This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_bmk_gnu_tk1/gnu-release-arm-spec2k6-O3_VECT
in repository toolchain/ci/binutils-gdb.
from 70cfd17bbd Automatic date update in version.in
adds a035f1f8e7 Automatic date update in version.in
adds b7f12798a5 Automatic date update in version.in
adds b8244b33a0 Automatic date update in version.in
adds 61b0daa408 Automatic date update in version.in
adds 786735af68 Automatic date update in version.in
adds cdc39779b6 Automatic date update in version.in
adds 86f474b5ff Automatic date update in version.in
No new revisions were added by this update.
Summary of changes:
bfd/version.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_bmk_gnu_tk1/gnu-release-arm-spec2k6-O3_VECT
in repository toolchain/ci/base-artifacts.
discards a95b68507 0: update: binutils-gcc-linux-glibc: 1
new f3afd4a5c 0: update: binutils-gcc-linux-glibc: 1
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (a95b68507)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_bmk_gnu_tk1/gnu-release- [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log.xz | Bin 1560 -> 1592 bytes
02-prepare_abe/console.log.xz | Bin 2780 -> 2764 bytes
03-build_abe-binutils/console.log.xz | Bin 41980 -> 42148 bytes
04-build_abe-stage1/console.log.xz | Bin 85680 -> 86144 bytes
05-clean_sysroot/console.log.xz | Bin 336 -> 336 bytes
06-build_abe-linux/console.log.xz | Bin 8952 -> 8032 bytes
07-build_abe-glibc/console.log.xz | Bin 224932 -> 226744 bytes
08-build_abe-stage2/console.log.xz | Bin 205716 -> 207136 bytes
09-benchmark/benchmark-build.log | 72 +-
09-benchmark/benchmark.log | 70 +-
09-benchmark/console.log.xz | Bin 3116 -> 3108 bytes
10-check_regression/console.log.xz | Bin 1832 -> 2048 bytes
10-check_regression/results-0.csv | 37026 +++++++++++++++----------------
10-check_regression/results-1.csv | 37048 ++++++++++++++++----------------
10-check_regression/results-brief.csv | 32 +-
10-check_regression/results-full.csv | 90 +-
10-check_regression/results.csv | 88 +-
10-check_regression/results.log | 20 +-
11-update_baseline/console.log | 984 +-
11-update_baseline/results-0.csv | 37026 +++++++++++++++----------------
11-update_baseline/results-1.csv | 37048 ++++++++++++++++----------------
11-update_baseline/results-brief.csv | 32 +-
11-update_baseline/results-full.csv | 90 +-
11-update_baseline/results.csv | 88 +-
11-update_baseline/results.log | 20 +-
jenkins/manifest.sh | 22 +-
results | 2 +-
results_id | 2 +-
28 files changed, 74978 insertions(+), 74782 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository linux.
from cc0356d6a02e Merge tag 'x86_core_for_v5.16_rc1' of git://git.kernel.org [...]
new 0e96dc47b95a ahci: remove duplicated PCI device IDs
new 8c0ff6af6823 Add AHCI support for ASM1062+JBM575 cards
new f971a85439bd libata: fix checking of DMA state
new 6ac586f2e716 libata-scsi: fix checking of DMA state
new 47b320498c3b pata_ali: fix checking of DMA state
new 2367ad63a131 pata_amd: fix checking of DMA state
new 492402ce7077 pata_optidma: fix checking of DMA state
new 1af5f7af2484 pata_radisys: fix checking of DMA state
new 61f90a8e8068 Merge tag 'libata-5.16-rc1' of git://git.kernel.org/pub/sc [...]
new eb0782bbdfd0 ima: fix deadlock when traversing "ima_default_rules".
new 30d8764a744f ima: fix uid code style problems
new 40224c41661b ima: add gid support
new 61868acb0728 ima_policy: Remove duplicate 'the' in docs comment
new cc4299ea0399 ima: Use strscpy instead of strlcpy
new 32ba540f3c2a evm: mark evm_fixmode as __ro_after_init
new c150d66bd514 Merge tag 'integrity-v5.16' of git://git.kernel.org/pub/sc [...]
new 9980c4251f8d printk: use kvmalloc instead of kmalloc for devkmsg_user
new 5aa7eea9316c printk: avoid -Wsometimes-uninitialized warning
new 264a750472ea printk: use gnu_printf format attribute for printk_sprint()
new c15b5fc054c3 ia64: don't do IA64_CMPXCHG_DEBUG without CONFIG_PRINTK
new 24a1dffbecaf lib/vsprintf.c: Amend static asserts for format specifier flags
new c666d447e091 test_printf: Make pft array const
new a25a0854a226 test_printf: Remove separate page_flags variable
new 5b358b0de963 test_printf: Remove custom appending of '|'
new 507f98603607 test_printf: Append strings more efficiently
new 23efd0804c0a vsprintf: Make %pGp print the hex value
new 6a7ca80f4033 vsprintf: Update %pGp documentation about that it prints h [...]
new 40e64a88dadc Merge branch 'for-5.16-vsprintf-pgp' into for-linus
new 0aaa58eca65a Merge tag 'printk-for-5.16' of git://git.kernel.org/pub/sc [...]
new 7117dccaa014 Merge remote-tracking branch 'tip/x86/sev' into hyperv-next
new e82f2069b52f Merge remote-tracking branch 'tip/x86/cc' into hyperv-next
new 0cc4f6d9f0b9 x86/hyperv: Initialize GHCB page in Isolation VM
new af788f355e34 x86/hyperv: Initialize shared memory boundary in the Isola [...]
new 810a52126502 x86/hyperv: Add new hvcall guest address host visibility support
new d4dccf353db8 Drivers: hv: vmbus: Mark vmbus ring buffer visible to host [...]
new faff44069ff5 x86/hyperv: Add Write/Read MSR registers via ghcb page
new 20c89a559e00 x86/hyperv: Add ghcb hvcall support for SNP VM
new f2f136c05fb6 Drivers: hv: vmbus: Add SNP support for VMbus channel init [...]
new 9a8797722e42 Drivers: hv: vmbus: Initialize VMbus ring buffer for Isolation VM
new 20cf6616ccd5 Drivers: hv: vmbus: Remove unused code to check for subchannels
new c5989b92fdd0 x86/hyperv: Remove duplicated include in hv_init
new 0b9060852344 x86/hyperv: Remove duplicate include
new 01ccca3cb50d Drivers: hv : vmbus: Adding NULL pointer check
new 285f68afa8b2 x86/hyperv: Protect set_hv_tscchange_cb() against getting [...]
new 44261f8e287d Merge tag 'hyperv-next-signed-20211102' of git://git.kerne [...]
new 64c785082c21 KVM: nVMX: Use INVALID_GPA for pointers used in nVMX.
new feb3162f9deb KVM: nVMX: Reset vmxon_ptr upon VMXOFF emulation.
new 11476d277e06 KVM: use vma_pages() helper
new 6470accc7ba9 KVM: x86: hyper-v: Avoid calling kvm_make_vcpus_request_ma [...]
new ae0946cd3601 KVM: Optimize kvm_make_vcpus_request_mask() a bit
new 381cecc5d7b7 KVM: Drop 'except' parameter from kvm_make_vcpus_request_mask()
new baff59ccdc65 KVM: Pre-allocate cpumasks for kvm_make_all_cpus_request_except()
new 620b2438abf9 KVM: Make kvm_make_vcpus_request_mask() use pre-allocated [...]
new 1e254d0d86a0 Revert "x86/kvm: fix vcpu-id indexed array sizes"
new a1c42ddedf35 kvm: rename KVM_MAX_VCPU_ID to KVM_MAX_VCPU_IDS
new 15cabbc259f2 KVM: x86: Subsume nested GPA read helper into load_pdptrs()
new 94c641ba7a89 KVM: x86: Simplify retrieving the page offset when loading PDTPRs
new ff8828c84f93 KVM: x86: Do not mark all registers as avail/dirty during [...]
new 5ebbc470d7f3 KVM: x86: Remove defunct setting of CR0.ET for guests duri [...]
new e8f65b9bb483 KVM: x86: Remove defunct setting of XCR0 for guest during [...]
new 583d369b36a9 KVM: x86: Fold fx_init() into kvm_arch_vcpu_create()
new d06567353e12 KVM: VMX: Drop explicit zeroing of MSR guest values at vCP [...]
new 06692e4b8055 KVM: VMX: Move RESET emulation to vmx_vcpu_reset()
new 9ebe530b9f5d KVM: SVM: Move RESET emulation to svm_vcpu_reset()
new 62dd57dd67d7 KVM: x86: WARN on non-zero CRs at RESET to detect improper [...]
new 25b9784586a4 KVM: x86: Manually retrieve CPUID.0x1 when getting FMS for [...]
new d22869aff4dc kvm: selftests: Fix spelling mistake "missmatch" -> "mismatch"
new 22d7108ce472 KVM: selftests: Fix kvm_vm_free() in cr4_cpuid_sync and vm [...]
new c6cecc4b9324 KVM: x86/mmu: Complete prefetch for trailing SPTEs for dir [...]
new bd047e544089 KVM: X86: Don't flush current tlb on shadow page modification
new 06152b2dec3e KVM: X86: Remove kvm_mmu_flush_or_zap()
new c3e5e415bc1e KVM: X86: Change kvm_sync_page() to return true when remot [...]
new 5591c0694d85 KVM: X86: Zap the invalid list after remote tlb flushing
new cc2a8e66bbcd KVM: X86: Remove FNAME(update_pte)
new f1c4a88c41ea KVM: X86: Don't unsync pagetables when speculative
new 8b8f9d753b84 KVM: X86: Don't check unsync if the original spte is writible
new 515a0c79e796 kvm: irqfd: avoid update unmodified entries of the routing
new 0226a45c468f KVM: x86: nSVM: don't copy pause related settings
new 4c84926e229e KVM: x86: SVM: add module param to control LBR virtualization
new 36e8194dcd74 KVM: x86: SVM: don't set VMLOAD/VMSAVE intercepts on vCPU reset
new f800650a4ed2 KVM: x86: SVM: add module param to control TSC scaling
new 5228eb96a487 KVM: x86: nSVM: implement nested TSC scaling
new 3e44dce4d0ae KVM: X86: Move PTE present check from loop body to __shado [...]
new 6b6fcd2804a2 kvm: x86: abstract locking around pvclock_update_vm_gtod_copy
new 45e6c2fac097 KVM: x86: extract KVM_GET_CLOCK/KVM_SET_CLOCK to separate [...]
new 55c0cefbdbda KVM: x86: Fix potential race in KVM_GET_CLOCK
new d055f028a533 KVM: MMU: pass unadulterated gpa to direct_page_fault
new 6defd9bb178c KVM: MMU: Introduce struct kvm_page_fault
new c501040abc42 KVM: MMU: change mmu->page_fault() arguments to kvm_page_fault
new 4326e57ef40a KVM: MMU: change direct_page_fault() arguments to kvm_page_fault
new b8a5d5511515 KVM: MMU: change page_fault_handle_page_track() arguments [...]
new 3647cd04b7d0 KVM: MMU: change kvm_faultin_pfn() arguments to kvm_page_fault
new 3a13f4fea3c1 KVM: MMU: change handle_abnormal_pfn() arguments to kvm_pa [...]
new 43b74355ef8b KVM: MMU: change __direct_map() arguments to kvm_page_fault
new 9c03b1821a89 KVM: MMU: change FNAME(fetch)() arguments to kvm_page_fault
new 2f6305dd5676 KVM: MMU: change kvm_tdp_mmu_map() arguments to kvm_page_fault
new cdc47767a039 KVM: MMU: change tdp_mmu_map_handle_target_level() argumen [...]
new 3c8ad5a675d9 KVM: MMU: change fast_page_fault() arguments to kvm_page_fault
new 73a3c659478a KVM: MMU: change kvm_mmu_hugepage_adjust() arguments to kv [...]
new 536f0e6ace95 KVM: MMU: change disallowed_hugepage_adjust() arguments to [...]
new f0066d94c92d KVM: MMU: change tracepoints arguments to kvm_page_fault
new b1a429fb1801 KVM: x86/mmu: Verify shadow walk doesn't terminate early i [...]
new 68be1306caea KVM: x86/mmu: Fold rmap_recycle into rmap_add
new bcc4f2bc5026 KVM: MMU: mark page dirty in make_spte
new 6ccf44388206 KVM: MMU: unify tdp_mmu_map_set_spte_atomic and tdp_mmu_se [...]
new e710c5f6be0e KVM: x86/mmu: Pass the memslot around via struct kvm_page_fault
new 888104138cb8 KVM: x86/mmu: Avoid memslot lookup in page_fault_handle_pa [...]
new d786c7783b01 KVM: MMU: inline set_spte in mmu_set_spte
new 4758d47e0d68 KVM: MMU: inline set_spte in FNAME(sync_page)
new ad67e4806e4c KVM: MMU: clean up make_spte return value
new eb5cd7ffe142 KVM: MMU: remove unnecessary argument to mmu_set_spte
new 87e888eafd5b KVM: MMU: set ad_disabled in TDP MMU role
new 7158bee4b475 KVM: MMU: pass kvm_mmu_page struct to make_spte
new a12f43818b3f KVM: MMU: pass struct kvm_page_fault to mmu_set_spte
new 8a9f566ae4a4 KVM: x86/mmu: Avoid memslot lookup in rmap_add
new 53597858dbf8 KVM: x86/mmu: Avoid memslot lookup in make_spte and mmu_tr [...]
new b73a54321ad8 KVM: x86: Expose Predictive Store Forwarding Disable
new 78b497f2e62d kvm: use kvfree() in kvm_arch_free_vm()
new 174a921b6975 nSVM: Check for reserved encodings of TLB_CONTROL in nested VMCB
new e9d0c0c4f7ea KVM: x86: add config for non-kvm users of page tracking
new deae4a10f166 KVM: x86: only allocate gfn_track when necessary
new 3f2401f47d29 RISC-V: Add hypervisor extension related CSR defines
new 99cdc6c18c2d RISC-V: Add initial skeletal KVM support
new a33c72faf2d7 RISC-V: KVM: Implement VCPU create, init and destroy functions
new cce69aff689e RISC-V: KVM: Implement VCPU interrupts and requests handling
new 92ad82002c39 RISC-V: KVM: Implement KVM_GET_ONE_REG/KVM_SET_ONE_REG ioctls
new 34bde9d8b9e6 RISC-V: KVM: Implement VCPU world-switch
new 9f7013265112 RISC-V: KVM: Handle MMIO exits for VCPU
new 5a5d79acd7da RISC-V: KVM: Handle WFI exits for VCPU
new fd7bb4a251df RISC-V: KVM: Implement VMID allocator
new 9d05c1fee837 RISC-V: KVM: Implement stage2 page table programming
new 9955371cc014 RISC-V: KVM: Implement MMU notifiers
new 3a9f66cb25e1 RISC-V: KVM: Add timer functionality
new 5de52d4a23ad RISC-V: KVM: FP lazy save/restore
new 4d9c5c072f03 RISC-V: KVM: Implement ONE REG interface for FP registers
new dea8ee31a039 RISC-V: KVM: Add SBI v0.1 support
new da40d8580593 RISC-V: KVM: Document RISC-V specific parts of KVM API
new 24b699d12c34 RISC-V: KVM: Add MAINTAINERS entry
new 542a2640a2f4 Merge tag 'kvm-riscv-5.16-1' of git://github.com/kvm-riscv [...]
new a7cc099f2ec3 KVM: x86/mmu: kvm_faultin_pfn has to return false if pfh i [...]
new a25c78d04c1b Merge commit 'kvm-pagedata-alloc-fixes' into HEAD
new 3d5e7a28b1ea KVM: x86: avoid warning with -Wbitwise-instead-of-logical
new c68dc1b577ea KVM: x86: Report host tsc and realtime values in KVM_GET_CLOCK
new 869b44211adc kvm: x86: protect masterclock with a seqcount
new 58d4277be9b6 KVM: x86: Refactor tsc synchronization code
new 828ca89628bf KVM: x86: Expose TSC offset controls to userspace
new 500065393400 tools: arch: x86: pull in pvclock headers
new 61fb1c54853d selftests: KVM: Add test for KVM_{GET,SET}_CLOCK
new c1901feef5bb selftests: KVM: Fix kvm device helper ioctl assertions
new c89551345326 selftests: KVM: Add helpers for vCPU device attributes
new 3f9808cac06c selftests: KVM: Introduce system counter offset test
new 1e76a3ce0d3c KVM: cleanup allocation of rmaps and page tracking data
new 2839180ce5bb KVM: x86/mmu: clean up prefetch/prefault/speculative naming
new 2e6e0d683b77 KVM: VMX: Restore host's MSR_IA32_RTIT_CTL when it's not zero
new ba51d627230f KVM: VMX: Use precomputed vmx->pt_desc.addr_range
new f4d3a902a558 KVM: VMX: Rename pt_desc.addr_range to pt_desc.num_address_ranges
new e099f3eb0e91 KVM: VMX: RTIT_CTL_BRANCH_EN has no dependency on other CPUID bit
new 610265ea3da1 KVM: x86/mmu: Rename slot_handle_leaf to slot_handle_level_4k
new 540c7abe61cc KVM: vPMU: Fill get_msr MSR_CORE_PERF_GLOBAL_OVF_CTRL w/ 0
new 4dfe4f40d845 kvm: x86: mmu: Make NX huge page recovery period configurable
new 9dadfc4a6145 KVM: x86: Add vendor name to kvm_x86_ops, use it for error [...]
new 9ae7f6c9b51e KVM: emulate: Comment on difference between RDPMC implemen [...]
new 413eaa4ecd0f KVM: selftests: set CPUID before setting sregs in vcpu creation
new 552617382c19 KVM: X86: Don't reset mmu context when X86_CR4_PCIDE 1->0
new a91a7c709600 KVM: X86: Don't reset mmu context when toggling X86_CR4_PGE
new e45e9e3998f0 KVM: X86: Fix tlb flush for tdp in kvm_invalidate_pcid()
new 509bfe3d9796 KVM: X86: Cache CR3 in prev_roots when PCID is disabled
new 264d3dc1d3dc KVM: X86: pair smp_wmb() of mmu_try_to_unsync_pages() with [...]
new 61b05a9fd4ae KVM: X86: Don't unload MMU in kvm_vcpu_flush_tlb_guest()
new bc3b3c1002ea KVM: x86/mmu: Drop a redundant, broken remote TLB flush
new e8be2a5ba86c KVM: x86/mmu: Drop a redundant remote TLB flush in kvm_zap [...]
new 21fa324654e4 KVM: x86/mmu: Extract zapping of rmaps for gfn range to se [...]
new 9b4eb77099f6 riscv: do not select non-existing config ANON_INODES
new ee49a8932971 KVM: x86: Move SVM's APICv sanity check to common x86
new 187c8833def8 KVM: x86: Use rw_semaphore for APICv lock to allow vCPU pa [...]
new 6ff53f6a438f x86/irq: Ensure PI wakeup handler is unregistered before m [...]
new ec5a4919fa7b KVM: VMX: Unregister posted interrupt wakeup handler on ha [...]
new dfd3c713a9c8 kvm: x86: Remove stale declaration of kvm_no_apic_vcpu
new ed290e1c20da KVM: selftests: Fix nested SVM tests when built with clang
new a9d496d8e08c KVM: x86: Clarify the kvm_run.emulation_failure structure layout
new 0a62a0319abb KVM: x86: Get exit_reason as part of kvm_x86_ops.get_exit_info
new e615e355894e KVM: x86: On emulation failure, convey the exit reason, et [...]
new 0d7d84498fb4 KVM: x86: SGX must obey the KVM_INTERNAL_ERROR_EMULATION protocol
new e59f3e5d4521 Merge branch 'kvm-pvclock-raw-spinlock' into HEAD
new a78738ed1d9b KVM: arm64: Turn __KVM_HOST_SMCCC_FUNC_* into an enum (mostly)
new 8f4566f18db5 arm64: Prevent kexec and hibernation if is_protected_kvm_e [...]
new 8579a185baca KVM: arm64: Reject stub hypercalls after pKVM has been ini [...]
new 2f2e1a506967 KVM: arm64: Propagate errors from __pkvm_prot_finalize hypercall
new 07036cffe17e KVM: arm64: Prevent re-finalisation of pKVM for a given CPU
new 057bed206f70 KVM: arm64: Disable privileged hypercalls after pKVM finalisation
new 3864d17f177e Merge branch kvm-arm64/pkvm/restrict-hypercalls into kvmar [...]
new f25c5e4dafd8 kvm: arm64: vgic: Introduce vgic_check_iorange
new 4612d98f58c7 KVM: arm64: vgic-v3: Check redist region is not above the [...]
new c56a87da0a7f KVM: arm64: vgic-v2: Check cpu interface region is not abo [...]
new 2ec02f6c64f0 KVM: arm64: vgic-v3: Check ITS region is not above the VM [...]
new 96e903896969 KVM: arm64: vgic: Drop vgic_check_ioaddr()
new 3f4db37e203b KVM: arm64: selftests: Make vgic_init gic version agnostic
new 46fb941bc04d KVM: arm64: selftests: Make vgic_init/vm_gic_create versio [...]
new c44df5f9ff31 KVM: arm64: selftests: Add some tests for GICv2 in vgic_init
new 2dcd9aa1c3a5 KVM: arm64: selftests: Add tests for GIC redist/cpuif part [...]
new 188345863897 KVM: arm64: selftests: Add test for legacy GICv3 REDIST ba [...]
new 3e197f17b23b KVM: arm64: selftests: Add init ITS device test
new 15f9017c28a8 Merge branch kvm-arm64/vgic-ipa-checks into kvmarm-master/next
new b6a68b97af23 KVM: arm64: Allow KVM to be disabled from the command line
new c8f1e9673406 KVM: arm64: Unconditionally include generic KVM's Kconfig
new e26bb75aa2f1 KVM: arm64: Depend on HAVE_KVM instead of OF
new a049cf7e63e7 Merge branch kvm-arm64/misc-5.16 into kvmarm-master/next
new 00d5101b254b KVM: arm64: Return early from read_id_reg() if register is RAZ
new 5a4309762356 KVM: arm64: Use get_raz_reg() for userspace reads of PMSWINC_EL0
new ebf6aa8c0473 KVM: arm64: Replace get_raz_id_reg() with get_raz_reg()
new 1eb07f4b6853 Merge branch kvm-arm64/raz-sysregs into kvmarm-master/next
new 53e8ce137f7b Documentation: admin-guide: Document side effects when pKV [...]
new cd67e9af7724 Merge branch kvm-arm64/pkvm/restrict-hypercalls into kvmar [...]
new 69adec18e94f KVM: arm64: Fix reporting of endianess when the access ori [...]
new 2a6bf5139e28 Merge branch kvm-arm64/misc-5.16 into kvmarm-master/next
new 562e530fd770 KVM: arm64: Force ID_AA64PFR0_EL1.GIC=1 when exposing a vi [...]
new df652bcf1136 KVM: arm64: vgic-v3: Work around GICv3 locally generated SErrors
new 0924729b21bf KVM: arm64: vgic-v3: Reduce common group trapping to ICV_D [...]
new f87ab6827222 KVM: arm64: vgic-v3: Don't advertise ICC_CTLR_EL1.SEIS
new 9d449c71bd8f KVM: arm64: vgic-v3: Align emulated cpuif LPI state machin [...]
new 20a304307596 Merge branch kvm-arm64/vgic-fixes-5.16 into kvmarm-master/next
new 88ec7e258b70 KVM: arm64: selftests: Add MMIO readl/writel support
new 272a067df3c8 tools: arm64: Import sysreg.h
new b3c79c6130bc KVM: arm64: selftests: Introduce ARM64_SYS_KVM_REG
new 740826ec02a6 KVM: arm64: selftests: Add support for cpu_relax
new d977ed399402 KVM: arm64: selftests: Add basic support for arch_timers
new 801669046559 KVM: arm64: selftests: Add basic support to generate delays
new 5c636d585cfd KVM: arm64: selftests: Add support to disable and enable l [...]
new 0226cd531c58 KVM: arm64: selftests: Maintain consistency for vcpuid type
new 17229bdc86c9 KVM: arm64: selftests: Add guest support to get the vcpuid
new 414de89df1ec KVM: arm64: selftests: Add light-weight spinlock support
new 28281652f90a KVM: arm64: selftests: Add basic GICv3 support
new 250b8d6cb3b0 KVM: arm64: selftests: Add host support for vGIC
new 4959d8650e9f KVM: arm64: selftests: Add arch_timer test
new 61f6fadbf9bd KVM: arm64: selftests: arch_timer: Support vCPU migration
new 551a13346e59 Merge branch kvm-arm64/selftest/timer into kvmarm-master/next
new 3ef231670b9e KVM: arm64: vgic: Add memcg accounting to vgic allocations
new 115bae923ac8 KVM: arm64: Add memcg accounting to KVM allocations
new 5f8b2591decb Merge branch kvm-arm64/memory-accounting into kvmarm-master/next
new 7dd9b5a15748 KVM: arm64: Move __get_fault_info() and co into their own [...]
new cc1e6fdfa92b KVM: arm64: Don't include switch.h into nvhe/kvm-main.c
new 8fb2046180a0 KVM: arm64: Move early handlers to per-EC handlers
new 3b1a690eda0d KVM: arm64: Pass struct kvm to per-EC handlers
new 538683907782 KVM: arm64: Add missing field descriptor for MDCR_EL2
new 16dd1fbb12f7 KVM: arm64: Simplify masking out MTE in feature id reg
new 6c30bfb18d0b KVM: arm64: Add handlers for protected VM System Registers
new 2a0c343386ae KVM: arm64: Initialize trap registers for protected VMs
new 72e1be120eaa KVM: arm64: Move sanitized copies of CPU features
new 1423afcb4117 KVM: arm64: Trap access to pVM restricted features
new 5f39efc42052 KVM: arm64: Handle protected guests at 32 bits
new 8a049862c38f KVM: arm64: Fix early exit ptrauth handling
new ce75916749b8 KVM: arm64: pkvm: Use a single function to expose all id-regs
new 8ffb41888334 KVM: arm64: pkvm: Make the ERR/ERX*_EL1 registers RAZ/WI
new 3c90cb15e2e6 KVM: arm64: pkvm: Drop AArch32-specific registers
new f3d5ccabab20 KVM: arm64: pkvm: Drop sysregs that should never be routed [...]
new cbca19738472 KVM: arm64: pkvm: Handle GICv3 traps as required
new 271b7286058d KVM: arm64: pkvm: Preserve pending SError on exit from AArch32
new 3061725d162c KVM: arm64: pkvm: Consolidate include files
new 746bdeadc53b KVM: arm64: pkvm: Move kvm_handle_pvm_restricted around
new 0c7639cc8382 KVM: arm64: pkvm: Pass vpcu instead of kvm to kvm_get_exit [...]
new 07305590114a KVM: arm64: pkvm: Give priority to standard traps over pvm [...]
new be08c3cf3c5a Merge branch kvm-arm64/pkvm/fixed-features into kvmarm-mas [...]
new ffb4ce3c4936 KVM: selftests: Make memslot_perf_test arch independent
new 358928fd5264 KVM: selftests: Build the memslot tests for arm64
new 5a2acbbb0179 Merge branch kvm/selftests/memslot into kvmarm-master/next
new 4e3386843325 Merge tag 'kvmarm-5.16' of git://git.kernel.org/pub/scm/li [...]
new 0a86512dc113 RISC-V: KVM: Factor-out FP virtualization into separate sources
new 7c8de080d476 RISC-V: KVM: Fix GPA passed to __kvm_riscv_hfence_gvma_xyz [...]
new 2d8fb8f3914b s390/gmap: validate VMA in __gmap_zap()
new b159f94c86b4 s390/gmap: don't unconditionally call pte_unmap_unlock() i [...]
new fe3d10024073 s390/mm: validate VMA in PGSTE manipulation functions
new 949f5c1244ee s390/mm: fix VMA and page table handling code in storage k [...]
new 46c22ffd2772 s390/uv: fully validate the VMA before calling follow_page()
new 8318c404cf8c s390/mm: no need for pte_alloc_map_lock() if we know the p [...]
new 7cb70266b0e3 s390/mm: optimize set_guest_storage_key()
new 14ea40e22c41 s390/mm: optimize reset_guest_reference_bit()
new 57c5df13eca4 KVM: s390: pv: add macros for UVC CC values
new d4074324b07a KVM: s390: pv: avoid double free of sida page
new 1e2aa46de526 KVM: s390: pv: avoid stalls for kvm_s390_pv_init_vm
new f0a1a0615a6f KVM: s390: pv: avoid stalls when making pages secure
new 8eeba194a32e KVM: s390: Simplify SIGP Set Arch handling
new 67cf68b6a5cc KVM: s390: Add a routine for setting userspace CPU state
new 85f517b29418 KVM: s390: Fix handle_sske page fault handling
new 380d97bd02fc KVM: s390: pv: properly handle page flags for protected guests
new 3fd8417f2c72 KVM: s390: add debug statement for diag 318 CPNC data
new 9c6eb531e760 Merge tag 'kvm-s390-next-5.16-1' of git://git.kernel.org/p [...]
new 7b161d9cab5d RISC-V: KVM: remove unneeded semicolon
new bbd5ba8db766 RISC-V: KVM: fix boolreturn.cocci warnings
new 52cf891d8dbd Merge tag 'kvm-riscv-5.16-2' of https://github.com/kvm-ris [...]
new d7e0a795bf37 Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
new dfbdcda280eb gcc-plugins: arm-ssp: Prepare for THREAD_INFO_IN_TASK support
new 19f29aebd929 ARM: smp: Pass task to secondary_start_kernel
new 3855ab614df4 ARM: smp: Free up the TLS register while running in the kernel
new 50596b7559bf ARM: smp: Store current pointer in TPIDRURO register if available
new 18ed1c01a7dd ARM: smp: Enable THREAD_INFO_IN_TASK
new 13a695aa50de Merge tag 'pr-arm32-ti-in-task' of git://git.kernel.org/pu [...]
new fa191b711c32 ARM: 9150/1: Fix PID_IN_CONTEXTIDR regression when THREAD_ [...]
new c1e42efacb9b ARM: 9151/1: Thumb2: avoid __builtin_thread_pointer() on Clang
new 9d6361922489 ARM: 9125/1: fix incorrect use of get_kernel_nofault()
new 54f5b3615f19 ARM: 9121/1: amba: Drop unused functions about APB/AHB dev [...]
new eb4f75691587 ARM: 9120/1: Revert "amba: make use of -1 IRQs warn"
new 854f695c3d41 ARM: 9119/1: amba: Properly handle device probe without IR [...]
new 1c1838757611 ARM: 9123/1: scoop: Drop if with an always false condition
new 48342ae751c7 ARM: 9124/1: uncompress: Parse "linux,usable-memory-range" [...]
new b8bc0e50a32a ARM: add __arm_iomem_set_ro() to write-protect ioremapped area
new 4aede550f104 ARM: imx6: mark OCRAM mapping read-only
new caed89dab0ca ARM: 9128/1: mm: Refactor the __do_page_fault()
new 488cab12c371 ARM: 9129/1: mm: Kill task_struct argument for __do_page_fault()
new f177b06ed7d5 ARM: 9127/1: mm: Cleanup access_error()
new 93d204384401 ARM: 9126/1: mm: Kill page table base print in show_pte()
new 2e707106fac7 ARM: 9130/1: mm: Provide die_kernel_fault() helper
new abc25bbcb55c ARM: 9131/1: mm: Fix PXN process with LPAE feature
new 20a451f8db4a ARM: 9101/1: sa1100/assabet: convert LEDs to gpiod APIs
new 3583ab228a30 ARM: 9135/1: kprobes: address gcc -Wempty-body warning
new 345dac33f588 ARM: 9136/1: ARMv7-M uses BE-8, not BE-32
new 8b5bd5adf9e6 ARM: 9137/1: disallow CONFIG_THUMB with ARMv4
new 336fe1d6c218 ARM: 9140/1: allow compile-testing without machine record
new c2e6df3eaaf1 ARM: 9142/1: kasan: work around LPAE build warning
new c6e77bb61a55 ARM: 9143/1: add CONFIG_PHYS_OFFSET default values
new ecb108e3e3f7 ARM: 9144/1: forbid ftrace with clang and thumb2_kernel
new ae3d6978aa84 ARM: 9145/1: patch: fix BE32 compilation
new 2abd6e34fcf3 ARM: 9146/1: RiscPC needs older gcc version
new 0e52fc2e7ddd ARM: 9147/1: add printf format attribute to early_print()
new 11779842dd6f Merge branches 'devel-stable' and 'misc' into for-linus
new ab2e7f4b46bf Merge tag 'for-linus' of git://git.armlinux.org.uk/~rmk/linux-arm
The 325 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
Documentation/ABI/testing/ima_policy | 8 +-
Documentation/admin-guide/kernel-parameters.txt | 15 +-
Documentation/core-api/printk-formats.rst | 2 +-
Documentation/virt/kvm/api.rst | 241 +++++-
Documentation/virt/kvm/devices/vcpu.rst | 70 ++
Documentation/virt/kvm/devices/xics.rst | 2 +-
Documentation/virt/kvm/devices/xive.rst | 2 +-
MAINTAINERS | 12 +
arch/arm/Kconfig | 19 +-
arch/arm/Makefile | 9 +-
arch/arm/boot/compressed/fdt_check_mem_start.c | 48 +-
arch/arm/common/scoop.c | 3 -
arch/arm/include/asm/assembler.h | 29 +
arch/arm/include/asm/current.h | 55 ++
arch/arm/include/asm/io.h | 1 +
arch/arm/include/asm/opcodes.h | 9 +-
arch/arm/include/asm/setup.h | 2 +-
arch/arm/include/asm/smp.h | 3 +-
arch/arm/include/asm/stackprotector.h | 2 -
arch/arm/include/asm/switch_to.h | 16 +
arch/arm/include/asm/thread_info.h | 26 +-
arch/arm/include/asm/tls.h | 10 +-
arch/arm/kernel/asm-offsets.c | 6 +-
arch/arm/kernel/entry-armv.S | 5 +
arch/arm/kernel/entry-common.S | 1 +
arch/arm/kernel/entry-header.S | 8 +
arch/arm/kernel/head-common.S | 5 +
arch/arm/kernel/head-nommu.S | 1 +
arch/arm/kernel/head.S | 5 +-
arch/arm/kernel/process.c | 8 +-
arch/arm/kernel/smp.c | 13 +-
arch/arm/kernel/vmlinux-xip.lds.S | 2 +
arch/arm/kernel/vmlinux.lds.S | 2 +
arch/arm/mach-imx/pm-imx6.c | 2 +
arch/arm/mach-sa1100/assabet.c | 24 +-
arch/arm/mm/Kconfig | 4 +-
arch/arm/mm/context.c | 2 +-
arch/arm/mm/fault.c | 119 +--
arch/arm/mm/fault.h | 4 +
arch/arm/mm/ioremap.c | 6 +
arch/arm/mm/kasan_init.c | 2 +-
arch/arm/mm/proc-macros.S | 3 +-
arch/arm/probes/kprobes/test-core.h | 2 +-
arch/arm64/Kconfig | 1 +
arch/arm64/include/asm/kvm_arm.h | 1 +
arch/arm64/include/asm/kvm_asm.h | 48 +-
arch/arm64/include/asm/kvm_emulate.h | 5 +-
arch/arm64/include/asm/kvm_host.h | 4 +-
arch/arm64/include/asm/kvm_hyp.h | 5 +
arch/arm64/include/asm/sysreg.h | 3 +
arch/arm64/kernel/smp.c | 3 +-
arch/arm64/kvm/Kconfig | 10 +-
arch/arm64/kvm/arm.c | 102 ++-
arch/arm64/kvm/hyp/include/hyp/fault.h | 75 ++
arch/arm64/kvm/hyp/include/hyp/switch.h | 235 +++---
arch/arm64/kvm/hyp/include/nvhe/fixed_config.h | 200 +++++
arch/arm64/kvm/hyp/include/nvhe/trap_handler.h | 2 +
arch/arm64/kvm/hyp/nvhe/Makefile | 2 +-
arch/arm64/kvm/hyp/nvhe/host.S | 26 +-
arch/arm64/kvm/hyp/nvhe/hyp-main.c | 48 +-
arch/arm64/kvm/hyp/nvhe/mem_protect.c | 11 +-
arch/arm64/kvm/hyp/nvhe/pkvm.c | 185 +++++
arch/arm64/kvm/hyp/nvhe/setup.c | 3 +
arch/arm64/kvm/hyp/nvhe/switch.c | 99 +++
arch/arm64/kvm/hyp/nvhe/sys_regs.c | 487 ++++++++++++
arch/arm64/kvm/hyp/vgic-v3-sr.c | 22 +-
arch/arm64/kvm/hyp/vhe/switch.c | 16 +
arch/arm64/kvm/mmu.c | 2 +-
arch/arm64/kvm/pmu-emul.c | 2 +-
arch/arm64/kvm/reset.c | 2 +-
arch/arm64/kvm/sys_regs.c | 41 +-
arch/arm64/kvm/vgic/vgic-init.c | 2 +-
arch/arm64/kvm/vgic/vgic-irqfd.c | 2 +-
arch/arm64/kvm/vgic/vgic-its.c | 18 +-
arch/arm64/kvm/vgic/vgic-kvm-device.c | 25 +-
arch/arm64/kvm/vgic/vgic-mmio-v3.c | 8 +-
arch/arm64/kvm/vgic/vgic-v3.c | 27 +-
arch/arm64/kvm/vgic/vgic-v4.c | 2 +-
arch/arm64/kvm/vgic/vgic.h | 5 +-
arch/ia64/Kconfig.debug | 2 +-
arch/mips/kvm/mips.c | 2 +-
arch/powerpc/include/asm/kvm_book3s.h | 2 +-
arch/powerpc/include/asm/kvm_host.h | 4 +-
arch/powerpc/kvm/book3s_xive.c | 2 +-
arch/powerpc/kvm/powerpc.c | 2 +-
arch/riscv/Kconfig | 2 +
arch/riscv/Makefile | 1 +
arch/riscv/include/asm/csr.h | 87 +++
arch/riscv/include/asm/kvm_host.h | 264 +++++++
arch/riscv/include/asm/kvm_types.h | 7 +
arch/riscv/include/asm/kvm_vcpu_fp.h | 59 ++
arch/riscv/include/asm/kvm_vcpu_timer.h | 44 ++
arch/riscv/include/uapi/asm/kvm.h | 128 ++++
arch/riscv/kernel/asm-offsets.c | 156 ++++
arch/riscv/kvm/Kconfig | 35 +
arch/riscv/kvm/Makefile | 26 +
arch/riscv/kvm/main.c | 118 +++
arch/riscv/kvm/mmu.c | 802 ++++++++++++++++++++
arch/riscv/kvm/tlb.S | 74 ++
arch/riscv/kvm/vcpu.c | 825 +++++++++++++++++++++
arch/riscv/kvm/vcpu_exit.c | 701 +++++++++++++++++
arch/riscv/kvm/vcpu_fp.c | 167 +++++
arch/riscv/kvm/vcpu_sbi.c | 185 +++++
arch/riscv/kvm/vcpu_switch.S | 400 ++++++++++
arch/riscv/kvm/vcpu_timer.c | 225 ++++++
arch/riscv/kvm/vm.c | 97 +++
arch/riscv/kvm/vmid.c | 120 +++
arch/s390/include/asm/pgtable.h | 9 +-
arch/s390/include/asm/uv.h | 15 +-
arch/s390/kernel/uv.c | 65 +-
arch/s390/kvm/intercept.c | 5 +
arch/s390/kvm/kvm-s390.c | 7 +-
arch/s390/kvm/kvm-s390.h | 9 +
arch/s390/kvm/priv.c | 2 +
arch/s390/kvm/pv.c | 21 +-
arch/s390/kvm/sigp.c | 14 +-
arch/s390/mm/gmap.c | 15 +-
arch/s390/mm/pgtable.c | 109 ++-
arch/x86/hyperv/Makefile | 2 +-
arch/x86/hyperv/hv_init.c | 82 +-
arch/x86/hyperv/ivm.c | 289 ++++++++
arch/x86/include/asm/hyperv-tlfs.h | 17 +
arch/x86/include/asm/kvm_host.h | 48 +-
arch/x86/include/asm/kvm_page_track.h | 11 +-
arch/x86/include/asm/mshyperv.h | 70 +-
arch/x86/include/uapi/asm/kvm.h | 4 +
arch/x86/kernel/cpu/mshyperv.c | 5 +
arch/x86/kernel/irq.c | 4 +-
arch/x86/kvm/Kconfig | 3 +
arch/x86/kvm/cpuid.c | 10 +-
arch/x86/kvm/emulate.c | 5 +
arch/x86/kvm/hyperv.c | 22 +-
arch/x86/kvm/ioapic.c | 2 +-
arch/x86/kvm/ioapic.h | 4 +-
arch/x86/kvm/mmu.h | 114 ++-
arch/x86/kvm/mmu/mmu.c | 702 +++++++++---------
arch/x86/kvm/mmu/mmu_internal.h | 21 +-
arch/x86/kvm/mmu/mmutrace.h | 18 +-
arch/x86/kvm/mmu/page_track.c | 49 +-
arch/x86/kvm/mmu/paging_tmpl.h | 168 ++---
arch/x86/kvm/mmu/spte.c | 34 +-
arch/x86/kvm/mmu/spte.h | 21 +-
arch/x86/kvm/mmu/tdp_mmu.c | 119 +--
arch/x86/kvm/mmu/tdp_mmu.h | 6 +-
arch/x86/kvm/svm/nested.c | 52 +-
arch/x86/kvm/svm/sev.c | 6 +-
arch/x86/kvm/svm/svm.c | 168 +++--
arch/x86/kvm/svm/svm.h | 9 +-
arch/x86/kvm/trace.h | 9 +-
arch/x86/kvm/vmx/nested.c | 63 +-
arch/x86/kvm/vmx/pmu_intel.c | 6 +-
arch/x86/kvm/vmx/sgx.c | 16 +-
arch/x86/kvm/vmx/vmx.c | 136 ++--
arch/x86/kvm/vmx/vmx.h | 2 +-
arch/x86/kvm/x86.c | 800 ++++++++++++--------
arch/x86/kvm/x86.h | 2 -
arch/x86/mm/pat/set_memory.c | 23 +-
drivers/amba/bus.c | 100 +--
drivers/ata/ahci.c | 13 +-
drivers/ata/libata-core.c | 2 +-
drivers/ata/libata-scsi.c | 4 +-
drivers/ata/pata_ali.c | 4 +-
drivers/ata/pata_amd.c | 2 +-
drivers/ata/pata_optidma.c | 4 +-
drivers/ata/pata_radisys.c | 4 +-
drivers/clocksource/timer-riscv.c | 9 +
drivers/gpu/drm/i915/Kconfig | 1 +
drivers/hv/Kconfig | 1 +
drivers/hv/channel.c | 72 +-
drivers/hv/channel_mgmt.c | 34 -
drivers/hv/connection.c | 101 ++-
drivers/hv/hv.c | 82 +-
drivers/hv/hv_common.c | 12 +
drivers/hv/hyperv_vmbus.h | 2 +
drivers/hv/ring_buffer.c | 57 +-
drivers/net/hyperv/hyperv_net.h | 5 +-
drivers/net/hyperv/netvsc.c | 15 +-
drivers/of/platform.c | 6 +-
drivers/uio/uio_hv_generic.c | 18 +-
include/asm-generic/hyperv-tlfs.h | 1 +
include/asm-generic/mshyperv.h | 20 +-
include/clocksource/timer-riscv.h | 16 +
include/linux/amba/bus.h | 18 -
include/linux/hyperv.h | 25 +-
include/linux/kvm_host.h | 18 +-
include/uapi/linux/kvm.h | 29 +-
kernel/printk/index.c | 5 +-
kernel/printk/printk.c | 5 +-
lib/test_printf.c | 61 +-
lib/vsprintf.c | 11 +-
mm/debug.c | 2 +-
mm/memory-failure.c | 8 +-
mm/page_owner.c | 4 +-
mm/slub.c | 4 +-
scripts/gcc-plugins/arm_ssp_per_task_plugin.c | 27 +-
security/integrity/evm/evm_main.c | 2 +-
security/integrity/ima/ima_api.c | 2 +-
security/integrity/ima/ima_policy.c | 243 ++++--
{arch => tools/arch}/arm64/include/asm/sysreg.h | 50 +-
{arch => tools/arch}/x86/include/asm/pvclock-abi.h | 0
tools/arch/x86/include/asm/pvclock.h | 103 +++
tools/testing/selftests/kvm/.gitignore | 3 +
tools/testing/selftests/kvm/Makefile | 7 +-
tools/testing/selftests/kvm/aarch64/arch_timer.c | 479 ++++++++++++
.../selftests/kvm/aarch64/debug-exceptions.c | 30 +-
.../selftests/kvm/aarch64/psci_cpu_on_test.c | 2 +-
tools/testing/selftests/kvm/aarch64/vgic_init.c | 369 ++++++---
.../selftests/kvm/include/aarch64/arch_timer.h | 142 ++++
.../testing/selftests/kvm/include/aarch64/delay.h | 25 +
tools/testing/selftests/kvm/include/aarch64/gic.h | 21 +
.../selftests/kvm/include/aarch64/processor.h | 90 ++-
.../selftests/kvm/include/aarch64/spinlock.h | 13 +
tools/testing/selftests/kvm/include/aarch64/vgic.h | 20 +
tools/testing/selftests/kvm/include/kvm_util.h | 13 +
tools/testing/selftests/kvm/kvm_create_max_vcpus.c | 2 +-
tools/testing/selftests/kvm/lib/aarch64/gic.c | 95 +++
.../selftests/kvm/lib/aarch64/gic_private.h | 21 +
tools/testing/selftests/kvm/lib/aarch64/gic_v3.c | 240 ++++++
tools/testing/selftests/kvm/lib/aarch64/gic_v3.h | 70 ++
.../testing/selftests/kvm/lib/aarch64/processor.c | 24 +-
tools/testing/selftests/kvm/lib/aarch64/spinlock.c | 27 +
tools/testing/selftests/kvm/lib/aarch64/vgic.c | 70 ++
tools/testing/selftests/kvm/lib/kvm_util.c | 46 +-
tools/testing/selftests/kvm/lib/sparsebit.c | 2 +-
tools/testing/selftests/kvm/lib/x86_64/processor.c | 4 +-
tools/testing/selftests/kvm/lib/x86_64/svm.c | 14 +-
tools/testing/selftests/kvm/memslot_perf_test.c | 56 +-
.../selftests/kvm/system_counter_offset_test.c | 132 ++++
.../selftests/kvm/x86_64/cr4_cpuid_sync_test.c | 3 +-
.../testing/selftests/kvm/x86_64/kvm_clock_test.c | 203 +++++
.../selftests/kvm/x86_64/vmx_tsc_adjust_test.c | 2 +-
virt/kvm/eventfd.c | 15 +-
virt/kvm/kvm_main.c | 127 ++--
233 files changed, 11728 insertions(+), 2308 deletions(-)
create mode 100644 arch/arm/include/asm/current.h
create mode 100644 arch/arm64/kvm/hyp/include/hyp/fault.h
create mode 100644 arch/arm64/kvm/hyp/include/nvhe/fixed_config.h
create mode 100644 arch/arm64/kvm/hyp/nvhe/pkvm.c
create mode 100644 arch/arm64/kvm/hyp/nvhe/sys_regs.c
create mode 100644 arch/riscv/include/asm/kvm_host.h
create mode 100644 arch/riscv/include/asm/kvm_types.h
create mode 100644 arch/riscv/include/asm/kvm_vcpu_fp.h
create mode 100644 arch/riscv/include/asm/kvm_vcpu_timer.h
create mode 100644 arch/riscv/include/uapi/asm/kvm.h
create mode 100644 arch/riscv/kvm/Kconfig
create mode 100644 arch/riscv/kvm/Makefile
create mode 100644 arch/riscv/kvm/main.c
create mode 100644 arch/riscv/kvm/mmu.c
create mode 100644 arch/riscv/kvm/tlb.S
create mode 100644 arch/riscv/kvm/vcpu.c
create mode 100644 arch/riscv/kvm/vcpu_exit.c
create mode 100644 arch/riscv/kvm/vcpu_fp.c
create mode 100644 arch/riscv/kvm/vcpu_sbi.c
create mode 100644 arch/riscv/kvm/vcpu_switch.S
create mode 100644 arch/riscv/kvm/vcpu_timer.c
create mode 100644 arch/riscv/kvm/vm.c
create mode 100644 arch/riscv/kvm/vmid.c
create mode 100644 arch/x86/hyperv/ivm.c
create mode 100644 include/clocksource/timer-riscv.h
copy {arch => tools/arch}/arm64/include/asm/sysreg.h (97%)
copy {arch => tools/arch}/x86/include/asm/pvclock-abi.h (100%)
create mode 100644 tools/arch/x86/include/asm/pvclock.h
create mode 100644 tools/testing/selftests/kvm/aarch64/arch_timer.c
create mode 100644 tools/testing/selftests/kvm/include/aarch64/arch_timer.h
create mode 100644 tools/testing/selftests/kvm/include/aarch64/delay.h
create mode 100644 tools/testing/selftests/kvm/include/aarch64/gic.h
create mode 100644 tools/testing/selftests/kvm/include/aarch64/spinlock.h
create mode 100644 tools/testing/selftests/kvm/include/aarch64/vgic.h
create mode 100644 tools/testing/selftests/kvm/lib/aarch64/gic.c
create mode 100644 tools/testing/selftests/kvm/lib/aarch64/gic_private.h
create mode 100644 tools/testing/selftests/kvm/lib/aarch64/gic_v3.c
create mode 100644 tools/testing/selftests/kvm/lib/aarch64/gic_v3.h
create mode 100644 tools/testing/selftests/kvm/lib/aarch64/spinlock.c
create mode 100644 tools/testing/selftests/kvm/lib/aarch64/vgic.c
create mode 100644 tools/testing/selftests/kvm/system_counter_offset_test.c
create mode 100644 tools/testing/selftests/kvm/x86_64/kvm_clock_test.c
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_kernel/gnu-master-arm-mainline-allmodconfig
in repository toolchain/ci/base-artifacts.
discards 3fc65c2b5 10: update: binutils-gcc-linux-qemu: 21097
discards 850040a0c 9: reset: gcc-d8edfadfc7a9795b65177a50ce44fd348858e844: 21097
discards 9880bad99 8: update: qemu-eb8f1d57bd754b19da73bb316e80bbaf9b66103a: 21109
discards fa225a1db 7: reset: gcc-4dc7ce6fb3917958d1a6036d8acf2953b9c1b868: 21106
discards fe22ff8e2 6: update: linux-53d5fc89d66a778577295020dc57bb3ccec84354: 21111
discards 08e82cf78 5: reset: linux-51bb08dd04a05035a64504faa47651d36b0f3125: 21111
discards 106a1971f 4: update: qemu-5f992102383ed8ed97076548e1c897c7034ed8a4: 21113
new ed9f25ab3 4: update: binutils-gcc-linux-qemu: 21162
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (3fc65c2b5)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_kernel/gnu-master-arm-ma [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log.xz | Bin 1596 -> 1560 bytes
02-prepare_abe/console.log.xz | Bin 2764 -> 2768 bytes
03-build_abe-binutils/console.log.xz | Bin 44100 -> 43504 bytes
04-build_abe-stage1/console.log.xz | Bin 90304 -> 90432 bytes
05-build_abe-qemu/console.log.xz | Bin 29604 -> 30192 bytes
06-build_linux/console.log.xz | Bin 44032 -> 43856 bytes
08-check_regression/console.log.xz | Bin 480 -> 480 bytes
09-update_baseline/console.log | 314 +++++++++++++++++++++++++++++------
jenkins/manifest.sh | 20 +--
results | 2 +-
10 files changed, 278 insertions(+), 58 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_gnu_native_build/master-arm
in repository toolchain/ci/gdb.
from 2047d95b89 [gdb/doc]: Updated manpages to be consistent with help
adds 09348c7665 ARM: match armeb output for unwind-pacbti-m test
adds 317db249c7 Automatic date update in version.in
adds c47860a4ba [gdb/testsuite] Fix stepi test-cases with unix/-m32/-fPIE/-pie
adds bd25c6eef8 gdb/sim: update my email address
No new revisions were added by this update.
Summary of changes:
bfd/version.h | 2 +-
gas/testsuite/gas/arm/unwind-pacbti-m.d | 6 +++---
gdb/MAINTAINERS | 6 +++---
gdb/testsuite/gdb.base/step-indirect-call-thunk.exp | 5 ++++-
gdb/testsuite/gdb.base/step-test.exp | 4 +++-
gdb/testsuite/gdb.reverse/step-indirect-call-thunk.exp | 6 ++++--
gdb/testsuite/gdb.reverse/step-precsave.exp | 10 ++++++++++
gdb/testsuite/gdb.reverse/step-reverse.exp | 10 ++++++++++
sim/MAINTAINERS | 2 +-
9 files changed, 39 insertions(+), 12 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_gnu_native_build/master-arm
in repository toolchain/ci/glibc.
from 14dbbf46a0 x86-64: Remove Prefer_AVX2_STRCMP
adds d6dea8c847 arm: Use internal symbol for _dl_argv on _dl_start_user
adds 613cb5c7b1 arm: Use have-mtls-dialect-gnu2 to check for ARM TLS descrip [...]
adds dba44dbe54 benchtests: Make hypot input random
adds b8a6ee43bb benchtests: Add hypotf
adds cca75bd8b5 i386: Explain why __HAVE_64B_ATOMICS has to be 0
new f64f4ce069 elf: Assume disjointed .rela.dyn and .rela.plt for loader
new db432f033d Use Linux 5.15 in build-many-glibcs.py
new fdcd177fd3 regex: Unnest nested functions in regcomp.c
The 3 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
benchtests/Makefile | 1 +
benchtests/hypot-inputs | 1015 +++++++++++++++++++++++++++++++++++++++++-
benchtests/hypotf-inputs | 1007 +++++++++++++++++++++++++++++++++++++++++
elf/dynamic-link.h | 32 +-
posix/regcomp.c | 464 +++++++++----------
scripts/build-many-glibcs.py | 2 +-
sysdeps/arm/Makefile | 7 +-
sysdeps/arm/dl-machine.h | 2 +-
sysdeps/x86/atomic-machine.h | 4 +
9 files changed, 2268 insertions(+), 266 deletions(-)
create mode 100644 benchtests/hypotf-inputs
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.