This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository linux.
from 6cad420cc695 Merge branch 'akpm' (patches from Andrew)
new e2bf6814bec3 IMA: Update KBUILD_MODNAME for IMA files to ima
new 72ec611c6476 IMA: Add log statements for failure conditions
new 555d6d71d57c integrity: Remove duplicate pr_fmt definitions
new 96c82175d138 Merge branch 'next-integrity.logging-cleanup' into next-integrity
new 9e2b4be377f0 ima: add a new CONFIG for loading arch-specific policies
new 7f218319caaa Merge branch 'next-integrity' of git://git.kernel.org/pub/ [...]
new 1651e700664b x86: Fix bitops.h warning with a moved cast
new f14a9532ee30 Merge tag 'x86-urgent-2020-04-02' of git://git.kernel.org/ [...]
new f09ab268bbb2 KVM: selftests: aarch64: Use stream when given
new 10d1a71b164e KVM: selftests: Remove unnecessary defines
new 12c0d0f6d9df KVM: selftests: aarch64: Remove unnecessary ifdefs
new f832485df2d4 KVM: selftests: Rename vm_guest_mode_params
new 377a41c9ef84 KVM: selftests: Introduce vm_guest_mode_params
new 87a802d93e7e KVM: selftests: Introduce num-pages conversion utilities
new 025eed7b3519 KVM: selftests: Create a demand paging test
new 4f72180eb4da KVM: selftests: Add demand paging content to the demand pa [...]
new 0119cb365c93 KVM: selftests: Add configurable demand paging delay
new af99e1ad7e70 KVM: selftests: Add memory size parameter to the demand pa [...]
new 56a4210f4e4e KVM: selftests: Pass args to vCPU in global vCPU args struct
new 9bbf24744e12 KVM: selftests: Add support for vcpu_args_set to aarch64 a [...]
new 018494e6d823 KVM: selftests: Support multiple vCPUs in demand paging test
new f09205b99832 KVM: selftests: Time guest demand paging
new 3439d886e4d9 KVM: selftests: Rework debug message printing
new 244c6b6df99b KVM: selftests: Convert some printf's to pr_info's
new 222f06e7cde5 KVM: vmx: rewrite the comment in vmx_get_mt_mask
new e630269841ab KVM: x86: Fix print format and coding style
new e080e538e697 KVM: x86: eliminate some unreachable code
new d71f5e03257c KVM: VMX: Add 'else' to split mutually exclusive case
new 999eabcc89b0 KVM: apic: remove unused function apic_lvt_vector()
new 92daa48b34d7 KVM: x86: Add EMULTYPE_PF when emulation is triggered by a [...]
new 744e699c7e99 KVM: x86: Move gpa_val and gpa_available into the emulator [...]
new edd4fa37baa6 KVM: x86: Allocate new rmap and large page tracking when m [...]
new 13ea52551708 KVM: Reinstall old memslots if arch preparation fails
new 13f678894bd0 KVM: Don't free new memslot if allocation of said memslot fails
new 82307e676f9d KVM: PPC: Move memslot memory allocation into prepare_memo [...]
new 0dab98b7ade6 KVM: x86: Allocate memslot resources during prepare_memory [...]
new 414de7abbf80 KVM: Drop kvm_arch_create_memslot()
new bd0e96fdc5a5 KVM: Explicitly free allocated-but-unused dirty bitmap
new 71a4c30bf0d3 KVM: Refactor error handling for setting memory region
new cf47f50b5c2e KVM: Move setting of memslot into helper routine
new 9d4c197c0e94 KVM: Drop "const" attribute from old memslot in commit_mem [...]
new 21198846de1c KVM: x86: Free arrays for old memslot when moving memslot' [...]
new 5c0b4f3d5ccc KVM: Move memslot deletion to helper function
new e96c81ee89d8 KVM: Simplify kvm_free_memslot() and all its descendents
new 163da372dec5 KVM: Clean up local variable usage in __kvm_set_memory_region()
new 0dff084607bd KVM: Provide common implementation for generic dirty log f [...]
new 2a49f61dfcdc KVM: Ensure validity of memslot with respect to kvm_get_di [...]
new 0577d1abe704 KVM: Terminate memslot walks via used_slots
new 36947254e5f9 KVM: Dynamically size memslot array based on number of used slots
new 13e48aa9429d KVM: selftests: Add test for KVM_SET_USER_MEMORY_REGION
new b3594ffbf932 KVM: x86/mmu: Move kvm_arch_flush_remote_tlbs_memslot() to mmu.c
new cec37648f40b KVM: x86/mmu: Use range-based TLB flush for dirty log mems [...]
new 7f42aa76d4a5 KVM: x86/mmu: Consolidate open coded variants of memslot T [...]
new 168d918f2643 KVM: x86: Adjust counter sample period after a wrmsr
new d18b2f43b914 KVM: x86: Gracefully handle __vmalloc() failure during VM [...]
new 1a625056cc57 KVM: x86: Directly return __vmalloc() result in ->vm_alloc()
new 562b6b089d64 KVM: x86: Consolidate VM allocation and free for VMX and SVM
new 23581ea8ceff KVM: selftests: Fix unknown ucall command asserts
new 4d395762599d KVM: Remove unnecessary asm/kvm_host.h includes
new cc7f5577adfc KVM: SVM: Inhibit APIC virtualization for X2APIC guest
new 3651c7fc2bf6 KVM: x86/mmu: Ignore guest CR3 on fast root switch for direct MMU
new 0be44352071d KVM: x86/mmu: Reuse the current root if possible for fast switch
new 3c9bd4006bfc KVM: x86: enable dirty log gradually in small chunks
new 49f933d445b6 KVM: Fix some obsolete comments
new 4abaffce4d25 KVM: LAPIC: Recalculate apic map in batch
new b34de572a863 KVM: X86: trigger kvmclock sync request just once on VM creation
new a1c77abb8d93 KVM: nVMX: Properly handle userspace interrupt window request
new e743664bea8e kvm: selftests: Support dirty log initial-all-set test
new a102a674e423 KVM: x86/mmu: Don't drop level/direct from MMU role calculation
new 8053f924cad3 KVM: x86/mmu: Drop kvm_mmu_extended_role.cr4_la57 hack
new bb1fcc70d98f KVM: nVMX: Allow L1 to use 5-level page walks for nested EPT
new ac69dfaacee8 KVM: nVMX: Rename nested_ept_get_cr3() to nested_ept_get_eptp()
new ac6389ab2c7a KVM: nVMX: Rename EPTP validity helper and associated variables
new d8dd54e06348 KVM: x86/mmu: Rename kvm_mmu->get_cr3() to ->get_guest_pgd()
new 96d4701049a7 KVM: nVMX: Drop unnecessary check on ept caps for execute-only
new abbed4fa94f6 KVM: x86: Fix warning due to implicit truncation on 32-bit KVM
new 2bde08f9f5f1 KVM: Drop gfn_to_pfn_atomic()
new 2e3bb4d886c7 KVM: x86: Refactor I/O emulation helpers to provide vcpu-o [...]
new 21f1b8f29ea5 KVM: x86: Explicitly pass an exception struct to check_intercept
new f0ed4760ed21 KVM: x86: Move emulation-only helpers to emulate.c
new c9b8b07cded5 KVM: x86: Dynamically allocate per-vCPU emulation context
new 2f728d66e8a7 KVM: x86: Move kvm_emulate.h into KVM's private directory
new 06add254c7f3 KVM: x86: Shrink the usercopy region of the emulation context
new 68c9a46e9ee8 KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits [...]
new 619a17f11069 KVM: x86: Refactor loop around do_cpuid_func() to separate helper
new 8b86079cc339 KVM: x86: Simplify handling of Centaur CPUID leafs
new d5a661d19df1 KVM: x86: Clean up error handling in kvm_dev_ioctl_get_cpuid()
new 0fc62671876c KVM: x86: Check userspace CPUID array size after validatin [...]
new 3dc4a9cf05e5 KVM: x86: Move CPUID 0xD.1 handling out of the index>0 loop
new 1893c9415ae8 KVM: x86: Check for CPUID 0xD.N support before validating [...]
new 91001d403ad3 KVM: x86: Warn on zero-size save state for valid CPUID 0xD [...]
new 8b2fc445a761 KVM: x86: Refactor CPUID 0xD.N sub-leaf entry creation
new 87849b1ccbd4 KVM: x86: Clean up CPUID 0x7 sub-leaf loop
new aceac6e5700f KVM: x86: Drop the explicit @index from do_cpuid_7_mask()
new acfad336ecf9 KVM: x86: Drop redundant boot cpu checks on SSBD feature bits
new aa10a7dc8858 KVM: x86: Consolidate CPUID array max num entries checking
new 74fa0bc7f083 KVM: x86: Hoist loop counter and terminator to top of __do [...]
new c862903963bb KVM: x86: Refactor CPUID 0x4 and 0x8000001d handling
new e53c95e8d41e KVM: x86: Encapsulate CPUID entries and metadata in struct
new 695538aa21c0 KVM: x86: Drop redundant array size check
new 0eee8f9d9d3b KVM: x86: Use common loop iterator when handling CPUID 0xD.N
new 2ef7619d4373 KVM: VMX: Add helpers to query Intel PT mode
new cfc481810c90 KVM: x86: Calculate the supported xcr0 mask at load time
new 7f5581f59298 KVM: x86: Use supported_xcr0 to detect MPX support
new 615a4ae1c74c KVM: x86: Make kvm_mpx_supported() an inline function
new 7392079c4e74 KVM: x86: Clear output regs for CPUID 0x14 if PT isn't exp [...]
new 160b486f65ff KVM: x86: Drop explicit @func param from ->set_supported_cpuid()
new 3be5a60b454a KVM: x86: Use u32 for holding CPUID register value in helpers
new 5e12b2bb34e9 KVM: x86: Replace bare "unsigned" with "unsigned int" in c [...]
new 4c61534aaae2 KVM: x86: Introduce cpuid_entry_{get,has}() accessors
new b32666b13a72 KVM: x86: Introduce cpuid_entry_{change,set,clear}() mutators
new e745e37d4977 KVM: x86: Refactor cpuid_mask() to auto-retrieve the register
new 6c7ea4b56bfe KVM: x86: Handle MPX CPUID adjustment in VMX code
new 5ffec6f910dc KVM: x86: Handle INVPCID CPUID adjustment in VMX code
new e574768f841b KVM: x86: Handle UMIP emulation CPUID adjustment in VMX code
new d64d83d1e026 KVM: x86: Handle PKU CPUID adjustment in VMX code
new 733deafc00df KVM: x86: Handle RDTSCP CPUID adjustment in VMX code
new dbd068040c64 KVM: x86: Handle Intel PT CPUID adjustment in VMX code
new fb7d4377d513 KVM: x86: handle GBPAGE CPUID adjustment for EPT with gene [...]
new 9e6d01c2d908 KVM: x86: Refactor handling of XSAVES CPUID adjustment
new 66a6950f9995 KVM: x86: Introduce kvm_cpu_caps to replace runtime CPUID masking
new 9b58b9857f22 KVM: SVM: Convert feature updates from CPUID to KVM cpu caps
new 3ec6fd8cf0ba KVM: VMX: Convert feature updates from CPUID to KVM cpu caps
new b3d895d5c415 KVM: x86: Move XSAVES CPUID adjust to VMX's KVM cpu cap update
new 8721f5b061eb KVM: x86: Add a helper to check kernel support when settin [...]
new c10398b6d0dd KVM: x86: Use KVM cpu caps to mark CR4.LA57 as not-reserved
new 90d2f60f41f7 KVM: x86: Use KVM cpu caps to track UMIP emulation
new 09f628a0b49c KVM: x86: Fold CPUID 0x7 masking back into __do_cpuid_func()
new bcf600ca8d21 KVM: x86: Remove the unnecessary loop on CPUID 0x7 sub-leafs
new c571a144ef17 KVM: x86: Squash CPUID 0x2.0 insanity for modern CPUs
new 7ff6c0350315 KVM: x86: Remove stateful CPUID handling
new d8577a4c238f KVM: x86: Do host CPUID at load time to mask KVM cpu caps
new bd7919999047 KVM: x86: Override host CPUID results with kvm_cpu_caps
new 93c380e7b528 KVM: x86: Set emulated/transmuted feature bits via kvm_cpu_caps
new dd69cc2542f7 KVM: x86: Use kvm_cpu_caps to detect Intel PT support
new 7c7f95481089 KVM: x86: Do kvm_cpuid_array capacity checks in terminal f [...]
new 139085101f85 KVM: x86: Use KVM cpu caps to detect MSR_TSC_AUX virt support
new a7a200eb4c69 KVM: VMX: Directly use VMX capabilities helper to detect R [...]
new 7b874c26a624 KVM: x86: Check for Intel PT MSR virtualization using KVM [...]
new a1bead2abaa1 KVM: VMX: Directly query Intel PT mode when refreshing PMUs
new 213e0e1f500b KVM: SVM: Refactor logging of NPT enabled/disabled
new bde772355958 KVM: x86/mmu: Merge kvm_{enable,disable}_tdp() into a comm [...]
new 703c335d0693 KVM: x86/mmu: Configure max page level during hardware setup
new e884b854ee18 KVM: x86: Don't propagate MMU lpage support to memslot.dis [...]
new 600087b61467 KVM: Drop largepages_enabled and its accessor/mutator
new 91661989d17c KVM: x86: Move VMX's host_efer to common x86 code
new a50718cc3f43 KVM: nSVM: Expose SVM features to L1 iff nested is enabled
new 4eb87460c474 KVM: nSVM: Advertise and enable NRIPS for L1 iff nrips is enabled
new 257038745cae KVM: x86: Move nSVM CPUID 0x8000000A handling into common [...]
new 408e9a318f57 KVM: CPUID: add support for supervisor states
new b7fb8488c85f KVM: x86: Trace the original requested CPUID function in k [...]
new 15608ed03f10 KVM: x86: Add helpers to perform CPUID-based guest vendor check
new 23493d0a1731 KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs
new 8d8923115f1b KVM: x86: Fix CPUID range checks for Hypervisor and Centau [...]
new 09c7431ed31f KVM: x86: Refactor out-of-range logic to contain the madness
new f91af5176cce KVM: x86: Refactor kvm_cpuid() param that controls out-of- [...]
new 689f3bf21628 KVM: x86: unify callbacks to load paging root
new 727a7e27cf88 KVM: x86: rename set_cr3 callback and related flags to loa [...]
new b5ec2e020b70 KVM: nSVM: do not change host intercepts while nested VM i [...]
new 64b5bd270426 KVM: nSVM: ignore L1 interrupt window while running L2 wit [...]
new b518ba9fa691 KVM: nSVM: implement check_nested_events for interrupts
new 78f2145c4d93 KVM: nSVM: avoid loss of pending IRQ/NMI before entering L2
new 3ac40c404c60 KVM: Documentation: Update fast page fault for indirect sp
new ab56f8e62daf kvm: svm: Introduce GA Log tracepoint for AVIC
new 331b4de9a7e7 KVM: selftests: s390x: Provide additional num-guest-pages [...]
new 041bc42ce2d0 KVM: VMX: Micro-optimize vmexit time when not exposing PMU
new 212617dbb6ba KVM: nVMX: Consolidate nested MTF checks to helper function
new 8e205a6b2a06 KVM: X86: correct meaningless kvm_apicv_activated() check
new 0b66465344a7 KVM: nSVM: Remove an obsolete comment.
new 1914f624f5e3 selftests: KVM: SVM: Add vmcall test to gitignore
new 425936246fbe KVM: selftests: Share common API documentation
new 53362fe930b2 selftests: KVM: s390: fixup fprintf format error in reset.c
new 6a46fcf92f06 selftests: KVM: s390: fix format strings for access reg test
new d9eaf19ecc12 KVM: selftests: Enable printf format warnings for TEST_ASSERT
new d0aac3320d1f KVM: selftests: Use consistent message for test skipping
new beca54702dc6 KVM: selftests: virt_map should take npages, not size
new 94c4b76b88d4 KVM: selftests: Introduce steal-time test
new 41cbed5b07b5 selftests: KVM: s390: fix early guest crash
new b0435a12a6d3 selftests: KVM: s390: test more register variants for the [...]
new 3203a01737af selftests: KVM: s390: check for registers to NOT change on reset
new a46f8a63cde8 selftests: kvm: Introduce the TEST_FAIL macro
new 352be2c539d0 selftests: kvm: Uses TEST_FAIL in tests/utilities
new 0c546725eecf Merge branch 'kvm-null-pointer-fix' into HEAD
new e942dbf8c58e KVM: nVMX: stop abusing need_vmcs12_to_shadow_sync for eVM [...]
new b6a0653ae2cd KVM: nVMX: properly handle errors in nested_vmx_handle_enl [...]
new 7bcf732e74e7 KVM: selftests: define and use EVMCS_VERSION
new 41b0552aa693 KVM: selftests: test enlightened vmenter with wrong eVMCS version
new 6d05a965addb KVM: selftests: enlightened VMPTRLD with an incorrect GPA
new ecdc5d842bb3 s390/protvirt: introduce host side setup
new 29d37e5b82f3 s390/protvirt: add ultravisor initialization
new 214d9bbcd3a6 s390/mm: provide memory management functions for protected [...]
new 084ea4d611a3 s390/mm: add (non)secure page access exceptions handlers
new a0f60f843199 s390/protvirt: Add sysfs firmware interface for Ultravisor [...]
new f15587c83460 Merge branch 'pvbase' of git://git.kernel.org/pub/scm/linu [...]
new f65470661f36 KVM: s390/interrupt: do not pin adapter interrupt pages
new 3e6c556899d0 KVM: s390: protvirt: Add UV debug trace
new 6933316fe011 KVM: s390: add new variants of UV CALL
new 29b40f105ec8 KVM: s390: protvirt: Add initial vm and cpu lifecycle handling
new fa0c5eabbdd3 KVM: s390: protvirt: Secure memory is not mergeable
new 1274800792dc KVM: s390/mm: Make pages accessible before destroying the guest
new 49710db08169 KVM: s390: protvirt: Handle SE notification interceptions
new da24a0cc58ed KVM: s390: protvirt: Instruction emulation
new 201ae986ead7 KVM: s390: protvirt: Implement interrupt injection
new 0890ddea1a90 KVM: s390: protvirt: Add SCLP interrupt handling
new e663df91dd85 KVM: s390: protvirt: Handle spec exception loops
new c8aac2344d66 KVM: s390: protvirt: Add new gprs location handling
new 19e122776886 KVM: S390: protvirt: Introduce instruction data area bounc [...]
new d274995ec273 KVM: s390: protvirt: handle secure guest prefix pages
new 5322781008a9 KVM: s390/mm: handle guest unpin events
new 22d768c3e960 KVM: s390: protvirt: Write sthyi data to instruction data area
new 353cbc6a5bdf KVM: s390: protvirt: STSI handling
new 68cf7b1f137e KVM: s390: protvirt: disallow one_reg
new 0f3035047140 KVM: s390: protvirt: Do only reset registers that are accessible
new 811ea797118a KVM: s390: protvirt: Only sync fmt4 registers
new ea5c68c39023 KVM: s390: protvirt: Add program exception injection
new e0d2773d487c KVM: s390: protvirt: UV calls in support of diag308 0, 1
new fe28c7868f68 KVM: s390: protvirt: Report CPU state to Ultravisor
new 7c36a3fcf444 KVM: s390: protvirt: Support cmd 5 operation state
new 3adae0b4ca64 KVM: s390: protvirt: Mask PSW interrupt bits for intercept [...]
new 72f218208fa6 KVM: s390: protvirt: do not inject interrupts after start
new 8a8378fa6157 KVM: s390: protvirt: Add UV cpu reset calls
new a421027987ed DOCUMENTATION: Protected virtual machine introduction and IPL
new 13da9ae1cdbf KVM: s390: protvirt: introduce and enable KVM_CAP_S390_PROTECTED
new 04ed89dc4aeb KVM: s390: protvirt: Add KVM api documentation
new cc674ef252f4 KVM: s390: introduce module parameter kvm.use_gisa
new 1c482452d5db Merge tag 'kvm-s390-next-5.7-1' of git://git.kernel.org/pu [...]
new bb03911f79f6 KVM: VMX: access regs array in vmenter.S in its natural order
new 96b100cd1464 KVM: nVMX: remove side effects from nested_vmx_exit_reflected
new 9401f2e5b0ce KVM: x86: Expose AVX512 VP2INTERSECT in cpuid for TGL
new d55c9d4009c7 KVM: nSVM: check for EFER.SVME=1 before entering guest
new e7adda281063 KVM: x86: Add requested index to the CPUID tracepoint
new 2b110b61644a KVM: x86: Add blurb to CPUID tracepoint when using max bas [...]
new cf6c26ec7bf5 KVM: x86: Code style cleanup in kvm_arch_dev_ioctl()
new bfcaa84975fa KVM: selftests: Rework timespec functions and usage
new eecda7a95646 tools/kvm_stat: rework command line sequence and message texts
new 0e6618fba8c9 tools/kvm_stat: switch to argparse
new 3cbb394d9fb6 tools/kvm_stat: add command line switch '-s' to set update [...]
new 0c794dcefbbc tools/kvm_stat: add command line switch '-c' to log in csv format
new e3747407c4d5 KVM: x86: Expose fast short REP MOV for supported cpuid
new 31603d4fc2bb KVM: VMX: Always VMCLEAR in-use VMCSes during crash with k [...]
new d260f9ef50c7 KVM: VMX: Fold loaded_vmcs_init() into alloc_loaded_vmcs()
new 4f6ea0a87608 KVM: VMX: Gracefully handle faults on VMXON
new 8a1038de11a5 KVM: X86: Delay read msr data iff writes ICR MSR
new d5361678e63c KVM: X86: Micro-optimize IPI fastpath delay
new 0774a964ef56 KVM: Fix out of range accesses to memslots
new 4b547a869db9 KVM: selftests: Fix cosmetic copy-paste error in vm_mem_re [...]
new 3b684a420bd8 KVM: s390: Use fallthrough;
new f3dd18d444c7 KVM: s390: mark sie block as 512 byte aligned
new 8bf8961332bd Merge tag 'kvm-s390-next-5.7-2' of git://git.kernel.org/pu [...]
new 7a2653612bb6 s390/gmap: return proper error code on ksm unsharing
new 830948eb6826 Merge tag 'kvm-s390-next-5.7-3' of git://git.kernel.org/pu [...]
new 76a5db107273 KVM: arm64: Use the correct timer structure to access the [...]
new 9879b79aefe5 KVM: arm64: GICv4.1: Let doorbells be auto-enabled
new ef1820be4777 KVM: arm64: GICv4.1: Add direct injection capability to SG [...]
new bacf2c60548b KVM: arm64: GICv4.1: Allow SGIs to switch between HW and S [...]
new 2291ff2f2a56 KVM: arm64: GICv4.1: Plumb SGI implementation selection in [...]
new d9c3872cd2f8 KVM: arm64: GICv4.1: Reload VLPI configuration on distribu [...]
new 7bdabad12784 KVM: arm64: GICv4.1: Allow non-trapping WFI when using HW SGIs
new dab4fe3bf6dd KVM: arm64: GICv4.1: Expose HW-based SGIs in debugfs
new cc98702c1775 Merge branch 'kvm-arm64/gic-v4.1' into kvmarm-master/next
new 8a90a3228b6a arm: Unplug KVM from the build system
new bb7c62bcb848 arm: Remove KVM from config files
new 541ad0150ca4 arm: Remove 32bit KVM host support
new 3fbb96c054e2 arm: Remove HYP/Stage-2 page-table support
new 59c1d9cc5295 arm: Remove GICv3 vgic compatibility macros
new 15ff9a39cd5e arm: Remove the ability to set HYP vectors outside of the [...]
new 544e56aa6377 MAINTAINERS: RIP KVM/arm
new 463050599742 Merge tag 'kvm-arm-removal' into kvmarm-master/next
new cf39d3753906 Merge tag 'kvmarm-5.7' of git://git.kernel.org/pub/scm/lin [...]
new cd758a9b57ee KVM: PPC: Book3S HV: Use __gfn_to_pfn_memslot in HPT page [...]
new afd313564cf1 KVM: PPC: Book3S HV: Use RADIX_PTE_INDEX_SIZE in Radix MMU code
new 1dff3064c764 KVM: PPC: Book3S HV: Treat TM-related invalid form instruc [...]
new 1f50cc170535 KVM: PPC: Book3S HV: Fix H_CEDE return code for nested guests
new 8fc6ba0a205e KVM: PPC: Use fallthrough;
new b2fa4f9088db KVM: PPC: Book3S PR: Fix kernel crash with PR KVM
new 3f1268dda8e4 KVM: PPC: Book3S PR: Move kvmppc_mmu_init() into PR KVM
new 6fef0c6bbe49 KVM: PPC: Kill kvmppc_ops::mmu_destroy() and kvmppc_mmu_destroy()
new 9bee484b280a KVM: PPC: Book3S HV: Skip kvmppc_uvmem_free if Ultravisor [...]
new 8c47b6ff29e3 KVM: PPC: Book3S HV: Check caller of H_SVM_* Hcalls
new 377f02d487b5 KVM: PPC: Book3S HV: H_SVM_INIT_START must call UV_RETURN
new 9a5788c615f5 KVM: PPC: Book3S HV: Add a capability for enabling secure guests
new 4f4af841f06a Merge tag 'kvm-ppc-next-5.7-1' of git://git.kernel.org/pub [...]
new b99040853738 KVM: Pass kvm_init()'s opaque param to additional arch funcs
new d008dfdb0e70 KVM: x86: Move init-only kvm_x86_ops to separate struct
new 484014faf89e KVM: VMX: Move hardware_setup() definition below vmx_x86_ops
new 72b0eaa94607 KVM: VMX: Configure runtime hooks using vmx_x86_ops
new 69c6f69aa306 KVM: x86: Set kvm_x86_ops only after ->hardware_setup() completes
new afaf0b2f9b80 KVM: x86: Copy kvm_x86_ops by value to eliminate layer of [...]
new 6e4fd06f3ee1 KVM: x86: Drop __exit from kvm_x86_ops' hardware_unsetup()
new e286ac0e38cb KVM: VMX: Annotate vmx_x86_ops as __initdata
new 9c14ee21fcf7 KVM: SVM: Annotate svm_x86_ops as __initdata
new 842f4be95899 KVM: VMX: Add a trampoline to fix VMREAD error handling
new 855c7e9b9c2c KVM: x86: Fix BUILD_BUG() in __cpuid_entry_get_reg() w/ CO [...]
new 514ccc194971 x86/kvm: fix a missing-prototypes "vmread_error"
new 8c1b724ddb21 Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
new 15617dffa387 percpu_ref: Fix comment regarding percpu_ref_init flags
new 780d2a9c86dc include/bitmap.h: add missing parameter in docs
new a392d26f32cd include/bitmap.h: add new functions to documentation
new bfacd38f8d5b percpu: update copyright emails to dennis(a)kernel.org
new ac438771ccb4 Merge branch 'for-5.7' of git://git.kernel.org/pub/scm/lin [...]
The 300 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
Documentation/admin-guide/kernel-parameters.txt | 5 +
Documentation/virt/kvm/api.rst | 128 +-
Documentation/virt/kvm/arm/hyp-abi.rst | 5 +
Documentation/virt/kvm/devices/s390_flic.rst | 11 +-
Documentation/virt/kvm/index.rst | 2 +
Documentation/virt/kvm/locking.rst | 11 +-
Documentation/virt/kvm/s390-pv-boot.rst | 84 ++
Documentation/virt/kvm/s390-pv.rst | 116 ++
MAINTAINERS | 6 +-
arch/arm/Kconfig | 2 -
arch/arm/Makefile | 1 -
arch/arm/configs/axm55xx_defconfig | 2 -
arch/arm/include/asm/arch_gicv3.h | 114 --
arch/arm/include/asm/kvm_arm.h | 239 ----
arch/arm/include/asm/kvm_asm.h | 77 --
arch/arm/include/asm/kvm_coproc.h | 36 -
arch/arm/include/asm/kvm_emulate.h | 372 -----
arch/arm/include/asm/kvm_host.h | 456 ------
arch/arm/include/asm/kvm_hyp.h | 127 --
arch/arm/include/asm/kvm_mmu.h | 435 ------
arch/arm/include/asm/kvm_ras.h | 14 -
arch/arm/include/asm/pgtable-3level.h | 20 -
arch/arm/include/asm/pgtable.h | 9 -
arch/arm/include/asm/sections.h | 6 +-
arch/arm/include/asm/stage2_pgtable.h | 75 -
arch/arm/include/asm/virt.h | 17 -
arch/arm/include/uapi/asm/kvm.h | 314 -----
arch/arm/kernel/asm-offsets.c | 11 -
arch/arm/kernel/hyp-stub.S | 39 +-
arch/arm/kernel/vmlinux-xip.lds.S | 8 -
arch/arm/kernel/vmlinux.lds.S | 8 -
arch/arm/kernel/vmlinux.lds.h | 10 -
arch/arm/kvm/Kconfig | 59 -
arch/arm/kvm/Makefile | 43 -
arch/arm/kvm/coproc.c | 1455 --------------------
arch/arm/kvm/coproc.h | 130 --
arch/arm/kvm/coproc_a15.c | 39 -
arch/arm/kvm/coproc_a7.c | 42 -
arch/arm/kvm/emulate.c | 166 ---
arch/arm/kvm/guest.c | 387 ------
arch/arm/kvm/handle_exit.c | 175 ---
arch/arm/kvm/hyp/Makefile | 34 -
arch/arm/kvm/hyp/banked-sr.c | 70 -
arch/arm/kvm/hyp/cp15-sr.c | 72 -
arch/arm/kvm/hyp/entry.S | 121 --
arch/arm/kvm/hyp/hyp-entry.S | 295 ----
arch/arm/kvm/hyp/s2-setup.c | 22 -
arch/arm/kvm/hyp/switch.c | 242 ----
arch/arm/kvm/hyp/tlb.c | 68 -
arch/arm/kvm/hyp/vfp.S | 57 -
arch/arm/kvm/init.S | 157 ---
arch/arm/kvm/interrupts.S | 36 -
arch/arm/kvm/irq.h | 16 -
arch/arm/kvm/reset.c | 86 --
arch/arm/kvm/trace.h | 86 --
arch/arm/kvm/vgic-v3-coproc.c | 27 -
arch/arm/mach-exynos/Kconfig | 2 +-
arch/arm/mm/mmu.c | 26 -
arch/arm64/include/asm/kvm_emulate.h | 3 +-
arch/arm64/include/asm/kvm_host.h | 1 +
arch/arm64/kvm/fpsimd.c | 1 -
arch/arm64/kvm/guest.c | 1 -
arch/arm64/kvm/hyp/switch.c | 1 -
arch/arm64/kvm/sys_regs.c | 1 -
arch/arm64/kvm/sys_regs_generic_v8.c | 1 -
arch/mips/include/asm/kvm_host.h | 2 +-
arch/mips/kvm/mips.c | 75 +-
arch/powerpc/Kconfig | 1 +
arch/powerpc/include/asm/kvm_asm.h | 3 +
arch/powerpc/include/asm/kvm_book3s_uvmem.h | 6 +
arch/powerpc/include/asm/kvm_host.h | 1 +
arch/powerpc/include/asm/kvm_ppc.h | 21 +-
arch/powerpc/kvm/book3s.c | 25 +-
arch/powerpc/kvm/book3s.h | 1 +
arch/powerpc/kvm/book3s_32_mmu.c | 2 +-
arch/powerpc/kvm/book3s_32_mmu_host.c | 2 +-
arch/powerpc/kvm/book3s_64_mmu.c | 2 +-
arch/powerpc/kvm/book3s_64_mmu_host.c | 2 +-
arch/powerpc/kvm/book3s_64_mmu_hv.c | 119 +-
arch/powerpc/kvm/book3s_64_mmu_radix.c | 2 +-
arch/powerpc/kvm/book3s_64_vio.c | 1 -
arch/powerpc/kvm/book3s_64_vio_hv.c | 1 -
arch/powerpc/kvm/book3s_hv.c | 90 +-
arch/powerpc/kvm/book3s_hv_tm.c | 28 +-
arch/powerpc/kvm/book3s_hv_tm_builtin.c | 16 +-
arch/powerpc/kvm/book3s_hv_uvmem.c | 19 +-
arch/powerpc/kvm/book3s_pr.c | 25 +-
arch/powerpc/kvm/booke.c | 26 +-
arch/powerpc/kvm/booke.h | 2 -
arch/powerpc/kvm/e500.c | 1 -
arch/powerpc/kvm/e500_mmu.c | 4 -
arch/powerpc/kvm/e500mc.c | 1 -
arch/powerpc/kvm/mpic.c | 1 -
arch/powerpc/kvm/powerpc.c | 35 +-
arch/powerpc/kvm/timing.h | 1 -
arch/s390/Kconfig | 1 +
arch/s390/boot/Makefile | 2 +-
arch/s390/boot/uv.c | 20 +
arch/s390/include/asm/gmap.h | 6 +
arch/s390/include/asm/kvm_host.h | 117 +-
arch/s390/include/asm/mmu.h | 2 +
arch/s390/include/asm/mmu_context.h | 1 +
arch/s390/include/asm/page.h | 5 +
arch/s390/include/asm/pgtable.h | 35 +-
arch/s390/include/asm/uv.h | 251 +++-
arch/s390/kernel/Makefile | 3 +-
arch/s390/kernel/entry.h | 2 +
arch/s390/kernel/pgm_check.S | 4 +-
arch/s390/kernel/setup.c | 9 +-
arch/s390/kernel/uv.c | 414 ++++++
arch/s390/kvm/Makefile | 2 +-
arch/s390/kvm/diag.c | 6 +-
arch/s390/kvm/gaccess.c | 23 +-
arch/s390/kvm/intercept.c | 123 +-
arch/s390/kvm/interrupt.c | 401 +++---
arch/s390/kvm/kvm-s390.c | 597 ++++++--
arch/s390/kvm/kvm-s390.h | 51 +-
arch/s390/kvm/priv.c | 13 +-
arch/s390/kvm/pv.c | 303 ++++
arch/s390/mm/fault.c | 78 ++
arch/s390/mm/gmap.c | 72 +-
arch/x86/Kconfig | 1 +
arch/x86/include/asm/bitops.h | 4 +-
arch/x86/include/asm/kvm_host.h | 105 +-
arch/x86/include/asm/kvm_page_track.h | 3 +-
arch/x86/include/asm/vmx.h | 12 +
arch/x86/kernel/Makefile | 4 +-
arch/x86/kvm/cpuid.c | 944 +++++++------
arch/x86/kvm/cpuid.h | 151 +-
arch/x86/kvm/emulate.c | 57 +-
arch/x86/kvm/hyperv.c | 8 +-
arch/x86/kvm/i8254.c | 2 +-
arch/x86/kvm/kvm_cache_regs.h | 10 +-
arch/x86/{include/asm => kvm}/kvm_emulate.h | 43 +-
arch/x86/kvm/lapic.c | 85 +-
arch/x86/kvm/lapic.h | 2 +
arch/x86/kvm/mmu.h | 10 +-
arch/x86/kvm/mmu/mmu.c | 209 +--
arch/x86/kvm/mmu/page_track.c | 16 +-
arch/x86/kvm/mmu/paging_tmpl.h | 4 +-
arch/x86/kvm/pmu.c | 34 +-
arch/x86/kvm/pmu.h | 11 +-
arch/x86/kvm/svm.c | 407 +++---
arch/x86/kvm/trace.h | 50 +-
arch/x86/kvm/vmx/capabilities.h | 25 +-
arch/x86/kvm/vmx/evmcs.h | 7 +
arch/x86/kvm/vmx/nested.c | 183 +--
arch/x86/kvm/vmx/nested.h | 8 +-
arch/x86/kvm/vmx/ops.h | 27 +-
arch/x86/kvm/vmx/pmu_intel.c | 8 +-
arch/x86/kvm/vmx/vmenter.S | 72 +-
arch/x86/kvm/vmx/vmx.c | 665 +++++----
arch/x86/kvm/vmx/vmx.h | 8 +-
arch/x86/kvm/x86.c | 787 ++++++-----
arch/x86/kvm/x86.h | 28 +-
include/kvm/arm_vgic.h | 3 +
include/linux/bitmap.h | 8 +-
include/linux/ima.h | 3 +-
include/linux/kvm_host.h | 71 +-
include/uapi/linux/kvm.h | 47 +-
lib/percpu-refcount.c | 7 +-
mm/percpu-stats.c | 2 +-
mm/percpu.c | 2 +-
security/integrity/digsig.c | 2 -
security/integrity/digsig_asymmetric.c | 2 -
security/integrity/evm/evm_crypto.c | 2 -
security/integrity/evm/evm_main.c | 2 -
security/integrity/evm/evm_secfs.c | 2 -
security/integrity/ima/Kconfig | 7 +
security/integrity/ima/Makefile | 6 +-
security/integrity/ima/ima_asymmetric_keys.c | 2 -
security/integrity/ima/ima_crypto.c | 2 -
security/integrity/ima/ima_fs.c | 2 -
security/integrity/ima/ima_init.c | 2 -
security/integrity/ima/ima_kexec.c | 1 -
security/integrity/ima/ima_main.c | 5 +-
security/integrity/ima/ima_policy.c | 2 -
security/integrity/ima/ima_queue.c | 2 -
security/integrity/ima/ima_queue_keys.c | 2 -
security/integrity/ima/ima_template.c | 2 -
security/integrity/ima/ima_template_lib.c | 2 -
security/integrity/integrity.h | 6 +
tools/arch/x86/include/asm/unistd_64.h | 3 +
tools/kvm/kvm_stat/kvm_stat | 256 ++--
tools/kvm/kvm_stat/kvm_stat.txt | 44 +-
tools/testing/selftests/kvm/.gitignore | 7 +-
tools/testing/selftests/kvm/Makefile | 12 +-
tools/testing/selftests/kvm/clear_dirty_log_test.c | 4 +
tools/testing/selftests/kvm/demand_paging_test.c | 661 +++++++++
tools/testing/selftests/kvm/dirty_log_test.c | 107 +-
tools/testing/selftests/kvm/include/evmcs.h | 2 +
tools/testing/selftests/kvm/include/kvm_util.h | 126 +-
tools/testing/selftests/kvm/include/test_util.h | 28 +-
tools/testing/selftests/kvm/kvm_create_max_vcpus.c | 8 +-
.../testing/selftests/kvm/lib/aarch64/processor.c | 41 +-
tools/testing/selftests/kvm/lib/aarch64/ucall.c | 2 +-
tools/testing/selftests/kvm/lib/assert.c | 6 +-
tools/testing/selftests/kvm/lib/io.c | 12 +-
tools/testing/selftests/kvm/lib/kvm_util.c | 170 ++-
.../testing/selftests/kvm/lib/kvm_util_internal.h | 59 +-
tools/testing/selftests/kvm/lib/s390x/processor.c | 78 +-
tools/testing/selftests/kvm/lib/test_util.c | 93 ++
tools/testing/selftests/kvm/lib/x86_64/processor.c | 201 +--
tools/testing/selftests/kvm/lib/x86_64/svm.c | 2 +-
tools/testing/selftests/kvm/lib/x86_64/vmx.c | 4 +-
tools/testing/selftests/kvm/s390x/memop.c | 2 +-
tools/testing/selftests/kvm/s390x/resets.c | 138 +-
tools/testing/selftests/kvm/s390x/sync_regs_test.c | 13 +-
tools/testing/selftests/kvm/steal_time.c | 352 +++++
.../selftests/kvm/x86_64/cr4_cpuid_sync_test.c | 6 +-
tools/testing/selftests/kvm/x86_64/evmcs_test.c | 35 +-
tools/testing/selftests/kvm/x86_64/hyperv_cpuid.c | 8 +-
.../selftests/kvm/x86_64/mmio_warning_test.c | 6 +-
.../selftests/kvm/x86_64/platform_info_test.c | 6 +-
.../selftests/kvm/x86_64/set_memory_region_test.c | 141 ++
tools/testing/selftests/kvm/x86_64/smm_test.c | 2 +-
tools/testing/selftests/kvm/x86_64/state_test.c | 10 +-
.../testing/selftests/kvm/x86_64/svm_vmcall_test.c | 6 +-
.../testing/selftests/kvm/x86_64/sync_regs_test.c | 4 +-
.../kvm/x86_64/vmx_close_while_nested_test.c | 4 +-
.../selftests/kvm/x86_64/vmx_dirty_log_test.c | 17 +-
.../kvm/x86_64/vmx_set_nested_state_test.c | 4 +-
.../selftests/kvm/x86_64/vmx_tsc_adjust_test.c | 8 +-
tools/testing/selftests/kvm/x86_64/xss_msr_test.c | 2 +-
virt/kvm/arm/arch_timer.c | 2 +-
virt/kvm/arm/arm.c | 60 +-
virt/kvm/arm/mmu.c | 20 +-
virt/kvm/arm/psci.c | 1 -
virt/kvm/arm/vgic/vgic-debug.c | 14 +-
virt/kvm/arm/vgic/vgic-mmio-v3.c | 81 +-
virt/kvm/arm/vgic/vgic-mmio.c | 88 +-
virt/kvm/arm/vgic/vgic-v3.c | 2 +
virt/kvm/arm/vgic/vgic-v4.c | 107 +-
virt/kvm/arm/vgic/vgic.h | 1 +
virt/kvm/kvm_main.c | 663 ++++++---
235 files changed, 7907 insertions(+), 9746 deletions(-)
create mode 100644 Documentation/virt/kvm/s390-pv-boot.rst
create mode 100644 Documentation/virt/kvm/s390-pv.rst
delete mode 100644 arch/arm/include/asm/kvm_arm.h
delete mode 100644 arch/arm/include/asm/kvm_asm.h
delete mode 100644 arch/arm/include/asm/kvm_coproc.h
delete mode 100644 arch/arm/include/asm/kvm_emulate.h
delete mode 100644 arch/arm/include/asm/kvm_host.h
delete mode 100644 arch/arm/include/asm/kvm_hyp.h
delete mode 100644 arch/arm/include/asm/kvm_mmu.h
delete mode 100644 arch/arm/include/asm/kvm_ras.h
delete mode 100644 arch/arm/include/asm/stage2_pgtable.h
delete mode 100644 arch/arm/include/uapi/asm/kvm.h
delete mode 100644 arch/arm/kvm/Kconfig
delete mode 100644 arch/arm/kvm/Makefile
delete mode 100644 arch/arm/kvm/coproc.c
delete mode 100644 arch/arm/kvm/coproc.h
delete mode 100644 arch/arm/kvm/coproc_a15.c
delete mode 100644 arch/arm/kvm/coproc_a7.c
delete mode 100644 arch/arm/kvm/emulate.c
delete mode 100644 arch/arm/kvm/guest.c
delete mode 100644 arch/arm/kvm/handle_exit.c
delete mode 100644 arch/arm/kvm/hyp/Makefile
delete mode 100644 arch/arm/kvm/hyp/banked-sr.c
delete mode 100644 arch/arm/kvm/hyp/cp15-sr.c
delete mode 100644 arch/arm/kvm/hyp/entry.S
delete mode 100644 arch/arm/kvm/hyp/hyp-entry.S
delete mode 100644 arch/arm/kvm/hyp/s2-setup.c
delete mode 100644 arch/arm/kvm/hyp/switch.c
delete mode 100644 arch/arm/kvm/hyp/tlb.c
delete mode 100644 arch/arm/kvm/hyp/vfp.S
delete mode 100644 arch/arm/kvm/init.S
delete mode 100644 arch/arm/kvm/interrupts.S
delete mode 100644 arch/arm/kvm/irq.h
delete mode 100644 arch/arm/kvm/reset.c
delete mode 100644 arch/arm/kvm/trace.h
delete mode 100644 arch/arm/kvm/vgic-v3-coproc.c
create mode 100644 arch/s390/kernel/uv.c
create mode 100644 arch/s390/kvm/pv.c
rename arch/x86/{include/asm => kvm}/kvm_emulate.h (93%)
create mode 100644 tools/testing/selftests/kvm/demand_paging_test.c
create mode 100644 tools/testing/selftests/kvm/lib/test_util.c
create mode 100644 tools/testing/selftests/kvm/steal_time.c
create mode 100644 tools/testing/selftests/kvm/x86_64/set_memory_region_test.c
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_kernel/llvm-master-arm-lts-defconfig
in repository toolchain/ci/base-artifacts.
discards fb94be23 0: update: llvm-linux: boot
new a02675ef 0: update: llvm-linux: boot
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (fb94be23)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_kernel/llvm-master-arm-l [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log | 216 +-
02-build_llvm/console.log | 12833 +++++++++++++++----------------
03-build_linux/console.log | 1784 ++---
04-boot_linux/console.log | 470 +-
05-check_regression/console.log | 12 +-
06-update_baseline/console.log | 12 +-
console.log | 15327 +++++++++++++++++++-------------------
jenkins/manifest.sh | 12 +-
8 files changed, 15342 insertions(+), 15324 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_bmk_tx1/llvm-master-aarch64-spec2k6-O3
in repository toolchain/ci/base-artifacts.
discards 24fbc5f2 1: update: binutils-gcc-glibc-llvm: 1
new 584eae55 1: update: binutils-gcc-glibc: 1
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (24fbc5f2)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_bmk_tx1/llvm-master-aarc [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log | 161 +-
02-prepare_abe/console.log | 408 +-
03-build_abe-binutils/console.log | 11560 +--
04-build_abe-stage1/console.log | 14794 ++--
05-build_abe-linux/console.log | 354 +-
06-build_abe-glibc/console.log | 39292 ++++-----
07-build_abe-stage2/console.log | 37516 +++++----
08-build_llvm-true/console.log | 12667 ++-
10-benchmark--O3/benchmark-start.log | 2 +-
10-benchmark--O3/benchmark.log | 21 +-
10-benchmark--O3/console.log | 233 +-
11-check_regression/console.log | 2727 +-
11-check_regression/results-0.csv | 2147 +-
11-check_regression/results-1.csv | 2175 +-
11-check_regression/results-brief.csv | 38 +-
11-check_regression/results-compare.csv | 10 +-
11-check_regression/results-full.csv | 2344 +-
11-check_regression/results.csv | 160 +-
11-check_regression/results.log | 2708 +-
12-update_baseline/console.log | 5437 +-
12-update_baseline/extra-bisect-params | 2 +-
12-update_baseline/results-1.csv | 2175 +-
12-update_baseline/results-brief.csv | 38 +-
12-update_baseline/results-compare.csv | 10 +-
12-update_baseline/results-full.csv | 2174 +-
12-update_baseline/results.csv | 158 +-
12-update_baseline/results.log | 1968 +-
12-update_baseline/results.regressions | 3 +
console.log | 125197 ++++++++++++++---------------
jenkins/manifest.sh | 23 +-
regressions.txt | 5 -
results | 4 -
results_id | 2 +-
33 files changed, 132349 insertions(+), 134164 deletions(-)
create mode 100644 12-update_baseline/results.regressions
delete mode 100644 regressions.txt
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository gcc.
from a950bb6e952 Fix check_effective_target_sigsetjmp for glibc targets.
new 63f56527335 Fix some comment typos in alias.c.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
gcc/ChangeLog | 4 ++++
gcc/alias.c | 14 +++++++-------
2 files changed, 11 insertions(+), 7 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.