# git rev-parse -q --verify 408323581b722c9bd504dd296920f392049a7f52^{commit} 408323581b722c9bd504dd296920f392049a7f52 already have revision, skipping fetch # git checkout -q -f -B kisskb 408323581b722c9bd504dd296920f392049a7f52 # git clean -qxdf # < git log -1 # commit 408323581b722c9bd504dd296920f392049a7f52 # Merge: b84b3381907a 5fa96c7ab3dc # Author: Linus Torvalds # Date: Tue Jul 16 11:12:25 2024 -0700 # # Merge tag 'x86_sev_for_v6.11_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip # # Pull x86 SEV updates from Borislav Petkov: # # - Add support for running the kernel in a SEV-SNP guest, over a Secure # VM Service Module (SVSM). # # When running over a SVSM, different services can run at different # protection levels, apart from the guest OS but still within the # secure SNP environment. They can provide services to the guest, like # a vTPM, for example. # # This series adds the required facilities to interface with such a # SVSM module. # # - The usual fixlets, refactoring and cleanups # # [ And as always: "SEV" is AMD's "Secure Encrypted Virtualization". # # I can't be the only one who gets all the newer x86 TLA's confused, # can I? # - Linus ] # # * tag 'x86_sev_for_v6.11_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: # Documentation/ABI/configfs-tsm: Fix an unexpected indentation silly # x86/sev: Do RMP memory coverage check after max_pfn has been set # x86/sev: Move SEV compilation units # virt: sev-guest: Mark driver struct with __refdata to prevent section mismatch # x86/sev: Allow non-VMPL0 execution when an SVSM is present # x86/sev: Extend the config-fs attestation support for an SVSM # x86/sev: Take advantage of configfs visibility support in TSM # fs/configfs: Add a callback to determine attribute visibility # sev-guest: configfs-tsm: Allow the privlevel_floor attribute to be updated # virt: sev-guest: Choose the VMPCK key based on executing VMPL # x86/sev: Provide guest VMPL level to userspace # x86/sev: Provide SVSM discovery support # x86/sev: Use the SVSM to create a vCPU when not in VMPL0 # x86/sev: Perform PVALIDATE using the SVSM when not at VMPL0 # x86/sev: Use kernel provided SVSM Calling Areas # x86/sev: Check for the presence of an SVSM in the SNP secrets page # x86/irqflags: Provide native versions of the local_irq_save()/restore() # < /opt/cross/kisskb/korg/gcc-13.1.0-nolibc/x86_64-linux/bin/x86_64-linux-gcc --version # < /opt/cross/kisskb/korg/gcc-13.1.0-nolibc/x86_64-linux/bin/x86_64-linux-ld --version # < git log --format=%s --max-count=1 408323581b722c9bd504dd296920f392049a7f52 # make -s -j 32 ARCH=x86_64 O=/kisskb/build/linus_allmodconfig_x86_64-gcc13 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-13.1.0-nolibc/x86_64-linux/bin/x86_64-linux- allmodconfig # Added to kconfig CONFIG_BUILD_DOCSRC=n # Added to kconfig CONFIG_MODULE_SIG=n # Added to kconfig CONFIG_SAMPLES=n # Added to kconfig CONFIG_GCC_PLUGINS=n # Added to kconfig # < make -s -j 32 ARCH=x86_64 O=/kisskb/build/linus_allmodconfig_x86_64-gcc13 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-13.1.0-nolibc/x86_64-linux/bin/x86_64-linux- help # make -s -j 32 ARCH=x86_64 O=/kisskb/build/linus_allmodconfig_x86_64-gcc13 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-13.1.0-nolibc/x86_64-linux/bin/x86_64-linux- olddefconfig # make -s -j 32 ARCH=x86_64 O=/kisskb/build/linus_allmodconfig_x86_64-gcc13 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-13.1.0-nolibc/x86_64-linux/bin/x86_64-linux- Completed OK # rm -rf /kisskb/build/linus_allmodconfig_x86_64-gcc13 # Build took: 0:33:29.434733