APPLIED[M]: [M][PULL] KVM: Enable Secure Execution Crypto Passthrough

Andrea Righi andrea.righi at canonical.com
Wed Sep 13 15:06:51 UTC 2023


On Wed, Sep 06, 2023 at 01:40:18PM +0200, frank.heimes at canonical.com wrote:
> BugLink: https://bugs.launchpad.net/bugs/2003674
> 
> Enable KVM and QEMU for AP passthrough to Secure Execution guests.
> This includes setup, configuration and teardown of AP related resources.

Applied to mantic/linux.

Thanks,
-Andrea


> 
> ---
> 
> The following changes since commit 037fb346b45d38e27fcc57e56a11fdce8c43569d:
> 
>   UBUNTU: Ubuntu-6.5.0-3.3 (2023-09-01 16:15:34 +0200)
> 
> are available in the Git repository at:
> 
>   https://git.launchpad.net/~fheimes/+git/lp2003674/ 8f01b83130bc005b43bf458102a97fb82ebed03e
> 
> for you to fetch changes up to 8f01b83130bc005b43bf458102a97fb82ebed03e:
> 
>   KVM: s390: pv: Allow AP-instructions for pv-guests (2023-09-05 13:33:41 +0200)
> 
> ----------------------------------------------------------------
> Ilya Leoshkevich (6):
>       KVM: s390: interrupt: Fix single-stepping into interrupt handlers
>       KVM: s390: interrupt: Fix single-stepping into program interrupt handlers
>       KVM: s390: interrupt: Fix single-stepping kernel-emulated instructions
>       KVM: s390: interrupt: Fix single-stepping userspace-emulated instructions
>       KVM: s390: interrupt: Fix single-stepping keyless mode exits
>       KVM: s390: selftests: Add selftest for single-stepping
> 
> Janosch Frank (1):
>       s390/uv: export uv_pin_shared for direct usage
> 
> Steffen Eiden (3):
>       s390/uv: UV feature check utility
>       KVM: s390: Add UV feature negotiation
>       KVM: s390: pv: Allow AP-instructions for pv-guests
> 
> Tony Krowiak (11):
>       s390/vfio-ap: no need to check the 'E' and 'I' bits in APQSW after TAPQ
>       s390/vfio-ap: clean up irq resources if possible
>       s390/vfio-ap: wait for response code 05 to clear on queue reset
>       s390/vfio-ap: allow deconfigured queue to be passed through to a guest
>       s390/vfio-ap: remove upper limit on wait for queue reset to complete
>       s390/vfio-ap: store entire AP queue status word with the queue object
>       s390/vfio-ap: use work struct to verify queue reset
>       s390/vfio-ap: handle queue state change in progress on reset
>       s390/vfio-ap: check for TAPQ response codes 0x35 and 0x36
>       KVM: s390: export kvm_s390_pv*_is_protected functions
>       s390/vfio-ap: make sure nib is shared
> 
> Viktor Mihajlovski (1):
>       KVM: s390: pv: relax WARN_ONCE condition for destroy fast
> 
>  arch/s390/include/asm/kvm_host.h               |   5 +
>  arch/s390/include/asm/uv.h                     |  25 +++-
>  arch/s390/include/uapi/asm/kvm.h               |  16 +++
>  arch/s390/kernel/uv.c                          |   5 +-
>  arch/s390/kvm/intercept.c                      |  38 +++++-
>  arch/s390/kvm/interrupt.c                      |  14 +++
>  arch/s390/kvm/kvm-s390.c                       | 102 ++++++++++++++-
>  arch/s390/kvm/kvm-s390.h                       |  12 --
>  arch/s390/kvm/pv.c                             |  23 +++-
>  arch/s390/mm/fault.c                           |   2 +-
>  drivers/s390/crypto/vfio_ap_ops.c              | 164 ++++++++++++++++---------
>  drivers/s390/crypto/vfio_ap_private.h          |   6 +-
>  tools/testing/selftests/kvm/Makefile           |   1 +
>  tools/testing/selftests/kvm/s390x/debug_test.c | 160 ++++++++++++++++++++++++
>  14 files changed, 482 insertions(+), 91 deletions(-)
>  create mode 100644 tools/testing/selftests/kvm/s390x/debug_test.c
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team



More information about the kernel-team mailing list