Re: [GIT PULL v2 00/10] KVM: s390: Changes for 6.6

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Aug 29, 2023 at 2:10 PM Janosch Frank <frankja@xxxxxxxxxxxxx> wrote:
>
> Dear Paolo,
>
> let's try this again.
> Please pull the following changes for 6.6.
>
> Please note that Heiko and I both merged Heiko's vfio-ap feature
> branch. Linus has pulled Heiko's next branch already (e5b7ca09e9aa).
>
> I've also merged tags/kvm-x86-selftests-immutable-6.6 since we
> introduce a new selftest with the guest debug fixes. I had to fixup
> the selftest commit since a function name changed.

Pulled, thanks!

> In the long run we're considering putting vfio-ap patches into their
> own repository but for 6.6 we didn't find the time to speak with all
> affected maintainers.

If needed you can also use a separate branch that you branch both into
Heiko's s390/next branch and your kvm/next branch

Paolo

> Changes:
> - PV crypto passthrough enablement (Tony, Steffen, Viktor, Janosch)
>   Allows a PV guest to use crypto cards. Card access is governed by
>   the firmware and once a crypto queue is "bound" to a PV VM every
>   other entity (PV or not) looses access until it is not bound
>   anymore. Enablement is done via flags when creating the PV VM.
>
> - Guest debug fixes + test (Ilya)
>
> The following changes since commit ede6d0b2031e045f0a0e4515e4567828d87fd3ef:
>
>   Merge tag 'kvm-x86-selftests-immutable-6.6' into next (2023-08-28 09:23:36 +0000)
>
> are available in the Git repository at:
>
>   https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux.git tags/kvm-s390-next-6.6-1
>
> for you to fetch changes up to 899e2206f46aece42d8194c350bc1de71344dbc7:
>
>   KVM: s390: pv: Allow AP-instructions for pv-guests (2023-08-28 09:27:56 +0000)
>
> ----------------------------------------------------------------
> - PV crypto passthrough enablement (Tony, Steffen, Viktor, Janosch)
>   Allows a PV guest to use crypto cards. Card access is governed by
>   the firmware and once a crypto queue is "bound" to a PV VM every
>   other entity (PV or not) looses access until it is not bound
>   anymore. Enablement is done via flags when creating the PV VM.
>
> - Guest debug fixes (Ilya)
> ----------------------------------------------------------------
>
> Ilya Leoshkevich (6):
>   KVM: s390: interrupt: Fix single-stepping into interrupt handlers
>   KVM: s390: interrupt: Fix single-stepping into program interrupt
>     handlers
>   KVM: s390: interrupt: Fix single-stepping kernel-emulated instructions
>   KVM: s390: interrupt: Fix single-stepping userspace-emulated
>     instructions
>   KVM: s390: interrupt: Fix single-stepping keyless mode exits
>   KVM: s390: selftests: Add selftest for single-stepping
>
> Steffen Eiden (3):
>   s390/uv: UV feature check utility
>   KVM: s390: Add UV feature negotiation
>   KVM: s390: pv: Allow AP-instructions for pv-guests
>
> Viktor Mihajlovski (1):
>   KVM: s390: pv: relax WARN_ONCE condition for destroy fast
>
> --
> 2.41.0
>





[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux