summaryrefslogtreecommitdiffstats
path: root/arch/x86/include/asm/sev.h (follow)
Commit message (Expand)AuthorAgeFilesLines
* virt: sev-guest: Ensure the SNP guest messages do not exceed a pageNikunj A Dadhania2024-08-271-1/+1
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2024-07-201-0/+51
|\
| * Merge branch 'kvm-6.11-sev-attestation' into HEADPaolo Bonzini2024-07-161-0/+48
| |\
| | * x86/sev: Move sev_guest.h into common SEV headerMichael Roth2024-07-161-0/+48
| * | Merge branch 'kvm-6.11-sev-snp' into HEADPaolo Bonzini2024-06-031-0/+3
| |\|
| | * KVM: SEV: Add support to handle RMP nested page faultsBrijesh Singh2024-05-121-0/+3
* | | x86/sev: Extend the config-fs attestation support for an SVSMTom Lendacky2024-06-171-1/+30
* | | virt: sev-guest: Choose the VMPCK key based on executing VMPLTom Lendacky2024-06-171-2/+9
* | | x86/sev: Use the SVSM to create a vCPU when not in VMPL0Tom Lendacky2024-06-171-0/+2
* | | x86/sev: Perform PVALIDATE using the SVSM when not at VMPL0Tom Lendacky2024-06-171-0/+26
* | | x86/sev: Use kernel provided SVSM Calling AreasTom Lendacky2024-06-111-0/+32
* | | x86/sev: Check for the presence of an SVSM in the SNP secrets pageTom Lendacky2024-06-111-1/+32
|/ /
* | Merge tag 'x86_sev_for_v6.10_rc1' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2024-05-141-1/+1
|\ \ | |/ |/|
| * x86/sev: Shorten struct name snp_secrets_page_layout to snp_secrets_pageTom Lendacky2024-04-251-1/+1
* | x86/sev: Add callback to apply RMP table fixups for kexecAshish Kalra2024-04-291-0/+2
|/
* x86/CPU/AMD: Track SNP host status with cc_platform_*()Borislav Petkov (AMD)2024-04-041-2/+2
* x86/sev: Skip ROM range scans and validation for SEV-SNP guestsKevin Loughlin2024-03-261-2/+2
* Merge branch 'linus' into x86/boot, to resolve conflictIngo Molnar2024-03-121-1/+4
|\
| * Merge tag 'x86-build-2024-03-11' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2024-03-121-1/+2
| |\
| | * x86: Do not include <asm/bootparam.h> in several filesThomas Zimmermann2024-01-301-1/+2
| * | x86/sev: Dump SEV_STATUSBorislav Petkov (AMD)2024-02-281-0/+2
* | | x86/sev: Move early startup code into .head.text sectionArd Biesheuvel2024-03-041-5/+5
|/ /
* | crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdumpAshish Kalra2024-01-291-0/+2
* | x86/sev: Introduce an SNP leaked pages listAshish Kalra2024-01-291-0/+2
* | x86/sev: Add helper functions for RMPUPDATE and PSMASH instructionBrijesh Singh2024-01-291-0/+23
* | x86/fault: Add helper for dumping RMP entriesBrijesh Singh2024-01-291-0/+2
* | x86/sev: Add RMP entry lookup helpersBrijesh Singh2024-01-291-0/+3
* | x86/sev: Add SEV-SNP host initialization supportBrijesh Singh2024-01-291-0/+6
|/
* x86/efistub: Avoid legacy decompressor when doing EFI bootArd Biesheuvel2023-08-071-0/+2
* x86/efistub: Perform SNP feature test while running in the firmwareArd Biesheuvel2023-08-071-0/+4
* Merge tag 'x86_sev_for_v6.5' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2023-06-271-4/+7
|\
| * x86/sev: Get rid of special sev_es_enable_keyBorislav Petkov (AMD)2023-05-081-4/+7
* | x86/sev: Add SNP-specific unaccepted memory supportTom Lendacky2023-06-061-0/+3
* | x86/sev: Use large PSC requests if applicableTom Lendacky2023-06-061-0/+4
* | x86/sev: Fix calculation of end address based on number of pagesTom Lendacky2023-06-061-8/+8
|/
* x86/sev: Change snp_guest_issue_request()'s fw_err argumentDionna Glaze2023-03-211-3/+7
* x86/sev: Mark snp_abort() noreturnBorislav Petkov2022-08-251-1/+1
* Revert "x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV"Borislav Petkov2022-07-271-6/+1
* x86/sev: Get the AP jump table address from secrets pageBrijesh Singh2022-04-271-0/+35
* virt: sevguest: Change driver name to reflect generic SEV supportTom Lendacky2022-04-211-1/+1
* x86/sev: Register SEV-SNP guest request platform deviceBrijesh Singh2022-04-071-0/+4
* x86/sev: Provide support for SNP guest request NAEsBrijesh Singh2022-04-071-0/+14
* x86/sev: Add SEV-SNP feature detection/setupMichael Roth2022-04-071-0/+2
* x86/compressed: Add SEV-SNP feature detection/setupMichael Roth2022-04-071-0/+3
* x86/boot: Add Confidential Computing type to setup_dataBrijesh Singh2022-04-071-0/+18
* x86/sev: Use SEV-SNP AP creation to start secondary CPUsTom Lendacky2022-04-061-0/+4
* x86/mm: Validate memory when changing the C-bitBrijesh Singh2022-04-061-0/+4
* x86/sev: Add helper for validating pages in early enc attribute changesBrijesh Singh2022-04-061-0/+10
* x86/sev: Register GHCB memory when SEV-SNP is activeBrijesh Singh2022-04-061-0/+2
* x86/sev: Check the VMPL levelBrijesh Singh2022-04-061-0/+16