Toggle navigation
Patchwork
KVM development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Submitter =
Kalra, Ashish
| State =
Action Required
| 278 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
3
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
[v2,3/3] x86/sev: Add SEV-SNP CipherTextHiding support
Add SEV-SNP CipherTextHiding feature support
- - -
-
-
-
2024-09-17
Kalra, Ashish
New
[v2,2/3] crypto: ccp: Add support for SNP_FEATURE_INFO command
Add SEV-SNP CipherTextHiding feature support
- - -
-
-
-
2024-09-17
Kalra, Ashish
New
[v2,1/3] crypto: ccp: New bit-field definitions for SNP_PLATFORM_STATUS command
Add SEV-SNP CipherTextHiding feature support
- 1 -
-
-
-
2024-09-17
Kalra, Ashish
New
[v2] x86/sev: Fix host kdump support for SNP
[v2] x86/sev: Fix host kdump support for SNP
- - -
-
-
-
2024-09-03
Kalra, Ashish
New
x86/sev: Fix host kdump support for SNP
x86/sev: Fix host kdump support for SNP
- - -
-
-
-
2024-08-27
Kalra, Ashish
New
[3/3] x86/sev: Add SEV-SNP CipherTextHiding support
Add SEV-SNP CipherTextHiding feature support
- - -
-
-
-
2024-08-12
Kalra, Ashish
New
[2/3] crypto: ccp: Add support for SNP_FEATURE_INFO command
Add SEV-SNP CipherTextHiding feature support
- - -
-
-
-
2024-08-12
Kalra, Ashish
New
[1/3] crypto: ccp: Extend SNP_PLATFORM_STATUS command
Add SEV-SNP CipherTextHiding feature support
- - -
-
-
-
2024-08-12
Kalra, Ashish
New
[v3] x86/sev: Add support for allowing zero SEV ASIDs.
[v3] x86/sev: Add support for allowing zero SEV ASIDs.
1 - -
-
-
-
2024-01-04
Kalra, Ashish
New
[v2] x86/sev: Add support for allowing zero SEV ASIDs.
[v2] x86/sev: Add support for allowing zero SEV ASIDs.
- - -
-
-
-
2024-01-04
Kalra, Ashish
New
x86/sev: Add support for allowing zero SEV ASIDs.
x86/sev: Add support for allowing zero SEV ASIDs.
- - -
-
-
-
2024-01-02
Kalra, Ashish
New
[Part2,v6,49/49] KVM: SVM: Sync the GHCB scratch buffer using already mapped ghcb
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,48/49] *debug: warn and retry failed rmpupdates
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,47/49] *fix for stale per-cpu pointer due to cond_resched during ghcb mapping
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,46/49] ccp: add support to decrypt the page
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,45/49] KVM: SVM: Add module parameter to enable the SEV-SNP
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,44/49] KVM: SVM: Support SEV-SNP AP Creation NAE event
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,43/49] KVM: SVM: Use a VMSA physical address variable for populating VMCB
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,41/49] KVM: SVM: Add support to handle the RMP nested page fault
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,40/49] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,39/49] KVM: SVM: Introduce ops for the post gfn map and unmap
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,38/49] KVM: SVM: Add support to handle Page State Change VMGEXIT
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,37/49] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,36/49] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,35/49] KVM: SVM: Remove the long-lived GHCB host map
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,34/49] KVM: SVM: Do not use long-lived GHCB map while setting scratch area
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,33/49] KVM: x86: Update page-fault trace to log full 64-bit error code
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,32/49] KVM: x86: Define RMP page fault error bits for #NPF
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,31/49] KVM: x86: Introduce kvm_mmu_get_tdp_walk() for SEV-SNP use
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,30/49] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX and SNP
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,29/49] KVM: X86: Keep the NPT and RMP page level in sync
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,28/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,27/49] KVM: SVM: Mark the private vma unmerable for SEV-SNP guests
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,26/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,25/49] KVM: SVM: Disallow registering memory range from HugeTLB for SNP guest
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,24/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,23/49] KVM: SVM: Add KVM_SNP_INIT command
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,22/49] KVM: SVM: Add initial SEV-SNP support
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,21/49] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,20/49] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,19/49] KVM: SVM: Add support to handle AP reset MSR protocol
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,18/49] crypto: ccp: Provide APIs to query extended attestation report
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,17/49] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,16/49] crypto: ccp: Add the SNP_PLATFORM_STATUS command
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,15/49] crypto: ccp: Handle the legacy SEV command when SNP is enabled
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,11/49] crypto:ccp: Define the SEV-SNP commands
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,10/49] x86/fault: Add support to dump RMP entry on fault
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,09/49] x86/fault: Add support to handle the RMP fault for user address
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,08/49] x86/traps: Define RMP violation #PF error code
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,06/49] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,05/49] x86/sev: Add RMP entry lookup helpers
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,04/49] x86/sev: set SYSCFG.MFMD
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,03/49] x86/sev: Add the host SEV-SNP initialization support
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,02/49] iommu/amd: Introduce function to check SEV-SNP support
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[Part2,v6,01/49] x86/cpufeatures: Add SEV-SNP CPU feature
Add AMD Secure Nested Paging (SEV-SNP)
- - -
-
-
-
2022-06-20
Kalra, Ashish
New
[v2] KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel memory leak.
[v2] KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel memory leak.
- 1 -
-
-
-
2022-05-16
Kalra, Ashish
New
KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel memory leak.
KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel memory leak.
- - -
-
-
-
2022-05-12
Kalra, Ashish
New
[v6,5/5] x86/kvm: Add kexec support for SEV Live Migration.
Add Guest API & Guest Kernel support for SEV live migration.
- 1 -
-
-
-
2021-08-24
Kalra, Ashish
New
[v6,4/5] x86/kvm: Add guest support for detecting and enabling SEV Live Migration feature.
Add Guest API & Guest Kernel support for SEV live migration.
- 1 -
-
-
-
2021-08-24
Kalra, Ashish
New
[v6,3/5] EFI: Introduce the new AMD Memory Encryption GUID.
Add Guest API & Guest Kernel support for SEV live migration.
1 - -
-
-
-
2021-08-24
Kalra, Ashish
New
[v6,2/5] mm: x86: Invoke hypercall when page encryption status is changed
Add Guest API & Guest Kernel support for SEV live migration.
- 3 -
-
-
-
2021-08-24
Kalra, Ashish
New
[v6,1/5] x86/kvm: Add AMD SEV specific Hypercall3
Add Guest API & Guest Kernel support for SEV live migration.
- 2 -
-
-
-
2021-08-24
Kalra, Ashish
New
[RFC,13/13] hw/i386/pc: reduce fw_cfg boot cpu count taking into account mirror vcpu's.
Add support for Mirror VM.
- - -
-
-
-
2021-08-16
Kalra, Ashish
New
[RFC,12/13] hw/acpi: disable modern CPU hotplug interface for mirror vcpu's
Add support for Mirror VM.
- - -
-
-
-
2021-08-16
Kalra, Ashish
New
[RFC,11/13] kvm/apic: Disable in-kernel APIC support for mirror vcpu's.
Add support for Mirror VM.
- - -
-
-
-
2021-08-16
Kalra, Ashish
New
[RFC,10/13] softmmu/cpu: Skip mirror vcpu's for pause, resume and synchronization.
Add support for Mirror VM.
- - -
-
-
-
2021-08-16
Kalra, Ashish
New
[RFC,09/13] kvm: create Mirror VM and share primary VM's encryption context.
Add support for Mirror VM.
- - -
-
-
-
2021-08-16
Kalra, Ashish
New
[RFC,08/13] kvm: Add Mirror VM support.
Add support for Mirror VM.
- - -
-
-
-
2021-08-16
Kalra, Ashish
New
[RFC,07/13] kvm: Add Mirror VM ioctl and enable cap interfaces.
Add support for Mirror VM.
- - -
-
-
-
2021-08-16
Kalra, Ashish
New
[RFC,06/13] hw/i386: Set CPUState.mirror_vcpu=true for mirror vcpus
Add support for Mirror VM.
- - -
-
-
-
2021-08-16
Kalra, Ashish
New
[RFC,05/13] cpu: Add boolean mirror_vcpu field to CPUState
Add support for Mirror VM.
- - -
-
-
-
2021-08-16
Kalra, Ashish
New
[RFC,04/13] hw/acpi: Don't include mirror vcpus in ACPI tables
Add support for Mirror VM.
- - -
-
-
-
2021-08-16
Kalra, Ashish
New
[RFC,03/13] hw/i386: Mark mirror vcpus in possible_cpus
Add support for Mirror VM.
- - -
-
-
-
2021-08-16
Kalra, Ashish
New
[RFC,02/13] hw/boards: Add mirror_vcpu flag to CPUArchId
Add support for Mirror VM.
- - -
-
-
-
2021-08-16
Kalra, Ashish
New
[RFC,01/13] machine: Add mirrorvcpus=N suboption to -smp
Add support for Mirror VM.
- - -
-
-
-
2021-08-16
Kalra, Ashish
New
[v5,6/6] x86/kvm: Add kexec support for SEV Live Migration.
Untitled series #508669
- 1 -
-
-
-
2021-06-29
Kalra, Ashish
New
[v5,5/6] x86/kvm: Add guest support for detecting and enabling SEV Live Migration feature.
Untitled series #508669
- 1 -
-
-
-
2021-06-29
Kalra, Ashish
New
[v4,5/5] x86/kvm: Add guest support for detecting and enabling SEV Live Migration feature.
Untitled series #498951
- - -
-
-
-
2021-06-11
Kalra, Ashish
New
[v4,4/5] EFI: Introduce the new AMD Memory Encryption GUID.
Untitled series #498951
1 - -
-
-
-
2021-06-11
Kalra, Ashish
New
[v4,3/5] mm: x86: Invoke hypercall when page encryption status is changed
Untitled series #498951
- 3 -
-
-
-
2021-06-11
Kalra, Ashish
New
[v3,5/5] x86/kvm: Add guest support for detecting and enabling SEV Live Migration feature.
Add Guest API & Guest Kernel support for SEV live migration.
- - -
-
-
-
2021-06-08
Kalra, Ashish
New
[v3,4/5] EFI: Introduce the new AMD Memory Encryption GUID.
Add Guest API & Guest Kernel support for SEV live migration.
1 - -
-
-
-
2021-06-08
Kalra, Ashish
New
[v3,3/5] mm: x86: Invoke hypercall when page encryption status is changed
Add Guest API & Guest Kernel support for SEV live migration.
- 3 -
-
-
-
2021-06-08
Kalra, Ashish
New
[v3,2/5] KVM: x86: invert KVM_HYPERCALL to default to VMMCALL
Add Guest API & Guest Kernel support for SEV live migration.
- - -
-
-
-
2021-06-08
Kalra, Ashish
New
[v3,1/5] KVM: X86: Introduce KVM_HC_MAP_GPA_RANGE hypercall
Add Guest API & Guest Kernel support for SEV live migration.
- 1 -
-
-
-
2021-06-08
Kalra, Ashish
New
KVM: SVM: Fix SEV SEND_START session length & SEND_UPDATE_DATA query length after commit 238eca821c…
KVM: SVM: Fix SEV SEND_START session length & SEND_UPDATE_DATA query length after commit 238eca821c…
- - -
-
-
-
2021-06-07
Kalra, Ashish
New
[v2,4/4] x86/kvm: Add guest support for detecting and enabling SEV Live Migration feature.
Add guest support for SEV live migration.
- - -
-
-
-
2021-04-23
Kalra, Ashish
New
[v2,3/4] EFI: Introduce the new AMD Memory Encryption GUID.
Add guest support for SEV live migration.
- - -
-
-
-
2021-04-23
Kalra, Ashish
New
[v2,2/4] mm: x86: Invoke hypercall when page encryption status is changed
Add guest support for SEV live migration.
- 3 -
-
-
-
2021-04-23
Kalra, Ashish
New
[v2,1/4] KVM: x86: invert KVM_HYPERCALL to default to VMMCALL
Add guest support for SEV live migration.
- - -
-
-
-
2021-04-23
Kalra, Ashish
New
[4/4] x86/kvm: Add guest support for detecting and enabling SEV Live Migration feature.
Add guest support for SEV live migration.
- - -
-
-
-
2021-04-22
Kalra, Ashish
New
[3/4] EFI: Introduce the new AMD Memory Encryption GUID.
Add guest support for SEV live migration.
- - -
-
-
-
2021-04-22
Kalra, Ashish
New
[2/4] mm: x86: Invoke hypercall when page encryption status is changed
Add guest support for SEV live migration.
- 2 -
-
-
-
2021-04-22
Kalra, Ashish
New
[1/4] KVM: x86: Add AMD SEV specific Hypercall3
Add guest support for SEV live migration.
- 2 -
-
-
-
2021-04-22
Kalra, Ashish
New
[v13,12/12] x86/kvm: Add guest support for detecting and enabling SEV Live Migration feature.
Add AMD SEV guest live migration support
- - -
-
-
-
2021-04-15
Kalra, Ashish
New
«
1
2
3
»