This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_gnu_cross_build/master-arm
in repository toolchain/ci/base-artifacts.
discards 075949ce 0: update: binutils-gcc-linux-glibc-gdb-qemu: 7
new 1d2570bf 0: update: binutils-gcc-linux-glibc-gdb-qemu: 7
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (075949ce)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_gnu_cross_build/master-a [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log.xz | Bin 1720 -> 1552 bytes
02-prepare_abe/console.log.xz | Bin 2772 -> 2748 bytes
04-build_abe-binutils/console.log.xz | Bin 30216 -> 30388 bytes
05-build_abe-stage1/console.log.xz | Bin 90080 -> 90584 bytes
07-build_abe-linux/console.log.xz | Bin 10508 -> 10912 bytes
08-build_abe-glibc/console.log.xz | Bin 231332 -> 231364 bytes
09-build_abe-stage2/console.log.xz | Bin 221288 -> 221904 bytes
10-build_abe-gdb/console.log.xz | Bin 37052 -> 37344 bytes
11-build_abe-qemu/console.log.xz | Bin 30408 -> 31528 bytes
12-check_regression/console.log.xz | Bin 416 -> 416 bytes
13-update_baseline/console.log | 2 +-
jenkins/manifest.sh | 26 +++++++++++++-------------
12 files changed, 14 insertions(+), 14 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_kernel/llvm-master-aarch64-lts-defconfig
in repository toolchain/ci/base-artifacts.
discards f3d20676 2: update: qemu-2058fdbe81e2985c226a026851dd26b146d3395c: 37
new 19c33dd3 2: update: linux-afaef166f7672e0d125ddb1dee36b144da8a4dac: 37
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (f3d20676)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_kernel/llvm-master-aarch [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log.xz | Bin 1736 -> 1540 bytes
02-prepare_abe/console.log.xz | Bin 2768 -> 2760 bytes
03-build_abe-binutils/console.log.xz | Bin 30336 -> 30276 bytes
04-build_llvm/console.log.xz | Bin 60992 -> 62888 bytes
05-build_abe-qemu/console.log.xz | Bin 31488 -> 32484 bytes
06-build_linux/console.log.xz | Bin 5324 -> 3776 bytes
08-check_regression/console.log.xz | Bin 476 -> 500 bytes
09-update_baseline/console.log | 148 +++++++++++++++++------------------
jenkins/manifest.sh | 10 +--
9 files changed, 79 insertions(+), 79 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository linux.
from ed4643521e6a Merge tag 'arm-dt-5.18' of git://git.kernel.org/pub/scm/li [...]
new a26f788b6e7a fs: add mnt_allow_writers() and simplify mount_setattr_prepare()
new 03b6abee9ba6 fs: simplify check in mount_setattr_commit()
new ad1844a0127a fs: don't open-code mnt_hold_writers()
new 87bb5b60019c fs: clean up mount_setattr control flow
new e257039f0fc7 mount_setattr(): clean the control flow and calling conventions
new 15f2e3d6c1f7 Merge tag 'fs.v5.18' of git://git.kernel.org/pub/scm/linux [...]
new 0f8821da4845 fs/namespace: Boost the mount_lock.lock owner instead of s [...]
new 2e2d4650b34f Merge tag 'fs.rt.v5.18' of git://git.kernel.org/pub/scm/li [...]
new c57bef0287dd prlimit: make do_prlimit() static
new 18c91bb2d872 prlimit: do not grab the tasklist_lock
new cd4699c5fd66 Merge tag 'prlimit-tasklist_lock-for-v5.18' of git://git.k [...]
new 5224f7909617 treewide: Replace zero-length arrays with flexible-array members
new 3ce62cf4dc3b Merge tag 'flexible-array-transformations-5.18-rc1' of git [...]
new 39844b7e3084 TOMOYO: fix __setup handlers return values
new efee6c79298f Merge tag 'tomoyo-pr-20220322' of git://git.osdn.net/gitro [...]
new 83b83a02073e KVM: x86/mmu: Use common TDP MMU zap helper for MMU notifi [...]
new 04dc4e6ce274 KVM: x86/mmu: Move "invalid" check out of kvm_tdp_mmu_get_root()
new d62007edf01f KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU
new cf9e25553289 KVM: x86: Unexport __kvm_request_apicv_update()
new 7446cfebe8be KVM: x86: Drop NULL check on kvm_x86_ops.check_apicv_inhib [...]
new f15756428ded KVM: x86: Skip APICv update if APICv is disable at the mod [...]
new 61827671ca62 KVM: x86/mmu: Remove unused "kvm" of kvm_mmu_unlink_parents()
new a0e72cd1e952 KVM: x86/mmu: Remove unused "kvm" of __rmap_write_protect()
new e8f6e7383c83 KVM: x86/mmu: Remove unused "vcpu" of reset_{tdp,ept}_shad [...]
new ad6d6b949e1d KVM: x86/tdp_mmu: Remove unused "kvm" of kvm_tdp_mmu_get_root()
new 0758d6a7c333 KVM: x86/mmu_audit: Remove unused "level" of audit_spte_af [...]
new 98242dcafe5e KVM: x86/svm: Remove unused "vcpu" of svm_check_exit_valid()
new 068f7ea61895 KVM: SVM: improve split between svm_prepare_guest_switch a [...]
new 1f2e66f03790 KVM: x86/i8259: Remove unused "addr" of elcr_ioport_{read, [...]
new 019024e563fc KVM: x86/ioapic: Remove unused "addr" and "length" of ioap [...]
new 09d9423d0ef0 KVM: x86/emulate: Remove unused "ctxt" of setup_syscalls_s [...]
new 7127fd3677f4 KVM: x86/emulate: Remove unused "tss_selector" of task_swi [...]
new 62711e5a74fc KVM: x86: Remove unused "vcpu" of kvm_scale_tsc()
new b56bd8e03cf4 KVM: Remove unused "kvm" of kvm_make_vcpu_request()
new 9d68c6f60eb1 KVM: x86: Remove unused "flags" of kvm_pv_kick_cpu_op()
new 2746a6b72ab9 KVM: x86: skip host CPUID call for hypervisor leaves
new feee3d9d5b9f KVM: x86: Drop export for .tlb_flush_current() static_call key
new e27bc0440ebd KVM: x86: Rename kvm_x86_ops pointers to align w/ preferre [...]
new ef2d488c6521 KVM: VMX: Call vmx_get_cpl() directly in handle_dr()
new a0941a64a97d KVM: x86: Use static_call() for .vcpu_deliver_sipi_vector()
new 0264a351090c KVM: xen: Use static_call() for invoking kvm_x86_ops hooks
new 0bcd556e15f9 KVM: nVMX: Refactor PMU refresh to avoid referencing kvm_x [...]
new 3d4421f8f26c KVM: x86: Uninline and export hv_track_root_tdp()
new dfc4e6ca0411 KVM: x86: Unexport kvm_x86_ops
new 7ad02ef0da25 KVM: x86: Use static_call() for copy/move encryption conte [...]
new 58fccda47e4b KVM: VMX: Rename VMX functions to conform to kvm_x86_ops names
new 872e0c5308d1 KVM: x86: Move get_cs_db_l_bits() helper to SVM
new 4d9c83f5a06a KVM: SVM: Rename svm_flush_tlb() to svm_flush_tlb_current()
new 771eda3f9e47 KVM: SVM: Remove unused MAX_INST_SIZE #define
new 03d004cd0715 KVM: x86: Use more verbose names for mem encrypt kvm_x86_o [...]
new 559c7c75c326 KVM: SVM: Rename SEV implemenations to conform to kvm_x86_ [...]
new 23e5092b6e2a KVM: SVM: Rename hook implementations to conform to kvm_x8 [...]
new 9b44423bf4c8 KVM: VMX: Dont' send posted IRQ if vCPU == this vCPU and v [...]
new 1714a4eb6fb0 KVM: LAPIC: Enable timer posted-interrupt only when mwait/ [...]
new 932859a4e0b9 KVM: x86/mmu: Move SPTE writable invariant checks to a hel [...]
new 115111efd97c KVM: x86/mmu: Check SPTE writable invariants when setting [...]
new 006100212d7f KVM: x86/mmu: Move is_writable_pte() to spte.h
new 1ca87e015d99 KVM: x86/mmu: Rename DEFAULT_SPTE_MMU_WRITEABLE to DEFAULT [...]
new 02844ac1eb34 KVM: x86/mmu: Consolidate comments about {Host,MMU}-writable
new bd1ba5732bb9 KVM: x86: Get the number of Hyper-V sparse banks from the [...]
new 25af9081189b KVM: x86: Refactor kvm_hv_flush_tlb() to reduce indentation
new a0dd008fe9b2 KVM: x86: Add a helper to get the sparse VP_SET for IPIs a [...]
new 79661c3766f8 KVM: x86: Don't bother reading sparse banks that end up be [...]
new 9c52f6b3d8c0 KVM: x86: Shove vp_bitmap handling down into sparse_set_to [...]
new 40421f38f637 KVM: x86: Reject fixeds-size Hyper-V hypercalls with non-z [...]
new 413af6601f76 KVM: x86: Add checks for reserved-to-zero Hyper-V hypercal [...]
new cf48f9e286da KVM: x86/mmu: Rename rmap_write_protect() to kvm_vcpu_writ [...]
new 1346bbb6b418 KVM: x86/mmu: Rename __rmap_write_protect() to rmap_write_ [...]
new 3255530ab191 KVM: x86/mmu: Automatically update iter->old_spte if cmpxc [...]
new 3e72c791fd33 KVM: x86/mmu: Change tdp_mmu_{set,zap}_spte_atomic() to re [...]
new c298a30c2821 KVM: x86/mmu: Rename TDP MMU functions that handle shadow pages
new 0f53dfa34efa KVM: x86/mmu: Rename handle_removed_tdp_mmu_page() to hand [...]
new 7b7e1ab6fdc5 KVM: x86/mmu: Consolidate logic to atomically install a ne [...]
new 59940e76d13d KVM: x86/mmu: Remove unnecessary warnings from restore_acc [...]
new 77c23c77f915 KVM: x86/mmu: Drop new_spte local variable from restore_ac [...]
new 315d86da89eb KVM: x86/mmu: Move restore_acc_track_spte() to spte.h
new 77aa60753a7b KVM: x86/mmu: Refactor TDP MMU iterators to take kvm_mmu_p [...]
new a81399a5735d KVM: x86/mmu: Remove redundant role overrides for TDP MMU [...]
new a3aca4de0da9 KVM: x86/mmu: Derive page role for TDP MMU shadow pages fr [...]
new a82070b6e71a KVM: x86/mmu: Separate TDP MMU shadow page allocation and [...]
new a3fe5dbda0a4 KVM: x86/mmu: Split huge pages mapped by the TDP MMU when [...]
new cb00a70bd4b7 KVM: x86/mmu: Split huge pages mapped by the TDP MMU durin [...]
new e0b728b1f1a9 KVM: x86/mmu: Add tracepoint for splitting huge pages
new 951cb0a3b5f2 KVM: selftests: Add an option to disable MANUAL_PROTECT_EN [...]
new 73c25546d47f KVM: nSVM: Track whether changes in L0 require MSR bitmap [...]
new ce3859172ce0 KVM: x86: Make kvm_hv_hypercall_enabled() static inline
new 9e083ec7bb66 KVM: nSVM: Split off common definitions for Hyper-V on KVM [...]
new 66c03a926f18 KVM: nSVM: Implement Enlightened MSR-Bitmap feature
new 6081f9c76426 KVM: selftests: Adapt hyperv_cpuid test to the newly intro [...]
new 761b5ebaa120 KVM: selftests: nVMX: Properly deal with 'hv_clean_fields'
new 70e477d996c8 KVM: selftests: nVMX: Add enlightened MSR-Bitmap selftest
new 0b815117da63 KVM: selftests: nSVM: Set up MSR-Bitmap for SVM guests
new 29f557d55349 KVM: selftests: nSVM: Update 'struct vmcb_control_area' de [...]
new e67bd7df28a0 KVM: selftests: nSVM: Add enlightened MSR-Bitmap selftest
new 48ebd0cf23f8 KVM: VMX: Use local pointer to vcpu_vmx in vmx_vcpu_after_ [...]
new 4e71cad31c62 Merge remote-tracking branch 'kvm/master' into HEAD
new db6e7adf8de9 KVM: SVM: Rename AVIC helpers to use "avic" prefix instead [...]
new b2125513dfc0 KVM: SEV: Allow SEV intra-host migration of VM with mirrors
new 1e8ff29fbbde selftests: KVM: allow sev_migrate_tests on machines withou [...]
new 8a2897853c53 KVM: x86: return 1 unconditionally for availability of KVM [...]
new 2a89061451c7 KVM: x86: use static_call_cond for optional callbacks
new e4fc23bad813 KVM: x86: remove KVM_X86_OP_NULL and mark optional kvm_x86_ops
new dd2319c61888 KVM: x86: warn on incorrectly NULL members of kvm_x86_ops
new abb6d479e226 KVM: x86: make several APIC virtualization callbacks optional
new 5be2226f417d KVM: x86: allow defining return-0 static calls
new 1bbc60d0c7e5 KVM: x86/mmu: Remove MMU auditing
new bfced9f96395 KVM: s390: MAINTAINERS: promote Claudio Imbrenda
new 1a82f6ab2365 s390/uaccess: Add copy_from/to_user_key functions
new e613d83454d7 KVM: s390: Honor storage keys when accessing guest memory
new 61380a7adfce KVM: s390: handle_tprot: Honor storage keys
new c7ef9ebbed20 KVM: s390: selftests: Test TEST PROTECTION emulation
new e9e9feebcbc1 KVM: s390: Add optional storage key checking to MEMOP IOCTL
new ef11c9463ae0 KVM: s390: Add vm IOCTL for key checked guest absolute mem [...]
new 0e1234c02b77 KVM: s390: Rename existing vcpu memop functions
new d004079edc16 KVM: s390: Add capability for storage key extension of MEM [...]
new 5e35d0eb472b KVM: s390: Update api documentation for memop ioctl
new 05515d341fe5 selftests: kvm: Check whether SIDA memop fails for normal guests
new cbf9b8109d32 KVM: s390: Clarify key argument for MEM_OP in api docs
new 3d9042f8b923 KVM: s390: Add missing vm MEM_OP size check
new 0828824158b1 Merge tag 'kvm-s390-next-5.18-1' of git://git.kernel.org/p [...]
new 4dfc4ec2b7f5 Merge branch 'kvm-ppc-cap-210' into kvm-next-5.18
new 50e523dd79f6 KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_ [...]
new 82c1ead0d678 KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_ [...]
new 7321f47eada5 KVM: x86: hyper-v: Fix the maximum number of sparse banks [...]
new 47d3e5cdfe60 KVM: x86: hyper-v: HVCALL_SEND_IPI_EX is an XMM fast hypercall
new c0f1eaeb9e62 Merge branch 'kvm-hv-xmm-hypercall-fixes' into HEAD
new fbc2dfe53a22 KVM: nVMX: Make setup/unsetup under the same conditions
new 105e0c441aa4 kvm: vmx: Fix typos comment in __loaded_vmcs_clear()
new 0b8934d3a93f KVM: VMX: Remove scratch 'cpu' variable that shadows an id [...]
new e45cce30eade KVM: Move VM's worker kthreads back to the original cgroup [...]
new 925088781eed KVM: x86: Fix pointer mistmatch warning when patching RET0 [...]
new ba7bb663f554 KVM: x86: Provide per VM capability for disabling PMU virt [...]
new f49b8138e623 KVM: selftests: Carve out helper to create "default" VM wi [...]
new 20e416720e74 KVM: selftests: Verify disabling PMU virtualization via KV [...]
new d6174299365d KVM: x86: Reinitialize context if host userspace toggles EFER.LME
new 57cb3bb0dc89 KVM: x86: do not deliver asynchronous page faults if CR0.PG=0
new 9191b8f0745e KVM: x86/mmu: avoid NULL-pointer dereference on page freeing bugs
new b9e5603c2a3a KVM: x86: use struct kvm_mmu_root_info for mmu->root
new 594bef793108 KVM: x86/mmu: do not consult levels when freeing roots
new 0c1c92f15f76 KVM: x86/mmu: do not pass vcpu to root freeing functions
new 5499ea73e7db KVM: x86/mmu: look for a cached PGD when going from 32-bit [...]
new 3cffc89d9d07 KVM: x86/mmu: load new PGD after the shadow MMU is initialized
new d2e5f3334169 KVM: x86/mmu: Always use current mmu's role when loading new PGD
new 6d58f275e6dc KVM: x86/mmu: clear MMIO cache when unloading the MMU
new b5f61c035d49 KVM: x86: flush TLB separately from MMU reset
new f66af9f222f0 KVM: x86: Fix emulation in writing cr8
new d22a81b304a2 KVM: x86: Do not change ICR on write to APIC_SELF_IPI
new b5ede3df79b7 KVM: VMX: Handle APIC-write offset wrangling in VMX code
new b031f1043583 KVM: x86: Use "raw" APIC register read for handling APIC-w [...]
new ed60920efe73 KVM: SVM: Use common kvm_apic_write_nodecode() for AVIC wr [...]
new b51818afdc1d KVM: SVM: Don't rewrite guest ICR on AVIC IPI virtualizati [...]
new bd17f417c07d KVM: x86: WARN if KVM emulates an IPI without clearing the [...]
new 70180052354c KVM: x86: Make kvm_lapic_reg_{read,write}() static
new 5429478d038f KVM: x86: Add helpers to handle 64-bit APIC MSR read/writes
new a57a31684d7b KVM: x86: Treat x2APIC's ICR as a 64-bit register, not two [...]
new b9964ee36bdf KVM: x86: Make kvm_lapic_set_reg() a "private" xAPIC helper
new 85c68eb429f7 KVM: selftests: Add test to verify KVM handling of ICR
new ca85f002258f KVM: x86/emulator: Defer not-present segment check in __lo [...]
new 31c66dabaa8a KVM: x86/emulator: Fix wrong privilege check for code segm [...]
new 1e326ad42978 KVM: x86/emulator: Move the unhandled outer privilege leve [...]
new f6d0a2521ce1 KVM: x86: Invoke kvm_mmu_unload() directly on CR4.PCIDE change
new 2f6f66ccd21e KVM: Drop kvm_reload_remote_mmus(), open code request in x [...]
new 527d5cd7eece KVM: x86/mmu: Zap only obsolete roots if a root shadow pag [...]
new cc65c3a110db KVM: s390: Replace KVM_REQ_MMU_RELOAD usage with arch spec [...]
new e65a3b46b5b1 KVM: Drop KVM_REQ_MMU_RELOAD and update vcpu-requests.rst [...]
new 5d6a32215624 KVM: WARN if is_unsync_root() is called on a root without [...]
new aa9f58415a8e KVM: SVM: Exit to userspace on ENOMEM/EFAULT GHCB errors
new b652de1e3dfb KVM: SVM: Disable preemption across AVIC load/put during A [...]
new 0564eeb71bbb Merge branch 'kvm-bugfixes' into HEAD
new a8749a35c399 mm: vmalloc: introduce array allocation functions
new 3000f2e2fc85 mm: use vmalloc_array and vcalloc for array allocations
new 37b2a6510a48 KVM: use __vcalloc for very large allocations
new 3354ef5a592d KVM: x86/mmu: Check for present SPTE when clearing dirty b [...]
new f28e9c7fce14 KVM: x86/mmu: Fix wrong/misleading comments in TDP MMU fast zap
new db01416b22d9 KVM: x86/mmu: Formalize TDP MMU's (unintended?) deferred T [...]
new 7ae5840e6f33 KVM: x86/mmu: Document that zapping invalidated roots does [...]
new 226b8c8f85e4 KVM: x86/mmu: Require mmu_lock be held for write in unyiel [...]
new 7c554d8e51a9 KVM: x86/mmu: only perform eager page splitting on valid roots
new 614f6970aa70 KVM: x86/mmu: do not allow readers to acquire references t [...]
new c8e5a0d0e9bc KVM: x86/mmu: Check for !leaf=>leaf, not PFN change, in TD [...]
new 93fa50f644e0 KVM: x86/mmu: Batch TLB flushes from TDP MMU for MMU notif [...]
new a151aceca1e4 KVM: x86/mmu: Drop RCU after processing each root in MMU n [...]
new 0e587aa73355 KVM: x86/mmu: Add helpers to read/write TDP MMU SPTEs and [...]
new 966da62adaf1 KVM: x86/mmu: WARN if old _or_ new SPTE is REMOVED in non- [...]
new 626808d137b7 KVM: x86/mmu: Refactor low-level TDP MMU set SPTE helper t [...]
new c10743a1824b KVM: x86/mmu: Zap only the target TDP MMU shadow page in N [...]
new 77c8cd6b85af KVM: x86/mmu: Skip remote TLB flush when zapping all of TDP MMU
new e2b5b21d3a81 KVM: x86/mmu: Add dedicated helper to zap TDP MMU root sha [...]
new acbda82a81c7 KVM: x86/mmu: Require mmu_lock be held for write to zap TD [...]
new cf3e26427c08 KVM: x86/mmu: Zap only TDP MMU leafs in kvm_zap_gfn_range()
new bd29677952fa KVM: x86/mmu: Do remote TLB flush before dropping RCU in T [...]
new bb95dfb9e2df KVM: x86/mmu: Defer TLB flush to caller when freeing TDP M [...]
new 22b94c4b63eb KVM: x86/mmu: Zap invalidated roots via asynchronous worker
new 8351779ce65f KVM: x86/mmu: Allow yielding when zapping GFNs for defunct [...]
new 1b6043e8e584 KVM: x86/mmu: Zap roots in two passes to avoid inducing RC [...]
new efd995dae5eb KVM: x86/mmu: Zap defunct roots via asynchronous worker
new 58298b068137 KVM: x86/mmu: Check for a REMOVED leaf SPTE before making [...]
new 396fd74d6134 KVM: x86/mmu: WARN on any attempt to atomically update REM [...]
new 3d7d6043f3c3 KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper [...]
new a4187c9bd163 KVM: selftests: Split out helper to allocate guest mem via memfd
new 17ae5ebc46e7 KVM: selftests: Define cpu_relax() helpers for s390 and x86
new b58c55d522b2 KVM: selftests: Add test to populate a VM with the max pos [...]
new 4a204f789587 KVM: SVM: Allow AVIC support on system w/ physical APIC ID > 255
new ee6a569d3bf6 KVM: s390: pv: make use of ultravisor AIV support
new c0573ba5c5a2 KVM: s390x: fix SCK locking
new 70e2f9f03905 KVM: s390: selftests: Split memop tests
new 4eb562ab99c4 KVM: s390: selftests: Add macro as abstraction for MEM_OP
new c4816a1b7fed KVM: s390: selftests: Add named stages for memop test
new 1bb873495a9e KVM: s390: selftests: Add more copy memop tests
new 3bcc372c9865 KVM: s390: selftests: Add error memop tests
new 3b53f5535d30 Merge tag 'kvm-s390-next-5.18-2' of https://git.kernel.org [...]
new 8eb3e1b923fd RISC-V: KVM: remove unneeded semicolon
new afec0c65d09d KVM: compat: riscv: Prevent KVM_COMPAT from being selected
new 823f53a30eb0 RISC-V: KVM: Refine __kvm_riscv_switch_to() implementation
new a03faf01a5e3 RISC-V: KVM: Upgrade SBI spec version to v0.3
new 4b11d86571c4 RISC-V: KVM: Add common kvm_riscv_vcpu_sbi_system_reset() [...]
new be78aa8a38c8 RISC-V: KVM: Implement SBI v0.3 SRST extension
new c38ff47bf094 RISC-V: Add SBI HSM suspend related defines
new c9d3b5bd2693 RISC-V: KVM: Add common kvm_riscv_vcpu_wfi() function
new 763c8bed8c05 RISC-V: KVM: Implement SBI HSM suspend call
new cf5019816d87 Merge tag 'kvm-riscv-5.18-1' of https://github.com/kvm-ris [...]
new e2ffceaae508 KVM: arm64: Correctly treat writes to OSLSR_EL1 as undefined
new d42e26716d03 KVM: arm64: Stash OSLSR_EL1 in the cpu context
new f24adc65c556 KVM: arm64: Allow guest to set the OSLK bit
new 7dabf02f43a1 KVM: arm64: Emulate the OS Lock
new d134998838ac selftests: KVM: Add OSLSR_EL1 to the list of blessed regs
new 05c9324de169 selftests: KVM: Test OS lock behavior
new b61fa004a45f Merge branch kvm-arm64/oslock into kvmarm-master/next
new fcc5bf89635a KVM: arm64: Use read/write spin lock for MMU protection
new f783ef1c0e82 KVM: arm64: Add fast path to handle permission relaxation [...]
new c340f7899af6 KVM: selftests: Add vgic initialization for dirty log perf [...]
new 2bb48074b3c9 Merge branch kvm-arm64/mmu-rwlock into kvmarm-master/next
new 23afc82539cf KVM: arm64: Add comments for context flush and sync callbacks
new 01a244decc76 KVM: arm64: Add some more comments in kvm_hyp_handle_fpsimd()
new 432110cd83ca arm64/fpsimd: Clarify the purpose of using last in fpsimd_save()
new 64330073b8ef Merge branch kvm-arm64/fpsimd-doc into kvmarm-master/next
new 417838392f2e KVM: arm64: Introduce a new VMID allocator for KVM
new f8051e960922 KVM: arm64: Make VMID bits accessible outside of allocator
new 3248136b3637 KVM: arm64: Align the VMID allocation with the arm64 ASID
new 100b4f092f87 KVM: arm64: Make active_vmids invalid on vCPU schedule out
new ebca68972e22 Merge branch kvm-arm64/vmid-allocator into kvmarm-master/next
new cc94d47ce16d kvm: selftests: aarch64: fix assert in gicv3_access_reg
new 11024a7a0ac2 kvm: selftests: aarch64: pass vgic_irq guest args as a pointer
new 5b7898648f02 kvm: selftests: aarch64: fix the failure check in kvm_set_ [...]
new a5cd38fd9c47 kvm: selftests: aarch64: fix some vgic related comments
new b53de63a8924 kvm: selftests: aarch64: use a tighter assert in vgic_poke_irq()
new 5206b9803101 Merge branch kvm-arm64/selftest/vgic-5.18 into kvmarm-master/next
new dfefa04a90cf KVM: arm64: Drop unused param from kvm_psci_version()
new 4c68d6c0a175 KVM: arm64: pkvm: Implement CONFIG_DEBUG_LIST at EL2
new c30185412daf Merge branch kvm-arm64/misc-5.18 into kvmarm-master/next
new 5177fe91e4cf KVM: arm64: Do not change the PMU event filter after a VCP [...]
new 2093057ab879 perf: Fix wrong name in comment for struct perf_cpu_context
new 46b187821472 KVM: arm64: Keep a per-VM pointer to the default PMU
new db858060b1a7 KVM: arm64: Keep a list of probed PMUs
new 6ee7fca2a4a0 KVM: arm64: Add KVM_ARM_VCPU_PMU_V3_SET_PMU attribute
new 583cda1b0e7d KVM: arm64: Refuse to run VCPU if the PMU doesn't match th [...]
new 00e6dae00e3d Merge branch kvm-arm64/pmu-bl into kvmarm-master/next
new 512865d83fd9 KVM: arm64: Bump guest PSCI version to 1.1
new d43583b890e7 KVM: arm64: Expose PSCI SYSTEM_RESET2 call to the guest
new 34739fd95fab KVM: arm64: Indicate SYSTEM_RESET2 in kvm_run::system_even [...]
new ae82047e97a3 KVM: arm64: Remove unneeded semicolons
new 1a48ce92641d Merge branch kvm-arm64/psci-1.1 into kvmarm-master/next
new 4c11113c1a3d KVM: arm64: Enable Cortex-A510 erratum 2077057 by default
new f7659f8bcdf8 KVM: arm64: Only open the interrupt window on exit due to [...]
new 3fbf4207dc68 Documentation: KVM: Update documentation to indicate KVM i [...]
new 7297a8bcc0ae Merge branch kvm-arm64/misc-5.18 into kvmarm-master/next
new 9d3e7b7c82fd KVM: arm64: Really propagate PSCI SYSTEM_RESET2 arguments [...]
new 9872e6bc08d6 Merge branch kvm-arm64/psci-1.1 into kvmarm-master/next
new 06394531b425 KVM: arm64: Generalise VM features into a set of flags
new 21ea45784275 KVM: arm64: fix typos in comments
new 714797c98edd Merge tag 'kvmarm-5.18' of git://git.kernel.org/pub/scm/li [...]
new fcb93eb6d09d kvm: x86/mmu: Flush TLB before zap_gfn_range releases RCU
new 873dd122172f Revert "KVM: x86/mmu: Zap only TDP MMU leafs in kvm_zap_gf [...]
new bf07be36cd88 KVM: x86: do not use KVM_X86_OP_OPTIONAL_RET0 for get_mt_mask
new 58b3d12c0a86 KVM: x86: add support for CPUID leaf 0x80000021
new f144c49e8c39 KVM: x86: synthesize CPUID leaf 0x80000021h if useful
new 5e17b2ee45b9 kvm: x86: Require const tsc for RT
new 6d8491910fcd KVM: x86: Introduce KVM_CAP_DISABLE_QUIRKS2
new c9b8fecddb5b KVM: use kvcalloc for array allocations
new 1ebdbeb03efe Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
new a70d298c4459 Drivers: hv: vmbus: Use struct_size() helper in kmalloc()
new de96e8a09889 Drivers: hv: Rename 'alloced' to 'allocated'
new 4ee524587105 Drivers: hv: Compare cpumasks and not their weights in ini [...]
new 6de74d1069b8 hv_utils: Add comment about max VMbus packet size in VSS driver
new d57d6fe5bf34 drivers: hv: log when enabling crash_kexec_post_notifiers
new 1d7286729aa6 hv_balloon: rate-limit "Unhandled message" warning
new eeda29db98f4 x86/hyperv: Output host build info as normal Windows versi [...]
new 66711cfea642 Merge tag 'hyperv-next-signed-20220322' of git://git.kerne [...]
new 21ca9fb62d46 PCI/IOV: Add pci_iov_vf_id() to get VF index
new 6ebd25b80c0d net/mlx5: Reuse exported virtfn index function call
new 143a41d7623d net/mlx5: Disable SRIOV before PF removal
new a7e9f240c0da PCI/IOV: Add pci_iov_get_pf_drvdata() to allow VF reaching [...]
new 1695b97b291e net/mlx5: Expose APIs to get/put the mlx5 core device
new adfdaff3d14f net/mlx5: Introduce migration bits and structures
new 40f958ea5700 net/mlx5: Add migration commands definitions
new 445ad495f0ff vfio: Have the core code decode the VFIO_DEVICE_FEATURE ioctl
new 115dcec65f61 vfio: Define device migration protocol v2
new 8cb3d83b959b vfio: Extend the device migration protocol with RUNNING_P2P
new 0f3f9cd7f752 vfio: Remove migration protocol v1 documentation
new f1d98f346ee3 vfio/mlx5: Expose migration commands over mlx5 device
new 6fadb021266d vfio/mlx5: Implement vfio_pci driver for mlx5 devices
new 915076f70efa vfio/pci: Expose vfio_pci_core_aer_err_detected()
new 88faa5e8ead6 vfio/mlx5: Use its own PCI reset_done error handler
new b042b27868c0 Merge tag 'mlx5-vfio-v10' of https://git.kernel.org/pub/sc [...]
new eadf88ecf6ac vfio/pci: fix memory leak during D3hot to D0 transition
new 26a17b12d7f3 vfio/pci: wake-up devices around reset functions
new 6e031ec0e5a2 vfio/pci: Stub vfio_pci_vga_rw when !CONFIG_VFIO_PCI_VGA
new f8a665b15947 Merge branches 'v5.18/vfio/next/mlx5-migration-v10', 'v5.1 [...]
new 8d26c4328b46 PCI/IOV: Fix wrong kernel-doc identifier
new 5b26f2c249b1 vfio/mlx5: Fix to not use 0 as NULL pointer
new ff5812e00d5e crypto: hisilicon/qm: Move the QM header to include/linux
new b4b084d71332 crypto: hisilicon/qm: Move few definitions to common header
new fae74feacd2d hisi_acc_qm: Move VF PCI device IDs to common header
new ee3a5b2359e0 hisi_acc_vfio_pci: add new vfio_pci driver for HiSilicon A [...]
new 6abdce51af1a hisi_acc_vfio_pci: Restrict access to VF dev BAR2 migratio [...]
new 442fbc099b83 hisi_acc_vfio_pci: Add helper to retrieve the struct pci_driver
new 1e459b25081d crypto: hisilicon/qm: Set the VF QM state register
new b0eed085903e hisi_acc_vfio_pci: Add support for VFIO live migration
new 4406f46c9bcd hisi_acc_vfio_pci: Use its own PCI reset_done error handler
new 8b8e7158aa75 MAINTAINERS: adjust entry for header movement in hisilicon [...]
new f621eb13facb vfio-pci: Provide reviewers and acceptance criteria for va [...]
new 7403e6d82639 Merge tag 'vfio-v5.18-rc1' of https://github.com/awilliam/ [...]
The 322 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
Documentation/admin-guide/kernel-parameters.txt | 30 +-
Documentation/driver-api/index.rst | 1 +
.../vfio-pci-device-specific-driver-acceptance.rst | 35 +
.../maintainer/maintainer-entry-profile.rst | 1 +
Documentation/virt/kvm/api.rst | 276 +++-
Documentation/virt/kvm/devices/vcpu.rst | 36 +-
Documentation/virt/kvm/vcpu-requests.rst | 7 +-
MAINTAINERS | 27 +-
arch/alpha/include/asm/hwrpb.h | 2 +-
arch/arm64/Kconfig | 1 +
arch/arm64/include/asm/kvm_host.h | 45 +-
arch/arm64/include/asm/kvm_mmu.h | 4 +-
arch/arm64/include/asm/sysreg.h | 8 +
arch/arm64/include/uapi/asm/kvm.h | 11 +
arch/arm64/kernel/fpsimd.c | 8 +-
arch/arm64/kernel/image-vars.h | 3 +
arch/arm64/kvm/Makefile | 2 +-
arch/arm64/kvm/arm.c | 142 +--
arch/arm64/kvm/debug.c | 26 +-
arch/arm64/kvm/fpsimd.c | 14 +-
arch/arm64/kvm/guest.c | 2 +-
arch/arm64/kvm/handle_exit.c | 2 +-
arch/arm64/kvm/hyp/include/hyp/switch.h | 4 +
arch/arm64/kvm/hyp/nvhe/Makefile | 3 +-
arch/arm64/kvm/hyp/nvhe/list_debug.c | 54 +
arch/arm64/kvm/hyp/nvhe/mem_protect.c | 3 +-
arch/arm64/kvm/hyp/nvhe/page_alloc.c | 4 +-
arch/arm64/kvm/hyp/nvhe/stub.c | 22 -
arch/arm64/kvm/mmio.c | 3 +-
arch/arm64/kvm/mmu.c | 52 +-
arch/arm64/kvm/pmu-emul.c | 141 ++-
arch/arm64/kvm/psci.c | 66 +-
arch/arm64/kvm/sys_regs.c | 74 +-
arch/arm64/kvm/vgic/vgic.c | 2 +-
arch/arm64/kvm/vmid.c | 196 +++
arch/ia64/include/asm/sal.h | 2 +-
arch/powerpc/kvm/book3s_hv_uvmem.c | 2 +-
arch/riscv/include/asm/kvm_host.h | 1 +
arch/riscv/include/asm/kvm_vcpu_sbi.h | 5 +-
arch/riscv/include/asm/sbi.h | 27 +-
arch/riscv/kernel/cpu_ops_sbi.c | 2 +-
arch/riscv/kvm/vcpu_exit.c | 22 +-
arch/riscv/kvm/vcpu_sbi.c | 19 +
arch/riscv/kvm/vcpu_sbi_hsm.c | 18 +-
arch/riscv/kvm/vcpu_sbi_replace.c | 44 +
arch/riscv/kvm/vcpu_sbi_v01.c | 20 +-
arch/riscv/kvm/vcpu_switch.S | 60 +-
arch/s390/include/asm/ccwgroup.h | 2 +-
arch/s390/include/asm/chsc.h | 2 +-
arch/s390/include/asm/ctl_reg.h | 2 +
arch/s390/include/asm/eadm.h | 2 +-
arch/s390/include/asm/fcx.h | 4 +-
arch/s390/include/asm/idals.h | 2 +-
arch/s390/include/asm/kvm_host.h | 2 +
arch/s390/include/asm/page.h | 2 +
arch/s390/include/asm/sclp.h | 2 +-
arch/s390/include/asm/sysinfo.h | 6 +-
arch/s390/include/asm/uaccess.h | 22 +
arch/s390/include/asm/uv.h | 1 +
arch/s390/kvm/gaccess.c | 250 +++-
arch/s390/kvm/gaccess.h | 84 +-
arch/s390/kvm/intercept.c | 12 +-
arch/s390/kvm/interrupt.c | 54 +-
arch/s390/kvm/kvm-s390.c | 170 ++-
arch/s390/kvm/kvm-s390.h | 17 +-
arch/s390/kvm/priv.c | 81 +-
arch/s390/lib/uaccess.c | 81 +-
arch/sh/include/asm/thread_info.h | 2 +-
arch/sparc/include/asm/vio.h | 10 +-
arch/um/include/shared/net_kern.h | 2 +-
arch/x86/include/asm/kvm-x86-ops.h | 117 +-
arch/x86/include/asm/kvm_host.h | 73 +-
arch/x86/include/asm/microcode_amd.h | 2 +-
arch/x86/include/asm/microcode_intel.h | 4 +-
arch/x86/include/asm/pci.h | 2 +-
arch/x86/include/asm/pci_x86.h | 2 +-
arch/x86/include/asm/svm.h | 2 +-
arch/x86/kernel/cpu/mshyperv.c | 8 +-
arch/x86/kvm/Kconfig | 7 -
arch/x86/kvm/cpuid.c | 59 +-
arch/x86/kvm/emulate.c | 71 +-
arch/x86/kvm/hyperv.c | 242 ++--
arch/x86/kvm/hyperv.h | 6 +-
arch/x86/kvm/i8259.c | 8 +-
arch/x86/kvm/ioapic.c | 6 +-
arch/x86/kvm/kvm_onhyperv.c | 14 +
arch/x86/kvm/kvm_onhyperv.h | 14 +-
arch/x86/kvm/lapic.c | 227 ++--
arch/x86/kvm/lapic.h | 17 +-
arch/x86/kvm/mmu.h | 44 +-
arch/x86/kvm/mmu/mmu.c | 502 +++++---
arch/x86/kvm/mmu/mmu_audit.c | 303 -----
arch/x86/kvm/mmu/mmu_internal.h | 15 +-
arch/x86/kvm/mmu/mmutrace.h | 23 +
arch/x86/kvm/mmu/page_track.c | 7 +-
arch/x86/kvm/mmu/paging_tmpl.h | 4 +-
arch/x86/kvm/mmu/spte.c | 72 +-
arch/x86/kvm/mmu/spte.h | 129 +-
arch/x86/kvm/mmu/tdp_iter.c | 14 +-
arch/x86/kvm/mmu/tdp_iter.h | 25 +-
arch/x86/kvm/mmu/tdp_mmu.c | 986 ++++++++++-----
arch/x86/kvm/mmu/tdp_mmu.h | 31 +-
arch/x86/kvm/svm/avic.c | 181 ++-
arch/x86/kvm/svm/hyperv.h | 35 +
arch/x86/kvm/svm/nested.c | 51 +-
arch/x86/kvm/svm/pmu.c | 2 +-
arch/x86/kvm/svm/sev.c | 121 +-
arch/x86/kvm/svm/svm.c | 134 +-
arch/x86/kvm/svm/svm.h | 69 +-
arch/x86/kvm/svm/svm_onhyperv.h | 25 +-
arch/x86/kvm/trace.h | 20 +-
arch/x86/kvm/vmx/nested.c | 21 +-
arch/x86/kvm/vmx/nested.h | 3 +-
arch/x86/kvm/vmx/pmu_intel.c | 5 +-
arch/x86/kvm/vmx/posted_intr.c | 6 +-
arch/x86/kvm/vmx/posted_intr.h | 4 +-
arch/x86/kvm/vmx/vmx.c | 116 +-
arch/x86/kvm/x86.c | 285 +++--
arch/x86/kvm/x86.h | 2 +
arch/x86/kvm/xen.c | 4 +-
arch/xtensa/include/asm/bootparam.h | 2 +-
drivers/crypto/caam/pdb.h | 2 +-
drivers/crypto/hisilicon/hpre/hpre.h | 2 +-
drivers/crypto/hisilicon/hpre/hpre_main.c | 19 +-
drivers/crypto/hisilicon/qm.c | 68 +-
drivers/crypto/hisilicon/sec2/sec.h | 2 +-
drivers/crypto/hisilicon/sec2/sec_main.c | 21 +-
drivers/crypto/hisilicon/sgl.c | 2 +-
drivers/crypto/hisilicon/zip/zip.h | 2 +-
drivers/crypto/hisilicon/zip/zip_main.c | 17 +-
drivers/gpu/drm/i915/gt/uc/intel_guc_ads.c | 2 +-
drivers/gpu/drm/nouveau/include/nvfw/hs.h | 2 +-
drivers/hv/channel_mgmt.c | 19 +-
drivers/hv/hv_balloon.c | 2 +-
drivers/hv/hv_common.c | 4 +-
drivers/hv/hv_snapshot.c | 7 +-
drivers/hv/hyperv_vmbus.h | 14 +-
drivers/hv/vmbus_drv.c | 4 +-
drivers/hwtracing/coresight/coresight-config.h | 2 +-
drivers/misc/bcm-vk/bcm_vk.h | 2 +-
drivers/misc/habanalabs/include/common/cpucp_if.h | 6 +-
.../misc/habanalabs/include/gaudi/gaudi_packets.h | 4 +-
.../misc/habanalabs/include/goya/goya_packets.h | 4 +-
drivers/net/ethernet/freescale/enetc/enetc_hw.h | 2 +-
drivers/net/ethernet/i825xx/sun3_82586.h | 2 +-
drivers/net/ethernet/marvell/octeontx2/af/npc.h | 6 +-
drivers/net/ethernet/mellanox/mlx5/core/cmd.c | 10 +
drivers/net/ethernet/mellanox/mlx5/core/main.c | 45 +
.../net/ethernet/mellanox/mlx5/core/mlx5_core.h | 1 +
drivers/net/ethernet/mellanox/mlx5/core/sriov.c | 17 +-
drivers/net/ethernet/qlogic/qed/qed_mfw_hsi.h | 2 +-
drivers/net/ethernet/ti/davinci_mdio.c | 2 +-
drivers/pci/iov.c | 43 +
drivers/scsi/dpt/dpti_i2o.h | 2 +-
drivers/scsi/elx/libefc_sli/sli4.h | 20 +-
drivers/scsi/mpi3mr/mpi3mr.h | 2 +-
drivers/scsi/qla2xxx/qla_bsg.h | 4 +-
drivers/scsi/qla2xxx/qla_def.h | 2 +-
drivers/scsi/qla2xxx/qla_edif_bsg.h | 4 +-
drivers/scsi/qla2xxx/qla_fw.h | 2 +-
drivers/scsi/qla4xxx/ql4_fw.h | 2 +-
drivers/staging/r8188eu/include/rtw_cmd.h | 10 +-
drivers/staging/rtl8712/rtl871x_cmd.h | 8 +-
drivers/staging/rtl8723bs/include/ieee80211.h | 2 +-
drivers/staging/rtl8723bs/include/rtw_cmd.h | 2 +-
.../include/linux/raspberrypi/vchiq.h | 2 +-
drivers/vfio/pci/Kconfig | 5 +
drivers/vfio/pci/Makefile | 4 +
drivers/vfio/pci/hisilicon/Kconfig | 15 +
drivers/vfio/pci/hisilicon/Makefile | 4 +
drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c | 1326 ++++++++++++++++++++
drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.h | 116 ++
drivers/vfio/pci/mlx5/Kconfig | 10 +
drivers/vfio/pci/mlx5/Makefile | 4 +
drivers/vfio/pci/mlx5/cmd.c | 259 ++++
drivers/vfio/pci/mlx5/cmd.h | 36 +
drivers/vfio/pci/mlx5/main.c | 676 ++++++++++
drivers/vfio/pci/vfio_pci.c | 1 +
drivers/vfio/pci/vfio_pci_core.c | 162 ++-
drivers/vfio/pci/vfio_pci_rdwr.c | 2 +
drivers/vfio/vfio.c | 296 ++++-
drivers/visorbus/vbuschannel.h | 2 +-
fs/cifs/ntlmssp.h | 2 +-
fs/ext4/fast_commit.h | 4 +-
fs/ksmbd/ksmbd_netlink.h | 2 +-
fs/ksmbd/ntlmssp.h | 6 +-
fs/ksmbd/smb2pdu.h | 8 +-
fs/ksmbd/transport_rdma.c | 2 +-
fs/ksmbd/xattr.h | 2 +-
fs/namespace.c | 168 +--
fs/xfs/scrub/attr.h | 2 +-
include/asm-generic/hyperv-tlfs.h | 7 +
include/asm-generic/tlb.h | 4 +-
include/kvm/arm_pmu.h | 5 +
include/kvm/arm_psci.h | 9 +-
include/linux/greybus/greybus_manifest.h | 4 +-
include/linux/greybus/hd.h | 2 +-
include/linux/greybus/module.h | 2 +-
.../hisilicon/qm.h => include/linux/hisi_acc_qm.h | 49 +
include/linux/i3c/ccc.h | 6 +-
include/linux/kvm_host.h | 4 +-
include/linux/mlx5/driver.h | 3 +
include/linux/mlx5/mlx5_ifc.h | 147 ++-
include/linux/pci.h | 15 +-
include/linux/pci_ids.h | 3 +
include/linux/perf_event.h | 2 +-
include/linux/platform_data/brcmfmac.h | 2 +-
include/linux/platform_data/cros_ec_commands.h | 2 +-
include/linux/posix-timers.h | 2 +-
include/linux/resource.h | 2 -
include/linux/vfio.h | 53 +
include/linux/vfio_pci_core.h | 13 +
include/linux/vmalloc.h | 5 +
include/net/bluetooth/mgmt.h | 2 +-
include/net/ioam6.h | 2 +-
include/sound/sof/channel_map.h | 4 +-
include/uapi/linux/hyperv.h | 11 +
include/uapi/linux/kvm.h | 15 +-
include/uapi/linux/psci.h | 4 +
include/uapi/linux/vfio.h | 406 +++---
kernel/static_call.c | 1 +
kernel/sys.c | 119 +-
kernel/time/posix-cpu-timers.c | 12 +-
mm/percpu-stats.c | 2 +-
mm/swap_cgroup.c | 4 +-
mm/util.c | 50 +
scripts/dtc/libfdt/fdt.h | 4 +-
security/tomoyo/load_policy.c | 4 +-
sound/soc/intel/atom/sst-mfld-dsp.h | 4 +-
sound/soc/intel/skylake/skl-topology.h | 2 +-
tools/arch/arm64/include/uapi/asm/kvm.h | 1 +
tools/include/uapi/linux/kvm.h | 4 +
tools/lib/perf/include/perf/event.h | 2 +-
tools/testing/selftests/kvm/.gitignore | 3 +
tools/testing/selftests/kvm/Makefile | 4 +
.../selftests/kvm/aarch64/debug-exceptions.c | 58 +-
tools/testing/selftests/kvm/aarch64/get-reg-list.c | 1 +
tools/testing/selftests/kvm/aarch64/vgic_irq.c | 45 +-
tools/testing/selftests/kvm/dirty_log_perf_test.c | 23 +-
.../testing/selftests/kvm/include/kvm_util_base.h | 8 +
.../selftests/kvm/include/s390x/processor.h | 8 +
tools/testing/selftests/kvm/include/x86_64/apic.h | 1 +
tools/testing/selftests/kvm/include/x86_64/evmcs.h | 150 ++-
.../selftests/kvm/include/x86_64/processor.h | 5 +
tools/testing/selftests/kvm/include/x86_64/svm.h | 9 +-
.../selftests/kvm/include/x86_64/svm_util.h | 6 +
tools/testing/selftests/kvm/lib/aarch64/gic_v3.c | 12 +-
tools/testing/selftests/kvm/lib/aarch64/vgic.c | 9 +-
tools/testing/selftests/kvm/lib/kvm_util.c | 87 +-
tools/testing/selftests/kvm/lib/x86_64/svm.c | 6 +
.../testing/selftests/kvm/max_guest_memory_test.c | 292 +++++
tools/testing/selftests/kvm/s390x/memop.c | 732 +++++++++--
tools/testing/selftests/kvm/s390x/tprot.c | 227 ++++
.../testing/selftests/kvm/set_memory_region_test.c | 35 +-
tools/testing/selftests/kvm/x86_64/evmcs_test.c | 64 +-
tools/testing/selftests/kvm/x86_64/hyperv_cpuid.c | 29 +-
.../testing/selftests/kvm/x86_64/hyperv_svm_test.c | 175 +++
.../selftests/kvm/x86_64/pmu_event_filter_test.c | 33 +
.../selftests/kvm/x86_64/sev_migrate_tests.c | 125 +-
.../selftests/kvm/x86_64/xapic_state_test.c | 150 +++
virt/kvm/Kconfig | 2 +-
virt/kvm/kvm_main.c | 40 +-
262 files changed, 10160 insertions(+), 3149 deletions(-)
create mode 100644 Documentation/driver-api/vfio-pci-device-specific-driver-accept [...]
create mode 100644 arch/arm64/kvm/hyp/nvhe/list_debug.c
delete mode 100644 arch/arm64/kvm/hyp/nvhe/stub.c
create mode 100644 arch/arm64/kvm/vmid.c
delete mode 100644 arch/x86/kvm/mmu/mmu_audit.c
create mode 100644 arch/x86/kvm/svm/hyperv.h
create mode 100644 drivers/vfio/pci/hisilicon/Kconfig
create mode 100644 drivers/vfio/pci/hisilicon/Makefile
create mode 100644 drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c
create mode 100644 drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.h
create mode 100644 drivers/vfio/pci/mlx5/Kconfig
create mode 100644 drivers/vfio/pci/mlx5/Makefile
create mode 100644 drivers/vfio/pci/mlx5/cmd.c
create mode 100644 drivers/vfio/pci/mlx5/cmd.h
create mode 100644 drivers/vfio/pci/mlx5/main.c
rename drivers/crypto/hisilicon/qm.h => include/linux/hisi_acc_qm.h (87%)
create mode 100644 tools/testing/selftests/kvm/max_guest_memory_test.c
create mode 100644 tools/testing/selftests/kvm/s390x/tprot.c
create mode 100644 tools/testing/selftests/kvm/x86_64/hyperv_svm_test.c
create mode 100644 tools/testing/selftests/kvm/x86_64/xapic_state_test.c
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_kernel/gnu-master-aarch64-lts-allnoconfig
in repository toolchain/ci/base-artifacts.
discards 53be3fb4 0: update: gcc-f0530882d99abc410bb080051aa04e5cea848f18: boot
new c04243c4 0: update: qemu-e309ce90a23bef4f5210a8c49d53441144be293c: boot
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (53be3fb4)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_kernel/gnu-master-aarch6 [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log.xz | Bin 1540 -> 1620 bytes
02-prepare_abe/console.log.xz | Bin 2752 -> 2772 bytes
03-build_abe-binutils/console.log.xz | Bin 30220 -> 30392 bytes
04-build_abe-stage1/console.log.xz | Bin 72252 -> 73896 bytes
05-build_abe-qemu/console.log.xz | Bin 32504 -> 31368 bytes
06-build_linux/console.log.xz | Bin 5416 -> 5720 bytes
07-boot_linux/console.log.xz | Bin 504 -> 504 bytes
08-check_regression/console.log.xz | Bin 412 -> 412 bytes
09-update_baseline/console.log | 10 +++++-----
jenkins/manifest.sh | 8 ++++----
10 files changed, 9 insertions(+), 9 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_gnu_native_check_gdb/master-arm
in repository toolchain/ci/glibc.
from 8ef9196b26 Update syscall lists for Linux 5.17
adds 33f4d09bdc gmon: Remove unused sprofil.c functions
adds 41397b9337 locale: Remove ununsed wctype_table_get function
adds 2a16484a75 support: Remove unused extract_8 function
adds 0374b487a7 support: Fix support_process_state_wait path size calculation
adds 06e91f1a2e nscd: Remove unused variable
adds 11ba44f3a7 iconvdata: Fix enum type on UTF-7
adds 23808a422e Update kernel version to 5.17 in tst-mman-consts.py
No new revisions were added by this update.
Summary of changes:
iconvdata/utf-7.c | 2 +-
locale/programs/ld-ctype.c | 27 ---------------------------
nscd/mem.c | 6 +-----
support/support_format_dns_packet.c | 11 -----------
support/support_process_state.c | 3 ++-
sysdeps/posix/sprofil.c | 12 ------------
sysdeps/unix/sysv/linux/tst-mman-consts.py | 2 +-
7 files changed, 5 insertions(+), 58 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.