# git rev-parse -q --verify 6a447b0e3151893f6d4a889956553c06d2e775c6^{commit} 6a447b0e3151893f6d4a889956553c06d2e775c6 already have revision, skipping fetch # git checkout -q -f -B kisskb 6a447b0e3151893f6d4a889956553c06d2e775c6 # git clean -qxdf # < git log -1 # commit 6a447b0e3151893f6d4a889956553c06d2e775c6 # Merge: f4a2f7866faa d45f89f7437d # Author: Linus Torvalds # Date: Sun Dec 20 10:44:05 2020 -0800 # # Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm # # Pull KVM updates from Paolo Bonzini: # "Much x86 work was pushed out to 5.12, but ARM more than made up for it. # # ARM: # - PSCI relay at EL2 when "protected KVM" is enabled # - New exception injection code # - Simplification of AArch32 system register handling # - Fix PMU accesses when no PMU is enabled # - Expose CSV3 on non-Meltdown hosts # - Cache hierarchy discovery fixes # - PV steal-time cleanups # - Allow function pointers at EL2 # - Various host EL2 entry cleanups # - Simplification of the EL2 vector allocation # # s390: # - memcg accouting for s390 specific parts of kvm and gmap # - selftest for diag318 # - new kvm_stat for when async_pf falls back to sync # # x86: # - Tracepoints for the new pagetable code from 5.10 # - Catch VFIO and KVM irqfd events before userspace # - Reporting dirty pages to userspace with a ring buffer # - SEV-ES host support # - Nested VMX support for wait-for-SIPI activity state # - New feature flag (AVX512 FP16) # - New system ioctl to report Hyper-V-compatible paravirtualization features # # Generic: # - Selftest improvements" # # * tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm: (171 commits) # KVM: SVM: fix 32-bit compilation # KVM: SVM: Add AP_JUMP_TABLE support in prep for AP booting # KVM: SVM: Provide support to launch and run an SEV-ES guest # KVM: SVM: Provide an updated VMRUN invocation for SEV-ES guests # KVM: SVM: Provide support for SEV-ES vCPU loading # KVM: SVM: Provide support for SEV-ES vCPU creation/loading # KVM: SVM: Update ASID allocation to support SEV-ES guests # KVM: SVM: Set the encryption mask for the SVM host save area # KVM: SVM: Add NMI support for an SEV-ES guest # KVM: SVM: Guest FPU state save/restore not needed for SEV-ES guest # KVM: SVM: Do not report support for SMM for an SEV-ES guest # KVM: x86: Update __get_sregs() / __set_sregs() to support SEV-ES # KVM: SVM: Add support for CR8 write traps for an SEV-ES guest # KVM: SVM: Add support for CR4 write traps for an SEV-ES guest # KVM: SVM: Add support for CR0 write traps for an SEV-ES guest # KVM: SVM: Add support for EFER write traps for an SEV-ES guest # KVM: SVM: Support string IO operations for an SEV-ES guest # KVM: SVM: Support MMIO for an SEV-ES guest # KVM: SVM: Create trace events for VMGEXIT MSR protocol processing # KVM: SVM: Create trace events for VMGEXIT processing # ... # < /opt/cross/kisskb/korg/gcc-4.9.4-nolibc/arm-linux-gnueabi/bin/arm-linux-gnueabi-gcc --version # < /opt/cross/kisskb/korg/gcc-4.9.4-nolibc/arm-linux-gnueabi/bin/arm-linux-gnueabi-ld --version # < git log --format=%s --max-count=1 6a447b0e3151893f6d4a889956553c06d2e775c6 # < make -s -j 8 ARCH=arm O=/kisskb/build/linus_omap2plus_defconfig_arm-gcc4.9 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-4.9.4-nolibc/arm-linux-gnueabi/bin/arm-linux-gnueabi- omap2plus_defconfig # < make -s -j 8 ARCH=arm O=/kisskb/build/linus_omap2plus_defconfig_arm-gcc4.9 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-4.9.4-nolibc/arm-linux-gnueabi/bin/arm-linux-gnueabi- help # make -s -j 8 ARCH=arm O=/kisskb/build/linus_omap2plus_defconfig_arm-gcc4.9 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-4.9.4-nolibc/arm-linux-gnueabi/bin/arm-linux-gnueabi- olddefconfig # make -s -j 8 ARCH=arm O=/kisskb/build/linus_omap2plus_defconfig_arm-gcc4.9 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-4.9.4-nolibc/arm-linux-gnueabi/bin/arm-linux-gnueabi- /kisskb/src/arch/arm/crypto/ghash-ce-glue.c: In function 'ghash_do_update': /kisskb/src/arch/arm/crypto/ghash-ce-glue.c:67:44: warning: passing argument 4 of 'pmull_ghash_update_p64' from incompatible pointer type pmull_ghash_update_p64(blocks, dg, src, key->h, head); ^ /kisskb/src/arch/arm/crypto/ghash-ce-glue.c:45:17: note: expected 'const u64 (*)[2]' but argument is of type 'u64 (*)[2]' asmlinkage void pmull_ghash_update_p64(int blocks, u64 dg[], const char *src, ^ /kisskb/src/arch/arm/crypto/ghash-ce-glue.c:69:43: warning: passing argument 4 of 'pmull_ghash_update_p8' from incompatible pointer type pmull_ghash_update_p8(blocks, dg, src, key->h, head); ^ /kisskb/src/arch/arm/crypto/ghash-ce-glue.c:48:17: note: expected 'const u64 (*)[2]' but argument is of type 'u64 (*)[2]' asmlinkage void pmull_ghash_update_p8(int blocks, u64 dg[], const char *src, ^ Completed OK # rm -rf /kisskb/build/linus_omap2plus_defconfig_arm-gcc4.9 # Build took: 0:05:00.195436