Could this patch set include support for the SEND_CANCEL command?
On Mon, Apr 5, 2021 at 8:20 AM Ashish Kalra wrote:
>
> From: Ashish Kalra
>
> The series add support for AMD SEV guest live migration commands. To protect
> the
> confidentiality of an SEV protected guest memory while in transit
On Wed, Mar 17, 2021 at 3:19 PM Sean Christopherson wrote:
>
> On Wed, Mar 17, 2021, Sean Christopherson wrote:
> > On Wed, Mar 17, 2021, Borislav Petkov wrote:
> > > IOW, you have c_bit so your valid address space is [0 .. c_bit-1] no?
> >
> > I haven't found anything in the GHCB that dictates th
kernel.org
Fixes: 1e80fdc09d12 ("KVM: SVM: Pin guest memory when SEV is active")
Signed-off-by: Peter Gonda
V2
- Fix up patch description
- Correct file paths svm.c -> sev.c
- Add unlock of kvm->lock on sev_pin_memory error
V1
- https://lore.kernel.org/kvm/20210126185431.1824530-
kernel.org
Fixes: 1e80fdc09d12 ("KVM: SVM: Pin guest memory when SEV is active")
Signed-off-by: Peter Gonda
V2
- Fix up patch description
- Correct file paths svm.c -> sev.c
- Add unlock of kvm->lock on sev_pin_memory error
V1
- https://lore.kernel.org/kvm/20210126185431.1824530-
ry when SEV is active")
Signed-off-by: Peter Gonda
V2
- Fix up patch description
- Correct file paths svm.c -> sev.c
- Add unlock of kvm->lock on sev_pin_memory error
V1
- https://lore.kernel.org/kvm/20210126185431.1824530-1-pgo...@google.com/
---
arch/x86/kvm/svm/sev.c | 17 +
y when SEV is active)
Signed-off-by: Peter Gonda
---
arch/x86/kvm/svm.c | 16 +---
1 file changed, 9 insertions(+), 7 deletions(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index afdc5b44fe9f..9884e57f3d0f 100644
--- a/arch/x86/kvm/svm.c
+++ b/arch/x86/kvm/svm.c
@@ -1
The following commit has been merged into the x86/urgent branch of tip:
Commit-ID: a8f7e08a81708920a928664a865208fdf451c49f
Gitweb:
https://git.kernel.org/tip/a8f7e08a81708920a928664a865208fdf451c49f
Author:Peter Gonda
AuthorDate:Tue, 05 Jan 2021 08:33:11 -08:00
Committer
ad of 0xe0. After the correct port
was seen by KVM and the guests loop back OUT then IN were equal.
Fixes: 25189d08e5168 ("x86/sev-es: Add support for handling IOIO exceptions")
Signed-off-by: Peter Gonda
Acked-by: David Rientjes
---
arch/x86/kernel/sev-es-shared.c | 8 ++--
ad of 0xe0. After the correct port
was seen by KVM and the guests loop back OUT then IN were equal.
Signed-off-by: Peter Gonda
Acked-by: David Rientjes
---
arch/x86/kernel/sev-es-shared.c | 8 ++--
drivers/Makefile| 1 +
2 files changed, 7 insertions(+), 2 deletions(-)
di
On Thu, Sep 24, 2020 at 1:55 PM Tom Lendacky wrote:
>
> On 9/24/20 2:21 PM, Sean Christopherson wrote:
> > On Tue, Sep 22, 2020 at 02:14:04PM -0700, Vipin Sharma wrote:
> >> On Mon, Sep 21, 2020 at 06:48:38PM -0700, Sean Christopherson wrote:
> >>> On Mon, Sep 21, 2020 at 05:40:22PM -0700, Vipin S
10 matches
Mail list logo