)]}'
{
  "commit": "8b3641dfb6f902407495c63b9b64482b32319b66",
  "tree": "d1600d31b705fbb376d4285e5ff27352a82af7b2",
  "parents": [
    "c2415c407a2cde01290d52ce2a1f81b0616379a3"
  ],
  "author": {
    "name": "David Kaplan",
    "email": "david.kaplan@amd.com",
    "time": "Tue Aug 19 14:21:59 2025 -0500"
  },
  "committer": {
    "name": "Borislav Petkov (AMD)",
    "email": "bp@alien8.de",
    "time": "Wed Aug 27 18:17:12 2025 +0200"
  },
  "message": "x86/bugs: Add attack vector controls for SSB\n\nAttack vector controls for SSB were missed in the initial attack vector series.\nThe default mitigation for SSB requires user-space opt-in so it is only\nrelevant for user-\u003euser attacks.  Check with attack vector controls when\nthe command is auto - i.e., no explicit user selection has been done.\n\nFixes: 2d31d2874663 (\"x86/bugs: Define attack vectors relevant for each bug\")\nSigned-off-by: David Kaplan \u003cdavid.kaplan@amd.com\u003e\nSigned-off-by: Borislav Petkov (AMD) \u003cbp@alien8.de\u003e\nLink: https://lore.kernel.org/20250819192200.2003074-5-david.kaplan@amd.com\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "6dd0800146f65b78d7eee31076d012640f3ee35f",
      "old_mode": 33188,
      "old_path": "Documentation/admin-guide/hw-vuln/attack_vector_controls.rst",
      "new_id": "5964901d66e317eec0c6b283f4ea868ca95008cd",
      "new_mode": 33188,
      "new_path": "Documentation/admin-guide/hw-vuln/attack_vector_controls.rst"
    },
    {
      "type": "modify",
      "old_id": "49ef1b832c1a5538112055fce171686698d041bd",
      "old_mode": 33188,
      "old_path": "arch/x86/kernel/cpu/bugs.c",
      "new_id": "af838b8d845cfbdd244a2d5a5795ce85d071a04b",
      "new_mode": 33188,
      "new_path": "arch/x86/kernel/cpu/bugs.c"
    }
  ]
}
