)]}'
{
  "log": [
    {
      "commit": "aa2fbe6d44892070d78995f0df875ce930904e29",
      "tree": "bc2350a65c4e656df5597ebe4111bcfd98116bfe",
      "parents": [
        "f3bff6318fa0f54956b02ed451d9b120441006ea"
      ],
      "author": {
        "name": "Yang Zhang",
        "email": "yang.z.zhang@Intel.com",
        "time": "Thu Apr 11 19:21:40 2013 +0800"
      },
      "committer": {
        "name": "Marcelo Tosatti",
        "email": "mtosatti@redhat.com",
        "time": "Mon Apr 15 23:20:34 2013 -0300"
      },
      "message": "KVM: Let ioapic know the irq line status\n\nUserspace may deliver RTC interrupt without query the status. So we\nwant to track RTC EOI for this case.\n\nSigned-off-by: Yang Zhang \u003cyang.z.zhang@Intel.com\u003e\nReviewed-by: Gleb Natapov \u003cgleb@redhat.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "78c634402a1825f1f5bef13077f0985f3b8a3212",
      "tree": "1dac3b54821c39c1b893f0a2db4806dacc917bdc",
      "parents": [
        "01f218803757c9ec1152ac2fd39d03c27c452634"
      ],
      "author": {
        "name": "Michael S. Tsirkin",
        "email": "mst@redhat.com",
        "time": "Wed Oct 17 18:06:06 2012 +0200"
      },
      "committer": {
        "name": "Gleb Natapov",
        "email": "gleb@redhat.com",
        "time": "Wed Dec 05 15:10:53 2012 +0200"
      },
      "message": "kvm: deliver msi interrupts from irq handler\n\nWe can deliver certain interrupts, notably MSI,\nfrom atomic context.  Use kvm_set_irq_inatomic,\nto implement an irq handler for msi.\n\nThis reduces the pressure on scheduler in case\nwhere host and guest irq share a host cpu.\n\nSigned-off-by: Michael S. Tsirkin \u003cmst@redhat.com\u003e\nSigned-off-by: Gleb Natapov \u003cgleb@redhat.com\u003e\n"
    },
    {
      "commit": "a76beb14123a69ca080f5a5425e28b786d62318d",
      "tree": "fb2023fbc90fb082221d06487e6e7bdb6dfa6bbb",
      "parents": [
        "055c9fa8874fa7261eec7a268366565db84af474"
      ],
      "author": {
        "name": "Alex Williamson",
        "email": "alex.williamson@redhat.com",
        "time": "Mon Jul 09 10:53:22 2012 -0600"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Wed Jul 11 13:01:48 2012 +0300"
      },
      "message": "KVM: Fix device assignment threaded irq handler\n\nThe kernel no longer allows us to pass NULL for the hard handler\nwithout also specifying IRQF_ONESHOT.  IRQF_ONESHOT imposes latency\nin the exit path that we don\u0027t need for MSI interrupts.  Long term\nwe\u0027d like to inject these interrupts from the hard handler when\npossible.  In the short term, we can create dummy hard handlers\nthat return us to the previous behavior.  Credit to Michael for\noriginal patch.\n\nFixes: https://bugzilla.kernel.org/show_bug.cgi?id\u003d43328\n\nSigned-off-by: Michael S. Tsirkin \u003cmst@redhat.com\u003e\nSigned-off-by: Alex Williamson \u003calex.williamson@redhat.com\u003e\nSigned-off-by: Avi Kivity \u003cavi@redhat.com\u003e\n"
    },
    {
      "commit": "f961f72836eb6c0fd76201f6f6b2fafff93c4cea",
      "tree": "e816a93debb5d46b55cce1c5e743b4d541c59032",
      "parents": [
        "a2c2df8672f55195f101d9251117aa59e358d296"
      ],
      "author": {
        "name": "Jan Kiszka",
        "email": "jan.kiszka@siemens.com",
        "time": "Fri Jun 15 07:56:20 2012 -0600"
      },
      "committer": {
        "name": "Marcelo Tosatti",
        "email": "mtosatti@redhat.com",
        "time": "Fri Jun 15 23:22:12 2012 -0300"
      },
      "message": "KVM: Fix PCI header check on device assignment\n\nThe masking was wrong (must have been 0x7f), and there is no need to\nre-read the value as pci_setup_device already does this for us.\n\nBugzilla: https://bugzilla.kernel.org/show_bug.cgi?id\u003d43339\nSigned-off-by: Jan Kiszka \u003cjan.kiszka@siemens.com\u003e\nAcked-by: Alex Williamson \u003calex.williamson@redhat.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "cf9eeac46350b8b43730b7dc5e999757bed089a4",
      "tree": "a71645c281a36c080f58bf660a95c176070e4f83",
      "parents": [
        "02626b6af5d2bc62db3bb85fc2891b2725535d44"
      ],
      "author": {
        "name": "Jan Kiszka",
        "email": "jan.kiszka@siemens.com",
        "time": "Wed Mar 14 11:02:11 2012 +0100"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Tue Mar 20 12:41:24 2012 +0200"
      },
      "message": "KVM: Convert intx_mask_lock to spin lock\n\nAs kvm_notify_acked_irq calls kvm_assigned_dev_ack_irq under\nrcu_read_lock, we cannot use a mutex in the latter function. Switch to a\nspin lock to address this.\n\nSigned-off-by: Jan Kiszka \u003cjan.kiszka@siemens.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\nSigned-off-by: Avi Kivity \u003cavi@redhat.com\u003e\n\n"
    },
    {
      "commit": "07700a94b00a4fcbbfb07d1b72dc112a0e036735",
      "tree": "e4a8045d6a44906463102a04c7a87337c38e16aa",
      "parents": [
        "3e515705a1f46beb1c942bb8043c16f8ac7b1e9e"
      ],
      "author": {
        "name": "Jan Kiszka",
        "email": "jan.kiszka@siemens.com",
        "time": "Tue Feb 28 14:19:54 2012 +0100"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Thu Mar 08 14:11:36 2012 +0200"
      },
      "message": "KVM: Allow host IRQ sharing for assigned PCI 2.3 devices\n\nPCI 2.3 allows to generically disable IRQ sources at device level. This\nenables us to share legacy IRQs of such devices with other host devices\nwhen passing them to a guest.\n\nThe new IRQ sharing feature introduced here is optional, user space has\nto request it explicitly. Moreover, user space can inform us about its\nview of PCI_COMMAND_INTX_DISABLE so that we can avoid unmasking the\ninterrupt and signaling it if the guest masked it via the virtualized\nPCI config space.\n\nSigned-off-by: Jan Kiszka \u003cjan.kiszka@siemens.com\u003e\nAcked-by: Alex Williamson \u003calex.williamson@redhat.com\u003e\nAcked-by: Michael S. Tsirkin \u003cmst@redhat.com\u003e\nSigned-off-by: Avi Kivity \u003cavi@redhat.com\u003e\n"
    },
    {
      "commit": "b93a35532767a2cf78bdbc88730d5c28aa66b941",
      "tree": "604c5c62ed765b1059735056a01c18020b0e4c26",
      "parents": [
        "e2358851efbcdc34583ee11971a6e4d587ea8bf9"
      ],
      "author": {
        "name": "Michael S. Tsirkin",
        "email": "mst@redhat.com",
        "time": "Wed Jan 18 20:07:09 2012 +0200"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Mon Mar 05 14:52:43 2012 +0200"
      },
      "message": "KVM: fix error handling for out of range irq\n\nfind_index_from_host_irq returns 0 on error\nbut callers assume \u003c 0 on error. This should\nnot matter much: an out of range irq should never happen since\nirq handler was registered with this irq #,\nand even if it does we get a spurious msix irq in guest\nand typically nothing terrible happens.\n\nStill, better to make it consistent.\n\nSigned-off-by: Michael S. Tsirkin \u003cmst@redhat.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\nSigned-off-by: Avi Kivity \u003cavi@redhat.com\u003e\n\n"
    },
    {
      "commit": "3d27e23b17010c668db311140b17bbbb70c78fb9",
      "tree": "d3d87399212b2dda0bbf6616e4a580b35e7d7760",
      "parents": [
        "423873736b78f549fbfa2f715f2e4de7e6c5e1e9"
      ],
      "author": {
        "name": "Alex Williamson",
        "email": "alex.williamson@redhat.com",
        "time": "Tue Dec 20 21:59:09 2011 -0700"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Sun Dec 25 19:03:54 2011 +0200"
      },
      "message": "KVM: Device assignment permission checks\n\nOnly allow KVM device assignment to attach to devices which:\n\n - Are not bridges\n - Have BAR resources (assume others are special devices)\n - The user has permissions to use\n\nAssigning a bridge is a configuration error, it\u0027s not supported, and\ntypically doesn\u0027t result in the behavior the user is expecting anyway.\nDevices without BAR resources are typically chipset components that\nalso don\u0027t have host drivers.  We don\u0027t want users to hold such devices\ncaptive or cause system problems by fencing them off into an iommu\ndomain.  We determine \"permission to use\" by testing whether the user\nhas access to the PCI sysfs resource files.  By default a normal user\nwill not have access to these files, so it provides a good indication\nthat an administration agent has granted the user access to the device.\n\n[Yang Bai: add missing #include]\n[avi: fix comment style]\n\nSigned-off-by: Alex Williamson \u003calex.williamson@redhat.com\u003e\nSigned-off-by: Yang Bai \u003chamo.by@gmail.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "423873736b78f549fbfa2f715f2e4de7e6c5e1e9",
      "tree": "62526563ccca81957a4c100aa0bc359dcd10af08",
      "parents": [
        "0924ab2cfa98b1ece26c033d696651fd62896c69"
      ],
      "author": {
        "name": "Alex Williamson",
        "email": "alex.williamson@redhat.com",
        "time": "Tue Dec 20 21:59:03 2011 -0700"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Sun Dec 25 17:13:31 2011 +0200"
      },
      "message": "KVM: Remove ability to assign a device without iommu support\n\nThis option has no users and it exposes a security hole that we\ncan allow devices to be assigned without iommu protection.  Make\nKVM_DEV_ASSIGN_ENABLE_IOMMU a mandatory option.\n\nSigned-off-by: Alex Williamson \u003calex.williamson@redhat.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "1bc87b00556e8f7ba30a1010471951c5b8f71114",
      "tree": "e73c2d187e2dff0df97ed82e32b45e362b923117",
      "parents": [
        "acff987d94cbdb4049f3706bed1f1792f8ef6837",
        "f1c1da2bde712812a3e0f9a7a7ebe7a916a4b5f4"
      ],
      "author": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sun Oct 30 15:36:45 2011 -0700"
      },
      "committer": {
        "name": "Linus Torvalds",
        "email": "torvalds@linux-foundation.org",
        "time": "Sun Oct 30 15:36:45 2011 -0700"
      },
      "message": "Merge branch \u0027kvm-updates/3.2\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/avi/kvm\n\n* \u0027kvm-updates/3.2\u0027 of git://git.kernel.org/pub/scm/linux/kernel/git/avi/kvm: (75 commits)\n  KVM: SVM: Keep intercepting task switching with NPT enabled\n  KVM: s390: implement sigp external call\n  KVM: s390: fix register setting\n  KVM: s390: fix return value of kvm_arch_init_vm\n  KVM: s390: check cpu_id prior to using it\n  KVM: emulate lapic tsc deadline timer for guest\n  x86: TSC deadline definitions\n  KVM: Fix simultaneous NMIs\n  KVM: x86 emulator: convert push %sreg/pop %sreg to direct decode\n  KVM: x86 emulator: switch lds/les/lss/lfs/lgs to direct decode\n  KVM: x86 emulator: streamline decode of segment registers\n  KVM: x86 emulator: simplify OpMem64 decode\n  KVM: x86 emulator: switch src decode to decode_operand()\n  KVM: x86 emulator: qualify OpReg inhibit_byte_regs hack\n  KVM: x86 emulator: switch OpImmUByte decode to decode_imm()\n  KVM: x86 emulator: free up some flag bits near src, dst\n  KVM: x86 emulator: switch src2 to generic decode_operand()\n  KVM: x86 emulator: expand decode flags to 64 bits\n  KVM: x86 emulator: split dst decode to a generic decode_operand()\n  KVM: x86 emulator: move memop, memopp into emulation context\n  ...\n"
    },
    {
      "commit": "cc0793968a602c9b40f7b99c401674750aa99e06",
      "tree": "9ffe6978abe91b4e8cc330e530204e08844e194c",
      "parents": [
        "9bc5791d4aa78b72abd76f506c0a391a54abc4d1"
      ],
      "author": {
        "name": "Jan Kiszka",
        "email": "jan.kiszka@siemens.com",
        "time": "Mon Sep 12 18:57:56 2011 +0200"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Sun Sep 25 19:52:45 2011 +0300"
      },
      "message": "KVM: Split up MSI-X assigned device IRQ handler\n\nThe threaded IRQ handler for MSI-X has almost nothing in common with the\nINTx/MSI handler. Move its code into a dedicated handler.\n\nSigned-off-by: Jan Kiszka \u003cjan.kiszka@siemens.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "c61fa9d63b40b06522c5f1d940b084323a090688",
      "tree": "dbabc88d4096a9f155794a6bb48d8ac5274bc1fa",
      "parents": [
        "9f9f6b78776be3de02e0c7533924e6954b918123"
      ],
      "author": {
        "name": "Jan Kiszka",
        "email": "jan.kiszka@siemens.com",
        "time": "Sun Sep 11 10:16:20 2011 +0200"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Sun Sep 25 19:52:39 2011 +0300"
      },
      "message": "KVM: Avoid needless registrations of IRQ ack notifier for assigned devices\n\nWe only perform work in kvm_assigned_dev_ack_irq if the guest IRQ is of\nINTx type. This completely avoids the callback invocation in non-INTx\ncases by registering the IRQ ack notifier only for INTx.\n\nSigned-off-by: Jan Kiszka \u003cjan.kiszka@siemens.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "9f9f6b78776be3de02e0c7533924e6954b918123",
      "tree": "6c03254c90c6ecf194858b3521fb6654996659cc",
      "parents": [
        "e8f2b1d621e7b73c16aaae2ccf4a64d09a0f56d8"
      ],
      "author": {
        "name": "Jan Kiszka",
        "email": "jan.kiszka@siemens.com",
        "time": "Sun Sep 11 10:16:16 2011 +0200"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Sun Sep 25 19:52:38 2011 +0300"
      },
      "message": "KVM: Clean up unneeded void pointer casts\n\nSigned-off-by: Jan Kiszka \u003cjan.kiszka@siemens.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "6777829cfe1c4ed78319ad40aaee60254222da76",
      "tree": "03e55538247c4b2fbdc837984922a0ac8753b253",
      "parents": [
        "9c9b1f24f2aa31a3cea94939edc551f68ebadc89"
      ],
      "author": {
        "name": "Greg Rose",
        "email": "gregory.v.rose@intel.com",
        "time": "Fri Jul 22 05:46:07 2011 +0000"
      },
      "committer": {
        "name": "Jeff Kirsher",
        "email": "jeffrey.t.kirsher@intel.com",
        "time": "Fri Sep 23 09:05:44 2011 -0700"
      },
      "message": "pci: Add flag indicating device has been assigned by KVM\n\nDevice drivers that create and destroy SR-IOV virtual functions via\ncalls to pci_enable_sriov() and pci_disable_sriov can cause catastrophic\nfailures if they attempt to destroy VFs while they are assigned to\nguest virtual machines.  By adding a flag for use by the KVM module\nto indicate that a device is assigned a device driver can check that\nflag and avoid destroying VFs while they are assigned and avoid system\nfailures.\n\nCC: Ian Campbell \u003cijc@hellion.org.uk\u003e\nCC: Konrad Wilk \u003ckonrad.wilk@oracle.com\u003e\nSigned-off-by: Greg Rose \u003cgregory.v.rose@intel.com\u003e\nAcked-by: Jesse Barnes \u003cjbarnes@virtuousgeek.org\u003e\nSigned-off-by: Jeff Kirsher \u003cjeffrey.t.kirsher@intel.com\u003e\n"
    },
    {
      "commit": "9f3191aec595ef9f3c80bc96664fd7aef57ef5be",
      "tree": "53be5ad0a1b677fa9a43bd8b2c22e1c5bad76a54",
      "parents": [
        "1dda606c5f94b14a8f36c220d1d8844bab68a720"
      ],
      "author": {
        "name": "Jan Kiszka",
        "email": "jan.kiszka@siemens.com",
        "time": "Sat Jun 11 12:23:55 2011 +0200"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Tue Jul 12 13:16:18 2011 +0300"
      },
      "message": "KVM: Fix off-by-one in overflow check of KVM_ASSIGN_SET_MSIX_NR\n\nKVM_MAX_MSIX_PER_DEV implies that up to that many MSI-X entries can be\nrequested. But the kernel so far rejected already the upper limit.\n\nSigned-off-by: Jan Kiszka \u003cjan.kiszka@siemens.com\u003e\nSigned-off-by: Avi Kivity \u003cavi@redhat.com\u003e\n"
    },
    {
      "commit": "f8fcfd775523347afe460dc3a0f45d0479e784a2",
      "tree": "8c7c5e0ece50b8661cae34ee1a6734144fce7594",
      "parents": [
        "ffbdd3f7931fb7cb7e36d00d16303ec433be5145"
      ],
      "author": {
        "name": "Alex Williamson",
        "email": "alex.williamson@redhat.com",
        "time": "Tue May 10 10:02:39 2011 -0600"
      },
      "committer": {
        "name": "Jesse Barnes",
        "email": "jbarnes@virtuousgeek.org",
        "time": "Sat May 21 12:17:10 2011 -0700"
      },
      "message": "KVM: Use pci_store/load_saved_state() around VM device usage\n\nStore the device saved state so that we can reload the device back\nto the original state when it\u0027s unassigned.  This has the benefit\nthat the state survives across pci_reset_function() calls via\nthe PCI sysfs reset interface while the VM is using the device.\n\nSigned-off-by: Alex Williamson \u003calex.williamson@redhat.com\u003e\nAcked-by: Avi Kivity \u003cavi@redhat.com\u003e\nSigned-off-by: Jesse Barnes \u003cjbarnes@virtuousgeek.org\u003e\n"
    },
    {
      "commit": "51de271d441c01e7a0cf39f128827e0b4dc56409",
      "tree": "4d019dcf308e670008eafcfa64a649aa84588f10",
      "parents": [
        "ed78661f2614d3c9f69c23e280db3bafdabdf5bb"
      ],
      "author": {
        "name": "Jan Kiszka",
        "email": "jan.kiszka@siemens.com",
        "time": "Tue Nov 16 22:30:06 2010 +0100"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Wed Jan 12 11:29:24 2011 +0200"
      },
      "message": "KVM: Clean up kvm_vm_ioctl_assigned_device\n\nAny arch not supporting device assigment will also not build\nassigned-dev.c. So testing for KVM_CAP_DEVICE_DEASSIGNMENT is pointless.\nKVM_CAP_ASSIGN_DEV_IRQ is unconditinally set. Moreover, add a default\ncase for dispatching the ioctl.\n\nAcked-by: Alex Williamson \u003calex.williamson@redhat.com\u003e\nAcked-by: Michael S. Tsirkin \u003cmst@redhat.com\u003e\nSigned-off-by: Jan Kiszka \u003cjan.kiszka@siemens.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "ed78661f2614d3c9f69c23e280db3bafdabdf5bb",
      "tree": "7344bdb2ae1ca07dcb2c4bf76e4618c1c65d47a9",
      "parents": [
        "1e001d49f9f9a0e3eb72939ad49d9a2c7754e9c1"
      ],
      "author": {
        "name": "Jan Kiszka",
        "email": "jan.kiszka@siemens.com",
        "time": "Tue Nov 16 22:30:05 2010 +0100"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Wed Jan 12 11:29:22 2011 +0200"
      },
      "message": "KVM: Save/restore state of assigned PCI device\n\nThe guest may change states that pci_reset_function does not touch. So\nwe better save/restore the assigned device across guest usage.\n\nAcked-by: Alex Williamson \u003calex.williamson@redhat.com\u003e\nAcked-by: Michael S. Tsirkin \u003cmst@redhat.com\u003e\nSigned-off-by: Jan Kiszka \u003cjan.kiszka@siemens.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "1e001d49f9f9a0e3eb72939ad49d9a2c7754e9c1",
      "tree": "3ccce476e4ad47d9ad620294a684827df0ded980",
      "parents": [
        "0645211c43df0b96c51e12980066b3227e10b164"
      ],
      "author": {
        "name": "Jan Kiszka",
        "email": "jan.kiszka@siemens.com",
        "time": "Tue Nov 16 22:30:04 2010 +0100"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Wed Jan 12 11:29:21 2011 +0200"
      },
      "message": "KVM: Refactor IRQ names of assigned devices\n\nCosmetic change, but it helps to correlate IRQs with PCI devices.\n\nAcked-by: Alex Williamson \u003calex.williamson@redhat.com\u003e\nAcked-by: Michael S. Tsirkin \u003cmst@redhat.com\u003e\nSigned-off-by: Jan Kiszka \u003cjan.kiszka@siemens.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "0645211c43df0b96c51e12980066b3227e10b164",
      "tree": "2c23ea65e07b9481681eb6bb7cc5d7d2fa109917",
      "parents": [
        "0c106b5aaa727c7f508828e94cff4a98874f930c"
      ],
      "author": {
        "name": "Jan Kiszka",
        "email": "jan.kiszka@siemens.com",
        "time": "Tue Nov 16 22:30:03 2010 +0100"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Wed Jan 12 11:29:20 2011 +0200"
      },
      "message": "KVM: Switch assigned device IRQ forwarding to threaded handler\n\nThis improves the IRQ forwarding for assigned devices: By using the\nkernel\u0027s threaded IRQ scheme, we can get rid of the latency-prone work\nqueue and simplify the code in the same run.\n\nMoreover, we no longer have to hold assigned_dev_lock while raising the\nguest IRQ, which can be a lenghty operation as we may have to iterate\nover all VCPUs. The lock is now only used for synchronizing masking vs.\nunmasking of INTx-type IRQs, thus is renames to intx_lock.\n\nAcked-by: Alex Williamson \u003calex.williamson@redhat.com\u003e\nAcked-by: Michael S. Tsirkin \u003cmst@redhat.com\u003e\nSigned-off-by: Jan Kiszka \u003cjan.kiszka@siemens.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "0c106b5aaa727c7f508828e94cff4a98874f930c",
      "tree": "24bcd4ff350c34e86ee76bdcac006d7c96de2719",
      "parents": [
        "945ee35e0764a834bc5bc5d572085d5b6409902a"
      ],
      "author": {
        "name": "Jan Kiszka",
        "email": "jan.kiszka@siemens.com",
        "time": "Tue Nov 16 22:30:02 2010 +0100"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Wed Jan 12 11:29:19 2011 +0200"
      },
      "message": "KVM: Clear assigned guest IRQ on release\n\nWhen we deassign a guest IRQ, clear the potentially asserted guest line.\nThere might be no chance for the guest to do this, specifically if we\nswitch from INTx to MSI mode.\n\nAcked-by: Alex Williamson \u003calex.williamson@redhat.com\u003e\nAcked-by: Michael S. Tsirkin \u003cmst@redhat.com\u003e\nSigned-off-by: Jan Kiszka \u003cjan.kiszka@siemens.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "a24e809902339458416900869abdcc51a44bfd48",
      "tree": "83d988a4b47c501d3775b5c07547e71b79456b82",
      "parents": [
        "376d41ff2669617a1ef828466ad07a1be99d24d3"
      ],
      "author": {
        "name": "Andi Kleen",
        "email": "andi@firstfloor.org",
        "time": "Thu Jun 10 13:10:55 2010 +0200"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Sun Aug 01 10:46:29 2010 +0300"
      },
      "message": "KVM: Fix unused but set warnings\n\nNo real bugs in this one.\n\nSigned-off-by: Andi Kleen \u003cak@linux.intel.com\u003e\nSigned-off-by: Avi Kivity \u003cavi@redhat.com\u003e\n"
    },
    {
      "commit": "221d059d15f1c8bd070a63fd45cd8d2598af5f99",
      "tree": "d3f58d21aa9cd5a28a29f5187ae9f03bd4f9e089",
      "parents": [
        "9fb2d2b4ff292a01ae30da003d1dc097917b0988"
      ],
      "author": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Sun May 23 18:37:00 2010 +0300"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Sun Aug 01 10:35:51 2010 +0300"
      },
      "message": "KVM: Update Red Hat copyrights\n\nSigned-off-by: Avi Kivity \u003cavi@redhat.com\u003e\n"
    },
    {
      "commit": "48bb09eee4e102544808c00f43bc40a4a2e43e50",
      "tree": "8b3124aea0f596062816f4b5b4274685020f956d",
      "parents": [
        "aad827034e419fa8c5ec39e6455266f0b942d856"
      ],
      "author": {
        "name": "Alex Williamson",
        "email": "alex.williamson@redhat.com",
        "time": "Wed May 12 09:46:31 2010 -0400"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Sun Aug 01 10:35:45 2010 +0300"
      },
      "message": "KVM: remove CAP_SYS_RAWIO requirement from kvm_vm_ioctl_assign_irq\n\nRemove this check in an effort to allow kvm guests to run without\nroot privileges.  This capability check doesn\u0027t seem to add any\nsecurity since the device needs to have already been added via the\nassign device ioctl and the io actually occurs through the pci\nsysfs interface.\n\nSigned-off-by: Alex Williamson \u003calex.williamson@redhat.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "d57e2c0740bbdd768dcbafe58cf62174f31d7c2d",
      "tree": "50ac4407800ec7660f070539d2ac89854280d6ae",
      "parents": [
        "a87fa35514bcf17aeca97245574e3f735cec9074"
      ],
      "author": {
        "name": "jing zhang",
        "email": "zj.barak@gmail.com",
        "time": "Sat Mar 13 15:00:45 2010 +0800"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Mon May 17 12:15:36 2010 +0300"
      },
      "message": "KVM: fix assigned_device_enable_host_msix error handling\n\nFree IRQ\u0027s and disable MSIX upon failure.\n\nCc: Avi Kivity \u003cavi@redhat.com\u003e\nSigned-off-by: Jing Zhang \u003czj.barak@gmail.com\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "5a0e3ad6af8660be21ca98a971cd00f331318c05",
      "tree": "5bfb7be11a03176a87296a43ac6647975c00a1d1",
      "parents": [
        "ed391f4ebf8f701d3566423ce8f17e614cde9806"
      ],
      "author": {
        "name": "Tejun Heo",
        "email": "tj@kernel.org",
        "time": "Wed Mar 24 17:04:11 2010 +0900"
      },
      "committer": {
        "name": "Tejun Heo",
        "email": "tj@kernel.org",
        "time": "Tue Mar 30 22:02:32 2010 +0900"
      },
      "message": "include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h\n\npercpu.h is included by sched.h and module.h and thus ends up being\nincluded when building most .c files.  percpu.h includes slab.h which\nin turn includes gfp.h making everything defined by the two files\nuniversally available and complicating inclusion dependencies.\n\npercpu.h -\u003e slab.h dependency is about to be removed.  Prepare for\nthis change by updating users of gfp and slab facilities include those\nheaders directly instead of assuming availability.  As this conversion\nneeds to touch large number of source files, the following script is\nused as the basis of conversion.\n\n  http://userweb.kernel.org/~tj/misc/slabh-sweep.py\n\nThe script does the followings.\n\n* Scan files for gfp and slab usages and update includes such that\n  only the necessary includes are there.  ie. if only gfp is used,\n  gfp.h, if slab is used, slab.h.\n\n* When the script inserts a new include, it looks at the include\n  blocks and try to put the new include such that its order conforms\n  to its surrounding.  It\u0027s put in the include block which contains\n  core kernel includes, in the same order that the rest are ordered -\n  alphabetical, Christmas tree, rev-Xmas-tree or at the end if there\n  doesn\u0027t seem to be any matching order.\n\n* If the script can\u0027t find a place to put a new include (mostly\n  because the file doesn\u0027t have fitting include block), it prints out\n  an error message indicating which .h file needs to be added to the\n  file.\n\nThe conversion was done in the following steps.\n\n1. The initial automatic conversion of all .c files updated slightly\n   over 4000 files, deleting around 700 includes and adding ~480 gfp.h\n   and ~3000 slab.h inclusions.  The script emitted errors for ~400\n   files.\n\n2. Each error was manually checked.  Some didn\u0027t need the inclusion,\n   some needed manual addition while adding it to implementation .h or\n   embedding .c file was more appropriate for others.  This step added\n   inclusions to around 150 files.\n\n3. The script was run again and the output was compared to the edits\n   from #2 to make sure no file was left behind.\n\n4. Several build tests were done and a couple of problems were fixed.\n   e.g. lib/decompress_*.c used malloc/free() wrappers around slab\n   APIs requiring slab.h to be added manually.\n\n5. The script was run on all .h files but without automatically\n   editing them as sprinkling gfp.h and slab.h inclusions around .h\n   files could easily lead to inclusion dependency hell.  Most gfp.h\n   inclusion directives were ignored as stuff from gfp.h was usually\n   wildly available and often used in preprocessor macros.  Each\n   slab.h inclusion directive was examined and added manually as\n   necessary.\n\n6. percpu.h was updated not to include slab.h.\n\n7. Build test were done on the following configurations and failures\n   were fixed.  CONFIG_GCOV_KERNEL was turned off for all tests (as my\n   distributed build env didn\u0027t work with gcov compiles) and a few\n   more options had to be turned off depending on archs to make things\n   build (like ipr on powerpc/64 which failed due to missing writeq).\n\n   * x86 and x86_64 UP and SMP allmodconfig and a custom test config.\n   * powerpc and powerpc64 SMP allmodconfig\n   * sparc and sparc64 SMP allmodconfig\n   * ia64 SMP allmodconfig\n   * s390 SMP allmodconfig\n   * alpha SMP allmodconfig\n   * um on x86_64 SMP allmodconfig\n\n8. percpu.h modifications were reverted so that it could be applied as\n   a separate patch and serve as bisection point.\n\nGiven the fact that I had only a couple of failures from tests on step\n6, I\u0027m fairly confident about the coverage of this conversion patch.\nIf there is a breakage, it\u0027s likely to be something in one of the arch\nheaders which should be easily discoverable easily on most builds of\nthe specific arch.\n\nSigned-off-by: Tejun Heo \u003ctj@kernel.org\u003e\nGuess-its-ok-by: Christoph Lameter \u003ccl@linux-foundation.org\u003e\nCc: Ingo Molnar \u003cmingo@redhat.com\u003e\nCc: Lee Schermerhorn \u003cLee.Schermerhorn@hp.com\u003e\n"
    },
    {
      "commit": "ab9f4ecbb6d39a18e300a0d10a4968c37404aa76",
      "tree": "1f7fba2feaeca2f6d643437167c7b9036c909c98",
      "parents": [
        "6d3e435e708fa32f99b780caf6c5508a606a513b"
      ],
      "author": {
        "name": "Zhai, Edwin",
        "email": "edwin.zhai@intel.com",
        "time": "Fri Jan 29 14:38:44 2010 +0800"
      },
      "committer": {
        "name": "Marcelo Tosatti",
        "email": "mtosatti@redhat.com",
        "time": "Mon Mar 01 12:36:06 2010 -0300"
      },
      "message": "KVM: enable PCI multiple-segments for pass-through device\n\nEnable optional parameter (default 0) - PCI segment (or domain) besides\nBDF, when assigning PCI device to guest.\n\nSigned-off-by: Zhai Edwin \u003cedwin.zhai@intel.com\u003e\nAcked-by: Chris Wright \u003cchrisw@sous-sol.org\u003e\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "bc6678a33d9b952981a8e44a4f876c3ad64ca4d8",
      "tree": "e26027179eb0d76f234509145a395dd6e5910074",
      "parents": [
        "3ad26d8139a82b0510b1e0435ee82ae461d33401"
      ],
      "author": {
        "name": "Marcelo Tosatti",
        "email": "mtosatti@redhat.com",
        "time": "Wed Dec 23 14:35:21 2009 -0200"
      },
      "committer": {
        "name": "Marcelo Tosatti",
        "email": "mtosatti@redhat.com",
        "time": "Mon Mar 01 12:35:44 2010 -0300"
      },
      "message": "KVM: introduce kvm-\u003esrcu and convert kvm_set_memory_region to SRCU update\n\nUse two steps for memslot deletion: mark the slot invalid (which stops\ninstantiation of new shadow pages for that slot, but allows destruction),\nthen instantiate the new empty slot.\n\nAlso simplifies kvm_handle_hva locking.\n\nSigned-off-by: Marcelo Tosatti \u003cmtosatti@redhat.com\u003e\n"
    },
    {
      "commit": "fae3a3536a6fecedebd49fa847f810e599bfb132",
      "tree": "18b555c3f6bcc6735fd7a90db2c398a35e29c84e",
      "parents": [
        "fb341f572d26e0786167cd96b90cc4febed830cf"
      ],
      "author": {
        "name": "Sheng Yang",
        "email": "sheng@linux.intel.com",
        "time": "Tue Dec 15 10:28:07 2009 +0800"
      },
      "committer": {
        "name": "Marcelo Tosatti",
        "email": "mtosatti@redhat.com",
        "time": "Sun Dec 27 13:36:31 2009 -0200"
      },
      "message": "KVM: Fix possible circular locking in kvm_vm_ioctl_assign_device()\n\nOne possible order is:\n\nKVM_CREATE_IRQCHIP ioctl(took kvm-\u003elock) -\u003e kvm_iobus_register_dev() -\u003e\ndown_write(kvm-\u003eslots_lock).\n\nThe other one is in kvm_vm_ioctl_assign_device(), which take kvm-\u003eslots_lock\nfirst, then kvm-\u003elock.\n\nUpdate the comment of lock order as well.\n\nObserve it due to kernel locking debug warnings.\n\nCc: stable@kernel.org\nSigned-off-by: Sheng Yang \u003csheng@linux.intel.com\u003e\nSigned-off-by: Avi Kivity \u003cavi@redhat.com\u003e\n"
    },
    {
      "commit": "bfd99ff5d483b11c32bca49fbff7a5ac59038b0a",
      "tree": "e48d9dbf89f6f3940133f7b80559740152af3f7b",
      "parents": [
        "367e1319b229110a27c53221c2fa32a6aa86d4a9"
      ],
      "author": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Wed Aug 26 14:57:50 2009 +0300"
      },
      "committer": {
        "name": "Avi Kivity",
        "email": "avi@redhat.com",
        "time": "Thu Dec 03 09:32:09 2009 +0200"
      },
      "message": "KVM: Move assigned device code to own file\n\nSigned-off-by: Avi Kivity \u003cavi@redhat.com\u003e\n"
    }
  ]
}
