Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for unmarshalling new SEV-SNP message #105

Merged
merged 2 commits into from
Jul 7, 2023

Conversation

jinankjain
Copy link
Collaborator

@jinankjain jinankjain commented Jul 7, 2023

Summary of the PR

These new messages are sent by Microsoft Hypervisor in case of SEV-SNP VM running.

Requirements

Before submitting your PR, please make sure you addressed the following
requirements:

  • All commits in this PR are signed (with git commit -s), and the commit
    message has max 60 characters for the summary and max 75 characters for each
    description line.
  • All added/changed functionality has a corresponding unit/integration
    test.
  • All added/changed public-facing functionality has entries in the "Upcoming
    Release" section of CHANGELOG.md (if no such section exists, please create one).
  • Any newly added unsafe code is properly documented.

... intercept handling in MSHV crate.

Signed-off-by: Jinank Jain <[email protected]>
This message is usually send by Microsoft Hypervisor in case of SEV-SNP
host tries to access some encrypted guest memory.

Signed-off-by: Jinank Jain <[email protected]>
@jinankjain jinankjain merged commit 38ab746 into rust-vmm:main Jul 7, 2023
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants