[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH v3 0/3]s390x/pv: Improve error reporting of protected VMs
From: |
Cédric Le Goater |
Subject: |
[PATCH v3 0/3]s390x/pv: Improve error reporting of protected VMs |
Date: |
Mon, 16 Jan 2023 18:46:04 +0100 |
Hello,
Here is a little series improving error reporting of protected VMs.
Thanks,
C.
Changes in v3:
- dropped 's390x/pv: Check for support on the host'. This is already
covered by the KVM capability.
- in s390_pv_check() (patch 2) drop the call to s390_pv_guest_check()
since init time has already checked the same conditions. However,
to report an error when the machine is not protected and the kernel
secure, we still need s390_pv_check().
Changes in v2:
- dropped ConfidentialGuestSupportClass handler. The check is now
done from s390_pv_init() which is called after memory and CPU
initialization. This gives us a better chance to tune the limits
correctly.
- pv_max_cpus now computed from the available size of the response
buffer of the Read SCP Info Service Call (Thomas)
Cédric Le Goater (3):
s390x/pv: Implement a CGS check helper
s390x/pv: Introduce a s390_pv_check() helper for runtime
s390x/pv: Move check on hugepage under s390_pv_guest_check()
include/hw/s390x/pv.h | 2 ++
hw/s390x/pv.c | 64 +++++++++++++++++++++++++++++++++++++++++++
target/s390x/diag.c | 6 ++--
3 files changed, 69 insertions(+), 3 deletions(-)
--
2.39.0