* 51e2262ac76e 4.18.2-xanmod2 * 8a30acf0182f Merge tag 'v4.18.2' into 4.18 * e8c3aced75bd Linux 4.18.2 * 69622a5cbea9 x86/mm: Add TLB purge to free pmd/pte page interfaces * c414efdf3945 ioremap: Update pgtable free interfaces with addr * f47e3431b15a Bluetooth: hidp: buffer overflow in hidp_process_report * 744ff5f0dc60 crypto: skcipher - fix crash flushing dcache in error path * d5cceea6dda7 crypto: skcipher - fix aligning block size in skcipher_copy_iv() * e990be06acf2 crypto: ablkcipher - fix crash flushing dcache in error path * 4b900641754c crypto: blkcipher - fix crash flushing dcache in error path * 990e47782e40 crypto: vmac - separate tfm and request context * bbf934bc6b64 crypto: vmac - require a block cipher with 128-bit block size * 6223c1f703e5 crypto: x86/sha256-mb - fix digest copy in sha256_mb_mgr_get_comp_job_avx2() * f2ccfbe47112 crypto: ccp - Fix command completion detection race * 93aff32d53fd crypto: ccp - Check for NULL PSP pointer at module unload * 9113175ffd1c crypto: ccree - fix iv handling * 46c98de7cb83 crypto: ccree - fix finup * ce8556cca637 kbuild: verify that $DEPMOD is installed * 2ca715a12315 x86/mm: Disable ioremap free page handling on x86-PAE * 0ae4fd9024fd xen/pv: Call get_cpu_address_sizes to set x86_virt/phys_bits * 4805211684ef x86/mm/pti: Clear Global bit more aggressively * 35cf32831384 x86/platform/UV: Mark memblock related init code and data correctly * 031e64661607 x86/hyper-v: Check for VP_INVAL in hyperv_flush_tlb_others() * fcaef4e27f16 x86: i8259: Add missing include file * a8ac113d444a x86/l1tf: Fix build error seen if CONFIG_KVM_INTEL is disabled * 529bea374117 Linux 4.18.1 * c5b169d4c6bd x86/init: fix build with CONFIG_SWAP=n * f6be6903fc10 cpu/hotplug: Non-SMP machines do not make use of booted_once * 3b39dc7463a9 x86/smp: fix non-SMP broken build due to redefinition of apic_id_is_primary_thread * abf914eefa19 x86/microcode: Allow late microcode loading with SMT disabled * 573864e6570e tools headers: Synchronise x86 cpufeatures.h for L1TF additions * 862b9e18a0a3 x86/mm/kmmio: Make the tracer robust against L1TF * 9fc384dd5354 x86/mm/pat: Make set_memory_np() L1TF safe * 43b0b90df511 x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert * 330e5973bb50 x86/speculation/l1tf: Invert all not present mappings * 4d3579f7f904 cpu/hotplug: Fix SMT supported evaluation * 3dde2643295d KVM: VMX: Tell the nested hypervisor to skip L1D flush on vmentry * ee82c13f6cc1 x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry * 3ba71a6ffc5a x86/speculation: Simplify sysfs report of VMX L1TF vulnerability * e41eed5736ee Documentation/l1tf: Remove Yonah processors from not vulnerable list * b16ff629f340 x86/KVM/VMX: Don't set l1tf_flush_l1d from vmx_handle_external_intr() * 3131918d5360 x86/irq: Let interrupt handlers set kvm_cpu_l1tf_flush_l1d * 5ab84cf0c2ba x86: Don't include linux/irq.h from asm/hardirq.h * 516ed9db64f4 x86/KVM/VMX: Introduce per-host-cpu analogue of l1tf_flush_l1d * 6120bb28672d x86/irq: Demote irq_cpustat_t::__softirq_pending to u16 * 2754f7c6ec88 x86/KVM/VMX: Move the l1tf_flush_l1d test to vmx_l1d_flush() * 7f29a7c2505e x86/KVM/VMX: Replace 'vmx_l1d_flush_always' with 'vmx_l1d_flush_cond' * d3cc70af8e59 x86/KVM/VMX: Don't set l1tf_flush_l1d to true from vmx_l1d_flush() * 89f5f7582732 cpu/hotplug: detect SMT disabled by BIOS * 00cfc2f506a9 Documentation/l1tf: Fix typos * 62de9c5ed2a7 x86/KVM/VMX: Initialize the vmx_l1d_flush_pages' content * b8b75ff14fb0 x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures * d8360e9279ce Documentation: Add section about CPU vulnerabilities * 82abbe0ea7a2 x86/bugs, kvm: Introduce boot-time control of L1TF mitigations * 347ff08ab796 cpu/hotplug: Set CPU_SMT_NOT_SUPPORTED early * 758b51878d9e cpu/hotplug: Expose SMT control init function * fe30a30f5906 x86/kvm: Allow runtime control of L1D flush * 8b2f15b4f2a8 x86/kvm: Serialize L1D flush parameter setter * 651f562081cc x86/kvm: Add static key for flush always * cc1e6659990b x86/kvm: Move l1tf setup function * 3c68ad96f2b8 x86/l1tf: Handle EPT disabled state proper * dc622f564b67 x86/kvm: Drop L1TF MSR list approach * 8fc95fe3fe60 x86/litf: Introduce vmx status variable * 8e5e7a09889a cpu/hotplug: Online siblings when SMT control is turned on * f11565bed15a x86/KVM/VMX: Use MSR save list for IA32_FLUSH_CMD if required * cd1fb4bb18e5 x86/KVM/VMX: Extend add_atomic_switch_msr() to allow VMENTER only MSRs * d86126ab742d x86/KVM/VMX: Separate the VMX AUTOLOAD guest/host number accounting * 452695e55b38 x86/KVM/VMX: Add find_msr() helper function * 6cfd9bd0167a x86/KVM/VMX: Split the VMX MSR LOAD structures to have an host/guest numbers * 1f2bbb423bbb x86/KVM/VMX: Add L1D flush logic * 43cb51f8ef37 x86/KVM/VMX: Add L1D MSR based flush * f1b4a0b93e9f x86/KVM/VMX: Add L1D flush algorithm * a1a4f40bee86 x86/KVM/VMX: Add module argument for L1TF mitigation * 3d2db4f84f09 x86/KVM: Warn user if KVM is loaded SMT and L1TF CPU bug being present * 7774cb314cd1 cpu/hotplug: Boot HT siblings at least once * fbe359706d55 Revert "x86/apic: Ignore secondary threads if nosmt=force" * 0122cebdc460 x86/speculation/l1tf: Fix up pte->pfn conversion for PAE * ae3b9410d7ea x86/speculation/l1tf: Protect PAE swap entries against L1TF * ccd135cdd9c1 x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings * eabc9764ebdc x86/cpufeatures: Add detection of L1D cache flush support. * f70abc9107e1 x86/speculation/l1tf: Extend 64bit swap file size limit * 5b44df38ed66 x86/apic: Ignore secondary threads if nosmt=force * 20d82bac6228 x86/cpu/AMD: Evaluate smp_num_siblings early * f2444b280db8 x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info * dcf82399d6d1 x86/cpu/intel: Evaluate smp_num_siblings early * c3155990e210 x86/cpu/topology: Provide detect_extended_topology_early() * b4be123b58ad x86/cpu/common: Provide detect_ht_early() * 6886c1b815b8 x86/cpu/AMD: Remove the pointless detect_ht() call * 49e0975a05f8 x86/cpu: Remove the pointless CPU printout * 24d9fd272ec0 cpu/hotplug: Provide knobs to control SMT * 74f1c7a26b60 cpu/hotplug: Split do_cpu_down() * 6249d3232f22 cpu/hotplug: Make bringup/teardown of smp threads symmetric * 2883a1f89b50 x86/topology: Provide topology_smt_supported() * aa5de56185a0 x86/smp: Provide topology_is_primary_thread() * 71ef4580dc21 sched/smt: Update sched_smt_present at runtime * 89d8157a3920 x86/bugs: Move the l1tf function and define pr_fmt properly * 1655bd148c1b x86/speculation/l1tf: Limit swap file size to MAX_PA/2 * 9870e755711b x86/speculation/l1tf: Disallow non privileged high MMIO PROT_NONE mappings * dcd1b1099b59 x86/speculation/l1tf: Add sysfs reporting for l1tf * adb333645581 x86/speculation/l1tf: Make sure the first page is always reserved * 0c5e6259358e x86/speculation/l1tf: Protect PROT_NONE PTEs against speculation * 056dc0fa4c11 x86/speculation/l1tf: Protect swap entries against L1TF * db279f719385 x86/speculation/l1tf: Change order of offset/type in swap entry * 1e56c506b35b x86/speculation/l1tf: Increase 32bit PAE __PHYSICAL_PAGE_SHIFT * 45db516a6a1b x86/irqflags: Provide a declaration for native_save_fl * 16fe09de5432 kprobes/x86: Fix %p uses in error messages * f8a0aeefc2f6 x86/speculation: Protect against userspace-userspace spectreRSB * b13b271933ee x86/paravirt: Fix spectre-v2 mitigations for paravirt guests