summaryrefslogtreecommitdiff
path: root/arch/x86/include/asm/sev.h
AgeCommit message (Expand)AuthorFilesLines
2025-10-11Merge tag 'x86_cleanups_for_v6.18_rc1' of git://git.kernel.org/pub/scm/linux/...Linus Torvalds1-2/+1
2025-09-17x86/sev: Add new dump_rmp parameter to snp_leak_pages() APIAshish Kalra1-1/+6
2025-09-16Merge branch 'x86/urgent' into x86/apic, to resolve conflictIngo Molnar1-19/+19
2025-09-15x86/sev: Guard sev_evict_cache() with CONFIG_AMD_MEM_ENCRYPTTom Lendacky1-19/+19
2025-09-08x86/asm: Remove code depending on __GCC_ASM_FLAG_OUTPUTS__Uros Bizjak1-2/+1
2025-09-05Merge branch 'x86/apic' into x86/sev, to resolve conflictIngo Molnar1-0/+8
2025-09-04x86/sev: Zap snp_abort()Borislav Petkov (AMD)1-2/+0
2025-09-03x86/boot: Create a confined code area for startup codeArd Biesheuvel1-0/+1
2025-09-03x86/sev: Pass SVSM calling area down to early page state change APIArd Biesheuvel1-0/+6
2025-09-03x86/sev: Avoid global variable to store virtual address of SVSM areaArd Biesheuvel1-2/+0
2025-09-03x86/sev: Move GHCB page based HV communication out of startup codeArd Biesheuvel1-2/+10
2025-09-01x86/apic: Add kexec support for Secure AVICNeeraj Upadhyay1-0/+2
2025-09-01x86/apic: Support LAPIC timer for Secure AVICNeeraj Upadhyay1-0/+2
2025-09-01x86/apic: Add support to send IPI for Secure AVICNeeraj Upadhyay1-0/+2
2025-08-31x86/apic: Initialize Secure AVIC APIC backing pageNeeraj Upadhyay1-0/+2
2025-08-28x86/sev: Separate MSR and GHCB based snp_cpuid() via a callbackArd Biesheuvel1-1/+2
2025-08-06x86/sev: Evict cache lines during SNP memory validationTom Lendacky1-0/+19
2025-07-30Merge tag 'x86_sev_for_v6.17_rc1' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds1-8/+6
2025-07-01x86/sev: Use TSC_FACTOR for Secure TSC frequency calculationNikunj A Dadhania1-1/+16
2025-06-27x86/sev: Let sev_es_efi_map_ghcbs() map the CA pages tooGerd Hoffmann1-2/+2
2025-06-18virt: sev-guest: Contain snp_guest_request_ioctl in sev-guestAlexey Kardashevskiy1-6/+4
2025-05-27Merge tag 'x86_sev_for_v6.16_rc1' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds1-0/+7
2025-05-05x86/sev: Disentangle #VC handling code from startup codeArd Biesheuvel1-0/+22
2025-04-12x86/sev: Prepare for splitting off early SEV codeArd Biesheuvel1-0/+37
2025-04-10x86/sev: Add SVSM vTPM probe/send_command functionsStefano Garzarella1-0/+7
2025-03-07virt: sev-guest: Move SNP Guest Request data pages handling under snp_cmd_mutexAlexey Kardashevskiy1-3/+3
2025-02-15x86/sev: Fix broken SNP support with KVM module built-inAshish Kalra1-0/+2
2025-01-08x86/tsc: Init the TSC for Secure TSC guestsNikunj A Dadhania1-0/+2
2025-01-07x86/sev: Add Secure TSC support for SNP guestsNikunj A Dadhania1-0/+21
2025-01-07x86/sev: Relocate SNP guest messaging routines to common codeNikunj A Dadhania1-7/+7
2025-01-07x86/sev: Carve out and export SNP guest messaging init routinesNikunj A Dadhania1-4/+9
2024-10-28x86/sev: Convert shared memory back to private on kexecAshish Kalra1-0/+4
2024-10-28x86/mm: Refactor __set_clr_pte_enc()Ashish Kalra1-0/+20
2024-10-16virt: sev-guest: Carve out SNP message context structureNikunj A Dadhania1-0/+21
2024-10-16virt: sev-guest: Consolidate SNP guest messaging parameters to a structNikunj A Dadhania1-2/+17
2024-10-16virt: sev-guest: Use AES GCM crypto libraryNikunj A Dadhania1-0/+3
2024-08-27virt: sev-guest: Ensure the SNP guest messages do not exceed a pageNikunj A Dadhania1-1/+1
2024-07-20Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds1-0/+51
2024-07-16Merge branch 'kvm-6.11-sev-attestation' into HEADPaolo Bonzini1-0/+48
2024-07-16x86/sev: Move sev_guest.h into common SEV headerMichael Roth1-0/+48
2024-06-17x86/sev: Extend the config-fs attestation support for an SVSMTom Lendacky1-1/+30
2024-06-17virt: sev-guest: Choose the VMPCK key based on executing VMPLTom Lendacky1-2/+9
2024-06-17x86/sev: Use the SVSM to create a vCPU when not in VMPL0Tom Lendacky1-0/+2
2024-06-17x86/sev: Perform PVALIDATE using the SVSM when not at VMPL0Tom Lendacky1-0/+26
2024-06-11x86/sev: Use kernel provided SVSM Calling AreasTom Lendacky1-0/+32
2024-06-11x86/sev: Check for the presence of an SVSM in the SNP secrets pageTom Lendacky1-1/+32
2024-06-03Merge branch 'kvm-6.11-sev-snp' into HEADPaolo Bonzini1-0/+3
2024-05-14Merge tag 'x86_sev_for_v6.10_rc1' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds1-1/+1
2024-05-12KVM: SEV: Add support to handle RMP nested page faultsBrijesh Singh1-0/+3
2024-04-29x86/sev: Add callback to apply RMP table fixups for kexecAshish Kalra1-0/+2