Gleixner · 7 years ago
  22. 764f3c2 x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested by Konrad Rzeszutek Wilk · 7 years ago
  23. 24f7fc8 x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation by Konrad Rzeszutek Wilk · 7 years ago
  24. 5cf6875 x86/bugs, KVM: Support the combination of guest and host IBRS by Konrad Rzeszutek Wilk · 7 years ago
  25. 1b86883 x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits by Konrad Rzeszutek Wilk · 7 years ago
  26. 1aa7a57 x86/nospec: Simplify alternative_msr_write() by Linus Torvalds · 7 years ago
  27. 9e1909b Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip by Linus Torvalds · 7 years ago
  28. a14bff1 x86/speculation, objtool: Annotate indirect calls/jumps for objtool on 32-bit kernels by Andy Whitcroft · 7 years ago
  29. 85a2d93 Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip by Linus Torvalds · 7 years ago
  30. a493a87 bpf, x64: implement retpoline for tail call by Daniel Borkmann · 7 years ago
  31. d72f4e2 x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP by Ingo Molnar · 7 years ago
  32. 9e0e3c5 x86/speculation, objtool: Annotate indirect calls/jumps for objtool by Peter Zijlstra · 7 years ago
  33. dd84441 x86/speculation: Use IBRS if available before calling into firmware by David Woodhouse · 7 years ago
  34. d1c9910 Revert "x86/retpoline: Simplify vmexit_fill_RSB()" by David Woodhouse · 7 years ago
  35. ea00f30 x86/speculation: Add <asm/msr-index.h> dependency by Peter Zijlstra · 7 years ago
  36. f208820 Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()" by David Woodhouse · 7 years ago
  37. af189c9 x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL by Darren Kenny · 7 years ago
  38. 64e1672 x86/speculation: Simplify indirect_branch_prediction_barrier() by Borislav Petkov · 7 years ago
  39. 1dde741 x86/retpoline: Simplify vmexit_fill_RSB() by Borislav Petkov · 7 years ago
  40. 2961298 x86/cpufeatures: Clean up Spectre v2 related CPUID flags by David Woodhouse · 7 years ago
  41. 7a32fc5 x86/nospec: Fix header guards names by Borislav Petkov · 7 years ago
  42. 20ffa1c x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support by David Woodhouse · 7 years ago
  43. 3f7d875 x86/retpoline: Optimize inline assembler for vmexit_fill_RSB by Andi Kleen · 7 years ago
  44. 736e80a retpoline: Introduce start/end markers of indirect thunk by Masami Hiramatsu · 7 years ago
  45. 28d437d x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros by Tom Lendacky · 7 years ago
  46. 117cc7a x86/retpoline: Fill return stack buffer on vmexit by David Woodhouse · 7 years ago
  47. da28512 x86/spectre: Add boot time option to select Spectre v2 mitigation by David Woodhouse · 7 years ago
  48. 76b0438 x86/retpoline: Add initial retpoline support by David Woodhouse · 7 years ago