summaryrefslogtreecommitdiffstats
path: root/arch/x86/boot/compressed/sev.c
Commit message (Expand)AuthorAgeFilesLines
* x86/sev: Move early startup code into .head.text sectionArd Biesheuvel2024-04-101-0/+3
* x86/sev: Check for user-space IOIO pointing to kernel spaceJoerg Roedel2023-10-171-0/+5
* x86/sev: Check IOBM for IOIO exceptions from user-spaceJoerg Roedel2023-10-091-0/+5
* Merge tag 'x86_sev_for_v6.6_rc1' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2023-08-281-1/+1
|\
| * x86/sev: Do not handle #VC for DR7 read/writeAlexey Kardashevskiy2023-08-161-1/+1
* | x86/efistub: Perform SNP feature test while running in the firmwareArd Biesheuvel2023-08-071-46/+66
|/
* x86/sev: Do not try to parse for the CC blob on non-AMD hardwareBorislav Petkov (AMD)2023-08-071-2/+35
* x86/sev: Add SNP-specific unaccepted memory supportTom Lendacky2023-06-061-1/+53
* x86/boot: Centralize __pa()/__va() definitionsKirill A. Shutemov2023-04-041-2/+0
* x86/sev: Add SEV-SNP guest feature negotiation supportNikunj A Dadhania2023-01-191-0/+70
* x86/boot: Don't propagate uninitialized boot_params->cc_blob_addressMichael Roth2022-08-241-0/+8
* x86/sev: Use firmware-validated CPUID for SEV-SNP guestsMichael Roth2022-04-071-37/+0
* x86/sev: Add SEV-SNP feature detection/setupMichael Roth2022-04-071-27/+0
* x86/compressed/64: Add identity mapping for Confidential Computing blobMichael Roth2022-04-071-0/+21
* x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guestsMichael Roth2022-04-071-0/+46
* x86/compressed: Add SEV-SNP feature detection/setupMichael Roth2022-04-071-1/+111
* x86/sev: Move MSR-based VMGEXITs for CPUID to helperMichael Roth2022-04-071-0/+1
* x86/compressed: Register GHCB memory when SEV-SNP is activeBrijesh Singh2022-04-061-0/+4
* x86/compressed: Add helper for validating pages in the decompression stageBrijesh Singh2022-04-061-0/+46
* x86/sev: Check the VMPL levelBrijesh Singh2022-04-061-2/+26
* x86/sev: Check SEV-SNP features supportBrijesh Singh2022-04-061-5/+15
* x86/sev: Define the Linux-specific guest termination reasonsBrijesh Singh2022-04-061-3/+3
* x86/compressed/64: Detect/setup SEV/SME features earlier during bootMichael Roth2022-04-061-0/+36
* x86/boot: Use MSR read/write helpers instead of inline assemblyMichael Roth2022-04-061-10/+7
* x86/sev: Shorten GHCB terminate macro namesBrijesh Singh2021-11-151-3/+3
* x86/sev-es: Rename sev-es.{ch} to sev.{ch}Brijesh Singh2021-05-101-0/+206