diff options
author | 2025-05-27 10:21:04 -0700 | |
---|---|---|
committer | 2025-05-27 10:21:04 -0700 | |
commit | dd3922cf9d4d1421e5883614d1a6add912131c00 (patch) | |
tree | f153d0d3f08e1186d53062c3768e5b2121bfe34e /scripts/lib/kdoc/kdoc_parser.py | |
parent | Merge tag 'x86_mtrr_for_v6.16_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip (diff) | |
parent | x86/sev: Register tpm-svsm platform device (diff) | |
download | linux-rng-dd3922cf9d4d1421e5883614d1a6add912131c00.tar.xz linux-rng-dd3922cf9d4d1421e5883614d1a6add912131c00.zip |
Merge tag 'x86_sev_for_v6.16_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull AMD SEV update from Borislav Petkov:
"Add a virtual TPM driver glue which allows a guest kernel to talk to a
TPM device emulated by a Secure VM Service Module (SVSM) - a helper
module of sorts which runs at a different privilege level in the
SEV-SNP VM stack.
The intent being that a TPM device is emulated by a trusted entity and
not by the untrusted host which is the default assumption in the
confidential computing scenarios"
* tag 'x86_sev_for_v6.16_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
x86/sev: Register tpm-svsm platform device
tpm: Add SNP SVSM vTPM driver
svsm: Add header with SVSM_VTPM_CMD helpers
x86/sev: Add SVSM vTPM probe/send_command functions
Diffstat (limited to 'scripts/lib/kdoc/kdoc_parser.py')
0 files changed, 0 insertions, 0 deletions