public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: "Radim Krčmář" <rkrcmar@redhat.com>
To: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Paolo Bonzini <pbonzini@redhat.com>,
	linux-kernel@vger.kernel.org, kvm@vger.kernel.org
Subject: [GIT PULL] Second batch of KVM changes for 4.13
Date: Sat, 15 Jul 2017 12:42:34 +0200	[thread overview]
Message-ID: <20170715104233.GH28875@potion> (raw)

Linus,

The following changes since commit af3c8d98508d37541d4bf57f13a984a7f73a328c:

  Merge tag 'drm-for-v4.13' of git://people.freedesktop.org/~airlied/linux (2017-07-09 18:48:37 -0700)

are available in the git repository at:

  git://git.kernel.org/pub/scm/virt/kvm/kvm kvm-4.13-2

for you to fetch changes up to d3457c877b14aaee8c52923eedf05a3b78af0476:

  kvm: x86: hyperv: make VP_INDEX managed by userspace (2017-07-14 16:28:18 +0200)

----------------------------------------------------------------
Second batch of KVM updates for v4.13

Common:
 - add uevents for VM creation/destruction
 - annotate and properly access RCU-protected objects

s390:
 - rename IOCTL added in the first v4.13 merge

x86:
 - emulate VMLOAD VMSAVE feature in SVM
 - support paravirtual asynchronous page fault while nested
 - add Hyper-V userspace interfaces for better migration
 - improve master clock corner cases
 - extend internal error reporting after EPT misconfig
 - correct single-stepping of emulated instructions in SVM
 - handle MCE during VM entry
 - fix nVMX VM entry checks and nVMX VMCS shadowing

----------------------------------------------------------------
Christian Borntraeger (5):
      KVM: mark vcpu->pid pointer as rcu protected
      KVM: use rcu access function for irq routing
      KVM: mark kvm->busses as rcu protected
      KVM: mark memory slots as rcu
      KVM: use correct accessor function for __kvm_memslots

Claudio Imbrenda (1):
      KVM: trigger uevents when creating or destroying a VM

Gleb Fotengauer-Malinovskiy (1):
      KVM: s390: Fix KVM_S390_GET_CMMA_BITS ioctl definition

Janakarajan Natarajan (4):
      KVM: SVM: Prepare for new bit definition in lbr_ctl
      KVM: SVM: Rename lbr_ctl field in the vmcb control area
      KVM: SVM: Add Virtual VMLOAD VMSAVE feature definition
      KVM: SVM: Enable Virtual VMLOAD VMSAVE feature

Jim Mattson (5):
      kvm: nVMX: Don't set vmcs12 to "launched" when VMLAUNCH fails
      kvm: nVMX: Validate the I/O bitmaps on nested VM-entry
      kvm: nVMX: Fix nested_vmx_check_msr_bitmap_controls
      kvm: nVMX: Shadow "high" parts of shadowed 64-bit VMCS fields
      kvm: vmx: Properly handle machine check during VM-entry

Ladi Prosek (2):
      KVM: SVM: handle singlestep exception when skipping emulated instructions
      KVM: x86: make backwards_tsc_observed a per-VM variable

Paolo Bonzini (3):
      kvm: avoid unused variable warning for UP builds
      KVM: vmx: expose more information for KVM_INTERNAL_ERROR_DELIVERY_EV exits
      Merge branch 'annotations' of git://git.kernel.org/.../borntraeger/linux into kvm-master

Radim Krčmář (2):
      KVM: x86: update master clock before computing kvmclock_offset
      KVM: x86: take slots_lock in kvm_free_pit

Roman Kagan (2):
      kvm: x86: hyperv: add KVM_CAP_HYPERV_SYNIC2
      kvm: x86: hyperv: make VP_INDEX managed by userspace

Wanpeng Li (4):
      KVM: x86: Simplify kvm_x86_ops->queue_exception parameter list
      KVM: async_pf: Add L1 guest async_pf #PF vmexit handler
      KVM: async_pf: Force a nested vmexit if the injected #PF is async_pf
      KVM: async_pf: Let guest support delivery of async_pf from guest mode

 Documentation/virtual/kvm/api.txt    |  18 ++++
 Documentation/virtual/kvm/msr.txt    |   5 +-
 arch/x86/include/asm/cpufeatures.h   |   1 +
 arch/x86/include/asm/kvm_emulate.h   |   1 +
 arch/x86/include/asm/kvm_host.h      |  11 ++-
 arch/x86/include/asm/svm.h           |   5 +-
 arch/x86/include/uapi/asm/kvm_para.h |   1 +
 arch/x86/kernel/kvm.c                |   7 +-
 arch/x86/kvm/hyperv.c                |  67 ++++++++++-----
 arch/x86/kvm/hyperv.h                |   3 +-
 arch/x86/kvm/i8254.c                 |   2 +
 arch/x86/kvm/mmu.c                   |  35 +++++++-
 arch/x86/kvm/mmu.h                   |   3 +
 arch/x86/kvm/svm.c                   | 151 +++++++++++++++++---------------
 arch/x86/kvm/vmx.c                   | 162 ++++++++++++++++++++++-------------
 arch/x86/kvm/x86.c                   |  43 +++++++---
 include/linux/kvm_host.h             |  17 ++--
 include/uapi/linux/kvm.h             |   4 +-
 virt/kvm/eventfd.c                   |   8 +-
 virt/kvm/irqchip.c                   |   2 +-
 virt/kvm/kvm_main.c                  | 131 +++++++++++++++++++++++-----
 21 files changed, 470 insertions(+), 207 deletions(-)

                 reply	other threads:[~2017-07-15 10:42 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170715104233.GH28875@potion \
    --to=rkrcmar@redhat.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=pbonzini@redhat.com \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox