diff options
author | 2025-07-29 17:18:46 -0700 | |
---|---|---|
committer | 2025-07-29 17:18:46 -0700 | |
commit | 14bed9bc81bae64db98349319f367bfc7dab0afd (patch) | |
tree | dd2b911e2790c18be4490c17de4d75168713eed0 /rust/pin-init/internal/src | |
parent | Merge tag 'x86_microcode_for_v6.17_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip (diff) | |
parent | x86/sev: Let sev_es_efi_map_ghcbs() map the CA pages too (diff) | |
download | wireguard-linux-14bed9bc81bae64db98349319f367bfc7dab0afd.tar.xz wireguard-linux-14bed9bc81bae64db98349319f367bfc7dab0afd.zip |
Merge tag 'x86_sev_for_v6.17_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 SEV updates from Borislav Petkov:
- Map the SNP calling area pages too so that OVMF EFI fw can issue SVSM
calls properly with the goal of implementing EFI variable store in
the SVSM - a component which is trusted by the guest, vs in the
firmware, which is not
- Allow the kernel to handle #VC exceptions from EFI runtime services
properly when running as a SNP guest
- Rework and cleanup the SNP guest request issue glue code a bit
* tag 'x86_sev_for_v6.17_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
x86/sev: Let sev_es_efi_map_ghcbs() map the CA pages too
x86/sev/vc: Fix EFI runtime instruction emulation
x86/sev: Drop unnecessary parameter in snp_issue_guest_request()
x86/sev: Document requirement for linear mapping of guest request buffers
x86/sev: Allocate request in TSC_INFO_REQ on stack
virt: sev-guest: Contain snp_guest_request_ioctl in sev-guest
Diffstat (limited to 'rust/pin-init/internal/src')
0 files changed, 0 insertions, 0 deletions