Age | Commit message (Expand) | Author |
2018-08-15 | Linux 4.14.63v4.14.63 |  Greg Kroah-Hartman |
2018-08-15 | x86/CPU/AMD: Have smp_num_siblings and cpu_llc_id always be present |  Borislav Petkov |
2018-08-15 | x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures |  Jiri Kosina |
2018-08-15 | x86/init: fix build with CONFIG_SWAP=n |  Vlastimil Babka |
2018-08-15 | cpu/hotplug: Non-SMP machines do not make use of booted_once |  Abel Vesa |
2018-08-15 | x86/smp: fix non-SMP broken build due to redefinition of apic_id_is_primary_t... |  Vlastimil Babka |
2018-08-15 | x86/microcode: Allow late microcode loading with SMT disabled |  Josh Poimboeuf |
2018-08-15 | tools headers: Synchronise x86 cpufeatures.h for L1TF additions |  David Woodhouse |
2018-08-15 | x86/mm/kmmio: Make the tracer robust against L1TF |  Andi Kleen |
2018-08-15 | x86/mm/pat: Make set_memory_np() L1TF safe |  Andi Kleen |
2018-08-15 | x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert |  Andi Kleen |
2018-08-15 | x86/speculation/l1tf: Invert all not present mappings |  Andi Kleen |
2018-08-15 | cpu/hotplug: Fix SMT supported evaluation |  Thomas Gleixner |
2018-08-15 | KVM: VMX: Tell the nested hypervisor to skip L1D flush on vmentry |  Paolo Bonzini |
2018-08-15 | x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry |  Paolo Bonzini |
2018-08-15 | x86/speculation: Simplify sysfs report of VMX L1TF vulnerability |  Paolo Bonzini |
2018-08-15 | KVM: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR |  Paolo Bonzini |
2018-08-15 | KVM: X86: Allow userspace to define the microcode version |  Wanpeng Li |
2018-08-15 | KVM: X86: Introduce kvm_get_msr_feature() |  Wanpeng Li |
2018-08-15 | KVM: SVM: Add MSR-based feature support for serializing LFENCE |  Tom Lendacky |
2018-08-15 | KVM: x86: Add a framework for supporting MSR-based features |  Tom Lendacky |
2018-08-15 | Documentation/l1tf: Remove Yonah processors from not vulnerable list |  Thomas Gleixner |
2018-08-15 | x86/KVM/VMX: Don't set l1tf_flush_l1d from vmx_handle_external_intr() |  Nicolai Stange |
2018-08-15 | x86/irq: Let interrupt handlers set kvm_cpu_l1tf_flush_l1d |  Nicolai Stange |
2018-08-15 | x86: Don't include linux/irq.h from asm/hardirq.h |  Nicolai Stange |
2018-08-15 | x86/KVM/VMX: Introduce per-host-cpu analogue of l1tf_flush_l1d |  Nicolai Stange |
2018-08-15 | x86/irq: Demote irq_cpustat_t::__softirq_pending to u16 |  Nicolai Stange |
2018-08-15 | x86/KVM/VMX: Move the l1tf_flush_l1d test to vmx_l1d_flush() |  Nicolai Stange |
2018-08-15 | x86/KVM/VMX: Replace 'vmx_l1d_flush_always' with 'vmx_l1d_flush_cond' |  Nicolai Stange |
2018-08-15 | x86/KVM/VMX: Don't set l1tf_flush_l1d to true from vmx_l1d_flush() |  Nicolai Stange |
2018-08-15 | cpu/hotplug: detect SMT disabled by BIOS |  Josh Poimboeuf |
2018-08-15 | Documentation/l1tf: Fix typos |  Tony Luck |
2018-08-15 | x86/KVM/VMX: Initialize the vmx_l1d_flush_pages' content |  Nicolai Stange |
2018-08-15 | Documentation: Add section about CPU vulnerabilities |  Thomas Gleixner |
2018-08-15 | x86/bugs, kvm: Introduce boot-time control of L1TF mitigations |  Jiri Kosina |
2018-08-15 | cpu/hotplug: Set CPU_SMT_NOT_SUPPORTED early |  Thomas Gleixner |
2018-08-15 | cpu/hotplug: Expose SMT control init function |  Jiri Kosina |
2018-08-15 | x86/kvm: Allow runtime control of L1D flush |  Thomas Gleixner |
2018-08-15 | x86/kvm: Serialize L1D flush parameter setter |  Thomas Gleixner |
2018-08-15 | x86/kvm: Add static key for flush always |  Thomas Gleixner |
2018-08-15 | x86/kvm: Move l1tf setup function |  Thomas Gleixner |
2018-08-15 | x86/l1tf: Handle EPT disabled state proper |  Thomas Gleixner |
2018-08-15 | x86/kvm: Drop L1TF MSR list approach |  Thomas Gleixner |
2018-08-15 | x86/litf: Introduce vmx status variable |  Thomas Gleixner |
2018-08-15 | cpu/hotplug: Online siblings when SMT control is turned on |  Thomas Gleixner |
2018-08-15 | x86/KVM/VMX: Use MSR save list for IA32_FLUSH_CMD if required |  Konrad Rzeszutek Wilk |
2018-08-15 | x86/KVM/VMX: Extend add_atomic_switch_msr() to allow VMENTER only MSRs |  Konrad Rzeszutek Wilk |
2018-08-15 | x86/KVM/VMX: Separate the VMX AUTOLOAD guest/host number accounting |  Konrad Rzeszutek Wilk |
2018-08-15 | x86/KVM/VMX: Add find_msr() helper function |  Konrad Rzeszutek Wilk |
2018-08-15 | x86/KVM/VMX: Split the VMX MSR LOAD structures to have an host/guest numbers |  Konrad Rzeszutek Wilk |