APPLIED[M]: [M][PULL] KVM: Enable Secure Execution Crypto Passthrough
Andrea Righi
andrea.righi at canonical.com
Wed Sep 13 15:06:51 UTC 2023
On Wed, Sep 06, 2023 at 01:40:18PM +0200, frank.heimes at canonical.com wrote:
> BugLink: https://bugs.launchpad.net/bugs/2003674
>
> Enable KVM and QEMU for AP passthrough to Secure Execution guests.
> This includes setup, configuration and teardown of AP related resources.
Applied to mantic/linux.
Thanks,
-Andrea
>
> ---
>
> The following changes since commit 037fb346b45d38e27fcc57e56a11fdce8c43569d:
>
> UBUNTU: Ubuntu-6.5.0-3.3 (2023-09-01 16:15:34 +0200)
>
> are available in the Git repository at:
>
> https://git.launchpad.net/~fheimes/+git/lp2003674/ 8f01b83130bc005b43bf458102a97fb82ebed03e
>
> for you to fetch changes up to 8f01b83130bc005b43bf458102a97fb82ebed03e:
>
> KVM: s390: pv: Allow AP-instructions for pv-guests (2023-09-05 13:33:41 +0200)
>
> ----------------------------------------------------------------
> Ilya Leoshkevich (6):
> KVM: s390: interrupt: Fix single-stepping into interrupt handlers
> KVM: s390: interrupt: Fix single-stepping into program interrupt handlers
> KVM: s390: interrupt: Fix single-stepping kernel-emulated instructions
> KVM: s390: interrupt: Fix single-stepping userspace-emulated instructions
> KVM: s390: interrupt: Fix single-stepping keyless mode exits
> KVM: s390: selftests: Add selftest for single-stepping
>
> Janosch Frank (1):
> s390/uv: export uv_pin_shared for direct usage
>
> Steffen Eiden (3):
> s390/uv: UV feature check utility
> KVM: s390: Add UV feature negotiation
> KVM: s390: pv: Allow AP-instructions for pv-guests
>
> Tony Krowiak (11):
> s390/vfio-ap: no need to check the 'E' and 'I' bits in APQSW after TAPQ
> s390/vfio-ap: clean up irq resources if possible
> s390/vfio-ap: wait for response code 05 to clear on queue reset
> s390/vfio-ap: allow deconfigured queue to be passed through to a guest
> s390/vfio-ap: remove upper limit on wait for queue reset to complete
> s390/vfio-ap: store entire AP queue status word with the queue object
> s390/vfio-ap: use work struct to verify queue reset
> s390/vfio-ap: handle queue state change in progress on reset
> s390/vfio-ap: check for TAPQ response codes 0x35 and 0x36
> KVM: s390: export kvm_s390_pv*_is_protected functions
> s390/vfio-ap: make sure nib is shared
>
> Viktor Mihajlovski (1):
> KVM: s390: pv: relax WARN_ONCE condition for destroy fast
>
> arch/s390/include/asm/kvm_host.h | 5 +
> arch/s390/include/asm/uv.h | 25 +++-
> arch/s390/include/uapi/asm/kvm.h | 16 +++
> arch/s390/kernel/uv.c | 5 +-
> arch/s390/kvm/intercept.c | 38 +++++-
> arch/s390/kvm/interrupt.c | 14 +++
> arch/s390/kvm/kvm-s390.c | 102 ++++++++++++++-
> arch/s390/kvm/kvm-s390.h | 12 --
> arch/s390/kvm/pv.c | 23 +++-
> arch/s390/mm/fault.c | 2 +-
> drivers/s390/crypto/vfio_ap_ops.c | 164 ++++++++++++++++---------
> drivers/s390/crypto/vfio_ap_private.h | 6 +-
> tools/testing/selftests/kvm/Makefile | 1 +
> tools/testing/selftests/kvm/s390x/debug_test.c | 160 ++++++++++++++++++++++++
> 14 files changed, 482 insertions(+), 91 deletions(-)
> create mode 100644 tools/testing/selftests/kvm/s390x/debug_test.c
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
More information about the kernel-team
mailing list