This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch fs-current in repository linux-next.
omits 80fefc4da738 Merge branch 'ovl-fixes' of git://git.kernel.org/pub/scm/l [...] omits a9cbd1528c6b Merge branch 'next-fixes' of git://git.kernel.org/pub/scm/ [...] omits 51bed0e4c878 Merge branch 'vfs.fixes' of git://git.kernel.org/pub/scm/l [...] omits 076ca6e90d5a Merge branch 'misc-6.15' into next-fixes new d4e89d212d40 x86/bpf: Call branch history clearing sequence on exit new 9f725eec8fc0 x86/bpf: Add IBHF call at end of classic BPF new 073fdbe02c69 x86/bhi: Do not set BHI_DIS_S in 32-bit mode new caf12fa9c066 Merge tag 'ibti-hisory-for-linus-2025-05-06' of git://git. [...] new 1ac116ce6468 Documentation: x86/bugs/its: Add ITS documentation new 159013a7ca18 x86/its: Enumerate Indirect Target Selection (ITS) bug new 8754e67ad4ac x86/its: Add support for ITS-safe indirect thunk new a75bf27fe41a x86/its: Add support for ITS-safe return thunk new f4818881c47f x86/its: Enable Indirect Target Selection mitigation new 2665281a07e1 x86/its: Add "vmexit" option to skip mitigation on some CPUs new facd226f7e0c x86/its: Add support for RSB stuffing mitigation new f0cd7091cc5a x86/its: Align RETs in BHB clear sequence to avoid thunking new d6d1e3e6580c mm/execmem: Unify early execmem_cache behaviour new ebebe30794d3 x86/ibt: Keep IBT disabled during alternative patching new 872df34d7c51 x86/its: Use dynamic thunks for indirect branches new e52c1dc7455d x86/its: FineIBT-paranoid vs ITS new 7a9b709e7cc5 selftest/x86/bugs: Add selftests for ITS new 6f5bf947bab0 Merge tag 'its-for-linus-20250509' of git://git.kernel.org [...] new 63de8abd97dd arm64: insn: Add support for encoding DSB new e7956c92f396 arm64: proton-pack: Expose whether the platform is mitigat [...] new a1152be30a04 arm64: proton-pack: Expose whether the branchy loop k value new 0dfefc2ea2f2 arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs new f300769ead03 arm64: bpf: Only mitigate cBPF programs loaded by unprivil [...] new efe676a1a755 arm64: proton-pack: Add new CPUs 'k' values for branch mitigation new 627277ba7c23 Merge tag 'arm64_cbpf_mitigation_2025_05_08' of git://git. [...] new ad96e04c7b6e Merge branch 'vfs.fixes' of git://git.kernel.org/pub/scm/l [...] new 54db6d1bdd71 btrfs: fix discard worker infinite loop after disabling discard new a0fd1c609863 btrfs: fix folio leak in submit_one_async_extent() new 4ce2affc6ef9 btrfs: add back warning for mount option commit values exc [...] new fc4ed91fb0ec Merge branch 'misc-6.15' into next-fixes new 1f146124a5be Merge branch 'next-fixes' of git://git.kernel.org/pub/scm/ [...] new e4fd25c959ce Merge branch 'ovl-fixes' of git://git.kernel.org/pub/scm/l [...]
This update added new revisions after undoing existing revisions. That is to say, some revisions that were in the old version of the branch are not in the new version. This situation occurs when a user --force pushes a change and generates a repository containing something like this:
* -- * -- B -- O -- O -- O (80fefc4da738) \ N -- N -- N refs/heads/fs-current (e4fd25c959ce)
You should already have received notification emails for all of the O revisions, and so the following emails describe only the N revisions from the common base, B.
Any revisions marked "omits" are not gone; other references still refer to them. Any revisions marked "discards" are gone forever.
The 32 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/ABI/testing/sysfs-devices-system-cpu | 1 + Documentation/admin-guide/hw-vuln/index.rst | 1 + .../hw-vuln/indirect-target-selection.rst | 168 +++++++++++ Documentation/admin-guide/kernel-parameters.txt | 18 ++ arch/arm64/include/asm/cputype.h | 2 + arch/arm64/include/asm/insn.h | 1 + arch/arm64/include/asm/spectre.h | 3 + arch/arm64/kernel/proton-pack.c | 13 +- arch/arm64/lib/insn.c | 60 ++-- arch/arm64/net/bpf_jit_comp.c | 57 +++- arch/x86/Kconfig | 12 + arch/x86/entry/entry_64.S | 20 +- arch/x86/include/asm/alternative.h | 32 ++ arch/x86/include/asm/cpufeatures.h | 3 + arch/x86/include/asm/msr-index.h | 8 + arch/x86/include/asm/nospec-branch.h | 10 + arch/x86/kernel/alternative.c | 336 +++++++++++++++++++-- arch/x86/kernel/cpu/bugs.c | 176 ++++++++++- arch/x86/kernel/cpu/common.c | 72 ++++- arch/x86/kernel/ftrace.c | 2 +- arch/x86/kernel/module.c | 6 + arch/x86/kernel/static_call.c | 4 +- arch/x86/kernel/vmlinux.lds.S | 10 + arch/x86/kvm/x86.c | 4 +- arch/x86/lib/retpoline.S | 48 +++ arch/x86/mm/init_32.c | 3 + arch/x86/mm/init_64.c | 3 + arch/x86/net/bpf_jit_comp.c | 58 +++- drivers/base/cpu.c | 3 + fs/btrfs/discard.c | 17 +- fs/btrfs/fs.h | 1 + fs/btrfs/inode.c | 7 + fs/btrfs/super.c | 4 + include/linux/cpu.h | 2 + include/linux/execmem.h | 11 +- include/linux/module.h | 5 + mm/execmem.c | 40 ++- tools/objtool/arch/x86/decode.c | 9 + tools/testing/selftests/Makefile | 1 + tools/testing/selftests/x86/bugs/Makefile | 3 + tools/testing/selftests/x86/bugs/common.py | 164 ++++++++++ .../selftests/x86/bugs/its_indirect_alignment.py | 150 +++++++++ .../testing/selftests/x86/bugs/its_permutations.py | 109 +++++++ .../selftests/x86/bugs/its_ret_alignment.py | 139 +++++++++ tools/testing/selftests/x86/bugs/its_sysfs.py | 65 ++++ 45 files changed, 1776 insertions(+), 85 deletions(-) create mode 100644 Documentation/admin-guide/hw-vuln/indirect-target-selection.rst create mode 100644 tools/testing/selftests/x86/bugs/Makefile create mode 100755 tools/testing/selftests/x86/bugs/common.py create mode 100755 tools/testing/selftests/x86/bugs/its_indirect_alignment.py create mode 100755 tools/testing/selftests/x86/bugs/its_permutations.py create mode 100755 tools/testing/selftests/x86/bugs/its_ret_alignment.py create mode 100755 tools/testing/selftests/x86/bugs/its_sysfs.py