This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository gcc.
from 29e304fd5f9 optimize tanh(x) / sinh (x) to 1/ cosh (x)
new 34e4962aed0 diagnostics: Add function call parens matching to c_parser.
new 9eea5d2ddf7 Provide diagnostic hints for missing C inttypes.h string co [...]
new 1dc83b46065 Provide diagnostic hints for missing C++ cinttypes string c [...]
The 3 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
gcc/c-family/known-headers.cc | 61 ++++++++++++++++-
gcc/c-family/known-headers.h | 3 +
gcc/c/c-parser.c | 61 +++++++++++++----
gcc/cp/parser.c | 36 ++++++++++
...g-close-symbol.c => missing-close-func-paren.c} | 33 +++++----
gcc/testsuite/g++.dg/spellcheck-inttypes.C | 80 ++++++++++++++++++++++
gcc/testsuite/gcc.dg/spellcheck-inttypes.c | 78 +++++++++++++++++++++
7 files changed, 322 insertions(+), 30 deletions(-)
copy gcc/testsuite/c-c++-common/{missing-close-symbol.c => missing-close-func-pare [...]
create mode 100644 gcc/testsuite/g++.dg/spellcheck-inttypes.C
create mode 100644 gcc/testsuite/gcc.dg/spellcheck-inttypes.c
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_bmk_tx1/gnu-master-aarch64-spec2k6-Os_LTO
in repository toolchain/ci/base-artifacts.
discards d332bda3 0: update: binutils-gcc-glibc: 1
new a870ede1 0: update: binutils-gcc-glibc: 1
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (d332bda3)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_bmk_tx1/gnu-master-aarch [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log | 68 +-
02-prepare_abe/console.log | 240 +-
03-build_abe-binutils/console.log | 10873 ++-
04-build_abe-stage1/console.log | 15837 ++--
05-build_abe-linux/console.log | 55 +-
06-build_abe-glibc/console.log | 41009 +++++------
07-build_abe-stage2/console.log | 37892 +++++-----
09-benchmark--Os_LTO/benchmark-start.log | 2 +-
09-benchmark--Os_LTO/benchmark.log | 25 +-
09-benchmark--Os_LTO/console.log | 205 +-
10-check_regression/console.log | 1120 +-
10-check_regression/results-0.csv | 230 +-
10-check_regression/results-1.csv | 231 +-
10-check_regression/results-brief.csv | 58 +-
10-check_regression/results-full.csv | 230 +-
10-check_regression/results.csv | 72 +-
10-check_regression/results.log | 4592 +-
11-update_baseline/console.log | 66 +-
11-update_baseline/results-0.csv | 230 +-
11-update_baseline/results-1.csv | 231 +-
11-update_baseline/results-brief.csv | 58 +-
11-update_baseline/results-full.csv | 230 +-
11-update_baseline/results.csv | 72 +-
11-update_baseline/results.log | 4554 +-
console.log | 107515 ++++++++++++++--------------
jenkins/manifest.sh | 20 +-
results_id | 2 +-
27 files changed, 112691 insertions(+), 113026 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_gnu/gnu-master-arm-bootstrap_O1
in repository toolchain/ci/base-artifacts.
discards c9eb743d 0: update: gcc-e7340ed74abf5f44b069210a9eb1283a2e515b15: 1
new 9f2036a9 0: update: gcc-3fb68f2e666d9de7e0326af9f43b12c9e98f19a6: 1
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (c9eb743d)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_gnu/gnu-master-arm-boots [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log | 130 +-
02-prepare_abe/console.log | 436 +-
04-build_abe-bootstrap_O1/console.log | 96786 +++++++++++++++----------------
05-check_regression/console.log | 4 +-
06-update_baseline/console.log | 4 +-
console.log | 97360 ++++++++++++++++----------------
jenkins/manifest.sh | 13 +-
7 files changed, 97879 insertions(+), 96854 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository gcc.
from 817738fdf1e Update gcc sv.po.
new 29e304fd5f9 optimize tanh(x) / sinh (x) to 1/ cosh (x)
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
gcc/match.pd | 5 +++++
gcc/testsuite/gcc.dg/tanhbysinh.c | 40 +++++++++++++++++++++++++++++++++++++++
2 files changed, 45 insertions(+)
create mode 100644 gcc/testsuite/gcc.dg/tanhbysinh.c
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository linux.
from 38696e33e2bd Merge tag 'xtensa-20200603' of git://github.com/jcmvbkbc/l [...]
new 3fec4aecb311 kgdb: Fix spurious true from in_dbg_master()
new a13502073638 kgdb: Drop malformed kernel doc comment
new 1137a96f9b5a kgdb: Return true in kgdb_nmi_poll_knock()
new 202164fbfa2b kgdb: Disable WARN_CONSOLE_UNLOCKED for all kgdb
new 333564add0e5 Revert "kgdboc: disable the console lock when in kgdb"
new 68e55f61c138 kgdboc: Use a platform device to handle tty drivers showin [...]
new b1a57bbfcc17 kgdb: Delay "kgdbwait" to dbg_late_init() by default
new 3ca676e4ca60 kgdb: Prevent infinite recursive entries to the debugger
new eae3e19ca930 kgdboc: Remove useless #ifdef CONFIG_KGDB_SERIAL_CONSOLE i [...]
new 220995622da5 kgdboc: Add kgdboc_earlycon to support early kgdb using bo [...]
new 1feb48baf2fb kgdboc: Disable all the early code when kgdboc is a module
new b1350132fef7 kgdb: Don't call the deinit under spinlock
new f71fc3bc7b32 Documentation: kgdboc: Document new kgdboc_earlycon parameter
new a4912303ac6f serial: kgdboc: Allow earlycon initialization to be deferred
new 205b5bdda209 serial: qcom_geni_serial: Support kgdboc_earlycon
new c5e7467d92b8 serial: 8250_early: Support kgdboc_earlycon
new 195867ffea13 serial: amba-pl011: Support kgdboc_earlycon
new 1b310030bb85 kdb: Cleanup math with KDB_CMD_HISTORY_COUNT
new c893de12e1ef kdb: Remove the misfeature 'KDBFLAGS'
new f1e455352b6f Merge tag 'kgdb-5.8-rc1' of git://git.kernel.org/pub/scm/l [...]
new ac0f7d425841 Drivers: hv: copy from message page only what's needed
new a276463b7aeb Drivers: hv: allocate the exact needed memory for messages
new 5cc415001bca Drivers: hv: avoid passing opaque pointer to vmbus_onmessage()
new b0a284dc65b4 Drivers: hv: make sure that 'struct vmbus_channel_message_ [...]
new 52c7803f9bd4 Drivers: hv: check VMBus messages lengths
new 8a857c55420f Drivers: hv: vmbus: Always handle the VMBus messages on CPU0
new b9fa1b8797dc Drivers: hv: vmbus: Don't bind the offer&rescind works to [...]
new 8b6a877c060e Drivers: hv: vmbus: Replace the per-CPU channel lists with [...]
new ac5047671758 hv_netvsc: Disable NAPI before closing the VMBus channel
new 238d2ed8f7d1 hv_utils: Always execute the fcopy and vss callbacks in a tasklet
new 9403b66e6161 Drivers: hv: vmbus: Use a spin lock for synchronizing chan [...]
new 240ad77cb50d PCI: hv: Prepare hv_compose_msi_msg() for the VMBus-channe [...]
new 8ef4c4abbbcd Drivers: hv: vmbus: Remove the unused HV_LOCALIZED channel [...]
new d570aec0f215 Drivers: hv: vmbus: Synchronize init_vp_index() vs. CPU hotplug
new 752781057343 Drivers: hv: vmbus: Introduce the CHANNELMSG_MODIFYCHANNEL [...]
new 7769e18c201a scsi: storvsc: Re-init stor_chns when a channel interrupt [...]
new 677b0ce5d66c drivers: hv: remove redundant assignment to pointer primar [...]
new 7357b1df744c KVM: x86: hyperv: Remove duplicate definitions of Referenc [...]
new a8a42d0284f1 x86/hyperv: Remove HV_PROCESSOR_POWER_STATE #defines
new c55a844f46f9 x86/hyperv: Split hyperv-tlfs.h into arch dependent and in [...]
new 88b42da6e3dc asm-generic/hyperv: Add definitions for Get/SetVpRegister [...]
new 69f57058badd hyper-v: Use UUID API for exporting the GUID (part 2)
new 458c4475be9a hyper-v: Supply GUID pointer to printf() like functions
new 0027e3fd6d90 hyper-v: Replace open-coded variant of %*phN specifier
new b7d18c57c94a hyper-v: Switch to use UUID types directly
new 723c425f2947 Driver: hv: vmbus: drop a no long applicable comment
new db5871e85533 vmbus: Replace zero-length array with flexible-array
new a949e86c0d78 Drivers: hv: vmbus: Resolve race between init_vp_index() a [...]
new afaa33da08ab Drivers: hv: vmbus: Resolve more races involving init_vp_index()
new 6b2591c21273 Merge tag 'hyperv-next-signed' of git://git.kernel.org/pub [...]
new 788109c1ccf7 KVM: remove redundant assignment to variable r
new 24647e0a39b6 KVM: x86: Return updated timer current count register from [...]
new 43d05de2bee7 KVM: pass through CPUID(0x80000006)
new 238022ff5d05 KVM: selftests: Take vcpu pointer instead of id in vm_vcpu_rm()
new 4d9bba900716 KVM: selftests: Use kernel's list instead of homebrewed re [...]
new 8c996e4dae17 KVM: selftests: Add util to delete memory region
new 3e6b94126784 KVM: selftests: Add GUEST_ASSERT variants to pass values to host
new 8a0639fe9201 KVM: sefltests: Add explicit synchronization to move mem r [...]
new 8fb38f05ca9f KVM: selftests: Add "delete" testcase to set_memory_region_test
new 4cd94d125df5 selftests: kvm: Add vm_get_fd() in kvm_util
new 8cc2dd637b89 KVM: selftests: Add "zero" testcase to set_memory_region_test
new 5b4f758f454b KVM: selftests: Make set_memory_region_test common to all [...]
new 909e0abaac0f selftests: kvm: Add testcase for creating max number of memslots
new e8eff282154f KVM: VMX: Flush all EPTP/VPID contexts on remote TLB flush
new eed0030e4caa KVM: nVMX: Validate the EPTP when emulating INVEPT(EXTENT_ [...]
new f8aa7e3958bc KVM: nVMX: Invalidate all EPTP contexts when emulating INV [...]
new d6e3f8385d27 KVM: nVMX: Invalidate all roots when emulating INVVPID wit [...]
new 53b3d8e9d577 KVM: x86: Export kvm_propagate_fault() (as kvm_inject_emul [...]
new 5efac0741ce2 KVM: x86: introduce kvm_mmu_invalidate_gva
new 0cd665bd20f9 KVM: x86: cleanup kvm_inject_emulated_page_fault
new ee1fa209f5e5 KVM: x86: Sync SPTEs when injecting page/EPT fault into L1
new c746b3a4b84c KVM: VMX: Skip global INVVPID fallback if vpid==0 in vpid_ [...]
new 446ace4bca42 KVM: VMX: Use vpid_sync_context() directly when possible
new 8a8b097c6cd0 KVM: VMX: Move vpid_sync_vcpu_addr() down a few lines
new ab4b3597ffce KVM: VMX: Handle INVVPID fallback logic in vpid_sync_vcpu_addr()
new ca431c0cc331 KVM: VMX: Drop redundant capability checks in low level IN [...]
new bc41d0c40ec2 KVM: nVMX: Use vpid_sync_vcpu_addr() to emulate INVVPID wi [...]
new e64419d991ea KVM: x86: Move "flush guest's TLB" logic to separate kvm_x [...]
new 0baedd792713 KVM: x86: make Hyper-V PV TLB flush use tlb_flush_guest()
new ad104b5e433a KVM: VMX: Clean up vmx_flush_tlb_gva()
new f55ac304ca47 KVM: x86: Drop @invalidate_gpa param from kvm_x86_ops' tlb [...]
new 72b383208726 KVM: SVM: Wire up ->tlb_flush_guest() directly to svm_flush_tlb()
new 5058b692c699 KVM: VMX: Move vmx_flush_tlb() to vmx.c
new 25d8b84376e7 KVM: nVMX: Move nested_get_vpid02() to vmx/nested.h
new 33d19ec9b14c KVM: VMX: Introduce vmx_flush_tlb_current()
new 4a41e43cbe2c KVM: SVM: Document the ASID logic in svm_flush_tlb()
new 7780938cc70b KVM: x86: Rename ->tlb_flush() to ->tlb_flush_all()
new 50b265a4eee0 KVM: nVMX: Add helper to handle TLB flushes on nested VM-E [...]
new eeeb4f67a6cd KVM: x86: Introduce KVM_REQ_TLB_FLUSH_CURRENT to flush cur [...]
new 8c8560b83390 KVM: x86/mmu: Use KVM_REQ_TLB_FLUSH_CURRENT for MMU specif [...]
new c51e1ffee501 KVM: nVMX: Selectively use TLB_FLUSH_CURRENT for nested VM [...]
new 1196cb970b99 KVM: nVMX: Reload APIC access page on nested VM-Exit only [...]
new a4148b7ca2a5 KVM: VMX: Retrieve APIC access page HPA only when necessary
new 4de1f9d469f4 KVM: VMX: Don't reload APIC access page if its control is [...]
new b869855badd1 KVM: x86/mmu: Move fast_cr3_switch() side effects to __kvm [...]
new 4a632ac6ca66 KVM: x86/mmu: Add separate override for MMU sync during fa [...]
new 71fe70130d88 KVM: x86/mmu: Add module param to force TLB flush on root reuse
new 41fab65e7c44 KVM: nVMX: Skip MMU sync on nested VMX transition when possible
new 9805c5f74b8a KVM: nVMX: Don't flush TLB on nested VMX transition
new ce8fe7b77bd8 KVM: nVMX: Free only the affected contexts when emulating INVEPT
new be01e8e2c632 KVM: x86: Replace "cr3" with "pgd" in "new cr3/pgd" related code
new be100ef13625 KVM: VMX: Clean cr3/pgd handling in vmx_load_mmu_pgd()
new 1c164cb3ffd0 KVM: SVM: Use do_machine_check to pass MCE to the host
new 63d04348371b KVM: x86: move kvm_create_vcpu_debugfs after last failure point
new 812756a82ea5 kvm_host: unify VM_STAT and VCPU_STAT definitions in a sin [...]
new 789afc5ccd4e KVM: nVMX: Move reflection check into nested_vmx_reflect_vmexit()
new 7b7bd87dbd6a KVM: nVMX: Uninline nested_vmx_reflect_vmexit(), i.e. move [...]
new fbdd50250396 KVM: nVMX: Move VM-Fail check out of nested_vmx_exit_reflected()
new 236871b6744a KVM: nVMX: Move nested VM-Exit tracepoint into nested_vmx_ [...]
new 2c1f3323802e KVM: nVMX: Split VM-Exit reflection logic into L0 vs. L1 wants
new 1d283062c949 KVM: nVMX: Drop a superfluous WARN on reflecting EXTERNAL_ [...]
new f47baaed4fef KVM: nVMX: Pull exit_reason from vcpu_vmx in nested_vmx_re [...]
new 2a7833899f6a KVM: nVMX: Cast exit_reason to u16 to check for nested EXT [...]
new 4dcefa312a6c KVM: nVMX: Rename exit_reason to vm_exit_reason for nested [...]
new 9932b49e5abe KVM: nVMX: Invoke ept_save_pdptrs() if and only if PAE pag [...]
new e5d03de5937e KVM: nVMX: Reset register cache (available and dirty masks [...]
new ec0241f3bbe1 KVM: nVMX: Drop manual clearing of segment cache on nested [...]
new 5addc235199f KVM: VMX: Cache vmcs.EXIT_QUALIFICATION using arch avail_r [...]
new 8791585837f6 KVM: VMX: Cache vmcs.EXIT_INTR_INFO using arch avail_reg flags
new c583eed6d72b KVM: x86/mmu: Set @writable to false for non-visible acces [...]
new c36b71503a22 KVM: x86/mmu: Avoid an extra memslot lookup in try_async_p [...]
new b8d295f96b6c KVM: nVMX: Remove non-functional "support" for CR3 target values
new 873e1da16918 KVM: VMX: Optimize handling of VM-Entry failures in vmx_vc [...]
new a9ab13ff6e84 KVM: X86: Improve latency for single target IPI fastpath
new 4f233371f6bb KVM: nSVM: Check for CR0.CD and CR0.NW on VMRUN of nested guests
new 1b94f6f81007 KVM: Remove redundant argument to kvm_arch_vcpu_ioctl_run
new da1fda288943 tools/kvm_stat: add command line switch '-z' to skip zero records
new 3754afe7cf7c tools/kvm_stat: Add command line switch '-L' to log to file
new 997b7e98990c tools/kvm_stat: add sample systemd unit file
new e72436bc3a52 KVM: SVM: avoid infinite loop on NPF from bad address
new 1d2c6c9bd4b7 selftests: kvm/set_memory_region_test: do not check RIP if [...]
new 56083bdf67c7 KVM: x86: check_nested_events is never NULL
new 25091990ef28 KVM: eVMCS: check if nesting is enabled
new 33b22172452f KVM: x86: move nested-related kvm_x86_ops to a separate struct
new 9bd4af240f4d KVM: nVMX: Drop a redundant call to vmx_get_intr_info()
new 87796555d48c KVM: nVMX: Store vmcs.EXIT_QUALIFICATION as an unsigned lo [...]
new acd05785e48c kvm: add capability for halt polling
new 7c67f54661fc KVM: SVM: do not allow VMRUN inside SMM
new 4aef2ec9022b Merge branch 'kvm-amd-fixes' into HEAD
new f74f94140fa5 KVM: SVM: introduce nested_run_pending
new 38c0b192bd6d KVM: SVM: leave halted state on vmexit
new 6e085cbfb0f0 KVM: SVM: immediately inject INTR vmexit
new 9c3d370a8efa KVM: SVM: Implement check_nested_events for NMI
new 6ce347af1499 KVM: nVMX: Preserve exception priority irrespective of exi [...]
new d2060bd42e44 KVM: nVMX: Open a window for pending nested VMX preemption timer
new 8081ad06b68a KVM: x86: Set KVM_REQ_EVENT if run is canceled with req_im [...]
new 88c604b66eb6 KVM: x86: Make return for {interrupt_nmi,smi}_allowed() a [...]
new a9fa7cb6aa99 KVM: x86: replace is_smm checks with kvm_x86_ops.smi_allowed
new 429ab576f387 KVM: nVMX: Report NMIs as allowed when in L2 and Exit-on-N [...]
new bbdad0b5a708 KVM: nSVM: Report NMIs as allowed when in L2 and Exit-on-N [...]
new 55714cddbf10 KVM: nSVM: Move SMI vmexit handling to svm_check_nested_events()
new 1b660b6baaaf KVM: VMX: Split out architectural interrupt/NMI blocking checks
new cae96af18452 KVM: SVM: Split out architectural interrupt/NMI/SMI blocki [...]
new 15ff0b450b65 KVM: nVMX: Preserve IRQ/NMI priority irrespective of exiti [...]
new 1cd2f0b0dd92 KVM: nVMX: Prioritize SMI over nested IRQ/NMI
new fc6f7c03ad80 KVM: nSVM: Report interrupts as allowed when in L2 and exi [...]
new 221e761090b4 KVM: nSVM: Preserve IRQ/NMI/SMI priority irrespective of e [...]
new 3b82b8d7fdf7 KVM: x86: WARN on injected+pending exception even in nested case
new db438592807e KVM: VMX: Use vmx_interrupt_blocked() directly from vmx_ha [...]
new 7ab0abdb553e KVM: VMX: Use vmx_get_rflags() to query RFLAGS in vmx_inte [...]
new c300ab9f08df KVM: x86: Replace late check_nested_events() hack with mor [...]
new c9d64a1b2d0b rcuwait: Fix stale wake call name in comment
new 9d9a6ebfea32 rcuwait: Let rcuwait_wake_up() return whether or not a tas [...]
new 5c21f7b322cb rcuwait: Introduce prepare_to and finish_rcuwait
new 191a43be61d6 rcuwait: Introduce rcuwait_active()
new da4ad88cab58 kvm: Replace vcpu->swait with rcuwait
new c4e115f08c08 kvm/eventfd: remove unneeded conversion to bool
new fede8076aab4 KVM: x86: handle wrap around 32-bit address space
new f27ad73a6ef7 KVM: VMX: Use accessor to read vmcs.INTR_INFO when handlin [...]
new 5c911beff20a KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02
new 1af1bb05625b KVM: nVMX: Skip IBPB when temporarily switching between vm [...]
new 56ba77a459a7 KVM: x86: Save L1 TSC offset in 'struct kvm_vcpu_arch'
new 0cc69204e772 KVM: nVMX: Unconditionally validate CR3 during nested transitions
new f98c1e77127d KVM: VMX: Add proper cache tracking for CR4
new bd31fe495d0d KVM: VMX: Add proper cache tracking for CR0
new 0047fcade4cb KVM: VMX: Move nested EPT out of kvm_x86_ops.get_tdp_level() hook
new e93fd3b3e89e KVM: x86/mmu: Capture TDP level when updating CPUID
new 68cda40d9f3c KVM: nVMX: Tweak handling of failure code for nested VM-En [...]
new a71936ab46f1 kvm: x86: Cleanup vcpu->arch.guest_xstate_size
new b2f432f872d9 KVM: x86/mmu: Tweak PSE hugepage handling to avoid 2M vs 4 [...]
new e662ec3e0705 KVM: x86/mmu: Move max hugepage level to a separate #define
new 3bae0459bcd5 KVM: x86/mmu: Drop KVM's hugepage enums in favor of the ke [...]
new 8123f265248c KVM: x86/mmu: Add a helper to consolidate root sp allocation
new c16312f4fa75 KVM: VMX: Remove unneeded __ASM_SIZE usage with POP instruction
new dd03bcaad0b1 KVM: X86: Force ASYNC_PF_PER_VCPU to be power of two
new 5b494aea13fe KVM: No need to retry for hva_to_pfn_remapped()
new 0fd460446912 KVM: X86: Sanity check on gfn before removal
new 62315b639302 KVM: Documentation: Fix up cpuid page
new 551896e0e060 KVM: VMX: Improve handle_external_interrupt_irqoff inline [...]
new 2408500dfc8f KVM: nVMX: Truncate writes to vmcs.SYSENTER_EIP/ESP for 32 [...]
new 9e826feb8f11 KVM: nVMX: Drop superfluous VMREAD of vmcs02.GUEST_SYSENTER_*
new dcf068da7eb2 KVM: VMX: Introduce generic fastpath handler
new 2c4c41325540 KVM: x86: Print symbolic names of VMX VM-Exit flags in traces
new 5a9f54435a48 KVM: X86: Introduce kvm_vcpu_exit_request() helper
new 404d5d7bff0d KVM: X86: Introduce more exit_fastpath_completion enum values
new 379a3c8ee444 KVM: VMX: Optimize posted-interrupt delivery for timer fastpath
new 199a8b84c455 KVM: x86: introduce kvm_can_use_hv_timer
new ae95f566b3d2 KVM: X86: TSCDEADLINE MSR emulation fastpath
new 26efe2fd92e5 KVM: VMX: Handle preemption timer fastpath
new e14b7786cb1c KVM: SVM: Merge svm_enable_vintr into svm_set_vintr
new de182481629c KVM: SVM: Remove unnecessary V_IRQ unsetting
new 6c1c6e58356b KVM: nVMX: Remove unused 'ops' param from nested_vmx_hardw [...]
new 1739f3d56d24 KVM: nVMX: Really make emulated nested preemption timer pinned
new ada0098df656 KVM: nVMX: Change emulated VMX-preemption timer hrtimer to [...]
new 93dff2fed2fb KVM: nVMX: Migrate the VMX-preemption timer
new cb953129bfe5 kvm: add halt-polling cpu usage stats
new febd668d375c rcuwait: avoid lockdep splats from rcuwait_active()
new 0995a5dfbe49 tracing: Provide lockdep less trace_hardirqs_on/off() variants
new c86e9b987cea lockdep: Prepare for noinstr sections
new af1e56b78534 context_tracking: Make guest_enter/exit() .noinstr ready
new ef68017eb570 x86/kvm: Handle async page faults directly through do_page [...]
new 6bca69ada4bc x86/kvm: Sanitize kvm_async_pf_task_wait()
new 3a7c8fafd1b4 x86/kvm: Restrict ASYNC_PF to user space
new 9d5272f5e361 Merge tag 'noinstr-x86-kvm-2020-05-16' of git://git.kernel [...]
new d075fc3154be KVM: s390: vsie: Move conditional reschedule
new 62cf666e4eb8 KVM: s390: vsie: gmap_table_walk() simplifications
new 0b545fd17f84 KVM: s390: remove unneeded semicolon in gisa_vcpu_kicker()
new 4c7ccc3bf746 Merge tag 'kvm-s390-next-5.8-1' of git://git.kernel.org/pu [...]
new d43e2675e96f KVM: x86: only do L1TF workaround on affected processors
new 6129ed877d40 KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't [...]
new 0abcc8f65cc2 KVM: VMX: enable X86_FEATURE_WAITPKG in KVM capabilities
new f4cfcd2d5aea KVM: x86: don't expose MSR_IA32_UMWAIT_CONTROL unconditionally
new e7581caca4c1 KVM: x86: simplify is_mmio_spte
new 7529e767c2a9 Merge branch 'kvm-master' into HEAD
new df2a69af85be KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags
new 7cb85fc465fd KVM: x86: Remove superfluous brackets from case statement
new cb97c2d680dd KVM: x86: Take an unsigned 32-bit int for has_emulated_msr [...]
new a8cfbae59284 KVM: VMX: replace "fall through" with "return" to indicate [...]
new 80bc97f2d84d KVM: Fix the indentation to match coding style
new 88197e6ab33a kvm/x86: Remove redundant function implementations
new a3535be731c2 KVM: nSVM: fix condition for filtering async PF
new 6c0238c4a62b KVM: nSVM: leave ASID aside in copy_vmcb_control_area
new 7d2e8748af62 KVM: x86: Initialize tdp_level during vCPU creation
new b6162e82aef1 KVM: nSVM: Preserve registers modifications done before ne [...]
new c6b22f59d694 KVM: x86: track manually whether an event has been injected
new c9d40913ac5a KVM: x86: enable event window in inject_pending_event
new 7c86663b68ba KVM: nSVM: inject exceptions via svm_check_nested_events
new bd279629f73f KVM: nSVM: remove exit_required
new 5b672408660e KVM: nSVM: correctly inject INIT vmexits
new 978ce5837c7e KVM: SVM: always update CR3 in VMCB
new df7e0681dd8a KVM: nVMX: always update CR3 in VMCS
new 69c9dfa24bb7 KVM: nSVM: move map argument out of enter_svm_guest_mode
new 3e06f0163f7f KVM: nSVM: extract load_nested_vmcb_control
new f241d711b2d1 KVM: nSVM: extract preparation of VMCB for nested run
new 69cb877487de KVM: nSVM: move MMU setup to nested_prepare_vmcb_control
new 18fc6c55d1f4 KVM: nSVM: clean up tsc_offset update
new 2f675917efc8 KVM: nSVM: pass vmcb_control_area to copy_vmcb_control_area
new 7923ef4f6ec4 KVM: nSVM: remove trailing padding for struct vmcb_control_area
new e670bf68f4b7 KVM: nSVM: save all control fields in svm->nested
new d8e4e58f4bd4 KVM: nSVM: restore clobbered INT_CTL fields after clearing VINTR
new 2d8a42be0e2b KVM: nSVM: synchronize VMCB controls updated by the proces [...]
new 31031098feb9 KVM: nSVM: remove unnecessary if
new ffdf7f9e80ac KVM: nSVM: extract svm_set_gif
new 91b7130cb660 KVM: SVM: preserve VGIF across VMCB switch
new 36e2e98363e6 KVM: nSVM: synthesize correct EXITINTINFO on vmexit
new e9fd761a46b8 KVM: nSVM: remove HF_VINTR_MASK
new 08245e6d2e58 KVM: nSVM: remove HF_HIF_MASK
new ca46d739e3ca KVM: nSVM: split nested_vmcb_check_controls
new c513f484c558 KVM: nSVM: leave guest mode when clearing EFER.SVME
new 929d1cfaa692 KVM: MMU: pass arbitrary CR0/CR4/EFER to kvm_init_shadow_mmu
new ed8812973386 selftests: kvm: introduce cpu_has_svm() check
new 10b910cb7ede selftests: kvm: add a SVM version of state-test
new 8ec107c89b19 selftests: kvm: fix smm test on SVM
new cc440cdad5b7 KVM: nSVM: implement KVM_GET_NESTED_STATE and KVM_SET_NEST [...]
new a8387d0b471f Revert "KVM: No need to retry for hva_to_pfn_remapped()"
new f4a9fdd5f12a KVM: VMX: Replace zero-length array with flexible-array
new 84b09f33a5de Revert "KVM: async_pf: Fix #DF due to inject "Page not Pre [...]
new 68fd66f100d1 KVM: x86: extend struct kvm_vcpu_pv_apf_data with token info
new 7c0ade6c9023 KVM: rename kvm_arch_can_inject_async_page_present() to kv [...]
new 0958f0cefede KVM: introduce kvm_read_guest_offset_cached()
new 2635b5c4a0e4 KVM: x86: interrupt based APF 'page ready' event delivery
new 557a961abbe0 KVM: x86: acknowledgment mechanism for async pf page ready [...]
new 72de5fa4c161 KVM: x86: announce KVM_FEATURE_ASYNC_PF_INT
new cbd717585b80 KVM: x86/pmu: Tweak kvm_pmu_get_msr to pass 'struct msr_data' in
new 27461da31089 KVM: x86/pmu: Support full width counting
new f7d31e65368a x86/kvm/hyper-v: Explicitly align hcall param for kvm_hyperv_exit
new 850448f35aaf KVM: nVMX: Fix VMX preemption timer migration
new 8d7fbf01f9af KVM: selftests: VMX preemption timer migration test
new 22ad0026d097 x86/hyper-v: Add synthetic debugger definitions
new f97f5a56f597 x86/kvm/hyper-v: Add support for synthetic debugger interface
new 45c38973ed18 x86/kvm/hyper-v: enable hypercalls regardless of hypercall page
new b187038b5e3f x86/kvm/hyper-v: Add support for synthetic debugger via hy [...]
new fb0cb6a8211c KVM: selftests: update hyperv_cpuid with SynDBG tests
new 09d952c971a5 KVM: check userspace_addr for all memslots
new 9ed24f4b712b KVM: arm64: Move virt/kvm/arm to arch/arm64
new d82755b2e781 KVM: arm64: Kill off CONFIG_KVM_ARM_HOST
new bf7bc1df30f6 KVM: arm64: Update help text
new f26133624d60 KVM: arm64: Change CONFIG_KVM to a menuconfig entry
new 25357de01b95 KVM: arm64: Clean up kvm makefiles
new c6fe89ff8b25 KVM: arm64: Simplify __kvm_timer_set_cntvoff implementation
new ce6f8f02f9f6 KVM: arm64: Use cpus_have_final_cap for has_vhe()
new 656012c731fc KVM: Fix spelling in code comments
new 892713e97ca1 KVM: arm64: Sidestep stage2_unmap_vm() on vcpu reset when [...]
new 48c963e31bc6 KVM: arm/arm64: Release kvm->mmu_lock in loop to prevent s [...]
new 9f2836146b11 KVM: arm64: Clean up the checking for huge mapping
new 0529c9021252 KVM: arm64: Unify handling THP backed host memory
new c862626e19ef KVM: arm64: Support enabling dirty log gradually in small chunks
new 5107000faa6e KVM: arm64: Make KVM_CAP_MAX_VCPUS compatible with the sel [...]
new 71b3ec5f221b KVM: arm64: Clean up cpu_init_hyp_mode()
new 438f711ce1d8 KVM: arm64: Fix incorrect comment on kvm_get_hyp_vector()
new 0a78791c0d12 KVM: arm64: Remove obsolete kvm_virt_to_phys abstraction
new fc5d1f1a42fb KVM: arm64: vgic-v3: Take cpu_if pointer directly instead of vcpu
new 7ea90bdd70c9 KVM: arm64: Refactor vcpu_{read,write}_sys_reg
new 7ccadf23b861 KVM: arm64: Add missing reset handlers for PMU emulation
new bb44a8dbea25 KVM: arm64: Move sysreg reset check to boot time
new 349c330ced97 KVM: arm64: Don't use empty structures as CPU reset state
new d9d7d84d9906 KVM: arm64: Parametrize exception entry with a target EL
new 8f7f4fe756bd KVM: arm64: Drop obsolete comment about sys_reg ordering
new 380609445cff Merge tag 'kvmarm-5.8' of git://git.kernel.org/pub/scm/lin [...]
new 45f08f4cd667 KVM: check userspace_addr for all memslots
new f0a5ec195817 Merge branch 'kvm-master' into HEAD
new 13ffbd8db1dd KVM: selftests: fix rdtsc() for vmx_tsc_adjust_test
new 039aeb9deb92 Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
The 313 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
Documentation/admin-guide/kernel-parameters.txt | 20 +
Documentation/dev-tools/kgdb.rst | 24 +
Documentation/virt/kvm/api.rst | 41 +-
Documentation/virt/kvm/cpuid.rst | 8 +-
Documentation/virt/kvm/msr.rst | 119 +++-
Documentation/virt/kvm/nested-vmx.rst | 5 +-
MAINTAINERS | 2 +-
arch/arm64/include/asm/kvm_asm.h | 4 +-
arch/arm64/include/asm/kvm_host.h | 46 +-
arch/arm64/include/asm/kvm_hyp.h | 12 +-
arch/arm64/include/asm/kvm_mmu.h | 4 +-
arch/arm64/include/asm/ptrace.h | 2 +-
arch/arm64/include/asm/virt.h | 2 +-
arch/arm64/kernel/asm-offsets.c | 2 +-
arch/arm64/kernel/cpu_errata.c | 2 +-
arch/arm64/kernel/smp.c | 2 +-
arch/arm64/kvm/Kconfig | 22 +-
arch/arm64/kvm/Makefile | 46 +-
{virt/kvm/arm => arch/arm64/kvm}/aarch32.c | 0
{virt/kvm/arm => arch/arm64/kvm}/arch_timer.c | 15 +-
{virt/kvm/arm => arch/arm64/kvm}/arm.c | 75 ++-
arch/arm64/kvm/guest.c | 29 +-
arch/arm64/kvm/handle_exit.c | 2 +-
arch/arm64/kvm/hyp/Makefile | 16 +-
{virt/kvm/arm => arch/arm64/kvm}/hyp/aarch32.c | 0
arch/arm64/kvm/hyp/switch.c | 8 +-
{virt/kvm/arm => arch/arm64/kvm}/hyp/timer-sr.c | 3 +-
{virt/kvm/arm => arch/arm64/kvm}/hyp/vgic-v3-sr.c | 39 +-
{virt/kvm/arm => arch/arm64/kvm}/hypercalls.c | 0
arch/arm64/kvm/inject_fault.c | 75 +--
{virt/kvm/arm => arch/arm64/kvm}/mmio.c | 2 +-
{virt/kvm/arm => arch/arm64/kvm}/mmu.c | 148 +++--
{virt/kvm/arm => arch/arm64/kvm}/perf.c | 0
virt/kvm/arm/pmu.c => arch/arm64/kvm/pmu-emul.c | 0
{virt/kvm/arm => arch/arm64/kvm}/psci.c | 6 +-
{virt/kvm/arm => arch/arm64/kvm}/pvtime.c | 0
arch/arm64/kvm/reset.c | 27 +-
arch/arm64/kvm/sys_regs.c | 212 ++++---
arch/arm64/kvm/trace.h | 216 +------
virt/kvm/arm/trace.h => arch/arm64/kvm/trace_arm.h | 11 +-
arch/arm64/kvm/{trace.h => trace_handle_exit.h} | 9 +-
arch/arm64/kvm/vgic-sys-reg-v3.c | 2 +-
{virt/kvm/arm => arch/arm64/kvm}/vgic/trace.h | 2 +-
{virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-debug.c | 0
{virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-init.c | 0
{virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-irqfd.c | 0
{virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-its.c | 0
.../arm => arch/arm64/kvm}/vgic/vgic-kvm-device.c | 0
.../kvm/arm => arch/arm64/kvm}/vgic/vgic-mmio-v2.c | 0
.../kvm/arm => arch/arm64/kvm}/vgic/vgic-mmio-v3.c | 0
{virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-mmio.c | 0
{virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-mmio.h | 0
{virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-v2.c | 10 +-
{virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-v3.c | 18 +-
{virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-v4.c | 0
{virt/kvm/arm => arch/arm64/kvm}/vgic/vgic.c | 25 +-
{virt/kvm/arm => arch/arm64/kvm}/vgic/vgic.h | 0
arch/mips/include/asm/kvm_host.h | 2 +
arch/mips/kvm/mips.c | 72 +--
arch/powerpc/include/asm/kvm_book3s.h | 2 +-
arch/powerpc/include/asm/kvm_host.h | 2 +-
arch/powerpc/kvm/book3s.c | 61 +-
arch/powerpc/kvm/book3s_hv.c | 23 +-
arch/powerpc/kvm/booke.c | 43 +-
arch/powerpc/kvm/powerpc.c | 5 +-
arch/s390/include/asm/kvm_host.h | 6 +-
arch/s390/kvm/interrupt.c | 2 +-
arch/s390/kvm/kvm-s390.c | 210 +++----
arch/s390/kvm/vsie.c | 3 +-
arch/s390/mm/gmap.c | 10 +-
arch/x86/Kconfig | 1 +
arch/x86/entry/entry_32.S | 8 -
arch/x86/entry/entry_64.S | 4 -
arch/x86/include/asm/hyperv-tlfs.h | 474 ++------------
arch/x86/include/asm/kvm_host.h | 136 ++--
arch/x86/include/asm/kvm_para.h | 27 +-
arch/x86/include/asm/svm.h | 9 +-
arch/x86/include/asm/vmx.h | 10 +-
arch/x86/include/asm/x86_init.h | 2 -
arch/x86/include/uapi/asm/kvm.h | 20 +-
arch/x86/include/uapi/asm/kvm_para.h | 17 +-
arch/x86/include/uapi/asm/vmx.h | 3 +
arch/x86/kernel/kvm.c | 172 +++--
arch/x86/kernel/traps.c | 2 -
arch/x86/kernel/x86_init.c | 1 -
arch/x86/kvm/cpuid.c | 15 +-
arch/x86/kvm/cpuid.h | 5 +
arch/x86/kvm/emulate.c | 2 +
arch/x86/kvm/hyperv.c | 199 +++++-
arch/x86/kvm/hyperv.h | 32 +
arch/x86/kvm/ioapic.h | 8 +-
arch/x86/kvm/irq.c | 3 +
arch/x86/kvm/irq.h | 15 +-
arch/x86/kvm/kvm_cache_regs.h | 10 +-
arch/x86/kvm/lapic.c | 95 ++-
arch/x86/kvm/lapic.h | 9 +-
arch/x86/kvm/mmu.h | 4 +-
arch/x86/kvm/mmu/mmu.c | 517 ++++++++-------
arch/x86/kvm/mmu/page_track.c | 4 +-
arch/x86/kvm/mmu/paging_tmpl.h | 20 +-
arch/x86/kvm/mmu_audit.c | 6 +-
arch/x86/kvm/pmu.c | 4 +-
arch/x86/kvm/pmu.h | 4 +-
arch/x86/kvm/svm/nested.c | 698 ++++++++++++++-------
arch/x86/kvm/svm/pmu.c | 7 +-
arch/x86/kvm/svm/svm.c | 368 ++++++-----
arch/x86/kvm/svm/svm.h | 57 +-
arch/x86/kvm/trace.h | 83 ++-
arch/x86/kvm/vmx/capabilities.h | 11 +
arch/x86/kvm/vmx/evmcs.c | 32 +-
arch/x86/kvm/vmx/nested.c | 693 ++++++++++++--------
arch/x86/kvm/vmx/nested.h | 49 +-
arch/x86/kvm/vmx/ops.h | 32 +-
arch/x86/kvm/vmx/pmu_intel.c | 71 ++-
arch/x86/kvm/vmx/vmcs.h | 2 +-
arch/x86/kvm/vmx/vmcs12.c | 4 -
arch/x86/kvm/vmx/vmcs12.h | 10 +-
arch/x86/kvm/vmx/vmenter.S | 14 +-
arch/x86/kvm/vmx/vmx.c | 538 ++++++++++------
arch/x86/kvm/vmx/vmx.h | 64 +-
arch/x86/kvm/x86.c | 601 +++++++++++-------
arch/x86/kvm/x86.h | 9 +-
arch/x86/mm/fault.c | 19 +
drivers/hv/channel.c | 58 +-
drivers/hv/channel_mgmt.c | 439 +++++++------
drivers/hv/connection.c | 58 +-
drivers/hv/hv.c | 16 +-
drivers/hv/hv_fcopy.c | 2 +-
drivers/hv/hv_snapshot.c | 2 +-
drivers/hv/hv_trace.h | 25 +-
drivers/hv/hyperv_vmbus.h | 81 ++-
drivers/hv/vmbus_drv.c | 314 ++++++---
drivers/net/hyperv/netvsc.c | 7 +-
drivers/pci/controller/pci-hyperv.c | 44 +-
drivers/scsi/storvsc_drv.c | 96 ++-
drivers/tty/serial/8250/8250_early.c | 23 +
drivers/tty/serial/amba-pl011.c | 32 +
drivers/tty/serial/kgdboc.c | 318 +++++++++-
drivers/tty/serial/qcom_geni_serial.c | 32 +
include/asm-generic/hyperv-tlfs.h | 497 +++++++++++++++
include/kvm/arm_vgic.h | 5 +-
include/linux/context_tracking.h | 21 +-
include/linux/hyperv.h | 68 +-
include/linux/irqflags.h | 6 +
include/linux/kdb.h | 2 +-
include/linux/kgdb.h | 8 +-
include/linux/kvm_host.h | 27 +-
include/linux/mod_devicetable.h | 2 +-
include/linux/rcuwait.h | 32 +-
include/linux/sched.h | 1 +
include/uapi/linux/kvm.h | 14 +
kernel/debug/debug_core.c | 57 +-
kernel/debug/kdb/kdb_main.c | 11 +-
kernel/exit.c | 9 +-
kernel/locking/lockdep.c | 86 ++-
kernel/trace/trace_preemptirq.c | 39 ++
lib/Kconfig.kgdb | 18 +
lib/debug_locks.c | 2 +-
tools/arch/x86/include/uapi/asm/kvm.h | 1 +
tools/kvm/kvm_stat/kvm_stat | 84 ++-
tools/kvm/kvm_stat/kvm_stat.service | 16 +
tools/kvm/kvm_stat/kvm_stat.txt | 15 +-
tools/testing/selftests/kvm/.gitignore | 3 +-
tools/testing/selftests/kvm/Makefile | 5 +-
tools/testing/selftests/kvm/include/kvm_util.h | 30 +-
.../selftests/kvm/include/x86_64/processor.h | 11 +-
.../selftests/kvm/include/x86_64/svm_util.h | 10 +
tools/testing/selftests/kvm/include/x86_64/vmx.h | 27 +
tools/testing/selftests/kvm/lib/kvm_util.c | 154 ++---
.../testing/selftests/kvm/lib/kvm_util_internal.h | 8 +-
tools/testing/selftests/kvm/lib/s390x/processor.c | 5 +-
.../testing/selftests/kvm/set_memory_region_test.c | 408 ++++++++++++
tools/testing/selftests/kvm/x86_64/hyperv_cpuid.c | 103 +--
.../selftests/kvm/x86_64/set_memory_region_test.c | 141 -----
tools/testing/selftests/kvm/x86_64/smm_test.c | 19 +-
tools/testing/selftests/kvm/x86_64/state_test.c | 62 +-
.../kvm/x86_64/vmx_preemption_timer_test.c | 255 ++++++++
virt/kvm/async_pf.c | 15 +-
virt/kvm/coalesced_mmio.c | 2 +-
virt/kvm/eventfd.c | 4 +-
virt/kvm/kvm_main.c | 97 +--
181 files changed, 6897 insertions(+), 3984 deletions(-)
rename {virt/kvm/arm => arch/arm64/kvm}/aarch32.c (100%)
rename {virt/kvm/arm => arch/arm64/kvm}/arch_timer.c (98%)
rename {virt/kvm/arm => arch/arm64/kvm}/arm.c (94%)
rename {virt/kvm/arm => arch/arm64/kvm}/hyp/aarch32.c (100%)
rename {virt/kvm/arm => arch/arm64/kvm}/hyp/timer-sr.c (89%)
rename {virt/kvm/arm => arch/arm64/kvm}/hyp/vgic-v3-sr.c (95%)
rename {virt/kvm/arm => arch/arm64/kvm}/hypercalls.c (100%)
rename {virt/kvm/arm => arch/arm64/kvm}/mmio.c (98%)
rename {virt/kvm/arm => arch/arm64/kvm}/mmu.c (96%)
rename {virt/kvm/arm => arch/arm64/kvm}/perf.c (100%)
rename virt/kvm/arm/pmu.c => arch/arm64/kvm/pmu-emul.c (100%)
rename {virt/kvm/arm => arch/arm64/kvm}/psci.c (98%)
rename {virt/kvm/arm => arch/arm64/kvm}/pvtime.c (100%)
rename virt/kvm/arm/trace.h => arch/arm64/kvm/trace_arm.h (97%)
copy arch/arm64/kvm/{trace.h => trace_handle_exit.h} (95%)
rename {virt/kvm/arm => arch/arm64/kvm}/vgic/trace.h (93%)
rename {virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-debug.c (100%)
rename {virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-init.c (100%)
rename {virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-irqfd.c (100%)
rename {virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-its.c (100%)
rename {virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-kvm-device.c (100%)
rename {virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-mmio-v2.c (100%)
rename {virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-mmio-v3.c (100%)
rename {virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-mmio.c (100%)
rename {virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-mmio.h (100%)
rename {virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-v2.c (98%)
rename {virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-v3.c (97%)
rename {virt/kvm/arm => arch/arm64/kvm}/vgic/vgic-v4.c (100%)
rename {virt/kvm/arm => arch/arm64/kvm}/vgic/vgic.c (97%)
rename {virt/kvm/arm => arch/arm64/kvm}/vgic/vgic.h (100%)
create mode 100644 include/asm-generic/hyperv-tlfs.h
create mode 100644 tools/kvm/kvm_stat/kvm_stat.service
create mode 100644 tools/testing/selftests/kvm/set_memory_region_test.c
delete mode 100644 tools/testing/selftests/kvm/x86_64/set_memory_region_test.c
create mode 100644 tools/testing/selftests/kvm/x86_64/vmx_preemption_timer_test.c
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.