From patchwork Mon Jan 24 09:02:09 2011 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Marcelo Tosatti X-Patchwork-Id: 80106 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from lists.gnu.org (lists.gnu.org [199.232.76.165]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by ozlabs.org (Postfix) with ESMTPS id 35C93B711B for ; Mon, 24 Jan 2011 20:21:18 +1100 (EST) Received: from localhost ([127.0.0.1]:45424 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1PhIbq-0005i1-UB for incoming@patchwork.ozlabs.org; Mon, 24 Jan 2011 04:21:15 -0500 Received: from [140.186.70.92] (port=37967 helo=eggs.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1PhIMR-0008K7-HA for qemu-devel@nongnu.org; Mon, 24 Jan 2011 04:05:27 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1PhIMO-0007E4-P4 for qemu-devel@nongnu.org; Mon, 24 Jan 2011 04:05:19 -0500 Received: from mx1.redhat.com ([209.132.183.28]:3500) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1PhIMO-0007Dd-GO for qemu-devel@nongnu.org; Mon, 24 Jan 2011 04:05:16 -0500 Received: from int-mx02.intmail.prod.int.phx2.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) by mx1.redhat.com (8.13.8/8.13.8) with ESMTP id p0O95F5C019065 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 24 Jan 2011 04:05:15 -0500 Received: from ns3.rdu.redhat.com (ns3.rdu.redhat.com [10.11.255.199]) by int-mx02.intmail.prod.int.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id p0O95FvE006722; Mon, 24 Jan 2011 04:05:15 -0500 Received: from amt.cnet (vpn2-9-29.ams2.redhat.com [10.36.9.29]) by ns3.rdu.redhat.com (8.13.8/8.13.8) with ESMTP id p0O95BoR008801; Mon, 24 Jan 2011 04:05:14 -0500 Received: from amt.cnet (localhost.localdomain [127.0.0.1]) by amt.cnet (Postfix) with ESMTP id 5FD8068A068; Mon, 24 Jan 2011 07:02:58 -0200 (BRST) Received: (from marcelo@localhost) by amt.cnet (8.14.4/8.14.4/Submit) id p0O92skW028368; Mon, 24 Jan 2011 07:02:54 -0200 From: Marcelo Tosatti To: Anthony Liguori Date: Mon, 24 Jan 2011 07:02:09 -0200 Message-Id: X-Scanned-By: MIMEDefang 2.67 on 10.5.11.12 X-detected-operating-system: by eggs.gnu.org: Genre and OS details not recognized. Cc: Marcelo Tosatti , qemu-devel@nongnu.org, kvm@vger.kernel.org Subject: [Qemu-devel] [PATCH 00/31] [PULL] qemu-kvm.git uq/master queue X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org The following changes since commit b646968336d4180bdd7d2e24209708dcee6ba400: checkpatch: adjust to QEMUisms (2011-01-20 20:58:56 +0000) are available in the git repository at: git://git.kernel.org/pub/scm/virt/kvm/qemu-kvm.git uq/master Jan Kiszka (23): kvm: x86: Fix DPL write back of segment registers kvm: x86: Remove obsolete SS.RPL/DPL aligment kvm: x86: Prevent sign extension of DR7 in guest debugging mode kvm: x86: Fix a few coding style violations kvm: Fix coding style violations kvm: x86: Swallow KVM_EXIT_SET_TPR kvm: Stop on all fatal exit reasons kvm: Improve reporting of fatal errors x86: Optionally dump code bytes on cpu_dump_state kvm: x86: Align kvm_arch_put_registers code with comment kvm: x86: Prepare kvm_get_mp_state for in-kernel irqchip kvm: x86: Remove redundant mp_state initialization kvm: x86: Fix xcr0 reset mismerge kvm: x86: Refactor msr_star/hsave_pa setup and checks kvm: x86: Reset paravirtual MSRs kvm: x86: Fix !CONFIG_KVM_PARA build kvm: Drop smp_cpus argument from init functions kvm: Consolidate must-have capability checks kvm: x86: Rework identity map and TSS setup for larger BIOS sizes kvm: Flush coalesced mmio buffer on IO window exits kvm: Do not use qemu_fair_mutex kvm: x86: Implicitly clear nmi_injected/pending on reset kvm: x86: Only read/write MSR_KVM_ASYNC_PF_EN if supported Jin Dongming (6): Clean up cpu_inject_x86_mce() Add "broadcast" option for mce command Add function for checking mca broadcast of CPU kvm: introduce kvm_mce_in_progress kvm: kvm_mce_inj_* subroutines for templated error injections kvm: introduce kvm_inject_x86_mce_on Lai Jiangshan (2): kvm: Enable user space NMI injection for kvm guest kvm: convert kvm_ioctl(KVM_CHECK_EXTENSION) to kvm_check_extension() configure | 36 ++- cpu-all.h | 5 +- cpus.c | 2 - hmp-commands.hx | 6 +- kvm-all.c | 247 +++++++++-------- kvm-stub.c | 2 +- kvm.h | 14 +- monitor.c | 7 +- target-i386/cpu.h | 9 +- target-i386/cpuid.c | 5 +- target-i386/helper.c | 97 ++++++- target-i386/kvm.c | 749 +++++++++++++++++++++++++++--------------------- target-i386/kvm_x86.h | 5 +- target-ppc/kvm.c | 10 +- target-s390x/kvm.c | 6 +- vl.c | 2 +- 16 files changed, 714 insertions(+), 488 deletions(-)