| 4bf5d56d429c ("x86/pti: Mark constant arrays as __initconst") |
| fec9434a12f3 ("x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown") |
| 99c6fa2511d8 ("x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]") |
| de791821c295 ("x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN") |
| 694d99d40972 ("x86/cpu, x86/pti: Do not enable PTI on AMD processors") |
| 41f4c20b57a4 ("x86/pti: Add the pti= cmdline option and documentation") |
| aa8c6248f8c7 ("x86/mm/pti: Add infrastructure for page table isolation") |
| 8a09317b895f ("x86/mm/pti: Prepare the x86/entry assembly code for entry/exit CR3 switching") |
| a89f040fa34e ("x86/cpufeatures: Add X86_BUG_CPU_INSECURE") |
| 613e396bc0d4 ("init: Invoke init_espfix_bsp() from mm_init()") |
| 3386bc8aed82 ("x86/entry/64: Create a per-CPU SYSCALL entry trampoline") |
| 3e3b9293d392 ("x86/entry/64: Return to userspace from the trampoline stack") |
| 7f2590a110b8 ("x86/entry/64: Use a per-CPU trampoline stack for IDT entries") |
| 72f5e08dbba2 ("x86/entry: Remap the TSS into the CPU entry area") |
| 1a935bc3d4ea ("x86/entry: Move SYSENTER_stack to the beginning of struct tss_struct") |
| 7fb983b4dd56 ("x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss") |
| ef8813ab2805 ("x86/mm/fixmap: Generalize the GDT fixmap mechanism, introduce struct cpu_entry_area") |
| aaeed3aeb39c ("x86/entry/gdt: Put per-CPU GDT remaps in ascending order") |
| 33a2f1a6c4d7 ("x86/dumpstack: Add get_stack_info() support for the SYSENTER stack") |
| 1a79797b58cd ("x86/entry/64: Allocate and enable the SYSENTER stack") |
| 650400b2ccb8 ("Merge branch 'upstream-x86-selftests' into WIP.x86/pti.base") |