blob: 3c5f9e437d1b392351fe6d36daccfb6c61b94651 [file] [log] [blame]
a73ec77ee17e ("x86/speculation: Add prctl for Speculative Store Bypass mitigation")
764f3c21588a ("x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested")
1115a859f332 ("x86/bugs: Whitelist allowed SPEC_CTRL MSR values")
772439717dbf ("x86/bugs/intel: Set proper CPU features and setup RDS")
24f7fc83b920 ("x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation")
c456442cd3a5 ("x86/bugs: Expose /sys/../spec_store_bypass")
5cf687548705 ("x86/bugs, KVM: Support the combination of guest and host IBRS")
1b86883ccb8d ("x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits")
d1059518b478 ("x86/bugs: Concentrate bug reporting into a separate function")
4a28bfe3267b ("x86/bugs: Concentrate bug detection into a separate function")
ecb586bd29c9 ("KVM/x86: Remove indirect MSR op calls from SPEC_CTRL")
d72f4e29e6d8 ("x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP")
dd84441a7971 ("x86/speculation: Use IBRS if available before calling into firmware")
21e433bdb95b ("x86/speculation: Clean up various Spectre related details")
f208820a321f ("Revert "x86/speculation: Simplify indirect_branch_prediction_barrier()"")
b2ac58f90540 ("KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL")
d28b387fb74d ("KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL")
28c1c9fabf48 ("KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES")
15d45071523d ("KVM/x86: Add IBPB support")
b7b27aa011a1 ("KVM/x86: Update the reverse_cpuid list to include CPUID_7_EDX")
a96223f1927f ("Merge branch 'msr-bitmaps' of git://git.kernel.org/pub/scm/virt/kvm/kvm into x86/pti")