github xanmod/linux 5.18.14-xanmod1

16 months ago

debb916 Linux 5.18.14-xanmod1
500d4b4 Merge tag 'v5.18.14' into 5.18
9aa5a04 Linux 5.18.14
daf898a um: Add missing apply_returns()
deacf52 x86/bugs: Remove apostrophe typo
33e0e7f tools headers cpufeatures: Sync with the kernel sources
699b83c tools arch x86: Sync the msr-index.h copy with the kernel sources
9db4aff KVM: emulate: do not adjust size of fastop and setcc subroutines
d417d9d x86/kvm: fix FASTOP_SIZE when return thunks are enabled
fcd83be efi/x86: use naked RET on mixed mode call wrapper
713fbf2 x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
be6acce x86/asm/32: Fix ANNOTATE_UNRET_SAFE use on 32-bit
6461cc8 x86/static_call: Serialize __static_call_fixup() properly
ffdd31e x86/speculation: Disable RRSBA behavior
845351c x86/kexec: Disable RET on kexec
e2fe046 x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported
df6fc78 x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry
ee02cbc x86/bugs: Add Cannon lake to RETBleed affected CPU list
813423f x86/retbleed: Add fine grained Kconfig knobs
409f604 x86/cpu/amd: Enumerate BTC_NO
373e694 x86/common: Stamp out the stepping madness
afd743f KVM: VMX: Prevent RSB underflow before vmenter
8c38306 x86/speculation: Fill RSB on vmexit for IBRS
48fe993 KVM: VMX: Fix IBRS handling after vmexit
d581411 KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
2458004 KVM: VMX: Convert launched argument to flags
bcb9508 KVM: VMX: Flatten _vmx_vcpu_run()
4382744 objtool: Re-add UNWIND_HINT
7377eea x86/speculation: Remove x86_spec_ctrl_mask
8a95fad x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
ff110fe x86/speculation: Fix SPEC_CTRL write on SMT state change
3e89c42 x86/speculation: Fix firmware entry SPEC_CTRL handling
3d6bdd7 x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
80f8a9e x86/cpu/amd: Add Spectral Chicken
a8a370f objtool: Add entry UNRET validation
4c7f90f x86/bugs: Do IBPB fallback check only once
bbcfdf1 x86/bugs: Add retbleed=ibpb
b75fada x86/xen: Add UNTRAIN_RET
4a691f1 x86/xen: Rename SYS* entry points
6864df0 objtool: Update Retpoline validation
7b26498 intel_idle: Disable IBRS during long idle
5a3037b x86/bugs: Report Intel retbleed vulnerability
fb32593 x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
e604d26 x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
2c0d8e3 x86/bugs: Optimize SPEC_CTRL MSR writes
47e51d6 x86/entry: Add kernel IBRS implementation
409586f x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
c85b5f7 x86/bugs: Enable STIBP for JMP2RET
f88b408 x86/bugs: Add AMD retbleed= boot parameter
a70ed95 x86/bugs: Report AMD retbleed vulnerability
64a9837 x86: Add magic AMD return-thunk
9d75af6 objtool: Treat .text.__x86.* as noinstr
df77786 x86/entry: Avoid very early RET
a05146b x86: Use return-thunk in asm code
a302187 x86/sev: Avoid using __x86_return_thunk
2fc0ed1 x86/vsyscall_emu/64: Don't use RET in vsyscall emulation
3525abd x86/kvm: Fix SETcc emulation for return thunks
ebe3ceb x86/bpf: Use alternative RET encoding
0d15b9c x86/ftrace: Use alternative RET encoding
eb84031 x86,static_call: Use alternative RET encoding
f7b097e objtool: skip non-text sections when adding return-thunk sites
262941a x86,objtool: Create .return_sites
e0c27dc x86: Undo return-thunk damage
86fbd28 x86/retpoline: Use -mfunction-return
7ce2011 x86/retpoline: Swizzle retpoline thunk
079c71b x86/retpoline: Cleanup some #ifdefery
e0ed744 x86/cpufeatures: Move RETPOLINE flags to word 11
e492002 x86/kvm/vmx: Make noinstr clean
c29a222 x86/entry: Remove skip_r11rcx
973ee27 x86/entry: Don't call error_entry() for XENPV
eda94db x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry()
6089d27 x86/entry: Switch the stack after error_entry() returns
a1a70a3 x86/traps: Use pt_regs directly in fixup_bad_iret()

Don't miss a new linux release

NewReleases is sending notifications on new releases.