summaryrefslogtreecommitdiffstats
path: root/arch/x86/include (follow)
Commit message (Expand)AuthorAgeFilesLines
...
| * | | | | | x86/traps: Use pt_regs directly in fixup_bad_iret()Lai Jiangshan2022-05-031-1/+1
| | |_|_|_|/ | |/| | | |
* | | | | | Merge tag 'x86_cpu_for_v5.19_rc1' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2022-05-246-39/+15
|\ \ \ \ \ \
| * | | | | | x86/pm: Fix false positive kmemleak report in msr_build_context()Matthieu Baerts2022-04-272-5/+9
| * | | | | | x86/cpu: Remove "noexec"Borislav Petkov2022-04-041-1/+0
| * | | | | | x86/cpu: Remove CONFIG_X86_SMAP and "nosmap"Borislav Petkov2022-04-042-31/+1
| * | | | | | x86/cpu: Allow feature bit names from /proc/cpuinfo in clearcpuid=Borislav Petkov2022-04-041-2/+5
| | |/ / / / | |/| | | |
* | | | | | Merge tag 'x86_tdx_for_v5.19_rc1' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2022-05-2412-35/+235
|\ \ \ \ \ \
| * | | | | | ACPICA: Avoid cache flush inside virtual machinesKirill A. Shutemov2022-04-071-1/+13
| * | | | | | x86/mm: Make DMA memory shared for TD guestKirill A. Shutemov2022-04-071-3/+3
| * | | | | | x86/acpi/x86/boot: Add multiprocessor wake-up supportKuppuswamy Sathyanarayanan2022-04-071-0/+5
| * | | | | | x86/boot: Add a trampoline for booting APs via firmware handoffSean Christopherson2022-04-072-0/+3
| * | | | | | x86/tdx: Wire up KVM hypercallsKuppuswamy Sathyanarayanan2022-04-072-0/+33
| * | | | | | x86/tdx: Port I/O: Add early boot supportAndi Kleen2022-04-071-0/+4
| * | | | | | x86/boot: Port I/O: Add decompression-time support for TDXKirill A. Shutemov2022-04-072-27/+32
| * | | | | | x86: Consolidate port I/O helpersKirill A. Shutemov2022-04-072-20/+36
| * | | | | | x86: Adjust types used in port I/O helpersKirill A. Shutemov2022-04-071-13/+13
| * | | | | | x86/tdx: Detect TDX at early kernel decompression timeKuppuswamy Sathyanarayanan2022-04-072-3/+9
| * | | | | | x86/tdx: Add HLT support for TDX guestsKirill A. Shutemov2022-04-071-0/+4
| * | | | | | x86/traps: Add #VE support for TDX guestKirill A. Shutemov2022-04-072-0/+25
| * | | | | | x86/tdx: Add __tdx_module_call() and __tdx_hypercall() helper functionsKuppuswamy Sathyanarayanan2022-04-071-0/+30
| * | | | | | x86/tdx: Provide common base for SEAMCALL and TDCALL C wrappersKirill A. Shutemov2022-04-071-0/+29
| * | | | | | x86/tdx: Detect running as a TDX guest in early bootKuppuswamy Sathyanarayanan2022-04-073-1/+29
| |/ / / / /
* | | | | | Merge tag 'x86_sev_for_v5.19_rc1' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2022-05-2413-37/+442
|\ \ \ \ \ \
| * | | | | | x86/sev: Mark the code returning to user space as syscall gapLai Jiangshan2022-05-192-0/+8
| * | | | | | x86/sev: Get the AP jump table address from secrets pageBrijesh Singh2022-04-271-0/+35
| * | | | | | virt: sevguest: Change driver name to reflect generic SEV supportTom Lendacky2022-04-211-1/+1
| * | | | | | x86/sev: Register SEV-SNP guest request platform deviceBrijesh Singh2022-04-071-0/+4
| * | | | | | x86/sev: Provide support for SNP guest request NAEsBrijesh Singh2022-04-073-0/+21
| * | | | | | x86/sev: Add SEV-SNP feature detection/setupMichael Roth2022-04-071-0/+2
| * | | | | | x86/compressed: Add SEV-SNP feature detection/setupMichael Roth2022-04-071-0/+3
| * | | | | | x86/boot: Add a pointer to Confidential Computing blob in bootparamsMichael Roth2022-04-072-1/+3
| * | | | | | x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlersMichael Roth2022-04-071-0/+2
| * | | | | | KVM: x86: Move lookup of indexed CPUID leafs to helperMichael Roth2022-04-071-0/+34
| * | | | | | x86/boot: Add Confidential Computing type to setup_dataBrijesh Singh2022-04-072-0/+19
| * | | | | | x86/head/64: Re-enable stack protectionMichael Roth2022-04-061-1/+0
| * | | | | | x86/sev: Use SEV-SNP AP creation to start secondary CPUsTom Lendacky2022-04-063-0/+10
| * | | | | | x86/mm: Validate memory when changing the C-bitBrijesh Singh2022-04-063-0/+28
| * | | | | | x86/sev: Add helper for validating pages in early enc attribute changesBrijesh Singh2022-04-061-0/+10
| * | | | | | x86/sev: Register GHCB memory when SEV-SNP is activeBrijesh Singh2022-04-061-0/+2
| * | | | | | x86/compressed: Register GHCB memory when SEV-SNP is activeBrijesh Singh2022-04-061-0/+13
| * | | | | | x86/compressed: Add helper for validating pages in the decompression stageBrijesh Singh2022-04-061-0/+26
| * | | | | | x86/sev: Check the VMPL levelBrijesh Singh2022-04-062-0/+17
| * | | | | | x86/sev: Add a helper for the PVALIDATE instructionBrijesh Singh2022-04-061-0/+21
| * | | | | | x86/sev: Check SEV-SNP features supportBrijesh Singh2022-04-063-1/+9
| * | | | | | x86/sev: Save the negotiated GHCB versionBrijesh Singh2022-04-061-1/+1
| * | | | | | x86/sev: Define the Linux-specific guest termination reasonsBrijesh Singh2022-04-061-0/+8
| * | | | | | x86/mm: Extend cc_attr to include AMD SEV-SNPBrijesh Singh2022-04-061-0/+2
| * | | | | | x86/boot: Introduce helpers for MSR reads/writesMichael Roth2022-04-062-10/+16
| * | | | | | KVM: SVM: Update the SEV-ES save area mappingTom Lendacky2022-04-061-16/+50
| * | | | | | KVM: SVM: Create a separate mapping for the GHCB save areaTom Lendacky2022-04-061-3/+45