This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository linux.
from 03e1ccd45fa7 Merge tag 'x86-irq-2022-05-23' of git://git.kernel.org/pub [...]
new b2fa90ef6255 powerpc/85xx: Remove fsl,85... bindings
new bdae79651453 efi/cper: Add a cper_mem_err_status_str() to decode error [...]
new ed27b5df3877 EDAC/ghes: Unify CPER memory error location reporting
new 1e0e7f10c443 efi/cper: Reformat CPER memory error location to more readable
new ad2df24732e8 EDAC/dmc520: Don't print an error for each unconfigured in [...]
new 5297ecfe2465 EDAC/synopsys: Add driver support for i.MX platforms
new 9ae83ec8b81d EDAC/synopsys: Add a SPDX identifier
new 2f58783c5d88 EDAC/armada_xp: Use devm_platform_ioremap_resource()
new 815fad6e4f9c EDAC/ghes: Change ghes_hw from global to static
new 2edb9863e125 EDAC/i5100: Remove unused inline function i5100_nrecmema_d [...]
new 2aeb1f5fbbac EDAC/xgene: Fix typo processsors -> processors
new 0bbb265f7089 EDAC/mc: Get rid of silly one-shot struct allocation in ed [...]
new fb8cd45ca39b EDAC/pci: Get rid of the silly one-shot memory allocation [...]
new 9fb9ce392aae EDAC/device: Get rid of the silly one-shot memory allocati [...]
new 0d24a49e88b5 EDAC/device: Sanitize edac_device_alloc_ctl_info() definition
new 713c4ff8859c EDAC/mc: Get rid of edac_align_ptr()
new 13088b65d93a EDAC: Use kcalloc()
new be80a1ca5119 Merge branches 'edac-misc' and 'edac-alloc-cleanup' into e [...]
new 0be3ff0ccbfa Merge tag 'edac_updates_for_v5.19_rc1' of git://git.kernel [...]
new 046f773be106 KVM: SVM: Define sev_features and VMPL field in the VMSA
new 3dd2775b74c9 KVM: SVM: Create a separate mapping for the SEV-ES save area
new a4690359eaec KVM: SVM: Create a separate mapping for the GHCB save area
new 6d3b3d34e39e KVM: SVM: Update the SEV-ES save area mapping
new 176db622573f x86/boot: Introduce helpers for MSR reads/writes
new 950d00558a92 x86/boot: Use MSR read/write helpers instead of inline assembly
new ec1c66af3a30 x86/compressed/64: Detect/setup SEV/SME features earlier d [...]
new bcce82908333 x86/sev: Detect/setup SEV/SME features earlier in boot
new f742b90e61bb x86/mm: Extend cc_attr to include AMD SEV-SNP
new 6c0f74d678c9 x86/sev: Define the Linux-specific guest termination reasons
new 2ea29c5abbc2 x86/sev: Save the negotiated GHCB version
new cbd3d4f7c4e5 x86/sev: Check SEV-SNP features support
new 0bd6f1e52607 x86/sev: Add a helper for the PVALIDATE instruction
new 81cc3df9a90e x86/sev: Check the VMPL level
new 4f9c403e44e5 x86/compressed: Add helper for validating pages in the dec [...]
new 87294bdb7b4b x86/compressed: Register GHCB memory when SEV-SNP is active
new 95d33bfaa3e1 x86/sev: Register GHCB memory when SEV-SNP is active
new 5e5ccff60a29 x86/sev: Add helper for validating pages in early enc attr [...]
new efac0eedfab5 x86/kernel: Mark the .bss..decrypted section as shared in [...]
new 9704c07bf9f7 x86/kernel: Validate ROM memory before accessing when SEV- [...]
new dc3f3d2474b8 x86/mm: Validate memory when changing the C-bit
new 0afb6b660a6b x86/sev: Use SEV-SNP AP creation to start secondary CPUs
new 469693d8f622 x86/head/64: Re-enable stack protection
new 7c4146e88855 x86/compressed/acpi: Move EFI detection to helper
new 58f3e6b71f42 x86/compressed/acpi: Move EFI system table lookup to helper
new 61c14ceda840 x86/compressed/acpi: Move EFI config table lookup to helper
new dee602dd5d14 x86/compressed/acpi: Move EFI vendor table lookup to helper
new 824f37783189 x86/compressed/acpi: Move EFI kexec handling into common code
new 5ea98e01ab52 x86/boot: Add Confidential Computing type to setup_data
new b66370db9a90 KVM: x86: Move lookup of indexed CPUID leafs to helper
new 801baa693c1f x86/sev: Move MSR-based VMGEXITs for CPUID to helper
new ee0bfa08a345 x86/compressed/64: Add support for SEV-SNP CPUID table in [...]
new 8c9c509baf66 x86/boot: Add a pointer to Confidential Computing blob in [...]
new c01fce9cef84 x86/compressed: Add SEV-SNP feature detection/setup
new 5f211f4fc496 x86/compressed: Use firmware-validated CPUID leaves for SE [...]
new a9ee679b1f8c x86/compressed: Export and rename add_identity_map()
new 76f61e1e89b3 x86/compressed/64: Add identity mapping for Confidential C [...]
new b190a043c49a x86/sev: Add SEV-SNP feature detection/setup
new 30612045e69d x86/sev: Use firmware-validated CPUID for SEV-SNP guests
new ba37a1438aeb x86/sev: Add a sev= cmdline option
new d5af44dde546 x86/sev: Provide support for SNP guest request NAEs
new 3a45b3753849 x86/sev: Register SEV-SNP guest request platform device
new fce96cf04430 virt: Add SEV-SNP guest driver
new 68de0b2f9386 virt: sevguest: Add support to derive key
new d80b494f7123 virt: sevguest: Add support to get extended report
new 92a99584d965 virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement
new e720ea52e85c x86/sev-es: Replace open-coded hlt-loop with sev_es_terminate()
new e50abbf788c2 virt: sevguest: Fix return value check in alloc_shared_pages()
new 101826e02ac6 virt: sevguest: Fix bool function returning negative value
new 5dc91f2d4f3c x86/boot: Add an efi.h header for the decompressor
new 6044d159b5d8 x86/boot: Put globals that are accessed early into the .da [...]
new 2bf93ffbb97e virt: sevguest: Change driver name to reflect generic SEV support
new d63670d23e60 virt: sevguest: Rename the sevguest dir and files to sev-guest
new 75d359ec4141 x86/sev: Add missing __init annotations to SEV init routines
new c2106a231c2b x86/sev: Get the AP jump table address from secrets page
new ab65f49253ff x86/sev: Fix address space sparse warning
new 0621210ab769 x86/sev: Remove duplicated assignment to variable info
new c42b145181aa x86/sev: Annotate stack change in the #VC handler
new 47f33de4aafb x86/sev: Mark the code returning to user space as syscall gap
new ce6565282b3b x86/entry: Fixup objtool/ibt validation
new eb39e37d5ceb Merge tag 'x86_sev_for_v5.19_rc1' of git://git.kernel.org/ [...]
new 9f1b19b977ee x86/mce: Avoid unnecessary padding in struct mce_bank
new e5f28623ceb1 x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails
new 70c459d915e8 x86/mce: Simplify AMD severity grading logic
new fa619f5156cf x86/mce: Add messages for panic errors in AMD's MCE grading
new 5b828263b180 Merge tag 'ras_core_for_v5.19_rc1' of git://git.kernel.org [...]
new 59bd54a84d15 x86/tdx: Detect running as a TDX guest in early boot
new 527a534c7326 x86/tdx: Provide common base for SEAMCALL and TDCALL C wrappers
new eb94f1b6a70a x86/tdx: Add __tdx_module_call() and __tdx_hypercall() hel [...]
new 41394e33f3a0 x86/tdx: Extend the confidential computing API to support [...]
new 65fab5bc033a x86/tdx: Exclude shared bit from __PHYSICAL_MASK
new 775acc82a88f x86/traps: Refactor exc_general_protection()
new 9a22bf6debbf x86/traps: Add #VE support for TDX guest
new bfe6ed0c6727 x86/tdx: Add HLT support for TDX guests
new ae87f609cd52 x86/tdx: Add MSR support for TDX guests
new c141fa2c2bba x86/tdx: Handle CPUID via #VE
new 31d58c4e557d x86/tdx: Handle in-kernel MMIO
new 4b05f81504bf x86/tdx: Detect TDX at early kernel decompression time
new 15104de122a4 x86: Adjust types used in port I/O helpers
new 1e8f93e18379 x86: Consolidate port I/O helpers
new eb4ea1ae8f45 x86/boot: Port I/O: Allow to hook up alternative helpers
new 4c5b9aac6cad x86/boot: Port I/O: Add decompression-time support for TDX
new 03149948832a x86/tdx: Port I/O: Add runtime hypercalls
new 32e72854fa5f x86/tdx: Port I/O: Add early boot support
new cfb8ec7a31f2 x86/tdx: Wire up KVM hypercalls
new ff2e64684f15 x86/boot: Add a trampoline for booting APs via firmware handoff
new f39642d0dbac x86/acpi/x86/boot: Add multiprocessor wake-up support
new 9cf30606405f x86/boot: Set CR0.NE early and keep it set during the boot
new 77a512e35db7 x86/boot: Avoid #VE during boot for TDX platforms
new bae1a962ac2c x86/topology: Disable CPU online/offline control for TDX guests
new 9aa6ea69852c x86/tdx: Make pages shared in ioremap()
new 7dbde7631629 x86/mm/cpa: Add support for TDX shared memory
new 968b493173ac x86/mm: Make DMA memory shared for TD guest
new f4c9361f97c4 x86/tdx/ioapic: Add shared bit for IOAPIC base address
new e2efb6359e62 ACPICA: Avoid cache flush inside virtual machines
new b9c7ba58777a Documentation/x86: Document TDX kernel architecture
new adb5680b8dfd x86/kaslr: Fix build warning in KASLR code in boot stub
new 51964015565d x86/mm: Fix spacing within memory encryption features message
new 5af14c29f7a0 x86/tdx: Annotate a noreturn function
new c796f02162e4 x86/tdx: Fix RETs in TDX asm
new 3a755ebcc255 Merge tag 'x86_tdx_for_v5.19_rc1' of git://git.kernel.org/ [...]
new 1625c833db93 x86/cpu: Allow feature bit names from /proc/cpuinfo in cle [...]
new c949110ef4e3 x86/cpu: Remove "nosep"
new dbae0a934f09 x86/cpu: Remove CONFIG_X86_SMAP and "nosmap"
new 385d2ae0a1b5 x86/cpu: Remove "nosmep"
new 76ea0025a214 x86/cpu: Remove "noexec"
new f8858b5eff30 x86/cpu: Remove "noclflush"
new 0205f8a738ab x86/speculation/srbds: Do not try to turn mitigation off w [...]
new b0b592cf0836 x86/pm: Fix false positive kmemleak report in msr_build_context()
new 2147c438fde1 x86/speculation: Add missing prototype for unpriv_ebpf_notify()
new c5a3d3c01e90 Merge tag 'x86_cpu_for_v5.19_rc1' of git://git.kernel.org/ [...]
new 0aca53c6b522 x86/traps: Use pt_regs directly in fixup_bad_iret()
new 520a7e80c96d x86/entry: Switch the stack after error_entry() returns
new ee774dac0da1 x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry()
new c64cc2802a78 x86/entry: Move CLD to the start of the idtentry macro
new 64cbd0acb582 x86/entry: Don't call error_entry() for XENPV
new c89191ce67ef x86/entry: Convert SWAPGS to swapgs and remove the definit [...]
new a1e2c031ec39 x86/mm: Simplify RESERVE_BRK()
new d205222eb6a8 x86/entry: Simplify entry_INT80_compat()
new 8c42819b61b8 x86/entry: Use PUSH_AND_CLEAR_REGS for compat
new 1b331eeea7b8 x86/entry: Remove skip_r11rcx
new 3ff5f7840979 linkage: Fix issue with missing symbol size
new e2ef115813c3 objtool: Fix STACK_FRAME_NON_STANDARD reloc type
new 036c07c0c3b8 x86/entry: Fix register corruption in compat syscall
new 42b682a30f86 Merge tag 'x86_asm_for_v5.19_rc1' of git://git.kernel.org/ [...]
new 9b5a7f4a2a8d x86/configs: Add x86 debugging Kconfig fragment plus docs
new aeb84412037b x86/boot: Wrap literal addresses in absolute_pointer()
new 1de564b8c1a6 Merge tag 'x86_build_for_v5.19_rc1' of git://git.kernel.or [...]
new 70431c63d7ed x86/pkeys: Clean up arch_set_user_pkey_access() declaration
new 5a0893088a20 x86/pkeys: Remove __arch_set_user_pkey_access() declaration
new 3a5ff1f6dd50 x86: Replace cpumask_weight() with cpumask_empty() where a [...]
new c2a911d302b0 x86/mm: Replace nodes_weight() with nodes_empty() where ap [...]
new c7bda0dca98c x86: Remove a.out support
new dbb5ab6d2c0a x86/process: Fix kernel-doc warning due to a changed funct [...]
new 6d108c96bf23 x86/aperfmperf: Dont wake idle CPUs in arch_freq_get_on_cpu()
new 55cb0b707493 x86/smp: Move APERF/MPERF code where it belongs
new 138a7f9c6bea x86/aperfmperf: Separate AP/BP frequency invariance init
new 0dfaf3f6ecc0 x86/aperfmperf: Untangle Intel and AMD frequency invariance init
new 24620d94a52a x86/aperfmperf: Put frequency invariance aperf/mperf data [...]
new 73a5fa7d5136 x86/aperfmperf: Restructure arch_scale_freq_tick()
new bb6e89df9028 x86/aperfmperf: Make parts of the frequency invariance cod [...]
new cd8c0e142daf x86/aperfmperf: Store aperf/mperf data for cpu frequency reads
new 7d84c1ebf9dd x86/aperfmperf: Replace aperfmperf_get_khz()
new f3eca381bd49 x86/aperfmperf: Replace arch_freq_get_on_cpu()
new fb4c77c21aba x86/aperfmperf: Integrate the fallback code from show_cpuinfo()
new 1ff2fb982c52 x86/aperfperf: Make it correct on 32bit and UP kernels
new f5c0b4f30416 x86/prctl: Remove pointless task argument
new 553b0cb30b54 x86/speculation: Add missing srbds=off to the mitigations= [...]
new d936411dc9ca x86: Remove empty files
new a13dc4d40938 Merge tag 'x86_cleanups_for_v5.19_rc1' of git://git.kernel [...]
new f5d9283ecb33 x86/32: Simplify ELF_CORE_COPY_REGS
new 9554e908fb5d ELF: Remove elf_core_copy_kernel_regs()
new 3a24a60854d2 x86/32: Remove lazy GS macros
new 203d8919a9ed x86/asm: Merge load_gs_index()
new a7fed5c0431d x86/nmi: Make register_nmi_handler() more robust
new 69505e3d9a39 bug: Use normal relative pointers in 'struct bug_entry'
new de8ac81747fc Merge tag 'x86_core_for_v5.19_rc1' of git://git.kernel.org [...]
new 8ad7e8f69695 x86/fpu/xsave: Support XSAVEC in the kernel
new b91c0922bf1e x86/fpu: Cleanup variable shadowing
new e36ae2290fd1 Merge tag 'x86_fpu_for_v5.19_rc1' of git://git.kernel.org/ [...]
new 944fad4583bc x86/fault: Cast an argument to the proper address space in [...]
new c415b53ad00d Merge tag 'x86_mm_for_v5.19_rc1' of git://git.kernel.org/p [...]
new d812f7c475c6 x86/platform/uv: Update NMI Handler for UV5
new bb3ab81bdbd5 x86/platform/uv: Update TSC sync state for UV5
new 327c348988c6 x86/platform/uv: Log gap hole end size
new 1abcb10d6edf Merge tag 'x86_platform_for_v5.19_rc1' of git://git.kernel [...]
new b57a7c9dd732 x86/crash: Fix minor typo/bug in debug message
new e3228a86a33b Merge tag 'x86_kdump_for_v5.19_rc1' of git://git.kernel.or [...]
new daf3af4705ba x86/apic: Clarify i82489DX bit overlap in APIC_LVT0
new 7a116a2dd32d x86/apic: Do apic driver probe for "nosmp" use case
new 916654201008 Merge tag 'x86_apic_for_v5.19_rc1' of git://git.kernel.org [...]
new b041b525dab9 x86/split_lock: Make life miserable for split lockers
new ef79970d7ccd x86/split-lock: Remove unused TIF_SLD bit
new 0180a1e823d7 x86/split_lock: Enable the split lock feature on Raptor Lake
new 3e2cbc016b1d Merge tag 'x86_splitlock_for_v5.19_rc1' of git://git.kerne [...]
new e1907d37514b x86/amd_nb: Unexport amd_cache_northbridges()
new b86eb74098a9 x86/delay: Fix the wrong asm constraint in delay_loop()
new 12441ccdf5e2 x86: Fix return value of __setup handlers
new 1ef64b1e89e6 x86/mm: Cleanup the control_va_addr_alignment() __setup handler
new abc8babefbc1 Merge tag 'x86_misc_for_v5.19_rc1' of git://git.kernel.org [...]
new 9c55d99e099b x86/microcode: Add explicit CPU vendor dependency
new 88699f8fbfd4 Merge tag 'x86_microcode_for_v5.19_rc1' of git://git.kerne [...]
new bf00745e7791 x86/vsyscall: Remove CONFIG_LEGACY_VSYSCALL_EMULATE
new d6ecaa002448 Merge tag 'x86_vdso_for_v5.19_rc1' of git://git.kernel.org [...]
The 203 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
Documentation/admin-guide/kernel-parameters.txt | 27 +-
.../bindings/memory-controllers/fsl/fsl,ddr.yaml | 6 -
.../devicetree/bindings/powerpc/fsl/l2cache.txt | 6 -
Documentation/process/maintainer-tip.rst | 14 +
Documentation/virt/coco/sev-guest.rst | 155 ++++
Documentation/virt/index.rst | 1 +
Documentation/x86/cpuinfo.rst | 5 +-
Documentation/x86/index.rst | 1 +
Documentation/x86/tdx.rst | 218 ++++++
Documentation/x86/x86_64/boot-options.rst | 23 +-
Documentation/x86/zero-page.rst | 2 +
MAINTAINERS | 1 -
arch/arm64/include/asm/asm-bug.h | 4 +-
arch/powerpc/include/asm/bug.h | 14 +-
arch/powerpc/kernel/fadump.c | 2 +-
arch/powerpc/platforms/powernv/opal-core.c | 2 +-
arch/riscv/include/asm/bug.h | 4 +-
arch/s390/include/asm/bug.h | 5 +-
arch/x86/Kconfig | 55 +-
arch/x86/Makefile | 1 +
arch/x86/boot/boot.h | 73 +-
arch/x86/boot/compressed/Makefile | 2 +
arch/x86/boot/compressed/acpi.c | 176 +----
arch/x86/boot/compressed/early_serial_console.c | 3 +-
arch/x86/boot/compressed/efi.c | 234 ++++++
arch/x86/boot/compressed/efi.h | 126 +++
arch/x86/boot/compressed/head_64.S | 64 +-
arch/x86/boot/compressed/ident_map_64.c | 39 +-
arch/x86/boot/compressed/idt_64.c | 18 +-
arch/x86/boot/compressed/kaslr.c | 3 +-
arch/x86/boot/compressed/mem_encrypt.S | 36 -
arch/x86/boot/compressed/misc.c | 17 +-
arch/x86/boot/compressed/misc.h | 60 +-
arch/x86/boot/compressed/pgtable.h | 2 +-
arch/x86/boot/compressed/pgtable_64.c | 3 +-
arch/x86/boot/compressed/sev.c | 263 ++++++-
arch/x86/boot/compressed/tdcall.S | 3 +
arch/x86/boot/compressed/tdx.c | 77 ++
arch/x86/boot/compressed/tdx.h | 13 +
arch/x86/boot/cpucheck.c | 30 +-
arch/x86/boot/cpuflags.c | 3 +-
arch/x86/boot/cpuflags.h | 1 +
arch/x86/boot/io.h | 41 +
arch/x86/boot/main.c | 6 +-
arch/x86/boot/msr.h | 26 +
arch/x86/coco/Makefile | 2 +
arch/x86/coco/core.c | 25 +-
arch/x86/coco/tdx/Makefile | 3 +
arch/x86/coco/tdx/tdcall.S | 205 +++++
arch/x86/coco/tdx/tdx.c | 692 +++++++++++++++++
arch/x86/entry/calling.h | 19 +-
arch/x86/entry/entry_64.S | 62 +-
arch/x86/entry/entry_64_compat.S | 111 +--
arch/x86/entry/vdso/vma.c | 2 +-
arch/x86/entry/vsyscall/vsyscall_64.c | 2 +-
arch/x86/ia32/Makefile | 2 -
arch/x86/ia32/ia32_aout.c | 325 --------
arch/x86/include/asm/acenv.h | 14 +-
arch/x86/include/asm/amd_nb.h | 1 -
arch/x86/include/asm/apic.h | 7 +
arch/x86/include/asm/apicdef.h | 6 -
arch/x86/include/asm/bootparam_utils.h | 1 +
arch/x86/include/asm/bug.h | 2 +-
arch/x86/include/asm/cpu.h | 4 +-
arch/x86/include/asm/cpufeature.h | 7 +-
arch/x86/include/asm/cpufeatures.h | 3 +-
arch/x86/include/asm/cpuid.h | 34 +
arch/x86/include/asm/disabled-features.h | 16 +-
arch/x86/include/asm/elf.h | 15 +-
arch/x86/include/asm/fpu/api.h | 3 +-
arch/x86/include/asm/fpu/internal.h | 0
arch/x86/include/asm/idtentry.h | 4 +
arch/x86/include/asm/io.h | 42 +-
arch/x86/include/asm/irqflags.h | 8 -
arch/x86/include/asm/kvm_para.h | 22 +
arch/x86/include/asm/mem_encrypt.h | 6 +-
arch/x86/include/asm/mmu_context.h | 2 +-
arch/x86/include/asm/mmx.h | 0
arch/x86/include/asm/msr-index.h | 2 +
arch/x86/include/asm/msr.h | 11 +-
arch/x86/include/asm/nmi.h | 1 +
arch/x86/include/asm/pkeys.h | 8 -
arch/x86/include/asm/proto.h | 8 +-
arch/x86/include/asm/ptrace.h | 4 +
arch/x86/include/asm/realmode.h | 1 +
arch/x86/include/asm/segment.h | 12 -
arch/x86/include/asm/setup.h | 31 +-
arch/x86/include/asm/sev-common.h | 82 ++
arch/x86/include/asm/sev.h | 137 +++-
arch/x86/include/asm/shared/io.h | 34 +
arch/x86/include/asm/shared/msr.h | 15 +
arch/x86/include/asm/shared/tdx.h | 40 +
arch/x86/include/asm/smap.h | 24 -
arch/x86/include/asm/special_insns.h | 7 +-
arch/x86/include/asm/suspend_32.h | 2 +-
arch/x86/include/asm/suspend_64.h | 12 +-
arch/x86/include/asm/svm.h | 171 ++++-
arch/x86/include/asm/tdx.h | 91 +++
arch/x86/include/asm/thread_info.h | 4 +-
arch/x86/include/asm/topology.h | 23 +-
arch/x86/include/asm/traps.h | 2 +-
arch/x86/include/uapi/asm/bootparam.h | 4 +-
arch/x86/include/uapi/asm/svm.h | 13 +
arch/x86/kernel/Makefile | 2 -
arch/x86/kernel/acpi/boot.c | 93 ++-
arch/x86/kernel/acpi/cppc.c | 29 +-
arch/x86/kernel/amd_nb.c | 7 +-
arch/x86/kernel/apic/apic.c | 28 +-
arch/x86/kernel/apic/io_apic.c | 18 +-
arch/x86/kernel/apic/x2apic_uv_x.c | 16 +-
arch/x86/kernel/asm-offsets.c | 17 +
arch/x86/kernel/cpu/aperfmperf.c | 480 +++++++++---
arch/x86/kernel/cpu/bugs.c | 7 +
arch/x86/kernel/cpu/common.c | 105 +--
arch/x86/kernel/cpu/intel.c | 78 +-
arch/x86/kernel/cpu/mce/amd.c | 32 +-
arch/x86/kernel/cpu/mce/core.c | 4 +-
arch/x86/kernel/cpu/mce/severity.c | 110 ++-
arch/x86/kernel/cpu/proc.c | 11 +-
arch/x86/kernel/cpu/resctrl/rdtgroup.c | 14 +-
arch/x86/kernel/crash.c | 2 +-
arch/x86/kernel/fpu/xstate.c | 65 +-
arch/x86/kernel/fpu/xstate.h | 14 +-
arch/x86/kernel/head64.c | 36 +-
arch/x86/kernel/head_64.S | 65 +-
arch/x86/kernel/idt.c | 3 +
arch/x86/kernel/nmi.c | 12 +-
arch/x86/kernel/probe_roms.c | 13 +-
arch/x86/kernel/process.c | 23 +-
arch/x86/kernel/process_32.c | 13 +-
arch/x86/kernel/process_64.c | 4 +-
arch/x86/kernel/ptrace.c | 6 +-
arch/x86/kernel/setup.c | 28 +-
arch/x86/kernel/sev-shared.c | 534 ++++++++++++-
arch/x86/kernel/sev.c | 855 ++++++++++++++++++++-
arch/x86/kernel/signal.c | 8 +-
arch/x86/kernel/smpboot.c | 373 +--------
arch/x86/kernel/sys_x86_64.c | 7 +-
arch/x86/kernel/traps.c | 162 +++-
arch/x86/kernel/vm86_32.c | 4 +-
arch/x86/kvm/cpuid.c | 19 +-
arch/x86/kvm/svm/sev.c | 22 +-
arch/x86/kvm/svm/svm.c | 8 +-
arch/x86/kvm/svm/svm.h | 4 +-
arch/x86/lib/delay.c | 4 +-
arch/x86/lib/insn-eval.c | 5 +-
arch/x86/lib/kaslr.c | 2 +-
arch/x86/lib/mmx_32.c | 0
arch/x86/math-emu/get_address.c | 2 +-
arch/x86/mm/Makefile | 3 +-
arch/x86/mm/amdtopology.c | 2 +-
arch/x86/mm/fault.c | 2 +-
arch/x86/mm/init_64.c | 1 -
arch/x86/mm/ioremap.c | 5 +
arch/x86/mm/mem_encrypt.c | 13 +-
arch/x86/mm/mem_encrypt_amd.c | 71 +-
arch/x86/mm/mem_encrypt_identity.c | 8 +
arch/x86/mm/mmio-mod.c | 2 +-
arch/x86/mm/numa_emulation.c | 4 +-
arch/x86/mm/pat/memtype.c | 2 +-
arch/x86/mm/setup_nx.c | 62 --
arch/x86/platform/uv/uv_nmi.c | 23 +-
arch/x86/realmode/init.c | 2 +-
arch/x86/realmode/rm/header.S | 1 +
arch/x86/realmode/rm/trampoline_64.S | 57 +-
arch/x86/realmode/rm/trampoline_common.S | 12 +-
arch/x86/realmode/rm/wakemain.c | 4 +
arch/x86/virt/vmx/tdx/tdxcall.S | 96 +++
drivers/char/agp/amd64-agp.c | 2 +-
drivers/edac/Kconfig | 3 +-
drivers/edac/amd64_edac.c | 2 +-
drivers/edac/armada_xp_edac.c | 18 +-
drivers/edac/dmc520_edac.c | 2 +-
drivers/edac/edac_device.c | 130 ++--
drivers/edac/edac_device.h | 14 +
drivers/edac/edac_device_sysfs.c | 5 +-
drivers/edac/edac_mc.c | 96 +--
drivers/edac/edac_module.h | 2 -
drivers/edac/edac_pci.c | 25 +-
drivers/edac/ghes_edac.c | 202 +----
drivers/edac/i5100_edac.c | 5 -
drivers/edac/mpc85xx_edac.c | 14 -
drivers/edac/synopsys_edac.c | 15 +-
drivers/edac/xgene_edac.c | 2 +-
drivers/firmware/efi/cper.c | 64 +-
drivers/virt/Kconfig | 2 +
drivers/virt/Makefile | 1 +
drivers/virt/coco/sev-guest/Kconfig | 14 +
drivers/virt/coco/sev-guest/Makefile | 2 +
drivers/virt/coco/sev-guest/sev-guest.c | 743 ++++++++++++++++++
drivers/virt/coco/sev-guest/sev-guest.h | 63 ++
fs/proc/cpuinfo.c | 6 +-
include/linux/bpf.h | 2 +
include/linux/cc_platform.h | 18 +
include/linux/cper.h | 3 +
include/linux/cpufreq.h | 1 -
include/linux/efi.h | 1 +
include/linux/elfcore.h | 9 -
include/linux/linkage.h | 15 +-
include/linux/objtool.h | 4 +-
include/linux/sched.h | 3 +
include/uapi/linux/sev-guest.h | 80 ++
kernel/configs/x86_debug.config | 18 +
kernel/cpu.c | 7 +
kernel/fork.c | 5 +
kernel/kexec_core.c | 2 +-
lib/bug.c | 15 +-
scripts/Makefile.build | 2 +-
scripts/link-vmlinux.sh | 6 +-
tools/arch/x86/include/asm/disabled-features.h | 8 +-
tools/include/linux/objtool.h | 4 +-
211 files changed, 7117 insertions(+), 2483 deletions(-)
create mode 100644 Documentation/virt/coco/sev-guest.rst
create mode 100644 Documentation/x86/tdx.rst
create mode 100644 arch/x86/boot/compressed/efi.c
create mode 100644 arch/x86/boot/compressed/efi.h
create mode 100644 arch/x86/boot/compressed/tdcall.S
create mode 100644 arch/x86/boot/compressed/tdx.c
create mode 100644 arch/x86/boot/compressed/tdx.h
create mode 100644 arch/x86/boot/io.h
create mode 100644 arch/x86/boot/msr.h
create mode 100644 arch/x86/coco/tdx/Makefile
create mode 100644 arch/x86/coco/tdx/tdcall.S
create mode 100644 arch/x86/coco/tdx/tdx.c
delete mode 100644 arch/x86/ia32/ia32_aout.c
create mode 100644 arch/x86/include/asm/cpuid.h
delete mode 100644 arch/x86/include/asm/fpu/internal.h
delete mode 100644 arch/x86/include/asm/mmx.h
create mode 100644 arch/x86/include/asm/shared/io.h
create mode 100644 arch/x86/include/asm/shared/msr.h
create mode 100644 arch/x86/include/asm/shared/tdx.h
create mode 100644 arch/x86/include/asm/tdx.h
delete mode 100644 arch/x86/lib/mmx_32.c
delete mode 100644 arch/x86/mm/setup_nx.c
create mode 100644 arch/x86/virt/vmx/tdx/tdxcall.S
create mode 100644 drivers/virt/coco/sev-guest/Kconfig
create mode 100644 drivers/virt/coco/sev-guest/Makefile
create mode 100644 drivers/virt/coco/sev-guest/sev-guest.c
create mode 100644 drivers/virt/coco/sev-guest/sev-guest.h
create mode 100644 include/uapi/linux/sev-guest.h
create mode 100644 kernel/configs/x86_debug.config
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_gcc_bootstrap/master-aarch64-bootstrap_O1
in repository toolchain/ci/binutils-gdb.
from 8d4b0049b5 Automatic date update in version.in
adds cb0d58bf4d [gdb/testsuite] Skip language auto in gdb.base/parse_number.exp
adds 27049a382f ld: use definitions in generate_reloc rather than raw literals
adds 05527d8ca1 [gdb/ada] Fix gdb.ada/dynamic-iface.exp with gcc 7
adds 5a3cf18c2e [gdb/exp] Fix UB in scalar_binop
adds 735dfe028c [gdbsupport] Fix UB in print-utils.cc:int_string
adds 01a62a6d5f [gdb/testsuite] Fix -prompt handling in gdb_test
adds a6b446b222 gdb: LoongArch: Implement the iterate_over_regset_sections g [...]
adds d9b6e047f6 Fix loongarch_iterate_over_regset_sections for non-native targets.
adds e8123c847f Tweak the std::hash<> specialization for aarch64_features.
adds 9e0f632935 Automatic date update in version.in
No new revisions were added by this update.
Summary of changes:
bfd/version.h | 2 +-
gdb/ada-lang.c | 3 ++-
gdb/arch/aarch64.h | 27 +++++++++++++++------------
gdb/loongarch-linux-tdep.c | 26 ++++++++++++++++++++++++++
gdb/testsuite/gdb.base/arithmet.exp | 2 ++
gdb/testsuite/gdb.base/parse_number.exp | 5 +++++
gdb/testsuite/lib/gdb.exp | 2 +-
gdb/valarith.c | 5 ++++-
gdbsupport/print-utils.cc | 6 +++++-
include/coff/internal.h | 16 ++++++++++++++++
ld/pe-dll.c | 15 ++++++++-------
11 files changed, 85 insertions(+), 24 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_gcc_bootstrap/master-aarch64-bootstrap_O1
in repository toolchain/ci/base-artifacts.
discards bc1510c0 0: update: binutils-gcc: 2
new 520b049f 0: update: binutils-gcc: 2
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (bc1510c0)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_gcc_bootstrap/master-aar [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log.xz | Bin 1536 -> 1556 bytes
02-prepare_abe/console.log.xz | Bin 2728 -> 2756 bytes
04-build_abe-binutils/console.log.xz | Bin 38356 -> 38912 bytes
05-build_abe-bootstrap_O1/console.log.xz | Bin 271008 -> 271444 bytes
06-check_regression/console.log.xz | Bin 416 -> 420 bytes
07-update_baseline/console.log | 36 +++++++++++++++++++++++++++++++
jenkins/manifest.sh | 12 +++++------
7 files changed, 42 insertions(+), 6 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository glibc.
from a01a13601c benchtests: Improve bench-strnlen.c
new 36c1dbaedd elf/dl-reloc.c: Copyright The GNU Toolchain Authors
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
elf/dl-reloc.c | 1 +
1 file changed, 1 insertion(+)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.