RE: [RFC] KVM: x86: Support KVM VMs sharing SEV context

2021-06-01 Thread Kalra, Ashish
--Original Message----- From: Kalra, Ashish Sent: Thursday, May 27, 2021 10:51 AM To: 'Paolo Bonzini' ; 'Tobin Feldman-Fitzthum' ; 'na...@google.com' Cc: 'Dov Murik' ; Lendacky, Thomas ; 'x...@kernel.org' ; 'k...@vger.kernel.org'

RE: [RFC] KVM: x86: Support KVM VMs sharing SEV context

2021-05-27 Thread Kalra, Ashish
where it will start actually running the MH code, so mirror VM probably still need to handles KVM_EXIT_IO, when SEC phase does I/O, I can see PIC accesses and Debug Agent initialization stuff in Sec startup code. Thanks, Ashish -Original Message- From: Kalra, Ashish Sent: Monday, May 24

RE: [RFC] KVM: x86: Support KVM VMs sharing SEV context

2021-05-24 Thread Kalra, Ashish
vger.kernel.org; linux-ker...@vger.kernel.org; srutherf...@google.com; sea...@google.com; rient...@google.com; Singh, Brijesh ; Kalra, Ashish ; Laszlo Ersek ; James Bottomley ; Hubertus Franke Subject: Re: [RFC] KVM: x86: Support KVM VMs sharing SEV context On 11/03/21 16:30, Tobin Feldman-Fitzthum wro

SEV guest debugging support for Qemu

2020-09-22 Thread Kalra, Ashish
[AMD Public Use] Hello Alan, Paolo, I am following up on Brijesh's patches for SEV guest debugging support for Qemu using gdb and/or qemu monitor. I believe that last time, Qemu SEV debug patches were not applied and have attached the link to the email thread and Paolo's feedback below for refer

Re: [Qemu-devel] [Qemu-arm] [RFC v2 0/8] VIRTIO-IOMMU device

2017-07-07 Thread Kalra, Ashish
...@linaro.org Subject: Re: [Qemu-arm] [Qemu-devel] [RFC v2 0/8] VIRTIO-IOMMU device Hi Ashish, On 07/07/17 00:33, Tian, Kevin wrote: >> From: Kalra, Ashish [mailto:ashish.ka...@cavium.com] >> Sent: Friday, July 7, 2017 7:24 AM >> >> I have a generic question on vIOM

Re: [Qemu-devel] [Qemu-arm] [RFC v2 0/8] VIRTIO-IOMMU device

2017-07-06 Thread Kalra, Ashish
I have a generic question on vIOMMU support, is there any proposal/plan to add ATS/PRI extension support to vIOMMUs and allow handling for end to end (v)IOMMU Page faults (w/t the device side implementation on Vhost) ? Again, the motivation will be to do DMA on paged guest memory and potentially