This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 855684c7d938 Merge tag 'x86_tdx_for_6.9' of git://git.kernel.org/pub/sc [...] new e95df4ec0c0c x86/mmio: Disable KVM mitigation when X86_FEATURE_CLEAR_CP [...] new 4e42765d1be0 Documentation/hw-vuln: Add documentation for RFDS new 8076fcde016c x86/rfds: Mitigate Register File Data Sampling (RFDS) new 2a0180129d72 KVM/x86: Export RFDS_NO and RFDS_CLEAR to guests new 0e33cf955f07 Merge tag 'rfds-for-linus-2024-03-11' of git://git.kernel. [...] new 532a0c57d7ff Revert "x86/bugs: Use fixed addressing for VERW operand" new e66c58f74351 Merge tag 'x86-apic-2024-03-12' of git://git.kernel.org/pu [...] new 156757062418 x86/startup_64: Drop long return to initial_code pointer new 9ba8ec8ee67a x86/boot: Add error_putdec() helper new ac456ca0af4f x86/boot: Add a message about ignored early NMIs new 43b1d3e68ee7 kexec: Allocate kernel above bzImage's pref_address new c2cfc23f7967 x86/trampoline: Bypass compat mode in trampoline_start64() [...] new 29cd85557d8b Merge tag 'v6.8-rc6' into x86/boot, to pick up fixes new 2e5fc4786b7a Merge branch 'x86/sev' into x86/boot, to resolve conflicts [...] new 5da793671957 x86/boot/64: Simplify global variable accesses in GDT/IDT [...] new d9ec1158056b x86/boot/64: Use RIP_REL_REF() to assign 'phys_base' new b0fe5fb6095b x86/boot/64: Use RIP_REL_REF() to access early_dynamic_pgts[] new 4f8b6cf25f5c x86/boot/64: Use RIP_REL_REF() to access '__supported_pte_mask' new eb54c2ae4a48 x86/boot/64: Use RIP_REL_REF() to access early page tables new 533568e06b15 x86/boot/64: Use RIP_REL_REF() to access early_top_pgt[] new 11e36b0f7c21 x86/boot/64: Load the final kernel GDT during early boot d [...] new 891f8890a4a3 efi/x86: Set the PE/COFF header's NX compat flag unconditionally new 721f791ce1cd x86/boot: Use 32-bit XOR to clear registers new dada8587068c x86/startup_64: Simplify CR4 handling in startup code new 63bed9660420 x86/startup_64: Defer assignment of 5-level paging global [...] new d6a41f184dce x86/startup_64: Simplify calculation of initial page table [...] new 828263957611 x86/startup_64: Simplify virtual switch on primary boot new 7205f06e8474 efi/libstub: Add generic support for parsing mem_encrypt= new cd0d9d92c8bb x86/boot: Move mem_encrypt= parsing to the decompressor new 48204aba801f x86/sme: Move early SME kernel encryption handling into .h [...] new 428080c9b19b x86/sev: Move early startup code into .head.text section new 2e2bc42c8381 Merge branch 'linus' into x86/boot, to resolve conflict new b29f377119f6 Merge tag 'x86-boot-2024-03-12' of git://git.kernel.org/pu [...]
The 33 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/ABI/testing/sysfs-devices-system-cpu | 1 + Documentation/admin-guide/hw-vuln/index.rst | 1 + .../admin-guide/hw-vuln/reg-file-data-sampling.rst | 104 ++++++++++++ Documentation/admin-guide/kernel-parameters.txt | 21 +++ Documentation/arch/x86/boot.rst | 3 +- arch/x86/Kconfig | 21 ++- arch/x86/boot/compressed/ident_map_64.c | 2 +- arch/x86/boot/compressed/misc.c | 55 +++++-- arch/x86/boot/compressed/misc.h | 3 + arch/x86/boot/compressed/sev.c | 3 + arch/x86/boot/header.S | 4 - arch/x86/include/asm/cpufeatures.h | 1 + arch/x86/include/asm/desc.h | 1 + arch/x86/include/asm/mem_encrypt.h | 8 +- arch/x86/include/asm/msr-index.h | 8 + arch/x86/include/asm/nospec-branch.h | 2 +- arch/x86/include/asm/pgtable_64_types.h | 2 +- arch/x86/include/asm/setup.h | 2 +- arch/x86/include/asm/sev.h | 10 +- arch/x86/include/uapi/asm/bootparam.h | 1 + arch/x86/kernel/cpu/bugs.c | 92 ++++++++++- arch/x86/kernel/cpu/common.c | 38 ++++- arch/x86/kernel/head64.c | 179 ++++++++------------- arch/x86/kernel/head_64.S | 144 ++++++----------- arch/x86/kernel/kexec-bzimage64.c | 5 +- arch/x86/kernel/sev-shared.c | 23 ++- arch/x86/kernel/sev.c | 14 +- arch/x86/kernel/sev_verify_cbit.S | 2 +- arch/x86/kvm/x86.c | 5 +- arch/x86/lib/Makefile | 13 -- arch/x86/mm/mem_encrypt_identity.c | 74 +++------ arch/x86/realmode/rm/trampoline_64.S | 33 +++- drivers/base/cpu.c | 3 + drivers/firmware/efi/libstub/efi-stub-helper.c | 8 + drivers/firmware/efi/libstub/efistub.h | 2 +- drivers/firmware/efi/libstub/x86-stub.c | 3 + include/linux/cpu.h | 2 + 37 files changed, 552 insertions(+), 341 deletions(-) create mode 100644 Documentation/admin-guide/hw-vuln/reg-file-data-sampling.rst