qemu-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Qemu-commits] [qemu/qemu] 9904ad: virtio-net: fix rsc_ext compat handli


From: Peter Maydell
Subject: [Qemu-commits] [qemu/qemu] 9904ad: virtio-net: fix rsc_ext compat handling
Date: Thu, 30 Apr 2020 07:00:31 -0700

  Branch: refs/heads/master
  Home:   https://github.com/qemu/qemu
  Commit: 9904adfaca139581d6b03947a7e23c7e2cb64339
      
https://github.com/qemu/qemu/commit/9904adfaca139581d6b03947a7e23c7e2cb64339
  Author: Cornelia Huck <address@hidden>
  Date:   2020-04-28 (Tue, 28 Apr 2020)

  Changed paths:
    M hw/net/virtio-net.c

  Log Message:
  -----------
  virtio-net: fix rsc_ext compat handling

virtio_net_rsc_ext_num_{packets,dupacks} needs to be available
independently of the presence of VIRTIO_NET_HDR_F_RSC_INFO.

Fixes: 2974e916df87 ("virtio-net: support RSC v4/v6 tcp traffic for Windows 
HCK")
Signed-off-by: Cornelia Huck <address@hidden>
Message-Id: <address@hidden>


  Commit: dc6f8d458a4ccc360723993f31d310d06469f55f
      
https://github.com/qemu/qemu/commit/dc6f8d458a4ccc360723993f31d310d06469f55f
  Author: Cornelia Huck <address@hidden>
  Date:   2020-04-28 (Tue, 28 Apr 2020)

  Changed paths:
    M include/standard-headers/linux/ethtool.h
    M include/standard-headers/linux/input-event-codes.h
    M include/standard-headers/linux/pci_regs.h
    M include/standard-headers/linux/vhost_types.h
    M include/standard-headers/linux/virtio_balloon.h
    M include/standard-headers/linux/virtio_ids.h
    M include/standard-headers/linux/virtio_net.h
    M linux-headers/COPYING
    M linux-headers/asm-x86/kvm.h
    M linux-headers/asm-x86/unistd_32.h
    M linux-headers/asm-x86/unistd_64.h
    M linux-headers/asm-x86/unistd_x32.h
    M linux-headers/linux/kvm.h
    M linux-headers/linux/mman.h
    M linux-headers/linux/userfaultfd.h
    M linux-headers/linux/vfio.h
    M linux-headers/linux/vhost.h

  Log Message:
  -----------
  linux-headers: update against Linux 5.7-rc3

commit 6a8b55ed4056ea5559ebe4f6a4b247f627870d4c

Reviewed-by: Michael S. Tsirkin <address@hidden> # virtio/vhost parts
Signed-off-by: Cornelia Huck <address@hidden>
Message-Id: <address@hidden>


  Commit: 9b39d29470e9dbef24ee842a44ea56bd92b855ea
      
https://github.com/qemu/qemu/commit/9b39d29470e9dbef24ee842a44ea56bd92b855ea
  Author: Janosch Frank <address@hidden>
  Date:   2020-04-28 (Tue, 28 Apr 2020)

  Changed paths:
    M hw/s390x/ipl.h
    M target/s390x/diag.c

  Log Message:
  -----------
  s390x: Move diagnose 308 subcodes and rcs into ipl.h

They are part of the IPL process, so let's put them into the ipl
header.

Signed-off-by: Janosch Frank <address@hidden>
Reviewed-by: Cornelia Huck <address@hidden>
Reviewed-by: Christian Borntraeger <address@hidden>
Reviewed-by: David Hildenbrand <address@hidden>
Message-Id: <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: c3347ed0d2ee42a7dcf7bfe7f9c3884a9596727a
      
https://github.com/qemu/qemu/commit/c3347ed0d2ee42a7dcf7bfe7f9c3884a9596727a
  Author: Janosch Frank <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M MAINTAINERS
    M hw/s390x/Makefile.objs
    M hw/s390x/ipl.c
    M hw/s390x/ipl.h
    A hw/s390x/pv.c
    M hw/s390x/s390-virtio-ccw.c
    A include/hw/s390x/pv.h
    M include/hw/s390x/s390-virtio-ccw.h
    M target/s390x/cpu.c
    M target/s390x/cpu_features_def.inc.h
    M target/s390x/diag.c
    M target/s390x/kvm-stub.c
    M target/s390x/kvm.c
    M target/s390x/kvm_s390x.h

  Log Message:
  -----------
  s390x: protvirt: Support unpack facility

The unpack facility provides the means to setup a protected guest. A
protected guest cannot be introspected by the hypervisor or any
user/administrator of the machine it is running on.

Protected guests are encrypted at rest and need a special boot
mechanism via diag308 subcode 8 and 10.

Code 8 sets the PV specific IPLB which is retained separately from
those set via code 5.

Code 10 is used to unpack the VM into protected memory, verify its
integrity and start it.

Signed-off-by: Janosch Frank <address@hidden>
Co-developed-by: Christian Borntraeger <address@hidden> [Changes
to machine]
Reviewed-by: David Hildenbrand <address@hidden>
Reviewed-by: Claudio Imbrenda <address@hidden>
Reviewed-by: Cornelia Huck <address@hidden>
Message-Id: <address@hidden>
[CH: fixed up KVM_PV_VM_ -> KVM_PV_]
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: 0141e1b47707d90f5bd9d252da064ebdaca698a6
      
https://github.com/qemu/qemu/commit/0141e1b47707d90f5bd9d252da064ebdaca698a6
  Author: Janosch Frank <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M hw/s390x/s390-virtio-ccw.c

  Log Message:
  -----------
  s390x: protvirt: Add migration blocker

Migration is not yet supported.

Signed-off-by: Janosch Frank <address@hidden>
Reviewed-by: David Hildenbrand <address@hidden>
Reviewed-by: Christian Borntraeger <address@hidden>
Reviewed-by: Claudio Imbrenda <address@hidden>
Reviewed-by: Cornelia Huck <address@hidden>
Message-Id: <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: b1697f63fd8f8201b1447bb55f595830b9cbde31
      
https://github.com/qemu/qemu/commit/b1697f63fd8f8201b1447bb55f595830b9cbde31
  Author: Janosch Frank <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M hw/s390x/s390-virtio-ccw.c

  Log Message:
  -----------
  s390x: protvirt: Inhibit balloon when switching to protected mode

Ballooning in protected VMs can only be done when the guest shares the
pages it gives to the host. If pages are not shared, the integrity
checks will fail once those pages have been altered and are given back
to the guest.

As we currently do not yet have a solution for this we will continue
like this:

1. We block ballooning now in QEMU (with this patch).

2. Later we will provide a change to virtio that removes the blocker
and adds VIRTIO_F_IOMMU_PLATFORM automatically by QEMU when doing the
protvirt switch. This is OK, as the balloon driver in Linux (the only
supported guest) will refuse to work with the IOMMU_PLATFORM feature
bit set.

3. Later, we can fix the guest balloon driver to accept the IOMMU
feature bit and correctly exercise sharing and unsharing of balloon
pages.

Signed-off-by: Janosch Frank <address@hidden>
Reviewed-by: David Hildenbrand <address@hidden>
Reviewed-by: Christian Borntraeger <address@hidden>
Reviewed-by: Claudio Imbrenda <address@hidden>
Reviewed-by: Cornelia Huck <address@hidden>
Message-Id: <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: 2585e507ffa1da01b57dbea26b1e1fe507d27198
      
https://github.com/qemu/qemu/commit/2585e507ffa1da01b57dbea26b1e1fe507d27198
  Author: Janosch Frank <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M target/s390x/kvm.c

  Log Message:
  -----------
  s390x: protvirt: KVM intercept changes

Protected VMs no longer intercept with code 4 for an instruction
interception. Instead they have codes 104 and 108 for protected
instruction interception and protected instruction notification
respectively.

The 104 mirrors the 4 interception.

The 108 is a notification interception to let KVM and QEMU know that
something changed and we need to update tracking information or
perform specific tasks. It's currently taken for the following
instructions:

* spx (To inform about the changed prefix location)
* sclp (On incorrect SCCB values, so we can inject a IRQ)
* sigp (All but "stop and store status")
* diag308 (Subcodes 0/1)

Of these exits only sclp errors, state changing sigps and diag308 will
reach QEMU. QEMU will do its parts of the job, while the ultravisor
has done the instruction part of the job.

Signed-off-by: Janosch Frank <address@hidden>
Reviewed-by: David Hildenbrand <address@hidden>
Reviewed-by: Christian Borntraeger <address@hidden>
Reviewed-by: Claudio Imbrenda <address@hidden>
Reviewed-by: Cornelia Huck <address@hidden>
Message-Id: <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: 1cca8265499d394d9ed4bfb75bd6e7265b529f89
      
https://github.com/qemu/qemu/commit/1cca8265499d394d9ed4bfb75bd6e7265b529f89
  Author: Janosch Frank <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M target/s390x/cpu.h
    M target/s390x/kvm.c
    M target/s390x/kvm_s390x.h
    M target/s390x/mmu_helper.c

  Log Message:
  -----------
  s390x: Add SIDA memory ops

Protected guests save the instruction control blocks in the SIDA
instead of QEMU/KVM directly accessing the guest's memory.

Let's introduce new functions to access the SIDA.

The memops for doing so are available with KVM_CAP_S390_PROTECTED, so
let's check for that.

Signed-off-by: Janosch Frank <address@hidden>
Reviewed-by: David Hildenbrand <address@hidden>
Reviewed-by: Christian Borntraeger <address@hidden>
Reviewed-by: Claudio Imbrenda <address@hidden>
Reviewed-by: Cornelia Huck <address@hidden>
Message-Id: <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: 7c713b8acb70fb61f9650f8a7702dec546752bb6
      
https://github.com/qemu/qemu/commit/7c713b8acb70fb61f9650f8a7702dec546752bb6
  Author: Janosch Frank <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M target/s390x/kvm.c

  Log Message:
  -----------
  s390x: protvirt: Move STSI data over SIDAD

For protected guests, we need to put the STSI emulation results into
the SIDA, so SIE will write them into the guest at the next entry.

Signed-off-by: Janosch Frank <address@hidden>
Reviewed-by: David Hildenbrand <address@hidden>
Reviewed-by: Claudio Imbrenda <address@hidden>
Reviewed-by: Cornelia Huck <address@hidden>
Message-Id: <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: 0f73c5b30b8ba6c0828608be496d2f59a5427539
      
https://github.com/qemu/qemu/commit/0f73c5b30b8ba6c0828608be496d2f59a5427539
  Author: Janosch Frank <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M hw/s390x/sclp.c
    M include/hw/s390x/sclp.h
    M target/s390x/kvm.c

  Log Message:
  -----------
  s390x: protvirt: SCLP interpretation

SCLP for a protected guest is done over the SIDAD, so we need to use
the s390_cpu_pv_mem_* functions to access the SIDAD instead of guest
memory when reading/writing SCBs.

To not confuse the sclp emulation, we set 0x4000 as the SCCB address,
since the function that injects the sclp external interrupt would
reject a zero sccb address.

Signed-off-by: Janosch Frank <address@hidden>
Reviewed-by: David Hildenbrand <address@hidden>
Reviewed-by: Claudio Imbrenda <address@hidden>
Reviewed-by: Cornelia Huck <address@hidden>
Reviewed-by: Christian Borntraeger <address@hidden>
Message-Id: <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: 59181010a2ff82c3a97e9b5768ee87c38e4815f1
      
https://github.com/qemu/qemu/commit/59181010a2ff82c3a97e9b5768ee87c38e4815f1
  Author: Janosch Frank <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M target/s390x/cpu.c

  Log Message:
  -----------
  s390x: protvirt: Set guest IPL PSW

Handling of CPU reset and setting of the IPL psw from guest storage at
offset 0 is done by a Ultravisor call. Let's only fetch it if
necessary.

Signed-off-by: Janosch Frank <address@hidden>
Reviewed-by: Thomas Huth <address@hidden>
Reviewed-by: David Hildenbrand <address@hidden>
Reviewed-by: Christian Borntraeger <address@hidden>
Reviewed-by: Claudio Imbrenda <address@hidden>
Reviewed-by: Cornelia Huck <address@hidden>
Message-Id: <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: 9c61e11238cfa8f70e3eb90aac5d3e5646e5432f
      
https://github.com/qemu/qemu/commit/9c61e11238cfa8f70e3eb90aac5d3e5646e5432f
  Author: Janosch Frank <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M target/s390x/diag.c

  Log Message:
  -----------
  s390x: protvirt: Move diag 308 data over SIDA

For protected guests the IPIB is written/read to/from the SIDA, so we
need those accesses to go through s390_cpu_pv_mem_read/write().

Signed-off-by: Janosch Frank <address@hidden>
Reviewed-by: David Hildenbrand <address@hidden>
Reviewed-by: Christian Borntraeger <address@hidden>
Reviewed-by: Claudio Imbrenda <address@hidden>
Reviewed-by: Cornelia Huck <address@hidden>
Message-Id: <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: c10b708752e5264a85b5c3afa0a0ccfcf6503ddf
      
https://github.com/qemu/qemu/commit/c10b708752e5264a85b5c3afa0a0ccfcf6503ddf
  Author: Janosch Frank <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M target/s390x/ioinst.c

  Log Message:
  -----------
  s390x: protvirt: Disable address checks for PV guest IO emulation

IO instruction data is routed through SIDAD for protected guests, so
adresses do not need to be checked, as this is kernel memory which is
always available.

Also the instruction data always starts at offset 0 of the SIDAD.

Signed-off-by: Janosch Frank <address@hidden>
Reviewed-by: Thomas Huth <address@hidden>
Reviewed-by: David Hildenbrand <address@hidden>
Reviewed-by: Christian Borntraeger <address@hidden>
Reviewed-by: Claudio Imbrenda <address@hidden>
Reviewed-by: Cornelia Huck <address@hidden>
Message-Id: <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: fcc10c1470d6e9460ebcf4c30f5bbd37b921a041
      
https://github.com/qemu/qemu/commit/fcc10c1470d6e9460ebcf4c30f5bbd37b921a041
  Author: Janosch Frank <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M target/s390x/ioinst.c

  Log Message:
  -----------
  s390x: protvirt: Move IO control structures over SIDA

For protected guests, we need to put the IO emulation results into the
SIDA, so SIE will write them into the guest at the next entry.

Signed-off-by: Janosch Frank <address@hidden>
Reviewed-by: David Hildenbrand <address@hidden>
Reviewed-by: Cornelia Huck <address@hidden>
Message-Id: <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: f2a2d9a2bae8f6fdc5e9a40c1241e9428f15b4df
      
https://github.com/qemu/qemu/commit/f2a2d9a2bae8f6fdc5e9a40c1241e9428f15b4df
  Author: Janosch Frank <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M target/s390x/helper.c

  Log Message:
  -----------
  s390x: protvirt: Handle SIGP store status correctly

For protected VMs status storing is not done by QEMU anymore.

Signed-off-by: Janosch Frank <address@hidden>
Reviewed-by: Thomas Huth <address@hidden>
Reviewed-by: David Hildenbrand <address@hidden>
Reviewed-by: Christian Borntraeger <address@hidden>
Reviewed-by: Claudio Imbrenda <address@hidden>
Reviewed-by: Cornelia Huck <address@hidden>
Message-Id: <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: 42fc5eae91bb9ec08b816d33d43cc08f96d1b683
      
https://github.com/qemu/qemu/commit/42fc5eae91bb9ec08b816d33d43cc08f96d1b683
  Author: Janosch Frank <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    A docs/system/s390x/protvirt.rst
    M docs/system/target-s390x.rst

  Log Message:
  -----------
  docs: system: Add protvirt docs

Let's add some documentation for the Protected VM functionality.

Signed-off-by: Janosch Frank <address@hidden>
Reviewed-by: Claudio Imbrenda <address@hidden>
Reviewed-by: Cornelia Huck <address@hidden>
Acked-by: David Hildenbrand <address@hidden>
Acked-by: Christian Borntraeger <address@hidden>
Message-Id: <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: 572c0826615737f1c095b1b6d9e381ec40f72eb5
      
https://github.com/qemu/qemu/commit/572c0826615737f1c095b1b6d9e381ec40f72eb5
  Author: Christian Borntraeger <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M target/s390x/gen-features.c
    M target/s390x/kvm.c

  Log Message:
  -----------
  s390x: Add unpack facility feature to GA1

The unpack facility is an indication that diagnose 308 subcodes 8-10
are available to the guest. That means, that the guest can put itself
into protected mode.

Once it is in protected mode, the hardware stops any attempt of VM
introspection by the hypervisor.

Some features are currently not supported in protected mode:
     * vfio devices
     * Migration
     * Huge page backings

Signed-off-by: Christian Borntraeger <address@hidden>
Signed-off-by: Janosch Frank <address@hidden>
Reviewed-by: David Hildenbrand <address@hidden>
Reviewed-by: Claudio Imbrenda <address@hidden>
Reviewed-by: Cornelia Huck <address@hidden>
Message-Id: <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: 7152c9ecc6530ea145c122b0a58cc28802f630c6
      
https://github.com/qemu/qemu/commit/7152c9ecc6530ea145c122b0a58cc28802f630c6
  Author: Janosch Frank <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M hw/s390x/s390-virtio-ccw.c

  Log Message:
  -----------
  s390x: protvirt: Fix stray error_report_err in s390_machine_protect

In case the protection of the machine fails at s390_pv_vm_enable(),
we'll currently report the local_error variable. Problem is that
there's no migration blocker error that we can report at this point so
the pointer is always NULL which leads to a SEGFAULT.

Let's remove the error report.

Signed-off-by: Janosch Frank <address@hidden>
Reported-by: Marc Hartmayer <address@hidden>
Fixes: 0141e1b47707 ("s390x: protvirt: Add migration blocker")
Message-Id: <address@hidden>
Reviewed-by: David Hildenbrand <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: e8d12a55f6d3e577455b02f15907c460578c689b
      
https://github.com/qemu/qemu/commit/e8d12a55f6d3e577455b02f15907c460578c689b
  Author: Christian Borntraeger <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M hw/s390x/pv.c

  Log Message:
  -----------
  s390x/pv: Retry ioctls on -EINTR

PV_ENABLE (and maybe others) might return -EINTR when a signal is
pending. See the Linux kernel patch "s390/gmap: return proper error code
on ksm unsharing" for details. Let us retry the ioctl in that case.

Fixes: c3347ed0d2ee ("s390x: protvirt: Support unpack facility")
Reported-by: Marc Hartmayer <address@hidden>
Acked-by: Janosch Frank <address@hidden>
Tested-by: Marc Hartmayer <address@hidden>
Signed-off-by: Christian Borntraeger <address@hidden>
Message-Id: <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: fbc1384ccd48fa7c0c38f950adf7992a4fb6042e
      
https://github.com/qemu/qemu/commit/fbc1384ccd48fa7c0c38f950adf7992a4fb6042e
  Author: Christian Borntraeger <address@hidden>
  Date:   2020-04-29 (Wed, 29 Apr 2020)

  Changed paths:
    M hw/s390x/ipl.h
    M hw/s390x/pv.c
    M hw/s390x/s390-virtio-ccw.c
    M include/hw/s390x/pv.h

  Log Message:
  -----------
  s390x/s390-virtio-ccw: Fix build on systems without KVM

linux/kvm.h is not available on all platforms. Let us move
s390_machine_inject_pv_error into pv.c as it uses KVM structures.
Also rename the function to s390_pv_inject_reset_error.

While at it, ipl.h needs an include for "exec/address-spaces.h"
as it uses address_space_memory.

Fixes: c3347ed0d2ee ("s390x: protvirt: Support unpack facility")
Reported-by: Bruce Rogers <address@hidden>
Signed-off-by: Christian Borntraeger <address@hidden>
Message-Id: <address@hidden>
Reviewed-by: David Hildenbrand <address@hidden>
Signed-off-by: Cornelia Huck <address@hidden>


  Commit: 16aaacb307ed607b9780c12702c44f0fe52edc7e
      
https://github.com/qemu/qemu/commit/16aaacb307ed607b9780c12702c44f0fe52edc7e
  Author: Peter Maydell <address@hidden>
  Date:   2020-04-30 (Thu, 30 Apr 2020)

  Changed paths:
    M MAINTAINERS
    A docs/system/s390x/protvirt.rst
    M docs/system/target-s390x.rst
    M hw/net/virtio-net.c
    M hw/s390x/Makefile.objs
    M hw/s390x/ipl.c
    M hw/s390x/ipl.h
    A hw/s390x/pv.c
    M hw/s390x/s390-virtio-ccw.c
    M hw/s390x/sclp.c
    A include/hw/s390x/pv.h
    M include/hw/s390x/s390-virtio-ccw.h
    M include/hw/s390x/sclp.h
    M include/standard-headers/linux/ethtool.h
    M include/standard-headers/linux/input-event-codes.h
    M include/standard-headers/linux/pci_regs.h
    M include/standard-headers/linux/vhost_types.h
    M include/standard-headers/linux/virtio_balloon.h
    M include/standard-headers/linux/virtio_ids.h
    M include/standard-headers/linux/virtio_net.h
    M linux-headers/COPYING
    M linux-headers/asm-x86/kvm.h
    M linux-headers/asm-x86/unistd_32.h
    M linux-headers/asm-x86/unistd_64.h
    M linux-headers/asm-x86/unistd_x32.h
    M linux-headers/linux/kvm.h
    M linux-headers/linux/mman.h
    M linux-headers/linux/userfaultfd.h
    M linux-headers/linux/vfio.h
    M linux-headers/linux/vhost.h
    M target/s390x/cpu.c
    M target/s390x/cpu.h
    M target/s390x/cpu_features_def.inc.h
    M target/s390x/diag.c
    M target/s390x/gen-features.c
    M target/s390x/helper.c
    M target/s390x/ioinst.c
    M target/s390x/kvm-stub.c
    M target/s390x/kvm.c
    M target/s390x/kvm_s390x.h
    M target/s390x/mmu_helper.c

  Log Message:
  -----------
  Merge remote-tracking branch 'remotes/cohuck/tags/s390x-20200430' into staging

- update Linux headers to 5.7-rc3 (and virtio-net fixup)
- support for protected virtualization aka secure execution

# gpg: Signature made Thu 30 Apr 2020 10:41:31 BST
# gpg:                using RSA key C3D0D66DC3624FF6A8C018CEDECF6B93C6F02FAF
# gpg:                issuer "address@hidden"
# gpg: Good signature from "Cornelia Huck <address@hidden>" [marginal]
# gpg:                 aka "Cornelia Huck <address@hidden>" [full]
# gpg:                 aka "Cornelia Huck <address@hidden>" [full]
# gpg:                 aka "Cornelia Huck <address@hidden>" [marginal]
# gpg:                 aka "Cornelia Huck <address@hidden>" [marginal]
# Primary key fingerprint: C3D0 D66D C362 4FF6 A8C0  18CE DECF 6B93 C6F0 2FAF

* remotes/cohuck/tags/s390x-20200430:
  s390x/s390-virtio-ccw: Fix build on systems without KVM
  s390x/pv: Retry ioctls on -EINTR
  s390x: protvirt: Fix stray error_report_err in s390_machine_protect
  s390x: Add unpack facility feature to GA1
  docs: system: Add protvirt docs
  s390x: protvirt: Handle SIGP store status correctly
  s390x: protvirt: Move IO control structures over SIDA
  s390x: protvirt: Disable address checks for PV guest IO emulation
  s390x: protvirt: Move diag 308 data over SIDA
  s390x: protvirt: Set guest IPL PSW
  s390x: protvirt: SCLP interpretation
  s390x: protvirt: Move STSI data over SIDAD
  s390x: Add SIDA memory ops
  s390x: protvirt: KVM intercept changes
  s390x: protvirt: Inhibit balloon when switching to protected mode
  s390x: protvirt: Add migration blocker
  s390x: protvirt: Support unpack facility
  s390x: Move diagnose 308 subcodes and rcs into ipl.h
  linux-headers: update against Linux 5.7-rc3
  virtio-net: fix rsc_ext compat handling

Signed-off-by: Peter Maydell <address@hidden>


Compare: https://github.com/qemu/qemu/compare/68bfd7db1e8b...16aaacb307ed



reply via email to

[Prev in Thread] Current Thread [Next in Thread]