From: "Radim Krčmář" <rkrcmar@redhat.com>
To: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Paolo Bonzini <pbonzini@redhat.com>,
linux-kernel@vger.kernel.org, kvm@vger.kernel.org
Subject: [GIT PULL] Second batch of KVM changes for 4.13
Date: Sat, 15 Jul 2017 12:42:34 +0200 [thread overview]
Message-ID: <20170715104233.GH28875@potion> (raw)
Linus,
The following changes since commit af3c8d98508d37541d4bf57f13a984a7f73a328c:
Merge tag 'drm-for-v4.13' of git://people.freedesktop.org/~airlied/linux (2017-07-09 18:48:37 -0700)
are available in the git repository at:
git://git.kernel.org/pub/scm/virt/kvm/kvm kvm-4.13-2
for you to fetch changes up to d3457c877b14aaee8c52923eedf05a3b78af0476:
kvm: x86: hyperv: make VP_INDEX managed by userspace (2017-07-14 16:28:18 +0200)
----------------------------------------------------------------
Second batch of KVM updates for v4.13
Common:
- add uevents for VM creation/destruction
- annotate and properly access RCU-protected objects
s390:
- rename IOCTL added in the first v4.13 merge
x86:
- emulate VMLOAD VMSAVE feature in SVM
- support paravirtual asynchronous page fault while nested
- add Hyper-V userspace interfaces for better migration
- improve master clock corner cases
- extend internal error reporting after EPT misconfig
- correct single-stepping of emulated instructions in SVM
- handle MCE during VM entry
- fix nVMX VM entry checks and nVMX VMCS shadowing
----------------------------------------------------------------
Christian Borntraeger (5):
KVM: mark vcpu->pid pointer as rcu protected
KVM: use rcu access function for irq routing
KVM: mark kvm->busses as rcu protected
KVM: mark memory slots as rcu
KVM: use correct accessor function for __kvm_memslots
Claudio Imbrenda (1):
KVM: trigger uevents when creating or destroying a VM
Gleb Fotengauer-Malinovskiy (1):
KVM: s390: Fix KVM_S390_GET_CMMA_BITS ioctl definition
Janakarajan Natarajan (4):
KVM: SVM: Prepare for new bit definition in lbr_ctl
KVM: SVM: Rename lbr_ctl field in the vmcb control area
KVM: SVM: Add Virtual VMLOAD VMSAVE feature definition
KVM: SVM: Enable Virtual VMLOAD VMSAVE feature
Jim Mattson (5):
kvm: nVMX: Don't set vmcs12 to "launched" when VMLAUNCH fails
kvm: nVMX: Validate the I/O bitmaps on nested VM-entry
kvm: nVMX: Fix nested_vmx_check_msr_bitmap_controls
kvm: nVMX: Shadow "high" parts of shadowed 64-bit VMCS fields
kvm: vmx: Properly handle machine check during VM-entry
Ladi Prosek (2):
KVM: SVM: handle singlestep exception when skipping emulated instructions
KVM: x86: make backwards_tsc_observed a per-VM variable
Paolo Bonzini (3):
kvm: avoid unused variable warning for UP builds
KVM: vmx: expose more information for KVM_INTERNAL_ERROR_DELIVERY_EV exits
Merge branch 'annotations' of git://git.kernel.org/.../borntraeger/linux into kvm-master
Radim Krčmář (2):
KVM: x86: update master clock before computing kvmclock_offset
KVM: x86: take slots_lock in kvm_free_pit
Roman Kagan (2):
kvm: x86: hyperv: add KVM_CAP_HYPERV_SYNIC2
kvm: x86: hyperv: make VP_INDEX managed by userspace
Wanpeng Li (4):
KVM: x86: Simplify kvm_x86_ops->queue_exception parameter list
KVM: async_pf: Add L1 guest async_pf #PF vmexit handler
KVM: async_pf: Force a nested vmexit if the injected #PF is async_pf
KVM: async_pf: Let guest support delivery of async_pf from guest mode
Documentation/virtual/kvm/api.txt | 18 ++++
Documentation/virtual/kvm/msr.txt | 5 +-
arch/x86/include/asm/cpufeatures.h | 1 +
arch/x86/include/asm/kvm_emulate.h | 1 +
arch/x86/include/asm/kvm_host.h | 11 ++-
arch/x86/include/asm/svm.h | 5 +-
arch/x86/include/uapi/asm/kvm_para.h | 1 +
arch/x86/kernel/kvm.c | 7 +-
arch/x86/kvm/hyperv.c | 67 ++++++++++-----
arch/x86/kvm/hyperv.h | 3 +-
arch/x86/kvm/i8254.c | 2 +
arch/x86/kvm/mmu.c | 35 +++++++-
arch/x86/kvm/mmu.h | 3 +
arch/x86/kvm/svm.c | 151 +++++++++++++++++---------------
arch/x86/kvm/vmx.c | 162 ++++++++++++++++++++++-------------
arch/x86/kvm/x86.c | 43 +++++++---
include/linux/kvm_host.h | 17 ++--
include/uapi/linux/kvm.h | 4 +-
virt/kvm/eventfd.c | 8 +-
virt/kvm/irqchip.c | 2 +-
virt/kvm/kvm_main.c | 131 +++++++++++++++++++++++-----
21 files changed, 470 insertions(+), 207 deletions(-)
reply other threads:[~2017-07-15 10:42 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170715104233.GH28875@potion \
--to=rkrcmar@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=pbonzini@redhat.com \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox