This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from ea4424be1688 Merge tag 'mtd/fixes-for-5.17-rc8' of git://git.kernel.org [...] new d45476d98324 x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE new 1e19da8522c8 x86/speculation: Add eIBRS + Retpoline options new 5ad3eb113245 Documentation/hw-vuln: Update spectre doc new 44a3918c8245 x86/speculation: Include unprivileged eBPF status in Spect [...] new 244d00b5dd47 x86/speculation: Use generic retpoline by default on AMD new e9b6013a7ce3 x86/speculation: Update link to AMD speculation whitepaper new eafd987d4a82 x86/speculation: Warn about Spectre v2 LFENCE mitigation new 0de05d056afd x86/speculation: Warn about eIBRS + LFENCE + Unprivileged [...] new 4a01e748a51c Merge tag 'x86_bugs_for_v5.17' of git://git.kernel.org/pub [...] new 9dd78194a372 ARM: report Spectre v2 status through sysfs new 04e91b732476 ARM: early traps initialisation new 8d9d651ff227 ARM: use LOADADDR() to get load address of sections new b9baf5c8c5c3 ARM: Spectre-BHB workaround new 25875aa71dfe ARM: include unprivileged BPF status in Spectre V2 reporting new fc55c23a736c Merge tag 'for-linus-bhb' of git://git.armlinux.org.uk/~rm [...] new 4330e2c5c04c arm64: entry.S: Add ventry overflow sanity checks new 1b33d4860dea arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit new 5bdf3437603d KVM: arm64: Allow indirect vectors to be used without SPECTRE_V3A new d739da1694a0 arm64: entry: Make the trampoline cleanup optional new 03aff3a77a58 arm64: entry: Free up another register on kpti's tramp_exit path new c091fb6ae059 arm64: entry: Move the trampoline data page before the text page new 6c5bf79b69f9 arm64: entry: Allow tramp_alias to access symbols after th [...] new ed50da776453 arm64: entry: Don't assume tramp_vectors is the start of t [...] new 13d7a08352a8 arm64: entry: Move trampoline macros out of ifdef'd section new c47e4d04ba0f arm64: entry: Make the kpti trampoline's kpti sequence optional new a9c406e6462f arm64: entry: Allow the trampoline text to occupy multiple pages new aff65393fa14 arm64: entry: Add non-kpti __bp_harden_el1_vectors for mit [...] new ba2689234be9 arm64: entry: Add vectors that have the bhb mitigation sequences new b28a8eebe81c arm64: entry: Add macro for reading symbol addresses from [...] new bd09128d16fa arm64: Add percpu vectors for EL1 new dee435be76f4 arm64: proton-pack: Report Spectre-BHB vulnerabilities as [...] new 558c303c9734 arm64: Mitigate spectre style branch history side channels new a5905d6af492 KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered [...] new 228a26b91228 arm64: Use the clearbhb instruction in mitigations new 58c9a5060cb7 arm64: proton-pack: Include unprivileged eBPF status in Sp [...] new cd22a8bfcfe0 Merge tag 'arm64-spectre-bhb-for-v5.17-2' of git://git.ker [...] new a679a61520d8 fuse: fix fileattr op failure new c086df490257 fuse: move FUSE_SUPER_MAGIC definition to magic.h new 0c4bcfdecb1a fuse: fix pipe buffer lifetime for direct_io new 92f90cc9fe0e Merge tag 'fuse-fixes-5.17-rc8' of git://git.kernel.org/pu [...]
The 40 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/admin-guide/hw-vuln/spectre.rst | 50 +-- Documentation/admin-guide/kernel-parameters.txt | 8 +- arch/arm/include/asm/assembler.h | 10 + arch/arm/include/asm/spectre.h | 32 ++ arch/arm/include/asm/vmlinux.lds.h | 35 ++- arch/arm/kernel/Makefile | 2 + arch/arm/kernel/entry-armv.S | 79 ++++- arch/arm/kernel/entry-common.S | 24 ++ arch/arm/kernel/spectre.c | 71 +++++ arch/arm/kernel/traps.c | 65 +++- arch/arm/mm/Kconfig | 11 + arch/arm/mm/proc-v7-bugs.c | 207 ++++++++++--- arch/arm64/Kconfig | 9 + arch/arm64/include/asm/assembler.h | 53 ++++ arch/arm64/include/asm/cpufeature.h | 29 ++ arch/arm64/include/asm/cputype.h | 8 + arch/arm64/include/asm/fixmap.h | 6 +- arch/arm64/include/asm/insn.h | 1 + arch/arm64/include/asm/kvm_host.h | 5 + arch/arm64/include/asm/sections.h | 5 + arch/arm64/include/asm/spectre.h | 4 + arch/arm64/include/asm/sysreg.h | 2 + arch/arm64/include/asm/vectors.h | 73 +++++ arch/arm64/include/uapi/asm/kvm.h | 5 + arch/arm64/kernel/cpu_errata.c | 7 + arch/arm64/kernel/cpufeature.c | 12 + arch/arm64/kernel/entry.S | 214 +++++++++---- arch/arm64/kernel/image-vars.h | 4 + arch/arm64/kernel/proton-pack.c | 391 +++++++++++++++++++++++- arch/arm64/kernel/vmlinux.lds.S | 2 +- arch/arm64/kvm/arm.c | 5 +- arch/arm64/kvm/hyp/hyp-entry.S | 9 + arch/arm64/kvm/hyp/nvhe/mm.c | 4 +- arch/arm64/kvm/hyp/vhe/switch.c | 10 +- arch/arm64/kvm/hypercalls.c | 12 + arch/arm64/kvm/psci.c | 18 +- arch/arm64/mm/mmu.c | 12 +- arch/arm64/tools/cpucaps | 1 + arch/x86/include/asm/cpufeatures.h | 2 +- arch/x86/include/asm/nospec-branch.h | 16 +- arch/x86/kernel/alternative.c | 8 +- arch/x86/kernel/cpu/bugs.c | 204 ++++++++++--- arch/x86/lib/retpoline.S | 2 +- arch/x86/net/bpf_jit_comp.c | 2 +- fs/fuse/dev.c | 12 +- fs/fuse/file.c | 1 + fs/fuse/fuse_i.h | 1 + fs/fuse/inode.c | 3 +- fs/fuse/ioctl.c | 9 +- include/linux/arm-smccc.h | 5 + include/linux/bpf.h | 11 + include/uapi/linux/magic.h | 1 + kernel/sysctl.c | 7 + tools/arch/x86/include/asm/cpufeatures.h | 2 +- 54 files changed, 1562 insertions(+), 219 deletions(-) create mode 100644 arch/arm/include/asm/spectre.h create mode 100644 arch/arm/kernel/spectre.c create mode 100644 arch/arm64/include/asm/vectors.h