This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_kernel/gnu-release-arm-lts-allyesconfig
in repository toolchain/ci/base-artifacts.
discards 1111b306 0: update: binutils-gcc-linux: all
new 12136299 0: update: binutils-gcc-linux: all
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (1111b306)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_kernel/gnu-release-arm-l [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log | 68 +-
02-prepare_abe/console.log | 166 +-
03-build_abe-binutils/console.log | 11092 +++++------
04-build_abe-stage1/console.log | 18077 +++++++++---------
05-build_linux/console.log | 770 +-
06-boot_linux/console.log | 2 +-
07-check_regression/console.log | 12 +-
07-check_regression/results.regressions | 2 +-
08-update_baseline/console.log | 12 +-
08-update_baseline/results.regressions | 2 +-
console.log | 30429 +++++++++++++++---------------
jenkins/manifest.sh | 10 +-
12 files changed, 30308 insertions(+), 30334 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository linux.
from f9893351acae Merge tag 'kconfig-v5.10' of git://git.kernel.org/pub/scm/ [...]
new 4b7a6ce71e03 arm64: reject prctl(PR_PAC_RESET_KEYS) on compat tasks
new 7bc1a0f9e176 arm64: mm: use single quantity to represent the PA to VA t [...]
new 45544eee9606 arm64: mremap speedup - Enable HAVE_MOVE_PMD
new 7bdf468a5b40 arm64: Fix a broken copyright header in gen_vdso_offsets.sh
new 3b92fa7485eb arm64: link with -z norelro regardless of CONFIG_RELOCATABLE
new ea8f8c99a281 arm64: spectre-v2: Favour CPU-specific mitigation at EL2
new 66dd3474702a arm64: proton-pack: Update comment to reflect new function name
new 032c7ed95817 Merge tag 'arm64-upstream' of git://git.kernel.org/pub/scm [...]
new 8c42a5c02bec ARC: perf: redo the pct irq missing in device-tree handling
new 0a14d7649872 Merge tag 'arc-5.10-rc1-fixes' of git://git.kernel.org/pub [...]
new 3c532798ec96 tracehook: clear TIF_NOTIFY_RESUME in tracehook_notify_resume()
new 91989c707884 task_work: cleanup notification modes
new 4a22709e21c2 Merge tag 'arch-cleanup-2020-10-22' of git://git.kernel.dk [...]
new 1716420e8de2 iio: cros_ec: Accept -EOPNOTSUPP as 'not supported' error code
new 064df8851f4a cros_ec_lightbar: Accept more error codes from cros_ec_cmd [...]
new b646e7db1ce8 platform/chrome: cros_ec_sysfs: Report range of error code [...]
new d509f8a71aa0 pwm: cros-ec: Accept more error codes from cros_ec_cmd_xfe [...]
new b4e452b5e97d platform/input: cros_ec: Replace -ENOTSUPP with -ENOPROTOOPT
new 0d080459e813 platform/chrome: cros_ec_proto: Convert EC error codes to [...]
new be020f0df5a9 pwm: cros-ec: Simplify EC error handling
new 46c5bbd2df4a platform/chrome: cros_ec_typec: USB4 support
new 5381b0ed54b6 platform/chrome: cros_ec_typec: Send enum values to usb_ro [...]
new b12e4fd5f3e4 platform/chrome: cros_ec_typec: Avoid setting usb role twi [...]
new a772336596df platform/chrome: cros_ec_typec: Re-order connector configu [...]
new 814318242687 platform/chrome: cros_ec_trace: Add fields to command traces
new 1e7913ff5f9f platform/chrome: cros_ec_lightbar: Reduce ligthbar get ver [...]
new dd92f7dfe1ba platform/chrome: Kconfig: Remove the transitional MFD_CROS [...]
new 64b02e54e50f platform/chrome: cros_ec_proto: Update cros_ec_cmd_xfer() [...]
new 6b194ee98646 platform/chrome: cros_ec_proto: Drop cros_ec_cmd_xfer()
new 9aa7bd452af1 platform/chrome: Use kobj_to_dev() instead of container_of()
new 3e98fd6d816c ARM: dts: cros-ec-keyboard: Add alternate keymap for KEY_LEFTMETA
new 090a7d046fed Merge tag 'tag-chrome-platform-for-v5.10' of git://git.ker [...]
new 36bdcf318bc2 vdpa/mlx5: Make use of a specific 16 bit endianness API
new 36b02df2d204 vdpa/mlx5: Fix failure to bring link up
new bfec6c83077c virtio-balloon: Constify id_table
new 7f90611693f0 virtio_input: Constify id_table
new 7ab4de60028e virtio-mem: Constify mem_id_table
new 5e5e8736ad2e vhost: reduce stack usage in log_used
new b9747fdf0c1d vhost_vdpa: Fix duplicate included kernel.h
new 0afa15e1a529 virtio: let arch advertise guest's memory access restrictions
new 4ce1cf7b02ed s390: virtio: PV needs VIRTIO I/O device protection
new 1897f0b618b0 vdpa/mlx5: Setup driver only if VIRTIO_CONFIG_S_DRIVER_OK
new 5745bcfbbf89 vringh: fix __vringh_iov() when riov and wiov are different
new 86e182fe12ee vhost_vdpa: remove unnecessary spin_lock in vhost_vring_call
new 88a0d60c6445 MAINTAINERS: add URL for virtio-mem
new 9313f8026328 Merge tag 'for_linus' of git://git.kernel.org/pub/scm/linu [...]
new bf3c0e5e7102 Merge branch 'x86-seves-for-paolo' of https://git.kernel.o [...]
new 5706d14d2a94 KVM: PPC: Book3S HV: XICS: Replace the 'destroy' method by [...]
new 4e1b2ab7e629 KVM: PPC: Don't return -ENOTSUPP to userspace in ioctls
new 05e6295dc7de KVM: PPC: Book3S HV: Do not allocate HPT for a nested guest
new 35dfb43c243b KVM: PPC: Book3S HV: Set LPCR[HDICE] before writing HDEC
new 4517076608c5 KVM: PPC: Book3S HV: XIVE: Convert to DEFINE_SHOW_ATTRIBUTE
new eb173559c97c KVM: PPC: Book3S: Remove redundant initialization of variable ret
new cf59eb13e151 KVM: PPC: Book3S: Fix symbol undeclared warnings
new 2e3df760cd7c Merge tag 'kvm-ppc-next-5.10-1' of git://git.kernel.org/pu [...]
new d5cd6f340145 KVM: nSVM: Avoid freeing uninitialized pointers in svm_set [...]
new efc831338bfd KVM: nVMX: Fix VMX controls MSRs setup when nested VMX enabled
new b9757a4b6f46 KVM: nVMX: Simplify the initialization of nested_vmx_msrs
new 2fc4f15dac95 kvm/eventfd: move wildcard calculation outside loop
new ae6f24968608 KVM: LAPIC: Fix updating DFR missing apic map recalculation
new a970e9b216a2 KVM: LAPIC: Return 0 when getting the tscdeadline timer if [...]
new 275038332f22 KVM: LAPIC: Guarantee the timer is in tsc-deadline mode wh [...]
new 68ca7663c75b KVM: LAPIC: Narrow down the kick target vCPU
new 010fd37fddf6 KVM: LAPIC: Reduce world switch latency caused by timer_ad [...]
new 1feaba144cd3 KVM: SVM: rename a variable in the svm_create_vcpu
new 0dd16b5b0c9b KVM: nSVM: rename nested vmcb to vmcb12
new f4c847a95654 KVM: SVM: refactor msr permission bitmap allocation
new 0681de1b8369 KVM: SVM: use __GFP_ZERO instead of clear_page
new 8d22b90e942c KVM: SVM: refactor exit labels in svm_create_vcpu
new a90c1ed9f11d KVM: nSVM: Remove unused field
new c45ad7229d13 KVM: SVM: Introduce vmcb_(set_intercept/clr_intercept/_is_ [...]
new 03bfeeb988a9 KVM: SVM: Change intercept_cr to generic intercepts
new 30abaa88382c KVM: SVM: Change intercept_dr to generic intercepts
new 9780d51dc2af KVM: SVM: Modify intercept_exceptions to generic intercepts
new c62e2e94b9d4 KVM: SVM: Modify 64 bit intercept field to two 32 bit vectors
new 4c44e8d6c193 KVM: SVM: Add new intercept word in vmcb_control_area
new 830bd71f2c06 KVM: SVM: Remove set_cr_intercept, clr_cr_intercept and is [...]
new 3f3393b3ce38 KVM: X86: Rename and move the function vmx_handle_memory_f [...]
new 9715092f8d7e KVM: X86: Move handling of INVPCID types to x86
new 4407a797e941 KVM: SVM: Enable INVPCID feature on AMD
new 871c433bae56 KVM: use struct_size() and flex_array_size() helpers in kv [...]
new cc5b54dd58d0 KVM: x86: fix MSR_IA32_TSC read for nested migration
new bddd82d19e2e KVM: nVMX: KVM needs to unset "unrestricted guest" VM-exec [...]
new ae5a2a39e46c KVM: SVM: use __GFP_ZERO instead of clear_page()
new 09e3e2a1cc8d KVM: x86: Add kvm_x86_ops hook to short circuit emulation
new 535f7ef2ab7d KVM: VMX: Move IRQ invocation to assembly subroutine
new 1a5488ef0dcf KVM: VMX: Invoke NMI handler via indirect call instead of INTn
new 4e810adb5362 KVM: SVM: Analyze is_guest_mode() in svm_vcpu_run()
new 95b28ac9db2a KVM: SVM: Add tracepoint for cr_interception
new 0b7aa5835691 KVM: MIPS: clean up redundant kvm_run parameters in assembly
new 25bb2cf97139 KVM: nVMX: Morph notification vector IRQ on nested VM-Ente [...]
new a9e2e0ae6860 KVM: x86: emulating RDPID failure shall return #UD rather [...]
new fb0f33fdefe9 KVM: nSVM: CR3 MBZ bits are only 63:52
new fc595f359942 KVM: nVMX: Add VM-Enter failed tracepoints for super early checks
new 50085beee878 KVM: SVM: Mark SEV launch secret pages as dirty.
new 14e3dd8d256b KVM: SEV: shorten comments around sev_clflush_pages
new 28e2b2f1a40d KVM: VMX: Do not perform emulation for INVD intercept
new 8d921acf98ec KVM: VMX: Use precomputed MAXPHYADDR for RTIT base MSR check
new 526ad23bc564 KVM: x86: Unexport cpuid_query_maxphyaddr()
new 1cc6cbc3e405 KVM: VMX: Replace MSR_IA32_RTIT_OUTPUT_BASE_MASK with help [...]
new dc46515cf838 KVM: x86: Move illegal GPA helper out of the MMU code
new 7096cbfb6cb6 KVM: VMX: Use "illegal GPA" helper for PT/RTIT output base check
new b785a442aa21 cpuidle-haltpoll: fix error comments in arch_haltpoll_disable
new becdad859225 KVM: VMX: Rename vmx_*_supported() helpers to cpu_has_vmx_*()
new b936d3eb92b7 KVM: VMX: Unconditionally clear CPUID.INVPCID if !CPUID.PCID
new 7f3603b63136 KVM: VMX: Rename RDTSCP secondary exec control name to ins [...]
new 8b50b92f9f1a KVM: VMX: Add a helper and macros to reduce boilerplate fo [...]
new 4d710de9646a KVM: x86/mmu: Stash 'kvm' in a local variable in kvm_mmu_f [...]
new b44f50d87ce2 KVM: x86: hyper-v: Mention SynDBG CPUID leaves in api.rst
new dbcf3f96fa66 KVM: x86: hyper-v: disallow configuring SynIC timers with [...]
new ace569e0154a KVM: x86/mmu: Move flush logic from mmu_page_zap_pte() to [...]
new 2de4085cccea KVM: x86/MMU: Recursively zap nested TDP SPs when zapping [...]
new 7b367bc9a641 KVM: x86/mmu: Return -EIO if page fault returns RET_PF_INVALID
new 83a2ba4cb2b5 KVM: x86/mmu: Invert RET_PF_* check when falling through t [...]
new c4371c2a682e KVM: x86/mmu: Return unique RET_PF_* values if the fault w [...]
new 127037591c84 KVM: x86/mmu: Bail early from final #PF handling on spurio [...]
new 8888cdd0996c KVM: VMX: Extract posted interrupt support to separate files
new 5a085326d51d KVM: VMX: Rename ops.h to vmx_ops.h
new e89505698c9f KVM: x86/mmu: Commit zap of remaining invalid pages when r [...]
new 7d919c7a38fb KVM: x86/mmu: Refactor the zap loop for recovering NX lpages
new 6c2fd34f5c79 KVM: x86/mmu: Move "huge page disallowed" calculation into [...]
new 3cf066127e87 KVM: x86/mmu: Capture requested page level before NX huge [...]
new 5bcaf3e1715f KVM: x86/mmu: Account NX huge page disallowed iff huge pag [...]
new 1d4a7372e149 KVM: x86/mmu: Rename 'hlevel' to 'level' in FNAME(fetch)
new dcc7065170d7 KVM: x86/mmu: Hoist ITLB multi-hit workaround check up a level
new e88b8093698f KVM: x86/mmu: Track write/user faults using bools
new fc387d8daf39 KVM: nVMX: Reset the segment cache when stuffing guest segs
new b89d5ad00e78 KVM: nVMX: Reload vmcs01 if getting vmcs12's pages fails
new 2ba4493a8b19 KVM: nVMX: Explicitly check for valid guest state for !unr [...]
new c61ca2fcbcea KVM: nVMX: Move free_nested() below vmx_switch_vmcs()
new df82a24b29d1 KVM: nVMX: Ensure vmcs01 is the loaded VMCS when freeing n [...]
new ebec153a0561 KVM: nVMX: Drop redundant VMCS switch and free_nested() call
new 138534a810aa KVM: nVMX: WARN on attempt to switch the currently loaded VMCS
new b2d522552ca0 KVM: x86: Add RIP to the kvm_entry, i.e. VM-Enter, tracepoint
new a9d7d76c66ed KVM: x86: Read guest RIP from within the kvm_nested_vmexit [...]
new f315f2b14015 KVM: VMX: Add a helper to test for a valid error code give [...]
new 235ba74f008d KVM: x86: Add intr/vectoring info and error code to kvm_ex [...]
new 029e8c8ad655 KVM: x86: Add macro wrapper for defining kvm_exit tracepoint
new cc167bd7ee99 KVM: x86: Use common definition for kvm_nested_vmexit tracepoint
new 02f1965ff83b KVM: nVMX: Read EXIT_QUAL and INTR_INFO only when needed f [...]
new 04d28e375271 KVM: x86/mmu: Move individual kvm_mmu initialization into [...]
new 7e34fbd05c63 KVM: x86: Rename "shared_msrs" to "user_return_msrs"
new ce833b2324ba KVM: VMX: Prepend "MAX_" to MSR array size defines
new a128a934f202 KVM: VMX: Rename "vmx_find_msr_index" to "vmx_find_loadsto [...]
new eb3db1b13788 KVM: VMX: Rename the "shared_msr_entry" struct to "vmx_uret_msr"
new fbc18007382c KVM: VMX: Rename vcpu_vmx's "nmsrs" to "nr_uret_msrs"
new e9bb1ae92d62 KVM: VMX: Rename vcpu_vmx's "save_nmsrs" to "nr_active_uret_msrs"
new 658ece84f5da KVM: VMX: Rename vcpu_vmx's "guest_msrs_ready" to "guest_u [...]
new 1e7a483037e8 KVM: VMX: Rename "__find_msr_index" to "__vmx_find_uret_msr"
new ef1d2ee12e6c KVM: VMX: Check guest support for RDTSCP before processing [...]
new 86e3e494fe32 KVM: VMX: Move uret MSR lookup into update_transition_efer()
new bd65ba82b324 KVM: VMX: Add vmx_setup_uret_msr() to handle lookup and swap
new d85a8034c016 KVM: VMX: Rename "find_msr_entry" to "vmx_find_uret_msr"
new 7bf662bb5ea8 KVM: VMX: Rename "vmx_set_guest_msr" to "vmx_set_guest_uret_msr"
new 14a61b642de9 KVM: VMX: Rename "vmx_msr_index" to "vmx_uret_msrs_list"
new 802145c56a04 KVM: VMX: Rename vmx_uret_msr's "index" to "slot"
new 90218e434c41 KVM: x86: Return -ENOENT on unimplemented MSRs
new 1ae099540e8c KVM: x86: Allow deflecting unknown MSR accesses to user space
new 51de8151bd21 KVM: x86: Add infrastructure for MSR filtering
new 476c9bd8e997 KVM: x86: Prepare MSR bitmaps for userspace tracked MSRs
new fd6fa73d1337 KVM: x86: SVM: Prevent MSR passthrough when MSR access is denied
new 3eb900173c71 KVM: x86: VMX: Prevent MSR passthrough when MSR access is denied
new 1a155254ff93 KVM: x86: Introduce MSR filtering
new d468706e313c KVM: selftests: Add test for user space MSR handling
new 729c15c20f1a KVM: x86: rename KVM_REQ_GET_VMCS12_PAGES
new a7d5c7ce41ac KVM: nSVM: delay MSR permission processing to first nested VM run
new 0c899c25d754 KVM: x86: do not attempt TSC synchronization on guest writes
new 6a2e0923b2df KVM: VMX: vmx_uret_msrs_list[] can be static
new 628ade2d0816 KVM: VMX: Fix x2APIC MSR intercept handling on !APICV platforms
new 9af3e08baa7c KVM: arm64: Remove kvm_mmu_free_memory_caches()
new b1e57de62cfb KVM: arm64: Add stand-alone page-table walker infrastructure
new bb0e92cbbcd1 KVM: arm64: Add support for creating kernel-agnostic stage [...]
new 0f9d09b8e29b KVM: arm64: Use generic allocator for hyp stage-1 page-tables
new 71233d05f4b5 KVM: arm64: Add support for creating kernel-agnostic stage [...]
new 6d9d2115c480 KVM: arm64: Add support for stage-2 map()/unmap() in gener [...]
new 02bbd374ce4a KVM: arm64: Convert kvm_phys_addr_ioremap() to generic pag [...]
new e9edb17ae0a2 KVM: arm64: Convert kvm_set_spte_hva() to generic page-table API
new 52bae936f0e7 KVM: arm64: Convert unmap_stage2_range() to generic page-t [...]
new e0e5a07f3f5a KVM: arm64: Add support for stage-2 page-aging in generic [...]
new ee8efad7994c KVM: arm64: Convert page-aging and access faults to generi [...]
new 73d49df2c3e7 KVM: arm64: Add support for stage-2 write-protect in gener [...]
new cc38d61cace3 KVM: arm64: Convert write-protect operation to generic pag [...]
new 93c66b40d728 KVM: arm64: Add support for stage-2 cache flushing in gene [...]
new 8d5207bef691 KVM: arm64: Convert memslot cache-flushing code to generic [...]
new adcd4e23291e KVM: arm64: Add support for relaxing stage-2 perms in gene [...]
new 6f745f1bb5bf KVM: arm64: Convert user_mem_abort() to generic page-table API
new 063deeb1f2c2 KVM: arm64: Check the pgt instead of the pgd when modifyin [...]
new 3f26ab58e327 KVM: arm64: Remove unused page-table code
new 74cfa7ea66a7 KVM: arm64: Remove unused 'pgd' field from 'struct kvm_s2_mmu'
new c9b69a0cf0b4 KVM: arm64: Don't constrain maximum IPA size based on host [...]
new ae8bd85ca8a4 Merge branch 'kvm-arm64/pt-new' into kvmarm-master/next
new 501a67a25dd4 KVM: arm64: Remove __activate_vm wrapper
new 6a0259ed29bb KVM: arm64: Remove hyp_panic arguments
new d7ca1079d8ea KVM: arm64: Remove kvm_host_data_t typedef
new ceee2fe4ba1f KVM: arm64: Choose hyp symbol based on context
new a0e479523e3f KVM: arm64: Save chosen hyp vector to a percpu variable
new 6e3bfbb22c51 KVM: arm64: nVHE: Use separate vector for the host
new 472fc011ccd3 KVM: arm64: nVHE: Don't consume host SErrors with ESB
new b619d9aa8b38 KVM: arm64: Introduce hyp context
new 7c2e76d87f9c KVM: arm64: Update context references from host to hyp
new 7db21530479f KVM: arm64: Restore hyp when panicking in guest context
new 603d2bdaa57e KVM: arm64: Share context save and restore macros
new 4e3393a969a0 KVM: arm64: nVHE: Switch to hyp context for EL2
new a2e102e20fd6 KVM: arm64: nVHE: Handle hyp panics
new 5dc33bd199ca KVM: arm64: nVHE: Pass pointers consistently to hyp-init
new cf6501689012 smccc: Define vendor hyp owned service call region
new 0794a974d74d smccc: Use separate variables for args and results
new 054698316d87 KVM: arm64: nVHE: Migrate hyp interface to SMCCC
new 04e4caa8d355 KVM: arm64: nVHE: Migrate hyp-init to SMCCC
new a071261d9318 KVM: arm64: nVHE: Fix pointers during SMCCC convertion
new 81867b75dbfd Merge branch 'kvm-arm64/nvhe-hyp-context' into kvmarm-master/next
new 523b3999e5f6 KVM: arm64: Try PMD block mappings if PUD mappings are not [...]
new ada329e6b5b4 KVM: arm64: Do not flush memslot if FWB is supported
new c9c0279cc02b KVM: arm64: Fix doc warnings in mmu code
new 8910f089606e Merge branch 'kvm-arm64/pt-new' into kvmarm-master/next
new 8a4374f97dee KVM: arm64: Fix inject_fault.c kernel-doc warnings
new cb62e0b5c8db KVM: arm64: vgic-debug: Convert to use DEFINE_SEQ_ATTRIBUTE macro
new 41fa0f597150 Merge branch 'kvm-arm64/misc-5.10' into kvmarm-master/next
new 42223fb100b4 KVM: arm64: Refactor PMU attribute error handling
new fd65a3b5f855 KVM: arm64: Use event mask matching architecture revision
new d7eec2360e38 KVM: arm64: Add PMU event filtering infrastructure
new 88865beca906 KVM: arm64: Mask out filtered events in PCMEID{0,1}_EL1
new 8be86a5eec04 KVM: arm64: Document PMU filtering API
new af130d0adc8e KVM: arm64: Add undocumented return values for PMU device [...]
new 51dd2eb98c72 KVM: arm64: Match PMU error code descriptions with error c [...]
new 2e02cbb236d6 Merge branch 'kvm-arm64/pmu-5.9' into kvmarm-master/next
new ab25464bdabd kvm: arm64: Partially link nVHE hyp code, simplify HYPCOPY
new ce492a16ffb8 kvm: arm64: Move nVHE hyp namespace macros to hyp_image.h
new 3471ee06e33e kvm: arm64: Only define __kvm_ex_table for CONFIG_KVM
new 717cf94adb54 kvm: arm64: Remove __hyp_this_cpu_read
new ea391027d355 kvm: arm64: Remove hyp_adr/ldr_this_cpu
new 572494995bc3 kvm: arm64: Add helpers for accessing nVHE hyp per-cpu vars
new df4c8214a18d kvm: arm64: Duplicate arm64_ssbd_callback_required for nVHE hyp
new 2a1198c9b436 kvm: arm64: Create separate instances of kvm_host_data for [...]
new 30c953911c43 kvm: arm64: Set up hyp percpu data for nVHE
new a3bb9c3a0055 kvm: arm64: Remove unnecessary hyp mappings
new 816c347f3a48 Merge remote-tracking branch 'arm64/for-next/ghostbusters' [...]
new 14ef9d04928b Merge branch 'kvm-arm64/hyp-pcpu' into kvmarm-master/next
new b259d137e91d KVM: arm64: Pass level hint to TLBI during stage-2 permiss [...]
new ffd1b63a5860 KVM: arm64: Ensure user_mem_abort() return value is initialised
new 030bdf3698b7 KVM: arm64: Fix some documentation build warnings
new 4e5dc64c4319 Merge branches 'kvm-arm64/pt-new' and 'kvm-arm64/pmu-5.9' [...]
new 1b21c8db0e3b Merge tag 'kvmarm-5.10' of git://git.kernel.org/pub/scm/li [...]
new 9389b9d5d356 KVM: VMX: Ignore userspace MSR filters for x2APIC
new 043248b3280c KVM: VMX: Forbid userspace MSR filters for x2APIC
new 10f79ccaf3d7 Documentation: kvm: fix a typo
new 8f116a6c7320 x86/kvm: hide KVM options from menuconfig when KVM is not [...]
new 66af4f5cb1ee x86/kvm: Update the comment about asynchronous page fault [...]
new 5b9bb0ebbcdc kvm: x86: encapsulate wrmsr(MSR_KVM_SYSTEM_TIME) emulation [...]
new 210dfd93ea3d kvm: x86: set wall_clock in kvm_write_wall_clock()
new 66570e966dd9 kvm: x86: only provide PV features if enabled in guest's CPUID
new 3ee6fb4949aa Documentation: kvm: fix some typos in cpuid.rst
new f69858fcc727 KVM: x86: disconnect kvm_check_cpuid() from vcpu->arch.cpu [...]
new 255cbecfe0c9 KVM: x86: allocate vcpu->arch.cpuid_entries dynamically
new 3f4e3eb417b1 KVM: x86: bump KVM_MAX_CPUID_ENTRIES
new d5d6c18dc454 kvm x86/mmu: Make struct kernel_param_ops definitions const
new 36385ccc9b18 KVM: x86: xen_hvm_config: cleanup return values
new 7dffecaf4eab KVM: x86: report negative values from wrmsr emulation to u [...]
new 72f211ecaa80 KVM: x86: allow kvm_x86_ops.set_efer to return an error value
new 2fcf4876ada8 KVM: nSVM: implement on demand allocation of the nested state
new f6426ab9c957 KVM: SVM: Initialize prev_ga_tag before use
new 6e1d849fa329 KVM: x86: Intercept LA57 to inject #GP fault when it's reserved
new c44d9b34701d KVM: x86: Invoke vendor's vcpu_after_set_cpuid() after all [...]
new a6337a3542b1 KVM: x86: Move call to update_exception_bitmap() into VMX code
new 2ed41aa631fc KVM: VMX: Intercept guest reserved CR4 bits to inject #GP fault
new 30031c2b0574 KVM: x86: Let the guest own CR4.FSGSBASE
new a4f1d94e6bc1 KVM: PPC: Book3S HV: Make struct kernel_param_ops definiti [...]
new c0623f5e5d21 Merge branch 'kvm-fixes' into 'next'
new cc4674d0ded0 kvm: mmu: Separate making non-leaf sptes from link_shadow_page
new 799a4190e734 kvm: x86/mmu: Separate making SPTEs from set_spte
new cb3eedab4539 KVM: mmu: Separate updating a PTE from kvm_set_pte_rmapp
new 5a9624affe7c KVM: mmu: extract spte.h and spte.c
new c9180b7291cf kvm: x86/mmu: Introduce tdp_iter
new fe5db27d3601 kvm: x86/mmu: Init / Uninit the TDP MMU
new 02c00b3a2f7e kvm: x86/mmu: Allocate and free TDP MMU roots
new 2f2fad0897cb kvm: x86/mmu: Add functions to handle changed TDP SPTEs
new 9e9eb226b912 KVM: Cache as_id in kvm_memory_slot
new faaf05b00aec kvm: x86/mmu: Support zapping SPTEs in the TDP MMU
new 7d94531249a5 kvm: x86/mmu: Remove disallowed_hugepage_adjust shadow_wal [...]
new bb18842e2111 kvm: x86/mmu: Add TDP MMU PF handler
new 89c0fd494af3 kvm: x86/mmu: Allocate struct kvm_mmu_pages for all pages [...]
new 063afacd8730 kvm: x86/mmu: Support invalidate range MMU notifier for TDP MMU
new f8e144971c68 kvm: x86/mmu: Add access tracking for tdp_mmu
new 1d8dd6b3f12b kvm: x86/mmu: Support changed pte notifier in tdp MMU
new a6a0b05da9f3 kvm: x86/mmu: Support dirty logging for the TDP MMU
new 14881998566d kvm: x86/mmu: Support disabling dirty logging for the tdp MMU
new 46044f72c382 kvm: x86/mmu: Support write protection for nesting in tdp MMU
new 95fb5b0258b7 kvm: x86/mmu: Support MMIO in the TDP MMU
new daa5b6c12337 kvm: x86/mmu: Don't clear write flooding count for direct roots
new 29cf0f5007a2 kvm: x86/mmu: NX largepage recovery for TDP MMU
new f9a705ad1c07 Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
new 02e83f46ebfa vfs: move generic_remap_checks out of mm
new 1b2c54d63cde vfs: move the remap range helpers to remap_range.c
new 407e9c63ee57 vfs: move the generic write and copy checks out of mm
new c4728cfbed0f Merge tag 'vfs-5.10-merge-1' of git://git.kernel.org/pub/s [...]
new 57c176074057 Convert trailing spaces and periods in path components
new 119e489681f7 smb3: add defines for new crypto algorithms
new 3984bdc04946 update structure definitions from updated protocol documentation
new 9e81e8ff74b9 cifs: return cached_fid from open_shroot
new d1542cf6165e cifs: compute full_path already in cifs_readdir()
new 8e670f77c4a5 Handle STATUS_IO_TIMEOUT gracefully
new c6cc4c5a7250 cifs: handle -EINTR in cifs_setattr
new 682955491a0d SMB3.1.1: add defines for new signing negotiate context
new 330857a5d822 cifs: map STATUS_ACCOUNT_LOCKED_OUT to -EACCES
new fbfd0b46afa9 smb3.1.1: add new module load parm require_gcm_256
new 29e279230413 smb3.1.1: add new module load parm enable_gcm_256
new 511ac89e591a smb3.1.1: print warning if server does not support request [...]
new fd08f2dbf0c2 smb3.1.1: rename nonces used for GCM and CCM encryption
new 63ca5656350a smb3.1.1: set gcm256 when requested
new 0bd294b55a5d cifs: Return the error from crypt_message when enc/dec key [...]
new acf96fef46f2 smb3.1.1: do not fail if no encryption required but server [...]
new 9eec21bfbe90 smb3: add dynamic trace point to trace when credits obtained
new 9934430e2178 SMB3.1.1: Fix ids returned in POSIX query dir
new 3ece60e3e78e cifs: make const array static, makes object smaller
new 62593011247c SMB3: Resolve data corruption of TCP server info fields
new def6e1dc1781 cifs: Print the address and port we are connecting to in g [...]
new 3c3317daef0a smb3: fix stat when special device file and mounted with m [...]
new 3c6e65e67918 smb3: do not try to cache root directory if dir leases not [...]
new a6a9cffad0a2 cifs: add files to host new mount api
new 5c6e5aa49680 cifs: move security mount options into fs_context.ch
new 2f20f076865d cifs: move cache mount options to fs_context.ch
new 555782aa556a cifs: move smb version mount options into fs_context.c
new 1af34fdd0799 smb3.1.1: fix typo in compression flag
new d367cb960ce8 cifs: remove bogus debug code
new 13909d96c84a SMB3: add support for recognizing WSL reparse tags
new 0613ed91901b Merge tag '5.10-rc-smb3-fixes-part1' of git://git.samba.or [...]
new 5a61ae1402f1 gfs2: Make sure we don't miss any delayed withdraws
new 521031fa9701 gfs2: Fix bad comment for trans_drain
new e8a8023ee0bd gfs2: convert to use DEFINE_SEQ_ATTRIBUTE macro
new 23d828fc3f1e gfs2: rename variable error to ret in gfs2_evict_inode
new 6e7e9a505571 gfs2: factor evict_unlinked_inode out of gfs2_evict_inode
new 53dbc27eb189 gfs2: further simplify gfs2_evict_inode with new func evic [...]
new d90be6ab9ad7 gfs2: factor evict_linked_inode out of gfs2_evict_inode
new 0a0d9f55c211 gfs2: simplify the logic in gfs2_evict_inode
new ee1e2c773e4f gfs2: call truncate_inode_pages_final for address space glocks
new 2164f9b91869 gfs2: use iomap for buffered I/O in ordered and writeback mode
new 0e539ca1bbbe gfs2: Fix NULL pointer dereference in gfs2_rgrp_dump
new c2a04b02c060 gfs2: use-after-free in sysfs deregistration
new 0ddc5154b24c gfs2: add validation checks for size of superblock
new 21b6924bb70e gfs2: rename gfs2_write_full_page to gfs2_write_jdata_page [...]
new 77650bdbd293 gfs2: add missing log_blocks trace points in gfs2_write_revokes
new 97c5e43d51a4 gfs2: enhance log_blocks trace point to show log blocks free
new 68942870c66a gfs2: Wipe jdata and ail1 in gfs2_journal_wipe, formerly g [...]
new 36c783092d49 gfs2: make gfs2_ail1_empty_one return the count of active items
new 249ffe18c68e gfs2: don't lock sd_ail_lock in gfs2_releasepage
new 6302d6f43e35 gfs2: Only set PageChecked if we have a transaction
new a6645745d45d gfs2: simplify gfs2_block_map
new b2a846dbef4e gfs2: Ignore journal log writes for jdata holes
new e2c6c8a797ee gfs2: eliminate GLF_QUEUED flag in favor of list_empty(gl_ [...]
new dbffb29dac6a gfs2: Fix comments to glock_hash_walk
new 2ffed5290b3b gfs2: Only access gl_delete for iopen glocks
new 23cfb0c3d845 gfs2: Eliminate gl_vm
new ed3adb375b70 gfs2: Ignore subsequent errors after withdraw in rgrp_go_sync
new 730926982d77 gfs2: Add fields for statfs info in struct gfs2_log_header_host
new 97fd734ba17e gfs2: lookup local statfs inodes prior to journal recovery
new bedb0f056faa gfs2: Recover statfs info in journal head
new 0adc313c4f20 Merge tag 'gfs2-for-5.10' of git://git.kernel.org/pub/scm/ [...]
The 357 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
Documentation/virt/kvm/api.rst | 216 ++-
Documentation/virt/kvm/cpuid.rst | 88 +-
Documentation/virt/kvm/devices/vcpu.rst | 57 +-
MAINTAINERS | 1 +
arch/alpha/kernel/signal.c | 1 -
arch/arc/kernel/perf_event.c | 27 +-
arch/arc/kernel/signal.c | 2 +-
arch/arm/boot/dts/cros-ec-keyboard.dtsi | 1 +
arch/arm/kernel/signal.c | 1 -
arch/arm64/Kconfig | 1 +
arch/arm64/Makefile | 4 +-
arch/arm64/include/asm/assembler.h | 29 +-
arch/arm64/include/asm/hyp_image.h | 36 +
arch/arm64/include/asm/kvm_asm.h | 187 ++-
arch/arm64/include/asm/kvm_host.h | 35 +-
arch/arm64/include/asm/kvm_hyp.h | 9 +-
arch/arm64/include/asm/kvm_mmu.h | 251 +--
arch/arm64/include/asm/kvm_pgtable.h | 309 ++++
arch/arm64/include/asm/kvm_ptrauth.h | 6 +-
arch/arm64/include/asm/memory.h | 5 +-
arch/arm64/include/asm/percpu.h | 28 +-
arch/arm64/include/asm/pgtable-hwdef.h | 24 -
arch/arm64/include/asm/pgtable-prot.h | 19 -
arch/arm64/include/asm/pgtable.h | 4 +-
arch/arm64/include/asm/stage2_pgtable.h | 215 ---
arch/arm64/include/uapi/asm/kvm.h | 16 +
arch/arm64/kernel/fpsimd.c | 4 +-
arch/arm64/kernel/image-vars.h | 3 -
arch/arm64/kernel/pointer_auth.c | 4 +
arch/arm64/kernel/proton-pack.c | 40 +-
arch/arm64/kernel/signal.c | 1 -
arch/arm64/kernel/vdso/gen_vdso_offsets.sh | 2 +-
arch/arm64/kernel/vmlinux.lds.S | 13 +
arch/arm64/kvm/Makefile | 2 +-
arch/arm64/kvm/arm.c | 70 +-
arch/arm64/kvm/hyp.S | 34 -
arch/arm64/kvm/hyp/Makefile | 2 +-
arch/arm64/kvm/hyp/entry.S | 95 +-
arch/arm64/kvm/hyp/hyp-entry.S | 76 +-
arch/arm64/kvm/hyp/include/hyp/debug-sr.h | 4 +-
arch/arm64/kvm/hyp/include/hyp/switch.h | 15 +-
arch/arm64/kvm/hyp/nvhe/.gitignore | 2 +
arch/arm64/kvm/hyp/nvhe/Makefile | 62 +-
arch/arm64/kvm/hyp/nvhe/host.S | 187 +++
arch/arm64/kvm/hyp/nvhe/hyp-init.S | 67 +-
arch/arm64/kvm/hyp/nvhe/hyp-main.c | 117 ++
arch/arm64/kvm/hyp/nvhe/hyp.lds.S | 19 +
arch/arm64/kvm/hyp/nvhe/switch.c | 48 +-
arch/arm64/kvm/hyp/nvhe/tlb.c | 2 -
arch/arm64/kvm/hyp/pgtable.c | 892 ++++++++++
arch/arm64/kvm/hyp/vhe/switch.c | 31 +-
arch/arm64/kvm/hyp/vhe/sysreg-sr.c | 4 +-
arch/arm64/kvm/inject_fault.c | 1 +
arch/arm64/kvm/mmu.c | 1761 ++++----------------
arch/arm64/kvm/pmu-emul.c | 195 ++-
arch/arm64/kvm/pmu.c | 13 +-
arch/arm64/kvm/reset.c | 40 +-
arch/arm64/kvm/sys_regs.c | 5 +-
arch/arm64/kvm/vgic/vgic-debug.c | 24 +-
arch/arm64/kvm/vgic/vgic-v3.c | 4 +-
arch/arm64/mm/init.c | 30 +-
arch/c6x/kernel/signal.c | 4 +-
arch/csky/kernel/signal.c | 1 -
arch/h8300/kernel/signal.c | 4 +-
arch/hexagon/kernel/process.c | 1 -
arch/ia64/kernel/process.c | 2 +-
arch/m68k/kernel/signal.c | 2 +-
arch/microblaze/kernel/signal.c | 2 +-
arch/mips/include/asm/kvm_host.h | 4 +-
arch/mips/kernel/signal.c | 1 -
arch/mips/kvm/entry.c | 21 +-
arch/mips/kvm/mips.c | 3 +-
arch/mips/kvm/trap_emul.c | 2 +-
arch/mips/kvm/vz.c | 2 +-
arch/nds32/kernel/signal.c | 4 +-
arch/nios2/kernel/signal.c | 2 +-
arch/openrisc/kernel/signal.c | 1 -
arch/parisc/kernel/signal.c | 4 +-
arch/powerpc/include/asm/kvm_host.h | 1 +
arch/powerpc/kernel/signal.c | 1 -
arch/powerpc/kvm/book3s.c | 8 +-
arch/powerpc/kvm/book3s_64_mmu_radix.c | 2 +-
arch/powerpc/kvm/book3s_64_vio.c | 4 +-
arch/powerpc/kvm/book3s_64_vio_hv.c | 2 +-
arch/powerpc/kvm/book3s_hv.c | 24 +-
arch/powerpc/kvm/book3s_hv_interrupts.S | 9 +-
arch/powerpc/kvm/book3s_hv_nested.c | 2 +-
arch/powerpc/kvm/book3s_hv_rm_xics.c | 2 +-
arch/powerpc/kvm/book3s_pr.c | 2 +-
arch/powerpc/kvm/book3s_xics.c | 86 +-
arch/powerpc/kvm/book3s_xive_native.c | 12 +-
arch/powerpc/kvm/booke.c | 6 +-
arch/riscv/kernel/signal.c | 4 +-
arch/s390/Kconfig | 1 +
arch/s390/kernel/signal.c | 1 -
arch/s390/mm/init.c | 11 +
arch/sh/kernel/signal_32.c | 4 +-
arch/sparc/kernel/signal_32.c | 4 +-
arch/sparc/kernel/signal_64.c | 4 +-
arch/um/kernel/process.c | 2 +-
arch/x86/include/asm/kvm_host.h | 70 +-
arch/x86/include/asm/svm.h | 90 +-
arch/x86/include/asm/vmx.h | 2 +-
arch/x86/include/uapi/asm/kvm.h | 20 +
arch/x86/include/uapi/asm/svm.h | 2 +
arch/x86/kernel/cpu/mce/core.c | 2 +-
arch/x86/kernel/cpu/resctrl/rdtgroup.c | 2 +-
arch/x86/kernel/kvm.c | 2 +-
arch/x86/kvm/Kconfig | 1 +
arch/x86/kvm/Makefile | 6 +-
arch/x86/kvm/cpuid.c | 137 +-
arch/x86/kvm/cpuid.h | 15 +
arch/x86/kvm/emulate.c | 22 +-
arch/x86/kvm/hyperv.c | 11 +
arch/x86/kvm/kvm_cache_regs.h | 2 +-
arch/x86/kvm/lapic.c | 43 +-
arch/x86/kvm/lapic.h | 1 +
arch/x86/kvm/mmu.h | 5 -
arch/x86/kvm/mmu/mmu.c | 974 ++++-------
arch/x86/kvm/mmu/mmu_internal.h | 88 +-
arch/x86/kvm/mmu/mmutrace.h | 21 +-
arch/x86/kvm/mmu/paging_tmpl.h | 50 +-
arch/x86/kvm/mmu/spte.c | 318 ++++
arch/x86/kvm/mmu/spte.h | 252 +++
arch/x86/kvm/mmu/tdp_iter.c | 182 ++
arch/x86/kvm/mmu/tdp_iter.h | 60 +
arch/x86/kvm/mmu/tdp_mmu.c | 1157 +++++++++++++
arch/x86/kvm/mmu/tdp_mmu.h | 48 +
arch/x86/kvm/svm/avic.c | 7 +-
arch/x86/kvm/svm/nested.c | 351 ++--
arch/x86/kvm/svm/sev.c | 26 +-
arch/x86/kvm/svm/svm.c | 404 +++--
arch/x86/kvm/svm/svm.h | 103 +-
arch/x86/kvm/trace.h | 128 +-
arch/x86/kvm/vmx/capabilities.h | 10 +-
arch/x86/kvm/vmx/nested.c | 178 +-
arch/x86/kvm/vmx/posted_intr.c | 332 ++++
arch/x86/kvm/vmx/posted_intr.h | 99 ++
arch/x86/kvm/vmx/vmcs.h | 7 +
arch/x86/kvm/vmx/vmenter.S | 34 +
arch/x86/kvm/vmx/vmx.c | 1259 ++++++--------
arch/x86/kvm/vmx/vmx.h | 143 +-
arch/x86/kvm/vmx/{ops.h => vmx_ops.h} | 0
arch/x86/kvm/x86.c | 694 ++++++--
arch/x86/kvm/x86.h | 5 +-
arch/x86/mm/fault.c | 13 +-
arch/xtensa/kernel/signal.c | 2 +-
drivers/acpi/apei/ghes.c | 2 +-
drivers/android/binder.c | 2 +-
.../iio/common/cros_ec_sensors/cros_ec_sensors.c | 2 +-
drivers/input/keyboard/cros_ec_keyb.c | 2 +-
drivers/platform/chrome/Kconfig | 10 -
drivers/platform/chrome/cros_ec_lightbar.c | 12 +-
drivers/platform/chrome/cros_ec_proto.c | 106 +-
drivers/platform/chrome/cros_ec_sysfs.c | 26 +-
drivers/platform/chrome/cros_ec_trace.h | 27 +-
drivers/platform/chrome/cros_ec_typec.c | 42 +-
drivers/platform/chrome/cros_ec_vbc.c | 4 +-
drivers/pwm/pwm-cros-ec.c | 37 +-
drivers/vdpa/mlx5/net/mlx5_vnet.c | 12 +-
drivers/vhost/vdpa.c | 9 +-
drivers/vhost/vhost.c | 5 +-
drivers/vhost/vhost.h | 2 +-
drivers/vhost/vringh.c | 9 +-
drivers/virtio/Kconfig | 6 +
drivers/virtio/virtio.c | 15 +
drivers/virtio/virtio_balloon.c | 2 +-
drivers/virtio/virtio_input.c | 2 +-
drivers/virtio/virtio_mem.c | 2 +-
fs/Makefile | 2 +-
fs/cifs/Makefile | 2 +-
fs/cifs/asn1.c | 16 +-
fs/cifs/cifs_unicode.c | 8 +-
fs/cifs/cifsacl.c | 5 +-
fs/cifs/cifsfs.c | 8 +
fs/cifs/cifsglob.h | 16 +-
fs/cifs/cifsproto.h | 2 +
fs/cifs/connect.c | 264 +--
fs/cifs/fs_context.c | 221 +++
fs/cifs/fs_context.h | 58 +
fs/cifs/inode.c | 13 +-
fs/cifs/readdir.c | 60 +-
fs/cifs/smb2glob.h | 1 +
fs/cifs/smb2inode.c | 11 +-
fs/cifs/smb2maperror.c | 4 +-
fs/cifs/smb2ops.c | 83 +-
fs/cifs/smb2pdu.c | 53 +-
fs/cifs/smb2pdu.h | 90 +-
fs/cifs/smb2proto.h | 3 +-
fs/cifs/smb2transport.c | 8 +-
fs/cifs/trace.h | 18 +-
fs/cifs/transport.c | 5 +-
fs/file_table.c | 2 +-
fs/gfs2/aops.c | 68 +-
fs/gfs2/bmap.c | 62 +-
fs/gfs2/bmap.h | 1 +
fs/gfs2/glock.c | 52 +-
fs/gfs2/glops.c | 36 +-
fs/gfs2/incore.h | 29 +-
fs/gfs2/log.c | 89 +-
fs/gfs2/log.h | 2 +-
fs/gfs2/lops.c | 2 +-
fs/gfs2/lops.h | 1 +
fs/gfs2/meta_io.c | 81 +-
fs/gfs2/meta_io.h | 2 +-
fs/gfs2/ops_fstype.c | 173 +-
fs/gfs2/recovery.c | 108 ++
fs/gfs2/rgrp.c | 19 +-
fs/gfs2/rgrp.h | 2 +-
fs/gfs2/super.c | 220 ++-
fs/gfs2/super.h | 5 +
fs/gfs2/sys.c | 5 +-
fs/gfs2/trace_gfs2.h | 7 +-
fs/gfs2/util.c | 2 +-
fs/gfs2/util.h | 10 +
fs/io_uring.c | 13 +-
fs/namespace.c | 2 +-
fs/read_write.c | 544 ++----
fs/remap_range.c | 571 +++++++
include/kvm/arm_pmu.h | 5 +
include/linux/arm-smccc.h | 74 +-
include/linux/fs.h | 8 +-
include/linux/kvm_host.h | 2 +
include/linux/task_work.h | 11 +-
include/linux/tracehook.h | 4 +-
include/linux/virtio_config.h | 10 +
include/trace/events/kvm.h | 2 +-
include/uapi/linux/kvm.h | 19 +
kernel/entry/common.c | 1 -
kernel/entry/kvm.c | 4 +-
kernel/events/uprobes.c | 2 +-
kernel/irq/manage.c | 2 +-
kernel/sched/fair.c | 2 +-
kernel/task_work.c | 30 +-
mm/filemap.c | 222 ---
security/keys/keyctl.c | 2 +-
security/yama/yama_lsm.c | 2 +-
tools/testing/selftests/kvm/.gitignore | 1 +
tools/testing/selftests/kvm/Makefile | 2 +
tools/testing/selftests/kvm/include/x86_64/vmx.h | 2 +-
tools/testing/selftests/kvm/x86_64/tsc_msrs_test.c | 168 ++
tools/testing/selftests/kvm/x86_64/user_msr_test.c | 248 +++
virt/kvm/eventfd.c | 4 +-
virt/kvm/kvm_main.c | 16 +-
244 files changed, 10751 insertions(+), 6558 deletions(-)
create mode 100644 arch/arm64/include/asm/hyp_image.h
create mode 100644 arch/arm64/include/asm/kvm_pgtable.h
delete mode 100644 arch/arm64/kvm/hyp.S
create mode 100644 arch/arm64/kvm/hyp/nvhe/.gitignore
create mode 100644 arch/arm64/kvm/hyp/nvhe/host.S
create mode 100644 arch/arm64/kvm/hyp/nvhe/hyp-main.c
create mode 100644 arch/arm64/kvm/hyp/nvhe/hyp.lds.S
create mode 100644 arch/arm64/kvm/hyp/pgtable.c
create mode 100644 arch/x86/kvm/mmu/spte.c
create mode 100644 arch/x86/kvm/mmu/spte.h
create mode 100644 arch/x86/kvm/mmu/tdp_iter.c
create mode 100644 arch/x86/kvm/mmu/tdp_iter.h
create mode 100644 arch/x86/kvm/mmu/tdp_mmu.c
create mode 100644 arch/x86/kvm/mmu/tdp_mmu.h
create mode 100644 arch/x86/kvm/vmx/posted_intr.c
create mode 100644 arch/x86/kvm/vmx/posted_intr.h
rename arch/x86/kvm/vmx/{ops.h => vmx_ops.h} (100%)
create mode 100644 fs/cifs/fs_context.c
create mode 100644 fs/cifs/fs_context.h
create mode 100644 fs/remap_range.c
create mode 100644 tools/testing/selftests/kvm/x86_64/tsc_msrs_test.c
create mode 100644 tools/testing/selftests/kvm/x86_64/user_msr_test.c
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository gcc.
from c7c4a2787ba Darwin, Ada : Fix bootstrap after stat entry changes.
new 7991e963239 PR c/97463 - ICE in warn_parm_ptrarray_mismatch on an incom [...]
new 757ba6653c2 PR middle-end/97552 - missing waning passing null to a VLA [...]
The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
gcc/attribs.c | 1 +
gcc/c-family/c-warn.c | 8 ++---
gcc/c/c-decl.c | 6 ++--
gcc/testsuite/gcc.dg/Wnonnull-5.c | 53 +++++++++++++++++++++++++++++++++
gcc/testsuite/gcc.dg/Wvla-parameter-2.c | 4 +--
gcc/testsuite/gcc.dg/pr97463.c | 7 +++++
6 files changed, 71 insertions(+), 8 deletions(-)
create mode 100644 gcc/testsuite/gcc.dg/Wnonnull-5.c
create mode 100644 gcc/testsuite/gcc.dg/pr97463.c
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_kernel/llvm-release-arm-lts-allnoconfig
in repository toolchain/ci/base-artifacts.
discards 03e27794 0: update: llvm-linux: all
new 88a952f8 0: update: llvm-linux: all
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (03e27794)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_kernel/llvm-release-arm- [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log | 137 +-
02-build_llvm/console.log | 12664 +++++++++++++++++------------------
03-build_linux/console.log | 803 +--
04-boot_linux/console.log | 2 +-
05-check_regression/console.log | 12 +-
06-update_baseline/console.log | 38 +
console.log | 13656 +++++++++++++++++++-------------------
jenkins/manifest.sh | 10 +-
8 files changed, 13693 insertions(+), 13629 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_kernel/gnu-master-aarch64-lts-allnoconfig
in repository toolchain/ci/base-artifacts.
discards 583e9950 2: update: binutils-gcc-linux: 429
new 960d6336 2: update: binutils-gcc-linux: 429
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (583e9950)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_kernel/gnu-master-aarch6 [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log | 148 +-
02-prepare_abe/console.log | 414 +-
03-build_abe-binutils/console.log | 11541 ++++++------
04-build_abe-stage1/console.log | 15908 ++++++++--------
05-build_linux/console.log | 972 +-
07-check_regression/console.log | 2 +-
07-check_regression/results.regressions | 12 +-
08-update_baseline/console.log | 90 +-
08-update_baseline/results.regressions | 12 +-
console.log | 29075 +++++++++++++++---------------
jenkins/manifest.sh | 14 +-
11 files changed, 29089 insertions(+), 29099 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.