5711c19e6f43 Linux 5.15.57-xanmod1 301bb0fcccd5 x86/cpufeatures: add AMD Collaborative Processor Performance Control feature flag [v5.15.57+] 05f79c8136bd Merge tag 'v5.15.57' into 5.15 cc407be6ee65 Revert "x86/cpufeatures: add AMD Collaborative Processor Performance Control feature flag" a9e2d8e52e1c Linux 5.15.57 b4296a7b863f x86: Use -mindirect-branch-cs-prefix for RETPOLINE builds 06741ef8e7cc um: Add missing apply_returns() 320fc994f0c8 x86/bugs: Remove apostrophe typo ac8edadc2b1e tools headers cpufeatures: Sync with the kernel sources 1dd6c13b437c tools arch x86: Sync the msr-index.h copy with the kernel sources 5f4e77cc9abf KVM: emulate: do not adjust size of fastop and setcc subroutines 198685e58b13 x86/kvm: fix FASTOP_SIZE when return thunks are enabled 554cf28b104d efi/x86: use naked RET on mixed mode call wrapper d0caa861a836 x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current 67040d1d922b x86/asm/32: Fix ANNOTATE_UNRET_SAFE use on 32-bit 96907c5d3927 x86/xen: Fix initialisation in hypercall_page after rethunk 86ccf19a91be x86/static_call: Serialize __static_call_fixup() properly 73ad137d1146 x86/speculation: Disable RRSBA behavior db0128b8243f x86/kexec: Disable RET on kexec 3653093b7bbf x86/bugs: Do not enable IBPB-on-entry when IBPB is not supported 925340f99bdf x86/entry: Move PUSH_AND_CLEAR_REGS() back into error_entry 2f8967e22322 x86/bugs: Add Cannon lake to RETBleed affected CPU list cc3011cdbe5f x86/retbleed: Add fine grained Kconfig knobs 12a13570054f x86/cpu/amd: Enumerate BTC_NO d7a5c08b46b6 x86/common: Stamp out the stepping madness 8d5cff499a6d x86/speculation: Fill RSB on vmexit for IBRS 4207d7b645b8 KVM: VMX: Fix IBRS handling after vmexit 0cbd5905c8f3 KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS 5fde25284dfe KVM: VMX: Convert launched argument to flags 852fe53040b9 KVM: VMX: Flatten __vmx_vcpu_run() c590fa2d2dac objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} 66b37dccbc25 x86/speculation: Remove x86_spec_ctrl_mask b55663e7521f x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit 2069bd0e6f5b x86/speculation: Fix SPEC_CTRL write on SMT state change e898e28762f8 x86/speculation: Fix firmware entry SPEC_CTRL handling d427c1f83e8c x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n 75d4fc2e965f x86/cpu/amd: Add Spectral Chicken dab72c3c32cc objtool: Add entry UNRET validation 469d9b157017 x86/bugs: Do IBPB fallback check only once fd17a4254965 x86/bugs: Add retbleed=ibpb 8894f699f187 x86/xen: Add UNTRAIN_RET 87e6270183a4 x86/xen: Rename SYS* entry points e894b7817e08 objtool: Update Retpoline validation a1d912d7ac04 intel_idle: Disable IBRS during long idle e51769df6228 x86/bugs: Report Intel retbleed vulnerability b9349805e653 x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() 347d0bf6b0c0 x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS e03415eeba78 x86/bugs: Optimize SPEC_CTRL MSR writes 62b4db57eefe x86/entry: Add kernel IBRS implementation fac1b0007cec x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value b4e05ea71eda x86/bugs: Enable STIBP for JMP2RET 89eba42632fc x86/bugs: Add AMD retbleed= boot parameter 82e92fe936db x86/bugs: Report AMD retbleed vulnerability a9c0926fc754 x86: Add magic AMD return-thunk 07f5c5e36236 objtool: Treat .text.__x86.* as noinstr 1f068f9da743 x86/entry: Avoid very early RET 1d61a2988612 x86: Use return-thunk in asm code 6c45176bc2ae x86/sev: Avoid using __x86_return_thunk f3d9f990586c x86/vsyscall_emu/64: Don't use RET in vsyscall emulation 5b43965d58ef x86/kvm: Fix SETcc emulation for return thunks 0bfe8be824aa x86/bpf: Use alternative RET encoding e54fcb0812fa x86/ftrace: Use alternative RET encoding c1c80aabc7b9 x86,static_call: Use alternative RET encoding b0fb9784cf80 objtool: skip non-text sections when adding return-thunk sites 1920e4be8a97 x86,objtool: Create .return_sites 7bf553d9eebd x86: Undo return-thunk damage 023a2b07d5c3 x86/retpoline: Use -mfunction-return bb81f3ac69f8 x86/retpoline: Swizzle retpoline thunk 545b45c36a2f x86/retpoline: Cleanup some #ifdefery eee4f31fa2eb x86/cpufeatures: Move RETPOLINE flags to word 11 ccb25d7db1a2 x86/kvm/vmx: Make noinstr clean 2cd972ae337f x86/realmode: build with -D__DISABLE_EXPORTS 6834878ace6e x86/entry: Remove skip_r11rcx 40265bcd1bd3 objtool: Default ignore INT3 for unreachable 32b2cd6060e7 bpf,x86: Respect X86_FEATURE_RETPOLINE* 74b5a9f8edfe bpf,x86: Simplify computing label offsets 1c2e7b40752a x86/alternative: Add debug prints to apply_retpolines() b93a0a740bca x86/alternative: Try inline spectre_v2=retpoline,amd a40925e2efd8 x86/alternative: Handle Jcc __x86_indirect_thunk_\reg 86900f95fb06 x86/alternative: Implement .retpoline_sites support 936c8fcb4995 x86/retpoline: Create a retpoline thunk array 90ca76c83044 x86/retpoline: Move the retpoline thunk declarations to nospec-branch.h 6a6fcb256301 x86/asm: Fixup odd GEN-for-each-reg.h usage 71e578e1bd74 x86/asm: Fix register order 18576e45b12a x86/retpoline: Remove unused replacement symbols 655d4097039c objtool: Introduce CFI hash 503882b5aeb6 objtool,x86: Replace alternatives with .retpoline_sites cad0e43a8c30 objtool: Shrink struct instruction c9fd00d8e622 objtool: Explicitly avoid self modifying code in .altinstr_replacement 29e6b52efca1 objtool: Classify symbols 1fd333eb3377 x86/entry: Don't call error_entry() for XENPV cac414684be9 x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() 19ac6c99a17e x86/entry: Switch the stack after error_entry() returns 01bc8bd64c19 x86/traps: Use pt_regs directly in fixup_bad_iret()