<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/virt/kvm, branch v3.5.2</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/virt/kvm?h=v3.5.2</id>
<link rel='self' href='https://git.amat.us/linux/atom/virt/kvm?h=v3.5.2'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2012-07-11T10:01:48Z</updated>
<entry>
<title>KVM: Fix device assignment threaded irq handler</title>
<updated>2012-07-11T10:01:48Z</updated>
<author>
<name>Alex Williamson</name>
<email>alex.williamson@redhat.com</email>
</author>
<published>2012-07-09T16:53:22Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a76beb14123a69ca080f5a5425e28b786d62318d'/>
<id>urn:sha1:a76beb14123a69ca080f5a5425e28b786d62318d</id>
<content type='text'>
The kernel no longer allows us to pass NULL for the hard handler
without also specifying IRQF_ONESHOT.  IRQF_ONESHOT imposes latency
in the exit path that we don't need for MSI interrupts.  Long term
we'd like to inject these interrupts from the hard handler when
possible.  In the short term, we can create dummy hard handlers
that return us to the previous behavior.  Credit to Michael for
original patch.

Fixes: https://bugzilla.kernel.org/show_bug.cgi?id=43328

Signed-off-by: Michael S. Tsirkin &lt;mst@redhat.com&gt;
Signed-off-by: Alex Williamson &lt;alex.williamson@redhat.com&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: fix fault page leak</title>
<updated>2012-07-03T20:31:50Z</updated>
<author>
<name>Xiao Guangrong</name>
<email>xiaoguangrong@linux.vnet.ibm.com</email>
</author>
<published>2012-07-03T06:31:01Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=f411930442e01f9cf1bf4df41ff7e89476575c4d'/>
<id>urn:sha1:f411930442e01f9cf1bf4df41ff7e89476575c4d</id>
<content type='text'>
fault_page is forgot to be freed

Signed-off-by: Xiao Guangrong &lt;xiaoguangrong@linux.vnet.ibm.com&gt;
Signed-off-by: Marcelo Tosatti &lt;mtosatti@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Sanitize KVM_IRQFD flags</title>
<updated>2012-07-03T00:10:30Z</updated>
<author>
<name>Alex Williamson</name>
<email>alex.williamson@redhat.com</email>
</author>
<published>2012-06-29T15:56:24Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=326cf0334bacfdf43039cf75997a022b9e51535d'/>
<id>urn:sha1:326cf0334bacfdf43039cf75997a022b9e51535d</id>
<content type='text'>
We only know of one so far.

Signed-off-by: Alex Williamson &lt;alex.williamson@redhat.com&gt;
Signed-off-by: Marcelo Tosatti &lt;mtosatti@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Pass kvm_irqfd to functions</title>
<updated>2012-07-03T00:10:30Z</updated>
<author>
<name>Alex Williamson</name>
<email>alex.williamson@redhat.com</email>
</author>
<published>2012-06-29T15:56:08Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=d4db2935e4fffeba42540b0dc9d85e3036701221'/>
<id>urn:sha1:d4db2935e4fffeba42540b0dc9d85e3036701221</id>
<content type='text'>
Prune this down to just the struct kvm_irqfd so we can avoid
changing function definition for every flag or field we use.

Signed-off-by: Alex Williamson &lt;alex.williamson@redhat.com&gt;
Acked-by: Cornelia Huck &lt;cornelia.huck@de.ibm.com&gt;
Signed-off-by: Marcelo Tosatti &lt;mtosatti@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Fix PCI header check on device assignment</title>
<updated>2012-06-16T02:22:12Z</updated>
<author>
<name>Jan Kiszka</name>
<email>jan.kiszka@siemens.com</email>
</author>
<published>2012-06-15T13:56:20Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=f961f72836eb6c0fd76201f6f6b2fafff93c4cea'/>
<id>urn:sha1:f961f72836eb6c0fd76201f6f6b2fafff93c4cea</id>
<content type='text'>
The masking was wrong (must have been 0x7f), and there is no need to
re-read the value as pci_setup_device already does this for us.

Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=43339
Signed-off-by: Jan Kiszka &lt;jan.kiszka@siemens.com&gt;
Acked-by: Alex Williamson &lt;alex.williamson@redhat.com&gt;
Signed-off-by: Marcelo Tosatti &lt;mtosatti@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Fix buffer overflow in kvm_set_irq()</title>
<updated>2012-06-05T13:39:58Z</updated>
<author>
<name>Avi Kivity</name>
<email>avi@redhat.com</email>
</author>
<published>2012-04-22T14:02:11Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=f2ebd422f71cda9c791f76f85d2ca102ae34a1ed'/>
<id>urn:sha1:f2ebd422f71cda9c791f76f85d2ca102ae34a1ed</id>
<content type='text'>
kvm_set_irq() has an internal buffer of three irq routing entries, allowing
connecting a GSI to three IRQ chips or on MSI.  However setup_routing_entry()
does not properly enforce this, allowing three irqchip routes followed by
an MSI route to overflow the buffer.

Fix by ensuring that an MSI entry is added to an empty list.

Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: s390: Implement the directed yield (diag 9c) hypervisor call for KVM</title>
<updated>2012-05-01T00:38:31Z</updated>
<author>
<name>Konstantin Weitz</name>
<email>WEITZKON@de.ibm.com</email>
</author>
<published>2012-04-25T13:30:38Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=41628d334361670d825fb03c04568f5ef9f084dc'/>
<id>urn:sha1:41628d334361670d825fb03c04568f5ef9f084dc</id>
<content type='text'>
This patch implements the directed yield hypercall found on other
System z hypervisors. It delegates execution time to the virtual cpu
specified in the instruction's parameter.

Useful to avoid long spinlock waits in the guest.

Christian Borntraeger: moved common code in virt/kvm/

Signed-off-by: Konstantin Weitz &lt;WEITZKON@de.ibm.com&gt;
Signed-off-by: Christian Borntraeger &lt;borntraeger@de.ibm.com&gt;
Signed-off-by: Marcelo Tosatti &lt;mtosatti@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: Introduce direct MSI message injection for in-kernel irqchips</title>
<updated>2012-04-24T12:59:47Z</updated>
<author>
<name>Jan Kiszka</name>
<email>jan.kiszka@siemens.com</email>
</author>
<published>2012-03-29T19:14:12Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=07975ad3b30579ca27d880491ad992326b930c63'/>
<id>urn:sha1:07975ad3b30579ca27d880491ad992326b930c63</id>
<content type='text'>
Currently, MSI messages can only be injected to in-kernel irqchips by
defining a corresponding IRQ route for each message. This is not only
unhandy if the MSI messages are generated "on the fly" by user space,
IRQ routes are a limited resource that user space has to manage
carefully.

By providing a direct injection path, we can both avoid using up limited
resources and simplify the necessary steps for user land.

Signed-off-by: Jan Kiszka &lt;jan.kiszka@siemens.com&gt;
Signed-off-by: Avi Kivity &lt;avi@redhat.com&gt;
</content>
</entry>
<entry>
<title>Merge branch 'linus' into queue</title>
<updated>2012-04-19T20:06:26Z</updated>
<author>
<name>Marcelo Tosatti</name>
<email>mtosatti@redhat.com</email>
</author>
<published>2012-04-19T20:06:26Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=eac0556750e727ff39144a9a9e59d5ccf1fc0e2a'/>
<id>urn:sha1:eac0556750e727ff39144a9a9e59d5ccf1fc0e2a</id>
<content type='text'>
Merge reason: development work has dependency on kvm patches merged
upstream.

Conflicts:
	Documentation/feature-removal-schedule.txt

Signed-off-by: Marcelo Tosatti &lt;mtosatti@redhat.com&gt;
</content>
</entry>
<entry>
<title>KVM: lock slots_lock around device assignment</title>
<updated>2012-04-19T03:04:18Z</updated>
<author>
<name>Alex Williamson</name>
<email>alex.williamson@redhat.com</email>
</author>
<published>2012-04-18T03:46:44Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=21a1416a1c945c5aeaeaf791b63c64926018eb77'/>
<id>urn:sha1:21a1416a1c945c5aeaeaf791b63c64926018eb77</id>
<content type='text'>
As pointed out by Jason Baron, when assigning a device to a guest
we first set the iommu domain pointer, which enables mapping
and unmapping of memory slots to the iommu.  This leaves a window
where this path is enabled, but we haven't synchronized the iommu
mappings to the existing memory slots.  Thus a slot being removed
at that point could send us down unexpected code paths removing
non-existent pinnings and iommu mappings.  Take the slots_lock
around creating the iommu domain and initial mappings as well as
around iommu teardown to avoid this race.

Signed-off-by: Alex Williamson &lt;alex.williamson@redhat.com&gt;
Signed-off-by: Marcelo Tosatti &lt;mtosatti@redhat.com&gt;
</content>
</entry>
</feed>
