<feed xmlns='http://www.w3.org/2005/Atom'>
<title>pm24.git/include/linux/kvm.h, branch v2.6.34-rc1</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://git.kobert.dev/pm24.git/atom?h=v2.6.34-rc1</id>
<link rel='self' href='https://git.kobert.dev/pm24.git/atom?h=v2.6.34-rc1'/>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/'/>
<updated>2010-03-01T15:36:14Z</updated>
<entry>
<title>KVM: x86: Add KVM_CAP_X86_ROBUST_SINGLESTEP</title>
<updated>2010-03-01T15:36:14Z</updated>
<author>
<name>Jan Kiszka</name>
<email>jan.kiszka@siemens.com</email>
</author>
<published>2010-02-23T16:47:57Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=d2be1651b736002e0c76d7095d6c0ba77b4a897c'/>
<id>urn:sha1:d2be1651b736002e0c76d7095d6c0ba77b4a897c</id>
<content type='text'>
This marks the guest single-step API improvement of 94fe45da and
91586a3b with a capability flag to allow reliable detection by user
space.

Signed-off-by: Jan Kiszka &lt;jan.kiszka@siemens.com&gt;
Cc: stable@kernel.org (2.6.33)
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: enable PCI multiple-segments for pass-through device</title>
<updated>2010-03-01T15:36:06Z</updated>
<author>
<name>Zhai, Edwin</name>
<email>edwin.zhai@intel.com</email>
</author>
<published>2010-01-29T06:38:44Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=ab9f4ecbb6d39a18e300a0d10a4968c37404aa76'/>
<id>urn:sha1:ab9f4ecbb6d39a18e300a0d10a4968c37404aa76</id>
<content type='text'>
Enable optional parameter (default 0) - PCI segment (or domain) besides
BDF, when assigning PCI device to guest.

Signed-off-by: Zhai Edwin &lt;edwin.zhai@intel.com&gt;
Acked-by: Chris Wright &lt;chrisw@sous-sol.org&gt;
Signed-off-by: Marcelo Tosatti &lt;mtosatti@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Implement NotifyLongSpinWait HYPER-V hypercall</title>
<updated>2010-03-01T15:36:00Z</updated>
<author>
<name>Gleb Natapov</name>
<email>gleb@redhat.com</email>
</author>
<published>2010-01-17T13:51:24Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=c25bc1638a1211f57cccbabdd8b732813b852340'/>
<id>urn:sha1:c25bc1638a1211f57cccbabdd8b732813b852340</id>
<content type='text'>
Windows issues this hypercall after guest was spinning on a spinlock
for too many iterations.

Signed-off-by: Gleb Natapov &lt;gleb@redhat.com&gt;
Signed-off-by: Vadim Rozenfeld &lt;vrozenfe@redhat.com&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Add HYPER-V apic access MSRs</title>
<updated>2010-03-01T15:36:00Z</updated>
<author>
<name>Gleb Natapov</name>
<email>gleb@redhat.com</email>
</author>
<published>2010-01-17T13:51:23Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=10388a07164c1512b3a3d0273b9adc230f82790e'/>
<id>urn:sha1:10388a07164c1512b3a3d0273b9adc230f82790e</id>
<content type='text'>
Implement HYPER-V apic MSRs. Spec defines three MSRs that speed-up
access to EOI/TPR/ICR apic registers for PV guests.

Signed-off-by: Gleb Natapov &lt;gleb@redhat.com&gt;
Signed-off-by: Vadim Rozenfeld &lt;vrozenfe@redhat.com&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Implement bare minimum of HYPER-V MSRs</title>
<updated>2010-03-01T15:35:57Z</updated>
<author>
<name>Gleb Natapov</name>
<email>gleb@redhat.com</email>
</author>
<published>2010-01-17T13:51:22Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=55cd8e5a4edb8e235163ffe8264b9aaa8d7c050f'/>
<id>urn:sha1:55cd8e5a4edb8e235163ffe8264b9aaa8d7c050f</id>
<content type='text'>
Minimum HYPER-V implementation should have GUEST_OS_ID, HYPERCALL and
VP_INDEX MSRs.

[avi: fix build on i386]

Signed-off-by: Gleb Natapov &lt;gleb@redhat.com&gt;
Signed-off-by: Vadim Rozenfeld &lt;vrozenfe@redhat.com&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: introduce kvm-&gt;srcu and convert kvm_set_memory_region to SRCU update</title>
<updated>2010-03-01T15:35:44Z</updated>
<author>
<name>Marcelo Tosatti</name>
<email>mtosatti@redhat.com</email>
</author>
<published>2009-12-23T16:35:21Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=bc6678a33d9b952981a8e44a4f876c3ad64ca4d8'/>
<id>urn:sha1:bc6678a33d9b952981a8e44a4f876c3ad64ca4d8</id>
<content type='text'>
Use two steps for memslot deletion: mark the slot invalid (which stops
instantiation of new shadow pages for that slot, but allows destruction),
then instantiate the new empty slot.

Also simplifies kvm_handle_hva locking.

Signed-off-by: Marcelo Tosatti &lt;mtosatti@redhat.com&gt;
</content>
</entry>
<entry>
<title>Merge commit 'origin/master' into next</title>
<updated>2009-12-09T06:14:38Z</updated>
<author>
<name>Benjamin Herrenschmidt</name>
<email>benh@kernel.crashing.org</email>
</author>
<published>2009-12-09T06:14:38Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=bcd6acd51f3d4d1ada201e9bc5c40a31d6d80c71'/>
<id>urn:sha1:bcd6acd51f3d4d1ada201e9bc5c40a31d6d80c71</id>
<content type='text'>
Conflicts:
	include/linux/kvm.h
</content>
</entry>
<entry>
<title>powerpc/kvm: Sync guest visible MMU state</title>
<updated>2009-12-08T05:02:50Z</updated>
<author>
<name>Alexander Graf</name>
<email>agraf@suse.de</email>
</author>
<published>2009-11-30T03:02:02Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=e15a113700324f7fdcee95589875daed2b98a2fe'/>
<id>urn:sha1:e15a113700324f7fdcee95589875daed2b98a2fe</id>
<content type='text'>
Currently userspace has no chance to find out which virtual address space we're
in and resolve addresses. While that is a big problem for migration, it's also
unpleasent when debugging, as gdb and the monitor don't work on virtual
addresses.

This patch exports enough of the MMU segment state to userspace to make
debugging work and thus also includes the groundwork for migration.

Signed-off-by: Alexander Graf &lt;agraf@suse.de&gt;
Signed-off-by: Benjamin Herrenschmidt &lt;benh@kernel.crashing.org&gt;
</content>
</entry>
<entry>
<title>KVM: s390: Make psw available on all exits, not just a subset</title>
<updated>2009-12-03T07:32:25Z</updated>
<author>
<name>Carsten Otte</name>
<email>carsteno@de.ibm.com</email>
</author>
<published>2009-11-19T13:21:16Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=d7b0b5eb3000c6fb902f08c619fcd673a23d8fab'/>
<id>urn:sha1:d7b0b5eb3000c6fb902f08c619fcd673a23d8fab</id>
<content type='text'>
This patch moves s390 processor status word into the base kvm_run
struct and keeps it up-to date on all userspace exits.

The userspace ABI is broken by this, however there are no applications
in the wild using this.  A capability check is provided so users can
verify the updated API exists.

Cc: stable@kernel.org
Signed-off-by: Carsten Otte &lt;cotte@de.ibm.com&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: x86: Add KVM_GET/SET_VCPU_EVENTS</title>
<updated>2009-12-03T07:32:25Z</updated>
<author>
<name>Jan Kiszka</name>
<email>jan.kiszka@web.de</email>
</author>
<published>2009-11-12T00:04:25Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=3cfc3092f40bc37c57ba556cfd8de4218f2135ab'/>
<id>urn:sha1:3cfc3092f40bc37c57ba556cfd8de4218f2135ab</id>
<content type='text'>
This new IOCTL exports all yet user-invisible states related to
exceptions, interrupts, and NMIs. Together with appropriate user space
changes, this fixes sporadic problems of vmsave/restore, live migration
and system reset.

[avi: future-proof abi by adding a flags field]

Signed-off-by: Jan Kiszka &lt;jan.kiszka@siemens.com&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
</content>
</entry>
</feed>
