aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/arch/x86/coco/sev (follow)
AgeCommit message (Expand)AuthorFilesLines
2025-09-05Merge branch 'x86/apic' into x86/sev, to resolve conflictIngo Molnar2-5/+118
2025-09-04x86/apic/savic: Do not use snp_abort()Borislav Petkov (AMD)1-2/+2
2025-09-03x86/boot: Create a confined code area for startup codeArd Biesheuvel1-1/+1
2025-09-03x86/sev: Move __sev_[get|put]_ghcb() into separate noinstr objectArd Biesheuvel2-4/+78
2025-09-03x86/sev: Provide PIC aliases for SEV related data objectsArd Biesheuvel1-0/+34
2025-09-03x86/sev: Use boot SVSM CA for all startup and init codeArd Biesheuvel1-25/+22
2025-09-03x86/sev: Pass SVSM calling area down to early page state change APIArd Biesheuvel1-2/+5
2025-09-03x86/sev: Avoid global variable to store virtual address of SVSM areaArd Biesheuvel1-9/+0
2025-09-03x86/sev: Move GHCB page based HV communication out of startup codeArd Biesheuvel3-0/+172
2025-09-01x86/sev: Prevent SECURE_AVIC_CONTROL MSR interception for Secure AVIC guestsNeeraj Upadhyay1-0/+9
2025-09-01x86/apic: Add kexec support for Secure AVICNeeraj Upadhyay1-0/+23
2025-09-01x86/sev: Enable NMI support for Secure AVICKishon Vijay Abraham I1-1/+1
2025-09-01x86/sev: Initialize VGIF for secondary vCPUs for Secure AVICKishon Vijay Abraham I1-0/+3
2025-09-01x86/apic: Support LAPIC timer for Secure AVICNeeraj Upadhyay1-0/+26
2025-09-01x86/apic: Add support to send IPI for Secure AVICNeeraj Upadhyay2-5/+34
2025-08-31x86/apic: Initialize Secure AVIC APIC backing pageNeeraj Upadhyay1-0/+22
2025-08-28x86/apic: Add new driver for Secure AVICNeeraj Upadhyay1-0/+1
2025-08-28x86/sev: Separate MSR and GHCB based snp_cpuid() via a callbackArd Biesheuvel1-1/+48
2025-08-17Merge tag 'x86_urgent_for_v6.17_rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tipLinus Torvalds2-15/+18
2025-08-15x86/sev: Ensure SVSM reserved fields in a page validation entry are initialized to zeroTom Lendacky1-0/+2
2025-08-12x86/sev: Improve handling of writes to intercepted TSC MSRsNikunj A Dadhania1-15/+16
2025-08-06x86/sev: Evict cache lines during SNP memory validationTom Lendacky1-0/+21
2025-07-29Merge tag 'x86_sev_for_v6.17_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tipLinus Torvalds2-42/+56
2025-07-15x86/sev: Work around broken noinstr on GCCArd Biesheuvel1-1/+2
2025-07-01x86/sev: Use TSC_FACTOR for Secure TSC frequency calculationNikunj A Dadhania1-3/+19
2025-06-27x86/sev: Let sev_es_efi_map_ghcbs() map the CA pages tooGerd Hoffmann1-2/+15
2025-06-27x86/sev/vc: Fix EFI runtime instruction emulationGerd Hoffmann1-1/+8
2025-06-18x86/sev: Drop unnecessary parameter in snp_issue_guest_request()Alexey Kardashevskiy1-2/+3
2025-06-18x86/sev: Document requirement for linear mapping of guest request buffersAlexey Kardashevskiy1-0/+9
2025-06-18x86/sev: Allocate request in TSC_INFO_REQ on stackAlexey Kardashevskiy1-18/+12
2025-06-18virt: sev-guest: Contain snp_guest_request_ioctl in sev-guestAlexey Kardashevskiy1-23/+13
2025-06-03Merge tag 'hyperv-next-signed-20250602' of git://git.kernel.org/pub/scm/linux/kernel/git/hyperv/linuxLinus Torvalds1-11/+2
2025-05-27Merge tag 'x86_sev_for_v6.16_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tipLinus Torvalds1-1/+68
2025-05-23arch/x86: Provide the CPU number in the wakeup AP callbackRoman Kisel1-11/+2
2025-05-21Merge tag 'v6.15-rc7' into x86/core, to pick up fixesIngo Molnar1-90/+165
2025-05-15x86/cpuid: Set <asm/cpuid/api.h> as the main CPUID headerAhmed S. Darwish2-2/+2
2025-05-13x86/sev: Make sure pages are not skipped during kdumpAshish Kalra1-4/+7
2025-05-13x86/sev: Do not touch VMSA pages during SNP guest memory kdumpAshish Kalra1-86/+158
2025-05-13Merge branch 'x86/msr' into x86/core, to resolve conflictsIngo Molnar1-1/+2
2025-05-05x86/sev: Disentangle #VC handling code from startup codeArd Biesheuvel3-1/+1566
2025-05-02x86/msr: Convert __rdmsr() uses to native_rdmsrq() usesXin Li (Intel)1-1/+1
2025-05-02x86/msr: Add explicit includes of <asm/msr.h>Xin Li (Intel)1-0/+1
2025-04-24x86/sev: Share the sev_secrets_pa value againTom Lendacky1-5/+2
2025-04-22x86/boot: Move SEV startup code into startup/Ard Biesheuvel3-2821/+2
2025-04-22x86/sev: Split off startup code from core codeArd Biesheuvel4-1592/+1641
2025-04-22x86/sev: Move noinstr NMI handling code into separate source fileArd Biesheuvel3-90/+112
2025-04-12x86/sev: Prepare for splitting off early SEV codeArd Biesheuvel2-147/+25
2025-04-12x86/asm: Make rip_rel_ptr() usable from fPIC codeArd Biesheuvel2-3/+3
2025-04-10x86/sev: Register tpm-svsm platform deviceStefano Garzarella1-1/+10
2025-04-10x86/sev: Add SVSM vTPM probe/send_command functionsStefano Garzarella1-0/+58