[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250728200416.GAaIfXwC7ZYKF70_Qg@fat_crate.local>
Date: Mon, 28 Jul 2025 22:04:16 +0200
From: Borislav Petkov <bp@...en8.de>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/sev for v6.17-rc1
Hi Linus,
please pull the x86/sev lineup for v6.17-rc1.
Thx.
---
The following changes since commit e04c78d86a9699d136910cfc0bdcf01087e3267e:
Linux 6.16-rc2 (2025-06-15 13:49:41 -0700)
are available in the Git repository at:
ssh://git@...olite.kernel.org/pub/scm/linux/kernel/git/tip/tip tags/x86_sev_for_v6.17_rc1
for you to fetch changes up to a7549636f67f973474ebe1ad262acc2aa4d1327d:
x86/sev: Let sev_es_efi_map_ghcbs() map the CA pages too (2025-06-27 14:07:10 +0200)
----------------------------------------------------------------
- Map the SNP calling area pages too so that OVMF EFI fw can issue SVSM
calls properly with the goal of implementing EFI variable store in the
SVSM - a component which is trusted by the guest, vs in the firmware, which
is not
- Allow the kernel to handle #VC exceptions from EFI runtime services
properly when running as a SNP guest
- Rework and cleanup the SNP guest request issue glue code a bit
----------------------------------------------------------------
Alexey Kardashevskiy (4):
virt: sev-guest: Contain snp_guest_request_ioctl in sev-guest
x86/sev: Allocate request in TSC_INFO_REQ on stack
x86/sev: Document requirement for linear mapping of guest request buffers
x86/sev: Drop unnecessary parameter in snp_issue_guest_request()
Gerd Hoffmann (2):
x86/sev/vc: Fix EFI runtime instruction emulation
x86/sev: Let sev_es_efi_map_ghcbs() map the CA pages too
arch/x86/coco/sev/core.c | 89 ++++++++++++++++++---------------
arch/x86/coco/sev/vc-handle.c | 9 +++-
arch/x86/include/asm/sev.h | 14 +++---
arch/x86/platform/efi/efi_64.c | 4 +-
drivers/virt/coco/sev-guest/sev-guest.c | 9 ++--
5 files changed, 70 insertions(+), 55 deletions(-)
--
Regards/Gruss,
Boris.
https://people.kernel.org/tglx/notes-about-netiquette
Powered by blists - more mailing lists