This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository linux.
from 4d66020dcef8 Merge tag 'trace-v5.17' of git://git.kernel.org/pub/scm/li [...]
new 1a5e91d8375f swiotlb: Add swiotlb bounce buffer remap function for HV IVM
new c789b90a6904 x86/hyper-v: Add hyperv Isolation VM check in the cc_platf [...]
new 062a5c4260cd hyper-v: Enable swiotlb bounce buffer for Isolation VM
new 743b237c3a7b scsi: storvsc: Add Isolation VM support for storvsc driver
new 846da38de0e8 net: netvsc: Add Isolation VM support for netvsc driver
new db3c65bc3a13 Drivers: hv: Fix definition of hypercall input & output ar [...]
new e1878402ab2d x86/hyperv: Fix definition of hv_ghcb_pg variable
new 2deb55d9f57b swiotlb: Add CONFIG_HAS_IOMEM check around swiotlb_mem_remap()
new 0bd2fbee9d0b scsi: storvsc: Fix unsigned comparison to zero
new 6a27e396ebb1 Drivers: hv: vmbus: Initialize request offers message for [...]
new 51500b71d500 x86/hyperv: Properly deal with empty cpumasks in hyperv_fl [...]
new 4eea5332d67d scsi: storvsc: Fix storvsc_queuecommand() memory leak
new cb3f09f9afe5 Merge tag 'hyperv-next-signed-20220114' of git://git.kerne [...]
new dc1ce45575b3 KVM: MMU: update comment on the number of page role combinations
new 27592ae8dbe4 KVM: Move wiping of the kvm->vcpus array to common code
new 75a9869f314d KVM: mips: Use kvm_get_vcpu() instead of open-coded access
new 113d10bca23c KVM: s390: Use kvm_get_vcpu() instead of open-coded access
new c5b077549136 KVM: Convert the kvm->vcpus array to a xarray
new 46808a4cb897 KVM: Use 'unsigned long' as kvm_for_each_vcpu()'s index
new 214bd3a6f469 KVM: Convert kvm_for_each_vcpu() to using xa_for_each_range()
new afa319a54a8c KVM: Require total number of memslot pages to fit in an un [...]
new 47ea7d900b1c KVM: Open code kvm_delete_memslot() into its only caller
new 4e4d30cb9b87 KVM: Resync only arch fields when slots_arch_lock gets reacquired
new ce5f0215620c KVM: Use "new" memslot's address space ID instead of dedic [...]
new 537a17b31493 KVM: Let/force architectures to deal with arch specific me [...]
new 509c594ca2dc KVM: arm64: Use "new" memslot instead of userspace memory region
new 3b1816177bfe KVM: MIPS: Drop pr_debug from memslot commit to avoid using "mem"
new eaaaed137ecc KVM: PPC: Avoid referencing userspace memory region in mem [...]
new cf5b486922dc KVM: s390: Use "new" memslot instead of userspace memory region
new 9d7d18ee3f48 KVM: x86: Use "new" memslot instead of userspace memory region
new d01495d4cffb KVM: RISC-V: Use "new" memslot instead of userspace memory region
new 6a99c6e3f52a KVM: Stop passing kvm_userspace_memory_region to arch mems [...]
new 07921665a651 KVM: Use prepare/commit hooks to handle generic memslot me [...]
new 77aedf26fe5d KVM: x86: Don't assume old/new memslots are non-NULL at me [...]
new ec5c86976674 KVM: s390: Skip gfn/size sanity checks on memslot DELETE o [...]
new 7cd08553ab10 KVM: Don't make a full copy of the old memslot in __kvm_se [...]
new e0c2b6338ac8 KVM: x86: Don't call kvm_mmu_change_mmu_pages() if the cou [...]
new f5756029eef5 KVM: x86: Use nr_memslot_pages to avoid traversing the mem [...]
new c928bfc2632f KVM: Integrate gfn_to_memslot_approx() into search_memslots()
new 1e8617d37fc3 KVM: Move WARN on invalid memslot index to update_memslots()
new 26b8345abc75 KVM: Resolve memslot ID via a hash table instead of via a [...]
new ed922739c919 KVM: Use interval tree to do fast hva lookup in memslots
new 6a656832aa75 KVM: s390: Introduce kvm_s390_get_gfn_end()
new a54d806688fe KVM: Keep memslots in tree-based structures instead of arr [...]
new bcb63dcde829 KVM: Call kvm_arch_flush_shadow_memslot() on the old slot [...]
new f4209439b522 KVM: Optimize gfn lookup in kvm_zap_gfn_range()
new 44401a204734 KVM: Optimize overlapping memslots check
new 0f9bdef3d933 KVM: Wait 'til the bitter end to initialize the "new" memslot
new 244893fa2859 KVM: Dynamically allocate "new" memslots from the get-go
new 907afa48e9d0 KVM: nSVM: move nested_vmcb_check_cr3_cr4 logic in nested_ [...]
new f2740a8d851a KVM: nSVM: introduce svm->nested.save to cache save area b [...]
new 7907160dbf1a KVM: nSVM: rename nested_load_control_from_vmcb12 in neste [...]
new b7a3d8b6f433 KVM: nSVM: use vmcb_save_area_cached in nested_vmcb_valid_sregs()
new 355d0473b1a1 KVM: nSVM: use svm->nested.save to load vmcb12 registers a [...]
new bd95926c2b2b KVM: nSVM: split out __nested_vmcb_check_controls
new 8fc78909c05d KVM: nSVM: introduce struct vmcb_ctrl_area_cached
new ce92ef7604ff KVM: x86/mmu: Use shadow page role to detect PML-unfriendl [...]
new 9d395a0a7aca KVM: x86/mmu: Remove need for a vcpu from kvm_slot_page_tr [...]
new 4d78d0b39ad0 KVM: x86/mmu: Remove need for a vcpu from mmu_try_to_unsync_pages
new 8283e36abfff KVM: x86/mmu: Propagate memslot const qualifier
new fb43496c8362 KVM: x86/MMU: Simplify flow of vmx_get_mt_mask
new aefdc2ed445e KVM: Avoid atomic operations when kicking the running vCPU
new 98a26b69d8c3 KVM: x86: change TLB flush indicator to bool
new 1831fa44df74 KVM: VMX: Don't unblock vCPU w/ Posted IRQ if IRQs are dis [...]
new 91b018950717 KVM: SVM: Ensure target pCPU is read once when signalling [...]
new 6f390916c4fb KVM: s390: Ensure kvm_arch_no_poll() is read once when blo [...]
new 510958e99721 KVM: Force PPC to define its own rcuwait object
new 8df6a61c0403 KVM: Update halt-polling stats if and only if halt-polling [...]
new 29e72893cec3 KVM: Refactor and document halt-polling stats update helper
new 30c9434717fd KVM: Reconcile discrepancies in halt-polling stats
new 75c89e5272fb KVM: s390: Clear valid_wakeup in kvm_s390_handle_wait(), n [...]
new 6109c5a6ab7f KVM: arm64: Move vGIC v4 handling for WFI out arch callback hook
new f6c60d081e2c KVM: Don't block+unblock when halt-polling is successful
new 1460179dcd76 KVM: x86: Tweak halt emulation helper names to free up kvm [...]
new 005467e06b16 KVM: Drop obsolete kvm_arch_vcpu_block_finish()
new 91b99ea70657 KVM: Rename kvm_vcpu_block() => kvm_vcpu_halt()
new fac426889439 KVM: Split out a kvm_vcpu_block() helper from kvm_vcpu_halt()
new c3858335c711 KVM: stats: Add stat to detect if vcpu is currently blocking
new 109a98260b53 KVM: Don't redo ktime_get() when calculating halt-polling [...]
new c91d44971459 KVM: x86: Directly block (instead of "halting") UNINITIALI [...]
new cdafece4b964 KVM: x86: Invoke kvm_vcpu_block() directly for non-HALTED [...]
new d92a5d1c6c75 KVM: Add helpers to wake/query blocking vCPU
new 057aa61bc992 KVM: VMX: Skip Posted Interrupt updates if APICv is hard disabled
new c95717218add KVM: VMX: Drop unnecessary PI logic to handle impossible c [...]
new 74ba5bc872d3 KVM: VMX: Use boolean returns for Posted Interrupt "test" helpers
new 29802380b679 KVM: VMX: Drop pointless PI.NDST update when blocking
new 89ef0f21cf96 KVM: VMX: Save/restore IRQs (instead of CLI/STI) during PI [...]
new cfb0e1306a37 KVM: VMX: Read Posted Interrupt "control" exactly once per [...]
new 724b3962ef80 KVM: VMX: Move Posted Interrupt ndst computation out of wr [...]
new baed82c8e489 KVM: VMX: Remove vCPU from PI wakeup list before updating PID.NV
new b1d66dad65dc KVM: x86/svm: Add module param to control PMU virtualization
new 2c5653caecc4 KVM: X86: Ensure that dirty PDPTRs are loaded
new c0d6956e4305 KVM: VMX: Mark VCPU_EXREG_PDPTR available in ept_save_pdptrs()
new 40e49c4f5fb0 KVM: SVM: Track dirtiness of PDPTRs even if NPT is disabled
new 5ec60aad547f KVM: VMX: Add and use X86_CR4_TLBFLUSH_BITS when !enable_ept
new a37ebdce168f KVM: VMX: Add and use X86_CR4_PDPTR_BITS when !enable_ept
new e63f315d74ee KVM: X86: Move CR0 pdptr_bits into header file as X86_CR0_ [...]
new 8f29bf12a378 KVM: SVM: Remove outdated comment in svm_load_mmu_pgd()
new aec9c2402f74 KVM: SVM: Remove references to VCPU_EXREG_CR3
new 3883bc9d28ed KVM: X86: Mark CR3 dirty when vcpu->arch.cr3 is changed
new c62c7bd4f95b KVM: VMX: Update vmcs.GUEST_CR3 only when the guest CR3 is dirty
new 41e68b6964eb KVM: vmx, svm: clean up mass updates to regs_avail/regs_di [...]
new 2e9ebd55096f KVM: X86: Remove kvm_register_clear_available()
new 24cd19a28cb7 KVM: X86: Update mmu->pdptrs only when it is changed
new 6ab8a4053f71 KVM: VMX: Avoid to rdmsrl(MSR_IA32_SYSENTER_ESP)
new 3ab4ac877cfa KVM: VMX: Update msr value after kvm_set_user_return_msr() [...]
new 15ad9762d69f KVM: VMX: Save HOST_CR3 in vmx_prepare_switch_to_guest()
new ed07ef5a66e4 KVM: VMX: Use kvm_set_msr_common() for MSR_IA32_TSC_ADJUST [...]
new fe26f91d30fb KVM: VMX: Change comments about vmx_get_msr()
new 1af4a1199a41 KVM: SVM: Rename get_max_npt_level() to get_npt_level()
new 58356767107a KVM: SVM: Allocate sd->save_area with __GFP_ZERO
new 27f4fca29f9c KVM: X86: Skip allocating pae_root for vcpu->arch.guest_mm [...]
new 84432316cd9a KVM: X86: Fix comment in __kvm_mmu_create()
new 42f34c20a113 KVM: X86: Remove unused declaration of __kvm_mmu_free_some [...]
new 41e35604eaff KVM: X86: Remove useless code to set role.gpte_is_8_bytes [...]
new b46a13cb7ea1 KVM: X86: Calculate quadrant when !role.gpte_is_8_bytes
new 1f5a21ee8400 KVM: X86: Add parameter struct kvm_mmu *mmu into mmu->gva_ [...]
new c59a0f57fa32 KVM: X86: Remove mmu->translate_gpa
new 84ea5c09a66d KVM: X86: Add huge_page_level to __reset_rsvds_bits_mask_ept()
new cc022ae144c1 KVM: X86: Add parameter huge_page_level to kvm_init_shadow [...]
new f8cd457f061d KVM: VMX: Use ept_caps_to_lpage_level() in hardware_setup()
new bb3b394d35e8 KVM: X86: Rename gpte_is_8_bytes to has_4_byte_gpte and in [...]
new 2df4a5eb6c5a KVM: X86: Remove mmu parameter from load_pdptrs()
new ce5977b181c1 KVM: x86: don't print when fail to read/write pv eoi memory
new 51b1209c6125 KVM: Clear pv eoi pending bit only when it is set
new 5e854864ee43 KVM: x86: Handle 32-bit wrap of EIP for EMULTYPE_SKIP with [...]
new 906fa90416fd KVM: x86: Add an emulation type to handle completion of us [...]
new d2f7d49826ae KVM: x86: Use different callback if msr access comes from [...]
new adbfb12d4c45 KVM: x86: Exit to userspace if emulation prepared a comple [...]
new 93b350f884c4 Merge branch 'kvm-on-hv-msrbm-fix' into HEAD
new b84155c38076 KVM: VMX: Introduce vmx_msr_bitmap_l01_changed() helper
new ed2a4800ae9d KVM: nVMX: Track whether changes in L0 require MSR bitmap [...]
new 502d2bf5f2fd KVM: nVMX: Implement Enlightened MSR Bitmap feature
new 8e819d75cbcf KVM: x86: add a tracepoint for APICv/AVIC interrupt delivery
new 83c98007d9fb KVM: nVMX: Ensure vCPU honors event request if posting nes [...]
new 45af1bb99b72 KVM: VMX: Clean up PI pre/post-block WARNs
new dc70ec217cec KVM: Introduce CONFIG_HAVE_KVM_DIRTY_RING
new 6f2cdbdba43e KVM: Add Makefile.kvm for common files, use it for x86
new f786ab1bf17a KVM: s390: Use Makefile.kvm for common files
new ae1b606e6207 KVM: mips: Use Makefile.kvm for common files
new 3e3aa26fd4c4 KVM: RISC-V: Use Makefile.kvm for common files
new 5f33868af8f4 KVM: powerpc: Use Makefile.kvm for common files
new d8f6ef45a623 KVM: arm64: Use Makefile.kvm for common files
new 5a213b9220e0 Merge branch 'topic/ppc-kvm' of https://git.kernel.org/pub [...]
new 855fb0384a3d Merge remote-tracking branch 'kvm/master' into HEAD
new 49ae248b61ae KVM: s390: Fix names of skey constants in api documentation
new 416e7f0c9d61 KVM: s390: gaccess: Refactor gpa and length calculation
new 7faa543df19b KVM: s390: gaccess: Refactor access address range check
new bad13799e030 KVM: s390: gaccess: Cleanup access to guest pages
new 3c724f1a1caa s390: uv: Add offset comments to UV query struct and fix naming
new 812de04661c4 KVM: s390: Clarify SIGP orders versus STOP/RESTART
new 5e4e84f1124a Merge tag 'kvm-s390-next-5.17-1' of git://git.kernel.org/p [...]
new bff01a61af3c KVM: arm64: Move SVE state mapping at HYP to finalize-time
new 052f064d42b7 KVM: arm64: Move kvm_arch_vcpu_run_pid_change() out of line
new 1408e73d21fe KVM: arm64: Restructure the point where has_run_once is ad [...]
new b5aa368abfbf KVM: arm64: Merge kvm_arch_vcpu_run_pid_change() and kvm_v [...]
new cc5705fb1bf1 KVM: arm64: Drop vcpu->arch.has_run_once for vcpu->pid
new e525523c1989 Merge branch kvm-arm64/vcpu-first-run into kvmarm-master/next
new 892fd259cbf6 KVM: arm64: Reorder vcpu flag definitions
new 8383741ab2e7 KVM: arm64: Get rid of host SVE tracking/saving
new e66425fc9ba3 KVM: arm64: Remove unused __sve_save_state
new af9a0e21d817 KVM: arm64: Introduce flag shadowing TIF_FOREIGN_FPSTATE
new bee14bca735a KVM: arm64: Stop mapping current thread_info at EL2
new 31aa126de88e arm64/fpsimd: Document the use of TIF_FOREIGN_FPSTATE by KVM
new 2d761dbf7ff4 Merge branch kvm-arm64/fpsimd-tracking into kvmarm-master/next
new 7e04f05984dd arm64: Add missing include of asm/cpufeature.h to asm/mmu.h
new ed4ed15d5710 KVM: arm64: Generate hyp_constants.h for the host
new 9429f4b0412d KVM: arm64: Move host EL1 code out of hyp/ directory
new 370a17f531f1 Merge branch kvm-arm64/hyp-header-split into kvmarm-master/next
new 00e228b31596 KVM: arm64: Add minimal handling for the ARMv8.7 PMU
new 636dcd020459 KVM: arm64: Constify kvm_io_gic_ops
new f0e6e6fa41b3 KVM: Drop stale kvm_is_transparent_hugepage() declaration
new 94b4a6d52173 Merge branch kvm-arm64/misc-5.17 into kvmarm-master/next
new 34b43a884922 KVM: arm64: pkvm: Fix hyp_pool max order
new a770ee80e662 KVM: arm64: pkvm: Disable GICv2 support
new 53a563b01fa2 KVM: arm64: Make the hyp memory pool static
new 473a3efbafaa KVM: arm64: Make __io_map_base static
new bff01cb6b1bf KVM: arm64: pkvm: Stub io map functions
new 64a1fbda59f4 KVM: arm64: pkvm: Make kvm_host_owns_hyp_mappings() robust to VHE
new 7b6871f67002 Merge branch kvm-arm64/pkvm-cleanups-5.17 into kvmarm-master/next
new c95b1d7ca794 KVM: arm64: vgic-v3: Fix vcpu index comparison
new 440523b92be6 KVM: arm64: vgic: Demote userspace-triggered console print [...]
new ce5b5b05c168 Merge branch kvm-arm64/vgic-fixes-5.17 into kvmarm-master/next
new 1fac3cfb9cc6 KVM: arm64: Provide {get,put}_page() stubs for early hyp a [...]
new 2ea2ff91e822 KVM: arm64: Refcount hyp stage-1 pgtable pages
new d6b4bd3f4897 KVM: arm64: Fixup hyp stage-1 refcount
new 34ec7cbf1ee0 KVM: arm64: Hook up ->page_count() for hypervisor stage-1 [...]
new 82bb02445de5 KVM: arm64: Implement kvm_pgtable_hyp_unmap() at EL2
new 3f868e142c0b KVM: arm64: Introduce kvm_share_hyp()
new a83e2191b7f1 KVM: arm64: pkvm: Refcount the pages shared with EL2
new 3d467f7b8c0a KVM: arm64: Extend pkvm_page_state enumeration to handle a [...]
new 61d99e33e757 KVM: arm64: Introduce wrappers for host and hyp spin lock [...]
new e82edcc75c4e KVM: arm64: Implement do_share() helper for sharing memory
new 1ee32109fd78 KVM: arm64: Implement __pkvm_host_share_hyp() using do_share()
new 376a240f0379 KVM: arm64: Implement do_unshare() helper for unsharing memory
new b8cc6eb5bded KVM: arm64: Expose unshare hypercall to the host
new 52b28657ebd7 KVM: arm64: pkvm: Unshare guest structs during teardown
new 43d8ac22125e Merge branch kvm-arm64/pkvm-hyp-sharing into kvmarm-master/next
new cb7c4f364abd KVM: selftests: arm64: Initialise default guest mode at te [...]
new 357c628e1248 KVM: selftests: arm64: Introduce a variable default IPA size
new 0303ffdb9ecf KVM: selftests: arm64: Check for supported page sizes
new 2f41a61c54fb KVM: selftests: arm64: Rework TCR_EL1 configuration
new e7f58a6bd28b KVM: selftests: arm64: Add support for VM_MODE_P36V48_{4K,64K}
new aa674de1dc3d KVM: selftests: arm64: Add support for various modes with [...]
new 089606c0de9e Merge branch kvm-arm64/selftest/ipa into kvmarm-master/next
new 33a1ca736e74 KVM: selftests: aarch64: Move gic_v3.h to shared headers
new 745068367ccb KVM: selftests: aarch64: Add function for accessing GICv3 [...]
new 17ce617bf76a KVM: selftests: aarch64: Add GICv3 register accessor libra [...]
new 227895ed6d03 KVM: selftests: Add kvm_irq_line library function
new e95def3a904d KVM: selftests: aarch64: Add vGIC library functions to dea [...]
new 50b020cdb7f7 KVM: selftests: aarch64: Add vgic_irq to test userspace IR [...]
new e1cb399eed1e KVM: selftests: aarch64: Abstract the injection functions [...]
new e5410ee2806d KVM: selftests: aarch64: Cmdline arg to set number of IRQs [...]
new 8a35b2877d9a KVM: selftests: aarch64: Cmdline arg to set EOI mode in vgic_irq
new 0ad3ff4a6adc KVM: selftests: aarch64: Add preemption tests in vgic_irq
new 92f2cc4aa796 KVM: selftests: aarch64: Level-sensitive interrupts tests [...]
new 6830fa915912 KVM: selftests: aarch64: Add tests for LEVEL_INFO in vgic_irq
new 90f50acac9ee KVM: selftests: aarch64: Add test_inject_fail to vgic_irq
new 88209c104e9b KVM: selftests: Add IRQ GSI routing library functions
new 6a5a47188cac KVM: selftests: aarch64: Add tests for IRQFD in vgic_irq
new bebd8f3f8693 KVM: selftests: aarch64: Add ISPENDR write tests in vgic_irq
new 728fcc46d2c2 KVM: selftests: aarch64: Add test for restoring active IRQs
new ad7937dc7745 Merge branch kvm-arm64/selftest/irq-injection into kvmarm- [...]
new 142ff9bddbde KVM: arm64: Drop unused workaround_flags vcpu field
new 9d8604b28575 KVM: arm64: Rework kvm_pgtable initialisation
new 500ca5241bf8 KVM: arm64: Use defined value for SCTLR_ELx_EE
new a080e323be8d KVM: arm64: Fix comment for kvm_reset_vcpu()
new dda0190d7ff7 KVM: arm64: Fix comment on barrier in kvm_psci_vcpu_on()
new f15dcf1b5853 KVM: arm64: selftests: get-reg-list: Add pauth configuration
new e938eddbeb85 KVM: arm64: Fix comment typo in kvm_vcpu_finalize_sve()
new 6c9eeb5f4a9b KVM: arm64: vgic: Replace kernel.h with the necessary inclusions
new 1c53a1ae3612 Merge branch kvm-arm64/misc-5.17 into kvmarm-master/next
new 7fd55a02a426 Merge tag 'kvmarm-5.17' of git://git.kernel.org/pub/scm/li [...]
new cc4f602bc436 KVM: RISC-V: Use common KVM implementation of MMU memory caches
new cf70be9d214c RISC-V: KVM: Mark the existing SBI implementation as v0.1
new a046c2d8578c RISC-V: KVM: Reorganize SBI code by moving SBI v0.1 to its [...]
new c62a76859723 RISC-V: KVM: Add SBI v0.2 base extension
new 5f862df5585c RISC-V: KVM: Add v0.1 replacement SBI extensions defined in v0.2
new 3e1d86569c21 RISC-V: KVM: Add SBI HSM extension in KVM
new 4abed558b2ce MAINTAINERS: Update Atish's email address
new 637ad6551b28 RISC-V: KVM: make kvm_riscv_vcpu_fp_clean() static
new ef8949a986f0 RISC-V: KVM: Forward SBI experimental and vendor extensions
new a457fd5660ef RISC-V: KVM: Add VM capability to allow userspace get GPA bits
new 788490e798a7 KVM: selftests: Add EXTRA_CFLAGS in top-level Makefile
new 3e06cdf10520 KVM: selftests: Add initial support for RISC-V 64-bit
new 33e5b5746cc2 KVM: RISC-V: Avoid spurious virtual interrupts after clear [...]
new 497685f2c743 MAINTAINERS: Update Anup's email address
new 1b0c9d00aa2c Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-ris [...]
new 4c66b56781eb selftests: KVM: sev_migrate_tests: Fix test_sev_mirror()
new 427d046a41bb selftests: KVM: sev_migrate_tests: Fix sev_ioctl()
new a6fec53947cf selftests: KVM: sev_migrate_tests: Add mirror command tests
new 46cbc0400f85 Revert "KVM: X86: Update mmu->pdptrs only when it is changed"
new a9f2705ec844 KVM: VMX: Save HOST_CR3 in vmx_set_host_fs_gs()
new 6b123c3a89a9 KVM: x86/mmu: Reconstruct shadow page root if the guest PD [...]
new 5b61178cd2fd KVM: VMX: Mark VCPU_EXREG_CR3 dirty when !CR0_PG -> CR0_PG [...]
new 006a0f0607e1 KVM: x86: avoid out of bounds indices for fixed performanc [...]
new 761875634a5e KVM: x86/pmu: Setup pmc->eventsel for fixed PMCs
new 7c174f305cbe KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id()
new 6ed1298eb0bf KVM: x86/pmu: Reuse pmc_perf_hw_id() and drop find_fixed_event()
new 40ccb96d5483 KVM: x86/pmu: Add pmc->intr to refactor kvm_perf_overflow{ [...]
new 9cd803d496e7 KVM: x86: Update vPMCs when retiring instructions
new 018d70ffcfec KVM: x86: Update vPMCs when retiring branch instructions
new f3f26dae05e3 x86/kvm: Silence per-cpu pr_info noise about KVM clocks an [...]
new 2efd61a608b0 KVM: Warn if mark_page_dirty() is called without an active vCPU
new 982ed0de4753 KVM: Reinstate gfn_to_pfn_cache with invalidation support
new 1cfc9c4b9d46 KVM: x86/xen: Maintain valid mapping of Xen shared_info page
new 14243b387137 KVM: x86/xen: Add KVM_IRQ_ROUTING_XEN_EVTCHN and event cha [...]
new 55749769fe60 KVM: x86: Fix wall clock writes in Xen shared_info not to [...]
new 907d139318b5 KVM: VMX: Provide vmread version using asm-goto-with-outputs
new 405329fc9aee KVM: SVM: include CR3 in initial VMSA state for SEV-ES guests
new 7d9a662ed9f0 kvm: selftests: move base kvm_util.h declarations to kvm_u [...]
new 96c1a6285568 kvm: selftests: move ucall declarations into ucall_common.h
new 980fe2fddcff x86/fpu: Extend fpu_xstate_prctl() with guest permissions
new 36487e6228c4 x86/fpu: Prepare guest FPU for dynamically enabled FPU features
new cc04b6a21d43 kvm: x86: Fix xstate_required_size() to follow XSTATE alig [...]
new 445ecdf79be0 kvm: x86: Exclude unpermitted xfeatures at KVM_GET_SUPPORT [...]
new b0237dad2d7f x86/fpu: Make XFD initialization in __fpstate_reset() a fu [...]
new c270ce393dfd x86/fpu: Add guest support to xfd_enable_feature()
new 0781d60f658e x86/fpu: Provide fpu_enable_guest_xfd_features() for KVM
new 5ab2f45bba48 kvm: x86: Enable dynamic xfeatures at KVM_SET_CPUID2
new 8eb9a48ac1e8 x86/fpu: Provide fpu_update_guest_xfd() for IA32_XFD emulation
new 820a6ee944e7 kvm: x86: Add emulation for IA32_XFD
new 1df4fd834e8e x86/fpu: Prepare xfd_err in struct fpu_guest
new ec5be88ab29f kvm: x86: Intercept #NM for saving IA32_XFD_ERR
new 548e83650a51 kvm: x86: Emulate IA32_XFD_ERR for guest
new 61f208134a87 kvm: x86: Disable RDMSR interception of IA32_XFD_ERR
new 86aff7a47992 kvm: x86: Add XCR0 support for Intel AMX
new 690a757d610e kvm: x86: Add CPUID support for Intel AMX
new c60427dd50ba x86/fpu: Add uabi_size to guest_fpu
new be50b2065dfa kvm: x86: Add support for getting/setting expanded xstate buffer
new 415a3c33e847 kvm: selftests: Add support for KVM_CAP_XSAVE2
new 5429cead0119 x86/fpu: Provide fpu_sync_guest_vmexit_xfd_state()
new b5274b1b7ba8 kvm: x86: Disable interception for IA32_XFD on demand
new 551447cfa5dc selftest: kvm: Reorder vcpu_load_state steps for AMX
new 6559b4a523cd selftest: kvm: Move struct kvm_x86_state to header
new bf70636d9443 selftest: kvm: Add amx selftest
new c862dcd19975 x86/fpu: Fix inline prefix warnings
new 79e06c4c4950 Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
The 298 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
.mailmap | 2 +
Documentation/virt/kvm/api.rst | 85 +-
Documentation/virt/kvm/mmu.rst | 8 +-
MAINTAINERS | 4 +-
arch/arm64/include/asm/kvm_asm.h | 1 +
arch/arm64/include/asm/kvm_emulate.h | 4 +-
arch/arm64/include/asm/kvm_host.h | 47 +-
arch/arm64/include/asm/kvm_hyp.h | 1 -
arch/arm64/include/asm/kvm_mmu.h | 2 +
arch/arm64/include/asm/kvm_pgtable.h | 30 +-
.../include/nvhe/mm.h => include/asm/kvm_pkvm.h} | 45 +-
arch/arm64/include/asm/mmu.h | 1 +
arch/arm64/include/asm/sysreg.h | 1 +
arch/arm64/kernel/asm-offsets.c | 1 -
arch/arm64/kernel/fpsimd.c | 6 +-
arch/arm64/kvm/.gitignore | 2 +
arch/arm64/kvm/Kconfig | 1 +
arch/arm64/kvm/Makefile | 24 +-
arch/arm64/kvm/arch_timer.c | 13 +-
arch/arm64/kvm/arm.c | 128 ++-
arch/arm64/kvm/fpsimd.c | 79 +-
arch/arm64/kvm/handle_exit.c | 5 +-
arch/arm64/kvm/hyp/Makefile | 2 +-
arch/arm64/kvm/hyp/fpsimd.S | 6 -
arch/arm64/kvm/hyp/hyp-constants.c | 10 +
arch/arm64/kvm/hyp/include/hyp/switch.h | 30 +-
arch/arm64/kvm/hyp/include/nvhe/mem_protect.h | 6 +
arch/arm64/kvm/hyp/include/nvhe/mm.h | 59 --
arch/arm64/kvm/hyp/nvhe/early_alloc.c | 5 +
arch/arm64/kvm/hyp/nvhe/hyp-main.c | 8 +
arch/arm64/kvm/hyp/nvhe/mem_protect.c | 505 ++++++++--
arch/arm64/kvm/hyp/nvhe/mm.c | 4 +-
arch/arm64/kvm/hyp/nvhe/page_alloc.c | 2 +-
arch/arm64/kvm/hyp/nvhe/setup.c | 25 +-
arch/arm64/kvm/hyp/nvhe/switch.c | 1 -
arch/arm64/kvm/hyp/pgtable.c | 108 +-
arch/arm64/kvm/hyp/vhe/switch.c | 1 -
arch/arm64/kvm/mmu.c | 177 +++-
arch/arm64/kvm/{hyp/reserved_mem.c => pkvm.c} | 8 +-
arch/arm64/kvm/pmu-emul.c | 3 +-
arch/arm64/kvm/psci.c | 10 +-
arch/arm64/kvm/reset.c | 30 +-
arch/arm64/kvm/vgic/vgic-init.c | 12 +-
arch/arm64/kvm/vgic/vgic-kvm-device.c | 2 +-
arch/arm64/kvm/vgic/vgic-mmio-v2.c | 3 +-
arch/arm64/kvm/vgic/vgic-mmio-v3.c | 15 +-
arch/arm64/kvm/vgic/vgic-mmio.c | 2 +-
arch/arm64/kvm/vgic/vgic-mmio.h | 2 +-
arch/arm64/kvm/vgic/vgic-v2.c | 9 +-
arch/arm64/kvm/vgic/vgic-v3.c | 10 +-
arch/arm64/kvm/vgic/vgic-v4.c | 5 +-
arch/arm64/kvm/vgic/vgic.c | 2 +-
arch/mips/include/asm/kvm_host.h | 1 -
arch/mips/kvm/Kconfig | 1 +
arch/mips/kvm/Makefile | 3 +-
arch/mips/kvm/emulate.c | 2 +-
arch/mips/kvm/loongson_ipi.c | 4 +-
arch/mips/kvm/mips.c | 32 +-
arch/powerpc/include/asm/kvm_host.h | 2 +-
arch/powerpc/include/asm/kvm_ppc.h | 14 +-
arch/powerpc/kvm/Kconfig | 1 +
arch/powerpc/kvm/Makefile | 8 +-
arch/powerpc/kvm/book3s.c | 14 +-
arch/powerpc/kvm/book3s_32_mmu.c | 2 +-
arch/powerpc/kvm/book3s_64_mmu.c | 2 +-
arch/powerpc/kvm/book3s_64_mmu_hv.c | 4 +-
arch/powerpc/kvm/book3s_hv.c | 36 +-
arch/powerpc/kvm/book3s_hv_nested.c | 4 +-
arch/powerpc/kvm/book3s_hv_uvmem.c | 14 +-
arch/powerpc/kvm/book3s_pr.c | 13 +-
arch/powerpc/kvm/book3s_pr_papr.c | 2 +-
arch/powerpc/kvm/book3s_xics.c | 6 +-
arch/powerpc/kvm/book3s_xics.h | 2 +-
arch/powerpc/kvm/book3s_xive.c | 15 +-
arch/powerpc/kvm/book3s_xive.h | 4 +-
arch/powerpc/kvm/book3s_xive_native.c | 8 +-
arch/powerpc/kvm/booke.c | 9 +-
arch/powerpc/kvm/e500_emulate.c | 2 +-
arch/powerpc/kvm/powerpc.c | 24 +-
arch/riscv/include/asm/kvm_host.h | 12 +-
arch/riscv/include/asm/kvm_types.h | 2 +-
arch/riscv/include/asm/kvm_vcpu_sbi.h | 33 +
arch/riscv/include/asm/sbi.h | 9 +
arch/riscv/kvm/Makefile | 10 +-
arch/riscv/kvm/main.c | 8 +
arch/riscv/kvm/mmu.c | 102 +-
arch/riscv/kvm/vcpu.c | 28 +-
arch/riscv/kvm/vcpu_exit.c | 2 +-
arch/riscv/kvm/vcpu_fp.c | 2 +-
arch/riscv/kvm/vcpu_sbi.c | 213 ++--
arch/riscv/kvm/vcpu_sbi_base.c | 99 ++
arch/riscv/kvm/vcpu_sbi_hsm.c | 105 ++
arch/riscv/kvm/vcpu_sbi_replace.c | 135 +++
arch/riscv/kvm/{vcpu_sbi.c => vcpu_sbi_v01.c} | 121 +--
arch/riscv/kvm/vm.c | 13 +-
arch/riscv/kvm/vmid.c | 2 +-
arch/s390/include/asm/kvm_host.h | 2 -
arch/s390/include/asm/uv.h | 34 +-
arch/s390/kvm/Kconfig | 1 +
arch/s390/kvm/Makefile | 8 +-
arch/s390/kvm/gaccess.c | 158 +--
arch/s390/kvm/interrupt.c | 12 +-
arch/s390/kvm/kvm-s390.c | 161 ++-
arch/s390/kvm/kvm-s390.h | 19 +-
arch/s390/kvm/pv.c | 4 +-
arch/s390/kvm/sigp.c | 28 +
arch/x86/hyperv/hv_init.c | 14 +-
arch/x86/hyperv/ivm.c | 28 +
arch/x86/hyperv/mmu.c | 19 +-
arch/x86/include/asm/cpufeatures.h | 2 +
arch/x86/include/asm/fpu/api.h | 11 +
arch/x86/include/asm/fpu/types.h | 32 +
arch/x86/include/asm/kvm-x86-ops.h | 1 +
arch/x86/include/asm/kvm_host.h | 65 +-
arch/x86/include/asm/kvm_page_track.h | 6 +-
arch/x86/include/asm/mshyperv.h | 2 +-
arch/x86/include/uapi/asm/kvm.h | 16 +-
arch/x86/include/uapi/asm/prctl.h | 26 +-
arch/x86/kernel/cc_platform.c | 8 +
arch/x86/kernel/cpu/mshyperv.c | 15 +-
arch/x86/kernel/fpu/core.c | 99 +-
arch/x86/kernel/fpu/xstate.c | 147 ++-
arch/x86/kernel/fpu/xstate.h | 19 +-
arch/x86/kernel/kvm.c | 6 +-
arch/x86/kernel/kvmclock.c | 2 +-
arch/x86/kernel/process.c | 2 +
arch/x86/kvm/Kconfig | 3 +
arch/x86/kvm/Makefile | 7 +-
arch/x86/kvm/cpuid.c | 88 +-
arch/x86/kvm/cpuid.h | 2 +
arch/x86/kvm/debugfs.c | 6 +-
arch/x86/kvm/emulate.c | 55 +-
arch/x86/kvm/hyperv.c | 9 +-
arch/x86/kvm/i8254.c | 2 +-
arch/x86/kvm/i8259.c | 5 +-
arch/x86/kvm/ioapic.c | 4 +-
arch/x86/kvm/irq_comm.c | 19 +-
arch/x86/kvm/kvm_cache_regs.h | 20 +-
arch/x86/kvm/kvm_emulate.h | 1 +
arch/x86/kvm/kvm_onhyperv.c | 3 +-
arch/x86/kvm/lapic.c | 63 +-
arch/x86/kvm/mmu.h | 16 +-
arch/x86/kvm/mmu/mmu.c | 151 ++-
arch/x86/kvm/mmu/mmu_internal.h | 9 +-
arch/x86/kvm/mmu/mmutrace.h | 2 +-
arch/x86/kvm/mmu/page_track.c | 8 +-
arch/x86/kvm/mmu/paging_tmpl.h | 48 +-
arch/x86/kvm/mmu/spte.c | 6 +-
arch/x86/kvm/mmu/spte.h | 2 +-
arch/x86/kvm/mmu/tdp_mmu.c | 2 +-
arch/x86/kvm/pmu.c | 128 ++-
arch/x86/kvm/pmu.h | 5 +-
arch/x86/kvm/svm/avic.c | 16 +-
arch/x86/kvm/svm/nested.c | 262 +++--
arch/x86/kvm/svm/pmu.c | 23 +-
arch/x86/kvm/svm/sev.c | 9 +-
arch/x86/kvm/svm/svm.c | 66 +-
arch/x86/kvm/svm/svm.h | 71 +-
arch/x86/kvm/trace.h | 24 +
arch/x86/kvm/vmx/capabilities.h | 9 +
arch/x86/kvm/vmx/nested.c | 65 +-
arch/x86/kvm/vmx/pmu_intel.c | 49 +-
arch/x86/kvm/vmx/posted_intr.c | 159 +--
arch/x86/kvm/vmx/posted_intr.h | 6 +-
arch/x86/kvm/vmx/vmcs.h | 5 +
arch/x86/kvm/vmx/vmx.c | 216 ++--
arch/x86/kvm/vmx/vmx.h | 44 +-
arch/x86/kvm/vmx/vmx_ops.h | 27 +
arch/x86/kvm/x86.c | 405 +++++---
arch/x86/kvm/x86.h | 1 -
arch/x86/kvm/xen.c | 341 ++++++-
arch/x86/kvm/xen.h | 9 +
drivers/hv/channel_mgmt.c | 2 +-
drivers/hv/hv_common.c | 15 +-
drivers/hv/vmbus_drv.c | 4 +
drivers/net/hyperv/hyperv_net.h | 5 +
drivers/net/hyperv/netvsc.c | 136 ++-
drivers/net/hyperv/netvsc_drv.c | 1 +
drivers/net/hyperv/rndis_filter.c | 2 +
drivers/scsi/storvsc_drv.c | 54 +-
include/asm-generic/mshyperv.h | 6 +-
include/kvm/arm_vgic.h | 4 +-
include/linux/hyperv.h | 6 +
include/linux/kvm_dirty_ring.h | 14 +-
include/linux/kvm_host.h | 432 ++++++--
include/linux/kvm_types.h | 19 +
include/linux/swiotlb.h | 6 +
include/uapi/linux/kvm.h | 16 +
kernel/dma/swiotlb.c | 50 +-
tools/arch/x86/include/uapi/asm/kvm.h | 16 +-
tools/include/uapi/linux/kvm.h | 3 +
tools/testing/selftests/kvm/.gitignore | 1 +
tools/testing/selftests/kvm/Makefile | 16 +-
tools/testing/selftests/kvm/aarch64/arch_timer.c | 2 +-
tools/testing/selftests/kvm/aarch64/get-reg-list.c | 50 +
tools/testing/selftests/kvm/aarch64/vgic_irq.c | 853 ++++++++++++++++
tools/testing/selftests/kvm/include/aarch64/gic.h | 26 +
.../kvm/{lib => include}/aarch64/gic_v3.h | 12 +
.../selftests/kvm/include/aarch64/processor.h | 3 +
tools/testing/selftests/kvm/include/aarch64/vgic.h | 18 +-
tools/testing/selftests/kvm/include/kvm_util.h | 409 +-------
.../kvm/include/{kvm_util.h => kvm_util_base.h} | 89 +-
.../selftests/kvm/include/riscv/processor.h | 135 +++
tools/testing/selftests/kvm/include/ucall_common.h | 59 ++
.../selftests/kvm/include/x86_64/processor.h | 26 +-
tools/testing/selftests/kvm/lib/aarch64/gic.c | 66 ++
.../selftests/kvm/lib/aarch64/gic_private.h | 11 +
tools/testing/selftests/kvm/lib/aarch64/gic_v3.c | 206 +++-
.../testing/selftests/kvm/lib/aarch64/processor.c | 82 +-
tools/testing/selftests/kvm/lib/aarch64/vgic.c | 103 +-
tools/testing/selftests/kvm/lib/guest_modes.c | 59 +-
tools/testing/selftests/kvm/lib/kvm_util.c | 126 +++
tools/testing/selftests/kvm/lib/riscv/processor.c | 362 +++++++
tools/testing/selftests/kvm/lib/riscv/ucall.c | 87 ++
tools/testing/selftests/kvm/lib/x86_64/processor.c | 95 +-
tools/testing/selftests/kvm/x86_64/amx_test.c | 448 ++++++++
tools/testing/selftests/kvm/x86_64/evmcs_test.c | 2 +-
.../selftests/kvm/x86_64/sev_migrate_tests.c | 59 +-
tools/testing/selftests/kvm/x86_64/smm_test.c | 2 +-
tools/testing/selftests/kvm/x86_64/state_test.c | 2 +-
.../kvm/x86_64/vmx_preemption_timer_test.c | 2 +-
.../testing/selftests/kvm/x86_64/xen_shinfo_test.c | 184 +++-
virt/kvm/Kconfig | 6 +
virt/kvm/Makefile.kvm | 14 +
virt/kvm/async_pf.c | 2 +-
virt/kvm/dirty_ring.c | 11 +-
virt/kvm/kvm_main.c | 1066 ++++++++++++--------
virt/kvm/kvm_mm.h | 44 +
virt/kvm/mmu_lock.h | 23 -
virt/kvm/pfncache.c | 337 +++++++
230 files changed, 8851 insertions(+), 3133 deletions(-)
copy arch/arm64/{kvm/hyp/include/nvhe/mm.h => include/asm/kvm_pkvm.h} (53%)
create mode 100644 arch/arm64/kvm/.gitignore
create mode 100644 arch/arm64/kvm/hyp/hyp-constants.c
rename arch/arm64/kvm/{hyp/reserved_mem.c => pkvm.c} (94%)
create mode 100644 arch/riscv/include/asm/kvm_vcpu_sbi.h
create mode 100644 arch/riscv/kvm/vcpu_sbi_base.c
create mode 100644 arch/riscv/kvm/vcpu_sbi_hsm.c
create mode 100644 arch/riscv/kvm/vcpu_sbi_replace.c
copy arch/riscv/kvm/{vcpu_sbi.c => vcpu_sbi_v01.c} (50%)
create mode 100644 tools/testing/selftests/kvm/aarch64/vgic_irq.c
rename tools/testing/selftests/kvm/{lib => include}/aarch64/gic_v3.h (80%)
copy tools/testing/selftests/kvm/include/{kvm_util.h => kvm_util_base.h} (87%)
create mode 100644 tools/testing/selftests/kvm/include/riscv/processor.h
create mode 100644 tools/testing/selftests/kvm/include/ucall_common.h
create mode 100644 tools/testing/selftests/kvm/lib/riscv/processor.c
create mode 100644 tools/testing/selftests/kvm/lib/riscv/ucall.c
create mode 100644 tools/testing/selftests/kvm/x86_64/amx_test.c
create mode 100644 virt/kvm/Makefile.kvm
create mode 100644 virt/kvm/kvm_mm.h
delete mode 100644 virt/kvm/mmu_lock.h
create mode 100644 virt/kvm/pfncache.c
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository gcc.
from 9d7e19255c0 Add VxWorks fixincludes hack, open posix API for C++
new a78b1ab1df9 amdgcn: Tune default OpenMP/OpenACC GPU utilization
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
libgomp/plugin/plugin-gcn.c | 82 ++++++++++++++++++++++++++++++++++++---------
1 file changed, 67 insertions(+), 15 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_bmk_llvm_apm/llvm-release-arm-spec2k6-Oz_LTO
in repository toolchain/ci/llvm-project.
from bfb1bd1b9906 [Clang][Sema] Avoid crashing for va_arg expressions with b [...]
adds eecd0f055baa Have lit preserve SOURCE_DATE_EPOCH
adds eaeb7dcf3249 ARM: make FastISel & GISel pass -1 to ADJCALLSTACKUP to si [...]
adds 52a400d8e4c4 [InlineCost] model calls to llvm.is.constant* more carefully
adds 9d9efb1f67ff [lld][CMake] Add LLD_DEFAULT_NOSTART_STOP_GC
adds b9a243d1cac2 [Coroutines] Enhance symmetric transfer for constant CmpInst
adds 5869ea6c6254 [sanitizer] msan build fix on non linux platforms
adds fc043d8a256b Revert "[lld][CMake] Add LLD_DEFAULT_NOSTART_STOP_GC"
No new revisions were added by this update.
Summary of changes:
compiler-rt/lib/msan/msan_interceptors.cpp | 1 +
llvm/lib/Analysis/InlineCost.cpp | 24 ++++++
llvm/lib/Target/ARM/ARMCallLowering.cpp | 2 +-
llvm/lib/Target/ARM/ARMFastISel.cpp | 2 +-
llvm/lib/Transforms/Coroutines/CoroSplit.cpp | 98 ++++++++++++++--------
.../CodeGen/ARM/GlobalISel/arm-call-lowering.ll | 16 ++--
.../CodeGen/ARM/GlobalISel/arm-param-lowering.ll | 26 +++---
.../GlobalISel/irtranslator-varargs-lowering.ll | 8 +-
llvm/test/CodeGen/ARM/fast-call-frame-restore.ll | 19 +++++
.../Transforms/Coroutines/coro-split-musttail4.ll | 65 ++++++++++++++
.../Inline/call-intrinsic-is-constant.ll | 39 +++++++++
llvm/utils/lit/lit/TestingConfig.py | 2 +-
12 files changed, 239 insertions(+), 63 deletions(-)
create mode 100644 llvm/test/CodeGen/ARM/fast-call-frame-restore.ll
create mode 100644 llvm/test/Transforms/Coroutines/coro-split-musttail4.ll
create mode 100644 llvm/test/Transforms/Inline/call-intrinsic-is-constant.ll
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_bmk_llvm_apm/llvm-release-arm-spec2k6-Oz_LTO
in repository toolchain/ci/binutils-gdb.
from 22f9d25c97 Automatic date update in version.in
adds d114d4e9bc Automatic date update in version.in
adds ebadd3ef87 Automatic date update in version.in
adds eb31394c23 Automatic date update in version.in
adds 6e072dd0f1 Automatic date update in version.in
adds 1f5be5f22a Automatic date update in version.in
adds f60dbe8d12 Automatic date update in version.in
No new revisions were added by this update.
Summary of changes:
bfd/version.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_bmk_llvm_apm/llvm-release-arm-spec2k6-Oz_LTO
in repository toolchain/ci/base-artifacts.
discards 2c9d8dce 0: update: binutils-gcc-linux-glibc-llvm: 1
new ad301ed9 0: update: binutils-gcc-linux-glibc-llvm: 1
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (2c9d8dce)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_bmk_llvm_apm/llvm-releas [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log.xz | Bin 1564 -> 1700 bytes
02-prepare_abe/console.log.xz | Bin 2760 -> 2776 bytes
03-build_abe-binutils/console.log.xz | Bin 41812 -> 42524 bytes
04-build_abe-stage1/console.log.xz | Bin 85532 -> 86704 bytes
06-build_abe-linux/console.log.xz | Bin 8936 -> 9024 bytes
07-build_abe-glibc/console.log.xz | Bin 224848 -> 227188 bytes
08-build_abe-stage2/console.log.xz | Bin 205576 -> 211408 bytes
09-build_llvm-true/console.log.xz | Bin 58152 -> 57300 bytes
10-benchmark/benchmark-build.log | 36 +-
10-benchmark/benchmark.log | 34 +-
10-benchmark/console.log.xz | Bin 3100 -> 3104 bytes
11-check_regression/console.log.xz | Bin 2724 -> 2796 bytes
11-check_regression/results-0.csv | 188 +-
11-check_regression/results-1.csv | 196 +-
11-check_regression/results-brief.csv | 37 +-
11-check_regression/results-full.csv | 202 +-
11-check_regression/results-perf-0.csv | 188 +-
11-check_regression/results-perf-1.csv | 196 +-
11-check_regression/results.csv | 44 +-
11-check_regression/results.log | 3414 +++++++++----------
12-update_baseline/console.log | 1474 ++++-----
12-update_baseline/results-0.csv | 188 +-
12-update_baseline/results-1.csv | 196 +-
12-update_baseline/results-brief.csv | 37 +-
12-update_baseline/results-full.csv | 202 +-
12-update_baseline/results-perf-0.csv | 188 +-
12-update_baseline/results-perf-1.csv | 196 +-
12-update_baseline/results.csv | 44 +-
12-update_baseline/results.log | 3418 ++++++++++----------
.../top-artifacts/save-temps/400.perlbench.tar.xz | Bin 397048 -> 396996 bytes
.../top-artifacts/save-temps/401.bzip2.tar.xz | Bin 42320 -> 42276 bytes
.../top-artifacts/save-temps/403.gcc.tar.xz | Bin 1196848 -> 1196904 bytes
.../top-artifacts/save-temps/429.mcf.tar.xz | Bin 21808 -> 21796 bytes
.../top-artifacts/save-temps/433.milc.tar.xz | Bin 56840 -> 56864 bytes
.../top-artifacts/save-temps/444.namd.tar.xz | Bin 43460 -> 43464 bytes
.../top-artifacts/save-temps/445.gobmk.tar.xz | Bin 616076 -> 616004 bytes
.../top-artifacts/save-temps/447.dealII.tar.xz | Bin 835076 -> 835116 bytes
.../top-artifacts/save-temps/450.soplex.tar.xz | Bin 200076 -> 200180 bytes
.../top-artifacts/save-temps/453.povray.tar.xz | Bin 448612 -> 448568 bytes
.../top-artifacts/save-temps/456.hmmer.tar.xz | Bin 120076 -> 120160 bytes
.../top-artifacts/save-temps/458.sjeng.tar.xz | Bin 49936 -> 49972 bytes
.../top-artifacts/save-temps/462.libquantum.tar.xz | Bin 23076 -> 23048 bytes
.../top-artifacts/save-temps/464.h264ref.tar.xz | Bin 173464 -> 173260 bytes
.../top-artifacts/save-temps/470.lbm.tar.xz | Bin 15348 -> 15360 bytes
.../top-artifacts/save-temps/471.omnetpp.tar.xz | Bin 310088 -> 309996 bytes
.../top-artifacts/save-temps/473.astar.tar.xz | Bin 40188 -> 40168 bytes
.../top-artifacts/save-temps/482.sphinx3.tar.xz | Bin 92200 -> 92224 bytes
.../top-artifacts/save-temps/483.xalancbmk.tar.xz | Bin 3079428 -> 3079740 bytes
jenkins/manifest.sh | 26 +-
results_id | 2 +-
save-temps/400.perlbench.tar.xz | Bin 397048 -> 396996 bytes
save-temps/401.bzip2.tar.xz | Bin 42320 -> 42276 bytes
save-temps/403.gcc.tar.xz | Bin 1196848 -> 1196904 bytes
save-temps/429.mcf.tar.xz | Bin 21808 -> 21796 bytes
save-temps/433.milc.tar.xz | Bin 56840 -> 56864 bytes
save-temps/444.namd.tar.xz | Bin 43460 -> 43464 bytes
save-temps/445.gobmk.tar.xz | Bin 616076 -> 616004 bytes
save-temps/447.dealII.tar.xz | Bin 835076 -> 835116 bytes
save-temps/450.soplex.tar.xz | Bin 200076 -> 200180 bytes
save-temps/453.povray.tar.xz | Bin 448612 -> 448568 bytes
save-temps/456.hmmer.tar.xz | Bin 120076 -> 120160 bytes
save-temps/458.sjeng.tar.xz | Bin 49936 -> 49972 bytes
save-temps/462.libquantum.tar.xz | Bin 23076 -> 23048 bytes
save-temps/464.h264ref.tar.xz | Bin 173464 -> 173260 bytes
save-temps/470.lbm.tar.xz | Bin 15348 -> 15360 bytes
save-temps/471.omnetpp.tar.xz | Bin 310088 -> 309996 bytes
save-temps/473.astar.tar.xz | Bin 40188 -> 40168 bytes
save-temps/482.sphinx3.tar.xz | Bin 92200 -> 92224 bytes
save-temps/483.xalancbmk.tar.xz | Bin 3079428 -> 3079740 bytes
69 files changed, 5368 insertions(+), 5138 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.