github xanmod/linux 5.15.57-xanmod1

latest releases: 6.10.0-xanmod1, 6.6.40-xanmod1, 6.9.9-xanmod1...
2 years ago

5711c19 Linux 5.15.57-xanmod1
301bb0f x86/cpufeatures: add AMD Collaborative Processor Performance Control feature flag [v5.15.57+]
05f79c8 Merge tag 'v5.15.57' into 5.15
cc407be Revert "x86/cpufeatures: add AMD Collaborative Processor Performance Control feature flag"
a9e2d8e Linux 5.15.57
b4296a7 x86: Use -mindirect-branch-cs-prefix for RETPOLINE builds
06741ef um: Add missing apply_returns()
320fc99 x86/bugs: Remove apostrophe typo
ac8edad tools headers cpufeatures: Sync with the kernel sources
1dd6c13 tools arch x86: Sync the msr-index.h copy with the kernel sources
5f4e77c KVM: emulate: do not adjust size of fastop and setcc subroutines
198685e x86/kvm: fix FASTOP_SIZE when return thunks are enabled
554cf28 efi/x86: use naked RET on mixed mode call wrapper
d0caa86 x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
67040d1 x86/asm/32: Fix ANNOTATE_UNRET_SAFE use on 32-bit
96907c5 x86/xen: Fix initialisation in hypercall_page after rethunk
86ccf19 x86/static_call: Serialize __static_call_fixup() properly
73ad137 x86/speculation: Disable RRSBA behavior
db0128b x86/kexec: Disable RET on kexec
3653093 x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported
925340f x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry
2f8967e x86/bugs: Add Cannon lake to RETBleed affected CPU list
cc3011c x86/retbleed: Add fine grained Kconfig knobs
12a1357 x86/cpu/amd: Enumerate BTC_NO
d7a5c08 x86/common: Stamp out the stepping madness
8d5cff4 x86/speculation: Fill RSB on vmexit for IBRS
4207d7b KVM: VMX: Fix IBRS handling after vmexit
0cbd590 KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
5fde252 KVM: VMX: Convert launched argument to flags
852fe53 KVM: VMX: Flatten _vmx_vcpu_run()
c590fa2 objtool: Re-add UNWIND_HINT
{SAVE_RESTORE}
66b37dc x86/speculation: Remove x86_spec_ctrl_mask
b55663e x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
2069bd0 x86/speculation: Fix SPEC_CTRL write on SMT state change
e898e28 x86/speculation: Fix firmware entry SPEC_CTRL handling
d427c1f x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
75d4fc2 x86/cpu/amd: Add Spectral Chicken
dab72c3 objtool: Add entry UNRET validation
469d9b1 x86/bugs: Do IBPB fallback check only once
fd17a42 x86/bugs: Add retbleed=ibpb
8894f69 x86/xen: Add UNTRAIN_RET
87e6270 x86/xen: Rename SYS* entry points
e894b78 objtool: Update Retpoline validation
a1d912d intel_idle: Disable IBRS during long idle
e51769d x86/bugs: Report Intel retbleed vulnerability
b934980 x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
347d0bf x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
e03415e x86/bugs: Optimize SPEC_CTRL MSR writes
62b4db5 x86/entry: Add kernel IBRS implementation
fac1b00 x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
b4e05ea x86/bugs: Enable STIBP for JMP2RET
89eba42 x86/bugs: Add AMD retbleed= boot parameter
82e92fe x86/bugs: Report AMD retbleed vulnerability
a9c0926 x86: Add magic AMD return-thunk
07f5c5e objtool: Treat .text.__x86.* as noinstr
1f068f9 x86/entry: Avoid very early RET
1d61a29 x86: Use return-thunk in asm code
6c45176 x86/sev: Avoid using __x86_return_thunk
f3d9f99 x86/vsyscall_emu/64: Don't use RET in vsyscall emulation
5b43965 x86/kvm: Fix SETcc emulation for return thunks
0bfe8be x86/bpf: Use alternative RET encoding
e54fcb0 x86/ftrace: Use alternative RET encoding
c1c80aa x86,static_call: Use alternative RET encoding
b0fb978 objtool: skip non-text sections when adding return-thunk sites
1920e4b x86,objtool: Create .return_sites
7bf553d x86: Undo return-thunk damage
023a2b0 x86/retpoline: Use -mfunction-return
bb81f3a x86/retpoline: Swizzle retpoline thunk
545b45c x86/retpoline: Cleanup some #ifdefery
eee4f31 x86/cpufeatures: Move RETPOLINE flags to word 11
ccb25d7 x86/kvm/vmx: Make noinstr clean
2cd972a x86/realmode: build with -D__DISABLE_EXPORTS
6834878 x86/entry: Remove skip_r11rcx
40265bc objtool: Default ignore INT3 for unreachable
32b2cd6 bpf,x86: Respect X86_FEATURE_RETPOLINE*
74b5a9f bpf,x86: Simplify computing label offsets
1c2e7b4 x86/alternative: Add debug prints to apply_retpolines()
b93a0a7 x86/alternative: Try inline spectre_v2=retpoline,amd
a40925e x86/alternative: Handle Jcc _x86_indirect_thunk\reg
86900f9 x86/alternative: Implement .retpoline_sites support
936c8fc x86/retpoline: Create a retpoline thunk array
90ca76c x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h
6a6fcb2 x86/asm: Fixup odd GEN-for-each-reg.h usage
71e578e x86/asm: Fix register order
18576e4 x86/retpoline: Remove unused replacement symbols
655d409 objtool: Introduce CFI hash
503882b objtool,x86: Replace alternatives with .retpoline_sites
cad0e43 objtool: Shrink struct instruction
c9fd00d objtool: Explicitly avoid self modifying code in .altinstr_replacement
29e6b52 objtool: Classify symbols
1fd333e x86/entry: Don't call error_entry() for XENPV
cac4146 x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry()
19ac6c9 x86/entry: Switch the stack after error_entry() returns
01bc8bd x86/traps: Use pt_regs directly in fixup_bad_iret()

Don't miss a new linux release

NewReleases is sending notifications on new releases.