This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository glibc.
from 92eb4a10ae install.texi: bump "latest verified" versions
new 256574679f libc.pot: regenerate (only line number changes)
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
po/libc.pot | 114 ++++++++++++++++++++++++++++++------------------------------
1 file changed, 57 insertions(+), 57 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository glibc.
from d36b481476 NEWS: drop 2.40 section "Changes to build and runtime requirements"
new 92eb4a10ae install.texi: bump "latest verified" versions
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
INSTALL | 18 +++++++++---------
manual/install.texi | 18 +++++++++---------
2 files changed, 18 insertions(+), 18 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch master
in repository toolchain/ci/interesting-commits.
from 4a6f51223 Add entry 01c095ab77f8f43bf77e4c0be6c4f4c0d15a4c29 from https [...]
new a7f89b20c Add entry ebdad26ed9902c04704409b729d896a646188634 from https [...]
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
.../first_url | 2 +-
.../tcwg_gnu_cross_check_gcc/master-arm/build_url | 2 +-
.../tcwg_gnu_cross_check_gcc/master-arm/last_good | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
copy gcc/sha1/{746344dd53807d840c29f52adba10d0ab093bd3d => ebdad26ed9902c04704409b [...]
copy gcc/sha1/{03cebd304955a6b9c5607e09312d77f1307cc98e => ebdad26ed9902c04704409b [...]
copy gdb/sha1/c223d3738832011ced54e8415fa218934aebd0e4/first_url => gcc/sha1/ebdad [...]
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch master
in repository toolchain/ci/interesting-commits.
from 937e31b54 Add entry 01c095ab77f8f43bf77e4c0be6c4f4c0d15a4c29 from https [...]
new 4a6f51223 Add entry 01c095ab77f8f43bf77e4c0be6c4f4c0d15a4c29 from https [...]
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
.../jira/description | 5 +++++
.../jira/yaml | 5 +++++
.../status.txt | 5 +++++
.../master-arm_v7a_softfp_eabi/details.txt | 25 ++++++++++------------
.../reproduction_instructions.txt | 4 ++--
.../master-arm_v7a_softfp_eabi}/status-summary.txt | 0
.../master-arm_v7a_softfp_eabi/status.txt | 4 ++--
.../tcwg_gnu_embed_check_gcc}/status-summary.txt | 0
.../tcwg_gnu_embed_check_gcc/status.txt | 4 ++--
9 files changed, 32 insertions(+), 20 deletions(-)
copy gcc/sha1/{867d1264fe71d4291194373d1a1c409cac97a597 => 01c095ab77f8f43bf77e4c0 [...]
copy gcc/sha1/01c095ab77f8f43bf77e4c0be6c4f4c0d15a4c29/{tcwg_bootstrap_check/maste [...]
copy {binutils/sha1/313f04b6edcd09e0e7ff224bd54a892ab8f029aa => gcc/sha1/01c095ab7 [...]
copy gcc/sha1/{2a46e0e7e20e6e9095708704ac0180859e258b7d => 01c095ab77f8f43bf77e4c0 [...]
copy {binutils/sha1/313f04b6edcd09e0e7ff224bd54a892ab8f029aa => gcc/sha1/01c095ab7 [...]
copy gcc/sha1/{df66fa08578a28b3acc8bdb6257b68c245a6a0fa => 01c095ab77f8f43bf77e4c0 [...]
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository glibc.
from 5dc1408bb5 contrib.texi: update
new d36b481476 NEWS: drop 2.40 section "Changes to build and runtime requirements"
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
NEWS | 4 ----
1 file changed, 4 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch master
in repository toolchain/ci/interesting-commits.
from 10584beda Add entry 37c4703ce84722b9c24db3e8e6d57ab6d3a7b5eb from https [...]
new 937e31b54 Add entry 01c095ab77f8f43bf77e4c0be6c4f4c0d15a4c29 from https [...]
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
.../tcwg_gnu_embed_check_gcc/master-arm_v7a_softfp_eabi/build_url | 2 +-
.../master-arm_v7a_softfp_eabi}/last_good | 0
2 files changed, 1 insertion(+), 1 deletion(-)
copy gcc/sha1/{0adc8c5f146b108f99c4df09e43276e3a2419262 => 01c095ab77f8f43bf77e4c0 [...]
copy gcc/sha1/01c095ab77f8f43bf77e4c0be6c4f4c0d15a4c29/{tcwg_bootstrap_check/maste [...]
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository binutils-gdb.
from e1b9d58e85e Correct version for binutils 2.43 NEWS entries.
new 11c9c34be6c ld/PDB: use correct hashing algorithm in add_globals_ref
new a69553e8f78 ld/testsuite: add missing definition to PDB test
The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
ld/pdb.c | 2 +-
ld/testsuite/ld-pe/pdb-syms1-globals.d | 73 ++++++++++++++++-----------------
ld/testsuite/ld-pe/pdb-syms1-records.d | 2 +-
ld/testsuite/ld-pe/pdb-syms1-symbols2.d | 24 +++++------
ld/testsuite/ld-pe/pdb-syms1a.s | 1 +
5 files changed, 51 insertions(+), 51 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository binutils-gdb.
from de5dc49e435 gdb: remove tracepoint_probe_create_sals_from_location_spec
new e1b9d58e85e Correct version for binutils 2.43 NEWS entries.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
binutils/NEWS | 2 +-
ld/NEWS | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch binutils-2_43-branch
in repository binutils-gdb.
from e23fef3eb26 Update version number to 2.42.90
new b7793fd2681 Correct version for binutils 2.43 NEWS entries.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
binutils/NEWS | 2 +-
ld/NEWS | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository linux.
from c43a20e4a520 Merge tag 'mtd/for-6.11' of git://git.kernel.org/pub/scm/l [...]
new f9d1b541d057 Merge branch 'kvm-fixes-6.10-1' into HEAD
new c72ceafbd12c mm: Introduce AS_INACCESSIBLE for encrypted/confidential memory
new 1d23040caa8b KVM: guest_memfd: Use AS_INACCESSIBLE when creating guest_ [...]
new 70623723778a KVM: guest_memfd: pass error up from filemap_grab_folio
new fa30b0dc91c8 KVM: guest_memfd: limit overzealous WARN
new 3bb2531e20bf KVM: guest_memfd: Add hook for initializing memory
new 17573fd971f9 KVM: guest_memfd: extract __kvm_gmem_get_pfn()
new 1f6c06b17751 KVM: guest_memfd: Add interface for populating gmem pages [...]
new a90764f0e4ed KVM: guest_memfd: Add hook for invalidating memory
new f32fb32820b1 KVM: x86: Add hook for determining max NPT mapping level
new 732326037349 Merge branch 'kvm-coco-hooks' into HEAD
new b74d002d3d58 KVM: MMU: Disable fast path if KVM_EXIT_MEMORY_FAULT is needed
new a8e319833355 KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_A [...]
new 1dfe571c12cf KVM: SEV: Add initial SEV-SNP support
new 136d8bc931c8 KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
new dee5a47cc7a4 KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
new ad27ce155566 KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
new 0c76b1d08280 KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
new d46b7b6a5f9e KVM: SEV: Add support to handle MSR based Page State Chang [...]
new 9b54e248d264 KVM: SEV: Add support to handle Page State Change VMGEXIT
new c63cf135cc99 KVM: SEV: Add support to handle RMP nested page faults
new e366f92ea99e KVM: SEV: Support SEV-SNP AP Creation NAE event
new 4f2e7aa1cfdf KVM: SEV: Implement gmem hook for initializing private pages
new 8eb01900b018 KVM: SEV: Implement gmem hook for invalidating private pages
new b2104024f40c KVM: x86: Implement hook for determining max NPT mapping level
new ea262f8a7c36 KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
new 6f627b425378 KVM: SVM: Add module parameter to enable SEV-SNP
new febff040b1a6 KVM: SEV: Automatically switch reclaimed pages to shared
new 73137f59246d KVM: SEV: Don't WARN() if RMP lookup fails when invalidati [...]
new b2ec042347fd KVM: SVM: Remove the need to trigger an UNBLOCK event on A [...]
new ab978c62e72d Merge branch 'kvm-6.11-sev-snp' into HEAD
new f99b052256f1 KVM: SNP: Fix LBR Virtualization for SNP guest
new d81473840ce1 KVM: interrupt kvm_gmem_populate() on signals
new 8a4e2742a54e KVM: x86/tdp_mmu: Sprinkle __must_check
new 02b0d3b9d4dd Merge branch 'kvm-6.10-fixes' into HEAD
new 27e6a24a4cf3 mm, virt: merge AS_UNMOVABLE and AS_INACCESSIBLE
new 964cea817196 KVM: x86/tdp_mmu: Rename REMOVED_SPTE to FROZEN_SPTE
new c2f38f75fc89 KVM: x86/tdp_mmu: Take a GFN in kvm_tdp_mmu_fast_pf_get_la [...]
new eb162c941c0b Merge branch 'kvm-tdx-prep-1-truncated' into HEAD
new 9aed7a6c0b59 KVM: Document KVM_PRE_FAULT_MEMORY ioctl
new bc1a5cd00211 KVM: Add KVM_PRE_FAULT_MEMORY vcpu ioctl to pre-populate g [...]
new 5186ec223b68 KVM: x86/mmu: Bump pf_taken stat only in the "real" page f [...]
new f5e7f00cf195 KVM: x86/mmu: Account pf_{fixed,emulate,spurious} in calle [...]
new 58ef24699bcd KVM: x86/mmu: Make kvm_mmu_do_page_fault() return mapped level
new 6e01b7601dfe KVM: x86: Implement kvm_arch_vcpu_pre_fault_memory()
new 9ff0e37c6882 KVM: selftests: x86: Add test for KVM_PRE_FAULT_MEMORY
new f3996d4d7996 Merge branch 'kvm-prefault' into HEAD
new e5b088c1dc4d RISC-V: KVM: Share APLIC and IMSIC defines with irqchip drivers
new 3385339296d1 RISC-V: KVM: Use IMSIC guest files when available
new 91195a90f1d1 RISCV: KVM: add tracepoints for entry and exit events
new da7b1b525e97 perf kvm/riscv: Port perf kvm stat to RISC-V
new e325618349cd RISC-V: KVM: Redirect AMO load/store access fault traps to guest
new 60d2b2f3c474 Merge tag 'kvm-riscv-6.11-1' of https://github.com/kvm-ris [...]
new 98f770389f46 KVM: s390: remove useless include
new 33a729a1770b KVM: s390: vsie: retry SIE instruction on host intercepts
new 7816e58967d0 kvm: s390: Reject memory region operations for ucontrol VMs
new f0a23883fad4 Merge tag 'kvm-s390-next-6.11-1' of https://git.kernel.org [...]
new e306e514906c LoongArch: KVM: Sync pending interrupt when getting ESTAT [...]
new b5d4e2325db2 LoongArch: KVM: Delay secondary mmu tlb flush until guest entry
new 2f56f9ea4dc3 LoongArch: KVM: Select huge page only if secondary mmu sup [...]
new b072cbf0233b LoongArch: KVM: Discard dirty page tracking on readonly memslot
new 32d4b999dade LoongArch: KVM: Add memory barrier before update pmd entry
new 8c3470425270 LoongArch: KVM: Add dirty bitmap initially all set support
new ebf00272da5c LoongArch: KVM: Mark page accessed and dirty with page ref added
new d7ad41a31d91 LoongArch: KVM: always make pte young in page map's fast path
new b4ba157044ea LoongArch: KVM: Add PV steal time support in host side
new 03779999ac30 LoongArch: KVM: Add PV steal time support in guest side
new 492ac37fa38f perf kvm: Add kvm-stat for loongarch64
new c8b8b8190a80 Merge tag 'loongarch-kvm-6.11' of git://git.kernel.org/pub [...]
new 0b5afe05377d KVM: arm64: Add early_param to control WFx trapping
new eb9d53d4a949 KVM: arm64: nv: Fix RESx behaviour of disabled FGTs with n [...]
new 3dc14eefa504 KVM: arm64: nv: Use GFP_KERNEL_ACCOUNT for sysreg_masks al [...]
new cb52b5c8b81b Revert "KVM: arm64: nv: Fix RESx behaviour of disabled FGT [...]
new bd2e95136ba4 Merge branch kvm-arm64/misc into kvmarm/next
new c9c012625e12 KVM: arm64: Trap FFA_VERSION host call in pKVM
new 894376385a2d KVM: arm64: Add support for FFA_PARTITION_INFO_GET
new 0dd60c4632a1 KVM: arm64: Update the identification range for the FF-A smcs
new 42fb33dde42b KVM: arm64: Use FF-A 1.1 with pKVM
new a35d5b2032ce Merge branch kvm-arm64/ffa-1p1 into kvmarm/next
new 4f128f8e1aaa KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
new 61e30b9eef7f KVM: arm64: nv: Implement nested Stage-2 page table walk logic
new fd276e71d1e7 KVM: arm64: nv: Handle shadow stage 2 page faults
new ec14c272408a KVM: arm64: nv: Unmap/flush shadow stage 2 page tables
new 82e86326ec58 KVM: arm64: nv: Add Stage-1 EL2 invalidation primitives
new 67fda56e76da KVM: arm64: nv: Handle EL2 Stage-1 TLB invalidation
new 8e236efa4cd2 KVM: arm64: nv: Handle TLB invalidation targeting L2 stage-1
new e6c9a3015ff2 KVM: arm64: nv: Handle TLBI VMALLS12E1{,IS} operations
new 5cfb6cec62f2 KVM: arm64: nv: Handle TLBI ALLE1{,IS} operations
new 70109bcd701e KVM: arm64: nv: Handle TLBI IPAS2E1{,IS} operations
new d1de1576dc21 KVM: arm64: nv: Handle FEAT_TTL hinted TLB operations
new b1a3a94812b9 KVM: arm64: nv: Tag shadow S2 entries with guest's leaf S2 level
new 809b2e6013a5 KVM: arm64: nv: Invalidate TLBs based on shadow S2 TTL-lik [...]
new 0cb8aae22676 KVM: arm64: nv: Add handling of outer-shareable TLBI operations
new 5d476ca57d7d KVM: arm64: nv: Add handling of range-based TLBI operations
new 0feec7769a63 KVM: arm64: nv: Add handling of NXS-flavoured TLBI operations
new 3cfde36df7ab KVM: arm64: nv: Truely enable nXS TLBI operations
new 435a9f60eda4 Merge branch kvm-arm64/shadow-mmu into kvmarm/next
new 4e8ff73eb7ae KVM: arm64: Get sys_reg encoding from descriptor in idregs [...]
new 410db103f6eb KVM: arm64: Make idregs debugfs iterator search sysreg tab [...]
new 97ca3fcc15cc KVM: arm64: Use read-only helper for reading VM ID registers
new d7508d27dd88 KVM: arm64: Add helper for writing ID regs
new 44241f34fac9 KVM: arm64: nv: Use accessors for modifying ID registers
new f1ff3fc5209a KVM: arm64: unify code to prepare traps
new 2843cae26644 KVM: arm64: Treat CTR_EL0 as a VM feature ID register
new bb4fa769dcdd KVM: arm64: show writable masks for feature registers
new 76d36012276a KVM: arm64: rename functions for invariant sys regs
new 11a31be88fb6 KVM: selftests: arm64: Test writes to CTR_EL0
new 33d85a93c6c3 KVM: arm64: nv: Unfudge ID_AA64PFR0_EL1 masking
new b0539664cbc3 KVM: selftests: Assert that MPIDR_EL1 is unchanged across [...]
new 377d0e5d7795 Merge branch kvm-arm64/ctr-el0 into kvmarm/next
new a8f0655887cc KVM: arm64: Fix clobbered ELR in sync abort/SError
new ea9d7c83d14e KVM: arm64: Fix __pkvm_init_switch_pgd call ABI
new 6e3b773ed6bc KVM: arm64: nVHE: Simplify invalid_host_el2_vect
new 4ab3f9dd561b KVM: arm64: nVHE: gen-hyprel: Skip R_AARCH64_ABS32
new 3c6eb6487693 KVM: arm64: VHE: Mark __hyp_call_panic __noreturn
new 7a928b32f1de arm64: Introduce esr_brk_comment, esr_is_cfi_brk
new 8f3873a39529 KVM: arm64: Introduce print_nvhe_hyp_panic helper
new eca4ba5b6dff KVM: arm64: nVHE: Support CONFIG_CFI_CLANG at EL2
new 1270dad31097 Merge branch kvm-arm64/el2-kcfi into kvmarm/next
new d2b2ecba8ddb KVM: arm64: nv: Forward FP/ASIMD traps to guest hypervisor
new 399debfc9749 KVM: arm64: nv: Forward SVE traps to guest hypervisor
new b3d29a823099 KVM: arm64: nv: Handle ZCR_EL2 traps
new 069da3ffdadf KVM: arm64: nv: Load guest hyp's ZCR into EL1 state
new b7e5c9426429 KVM: arm64: nv: Save guest's ZCR_EL2 when in hyp context
new 9092aca9fe9a KVM: arm64: nv: Use guest hypervisor's max VL when running [...]
new 2e3cf82063a0 KVM: arm64: nv: Ensure correct VL is loaded before saving [...]
new 1785f020b112 KVM: arm64: Spin off helper for programming CPTR traps
new 493da2b1c49a KVM: arm64: nv: Handle CPACR_EL1 traps
new 0cfc85b8f5cf KVM: arm64: nv: Load guest FP state for ZCR_EL2 trap
new 5326303bb7d9 KVM: arm64: nv: Honor guest hypervisor's FP/SVE traps in CPTR_EL2
new 0edc60fd6e9e KVM: arm64: nv: Add TCPAC/TTA to CPTR->CPACR conversion helper
new e19d533126ac KVM: arm64: nv: Add trap description for CPTR_EL2
new cd931bd6093c KVM: arm64: nv: Add additional trap setup for CPTR_EL2
new f1ee914fb626 KVM: arm64: Allow the use of SVE+NV
new 8c2899e7706e Merge branch kvm-arm64/nv-sve into kvmarm/next
new 9b58e665d6b2 KVM: arm64: Correctly honor the presence of FEAT_TCRX
new a3ee9ce88ba3 KVM: arm64: Get rid of HCRX_GUEST_FLAGS
new 1b04fd40275e KVM: arm64: Make TCR2_EL1 save/restore dependent on the VM [...]
new 663abf04ee4d KVM: arm64: Make PIR{,E0}_EL1 save/restore conditional on [...]
new 91e9cc70b775 KVM: arm64: Honor trap routing for TCR2_EL1
new bc2e3253ca96 Merge branch kvm-arm64/nv-tcr2 into kvmarm/next
new dc1d234cdd4a KVM: Documentation: Fix typo `BFD`
new 03bd36a387b8 KVM: Documentation: Enumerate allowed value macros of `irq_type`
new 810ecbefdd54 KVM: Documentation: Correct the VGIC V2 CPU interface addr [...]
new 88a0a4f6068c MAINTAINERS: Include documentation in KVM/arm64 entry
new bb032b2352c3 Merge branch kvm-arm64/docs into kvmarm/next
new 1c5a0b55abeb Merge tag 'kvmarm-6.11' of git://git.kernel.org/pub/scm/li [...]
new ebbdf37ce9ab KVM: Validate hva in kvm_gpc_activate_hva() to fix __kvm_g [...]
new f4501e8bc88d Merge tag 'kvm-x86-fixes-6.10-11' of https://github.com/kv [...]
new 96a02b9fa951 KVM: Unexport kvm_debugfs_dir
new aeb1b22a3ac8 KVM: Enable halt polling shrink parameter by default
new f8aadead1971 KVM: Update halt polling documentation to note that KVM ha [...]
new 778c350eb580 Revert "KVM: async_pf: avoid recursive flushing of work items"
new f2362c04752c KVM: fix documentation rendering for KVM_CAP_VM_MOVE_ENC_C [...]
new fbe4a7e881d4 KVM: Setup empty IRQ routing when creating a VM
new e3c89f5dd11d KVM: x86: Don't re-setup empty IRQ routing when KVM_CAP_SP [...]
new c4201bd24f4a KVM: s390: Don't re-setup dummy routing when KVM_CREATE_IRQCHIP
new d1ae567fb8b5 KVM: Add a flag to track if a loaded vCPU is scheduled out
new 5d9c07febb86 KVM: VMX: Move PLE grow/shrink helpers above vmx_vcpu_load()
new 8fbb696a8f53 KVM: x86: Fold kvm_arch_sched_in() into kvm_arch_vcpu_load()
new 2a27c4314007 KVM: Delete the now unused kvm_arch_sched_in()
new ef2e18ef3750 KVM: x86: Unconditionally set l1tf_flush_l1d during vCPU load
new 3dee3b187499 KVM: x86: Drop now-superflous setting of l1tf_flush_l1d in [...]
new 5c1f50ab7fcb KVM: Fix a goof where kvm_create_vm() returns 0 instead of [...]
new 8b8e57e5096e KVM: Reject overly excessive IDs in KVM_CREATE_VCPU
new 7c305d5118e6 KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID
new d29bf2ca1404 KVM: x86: Prevent excluding the BSP on setting max_vcpu_ids
new 4b451a57809c KVM: selftests: Test max vCPU IDs corner cases
new 438a496b9041 KVM: selftests: Test vCPU boot IDs above 2^32 and MAX_VCPU_ID
new a6816314af57 KVM: Introduce vcpu->wants_to_run
new 4b23e0c199b2 KVM: Ensure new code that references immediate_exit gets e [...]
new 118964562969 KVM: Mark a vCPU as preempted/ready iff it's scheduled out [...]
new 25bc6af60f61 KVM: Add missing MODULE_DESCRIPTION()
new 86014c1e20fa Merge tag 'kvm-x86-generic-6.11' of https://github.com/kvm [...]
new 7974c0643ee3 KVM: x86: Add a struct to consolidate host values, e.g. EF [...]
new 52c47f5897b6 KVM: SVM: Use KVM's snapshot of the host's XCR0 for SEV-ES [...]
new c043eaaa6be0 KVM: x86/mmu: Snapshot shadow_phys_bits when kvm.ko is loaded
new 82897db91215 KVM: x86: Move shadow_phys_bits into "kvm_host", as "maxphyaddr"
new f9e1cbf1805e KVM: x86: hyper-v: Calculate APIC bus frequency for Hyper-V
new b460256b162d KVM: x86: Make nanoseconds per APIC bus cycle a VM variable
new 6fef518594bc KVM: x86: Add a capability to configure bus frequency for [...]
new 69148ccec679 KVM: x86: Print names of apicv inhibit reasons in traces
new f992572120fb KVM: x86: Keep consistent naming for APICv/AVIC inhibit reasons
new c7d4c5f01961 KVM: x86: Drop unused check_apicv_inhibit_reasons() callba [...]
new d5989a3533fc KVM: VMX: Remove unused declaration of vmx_request_immedia [...]
new 5a4f8b3026fc KVM: x86/pmu: Squash period for checkpointed events based [...]
new 6463e5e41842 KVM: x86: Apply Intel's TSC_AUX reserved-bit behavior to I [...]
new c092fc879f99 KVM: x86: Inhibit code #DBs in MOV-SS shadow for all Intel [...]
new d99e4cb2ae2e KVM: x86: Use "is Intel compatible" helper to emulate SYSC [...]
new dc2b8b2b524a KVM: SVM: Emulate SYSENTER RIP/RSP behavior for all Intel [...]
new 4067c2395e80 KVM: x86: Allow SYSENTER in Compatibility Mode for all Int [...]
new bdaff4f92bce KVM: x86: Open code vendor_intel() in string_registers_quirk()
new 1028893a73fe KVM: x86: Bury guest_cpuid_is_amd_or_hygon() in cpuid.c
new 508f0c7bf6d5 KVM: x86: Improve documentation for KVM_CAP_X86_BUS_LOCK_EXIT
new 85542adb65ec KVM: x86: Add KVM_RUN_X86_GUEST_MODE kvm_run flag
new 8815d77cbc99 KVM: x86: Add missing MODULE_DESCRIPTION() macros
new dd103407ca31 KVM: X86: Remove unnecessary GFP_KERNEL_ACCOUNT for tempor [...]
new 6b878cbb87bf KVM: selftests: Add guest udelay() utility for x86
new 82222ee7e84c KVM: selftests: Add test for configure of x86 APIC bus frequency
new 5dcc1e76144f Merge tag 'kvm-x86-misc-6.11' of https://github.com/kvm-x8 [...]
new 4f8973e65fcd KVM: x86: invalid_list not used anymore in mmu_shrink_scan
new 9ecc1c119b28 KVM: x86/mmu: Only allocate shadowed translation cache for [...]
new caa727882937 KVM: x86/mmu: Rephrase comment about synthetic PFERR flags [...]
new cf3ff0ee24d6 KVM: x86/mmu: Always drop mmu_lock to allocate TDP MMU SPs [...]
new e1c04f7a9f42 KVM: x86/mmu: Hard code GFP flags for TDP MMU eager split [...]
new 3d4a5a45ca26 KVM: x86/mmu: Unnest TDP MMU helpers that allocate SPs for [...]
new 0089c055b560 KVM: x86/mmu: Avoid reacquiring RCU if TDP MMU fails to al [...]
new 34b69edecb47 Merge tag 'kvm-x86-mmu-6.11' of https://github.com/kvm-x86 [...]
new 0a7b73559b39 KVM: x86: Remove VMX support for virtualizing guest MTRR memtypes
new e1548088ff54 KVM: VMX: Drop support for forcing UC memory when guest CR0.CD=1
new f05eda16037f srcu: Add an API for a memory barrier after SRCU read lock
new 65a4de0ffd97 KVM: x86: Ensure a full memory barrier is emitted in the V [...]
new 377b2f359d1f KVM: VMX: Always honor guest PAT on CPUs that support self-snoop
new 5c5ddf71071f Merge tag 'kvm-x86-mtrrs-6.11' of https://github.com/kvm-x [...]
new ea19f7d0bf46 KVM: x86: Remove IA32_PERF_GLOBAL_OVF_CTRL from KVM_GET_MS [...]
new 8387435bebac KVM: x86/pmu: Switch to new Intel CPU model defines
new 0c468a6a020c KVM: VMX: Switch to new Intel CPU model infrastructure
new 0e102ce3d413 KVM: x86/pmu: Change ambiguous _mask suffix to _rsvd in kvm_pmu
new 75430c412a31 KVM: x86/pmu: Manipulate FIXED_CTR_CTRL MSR with macros
new 3b65a692a5c7 KVM: x86/pmu: Add a helper to enable bits in FIXED_CTR_CTRL
new f287bef6ddc2 KVM: x86/pmu: Introduce distinct macros for GP/fixed count [...]
new cda231cd42f5 Merge tag 'kvm-x86-pmu-6.11' of https://github.com/kvm-x86 [...]
new f626279dea33 KVM: selftests: remove unused struct 'memslot_antagonist_args'
new 17019d5195c4 KVM: selftests: Treat AMD Family 17h+ as supporting branch [...]
new ea09ace3f8f3 KVM: selftests: Print the seed for the guest pRNG iff it h [...]
new 5bb9af07d37c KVM: selftests: Rework macros in PMU counters test to prep [...]
new 4669de42aa6c KVM: selftests: Increase robustness of LLC cache misses in [...]
new dbfd50cb4512 Merge tag 'kvm-x86-selftests-6.11' of https://github.com/k [...]
new f51af3468688 KVM: SVM: remove useless input parameter in snp_safe_alloc_page
new 9f44286d77ac KVM: SVM: not account memory allocation for per-CPU svm_data
new 99a49093ce92 KVM: SVM: Consider NUMA affinity when allocating per-CPU s [...]
new 34830b3c02ae KVM: SVM: Force sev_es_host_save_area() to be inlined (for [...]
new 704ec48fc2fb KVM: SVM: Use sev_es_host_save_area() helper when initiali [...]
new 1229cbefa679 Merge tag 'kvm-x86-svm-6.11' of https://github.com/kvm-x86 [...]
new cb9fb5fc12ef KVM: nVMX: Update VMCS12_REVISION comment to state it shou [...]
new 23b2c5088d01 KVM: VMX: Remove unnecessary INVEPT[GLOBAL] from hardware [...]
new 92c1e3cbf0d0 KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in [...]
new d83c36d822be KVM: nVMX: Add a helper to get highest pending from Posted [...]
new 32f55e475ce2 KVM: nVMX: Request immediate exit iff pending nested event [...]
new 322a569c4b41 KVM: VMX: Split out the non-virtualization part of vmx_int [...]
new 27c4fa42b11a KVM: nVMX: Check for pending posted interrupts when lookin [...]
new 321ef62b0c5f KVM: nVMX: Fold requested virtual interrupt check into has [...]
new 45405155d876 KVM: x86: WARN if a vCPU gets a valid wakeup that KVM can' [...]
new 208a352a5490 Merge tag 'kvm-x86-vmx-6.11' of https://github.com/kvm-x86 [...]
new 3d4415ed75a5 KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE
new 9fe17d2ada6e KVM: x86/mmu: Clean up make_huge_page_split_spte() definit [...]
new 2a1fc7dc3626 KVM: x86: Suppress MMIO that is triggered during task swit [...]
new 88caf544c930 KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
new f55f3c3ac69f x86/sev: Move sev_guest.h into common SEV header
new 74458e4859d8 KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST N [...]
new bc9cd5a219aa Merge branch 'kvm-6.11-sev-attestation' into HEAD
new f4854bf741c4 KVM: x86: Replace static_call_cond() with static_call()
new 896046474f8d KVM: x86: Introduce kvm_x86_call() to simplify static call [...]
new 5d766508fd15 KVM: x86/pmu: Add kvm_pmu_call() to simplify static calls [...]
new 332d2c1d713e crypto: ccp: Add the SNP_VLEK_LOAD command
new 2c9b3512402e Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
The 256 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
Documentation/admin-guide/kernel-parameters.txt | 24 +-
Documentation/virt/coco/sev-guest.rst | 19 +
Documentation/virt/kvm/api.rst | 169 ++-
Documentation/virt/kvm/devices/arm-vgic.rst | 2 +-
Documentation/virt/kvm/halt-polling.rst | 12 +-
.../virt/kvm/x86/amd-memory-encryption.rst | 110 +-
Documentation/virt/kvm/x86/errata.rst | 18 +
MAINTAINERS | 2 +
arch/arm64/include/asm/esr.h | 12 +
arch/arm64/include/asm/kvm_arm.h | 1 -
arch/arm64/include/asm/kvm_asm.h | 2 +
arch/arm64/include/asm/kvm_emulate.h | 95 +-
arch/arm64/include/asm/kvm_host.h | 69 +-
arch/arm64/include/asm/kvm_hyp.h | 4 +-
arch/arm64/include/asm/kvm_mmu.h | 26 +
arch/arm64/include/asm/kvm_nested.h | 131 +-
arch/arm64/include/asm/sysreg.h | 17 +
arch/arm64/kernel/asm-offsets.c | 1 +
arch/arm64/kernel/debug-monitors.c | 4 +-
arch/arm64/kernel/traps.c | 8 +-
arch/arm64/kvm/arm.c | 88 +-
arch/arm64/kvm/emulate-nested.c | 104 ++
arch/arm64/kvm/fpsimd.c | 19 +-
arch/arm64/kvm/handle_exit.c | 43 +-
arch/arm64/kvm/hyp/entry.S | 8 +
arch/arm64/kvm/hyp/include/hyp/switch.h | 29 +-
arch/arm64/kvm/hyp/include/hyp/sysreg-sr.h | 35 +-
arch/arm64/kvm/hyp/include/nvhe/ffa.h | 2 +-
arch/arm64/kvm/hyp/nvhe/Makefile | 6 +-
arch/arm64/kvm/hyp/nvhe/ffa.c | 180 ++-
arch/arm64/kvm/hyp/nvhe/gen-hyprel.c | 6 +
arch/arm64/kvm/hyp/nvhe/host.S | 6 -
arch/arm64/kvm/hyp/nvhe/hyp-init.S | 30 +-
arch/arm64/kvm/hyp/nvhe/setup.c | 4 +-
arch/arm64/kvm/hyp/vhe/switch.c | 202 ++-
arch/arm64/kvm/hyp/vhe/tlb.c | 147 ++
arch/arm64/kvm/mmu.c | 213 ++-
arch/arm64/kvm/nested.c | 1002 +++++++++++--
arch/arm64/kvm/pmu-emul.c | 2 +-
arch/arm64/kvm/reset.c | 6 +
arch/arm64/kvm/sys_regs.c | 593 +++++++-
arch/loongarch/Kconfig | 11 +
arch/loongarch/include/asm/kvm_host.h | 14 +-
arch/loongarch/include/asm/kvm_para.h | 11 +
arch/loongarch/include/asm/kvm_vcpu.h | 5 +
arch/loongarch/include/asm/loongarch.h | 1 +
arch/loongarch/include/asm/paravirt.h | 5 +
arch/loongarch/include/uapi/asm/kvm.h | 4 +
arch/loongarch/kernel/paravirt.c | 145 ++
arch/loongarch/kernel/time.c | 2 +
arch/loongarch/kvm/Kconfig | 1 +
arch/loongarch/kvm/exit.c | 38 +-
arch/loongarch/kvm/main.c | 1 +
arch/loongarch/kvm/mmu.c | 72 +-
arch/loongarch/kvm/tlb.c | 5 +-
arch/loongarch/kvm/vcpu.c | 156 +-
arch/mips/include/asm/kvm_host.h | 1 -
arch/mips/kvm/mips.c | 2 +-
arch/powerpc/include/asm/kvm_host.h | 1 -
arch/powerpc/kvm/powerpc.c | 2 +-
arch/riscv/include/asm/kvm_aia_aplic.h | 58 -
arch/riscv/include/asm/kvm_aia_imsic.h | 38 -
arch/riscv/include/asm/kvm_host.h | 1 -
arch/riscv/kvm/aia.c | 35 +-
arch/riscv/kvm/aia_aplic.c | 2 +-
arch/riscv/kvm/aia_device.c | 2 +-
arch/riscv/kvm/aia_imsic.c | 2 +-
arch/riscv/kvm/trace.h | 67 +
arch/riscv/kvm/vcpu.c | 9 +-
arch/riscv/kvm/vcpu_exit.c | 2 +
arch/s390/include/asm/kvm_host.h | 2 -
arch/s390/kvm/kvm-s390.c | 14 +-
arch/s390/kvm/vsie.c | 22 +-
arch/x86/include/asm/kvm-x86-ops.h | 8 +-
arch/x86/include/asm/kvm-x86-pmu-ops.h | 3 +-
arch/x86/include/asm/kvm_host.h | 90 +-
arch/x86/include/asm/sev-common.h | 25 +
arch/x86/include/asm/sev.h | 51 +
arch/x86/include/asm/svm.h | 9 +-
arch/x86/include/uapi/asm/kvm.h | 49 +
arch/x86/kvm/Kconfig | 4 +
arch/x86/kvm/cpuid.c | 14 +-
arch/x86/kvm/cpuid.h | 18 -
arch/x86/kvm/emulate.c | 71 +-
arch/x86/kvm/hyperv.c | 9 +-
arch/x86/kvm/irq.c | 2 +-
arch/x86/kvm/irq.h | 1 -
arch/x86/kvm/irq_comm.c | 7 -
arch/x86/kvm/kvm_cache_regs.h | 10 +-
arch/x86/kvm/kvm_emulate.h | 1 +
arch/x86/kvm/lapic.c | 48 +-
arch/x86/kvm/lapic.h | 5 +-
arch/x86/kvm/mmu.h | 42 +-
arch/x86/kvm/mmu/mmu.c | 206 ++-
arch/x86/kvm/mmu/mmu_internal.h | 26 +-
arch/x86/kvm/mmu/paging_tmpl.h | 3 +-
arch/x86/kvm/mmu/spte.c | 46 +-
arch/x86/kvm/mmu/spte.h | 10 +-
arch/x86/kvm/mmu/tdp_mmu.c | 136 +-
arch/x86/kvm/mmu/tdp_mmu.h | 2 +-
arch/x86/kvm/mtrr.c | 644 +-------
arch/x86/kvm/pmu.c | 73 +-
arch/x86/kvm/pmu.h | 10 +-
arch/x86/kvm/smm.c | 44 +-
arch/x86/kvm/svm/nested.c | 2 +-
arch/x86/kvm/svm/pmu.c | 11 +-
arch/x86/kvm/svm/sev.c | 1582 +++++++++++++++++++-
arch/x86/kvm/svm/svm.c | 78 +-
arch/x86/kvm/svm/svm.h | 70 +-
arch/x86/kvm/trace.h | 55 +-
arch/x86/kvm/vmx/main.c | 5 +-
arch/x86/kvm/vmx/nested.c | 55 +-
arch/x86/kvm/vmx/pmu_intel.c | 52 +-
arch/x86/kvm/vmx/posted_intr.h | 10 +
arch/x86/kvm/vmx/vmcs12.h | 14 +-
arch/x86/kvm/vmx/vmx.c | 205 ++-
arch/x86/kvm/vmx/vmx.h | 3 +-
arch/x86/kvm/vmx/x86_ops.h | 4 -
arch/x86/kvm/x86.c | 567 ++++---
arch/x86/kvm/x86.h | 25 +-
arch/x86/kvm/xen.c | 6 +-
drivers/crypto/ccp/sev-dev.c | 36 +
drivers/virt/coco/sev-guest/sev-guest.c | 2 -
drivers/virt/coco/sev-guest/sev-guest.h | 63 -
include/linux/arm_ffa.h | 3 +
include/linux/kvm_host.h | 53 +-
include/linux/pagemap.h | 13 +-
include/linux/psp-sev.h | 4 +-
include/linux/srcu.h | 14 +
include/uapi/linux/kvm.h | 27 +-
include/uapi/linux/psp-sev.h | 27 +
include/uapi/linux/sev-guest.h | 3 +
mm/compaction.c | 12 +-
mm/migrate.c | 2 +-
mm/truncate.c | 3 +-
tools/include/uapi/linux/kvm.h | 10 +
tools/perf/arch/loongarch/Makefile | 1 +
tools/perf/arch/loongarch/util/Build | 2 +
tools/perf/arch/loongarch/util/header.c | 96 ++
tools/perf/arch/loongarch/util/kvm-stat.c | 139 ++
tools/perf/arch/riscv/Makefile | 1 +
tools/perf/arch/riscv/util/Build | 1 +
tools/perf/arch/{arm64 => riscv}/util/kvm-stat.c | 28 +-
tools/perf/arch/riscv/util/riscv_exception_types.h | 35 +
tools/testing/selftests/kvm/Makefile | 2 +
tools/testing/selftests/kvm/aarch64/set_id_regs.c | 17 +
tools/testing/selftests/kvm/include/x86_64/apic.h | 8 +
.../selftests/kvm/include/x86_64/processor.h | 18 +
tools/testing/selftests/kvm/lib/kvm_util.c | 9 +-
tools/testing/selftests/kvm/lib/x86_64/processor.c | 11 +
.../kvm/memslot_modification_stress_test.c | 6 -
.../testing/selftests/kvm/pre_fault_memory_test.c | 146 ++
.../selftests/kvm/x86_64/apic_bus_clock_test.c | 194 +++
.../selftests/kvm/x86_64/max_vcpuid_cap_test.c | 22 +-
.../selftests/kvm/x86_64/pmu_counters_test.c | 44 +-
.../selftests/kvm/x86_64/pmu_event_filter_test.c | 35 +-
.../testing/selftests/kvm/x86_64/set_boot_cpu_id.c | 16 +
virt/kvm/Kconfig | 11 +
virt/kvm/async_pf.c | 13 +-
virt/kvm/guest_memfd.c | 176 ++-
virt/kvm/irqchip.c | 24 +
virt/kvm/kvm_main.c | 106 +-
virt/kvm/pfncache.c | 3 +
163 files changed, 7690 insertions(+), 2339 deletions(-)
delete mode 100644 arch/riscv/include/asm/kvm_aia_aplic.h
delete mode 100644 arch/riscv/include/asm/kvm_aia_imsic.h
create mode 100644 arch/riscv/kvm/trace.h
delete mode 100644 drivers/virt/coco/sev-guest/sev-guest.h
create mode 100644 tools/perf/arch/loongarch/util/header.c
create mode 100644 tools/perf/arch/loongarch/util/kvm-stat.c
copy tools/perf/arch/{arm64 => riscv}/util/kvm-stat.c (67%)
create mode 100644 tools/perf/arch/riscv/util/riscv_exception_types.h
create mode 100644 tools/testing/selftests/kvm/pre_fault_memory_test.c
create mode 100644 tools/testing/selftests/kvm/x86_64/apic_bus_clock_test.c
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.