* b5ac2ebbdfb6 4.15.2-xanmod3 * 9ba6eea9823c block, bfq-mq, bfq-sq: make bfq_bfqq_expire print expiration reason * b56ea283cf5e block, bfq-mq, bfq-sq: make log functions print names of calling functions * d7e9feb0cb90 block, bfq-mq: add requeue-request hook * 1774a66919d5 config: enable mq block buffered writeback throttling * 0926479d0fd2 Merge tag 'v4.15.2' into 4.15 * db22ec452bb4 Linux 4.15.2 * 35314545f115 fpga: region: release of_parse_phandle nodes after use * b796d30928fe serial: core: mark port as initialized after successful IRQ change * bad75ea552a8 KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRL * 6d45809fe88f KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL * 3d6e862c967f KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES * 4659554aecb0 KVM/x86: Add IBPB support * f13d17517fd0 KVM/x86: Update the reverse_cpuid list to include CPUID_7_EDX * 9e4d1de59c95 x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL * d13d4d2a597a x86/pti: Mark constant arrays as __initconst * 28cf1d82995c x86/spectre: Simplify spectre_v2 command line parsing * 76e36defe096 x86/retpoline: Avoid retpolines for built-in __init functions * 9ec4cfcef13f x86/kvm: Update spectre-v1 mitigation * b399b9864988 KVM: VMX: make MSR bitmaps per-VCPU * 6e337065e6de x86/paravirt: Remove 'noreplace-paravirt' cmdline option * 061c8e740e90 x86/speculation: Use Indirect Branch Prediction Barrier in context switch * 9a417b0fe093 x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel * 7aa1a1703133 x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable" * bdfaac0f1811 x86/spectre: Report get_user mitigation for spectre_v1 * d583ef2659da nl80211: Sanitize array index in parse_txq_params * 64dab840017d vfs, fdtable: Prevent bounds-check bypass via speculative execution * fecca4925b89 x86/syscall: Sanitize syscall table de-references under speculation * 31d4cf78bb3d x86/get_user: Use pointer masking to limit speculation * d193324bd64f x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec * bd74e76bfd3d x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end} * fa46638b0bbf x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec * 7ec7f5580122 x86: Introduce barrier_nospec * d9f24681fd02 x86: Implement array_index_mask_nospec * 8a1c71c817f7 array_index_nospec: Sanitize speculative array de-references * a35f71001b40 Documentation: Document array_index_nospec * 6adfc96f74dc x86/asm: Move 'status' from thread_struct to thread_info * 6a35b18b3dca x86/entry/64: Push extra regs right away * dd9708c3dbac x86/entry/64: Remove the SYSCALL64 fast path * 6ff25f602b37 x86/spectre: Check CONFIG_RETPOLINE in command line parser * 62c00e6122a6 x86/mm: Fix overlap of i386 CPU_ENTRY_AREA with FIX_BTMAP * dd1256185482 objtool: Warn on stripped section symbol * 1e7c7191e892 objtool: Add support for alternatives at the end of a section * 0603b3626273 objtool: Improve retpoline alternative handling * 3dcc78148a15 KVM: VMX: introduce alloc_loaded_vmcs * 81e19f12d180 KVM: nVMX: Eliminate vmcs02 pool * b053d9d2926b ASoC: pcm512x: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE * 793cc747e390 pinctrl: pxa: pxa2xx: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE * 39e8aa5b30d6 iio: adc/accel: Fix up module licenses * c7faead761c5 auxdisplay: img-ascii-lcd: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE * 0f6e6bce69d9 x86/speculation: Simplify indirect_branch_prediction_barrier() * 058840da8002 x86/retpoline: Simplify vmexit_fill_RSB() * 24516e9a2e3f x86/cpufeatures: Clean up Spectre v2 related CPUID flags * d815b3ac3a14 x86/cpu/bugs: Make retpoline module warning conditional * b63521664040 x86/bugs: Drop one "mitigation" from dmesg * 88106347fcd4 x86/nospec: Fix header guards names * 739050a47dc6 x86/alternative: Print unadorned pointers * c96b2819eb8f x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support * 727eca64fb2b x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes * bcfd19e90a7d x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown * c32525a0ee28 x86/msr: Add definitions for new speculation control MSRs * c11a94aef481 x86/cpufeatures: Add AMD feature bits for Speculation Control * 6acd374af3f3 x86/cpufeatures: Add Intel feature bits for Speculation Control * ad35224462a1 x86/cpufeatures: Add CPUID_7_EDX CPUID leaf * 2ce5583273b2 module/retpoline: Warn about missing retpoline in module * 96e1c36869e3 KVM: VMX: Make indirect call speculation safe * be88e936a27d KVM: x86: Make indirect calls in emulator speculation safe