This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_kernel/gnu-release-aarch64-mainline-defconfig
in repository toolchain/binutils-gdb.
from 99575d4a79 Automatic date update in version.in
adds 232fe1c86e Automatic date update in version.in
No new revisions were added by this update.
Summary of changes:
bfd/version.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository linux.
from 83c4087ce468 Merge branch 'for-4.20' of git://git.kernel.org/pub/scm/li [...]
new 67d49d52ae50 KVM: s390: set host program identifier
new af4bf6c3d9b4 s390/mm: optimize locking without huge pages in gmap_pmd_o [...]
new 9ea597286570 KVM: s390: vsie: simulate VCPU SIE entry/exit
new 3194cdb71190 KVM: s390: introduce and use KVM_REQ_VSIE_RESTART
new e585b24aeb44 KVM: s390: refactor crypto initialization
new 1fde573413b5 s390: vfio-ap: base implementation of VFIO AP device driver
new 65f06713d3fa s390: vfio-ap: register matrix device with VFIO mdev framework
new 96d152bdc987 s390: vfio-ap: sysfs interfaces to configure adapters
new 3211da0c0b54 s390: vfio-ap: sysfs interfaces to configure domains
new 3b1eab7fb9da s390: vfio-ap: sysfs interfaces to configure control domains
new 81b2b4b76a73 s390: vfio-ap: sysfs interface to view matrix mdev matrix
new 42104598ef2e KVM: s390: interface to clear CRYCB masks
new 258287c994de s390: vfio-ap: implement mediated device open callback
new e06670c5fe3b s390: vfio-ap: implement VFIO_DEVICE_GET_INFO ioctl
new 46a7263d4746 s390: vfio-ap: zeroize the AP queues
new cd8a377e3b40 s390: vfio-ap: implement VFIO_DEVICE_RESET ioctl
new 6cc571b1b1e8 KVM: s390: Clear Crypto Control Block when using vSIE
new d6f6959ac587 KVM: s390: vsie: Do the CRYCB validation first
new 3af84def9cbf KVM: s390: vsie: Make use of CRYCB FORMAT2 clear
new 56019f9aca22 KVM: s390: vsie: Allow CRYCB FORMAT-2
new 19fd83a64718 KVM: s390: vsie: allow CRYCB FORMAT-1
new 6ee74098201b KVM: s390: vsie: allow CRYCB FORMAT-0
new c9ba8c2cd210 KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-1
new 6b79de4b056e KVM: s390: vsie: allow guest FORMAT-1 CRYCB on host FORMAT-2
new 9ee71f20cb8d KVM: s390: vsie: allow guest FORMAT-0 CRYCB on host FORMAT-2
new 37940fb0b6a2 KVM: s390: device attrs to enable/disable AP interpretation
new 112c24d4dc48 KVM: s390: CPU model support for AP virtualization
new 492a6be197c0 s390: doc: detailed specifications for AP virtualization
new 55d09dd4c860 Merge branch 'apv11' of git://git.kernel.org/pub/scm/linux [...]
new dd5bd0a65ff6 Merge tag 'kvm-s390-next-4.20-1' of git://git.kernel.org/p [...]
new 1006284c5e41 KVM: PPC: Book3S PR: Exiting split hack mode needs to fixu [...]
new aa2278644ae5 KVM: PPC: Book3S HV: Provide mode where all vCPUs on a cor [...]
new b66081e25e28 Merge branch 'kvm-ppc-fixes' of paulus/powerpc into topic/ppc-kvm
new e199ad2bf5cf KVM: PPC: Validate all tces before updating tables
new f7960e299f13 KVM: PPC: Inform the userspace about TCE update failures
new 42de7b9e2167 KVM: PPC: Validate TCEs against preregistered memory page sizes
new 2691f0ff3d96 KVM: PPC: Propagate errors to the guest when failed instea [...]
new a3ac077b75c5 KVM: PPC: Remove redundand permission bits removal
new e7b17d50471a powerpc: Turn off CPU_FTR_P9_TM_HV_ASSIST in non-hypervisor mode
new d24ea8a7336a KVM: PPC: Book3S: Simplify external interrupt handling
new 966eba9316d4 KVM: PPC: Book3S HV: Remove left-over code in XICS-on-XIVE [...]
new f7035ce9f1df KVM: PPC: Book3S HV: Move interrupt delivery on guest entr [...]
new 41f4e631daf8 KVM: PPC: Book3S HV: Extract PMU save/restore operations a [...]
new df709a296ef7 KVM: PPC: Book3S HV: Simplify real-mode interrupt handling
new 7854f7545bff KVM: PPC: Book3S: Rework TM save/restore code and make it [...]
new 53655ddd7771 KVM: PPC: Book3S HV: Call kvmppc_handle_exit_hv() with vco [...]
new 95a6432ce903 KVM: PPC: Book3S HV: Streamlined guest entry/exit path on [...]
new 32eb150aee8d KVM: PPC: Book3S HV: Handle hypervisor instruction faults better
new 9a94d3ee2d15 KVM: PPC: Book3S HV: Add a debugfs file to dump radix mappings
new fd0944baad80 KVM: PPC: Use ccr field in pt_regs struct embedded in vcpu struct
new 89329c0be8bd KVM: PPC: Book3S HV: Clear partition table entry on vm teardown
new 9811c78e968f KVM: PPC: Book3S HV: Make kvmppc_mmu_radix_xlate process/p [...]
new 04bae9d5b4c0 KVM: PPC: Book3S HV: Refactor radix page fault handler
new f0f825f0e20a KVM: PPC: Book3S HV: Use kvmppc_unmap_pte() in kvm_unmap_radix()
new 8e3f5fc1045d KVM: PPC: Book3S HV: Framework and hcall stubs for nested [...]
new 360cae313702 KVM: PPC: Book3S HV: Nested guest entry via hypercall
new f3c18e9342a4 KVM: PPC: Book3S HV: Use XICS hypercalls when running as a [...]
new 4bad77799fed KVM: PPC: Book3S HV: Handle hypercalls correctly when nested
new fd10be257312 KVM: PPC: Book3S HV: Handle page fault for a nested guest
new 8cf531ed48cf KVM: PPC: Book3S HV: Introduce rmap to track nested guest [...]
new e3b6b4661527 KVM: PPC: Book3S HV: Implement H_TLB_INVALIDATE hcall
new 690ed4cad87a KVM: PPC: Book3S HV: Use hypercalls for TLB invalidation w [...]
new 9d0b048da788 KVM: PPC: Book3S HV: Invalidate TLB when nested vcpu moves [...]
new f3c99f97a3cd KVM: PPC: Book3S HV: Don't access HFSCR, LPIDR or LPCR whe [...]
new 3032341853da KVM: PPC: Book3S HV: Add one-reg interface to virtual PTCR [...]
new 73937deb4b2d KVM: PPC: Book3S HV: Sanitise hv_regs on nested guest entry
new 10b5022db786 KVM: PPC: Book3S HV: Handle differing endianness for H_ENT [...]
new de760db4d9d7 KVM: PPC: Book3S HV: Allow HV module to load without hyper [...]
new 83a055104eaf KVM: PPC: Book3S HV: Add nested shadow page tables to debugfs
new 9d67121a4fce Merge remote-tracking branch 'remotes/powerpc/topic/ppc-kv [...]
new aa069a996951 KVM: PPC: Book3S HV: Add a VM capability to enable nested [...]
new 901f8c3f6feb KVM: PPC: Book3S HV: Add NO_HASH flag to GET_SMMU_INFO ioc [...]
new 7dd2157cb61a Merge tag 'kvm-ppc-next-4.20-1' of git://git.kernel.org/pu [...]
new 8e41bd54317b KVM: s390: fix locking for crypto setting error path
new 0e237e446994 KVM: s390: Tracing APCB changes
new 76c7829f5b8c s390: vfio-ap: setup APCB mask using KVM dedicated function
new 46623ab3194a s390: vfio-ap: make local functions and data static
new ed3054a30258 Merge branch 'apv11' of git://git.kernel.org/pub/scm/linux [...]
new 3d0d0d9b1d80 Merge tag 'kvm-s390-next-4.20-2' of git://git.kernel.org/p [...]
new 3de6347bf96a KVM: vmx: rename KVM_GUEST_CR0_MASK tp KVM_VM_CR0_ALWAYS_OFF
new 1438921c6dc1 KVM: nVMX: Flush TLB entries tagged by dest EPTP on L1<->L [...]
new 3d5bdae8b164 KVM: nVMX: Use correct VPID02 when emulating L1 INVVPID
new 327c072187f7 KVM: nVMX: Flush linear and combined mappings on VPID02 re [...]
new efebf0aaec3d KVM: nVMX: Do not flush TLB on L1<->L2 transitions if L1 u [...]
new 3b8a5df6c4dc KVM: LAPIC: Tune lapic_timer_advance_ns automatically
new 6c930268bcc4 kvm: selftests: vcpu_setup: set cr4.osfxsr
new 14c47b7530e2 kvm: selftests: introduce ucall
new cc68765d4187 kvm: selftests: move arch-specific files to arch-specific [...]
new eea192bfd96d kvm: selftests: add cscope make target
new eabe7881d264 kvm: selftests: tidy up kvm_util
new d5106539cfef kvm: selftests: add vm_phy_pages_alloc
new 7a6629ef746d kvm: selftests: add virt mem support for aarch64
new 0bec140fb6c1 kvm: selftests: add vcpu support for aarch64
new 81d1cca0c062 kvm: selftests: introduce new VM mode for 64K pages
new fff8dcd7b4a2 kvm: selftests: port dirty_log_test to aarch64
new e1b376f140ad kvm: selftests: dirty_log_test: also test 64K pages on aarch64
new e28934e661c1 kvm: selftests: stop lying to aarch64 tests about PA-bits
new 5b8ee8792f6b kvm: selftests: support high GPAs in dirty_log_test
new cfb634fe3052 KVM: nVMX: Clear reserved bits of #DB exit qualification
new bd18bffca353 KVM: nVMX: restore host state in nested_vmx_vmexit for VMFail
new 3ff519f29d98 KVM: x86: adjust kvm_mmu_page member to save 8 bytes
new 55c1dcd80bdf nVMX x86: Make nested_vmx_check_pml_controls() concise
new daefb7949e66 KVM: x86: return 0 in case kvm_mmu_memory_cache has min nu [...]
new aaa45da24e5d KVM/VMX: Remve unused function is_external_interrupt().
new 4fef0f491347 KVM: x86: move definition PT_MAX_HUGEPAGE_LEVEL and KVM_NR [...]
new 0624fca9512d kvm/x86: return meaningful value from KVM_SIGNAL_MSI
new 9170200ec0eb KVM: x86: hyperv: enforce vp_index < KVM_MAX_VCPUS
new a812297c4fd9 KVM: x86: hyperv: optimize 'all cpus' case in kvm_hv_flush_tlb()
new 1779a39f7863 KVM: x86: hyperv: consistently use 'hv_vcpu' for 'struct k [...]
new 87ee613d0763 KVM: x86: hyperv: keep track of mismatched VP indexes
new 0b0a31badb2d KVM: x86: hyperv: valid_bank_mask should be 'u64'
new 2cefc5feb80c KVM: x86: hyperv: optimize kvm_hv_flush_tlb() for vp_index [...]
new 214ff83d4473 KVM: x86: hyperv: implement PV IPI send hypercalls
new 3c6e099fa15f KVM: nVMX: Always reflect #NM VM-exits to L1
new 31fc4f95dddc KVM: leverage change to adjust slots->used_slots in update [...]
new 64a919f7b5d0 KVM: nVMX: move host EFER consistency checks to VMFail path
new 5b8ba41dafd7 KVM: nVMX: move vmcs12 EPTP consistency check to check_vme [...]
new 1abf23fb42f5 KVM: nVMX: use vm_exit_controls_init() to write exit contr [...]
new b7031fd40fcc KVM: nVMX: reset cache/shadows when switching loaded VMCS
new 02343cf20702 KVM: vmx: do not unconditionally clear EFER switching
new 3df5c37e55c8 KVM: nVMX: try to set EFER bits correctly when initializin [...]
new d63907dc7dd1 KVM: nVMX: rename enter_vmx_non_root_mode to nested_vmx_en [...]
new 7671ce21b13b KVM: nVMX: move check_vmentry_postreqs() call to nested_vm [...]
new a633e41e7362 KVM: nVMX: assimilate nested_vmx_entry_failure() into nest [...]
new 39f9c3885c70 KVM: vVMX: rename label for post-enter_guest_mode consiste [...]
new 860ff2aa84d3 KVM: VMX: remove ASSERT() on vmx->pml_pg validity
new 09abe3200266 KVM: nVMX: split pieces of prepare_vmcs02() to prepare_vmc [...]
new 9d6105b2b59f KVM: nVMX: initialize vmcs02 constant exactly once (per VMCS)
new 16fb9a46c54d KVM: nVMX: do early preparation of vmcs02 before check_vme [...]
new cb61de2f4819 KVM: nVMX: do not skip VMEnter instruction that succeeds
new c37a6116d85c KVM: nVMX: do not call nested_vmx_succeed() for consistenc [...]
new 09abb5e3e5e5 KVM: nVMX: call kvm_skip_emulated_instruction in nested_vm [...]
new 5a5e8a15d76e KVM: vmx: write HOST_IA32_EFER in vmx_set_constant_host_state()
new 52017608da33 KVM: nVMX: add option to perform early consistency checks via H/W
new 2768c0cc4ad5 KVM: nVMX: WARN if nested run hits VMFail with early consi [...]
new e6b6c483ebe9 KVM: x86: hyperv: fix 'tlb_lush' typo
new f21dd494506a KVM: x86: hyperv: optimize sparse VP set processing
new 0e0a53c55131 kvm: x86: optimize dr6 restore
new 44dd3ffa7bb3 x86/kvm/mmu: make vcpu->mmu a pointer to the current MMU
new 3dc773e74523 x86/kvm/mmu.c: set get_pdptr hook in kvm_init_shadow_ept_mmu()
new 6a82cd1c7b1e x86/kvm/mmu.c: add kvm_mmu parameter to kvm_mmu_free_roots()
new 14c07ad89f4d x86/kvm/mmu: introduce guest_mmu
new e173299101af x86/kvm/mmu: get rid of redundant kvm_mmu_setup()
new 36d9594dfbf2 x86/kvm/mmu: make space for source data caching in struct kvm_mmu
new a336282d7753 x86/kvm/nVMX: introduce source data cache for kvm_init_sha [...]
new 7dcd57552008 x86/kvm/mmu: check if tdp/shadow MMU reconfiguration is needed
new bf627a928837 x86/kvm/mmu: check if MMU reconfiguration is needed in ini [...]
new 5ebb272b2ea7 KVM/x86: Fix invvpid and invept register operand size in 6 [...]
new 4b1e54786e48 KVM/x86: Use assembly instruction mnemonics instead of .by [...]
new 44c2d667ce3f KVM/x86: Use 32bit xor to clear register
new a5c214dad198 KVM/VMX: Change hv flush logic when ept tables are mismatched.
new 39337ad1a783 kvm/x86 : fix some typo
new 9943450b7b88 kvm/x86 : add document for coalesced mmio
new 0804c849f1df kvm/x86 : add coalesced pio support
new 8daf346226b2 KVM: x86: rename pte_list_remove to __pte_list_remove
new e7912386ede8 KVM: x86: reintroduce pte_list_remove, but including mmu_s [...]
new 970c0d4b94ef KVM: refine the comment of function gfn_to_hva_memslot_prot()
new 72bbf9358c36 KVM: hyperv: define VP assist page helpers
new 5d7a6443368e KVM: VMX: refactor evmcs_sanitize_exec_ctrls()
new 57b119da3594 KVM: nVMX: add KVM_CAP_HYPERV_ENLIGHTENED_VMCS capability
new 945679e301ea KVM: nVMX: add enlightened VMCS state
new b8bbab928fb1 KVM: nVMX: implement enlightened VMPTRLD and VMCLEAR
new c4ebd6295ab7 KVM: nVMX: optimize prepare_vmcs02{,_full} for Enlightened [...]
new 12e0c6186ba4 x86/kvm/hyperv: don't clear VP assist pages on init
new a7c42bb6da6b x86/kvm/lapic: preserve gfn_to_hva_cache len on cache reinit
new a1b0c1c64dfe x86/kvm/nVMX: allow bare VMXON state migration
new 1e7ecd1b3d21 KVM: selftests: state_test: test bare VMXON migration
new 8cab6507f64e x86/kvm/nVMX: nested state migration for Enlightened VMCS
new c939989d74e2 tools/headers: update kvm.h
new 18178ff86217 KVM: selftests: add Enlightened VMCS test
new bba9ce58d9cb KVM: Documentation: Fix omission in struct kvm_vcpu_events
new c851436a34ca kvm: x86: Add has_payload and payload to kvm_queued_exception
new 59073aaf6de0 kvm: x86: Add exception payload fields to kvm_vcpu_events
new 91e86d225ef3 kvm: x86: Add payload operands to kvm_multiple_exception
new da998b46d244 kvm: x86: Defer setting of CR2 until #PF delivery
new f10c729ff965 kvm: vmx: Defer setting of DR6 until #DB delivery
new c4f55198c7c2 kvm: x86: Introduce KVM_CAP_EXCEPTION_PAYLOAD
new 43ce76ce731f KVM/x86: Use 32bit xor to clear registers in svm.c
new 1e58e5e59148 KVM: VMX: enable nested virtualization by default
new d2db7773ba86 kvm: arm/arm64: Fix stage2_flush_memslot for 4 level page table
new 7788a28062ac kvm: arm/arm64: Remove spurious WARN_ON
new 9f98ddd6686c kvm: arm64: Add helper for loading the stage2 setting for a VM
new ce00e3cb4fb4 arm64: Add a helper for PARange to physical shift conversion
new b2df44ffba36 kvm: arm64: Clean up VTCR_EL2 initialisation
new 5b6c6742b535 kvm: arm/arm64: Allow arch specific configurations for VM
new 7665f3a8491b kvm: arm64: Configure VTCR_EL2 per VM
new e55cac5bf2a9 kvm: arm/arm64: Prepare for VM specific stage2 translations
new 865b30cdd9b2 kvm: arm64: Prepare for dynamic stage2 page table layout
new 61fa5a867b65 kvm: arm64: Make stage2 page table layout dynamic
new 595583306434 kvm: arm64: Dynamic configuration of VTTBR mask
new 7e8130456e06 kvm: arm64: Configure VTCR_EL2.SL0 per VM
new 13ac4bbcc457 kvm: arm64: Switch to per VM IPA limit
new 8ad50c8985d8 vgic: Add support for 52bit guest physical address
new bc1d7de8c550 kvm: arm64: Add 52bit support for PAR to HPFAR conversoin
new 0f62f0e95be2 kvm: arm64: Set a limit on the IPA size
new 58b3efc820ac kvm: arm64: Limit the minimum number of page table levels
new 233a7cb23531 kvm: arm64: Allow tuning the physical address size for VM
new bca607ebc76a KVM: arm/arm64: Rename kvm_arm_config_vm to kvm_arm_setup_stage2
new 9d47bb0d9ea8 KVM: arm64: Drop __cpu_init_stage2 on the VHE path
new f0725345e3e1 arm64: KVM: Remove some extra semicolon in kvm_target_cpu
new fd2ef358282c KVM: arm/arm64: Ensure only THP is candidate for adjustment
new da5a3ce66b8b KVM: arm64: Fix caching of host MDCR_EL2 value
new 375bdd3b5d4f arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_e [...]
new 58bf437ff64e arm/arm64: KVM: Enable 32 bits kvm vcpu events support
new e4e11cc0f81e KVM: arm64: Safety check PSTATE when entering guest and handle IL
new e42b4a507efa Merge tag 'kvmarm-for-v4.20' of git://git.kernel.org/pub/s [...]
new f15ac811e80b selftests/kvm: add missing executables to .gitignore
new cbe3f898d159 x86/kvm/nVMX: tweak shadow fields
new 8d9fcacff9dc KVM: PPC: Book3S HV: Don't use streamlined entry path on e [...]
new 6e301a8e56e4 KVM: PPC: Optimize clearing TCEs for sparse tables
new 574c0cfbc715 Merge tag 'kvm-ppc-next-4.20-2' of git://git.kernel.org/pu [...]
new f9dcf08e2017 Revert "kvm: x86: optimize dr6 restore"
new 22a7cdcae6a4 KVM/nVMX: Do not validate that posted_intr_desc_addr is pa [...]
new 0d1e8b8d2bcd Merge tag 'kvm-4.20-1' of git://git.kernel.org/pub/scm/vir [...]
new 1760debb51f7 RISC-V: Don't set cacheinfo.{physical_line_partition,attributes}
new 86e581e31078 RISC-V: Mask out the F extension on systems without D
new b8c8a9590e4f RISC-V: Add FP register ptrace support for gdb.
new b90edb33010b RISC-V: Add futex support.
new f31b8de98853 RISC-V: remove the unused return_to_handler export
new ee5928843a93 riscv: move GCC version check for ARCH_SUPPORTS_INT128 to Kconfig
new aef53f97b505 RISC-V: Cosmetic menuconfig changes
new e68ad867f77e Extract FPU context operations from entry.S
new 007f5c358957 Refactor FPU code in signal setup/return procedures
new e8be53023302 Cleanup ISA string setting
new 9671f7061433 Allow to disable FPU support
new 9411ec60c23d Auto-detect whether a FPU exists
new 4e4101cfefd3 riscv: Add support to no-FPU systems
new 7f47c73b355f RISC-V: Build tishift only on 64-bit
new 51858aaf9bea RISC-V: Use swiotlb on RV64 only
new 6315730e9eab lib: Add umoddi3 and udivmoddi4 of GCC library routines
new 757331db9214 RISC-V: Select GENERIC_LIB_UMODDI3 on RV32
new 827a438156e4 RISC-V: Avoid corrupting the upper 32-bit of phys_addr_t i [...]
new a6de21baf637 RISC-V: Fix some RV32 bugs and build failures
new 1ed4237ab616 RISC-V: No need to pass scause as arg to do_IRQ()
new 566d6c428ead RISC-V: Don't set cacheinfo.{physical_line_partition,attributes}
new 19ccf29bb18f RISC-V: Filter ISA and MMU values in cpuinfo
new b18d6f05252d RISC-V: Comment on the TLB flush in smp_callin()
new 6db170ff4c08 RISC-V: Disable preemption before enabling interrupts
new 9639a44394b9 RISC-V: Provide a cleaner raw_smp_processor_id()
new b2f8cfa7ac34 RISC-V: Rename riscv_of_processor_hart to riscv_of_process [...]
new 177fae451588 RISC-V: Rename im_okay_therefore_i_am to found_boot_cpu
new 46373cb442c5 RISC-V: Use mmgrab()
new a37d56fc4011 RISC-V: Use WRITE_ONCE instead of direct access
new 6825c7a80f18 RISC-V: Add logical CPU indexing for RISC-V
new f99fb607fb2b RISC-V: Use Linux logical CPU number instead of hartid
new 4b26d22fdff1 RISC-V: Show CPU ID and Hart ID separately in /proc/cpuinfo
new 8b20d2db0a6d RISC-V: Show IPI stats
new d26c4bbf9924 RISC-V: SMP cleanup and new features
new c300af28572d Merge tag 'riscv-for-linus-4.20-mw0' of git://git.kernel.o [...]
new caf539cd1087 sparc: Fix VDSO build with older binutils.
new e5f6d9afa341 Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc
The 251 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
Documentation/s390/vfio-ap.txt | 837 +++++++
Documentation/virtual/kvm/api.txt | 135 +-
MAINTAINERS | 12 +
arch/arm/include/asm/kvm_arm.h | 3 +-
arch/arm/include/asm/kvm_host.h | 13 +-
arch/arm/include/asm/kvm_mmu.h | 15 +-
arch/arm/include/asm/stage2_pgtable.h | 54 +-
arch/arm64/include/asm/cpufeature.h | 21 +
arch/arm64/include/asm/kvm_arm.h | 155 +-
arch/arm64/include/asm/kvm_asm.h | 3 +-
arch/arm64/include/asm/kvm_host.h | 18 +-
arch/arm64/include/asm/kvm_hyp.h | 10 +
arch/arm64/include/asm/kvm_mmu.h | 42 +-
arch/arm64/include/asm/ptrace.h | 3 +
arch/arm64/include/asm/stage2_pgtable-nopmd.h | 42 -
arch/arm64/include/asm/stage2_pgtable-nopud.h | 39 -
arch/arm64/include/asm/stage2_pgtable.h | 236 +-
arch/arm64/kvm/guest.c | 6 +-
arch/arm64/kvm/handle_exit.c | 7 +
arch/arm64/kvm/hyp/Makefile | 1 -
arch/arm64/kvm/hyp/hyp-entry.S | 16 +-
arch/arm64/kvm/hyp/s2-setup.c | 90 -
arch/arm64/kvm/hyp/switch.c | 4 +-
arch/arm64/kvm/hyp/sysreg-sr.c | 19 +-
arch/arm64/kvm/hyp/tlb.c | 4 +-
arch/arm64/kvm/reset.c | 108 +-
arch/powerpc/include/asm/asm-prototypes.h | 21 +
arch/powerpc/include/asm/book3s/64/mmu-hash.h | 12 +
.../powerpc/include/asm/book3s/64/tlbflush-radix.h | 1 +
arch/powerpc/include/asm/hvcall.h | 41 +
arch/powerpc/include/asm/iommu.h | 2 +-
arch/powerpc/include/asm/kvm_asm.h | 4 +-
arch/powerpc/include/asm/kvm_book3s.h | 45 +-
arch/powerpc/include/asm/kvm_book3s_64.h | 118 +-
arch/powerpc/include/asm/kvm_book3s_asm.h | 3 +
arch/powerpc/include/asm/kvm_booke.h | 4 +-
arch/powerpc/include/asm/kvm_host.h | 16 +-
arch/powerpc/include/asm/kvm_ppc.h | 8 +-
arch/powerpc/include/asm/ppc-opcode.h | 1 +
arch/powerpc/include/asm/reg.h | 2 +
arch/powerpc/include/uapi/asm/kvm.h | 1 +
arch/powerpc/kernel/asm-offsets.c | 5 +-
arch/powerpc/kernel/cpu_setup_power.S | 4 +-
arch/powerpc/kvm/Makefile | 3 +-
arch/powerpc/kvm/book3s.c | 46 +-
arch/powerpc/kvm/book3s_64_mmu_hv.c | 7 +-
arch/powerpc/kvm/book3s_64_mmu_radix.c | 718 ++++--
arch/powerpc/kvm/book3s_64_vio.c | 94 +-
arch/powerpc/kvm/book3s_64_vio_hv.c | 87 +-
arch/powerpc/kvm/book3s_emulate.c | 13 +-
arch/powerpc/kvm/book3s_hv.c | 873 +++++++-
arch/powerpc/kvm/book3s_hv_builtin.c | 92 +-
arch/powerpc/kvm/book3s_hv_interrupts.S | 95 +-
arch/powerpc/kvm/book3s_hv_nested.c | 1291 +++++++++++
arch/powerpc/kvm/book3s_hv_ras.c | 10 +
arch/powerpc/kvm/book3s_hv_rm_xics.c | 13 +-
arch/powerpc/kvm/book3s_hv_rmhandlers.S | 823 ++++---
arch/powerpc/kvm/book3s_hv_tm.c | 6 +-
arch/powerpc/kvm/book3s_hv_tm_builtin.c | 5 +-
arch/powerpc/kvm/book3s_pr.c | 5 +-
arch/powerpc/kvm/book3s_xics.c | 14 +-
arch/powerpc/kvm/book3s_xive.c | 63 +
arch/powerpc/kvm/book3s_xive_template.c | 8 -
arch/powerpc/kvm/bookehv_interrupts.S | 8 +-
arch/powerpc/kvm/emulate_loadstore.c | 1 -
arch/powerpc/kvm/powerpc.c | 15 +-
arch/powerpc/kvm/tm.S | 250 ++-
arch/powerpc/kvm/trace_book3s.h | 1 -
arch/powerpc/mm/tlb-radix.c | 9 +
arch/riscv/Kconfig | 52 +-
arch/riscv/Kconfig.debug | 35 -
arch/riscv/Makefile | 21 +-
arch/riscv/include/asm/Kbuild | 1 -
arch/riscv/include/asm/futex.h | 128 ++
arch/riscv/include/asm/processor.h | 2 +-
arch/riscv/include/asm/smp.h | 47 +-
arch/riscv/include/asm/switch_to.h | 12 +-
arch/riscv/include/asm/tlbflush.h | 16 +-
arch/riscv/include/uapi/asm/elf.h | 3 +
arch/riscv/kernel/Makefile | 1 +
arch/riscv/kernel/cacheinfo.c | 7 -
arch/riscv/kernel/cpu.c | 87 +-
arch/riscv/kernel/cpufeature.c | 15 +
arch/riscv/kernel/entry.S | 88 -
arch/riscv/kernel/fpu.S | 106 +
arch/riscv/kernel/head.S | 4 +-
arch/riscv/kernel/irq.c | 12 +-
arch/riscv/kernel/mcount.S | 1 -
arch/riscv/kernel/process.c | 6 +-
arch/riscv/kernel/ptrace.c | 52 +
arch/riscv/kernel/setup.c | 13 +
arch/riscv/kernel/signal.c | 75 +-
arch/riscv/kernel/smp.c | 82 +-
arch/riscv/kernel/smpboot.c | 46 +-
arch/riscv/lib/Makefile | 3 +-
arch/riscv/mm/ioremap.c | 2 +-
arch/s390/Kconfig | 11 +
arch/s390/include/asm/kvm_host.h | 15 +-
arch/s390/include/uapi/asm/kvm.h | 2 +
arch/s390/kvm/kvm-s390.c | 184 +-
arch/s390/kvm/kvm-s390.h | 1 +
arch/s390/kvm/vsie.c | 210 +-
arch/s390/mm/gmap.c | 10 +-
arch/s390/tools/gen_facilities.c | 2 +
arch/sparc/include/asm/vdso.h | 2 -
arch/sparc/vdso/vclock_gettime.c | 149 +-
arch/sparc/vdso/vdso-layout.lds.S | 3 -
arch/sparc/vdso/vdso.lds.S | 2 +
arch/sparc/vdso/vdso2c.h | 17 +-
arch/sparc/vdso/vdso32/vdso32.lds.S | 2 +
arch/sparc/vdso/vma.c | 222 +-
arch/x86/include/asm/kvm_host.h | 70 +-
arch/x86/include/asm/virtext.h | 2 +-
arch/x86/include/asm/vmx.h | 13 -
arch/x86/include/uapi/asm/kvm.h | 8 +-
arch/x86/kvm/hyperv.c | 280 ++-
arch/x86/kvm/hyperv.h | 4 +
arch/x86/kvm/lapic.c | 45 +-
arch/x86/kvm/lapic.h | 2 +-
arch/x86/kvm/mmu.c | 393 ++--
arch/x86/kvm/mmu.h | 13 +-
arch/x86/kvm/mmu_audit.c | 12 +-
arch/x86/kvm/paging_tmpl.h | 15 +-
arch/x86/kvm/svm.c | 64 +-
arch/x86/kvm/trace.h | 42 +
arch/x86/kvm/vmx.c | 2363 +++++++++++++-------
arch/x86/kvm/vmx_shadow_fields.h | 5 +-
arch/x86/kvm/x86.c | 244 +-
arch/x86/kvm/x86.h | 2 +
drivers/clocksource/riscv_timer.c | 12 +-
drivers/iommu/Kconfig | 8 +
drivers/irqchip/irq-sifive-plic.c | 10 +-
drivers/s390/crypto/Makefile | 4 +
drivers/s390/crypto/vfio_ap_drv.c | 157 ++
drivers/s390/crypto/vfio_ap_ops.c | 939 ++++++++
drivers/s390/crypto/vfio_ap_private.h | 88 +
drivers/vfio/vfio_iommu_spapr_tce.c | 23 +-
include/linux/irqchip/arm-gic-v3.h | 5 +
include/uapi/linux/kvm.h | 26 +-
include/uapi/linux/vfio.h | 2 +
lib/Kconfig | 3 +
lib/Makefile | 1 +
lib/udivmoddi4.c | 310 +++
lib/umoddi3.c | 32 +
tools/arch/x86/include/uapi/asm/kvm.h | 10 +-
tools/include/uapi/linux/kvm.h | 5 +
tools/perf/arch/powerpc/util/book3s_hv_exits.h | 1 -
tools/testing/selftests/kvm/.gitignore | 14 +-
tools/testing/selftests/kvm/Makefile | 39 +-
tools/testing/selftests/kvm/dirty_log_test.c | 374 +++-
.../selftests/kvm/include/aarch64/processor.h | 55 +
tools/testing/selftests/kvm/include/evmcs.h | 1098 +++++++++
tools/testing/selftests/kvm/include/kvm_util.h | 169 +-
tools/testing/selftests/kvm/include/sparsebit.h | 6 +-
tools/testing/selftests/kvm/include/test_util.h | 6 +-
.../kvm/include/{x86.h => x86_64/processor.h} | 28 +-
.../selftests/kvm/include/{ => x86_64}/vmx.h | 35 +-
.../testing/selftests/kvm/lib/aarch64/processor.c | 311 +++
tools/testing/selftests/kvm/lib/assert.c | 2 +-
tools/testing/selftests/kvm/lib/kvm_util.c | 564 ++---
.../testing/selftests/kvm/lib/kvm_util_internal.h | 33 +-
tools/testing/selftests/kvm/lib/ucall.c | 144 ++
.../kvm/lib/{x86.c => x86_64/processor.c} | 263 ++-
tools/testing/selftests/kvm/lib/{ => x86_64}/vmx.c | 55 +-
.../kvm/{ => x86_64}/cr4_cpuid_sync_test.c | 14 +-
tools/testing/selftests/kvm/x86_64/evmcs_test.c | 160 ++
.../kvm/{ => x86_64}/platform_info_test.c | 14 +-
.../selftests/kvm/{ => x86_64}/set_sregs_test.c | 2 +-
.../selftests/kvm/{ => x86_64}/state_test.c | 47 +-
.../selftests/kvm/{ => x86_64}/sync_regs_test.c | 2 +-
.../kvm/{ => x86_64}/vmx_tsc_adjust_test.c | 24 +-
virt/kvm/arm/arm.c | 26 +-
virt/kvm/arm/mmu.c | 128 +-
virt/kvm/arm/vgic/vgic-its.c | 36 +-
virt/kvm/arm/vgic/vgic-kvm-device.c | 2 +-
virt/kvm/arm/vgic/vgic-mmio-v3.c | 2 -
virt/kvm/coalesced_mmio.c | 12 +-
virt/kvm/kvm_main.c | 39 +-
178 files changed, 13830 insertions(+), 3567 deletions(-)
create mode 100644 Documentation/s390/vfio-ap.txt
delete mode 100644 arch/arm64/include/asm/stage2_pgtable-nopmd.h
delete mode 100644 arch/arm64/include/asm/stage2_pgtable-nopud.h
delete mode 100644 arch/arm64/kvm/hyp/s2-setup.c
create mode 100644 arch/powerpc/kvm/book3s_hv_nested.c
create mode 100644 arch/riscv/include/asm/futex.h
create mode 100644 arch/riscv/kernel/fpu.S
create mode 100644 drivers/s390/crypto/vfio_ap_drv.c
create mode 100644 drivers/s390/crypto/vfio_ap_ops.c
create mode 100644 drivers/s390/crypto/vfio_ap_private.h
create mode 100644 lib/udivmoddi4.c
create mode 100644 lib/umoddi3.c
create mode 100644 tools/testing/selftests/kvm/include/aarch64/processor.h
create mode 100644 tools/testing/selftests/kvm/include/evmcs.h
rename tools/testing/selftests/kvm/include/{x86.h => x86_64/processor.h} (97%)
rename tools/testing/selftests/kvm/include/{ => x86_64}/vmx.h (96%)
create mode 100644 tools/testing/selftests/kvm/lib/aarch64/processor.c
create mode 100644 tools/testing/selftests/kvm/lib/ucall.c
rename tools/testing/selftests/kvm/lib/{x86.c => x86_64/processor.c} (80%)
rename tools/testing/selftests/kvm/lib/{ => x86_64}/vmx.c (88%)
rename tools/testing/selftests/kvm/{ => x86_64}/cr4_cpuid_sync_test.c (91%)
create mode 100644 tools/testing/selftests/kvm/x86_64/evmcs_test.c
rename tools/testing/selftests/kvm/{ => x86_64}/platform_info_test.c (90%)
rename tools/testing/selftests/kvm/{ => x86_64}/set_sregs_test.c (98%)
rename tools/testing/selftests/kvm/{ => x86_64}/state_test.c (89%)
rename tools/testing/selftests/kvm/{ => x86_64}/sync_regs_test.c (99%)
rename tools/testing/selftests/kvm/{ => x86_64}/vmx_tsc_adjust_test.c (91%)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository llvm.
from 23962bb2765 [SystemZ] Implement SystemZOperand::print()
new 8b17cc87ef7 Teach the DominatorTree fallback to recalculation when appl [...]
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
include/llvm/Support/GenericDomTreeConstruction.h | 14 ++++++++++++++
1 file changed, 14 insertions(+)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository clang.
from f852c383f1 [AArch64] Implement FP16FML intrinsics
new b6bd5e33fa [AArch64] Support Windows stack probe command-line arguments.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
lib/CodeGen/TargetInfo.cpp | 11 +++++++++++
test/CodeGen/stack-arg-probe.c | 9 ++++++++-
2 files changed, 19 insertions(+), 1 deletion(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_kernel/gnu-release-arm-mainline-allyesconfig
in repository toolchain/binutils-gdb.
from 99575d4a79 Automatic date update in version.in
adds 232fe1c86e Automatic date update in version.in
No new revisions were added by this update.
Summary of changes:
bfd/version.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository libcxx.
from b3ae0c890 fix incorrect placement of _LIBCPP_ALWAYS_INLINE in valarray
new 5be216356 Run the min/max tests agaist the header <charconv>. Fix that [...]
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
include/charconv | 5 +++++
test/libcxx/min_max_macros.sh.cpp | 2 ++
2 files changed, 7 insertions(+)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.