patch 0001-x86-boot-Add-early-cmdline-parsing-for-options-with-.patch patch 0002-x86-mm-Add-the-nopcid-boot-option-to-turn-off-PCID.patch patch 0003-x86-mm-Enable-CR4.PCIDE-on-supported-systems.patch patch 0004-KAISER-Kernel-Address-Isolation.patch patch 0005-kaiser-merged-update.patch patch 0006-kaiser-do-not-set-_PAGE_NX-on-pgd_none.patch patch 0007-kaiser-stack-map-PAGE_SIZE-at-THREAD_SIZE-PAGE_SIZE.patch patch 0008-kaiser-fix-build-and-FIXME-in-alloc_ldt_struct.patch patch 0009-kaiser-KAISER-depends-on-SMP.patch patch 0010-kaiser-fix-regs-to-do_nmi-ifndef-CONFIG_KAISER.patch patch 0011-kaiser-fix-perf-crashes.patch patch 0012-kaiser-ENOMEM-if-kaiser_pagetable_walk-NULL.patch patch 0013-kaiser-tidied-up-asm-kaiser.h-somewhat.patch patch 0014-kaiser-tidied-up-kaiser_add-remove_mapping-slightly.patch patch 0015-kaiser-align-addition-to-x86-mm-Makefile.patch patch 0016-kaiser-cleanups-while-trying-for-gold-link.patch patch 0017-kaiser-name-that-0x1000-KAISER_SHADOW_PGD_OFFSET.patch patch 0018-kaiser-delete-KAISER_REAL_SWITCH-option.patch patch 0019-kaiser-vmstat-show-NR_KAISERTABLE-as-nr_overhead.patch patch 0020-kaiser-enhanced-by-kernel-and-user-PCIDs.patch patch 0021-kaiser-load_new_mm_cr3-let-SWITCH_USER_CR3-flush-use.patch patch 0022-kaiser-PCID-0-for-kernel-and-128-for-user.patch patch 0023-kaiser-x86_cr3_pcid_noflush-and-x86_cr3_pcid_user.patch patch 0024-kaiser-paranoid_entry-pass-cr3-need-to-paranoid_exit.patch patch 0025-kaiser-kaiser_remove_mapping-move-along-the-pgd.patch patch 0026-kaiser-fix-unlikely-error-in-alloc_ldt_struct.patch patch 0027-kaiser-add-nokaiser-boot-option-using-ALTERNATIVE.patch patch 0028-x86-kaiser-Rename-and-simplify-X86_FEATURE_KAISER-ha.patch patch 0029-x86-kaiser-Check-boottime-cmdline-params.patch patch 0030-kaiser-use-ALTERNATIVE-instead-of-x86_cr3_pcid_noflu.patch patch 0031-kaiser-drop-is_atomic-arg-to-kaiser_pagetable_walk.patch patch 0032-kaiser-asm-tlbflush.h-handle-noPGE-at-lower-level.patch patch 0033-kaiser-kaiser_flush_tlb_on_return_to_user-check-PCID.patch patch 0034-x86-paravirt-Dont-patch-flush_tlb_single.patch patch 0035-x86-kaiser-Reenable-PARAVIRT.patch patch 0036-kaiser-disabled-on-Xen-PV.patch patch 0037-x86-kaiser-Move-feature-detection-up.patch patch 0038-KPTI-Rename-to-PAGE_TABLE_ISOLATION.patch patch 0039-KPTI-Report-when-enabled.patch patch 0040-kaiser-Set-_PAGE_NX-only-if-supported.patch patch 0041-kaiser-Set-_PAGE_NX-only-if-supported.patch patch 0042-bpf-adjust-insn_aux_data-when-patching-insns.patch patch 0043-bpf-move-fixup_bpf_calls-function.patch patch 0044-bpf-refactor-fixup_bpf_calls.patch patch 0045-bpf-prevent-out-of-bounds-speculation.patch patch 0046-bpf-array-fix-overflow-in-max_entries-and-undefined-.patch patch 0047-x86-Documentation-Add-PTI-description.patch patch 0048-x86-cpu-Factor-out-application-of-forced-CPU-caps.patch patch 0049-x86-cpufeatures-Make-CPU-bugs-sticky.patch patch 0050-x86-cpufeatures-Add-X86_BUG_CPU_INSECURE.patch patch 0051-x86-pti-Rename-BUG_CPU_INSECURE-to-BUG_CPU_MELTDOWN.patch patch 0052-x86-cpufeatures-Add-X86_BUG_SPECTRE_V-12.patch patch 0053-x86-cpu-Merge-bugs.c-and-bugs_64.c.patch patch 0054-sysfs-cpu-Add-vulnerability-folder.patch patch 0055-x86-cpu-Implement-CPU-vulnerabilites-sysfs-functions.patch patch 0056-x86-cpu-AMD-Make-LFENCE-a-serializing-instruction.patch patch 0057-x86-cpu-AMD-Use-LFENCE_RDTSC-in-preference-to-MFENCE.patch patch 0058-sysfs-cpu-Fix-typos-in-vulnerability-documentation.patch patch 0059-x86-alternatives-Fix-optimize_nops-checking.patch patch 0060-x86-alternatives-Add-missing-n-at-end-of-ALTERNATIVE.patch patch 0061-x86-mm-32-Move-setup_clear_cpu_cap-X86_FEATURE_PCID-.patch patch 0062-objtool-modules-Discard-objtool-annotation-sections-.patch patch 0063-objtool-Detect-jumps-to-retpoline-thunks.patch patch 0064-objtool-Allow-alternatives-to-be-ignored.patch patch 0065-x86-asm-Use-register-variable-to-get-stack-pointer-v.patch patch 0066-x86-retpoline-Add-initial-retpoline-support.patch patch 0067-x86-spectre-Add-boot-time-option-to-select-Spectre-v.patch patch 0068-x86-retpoline-crypto-Convert-crypto-assembler-indire.patch patch 0069-x86-retpoline-entry-Convert-entry-assembler-indirect.patch patch 0070-x86-retpoline-ftrace-Convert-ftrace-assembler-indire.patch patch 0071-x86-retpoline-hyperv-Convert-assembler-indirect-jump.patch patch 0072-x86-retpoline-xen-Convert-Xen-hypercall-indirect-jum.patch patch 0073-x86-retpoline-checksum32-Convert-assembler-indirect-.patch patch 0074-x86-retpoline-irq32-Convert-assembler-indirect-jumps.patch patch 0075-x86-retpoline-Fill-return-stack-buffer-on-vmexit.patch patch 0076-x86-retpoline-Remove-compile-time-warning.patch patch 0077-objtool-Fix-retpoline-support-for-pre-ORC-objtool.patch patch 0078-x86-pti-efi-broken-conversion-from-efi-to-kernel-pag.patch patch 0079-x86-retpoline-Fill-RSB-on-context-switch-for-affecte.patch patch 0080-x86-retpoline-Add-LFENCE-to-the-retpoline-RSB-fillin.patch patch 0081-objtool-Improve-error-message-for-bad-file-argument.patch patch 0082-x86-cpufeature-Move-processor-tracing-out-of-scatter.patch patch 0083-module-Add-retpoline-tag-to-VERMAGIC.patch patch 0084-x86-cpu-x86-pti-Do-not-enable-PTI-on-AMD-processors.patch patch 0085-x86-mce-Make-machine-check-speculation-protected.patch patch 0086-retpoline-Introduce-start-end-markers-of-indirect-th.patch patch 0087-kprobes-x86-Blacklist-indirect-thunk-functions-for-k.patch patch 0088-kprobes-x86-Disable-optimizing-on-the-function-jumps.patch patch 0089-x86-pti-Document-fix-wrong-index.patch patch 0090-x86-retpoline-Optimize-inline-assembler-for-vmexit_f.patch patch 0091-Revert-module-Add-retpoline-tag-to-VERMAGIC.patch patch 0092-Map-the-vsyscall-page-with-_PAGE_USER.patch patch 0093-vsyscall-Fix-permissions-for-emulate-mode-with-KAISE.patch patch 0094-bpf-fix-mixed-signed-unsigned-derived-min-max-value-.patch patch 0095-bpf-prevent-leaking-pointer-via-xadd-on-unpriviledge.patch patch 0096-x86-bpf_jit-small-optimization-in-emit_bpf_tail_call.patch patch 0097-bpf-fix-bpf_tail_call-x64-JIT.patch patch 0098-bpf-introduce-BPF_JIT_ALWAYS_ON-config.patch patch 0099-bpf-arsh-is-not-supported-in-32-bit-alu-thus-reject-.patch patch 0100-bpf-avoid-false-sharing-of-map-refcount-with-max_ent.patch patch 0101-bpf-fix-divides-by-zero.patch patch 0102-bpf-fix-32-bit-divide-by-zero.patch patch 0103-bpf-reject-stores-into-ctx-via-st-and-xadd.patch patch 0001-kaiser-fix-intel_bts-perf-crashes.patch patch 0002-x86-pti-Make-unpoison-of-pgd-for-trusted-boot-work-f.patch patch 0003-kaiser-allocate-pgd-with-order-0-when-pti-off.patch patch 0004-x86-asm-Fix-inline-asm-call-constraints-for-GCC-4.4.patch patch 0005-x86-microcode-AMD-Do-not-load-when-running-on-a-hype.patch patch 0006-x86-retpoline-Remove-the-esp-rsp-thunk.patch patch 0007-module-retpoline-Warn-about-missing-retpoline-in-mod.patch patch 0008-x86-cpufeatures-Add-CPUID_7_EDX-CPUID-leaf.patch patch 0009-x86-cpufeatures-Add-Intel-feature-bits-for-Speculati.patch patch 0010-x86-cpufeatures-Add-AMD-feature-bits-for-Speculation.patch patch 0011-x86-msr-Add-definitions-for-new-speculation-control-.patch patch 0012-x86-pti-Do-not-enable-PTI-on-CPUs-which-are-not-vuln.patch patch 0013-x86-cpufeature-Blacklist-SPEC_CTRL-PRED_CMD-on-early.patch patch 0014-x86-speculation-Add-basic-IBPB-Indirect-Branch-Predi.patch patch 0015-x86-nospec-Fix-header-guards-names.patch patch 0016-x86-bugs-Drop-one-mitigation-from-dmesg.patch patch 0017-x86-cpu-bugs-Make-retpoline-module-warning-condition.patch patch 0018-x86-cpufeatures-Clean-up-Spectre-v2-related-CPUID-fl.patch patch 0019-x86-retpoline-Simplify-vmexit_fill_RSB.patch patch 0020-x86-spectre-Check-CONFIG_RETPOLINE-in-command-line-p.patch patch 0021-x86-entry-64-Remove-the-SYSCALL64-fast-path.patch patch 0022-x86-entry-64-Push-extra-regs-right-away.patch patch 0024-Documentation-Document-array_index_nospec.patch patch 0025-array_index_nospec-Sanitize-speculative-array-de-ref.patch patch 0026-x86-Implement-array_index_mask_nospec.patch patch 0027-x86-Introduce-barrier_nospec.patch patch 0028-x86-Introduce-__uaccess_begin_nospec-and-uaccess_try.patch patch 0029-x86-usercopy-Replace-open-coded-stac-clac-with-__uac.patch patch 0030-x86-uaccess-Use-__uaccess_begin_nospec-and-uaccess_t.patch patch 0031-x86-get_user-Use-pointer-masking-to-limit-speculatio.patch patch 0032-x86-syscall-Sanitize-syscall-table-de-references-und.patch patch 0033-vfs-fdtable-Prevent-bounds-check-bypass-via-speculat.patch patch 0034-x86-spectre-Report-get_user-mitigation-for-spectre_v.patch patch 0035-x86-spectre-Fix-spelling-mistake-vunerable-vulnerabl.patch patch 0036-x86-cpuid-Fix-up-virtual-IBRS-IBPB-STIBP-feature-bit.patch patch 0037-x86-retpoline-Avoid-retpolines-for-built-in-__init-f.patch patch 0038-x86-spectre-Simplify-spectre_v2-command-line-parsing.patch patch 0039-x86-pti-Mark-constant-arrays-as-__initconst.patch patch 0040-x86-speculation-Fix-typo-IBRS_ATT-which-should-be-IB.patch patch 0041-x86-microcode-Do-the-family-check-first.patch patch 0001-kaiser-fix-compile-error-without-vsyscall.patch patch 0002-x86-entry-64-compat-Clear-registers-for-compat-sysca.patch patch 0003-x86-speculation-Update-Speculation-Control-microcode.patch patch 0004-x86-speculation-Correct-Speculation-Control-microcod.patch patch 0005-x86-speculation-Clean-up-various-Spectre-related-det.patch patch 0006-x86-speculation-Fix-up-array_index_nospec_mask-asm-c.patch patch 0007-x86-speculation-Add-asm-msr-index.h-dependency.patch patch 0008-x86-cpu-Rename-cpu_data.x86_mask-to-cpu_data.x86_ste.patch patch 0009-x86-spectre-Fix-an-error-message.patch patch 0010-x86-cpu-Change-type-of-x86_cache_size-variable-to-un.patch patch 0011-x86-microcode-AMD-Change-load_microcode_amd-s-param-.patch patch 0012-x86-entry-64-Clear-extra-registers-beyond-syscall-ar.patch patch 0001-x86-mm-Remove-flush_tlb-and-flush_tlb_current_task.patch patch 0002-x86-mm-Make-flush_tlb_mm_range-more-predictable.patch patch 0003-x86-mm-Reimplement-flush_tlb_page-using-flush_tlb_mm.patch patch 0004-x86-mm-Remove-the-UP-asm-tlbflush.h-code-always-use-.patch patch 0005-x86-mm-Give-each-mm-TLB-flush-generation-a-unique-ID.patch patch 0006-x86-speculation-Use-Indirect-Branch-Prediction-Barri.patch patch 0007-bpf-x64-implement-retpoline-for-tail-call.patch patch 0008-x86-spectre_v2-Don-t-check-microcode-versions-when-r.patch patch 0009-Revert-x86-retpoline-Simplify-vmexit_fill_RSB.patch patch 0010-x86-speculation-Use-IBRS-if-available-before-calling.patch patch 0011-x86-retpoline-Support-retpoline-builds-with-Clang.patch patch 0012-x86-speculation-objtool-Annotate-indirect-calls-jump.patch patch 0013-x86-boot-objtool-Annotate-indirect-jump-in-secondary.patch patch 0014-x86-speculation-Move-firmware_restrict_branch_specul.patch patch 0001-KVM-Fix-stack-out-of-bounds-read-in-write_mmio.patch patch 0002-kvm-vmx-Scrub-hardware-GPRs-at-VM-exit.patch patch 0003-KVM-x86-Add-memory-barrier-on-vmcs-field-lookup.patch patch 0004-KVM-x86-emulator-Return-to-user-mode-on-L1-CPL-0-emu.patch patch 0005-KVM-x86-Don-t-re-execute-instruction-when-not-passin.patch patch 0006-KVM-X86-Fix-operand-address-size-during-instruction-.patch patch 0007-KVM-x86-ioapic-Fix-level-triggered-EOI-and-IOAPIC-re.patch patch 0008-KVM-x86-ioapic-Clear-Remote-IRR-when-entry-is-switch.patch patch 0009-KVM-x86-ioapic-Preserve-read-only-values-in-the-redi.patch patch 0010-KVM-VMX-Fix-rflags-cache-during-vCPU-reset.patch patch 0011-KVM-x86-Make-indirect-calls-in-emulator-speculation-.patch patch 0012-KVM-VMX-Make-indirect-call-speculation-safe.patch patch 0013-x86-kvm-Update-spectre-v1-mitigation.patch patch 0014-KVM-nVMX-kmap-can-t-fail.patch patch 0015-KVM-nVMX-vmx_complete_nested_posted_interrupt-can-t-.patch patch 0016-KVM-nVMX-mark-vmcs12-pages-dirty-on-L2-exit.patch patch 0017-KVM-nVMX-Eliminate-vmcs02-pool.patch patch 0018-KVM-VMX-introduce-alloc_loaded_vmcs.patch patch 0019-KVM-VMX-make-MSR-bitmaps-per-VCPU.patch patch 0020-KVM-x86-Add-IBPB-support.patch patch 0021-KVM-VMX-Emulate-MSR_IA32_ARCH_CAPABILITIES.patch patch 0022-KVM-VMX-Allow-direct-access-to-MSR_IA32_SPEC_CTRL.patch patch 0023-KVM-SVM-Allow-direct-access-to-MSR_IA32_SPEC_CTRL.patch patch 0024-KVM-nVMX-Fix-races-when-sending-nested-PI-while-dest.patch patch 0025-KVM-x86-Reduce-retpoline-performance-impact-in-slot_.patch patch 0026-KVM-x86-fix-escape-of-guest-dr6-to-the-host.patch patch 0027-x86-add-MULTIUSER-dependency-for-KVM.patch patch 0028-KVM-add-X86_LOCAL_APIC-dependency.patch patch 0029-KVM-async_pf-Fix-DF-due-to-inject-Page-not-Present-a.patch patch 0030-KVM-VMX-clean-up-declaration-of-VPID-EPT-invalidatio.patch patch 0031-KVM-nVMX-invvpid-handling-improvements.patch patch 0032-KVM-x86-Remove-indirect-MSR-op-calls-from-SPEC_CTRL.patch patch 0033-KVM-VMX-Optimize-vmx_vcpu_run-and-svm_vcpu_run-by-ma.patch patch 0001-x86-paravirt-objtool-Annotate-indirect-calls.patch patch 0002-x86-module-Detect-and-skip-invalid-relocations.patch patch 0003-kvm-svm-Setup-MCG_CAP-on-AMD-properly.patch patch 0004-kvm-nVMX-Disallow-userspace-injected-exceptions-in-g.patch patch 0005-x86-cpufeatures-Add-Intel-PCONFIG-cpufeature.patch patch 0006-x86-speculation-objtool-Annotate-indirect-calls-jump.patch patch 0007-x86-speculation-Remove-Skylake-C2-from-Speculation-C.patch patch 0008-x86-reboot-Turn-off-KVM-when-halting-a-CPU.patch patch 0009-x86-KASLR-Fix-kexec-kernel-boot-crash-when-KASLR-ran.patch patch 0010-kvm-x86-fix-icebp-instruction-handling.patch patch 0011-bpf-x64-increase-number-of-passes.patch patch 0012-x86-mm-kaslr-Use-the-_ASM_MUL-macro-for-multiplicati.patch patch 0013-KVM-X86-Fix-preempt-the-preemption-timer-cancel.patch patch 0014-KVM-nVMX-Fix-handling-of-lmsw-instruction.patch patch 0015-KVM-SVM-do-not-zero-out-segment-attributes-if-segmen.patch patch 0016-KVM-nVMX-Update-vmcs12-guest_linear_address-on-neste.patch patch 0017-perf-x86-Fix-possible-Spectre-v1-indexing-for-hw_per.patch patch 0018-perf-x86-cstate-Fix-possible-Spectre-v1-indexing-for.patch patch 0019-perf-x86-msr-Fix-possible-Spectre-v1-indexing-in-the.patch patch 0020-perf-x86-Fix-possible-Spectre-v1-indexing-for-x86_pm.patch patch 0021-x86-amd-don-t-set-X86_BUG_SYSRET_SS_ATTRS-when-runni.patch patch 0022-x86-nospec-Simplify-alternative_msr_write.patch patch 0023-x86-bugs-Concentrate-bug-detection-into-a-separate-f.patch patch 0024-x86-bugs-Concentrate-bug-reporting-into-a-separate-f.patch patch 0025-x86-bugs-Read-SPEC_CTRL-MSR-during-boot-and-re-use-r.patch patch 0026-x86-bugs-KVM-Support-the-combination-of-guest-and-ho.patch patch 0027-x86-bugs-Expose-sys-.-spec_store_bypass.patch patch 0028-x86-cpufeatures-Add-X86_FEATURE_RDS.patch patch 0029-x86-bugs-Provide-boot-parameters-for-the-spec_store_.patch patch 0030-x86-bugs-intel-Set-proper-CPU-features-and-setup-RDS.patch patch 0031-x86-bugs-Whitelist-allowed-SPEC_CTRL-MSR-values.patch patch 0032-x86-bugs-AMD-Add-support-to-disable-RDS-on-Fam-15-16.patch patch 0033-x86-KVM-VMX-Expose-SPEC_CTRL-Bit-2-to-the-guest.patch patch 0034-x86-speculation-Create-spec-ctrl.h-to-avoid-include-.patch patch 0035-x86-process-Optimize-TIF-checks-in-__switch_to_xtra.patch patch 0036-x86-process-Correct-and-optimize-TIF_BLOCKSTEP-switc.patch patch 0037-x86-process-Optimize-TIF_NOTSC-switch.patch patch 0038-x86-process-Allow-runtime-control-of-Speculative-Sto.patch patch 0039-x86-speculation-Add-prctl-for-Speculative-Store-Bypa.patch patch 0040-nospec-Move-array_index_nospec-parameter-checking-in.patch patch 0041-nospec-Allow-index-argument-to-have-const-qualified-.patch patch 0042-nospec-Kill-array_index_nospec_mask_check.patch patch 0043-nospec-Include-asm-barrier.h-dependency.patch patch 0044-prctl-Add-speculation-control-prctls.patch patch 0045-nospec-Allow-getting-setting-on-non-current-task.patch patch 0046-x86-bugs-Make-boot-modes-__ro_after_init.patch patch 0047-fs-proc-Report-eip-esp-in-prod-PID-stat-for-coredump.patch patch 0048-proc-fix-coredump-vs-read-proc-stat-race.patch patch 0049-proc-Provide-details-on-speculation-flaw-mitigations.patch patch 0050-prctl-Add-force-disable-speculation.patch patch 0051-seccomp-fix-the-usage-of-get-put_seccomp_filter-in-s.patch patch 0052-seccomp-Enable-speculation-flaw-mitigations.patch patch 0053-seccomp-Use-PR_SPEC_FORCE_DISABLE.patch patch 0054-seccomp-Add-filter-flag-to-opt-out-of-SSB-mitigation.patch patch 0055-seccomp-Move-speculation-migitation-control-to-arch-.patch patch 0056-x86-speculation-Make-seccomp-the-default-mode-for-Sp.patch patch 0057-x86-bugs-Rename-_RDS-to-_SSBD.patch patch 0058-x86-bugs-Fix-__ssb_select_mitigation-return-type.patch patch 0059-x86-bugs-Make-cpu_show_common-static.patch patch 0060-x86-bugs-Fix-the-parameters-alignment-and-missing-vo.patch patch 0061-x86-cpu-Make-alternative_msr_write-work-for-32-bit-c.patch patch 0062-KVM-SVM-Move-spec-control-call-after-restore-of-GS.patch patch 0063-x86-speculation-Use-synthetic-bits-for-IBRS-IBPB-STI.patch patch 0064-x86-cpufeatures-Disentangle-MSR_SPEC_CTRL-enumeratio.patch patch 0065-x86-cpufeatures-Disentangle-SSBD-enumeration.patch patch 0066-x86-cpu-AMD-Fix-erratum-1076-CPB-bit.patch patch 0067-x86-cpufeatures-Add-FEATURE_ZEN.patch patch 0068-x86-speculation-Handle-HT-correctly-on-AMD.patch patch 0069-x86-bugs-KVM-Extend-speculation-control-for-VIRT_SPE.patch patch 0070-x86-speculation-Add-virtualized-speculative-store-by.patch patch 0071-x86-speculation-Rework-speculative_store_bypass_upda.patch patch 0072-x86-bugs-Unify-x86_spec_ctrl_-set_guest-restore_host.patch patch 0073-x86-bugs-Expose-x86_spec_ctrl_base-directly.patch patch 0074-x86-bugs-Remove-x86_spec_ctrl_set.patch patch 0075-x86-bugs-Rework-spec_ctrl-base-and-mask-logic.patch patch 0076-x86-speculation-KVM-Implement-support-for-VIRT_SPEC_.patch patch 0077-KVM-SVM-Implement-VIRT_SPEC_CTRL-support-for-SSBD.patch patch 0078-x86-bugs-Rename-SSBD_NO-to-SSB_NO.patch patch 0079-x86-kexec-Avoid-double-free_page-upon-do_kexec_load-.patch patch 0080-KVM-VMX-Expose-SSBD-properly-to-guests.patch patch 0081-KVM-x86-Update-cpuid-properly-when-CR4.OSXAVE-or-CR4.patch patch 0082-kvm-x86-IA32_ARCH_CAPABILITIES-is-always-supported.patch patch 0083-kvm-x86-fix-KVM_XEN_HVM_CONFIG-ioctl.patch patch 0084-KVM-VMX-raise-internal-error-for-exception-during-in.patch patch 0085-KVM-lapic-stop-advertising-DIRECTED_EOI-when-in-kern.patch patch 0086-objtool-Improve-detection-of-BUG-and-other-dead-ends.patch patch 0087-objtool-Move-checking-code-to-check.c.patch patch 0088-objtool-sync-up-with-the-4.14.47-version-of-objtool.patch patch 0089-objtool-x86-Add-several-functions-and-files-to-the-o.patch patch 0090-x86-xen-Add-unwind-hint-annotations-to-xen_setup_gdt.patch patch 0091-x86-amd-revert-commit-944e0fc51a89c9827b9.patch patch 0092-xen-set-cpu-capabilities-from-xen_start_kernel.patch patch 0093-x86-amd-don-t-set-X86_BUG_SYSRET_SS_ATTRS-when-runni.patch patch 0001-KVM-VMX-Expose-SSBD-properly-to-guests-4.9-supplemen.patch patch 0002-complete-e390f9a-port-for-v4.9.106.patch patch 0003-KVM-x86-introduce-linear_-read-write-_system.patch patch 0004-KVM-x86-pass-kvm_vcpu-to-kvm_read_guest_virt-and-kvm.patch patch 0005-kvm-x86-use-correct-privilege-level-for-sgdt-sidt-fx.patch patch 0006-x86-spectre_v1-Disable-compiler-optimizations-over-a.patch patch 0007-x86-mce-Improve-error-message-when-kernel-cannot-rec.patch patch 0008-x86-mce-Check-for-alternate-indication-of-machine-ch.patch patch 0009-x86-mce-Fix-incorrect-Machine-check-from-unknown-sou.patch patch 0010-x86-mce-Do-not-overwrite-MCi_STATUS-in-mce_no_way_ou.patch