This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 82f2b0b97b36 Linux 6.15-rc6 new d4e89d212d40 x86/bpf: Call branch history clearing sequence on exit new 9f725eec8fc0 x86/bpf: Add IBHF call at end of classic BPF new 073fdbe02c69 x86/bhi: Do not set BHI_DIS_S in 32-bit mode new caf12fa9c066 Merge tag 'ibti-hisory-for-linus-2025-05-06' of git://git. [...] new 1ac116ce6468 Documentation: x86/bugs/its: Add ITS documentation new 159013a7ca18 x86/its: Enumerate Indirect Target Selection (ITS) bug new 8754e67ad4ac x86/its: Add support for ITS-safe indirect thunk new a75bf27fe41a x86/its: Add support for ITS-safe return thunk new f4818881c47f x86/its: Enable Indirect Target Selection mitigation new 2665281a07e1 x86/its: Add "vmexit" option to skip mitigation on some CPUs new facd226f7e0c x86/its: Add support for RSB stuffing mitigation new f0cd7091cc5a x86/its: Align RETs in BHB clear sequence to avoid thunking new d6d1e3e6580c mm/execmem: Unify early execmem_cache behaviour new ebebe30794d3 x86/ibt: Keep IBT disabled during alternative patching new 872df34d7c51 x86/its: Use dynamic thunks for indirect branches new e52c1dc7455d x86/its: FineIBT-paranoid vs ITS new 7a9b709e7cc5 selftest/x86/bugs: Add selftests for ITS new 6f5bf947bab0 Merge tag 'its-for-linus-20250509' of git://git.kernel.org [...] new 63de8abd97dd arm64: insn: Add support for encoding DSB new e7956c92f396 arm64: proton-pack: Expose whether the platform is mitigat [...] new a1152be30a04 arm64: proton-pack: Expose whether the branchy loop k value new 0dfefc2ea2f2 arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs new f300769ead03 arm64: bpf: Only mitigate cBPF programs loaded by unprivil [...] new efe676a1a755 arm64: proton-pack: Add new CPUs 'k' values for branch mitigation new 627277ba7c23 Merge tag 'arm64_cbpf_mitigation_2025_05_08' of git://git. [...]
The 25 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/ABI/testing/sysfs-devices-system-cpu | 1 + Documentation/admin-guide/hw-vuln/index.rst | 1 + .../hw-vuln/indirect-target-selection.rst | 168 +++++++++++ Documentation/admin-guide/kernel-parameters.txt | 18 ++ arch/arm64/include/asm/cputype.h | 2 + arch/arm64/include/asm/insn.h | 1 + arch/arm64/include/asm/spectre.h | 3 + arch/arm64/kernel/proton-pack.c | 13 +- arch/arm64/lib/insn.c | 60 ++-- arch/arm64/net/bpf_jit_comp.c | 57 +++- arch/x86/Kconfig | 12 + arch/x86/entry/entry_64.S | 20 +- arch/x86/include/asm/alternative.h | 32 ++ arch/x86/include/asm/cpufeatures.h | 3 + arch/x86/include/asm/msr-index.h | 8 + arch/x86/include/asm/nospec-branch.h | 10 + arch/x86/kernel/alternative.c | 336 +++++++++++++++++++-- arch/x86/kernel/cpu/bugs.c | 176 ++++++++++- arch/x86/kernel/cpu/common.c | 72 ++++- arch/x86/kernel/ftrace.c | 2 +- arch/x86/kernel/module.c | 6 + arch/x86/kernel/static_call.c | 4 +- arch/x86/kernel/vmlinux.lds.S | 10 + arch/x86/kvm/x86.c | 4 +- arch/x86/lib/retpoline.S | 48 +++ arch/x86/mm/init_32.c | 3 + arch/x86/mm/init_64.c | 3 + arch/x86/net/bpf_jit_comp.c | 58 +++- drivers/base/cpu.c | 3 + include/linux/cpu.h | 2 + include/linux/execmem.h | 11 +- include/linux/module.h | 5 + mm/execmem.c | 40 ++- tools/objtool/arch/x86/decode.c | 9 + tools/testing/selftests/Makefile | 1 + tools/testing/selftests/x86/bugs/Makefile | 3 + tools/testing/selftests/x86/bugs/common.py | 164 ++++++++++ .../selftests/x86/bugs/its_indirect_alignment.py | 150 +++++++++ .../testing/selftests/x86/bugs/its_permutations.py | 109 +++++++ .../selftests/x86/bugs/its_ret_alignment.py | 139 +++++++++ tools/testing/selftests/x86/bugs/its_sysfs.py | 65 ++++ 41 files changed, 1749 insertions(+), 83 deletions(-) create mode 100644 Documentation/admin-guide/hw-vuln/indirect-target-selection.rst create mode 100644 tools/testing/selftests/x86/bugs/Makefile create mode 100755 tools/testing/selftests/x86/bugs/common.py create mode 100755 tools/testing/selftests/x86/bugs/its_indirect_alignment.py create mode 100755 tools/testing/selftests/x86/bugs/its_permutations.py create mode 100755 tools/testing/selftests/x86/bugs/its_ret_alignment.py create mode 100755 tools/testing/selftests/x86/bugs/its_sysfs.py