<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in Makefile</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>a9a76b38 - x86/boot: Disable stack protector for early boot code</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#a9a76b38</link>
        <description>x86/boot: Disable stack protector for early boot codeOn 64-bit, this will prevent crashes when the canary access is changedfrom %gs:40 to %gs:__stack_chk_guard(%rip).  RIP-relative addresses fromthe identity-mapped early boot code will target the wrong address withzero-based percpu.  KASLR could then shift that address to an unmappedpage causing a crash on boot.This early boot code runs well before user-space is active and does notneed stack protector enabled.Signed-off-by: Brian Gerst &lt;brgerst@gmail.com&gt;Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt;Reviewed-by: Ard Biesheuvel &lt;ardb@kernel.org&gt;Cc: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;Link: https://lore.kernel.org/r/20250123190747.745588-4-brgerst@gmail.com

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Thu, 23 Jan 2025 19:07:35 +0000</pubDate>
        <dc:creator>Brian Gerst &lt;brgerst@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>e6e6e5e8 - x86: Start moving AMD node functionality out of AMD_NB</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#e6e6e5e8</link>
        <description>x86: Start moving AMD node functionality out of AMD_NBThe &quot;AMD Node&quot; concept spans many families of systems and applies toa number of subsystems and drivers.Currently, the AMD Northbridge code is overloaded with AMD nodefunctionality. However, the node concept is broader than justnorthbridges.Start files to host common AMD node functions and definitions.  Includea helper to find an AMD node device function based on the conventiondescribed in AMD documentation.Anything that needs node functionality should include this rather thanamd_nb.h. The AMD_NB code will be reduced to only northbridge-specificcode needed for legacy systems.Signed-off-by: Yazen Ghannam &lt;yazen.ghannam@amd.com&gt;Signed-off-by: Borislav Petkov (AMD) &lt;bp@alien8.de&gt;Link: https://lore.kernel.org/r/20241206161210.163701-5-yazen.ghannam@amd.com

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Fri, 06 Dec 2024 16:11:57 +0000</pubDate>
        <dc:creator>Yazen Ghannam &lt;yazen.ghannam@amd.com&gt;</dc:creator>
    </item>
<item>
        <title>ae94b263 - x86: Ignore stack unwinding in KCOV</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#ae94b263</link>
        <description>x86: Ignore stack unwinding in KCOVStack unwinding produces large amounts of uninteresting coverage.It&apos;s called from KASAN kmalloc/kfree hooks, fault injection, etc.It&apos;s not particularly useful and is not a function of system call args.Ignore that code.Signed-off-by: Dmitry Vyukov &lt;dvyukov@google.com&gt;Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;Reviewed-by: Alexander Potapenko &lt;glider@google.com&gt;Reviewed-by: Marco Elver &lt;elver@google.com&gt;Reviewed-by: Andrey Konovalov &lt;andreyknvl@gmail.com&gt;Acked-by: Peter Zijlstra (Intel) &lt;peterz@infradead.org&gt;Link: https://lore.kernel.org/all/eaf54b8634970b73552dcd38bf9be6ef55238c10.1718092070.git.dvyukov@google.com

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Tue, 11 Jun 2024 07:50:33 +0000</pubDate>
        <dc:creator>Dmitry Vyukov &lt;dvyukov@google.com&gt;</dc:creator>
    </item>
<item>
        <title>38918e0b - x86/sev: Move SEV compilation units</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#38918e0b</link>
        <description>x86/sev: Move SEV compilation unitsA long time ago it was agreed upon that the coco stuff needs to go whereit belongs:  https://lore.kernel.org/all/Yg5nh1RknPRwIrb8@zn.tnicand not keep it in arch/x86/kernel. TDX did that and SEV can&apos;t find timeto do so. So lemme do it. If people have trouble converting theirongoing featuritis patches, ask me for a sed script.No functional changes.Move the instrumentation exclusion bits too, as helpfully caught andreported by the 0day folks.Closes: https://lore.kernel.org/oe-kbuild-all/202406220748.hG3qlmDx-lkp@intel.comReported-by: kernel test robot &lt;lkp@intel.com&gt;Closes: https://lore.kernel.org/oe-lkp/202407091342.46d7dbb-oliver.sang@intel.comReported-by: kernel test robot &lt;oliver.sang@intel.com&gt;Signed-off-by: Borislav Petkov (AMD) &lt;bp@alien8.de&gt;Reviewed-by: Nikunj A Dadhania &lt;nikunj@amd.com&gt;Reviewed-by: Ashish Kalra &lt;ashish.kalra@amd.com&gt;Tested-by: kernel test robot &lt;oliver.sang@intel.com&gt;Link: https://lore.kernel.org/r/20240619093014.17962-1-bp@kernel.org

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Wed, 19 Jun 2024 09:03:16 +0000</pubDate>
        <dc:creator>Borislav Petkov (AMD) &lt;bp@alien8.de&gt;</dc:creator>
    </item>
<item>
        <title>b1992c37 - kbuild: use $(src) instead of $(srctree)/$(src) for source directory</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#b1992c37</link>
        <description>kbuild: use $(src) instead of $(srctree)/$(src) for source directoryKbuild conventionally uses $(obj)/ for generated files, and $(src)/ forchecked-in source files. It is merely a convention without any functionaldifference. In fact, $(obj) and $(src) are exactly the same, as definedin scripts/Makefile.build:    src := $(obj)When the kernel is built in a separate output directory, $(src) doesnot accurately reflect the source directory location. While Kbuildresolves this discrepancy by specifying VPATH=$(srctree) to search forsource files, it does not cover all cases. For example, when adding aheader search path for local headers, -I$(srctree)/$(src) is typicallypassed to the compiler.This introduces inconsistency between upstream and downstream Makefilesbecause $(src) is used instead of $(srctree)/$(src) for the latter.To address this inconsistency, this commit changes the semantics of$(src) so that it always points to the directory in the source tree.Going forward, the variables used in Makefiles will have the followingmeanings:  $(obj)     - directory in the object tree  $(src)     - directory in the source tree  (changed by this commit)  $(objtree) - the top of the kernel object tree  $(srctree) - the top of the kernel source treeConsequently, $(srctree)/$(src) in upstream Makefiles need to be replacedwith $(src).Signed-off-by: Masahiro Yamada &lt;masahiroy@kernel.org&gt;Reviewed-by: Nicolas Schier &lt;nicolas@fjasle.eu&gt;

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Sat, 27 Apr 2024 14:55:02 +0000</pubDate>
        <dc:creator>Masahiro Yamada &lt;masahiroy@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>edf66a3c - x86/cpu: Move leftover contents of topology.c to setup.c</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#edf66a3c</link>
        <description>x86/cpu: Move leftover contents of topology.c to setup.cThe only useful piece of arch/x86/kernel/topology.c is the definitionof arch_cpu_is_hotpluggable() that can be moved elsewhere (otherarchitectures tend to put it into setup.c), so do that and deletethe rest of the file.Signed-off-by: Rafael J. Wysocki &lt;rafael.j.wysocki@intel.com&gt;Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt;Link: https://lore.kernel.org/r/12422874.O9o76ZdvQC@kreacher

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Mon, 18 Mar 2024 18:12:45 +0000</pubDate>
        <dc:creator>Rafael J. Wysocki &lt;rafael.j.wysocki@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>c0935fca - x86/sev: Disable KMSAN for memory encryption TUs</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#c0935fca</link>
        <description>x86/sev: Disable KMSAN for memory encryption TUsInstrumenting sev.c and mem_encrypt_identity.c with KMSAN will result ina triple-faulting kernel. Some of the code is invoked too early duringboot, before KMSAN is ready.Disable KMSAN instrumentation for the two translation units.  [ bp: Massage commit message. ]Signed-off-by: Changbin Du &lt;changbin.du@huawei.com&gt;Signed-off-by: Borislav Petkov (AMD) &lt;bp@alien8.de&gt;Link: https://lore.kernel.org/r/20240308044401.1120395-1-changbin.du@huawei.com

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Fri, 08 Mar 2024 04:44:01 +0000</pubDate>
        <dc:creator>Changbin Du &lt;changbin.du@huawei.com&gt;</dc:creator>
    </item>
<item>
        <title>a4eeb217 - x86, crash: wrap crash dumping code into crash related ifdefs</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#a4eeb217</link>
        <description>x86, crash: wrap crash dumping code into crash related ifdefsNow crash codes under kernel/ folder has been split out from kexeccode, crash dumping can be separated from kexec reboot in configitems on x86 with some adjustments.Here, also change some ifdefs or IS_ENABLED() check to more appropriateones, e,g - #ifdef CONFIG_KEXEC_CORE -&gt; #ifdef CONFIG_CRASH_DUMP - (!IS_ENABLED(CONFIG_KEXEC_CORE)) - &gt; (!IS_ENABLED(CONFIG_CRASH_RESERVE))[bhe@redhat.com: don&apos;t nest CONFIG_CRASH_DUMP ifdef inside CONFIG_KEXEC_CODE ifdef scope]  Link: https://lore.kernel.org/all/SN6PR02MB4157931105FA68D72E3D3DB8D47B2@SN6PR02MB4157.namprd02.prod.outlook.com/T/#uLink: https://lkml.kernel.org/r/20240124051254.67105-7-bhe@redhat.comSigned-off-by: Baoquan He &lt;bhe@redhat.com&gt;Cc: Al Viro &lt;viro@zeniv.linux.org.uk&gt;Cc: Eric W. Biederman &lt;ebiederm@xmission.com&gt;Cc: Hari Bathini &lt;hbathini@linux.ibm.com&gt;Cc: Pingfan Liu &lt;piliu@redhat.com&gt;Cc: Klara Modin &lt;klarasmodin@gmail.com&gt;Cc: Michael Kelley &lt;mhklinux@outlook.com&gt;Cc: Nathan Chancellor &lt;nathan@kernel.org&gt;Cc: Stephen Rothwell &lt;sfr@canb.auug.org.au&gt;Cc: Yang Li &lt;yang.lee@linux.alibaba.com&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Wed, 24 Jan 2024 05:12:46 +0000</pubDate>
        <dc:creator>Baoquan He &lt;bhe@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>443cbaf9 - crash: split vmcoreinfo exporting code out from crash_core.c</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#443cbaf9</link>
        <description>crash: split vmcoreinfo exporting code out from crash_core.cNow move the relevant codes into separate files:kernel/crash_reserve.c, include/linux/crash_reserve.h.And add config item CRASH_RESERVE to control its enabling.And also update the old ifdeffery of CONFIG_CRASH_CORE, including of&lt;linux/crash_core.h&gt; and config item dependency on CRASH_COREaccordingly.And also do renaming as follows: - arch/xxx/kernel/{crash_core.c =&gt; vmcore_info.c}because they are only related to vmcoreinfo exporting on x86, arm64,riscv.And also Remove config item CRASH_CORE, and rely on CONFIG_KEXEC_CORE todecide if build in crash_core.c.[yang.lee@linux.alibaba.com: remove duplicated include in vmcore_info.c]  Link: https://lkml.kernel.org/r/20240126005744.16561-1-yang.lee@linux.alibaba.comLink: https://lkml.kernel.org/r/20240124051254.67105-3-bhe@redhat.comSigned-off-by: Baoquan He &lt;bhe@redhat.com&gt;Signed-off-by: Yang Li &lt;yang.lee@linux.alibaba.com&gt;Acked-by: Hari Bathini &lt;hbathini@linux.ibm.com&gt;Cc: Al Viro &lt;viro@zeniv.linux.org.uk&gt;Cc: Eric W. Biederman &lt;ebiederm@xmission.com&gt;Cc: Pingfan Liu &lt;piliu@redhat.com&gt;Cc: Klara Modin &lt;klarasmodin@gmail.com&gt;Cc: Michael Kelley &lt;mhklinux@outlook.com&gt;Cc: Nathan Chancellor &lt;nathan@kernel.org&gt;Cc: Stephen Rothwell &lt;sfr@canb.auug.org.au&gt;Cc: Yang Li &lt;yang.lee@linux.alibaba.com&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Wed, 24 Jan 2024 05:12:42 +0000</pubDate>
        <dc:creator>Baoquan He &lt;bhe@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>cdd99dd8 - x86/fred: Add FRED initialization functions</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#cdd99dd8</link>
        <description>x86/fred: Add FRED initialization functionsAdd cpu_init_fred_exceptions() to:  - Set FRED entrypoints for events happening in ring 0 and 3.  - Specify the stack level for IRQs occurred ring 0.  - Specify dedicated event stacks for #DB/NMI/#MCE/#DF.  - Enable FRED and invalidtes IDT.  - Force 32-bit system calls to use &quot;int $0x80&quot; only.Add fred_complete_exception_setup() to:  - Initialize system_vectors as done for IDT systems.  - Set unused sysvec_table entries to fred_handle_spurious_interrupt().Co-developed-by: Xin Li &lt;xin3.li@intel.com&gt;Signed-off-by: H. Peter Anvin (Intel) &lt;hpa@zytor.com&gt;Signed-off-by: Xin Li &lt;xin3.li@intel.com&gt;Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;Signed-off-by: Borislav Petkov (AMD) &lt;bp@alien8.de&gt;Tested-by: Shan Kang &lt;shan.kang@intel.com&gt;Link: https://lore.kernel.org/r/20231205105030.8698-35-xin3.li@intel.com

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Tue, 05 Dec 2023 10:50:23 +0000</pubDate>
        <dc:creator>H. Peter Anvin (Intel) &lt;hpa@zytor.com&gt;</dc:creator>
    </item>
<item>
        <title>242db758 - x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32()</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#242db758</link>
        <description>x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32()Stackprotector cannot work before paging is enabled. The read from the perCPU variable __stack_chk_guard is always accessing the virtual addresseither directly on UP or via FS on SMP. In physical address mode thisresults in an access to memory above 3GB.So this works by chance as the hardware returns the same value when thereis no RAM at this physical address. When there is RAM populated above 3Gthen the read is by chance the same as nothing changes that memory duringthe very early boot stage.Stop relying on pure luck and disable the stack protector for the only Cfunction which is called during early boot before paging is enabled.Remove function tracing from the whole source file as there is no way totrace this at all, but in case of CONFIG_DYNAMIC_FTRACE=nmk_early_pgtbl_32() would access global function tracer variables inphysical address mode which again might work by chance.Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;Signed-off-by: Borislav Petkov (AMD) &lt;bp@alien8.de&gt;Link: https://lore.kernel.org/r/20231002115902.156063939@linutronix.de

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Mon, 02 Oct 2023 11:59:36 +0000</pubDate>
        <dc:creator>Thomas Gleixner &lt;tglx@linutronix.de&gt;</dc:creator>
    </item>
<item>
        <title>0d345996 - x86/kernel: increase kcov coverage under arch/x86/kernel folder</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#0d345996</link>
        <description>x86/kernel: increase kcov coverage under arch/x86/kernel folderCurrently kcov instrument is disabled for object files underarch/x86/kernel folder.For object files under arch/x86/kernel, actually just disabling the kcovinstrument of files:&quot;head32.o or head64.o and sev.o&quot; could achievesuccessful booting and provide kcov coverage for object files that do notdisable kcov instrument.  The additional kcov coverage collected fromarch/x86/kernel folder helps kernel fuzzing efforts to find bugs.Link to related improvement discussion is below:https://groups.google.com/g/syzkaller/c/Dsl-RYGCqs8/m/x-tfpTyFBAAJ Relatedticket is as follow: https://bugzilla.kernel.org/show_bug.cgi?id=198443Link: https://lkml.kernel.org/r/06c0bb7b5f61e5884bf31180e8c122648c752010.1690771380.git.pengfei.xu@intel.comReviewed-by: Dmitry Vyukov &lt;dvyukov@google.com&gt;Tested-by: Dmitry Vyukov &lt;dvyukov@google.com&gt;Signed-off-by: Pengfei Xu &lt;pengfei.xu@intel.com&gt;Cc: Aleksandr Nogikh &lt;nogikh@google.com&gt;Cc: &lt;heng.su@intel.com&gt;Cc: Ingo Molnar &lt;mingo@elte.hu&gt;Cc: Kees Cook &lt;keescook@google.com&gt;,Cc: Kirill A. Shutemov &lt;kirill.shutemov@linux.intel.com&gt;Cc: Sohil Mehta &lt;sohil.mehta@intel.com&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Mon, 31 Jul 2023 03:04:18 +0000</pubDate>
        <dc:creator>Pengfei Xu &lt;pengfei.xu@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>c6cfcbd8 - x86/ibt: Convert IBT selftest to asm</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#c6cfcbd8</link>
        <description>x86/ibt: Convert IBT selftest to asmThe following warning is reported when frame pointers and kernel IBT areenabled:  vmlinux.o: warning: objtool: ibt_selftest+0x11: sibling call from callable instruction with modified stack frameThe problem is that objtool interprets the indirect branch inibt_selftest() as a sibling call, and GCC inserts a (partial) framepointer prologue before it:  0000 000000000003f550 &lt;ibt_selftest&gt;:  0000    3f550:	f3 0f 1e fa          	endbr64  0004    3f554:	e8 00 00 00 00       	call   3f559 &lt;ibt_selftest+0x9&gt;	3f555: R_X86_64_PLT32	__fentry__-0x4  0009    3f559:	55                   	push   %rbp  000a    3f55a:	48 8d 05 02 00 00 00 	lea    0x2(%rip),%rax        # 3f563 &lt;ibt_selftest_ip&gt;  0011    3f561:	ff e0                	jmp    *%raxNote the inline asm is missing ASM_CALL_CONSTRAINT, so the &apos;push %rbp&apos;happens before the indirect branch and the &apos;mov %rsp, %rbp&apos; happensafterwards.Simplify the generated code and make it easier to understand for bothtools and humans by moving the selftest to proper asm.Signed-off-by: Josh Poimboeuf &lt;jpoimboe@kernel.org&gt;Signed-off-by: Peter Zijlstra (Intel) &lt;peterz@infradead.org&gt;Link: https://lkml.kernel.org/r/99a7e16b97bda97bf0a04aa141d6241cd8a839a2.1680912949.git.jpoimboe@kernel.org

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Sat, 08 Apr 2023 00:16:41 +0000</pubDate>
        <dc:creator>Josh Poimboeuf &lt;jpoimboe@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>98cfa463 - x86: Introduce userspace API for shadow stack</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#98cfa463</link>
        <description>x86: Introduce userspace API for shadow stackAdd three new arch_prctl() handles: - ARCH_SHSTK_ENABLE/DISABLE enables or disables the specified   feature. Returns 0 on success or a negative value on error. - ARCH_SHSTK_LOCK prevents future disabling or enabling of the   specified feature. Returns 0 on success or a negative value   on error.The features are handled per-thread and inherited over fork(2)/clone(2),but reset on exec().Co-developed-by: Kirill A. Shutemov &lt;kirill.shutemov@linux.intel.com&gt;Signed-off-by: Kirill A. Shutemov &lt;kirill.shutemov@linux.intel.com&gt;Signed-off-by: Rick Edgecombe &lt;rick.p.edgecombe@intel.com&gt;Signed-off-by: Dave Hansen &lt;dave.hansen@linux.intel.com&gt;Reviewed-by: Borislav Petkov (AMD) &lt;bp@alien8.de&gt;Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt;Acked-by: Mike Rapoport (IBM) &lt;rppt@kernel.org&gt;Tested-by: Pengfei Xu &lt;pengfei.xu@intel.com&gt;Tested-by: John Allen &lt;john.allen@amd.com&gt;Tested-by: Kees Cook &lt;keescook@chromium.org&gt;Link: https://lore.kernel.org/all/20230613001108.3040476-27-rick.p.edgecombe%40intel.com

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Tue, 13 Jun 2023 00:10:52 +0000</pubDate>
        <dc:creator>Rick Edgecombe &lt;rick.p.edgecombe@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>2da5b91f - x86/traps: Move control protection handler to separate file</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#2da5b91f</link>
        <description>x86/traps: Move control protection handler to separate fileToday the control protection handler is defined in traps.c and used onlyfor the kernel IBT feature. To reduce ifdeffery, move it to it&apos;s own file.In future patches, functionality will be added to make this handler alsohandle user shadow stack faults. So name the file cet.c.No functional change.Signed-off-by: Rick Edgecombe &lt;rick.p.edgecombe@intel.com&gt;Signed-off-by: Dave Hansen &lt;dave.hansen@linux.intel.com&gt;Reviewed-by: Borislav Petkov (AMD) &lt;bp@alien8.de&gt;Reviewed-by: Kees Cook &lt;keescook@chromium.org&gt;Acked-by: Mike Rapoport (IBM) &lt;rppt@kernel.org&gt;Tested-by: Pengfei Xu &lt;pengfei.xu@intel.com&gt;Tested-by: John Allen &lt;john.allen@amd.com&gt;Tested-by: Kees Cook &lt;keescook@chromium.org&gt;Link: https://lore.kernel.org/all/20230613001108.3040476-8-rick.p.edgecombe%40intel.com

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Tue, 13 Jun 2023 00:10:33 +0000</pubDate>
        <dc:creator>Rick Edgecombe &lt;rick.p.edgecombe@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>571a2a50 - rethook, fprobe: do not trace rethook related functions</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#571a2a50</link>
        <description>rethook, fprobe: do not trace rethook related functionsThese functions are already marked as NOKPROBE to prevent recursion andwe have the same reason to blacklist them if rethook is used with fprobe,since they are beyond the recursion-free region ftrace can guard.Link: https://lore.kernel.org/all/20230517034510.15639-5-zegao@tencent.com/Fixes: f3a112c0c40d (&quot;x86,rethook,kprobes: Replace kretprobe with rethook on x86&quot;)Signed-off-by: Ze Gao &lt;zegao@tencent.com&gt;Reviewed-by: Steven Rostedt (Google) &lt;rostedt@goodmis.org&gt;Acked-by: Masami Hiramatsu (Google) &lt;mhiramat@kernel.org&gt;Cc: stable@vger.kernel.orgSigned-off-by: Masami Hiramatsu (Google) &lt;mhiramat@kernel.org&gt;

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Wed, 17 May 2023 03:45:09 +0000</pubDate>
        <dc:creator>Ze Gao &lt;zegao2021@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>6be9a8f1 - x86/signal/compat: Move sigaction_compat_abi() to signal_64.c</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#6be9a8f1</link>
        <description>x86/signal/compat: Move sigaction_compat_abi() to signal_64.cAlso remove the now-empty signal_compat.c.Signed-off-by: Brian Gerst &lt;brgerst@gmail.com&gt;Signed-off-by: Ingo Molnar &lt;mingo@kernel.org&gt;Link: https://lore.kernel.org/r/20221219193904.190220-3-brgerst@gmail.comCc: Al Viro &lt;viro@zeniv.linux.org.uk&gt;

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Mon, 19 Dec 2022 19:39:04 +0000</pubDate>
        <dc:creator>Brian Gerst &lt;brgerst@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>a545b48c - x86/signal/64: Move 64-bit signal code to its own file</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#a545b48c</link>
        <description>x86/signal/64: Move 64-bit signal code to its own file  [ bp: Fixup merge conflict caused by changes coming from the kbuild tree. ]Signed-off-by: Brian Gerst &lt;brgerst@gmail.com&gt;Signed-off-by: Borislav Petkov &lt;bp@suse.de&gt;Acked-by: &quot;Eric W. Biederman&quot; &lt;ebiederm@xmission.com&gt;Link: https://lore.kernel.org/r/20220606203802.158958-9-brgerst@gmail.comSigned-off-by: Borislav Petkov &lt;bp@suse.de&gt;

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Mon, 06 Jun 2022 20:38:02 +0000</pubDate>
        <dc:creator>Brian Gerst &lt;brgerst@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>24e6dc35 - x86/signal/32: Merge native and compat 32-bit signal code</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#24e6dc35</link>
        <description>x86/signal/32: Merge native and compat 32-bit signal codeThere are significant differences between signal handling on 32-bit vs.64-bit, like different structure layouts and legacy syscalls.  Insteadof duplicating that code for native and compat, merge both versionsinto one file.Signed-off-by: Brian Gerst &lt;brgerst@gmail.com&gt;Signed-off-by: Borislav Petkov &lt;bp@suse.de&gt;Acked-by: &quot;Eric W. Biederman&quot; &lt;ebiederm@xmission.com&gt;Link: https://lore.kernel.org/r/20220606203802.158958-8-brgerst@gmail.comSigned-off-by: Borislav Petkov &lt;bp@suse.de&gt;

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Mon, 06 Jun 2022 20:38:01 +0000</pubDate>
        <dc:creator>Brian Gerst &lt;brgerst@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>e81dc127 - x86/callthunks: Add call patching for call depth tracking</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/arch/x86/kernel/Makefile#e81dc127</link>
        <description>x86/callthunks: Add call patching for call depth trackingMitigating the Intel SKL RSB underflow issue in software requires totrack the call depth. That is every CALL and every RET need to beintercepted and additional code injected.The existing retbleed mitigations already include means of redirectingRET to __x86_return_thunk; this can be re-purposed and RET can beredirected to another function doing RET accounting.CALL accounting will use the function padding introduced in priorpatches. For each CALL instruction, the destination symbol&apos;s paddingis rewritten to do the accounting and the CALL instruction is adjustedto call into the padding.This ensures only affected CPUs pay the overhead of this accounting.Unaffected CPUs will leave the padding unused and have their &apos;JMP__x86_return_thunk&apos; replaced with an actual &apos;RET&apos; instruction.Objtool has been modified to supply a .call_sites section that listsall the &apos;CALL&apos; instructions. Additionally the paravirt instructionsites are iterated since they will have been patched from an indirectcall to direct calls (or direct instructions in which case it&apos;ll beignored).Module handling and the actual thunk code for SKL will be added insubsequent steps.Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;Signed-off-by: Peter Zijlstra (Intel) &lt;peterz@infradead.org&gt;Link: https://lore.kernel.org/r/20220915111147.470877038@infradead.org

            List of files:
            /linux-6.15/arch/x86/kernel/Makefile</description>
        <pubDate>Thu, 15 Sep 2022 11:11:23 +0000</pubDate>
        <dc:creator>Thomas Gleixner &lt;tglx@linutronix.de&gt;</dc:creator>
    </item>
</channel>
</rss>
