summaryrefslogtreecommitdiffstats
path: root/arch/x86/coco
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'x86_tdx_for_6.3' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2023-02-252-25/+118
|\
| * x86/tdx: Do not corrupt frame-pointer in __tdx_hypercall()Kirill A. Shutemov2023-02-021-6/+6
| * x86/tdx: Disable NOTIFY_ENABLESKirill A. Shutemov2023-01-271-0/+7
| * x86/tdx: Relax SEPT_VE_DISABLE check for debug TDKirill A. Shutemov2023-01-271-2/+17
| * x86/tdx: Use ReportFatalError to report missing SEPT_VE_DISABLEKirill A. Shutemov2023-01-271-1/+37
| * x86/tdx: Expand __tdx_hypercall() to handle more argumentsKirill A. Shutemov2023-01-271-5/+30
| * x86/tdx: Refactor __tdx_hypercall() to allow pass down more argumentsKirill A. Shutemov2023-01-271-18/+28
| * x86/tdx: Fix typo in comment in __tdx_hypercall()Kirill A. Shutemov2023-01-271-1/+1
* | Merge tag 'v6.2-rc6' into sched/core, to pick up fixesIngo Molnar2023-01-311-13/+13
|\|
| * x86/insn: Avoid namespace clash by separating instruction decoder MMIO type f...Jason A. Donenfeld2023-01-031-13/+13
* | cpuidle, tdx: Make TDX code noinstr cleanPeter Zijlstra2023-01-132-2/+5
* | x86/tdx: Remove TDX_HCALL_ISSUE_STIPeter Zijlstra2023-01-132-32/+4
* | arch/idle: Change arch_cpu_idle() behavior: always exit with IRQs disabledPeter Zijlstra2023-01-131-0/+3
|/
* x86/tdx: Add a wrapper to get TDREPORT0 from the TDX ModuleKuppuswamy Sathyanarayanan2022-11-171-0/+40
* x86/tdx: Panic on bad configs that #VE on "private" memory accessKirill A. Shutemov2022-11-011-5/+16
* x86/tdx: Prepare for using "INFO" call for a second purposeDave Hansen2022-11-011-3/+3
* x86/tdx: Handle load_unaligned_zeropad() page-cross to a shared pageKirill A. Shutemov2022-06-171-1/+14
* x86/tdx: Clarify RIP adjustments in #VE handlerKirill A. Shutemov2022-06-151-55/+123
* x86/tdx: Fix early #VE handlingKirill A. Shutemov2022-06-151-1/+5
* Merge tag 'x86_tdx_for_v5.19_rc1' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2022-05-235-1/+923
|\
| * x86/tdx: Fix RETs in TDX asmPeter Zijlstra2022-05-201-2/+2
| * x86/tdx: Annotate a noreturn functionBorislav Petkov2022-04-211-0/+1
| * x86/mm: Make DMA memory shared for TD guestKirill A. Shutemov2022-04-071-0/+1
| * x86/mm/cpa: Add support for TDX shared memoryKirill A. Shutemov2022-04-072-0/+134
| * x86/topology: Disable CPU online/offline control for TDX guestsKuppuswamy Sathyanarayanan2022-04-071-0/+1
| * x86/tdx: Wire up KVM hypercallsKuppuswamy Sathyanarayanan2022-04-071-0/+17
| * x86/tdx: Port I/O: Add early boot supportAndi Kleen2022-04-071-0/+16
| * x86/tdx: Port I/O: Add runtime hypercallsKuppuswamy Sathyanarayanan2022-04-072-1/+85
| * x86/tdx: Handle in-kernel MMIOKirill A. Shutemov2022-04-071-0/+121
| * x86/tdx: Handle CPUID via #VEKirill A. Shutemov2022-04-071-1/+57
| * x86/tdx: Add MSR support for TDX guestsKirill A. Shutemov2022-04-071-0/+42
| * x86/tdx: Add HLT support for TDX guestsKirill A. Shutemov2022-04-072-2/+104
| * x86/traps: Add #VE support for TDX guestKirill A. Shutemov2022-04-071-0/+38
| * x86/tdx: Exclude shared bit from __PHYSICAL_MASKKirill A. Shutemov2022-04-071-0/+8
| * x86/tdx: Extend the confidential computing API to support TDX guestsKirill A. Shutemov2022-04-072-0/+59
| * x86/tdx: Add __tdx_module_call() and __tdx_hypercall() helper functionsKuppuswamy Sathyanarayanan2022-04-073-1/+216
| * x86/tdx: Detect running as a TDX guest in early bootKuppuswamy Sathyanarayanan2022-04-073-0/+27
* | x86/mm: Extend cc_attr to include AMD SEV-SNPBrijesh Singh2022-04-061-0/+3
|/
* x86/coco: Add API to handle encryption maskKirill A. Shutemov2022-02-231-0/+27
* x86/coco: Explicitly declare type of confidential computing platformKirill A. Shutemov2022-02-231-12/+17
* x86/cc: Move arch/x86/{kernel/cc_platform.c => coco/core.c}Kirill A. Shutemov2022-02-232-0/+91