From: Paul Mackerras <paulus@ozlabs.org> To: Paolo Bonzini <pbonzini@redhat.com>, kvm@vger.kernel.org Cc: kvm-ppc@vger.kernel.org, Bharata B Rao <bharata@linux.vnet.ibm.com> Subject: [GIT PULL v2] Please pull my kvm-ppc-uvmem-5.5-2 tag Date: Fri, 29 Nov 2019 10:25:28 +1100 [thread overview] Message-ID: <20191128232528.GA12171@oak.ozlabs.ibm.com> (raw) In-Reply-To: <20191126052455.GA2922@oak.ozlabs.ibm.com> Paolo, Bharata has corrected the issue identified by Hugh Dickins, so please do a pull from my kvm-ppc-uvmem-5.5-2 tag. This adds code to manage the movement of pages for a secure KVM guest between normal memory managed by the host kernel and secure memory managed by the ultravisor, on Power systems with Protected Execution Facility hardware and firmware. Secure memory is not accessible to the host kernel and is represented as device memory using the ZONE_DEVICE facility. Thanks, Paul. The following changes since commit 96710247298df52a4b8150a62a6fe87083093ff3: Merge tag 'kvm-ppc-next-5.5-2' of git://git.kernel.org/pub/scm/linux/kernel/git/paulus/powerpc into HEAD (2019-11-25 11:29:05 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/paulus/powerpc tags/kvm-ppc-uvmem-5.5-2 for you to fetch changes up to 013a53f2d25a9fa9b9e1f70f5baa3f56e3454052: powerpc: Ultravisor: Add PPC_UV config option (2019-11-28 17:02:40 +1100) ---------------------------------------------------------------- KVM: Add support for secure guests under the Protected Execution Framework (PEF) Ultravisor on POWER. This enables secure memory to be represented as device memory, which provides a way for the host to keep track of which pages of a secure guest have been moved into secure memory managed by the ultravisor and are no longer accessible by the host, and manage movement of pages between secure and normal memory. ---------------------------------------------------------------- Anshuman Khandual (1): powerpc: Ultravisor: Add PPC_UV config option Bharata B Rao (6): mm: ksm: Export ksm_madvise() KVM: PPC: Book3S HV: Support for running secure guests KVM: PPC: Book3S HV: Shared pages support for secure guests KVM: PPC: Book3S HV: Radix changes for secure guest KVM: PPC: Book3S HV: Handle memory plug/unplug to secure VM KVM: PPC: Book3S HV: Support reset of secure guest Documentation/virt/kvm/api.txt | 18 + arch/powerpc/Kconfig | 17 + arch/powerpc/include/asm/hvcall.h | 9 + arch/powerpc/include/asm/kvm_book3s_uvmem.h | 74 +++ arch/powerpc/include/asm/kvm_host.h | 6 + arch/powerpc/include/asm/kvm_ppc.h | 1 + arch/powerpc/include/asm/ultravisor-api.h | 6 + arch/powerpc/include/asm/ultravisor.h | 36 ++ arch/powerpc/kvm/Makefile | 3 + arch/powerpc/kvm/book3s_64_mmu_radix.c | 25 + arch/powerpc/kvm/book3s_hv.c | 143 +++++ arch/powerpc/kvm/book3s_hv_uvmem.c | 785 ++++++++++++++++++++++++++++ arch/powerpc/kvm/powerpc.c | 12 + include/uapi/linux/kvm.h | 1 + mm/ksm.c | 1 + 15 files changed, 1137 insertions(+) create mode 100644 arch/powerpc/include/asm/kvm_book3s_uvmem.h create mode 100644 arch/powerpc/kvm/book3s_hv_uvmem.c
WARNING: multiple messages have this Message-ID (diff)
From: Paul Mackerras <paulus@ozlabs.org> To: Paolo Bonzini <pbonzini@redhat.com>, kvm@vger.kernel.org Cc: kvm-ppc@vger.kernel.org, Bharata B Rao <bharata@linux.vnet.ibm.com> Subject: [GIT PULL v2] Please pull my kvm-ppc-uvmem-5.5-2 tag Date: Thu, 28 Nov 2019 23:25:28 +0000 [thread overview] Message-ID: <20191128232528.GA12171@oak.ozlabs.ibm.com> (raw) In-Reply-To: <20191126052455.GA2922@oak.ozlabs.ibm.com> Paolo, Bharata has corrected the issue identified by Hugh Dickins, so please do a pull from my kvm-ppc-uvmem-5.5-2 tag. This adds code to manage the movement of pages for a secure KVM guest between normal memory managed by the host kernel and secure memory managed by the ultravisor, on Power systems with Protected Execution Facility hardware and firmware. Secure memory is not accessible to the host kernel and is represented as device memory using the ZONE_DEVICE facility. Thanks, Paul. The following changes since commit 96710247298df52a4b8150a62a6fe87083093ff3: Merge tag 'kvm-ppc-next-5.5-2' of git://git.kernel.org/pub/scm/linux/kernel/git/paulus/powerpc into HEAD (2019-11-25 11:29:05 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/paulus/powerpc tags/kvm-ppc-uvmem-5.5-2 for you to fetch changes up to 013a53f2d25a9fa9b9e1f70f5baa3f56e3454052: powerpc: Ultravisor: Add PPC_UV config option (2019-11-28 17:02:40 +1100) ---------------------------------------------------------------- KVM: Add support for secure guests under the Protected Execution Framework (PEF) Ultravisor on POWER. This enables secure memory to be represented as device memory, which provides a way for the host to keep track of which pages of a secure guest have been moved into secure memory managed by the ultravisor and are no longer accessible by the host, and manage movement of pages between secure and normal memory. ---------------------------------------------------------------- Anshuman Khandual (1): powerpc: Ultravisor: Add PPC_UV config option Bharata B Rao (6): mm: ksm: Export ksm_madvise() KVM: PPC: Book3S HV: Support for running secure guests KVM: PPC: Book3S HV: Shared pages support for secure guests KVM: PPC: Book3S HV: Radix changes for secure guest KVM: PPC: Book3S HV: Handle memory plug/unplug to secure VM KVM: PPC: Book3S HV: Support reset of secure guest Documentation/virt/kvm/api.txt | 18 + arch/powerpc/Kconfig | 17 + arch/powerpc/include/asm/hvcall.h | 9 + arch/powerpc/include/asm/kvm_book3s_uvmem.h | 74 +++ arch/powerpc/include/asm/kvm_host.h | 6 + arch/powerpc/include/asm/kvm_ppc.h | 1 + arch/powerpc/include/asm/ultravisor-api.h | 6 + arch/powerpc/include/asm/ultravisor.h | 36 ++ arch/powerpc/kvm/Makefile | 3 + arch/powerpc/kvm/book3s_64_mmu_radix.c | 25 + arch/powerpc/kvm/book3s_hv.c | 143 +++++ arch/powerpc/kvm/book3s_hv_uvmem.c | 785 ++++++++++++++++++++++++++++ arch/powerpc/kvm/powerpc.c | 12 + include/uapi/linux/kvm.h | 1 + mm/ksm.c | 1 + 15 files changed, 1137 insertions(+) create mode 100644 arch/powerpc/include/asm/kvm_book3s_uvmem.h create mode 100644 arch/powerpc/kvm/book3s_hv_uvmem.c
next prev parent reply other threads:[~2019-11-28 23:25 UTC|newest] Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-11-26 5:24 [GIT PULL] Please pull my kvm-ppc-uvmem-5.5 tag Paul Mackerras 2019-11-26 5:24 ` Paul Mackerras 2019-11-28 4:56 ` Paul Mackerras 2019-11-28 4:56 ` Paul Mackerras 2019-11-28 23:25 ` Paul Mackerras [this message] 2019-11-28 23:25 ` [GIT PULL v2] Please pull my kvm-ppc-uvmem-5.5-2 tag Paul Mackerras 2019-11-29 18:20 ` Paolo Bonzini 2019-11-29 18:20 ` Paolo Bonzini
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20191128232528.GA12171@oak.ozlabs.ibm.com \ --to=paulus@ozlabs.org \ --cc=bharata@linux.vnet.ibm.com \ --cc=kvm-ppc@vger.kernel.org \ --cc=kvm@vger.kernel.org \ --cc=pbonzini@redhat.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.