[23.10 FEAT] KVM: Enable Secure Execution Crypto Passthrough - kernel part
Bug #2003674 reported by
bugproxy
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Ubuntu on IBM z Systems |
Fix Released
|
High
|
Skipper Bug Screeners | ||
linux (Ubuntu) |
Fix Released
|
High
|
Canonical Kernel Team |
Bug Description
Feature Description:
Enable KVM and QEMU for AP passthrough to Secure Execution guests. This includes setup, configuration and teardown of AP related resources.
tags: | added: architecture-s39064 bugnameltc-201347 severity-high targetmilestone-inin2304 |
Changed in ubuntu: | |
assignee: | nobody → Skipper Bug Screeners (skipper-screen-team) |
affects: | ubuntu → linux (Ubuntu) |
Changed in ubuntu-z-systems: | |
assignee: | nobody → Skipper Bug Screeners (skipper-screen-team) |
importance: | Undecided → High |
Changed in linux (Ubuntu): | |
importance: | Undecided → High |
Changed in ubuntu-z-systems: | |
status: | New → Incomplete |
Changed in linux (Ubuntu): | |
status: | New → Incomplete |
tags: |
added: targetmilestone-inin2310 removed: targetmilestone-inin2304 |
summary: |
- [23.04 FEAT] KVM: Enable Secure Execution Crypto Passthrough - kernel + [23.10 FEAT] KVM: Enable Secure Execution Crypto Passthrough - kernel part |
Changed in ubuntu-z-systems: | |
status: | Incomplete → New |
Changed in linux (Ubuntu): | |
status: | Incomplete → New |
information type: | Private → Public |
Changed in ubuntu-z-systems: | |
status: | Fix Committed → Fix Released |
To post a comment you must log in.
------- Comment From <email address hidden> 2023-08-23 12:28 EDT-------
Thanks everyone for your work on this item.
All required patches are now available in linux-next.
Please include the following set of patches in Mantic:
b1d8b21681db KVM: s390: pv: Allow AP-instructions for pv-guests pv*_is_ protected functions
baf737b3381e KVM: s390: Add UV feature negotiation
d1c787f139e5 s390/uv: UV feature check utility
ed1bb17c0051 KVM: s390: pv: relax WARN_ONCE condition for destroy fast
9341fed081a9 Merge remote-tracking branch 'vfio-ap' into kvm-next
f88fb1335733 s390/vfio-ap: make sure nib is shared
fb5040ef7f70 KVM: s390: export kvm_s390_
cf3fa16a6fd4 s390/uv: export uv_pin_shared for direct usage
7847a19b5b62 s390/vfio-ap: check for TAPQ response codes 0x35 and 0x36
e1f17f8ea93d s390/vfio-ap: handle queue state change in progress on reset
9261f0438835 s390/vfio-ap: use work struct to verify queue reset
62aab082e999 s390/vfio-ap: store entire AP queue status word with the queue object
dd174833e44e s390/vfio-ap: remove upper limit on wait for queue reset to complete
c51f8c6bb5c8 s390/vfio-ap: allow deconfigured queue to be passed through to a guest
411b0109daa5 s390/vfio-ap: wait for response code 05 to clear on queue reset
7aa7b2a80cb7 s390/vfio-ap: clean up irq resources if possible
680b7ddd7e2a s390/vfio-ap: no need to check the 'E' and 'I' bits in APQSW after TAPQ
b275d8313217 KVM: s390: selftests: Add selftest for single-stepping
93f92e0fe942 KVM: s390: interrupt: Fix single-stepping keyless mode exits
000e395cb8c1 KVM: s390: interrupt: Fix single-stepping userspace-emulated instructions
2e05ab06b68b KVM: s390: interrupt: Fix single-stepping kernel-emulated instructions
e544f4055741 KVM: s390: interrupt: Fix single-stepping into program interrupt handlers
bbc6eb0de96e KVM: s390: interrupt: Fix single-stepping into interrupt handlers
Thanks.