summaryrefslogtreecommitdiffstats
path: root/arch/x86/include/asm/sev.h
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'x86_sev_for_v6.10_rc1' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2024-05-141-1/+1
|\
| * x86/sev: Shorten struct name snp_secrets_page_layout to snp_secrets_pageTom Lendacky2024-04-251-1/+1
* | x86/sev: Add callback to apply RMP table fixups for kexecAshish Kalra2024-04-291-0/+2
|/
* x86/CPU/AMD: Track SNP host status with cc_platform_*()Borislav Petkov (AMD)2024-04-041-2/+2
* x86/sev: Skip ROM range scans and validation for SEV-SNP guestsKevin Loughlin2024-03-261-2/+2
* Merge branch 'linus' into x86/boot, to resolve conflictIngo Molnar2024-03-121-1/+4
|\
| * Merge tag 'x86-build-2024-03-11' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2024-03-111-1/+2
| |\
| | * x86: Do not include <asm/bootparam.h> in several filesThomas Zimmermann2024-01-301-1/+2
| * | x86/sev: Dump SEV_STATUSBorislav Petkov (AMD)2024-02-281-0/+2
* | | x86/sev: Move early startup code into .head.text sectionArd Biesheuvel2024-03-041-5/+5
|/ /
* | crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdumpAshish Kalra2024-01-291-0/+2
* | x86/sev: Introduce an SNP leaked pages listAshish Kalra2024-01-291-0/+2
* | x86/sev: Add helper functions for RMPUPDATE and PSMASH instructionBrijesh Singh2024-01-291-0/+23
* | x86/fault: Add helper for dumping RMP entriesBrijesh Singh2024-01-291-0/+2
* | x86/sev: Add RMP entry lookup helpersBrijesh Singh2024-01-291-0/+3
* | x86/sev: Add SEV-SNP host initialization supportBrijesh Singh2024-01-291-0/+6
|/
* x86/efistub: Avoid legacy decompressor when doing EFI bootArd Biesheuvel2023-08-071-0/+2
* x86/efistub: Perform SNP feature test while running in the firmwareArd Biesheuvel2023-08-071-0/+4
* Merge tag 'x86_sev_for_v6.5' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2023-06-271-4/+7
|\
| * x86/sev: Get rid of special sev_es_enable_keyBorislav Petkov (AMD)2023-05-081-4/+7
* | x86/sev: Add SNP-specific unaccepted memory supportTom Lendacky2023-06-061-0/+3
* | x86/sev: Use large PSC requests if applicableTom Lendacky2023-06-061-0/+4
* | x86/sev: Fix calculation of end address based on number of pagesTom Lendacky2023-06-061-8/+8
|/
* x86/sev: Change snp_guest_issue_request()'s fw_err argumentDionna Glaze2023-03-211-3/+7
* x86/sev: Mark snp_abort() noreturnBorislav Petkov2022-08-251-1/+1
* Revert "x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV"Borislav Petkov2022-07-271-6/+1
* x86/sev: Get the AP jump table address from secrets pageBrijesh Singh2022-04-271-0/+35
* virt: sevguest: Change driver name to reflect generic SEV supportTom Lendacky2022-04-211-1/+1
* x86/sev: Register SEV-SNP guest request platform deviceBrijesh Singh2022-04-071-0/+4
* x86/sev: Provide support for SNP guest request NAEsBrijesh Singh2022-04-071-0/+14
* x86/sev: Add SEV-SNP feature detection/setupMichael Roth2022-04-071-0/+2
* x86/compressed: Add SEV-SNP feature detection/setupMichael Roth2022-04-071-0/+3
* x86/boot: Add Confidential Computing type to setup_dataBrijesh Singh2022-04-071-0/+18
* x86/sev: Use SEV-SNP AP creation to start secondary CPUsTom Lendacky2022-04-061-0/+4
* x86/mm: Validate memory when changing the C-bitBrijesh Singh2022-04-061-0/+4
* x86/sev: Add helper for validating pages in early enc attribute changesBrijesh Singh2022-04-061-0/+10
* x86/sev: Register GHCB memory when SEV-SNP is activeBrijesh Singh2022-04-061-0/+2
* x86/sev: Check the VMPL levelBrijesh Singh2022-04-061-0/+16
* x86/sev: Add a helper for the PVALIDATE instructionBrijesh Singh2022-04-061-0/+21
* x86/sev: Check SEV-SNP features supportBrijesh Singh2022-04-061-1/+1
* x86/sev: Save the negotiated GHCB versionBrijesh Singh2022-04-061-1/+1
* x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperVTianyu Lan2021-10-251-0/+6
* x86/sev: Move GHCB MSR protocol and NAE definitions in a common headerBrijesh Singh2021-05-101-26/+4
* x86/sev-es: Rename sev-es.{ch} to sev.{ch}Brijesh Singh2021-05-101-0/+114