This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from bff4b74625fe Revert "dm: use queue_limits_set" new a6a789165bbd x86/mce: Make mce_subsys const new d8941ce52b70 Merge tag 'ras_core_for_v6.9_rc1' of git://git.kernel.org/ [...] new 03ceaf678d44 x86/CPU/AMD: Do the common init on future Zens too new 742582acec1e Merge tag 'x86_cpu_for_v6.9_rc1' of git://git.kernel.org/p [...] new ffc92cf3db62 x86/pat: Simplify the PAT programming protocol new bfdb395a7cde Merge tag 'x86_mtrr_for_v6.9_rc1' of git://git.kernel.org/ [...] new 1b908debf53f x86/resctrl: Fix unused variable warning in cache_alloc_hs [...] new 0976783bb123 x86/resctrl: Remove hard-coded memory bandwidth limit new 54e35eb8611c x86/resctrl: Read supported bandwidth sources from CPUID new c2427e70c163 x86/resctrl: Implement new mba_MBps throttling heuristic new fc747eebef73 x86/resctrl: Remove redundant variable in mbm_config_write [...] new 31a5c0b7c674 tick/nohz: Move tick_nohz_full_mask declaration outside th [...] new 3f7b07380d58 x86/resctrl: Free rmid_ptrs from resctrl_exit() new b1de313979af x86/resctrl: Create helper for RMID allocation and mondata [...] new 311639e9512b x86/resctrl: Move RMID allocation out of mkdir_rdt_prepare() new 40fc735b78f0 x86/resctrl: Track the closid with the rmid new 6791e0ea3071 x86/resctrl: Access per-rmid structures by index new c4c0376eefe1 x86/resctrl: Allow RMID allocation to be scoped by CLOSID new b30a55df60c3 x86/resctrl: Track the number of dirty RMID a CLOSID has new 5d920b6881f2 x86/resctrl: Use __set_bit()/__clear_bit() instead of open coding new 6eac36bb9eb0 x86/resctrl: Allocate the cleanest CLOSID by searching clo [...] new 6eca639d8340 x86/resctrl: Move CLOSID/RMID matching and setting to use helpers new a4846aaf3945 x86/resctrl: Add cpumask_any_housekeeping() for limbo/overflow new 09909e098113 x86/resctrl: Queue mon_event_read() instead of sending an IPI new 6fde1424f29b x86/resctrl: Allow resctrl_arch_rmid_read() to sleep new e557999f80a5 x86/resctrl: Allow arch to allocate memory needed in resct [...] new 13e5769debf0 x86/resctrl: Make resctrl_mounted checks explicit new 5db6a4a75c95 x86/resctrl: Move alloc/mon static keys into helpers new 0a2f4d9b548c x86/resctrl: Make rdt_enable_key the arch's decision to switch new 30017b60706c x86/resctrl: Add helpers for system wide mon/alloc capable new 1b3e50ce7f50 x86/resctrl: Add CPU online callback for resctrl work new 978fcca954cb x86/resctrl: Allow overflow/limbo handlers to be scheduled [...] new 258c91e84fed x86/resctrl: Add CPU offline callback for resctrl work new eeff1d4f118b x86/resctrl: Move domain helper migration into resctrl_off [...] new fb700810d30b x86/resctrl: Separate arch and fs resctrl locks new c0d848fcb09d x86/resctrl: Remove lockdep annotation that triggers false [...] new 2edfd1046f55 Merge tag 'x86_cache_for_v6.9_rc1' of git://git.kernel.org [...] new e3ef461af35a x86/sev: Harden #VC instruction emulation somewhat new 4cab62c058f5 x86/mm: Fix memory encryption features advertisement new e814b59e6c2b x86/sme: Fix memory encryption setting if enabled by defau [...] new b6e0f6666f74 x86/cpufeatures: Add SEV-SNP CPU feature new acaa4b5c4c85 x86/speculation: Do not enable Automatic IBRS if SEV-SNP i [...] new 04d65a9dbb33 iommu/amd: Don't rely on external callers to enable IOMMU [...] new 216d106c7ff7 x86/sev: Add SEV-SNP host initialization support new e3fd08afb7c3 x86/mtrr: Don't print errors if MtrrFixDramModEn is set wh [...] new 94b36bc244bb x86/sev: Add RMP entry lookup helpers new 1f568d36361b x86/fault: Add helper for dumping RMP entries new 54055344b232 x86/traps: Define RMP violation #PF error code new e8bbd303d7de x86/fault: Dump RMP table information when RMP page faults occur new 2c35819ee00b x86/sev: Add helper functions for RMPUPDATE and PSMASH ins [...] new 661b1c6169e2 x86/sev: Adjust the directmap to avoid inadvertent RMP faults new 3a45dc2b419e crypto: ccp: Define the SEV-SNP commands new 1ca5614b84ee crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP new 18085ac2f2fb crypto: ccp: Provide an API to issue SEV and SNP commands new 8dac642999b1 x86/sev: Introduce an SNP leaked pages list new 24512afa4336 crypto: ccp: Handle the legacy TMR allocation when SNP is enabled new 7364a6fbca45 crypto: ccp: Handle non-volatile INIT_EX data when SNP is enabled new a867ad6b340f crypto: ccp: Handle legacy SEV commands when SNP is enabled new f366a8dac1b8 iommu/amd: Clean up RMP entries for IOMMU pages during SNP [...] new 8ef979584ea8 crypto: ccp: Add panic notifier for SEV/SNP firmware shutd [...] new 75253db41a46 KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocati [...] new c3b86e61b756 x86/cpufeatures: Enable/unmask SEV-SNP CPU feature new f5db8841ebe5 crypto: ccp: Add the SNP_PLATFORM_STATUS command new fad133c79afa crypto: ccp: Add the SNP_COMMIT command new cb645fe478ea crypto: ccp: Add the SNP_SET_CONFIG command new 1bfca8d2800a Documentation: virt: Fix up pre-formatted text block for S [...] new 29956748339a x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT new f9e6f00d93d3 crypto: ccp: Make snp_range_list static new 1c811d403afd x86/sev: Fix position dependent variable references in sta [...] new 45ba5b3c0a02 iommu/amd: Fix failure return from snp_lookup_rmpentry() new ee8ff8768735 crypto: ccp - Have it depend on AMD_IOMMU new d7b69b590bc9 x86/sev: Dump SEV_STATUS new c0935fca6ba4 x86/sev: Disable KMSAN for memory encryption TUs new 38b334fc767e Merge tag 'x86_sev_for_v6.9_rc1' of git://git.kernel.org/p [...] new 49527ca26434 Documentation/kernel-parameters: Add spec_rstack_overflow [...] new e2fbc857d3c6 x86/nmi: Rate limit unknown NMI messages new b37bf5ef177a Documentation/maintainer-tip: Add Closes tag new 7dd0a21ccb5a Documentation/maintainer-tip: Add C++ tail comments exception new d54e56f31a34 x86/nmi: Fix the inverse "in NMI handler" check new 1f75619a721d Merge tag 'x86_misc_for_v6.9_rc1' of git://git.kernel.org/ [...] new 65c441ec5822 EDAC/igen6: Add one more Intel Alder Lake-N SoC support new e77086c37508 EDAC/i10nm: Add Intel Grand Ridge micro-server support new b57c1a1e7eff EDAC/synopsys: Convert to devm_platform_ioremap_resource() new 83bf24051a60 EDAC/versal: Make the bit position of injected errors conf [...] new 4527a2194e7c EDAC/versal: Convert to platform remove callback returning void new 3f3174996be6 RAS: Introduce AMD Address Translation Library new 6c9058f49084 EDAC/amd64: Use new AMD Address Translation Library new 1289c431641f Documentation: RAS: Add index and address translation section new 453f0ae79732 RAS/AMD/ATL: Add MI300 support new a7b57372e1c5 RAS/AMD/ATL: Fix array overflow in get_logical_coh_st_fabr [...] new 87a612375307 RAS/AMD/ATL: Add MI300 DRAM to normalized address translat [...] new 0e4fd816b08e Documentation: Move RAS section to admin-guide new 3b566b30b414 RAS/AMD/ATL: Add MI300 row retirement support new 6f15e617cc99 RAS: Introduce a FRU memory poison manager new dd61b55d733e RAS/AMD/ATL: Fix bit overflow in denorm_addr_df4_np2() new 9d2b6fa09d15 RAS: Export helper to get ras_debugfs_dir new 838850c50884 RAS/AMD/FMPM: Save SPA values new 7d19eea51757 RAS/AMD/FMPM: Add debugfs interface to print record entries new bd17b7c34fad RAS/AMD/FMPM: Fix off by one when unwinding on error new af65545a0f82 Merge remote-tracking branches 'ras/edac-drivers', 'ras/ed [...] new b0402403e54a Merge tag 'edac_updates_for_v6.9' of git://git.kernel.org/ [...]
The 101 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: .../admin-guide/RAS/address-translation.rst | 24 + .../ras.rst => admin-guide/RAS/error-decoding.rst} | 11 +- Documentation/admin-guide/RAS/index.rst | 7 + .../admin-guide/{ras.rst => RAS/main.rst} | 10 +- Documentation/admin-guide/index.rst | 2 +- Documentation/admin-guide/kernel-parameters.txt | 5 +- Documentation/arch/x86/amd-memory-encryption.rst | 16 +- Documentation/index.rst | 1 - Documentation/process/maintainer-tip.rst | 34 +- Documentation/virt/coco/sev-guest.rst | 52 + MAINTAINERS | 15 +- arch/x86/Kbuild | 2 + arch/x86/Kconfig | 13 - arch/x86/boot/compressed/sev.c | 6 +- arch/x86/coco/core.c | 7 +- arch/x86/include/asm/asm.h | 14 + arch/x86/include/asm/coco.h | 9 +- arch/x86/include/asm/cpufeatures.h | 1 + arch/x86/include/asm/disabled-features.h | 8 +- arch/x86/include/asm/iommu.h | 1 + arch/x86/include/asm/kvm-x86-ops.h | 1 + arch/x86/include/asm/kvm_host.h | 1 + arch/x86/include/asm/mem_encrypt.h | 15 +- arch/x86/include/asm/msr-index.h | 66 +- arch/x86/include/asm/resctrl.h | 90 ++ arch/x86/include/asm/sev.h | 40 + arch/x86/include/asm/topology.h | 2 +- arch/x86/include/asm/trap_pf.h | 20 +- arch/x86/kernel/Makefile | 1 + arch/x86/kernel/cpu/amd.c | 35 +- arch/x86/kernel/cpu/cacheinfo.c | 7 +- arch/x86/kernel/cpu/common.c | 7 +- arch/x86/kernel/cpu/mce/core.c | 2 +- arch/x86/kernel/cpu/mtrr/generic.c | 3 + arch/x86/kernel/cpu/resctrl/core.c | 111 +- arch/x86/kernel/cpu/resctrl/ctrlmondata.c | 48 +- arch/x86/kernel/cpu/resctrl/internal.h | 75 +- arch/x86/kernel/cpu/resctrl/monitor.c | 501 ++++++-- arch/x86/kernel/cpu/resctrl/pseudo_lock.c | 15 +- arch/x86/kernel/cpu/resctrl/rdtgroup.c | 388 ++++-- arch/x86/kernel/crash.c | 3 + arch/x86/kernel/nmi.c | 8 +- arch/x86/kernel/sev-shared.c | 114 +- arch/x86/kernel/sev.c | 54 +- arch/x86/kvm/lapic.c | 5 +- arch/x86/kvm/svm/nested.c | 2 +- arch/x86/kvm/svm/sev.c | 37 +- arch/x86/kvm/svm/svm.c | 17 +- arch/x86/kvm/svm/svm.h | 1 + arch/x86/mm/Makefile | 1 + arch/x86/mm/fault.c | 5 + arch/x86/mm/mem_encrypt.c | 55 +- arch/x86/mm/mem_encrypt_identity.c | 40 +- arch/x86/mm/pat/memtype.c | 9 +- arch/x86/virt/svm/Makefile | 3 + arch/x86/virt/svm/sev.c | 560 +++++++++ drivers/crypto/ccp/Kconfig | 2 +- drivers/crypto/ccp/sev-dev.c | 1260 +++++++++++++++++--- drivers/crypto/ccp/sev-dev.h | 5 + drivers/edac/Kconfig | 1 + drivers/edac/amd64_edac.c | 286 +---- drivers/edac/i10nm_base.c | 1 + drivers/edac/igen6_edac.c | 2 + drivers/edac/synopsys_edac.c | 4 +- drivers/edac/versal_edac.c | 199 +++- drivers/iommu/amd/amd_iommu.h | 1 - drivers/iommu/amd/init.c | 125 +- drivers/ras/Kconfig | 13 + drivers/ras/Makefile | 3 + drivers/ras/amd/atl/Kconfig | 21 + drivers/ras/amd/atl/Makefile | 18 + drivers/ras/amd/atl/access.c | 133 +++ drivers/ras/amd/atl/core.c | 225 ++++ drivers/ras/amd/atl/dehash.c | 500 ++++++++ drivers/ras/amd/atl/denormalize.c | 718 +++++++++++ drivers/ras/amd/atl/internal.h | 306 +++++ drivers/ras/amd/atl/map.c | 682 +++++++++++ drivers/ras/amd/atl/reg_fields.h | 606 ++++++++++ drivers/ras/amd/atl/system.c | 288 +++++ drivers/ras/amd/atl/umc.c | 341 ++++++ drivers/ras/amd/fmpm.c | 1013 ++++++++++++++++ drivers/ras/cec.c | 10 +- drivers/ras/debugfs.c | 8 +- drivers/ras/debugfs.h | 2 +- drivers/ras/ras.c | 31 + include/linux/amd-iommu.h | 6 +- include/linux/psp-sev.h | 321 ++++- include/linux/ras.h | 18 + include/linux/resctrl.h | 48 +- include/linux/tick.h | 9 +- include/uapi/linux/psp-sev.h | 59 + tools/arch/x86/include/asm/cpufeatures.h | 1 + 92 files changed, 8841 insertions(+), 1005 deletions(-) create mode 100644 Documentation/admin-guide/RAS/address-translation.rst rename Documentation/{RAS/ras.rst => admin-guide/RAS/error-decoding.rst} (73%) create mode 100644 Documentation/admin-guide/RAS/index.rst rename Documentation/admin-guide/{ras.rst => RAS/main.rst} (99%) create mode 100644 arch/x86/virt/svm/Makefile create mode 100644 arch/x86/virt/svm/sev.c create mode 100644 drivers/ras/amd/atl/Kconfig create mode 100644 drivers/ras/amd/atl/Makefile create mode 100644 drivers/ras/amd/atl/access.c create mode 100644 drivers/ras/amd/atl/core.c create mode 100644 drivers/ras/amd/atl/dehash.c create mode 100644 drivers/ras/amd/atl/denormalize.c create mode 100644 drivers/ras/amd/atl/internal.h create mode 100644 drivers/ras/amd/atl/map.c create mode 100644 drivers/ras/amd/atl/reg_fields.h create mode 100644 drivers/ras/amd/atl/system.c create mode 100644 drivers/ras/amd/atl/umc.c create mode 100644 drivers/ras/amd/fmpm.c