List of previously applied patches:
* selftests/net: correct the return value for run_netsocktests
* x86/speculation/mds: Add 'mitigations=' support for MDS
* x86/speculation: Support 'mitigations=' cmdline option
* cpu/speculation: Add 'mitigations=' cmdline option
* x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off
* x86/speculation/mds: Fix comment
* x86/speculation/mds: Add SMT warning message
* x86/speculation: Move arch_smt_update() call to after mitigation decisions
* x86/speculation/mds: Add mitigation mode VMWERV
* x86/speculation/mds: Add sysfs reporting for MDS
* x86/speculation/mds: Add mitigation control for MDS
* x86/speculation: Unify conditional spectre v2 print functions
* x86/speculation: Reorder the spec_v2 code
* x86/speculation: Rework SMT state change
* x86/speculation/mds: Conditionally clear CPU buffers on idle entry
* x86/speculation/mds: Clear CPU buffers on exit to user
* locking/static_keys: Provide DECLARE and well as DEFINE macros
* x86/speculation/mds: Add mds_clear_cpu_buffers()
* x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests
* x86/speculation/mds: Add BUG_MSBDS_ONLY
* x86/speculation/mds: Add basic bug infrastructure for MDS
* x86/speculation: Consolidate CPU whitelists
* x86/msr-index: Cleanup bit defines
* locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file
* bitops: avoid integer overflow in GENMASK(_ULL)
* kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
* x86/cpu: Sanitize FAM6_ATOM naming
* x86/speculation: Simplify the CPU bug detection logic
* vfio/type1: Limit DMA mappings per container
* igb: Fix WARN_ONCE on runtime suspend
* KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled
* x86/speculation: Support Enhanced IBRS on future CPUs
* x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_v2_mitigation
* powerpc/pseries: Restore default security feature flags on setup
* powerpc: Move default security feature flags
* powerpc/pseries: Fix clearing of security feature flags
* powerpc/64s: Wire up cpu_show_spectre_v2()
* powerpc/64s: Wire up cpu_show_spectre_v1()
* powerpc/pseries: Use the security flags in pseries_setup_rfi_flush()
* powerpc/powernv: Use the security flags in pnv_setup_rfi_flush()
* powerpc/64s: Enhance the information in cpu_show_meltdown()
* powerpc/64s: Move cpu_show_meltdown()
* powerpc/powernv: Set or clear security feature flags
* powerpc/pseries: Set or clear security feature flags
* powerpc: Add security feature flags for Spectre/Meltdown
* powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags
* powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration
* powerpc/rfi-flush: Differentiate enabled and patched flush types
* powerpc/rfi-flush: Always enable fallback flush on pseries
* powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again
* powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs code
* powerpc/powernv: Support firmware disable of RFI flush
* powerpc/pseries: Support firmware disable of RFI flush
List of previously applied patches: /mds: Add 'mitigations=' support for MDS /mds: Print SMT vulnerable on MSBDS with mitigations off /mds: Fix comment /mds: Add SMT warning message /mds: Add mitigation mode VMWERV /mds: Add sysfs reporting for MDS /mds: Add mitigation control for MDS /mds: Conditionally clear CPU buffers on idle entry /mds: Clear CPU buffers on exit to user static_ keys: Provide DECLARE and well as DEFINE macros /mds: Add mds_clear_ cpu_buffers( ) MD_CLEAR to guests /mds: Add BUG_MSBDS_ONLY /mds: Add basic bug infrastructure for MDS ctrl_set_ guest/host( ) with interrupts disabled v2_mitigation spectre_ v2() spectre_ v1() setup_rfi_ flush() rfi_flush( ) CHARACTERISTICS flags
* selftests/net: correct the return value for run_netsocktests
* x86/speculation
* x86/speculation: Support 'mitigations=' cmdline option
* cpu/speculation: Add 'mitigations=' cmdline option
* x86/speculation
* x86/speculation
* x86/speculation
* x86/speculation: Move arch_smt_update() call to after mitigation decisions
* x86/speculation
* x86/speculation
* x86/speculation
* x86/speculation: Unify conditional spectre v2 print functions
* x86/speculation: Reorder the spec_v2 code
* x86/speculation: Rework SMT state change
* x86/speculation
* x86/speculation
* locking/
* x86/speculation
* x86/kvm: Expose X86_FEATURE_
* x86/speculation
* x86/speculation
* x86/speculation: Consolidate CPU whitelists
* x86/msr-index: Cleanup bit defines
* locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file
* bitops: avoid integer overflow in GENMASK(_ULL)
* kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
* x86/cpu: Sanitize FAM6_ATOM naming
* x86/speculation: Simplify the CPU bug detection logic
* vfio/type1: Limit DMA mappings per container
* igb: Fix WARN_ONCE on runtime suspend
* KVM: x86: SVM: Call x86_spec_
* x86/speculation: Support Enhanced IBRS on future CPUs
* x86/speculation: Remove SPECTRE_V2_IBRS in enum spectre_
* powerpc/pseries: Restore default security feature flags on setup
* powerpc: Move default security feature flags
* powerpc/pseries: Fix clearing of security feature flags
* powerpc/64s: Wire up cpu_show_
* powerpc/64s: Wire up cpu_show_
* powerpc/pseries: Use the security flags in pseries_
* powerpc/powernv: Use the security flags in pnv_setup_
* powerpc/64s: Enhance the information in cpu_show_meltdown()
* powerpc/64s: Move cpu_show_meltdown()
* powerpc/powernv: Set or clear security feature flags
* powerpc/pseries: Set or clear security feature flags
* powerpc: Add security feature flags for Spectre/Meltdown
* powerpc/pseries: Add new H_GET_CPU_
* powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration
* powerpc/rfi-flush: Differentiate enabled and patched flush types
* powerpc/rfi-flush: Always enable fallback flush on pseries
* powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again
* powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs code
* powerpc/powernv: Support firmware disable of RFI flush
* powerpc/pseries: Support firmware disable of RFI flush