summaryrefslogtreecommitdiffstats
path: root/arch/x86/boot
AgeCommit message (Expand)AuthorLines
2025-10-11Merge tag 'x86_cleanups_for_v6.18_rc1' of git://git.kernel.org/pub/scm/linux/...Linus Torvalds-7/+7
2025-09-24x86/boot: Drop erroneous __init annotation from early_set_pages_state()Ard Biesheuvel-1/+1
2025-09-10x86/startup/sev: Document the CPUID flow in the boot #VC handlerTom Lendacky-0/+11
2025-09-08x86/asm: Remove code depending on __GCC_ASM_FLAG_OUTPUTS__Uros Bizjak-7/+7
2025-09-05Merge branch 'x86/apic' into x86/sev, to resolve conflictIngo Molnar-1/+9
2025-09-04x86/sev: Zap snp_abort()Borislav Petkov (AMD)-7/+2
2025-09-03x86/boot: Move startup code out of __head sectionArd Biesheuvel-45/+42
2025-09-03efistub/x86: Remap inittext read-execute when neededArd Biesheuvel-1/+3
2025-09-03x86/boot: Create a confined code area for startup codeArd Biesheuvel-2/+14
2025-09-03x86/boot: Check startup code for absence of absolute relocationsArd Biesheuvel-0/+8
2025-09-03x86/sev: Export startup routines for later useArd Biesheuvel-0/+14
2025-09-03x86/sev: Move __sev_[get|put]_ghcb() into separate noinstr objectArd Biesheuvel-74/+0
2025-09-03x86/sev: Provide PIC aliases for SEV related data objectsArd Biesheuvel-28/+3
2025-09-03x86/boot: Drop redundant RMPADJUST in SEV SVSM presence checkArd Biesheuvel-17/+3
2025-09-03x86/sev: Use boot SVSM CA for all startup and init codeArd Biesheuvel-18/+6
2025-09-03x86/sev: Pass SVSM calling area down to early page state change APIArd Biesheuvel-18/+45
2025-09-03x86/sev: Share implementation of MSR-based page state changeArd Biesheuvel-65/+39
2025-09-03x86/sev: Avoid global variable to store virtual address of SVSM areaArd Biesheuvel-13/+8
2025-09-03x86/sev: Move GHCB page based HV communication out of startup codeArd Biesheuvel-194/+12
2025-09-01x86/sev: Indicate the SEV-SNP guest supports Secure AVICNeeraj Upadhyay-1/+8
2025-08-31x86/sev: Run RMPADJUST on SVSM calling area page to test VMPLArd Biesheuvel-4/+5
2025-08-31x86/sev: Use MSR protocol only for early SVSM PVALIDATE callArd Biesheuvel-23/+6
2025-08-31x86/sev: Use MSR protocol for remapping SVSM calling areaArd Biesheuvel-3/+13
2025-08-28x86/apic: Add new driver for Secure AVICNeeraj Upadhyay-0/+1
2025-08-28x86/sev: Separate MSR and GHCB based snp_cpuid() via a callbackArd Biesheuvel-48/+11
2025-08-17Merge tag 'x86_urgent_for_v6.17_rc2' of git://git.kernel.org/pub/scm/linux/ke...Linus Torvalds-0/+1
2025-08-15x86/sev: Ensure SVSM reserved fields in a page validation entry are initializ...Tom Lendacky-0/+1
2025-08-06x86/sev: Evict cache lines during SNP memory validationTom Lendacky-0/+20
2025-06-21x86/efi: Implement support for embedding SBAT data for x86Vitaly Kuznetsov-10/+43
2025-05-31Merge tag 'mm-stable-2025-05-31-14-50' of git://git.kernel.org/pub/scm/linux/...Linus Torvalds-1/+49
2025-05-30Merge tag 'efi-next-for-v6.16' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds-5/+5
2025-05-21include: pe.h: Fix PE definitionsPali Rohár-5/+5
2025-05-17x86/mm/64: Make 5-level paging support unconditionalKirill A. Shutemov-17/+3
2025-05-15x86/cpuid: Set <asm/cpuid/api.h> as the main CPUID headerAhmed S. Darwish-2/+2
2025-05-14x86/boot: Defer initialization of VM space related global variablesArd Biesheuvel-3/+0
2025-05-13Merge branch 'x86/msr' into x86/core, to resolve conflictsIngo Molnar-2/+2
2025-05-13Merge branch 'x86/boot' into x86/core, to merge dependent commitsIngo Molnar-182/+2604
2025-05-13Merge branch 'x86/asm' into x86/core, to merge dependent commitsIngo Molnar-1/+1
2025-05-12x86/boot: make sure KASLR does not step over KHO preserved memoryAlexander Graf-1/+49
2025-05-06Merge tag 'v6.15-rc4' into x86/asm, to pick up fixesIngo Molnar-54/+22
2025-05-05x86/sev: Disentangle #VC handling code from startup codeArd Biesheuvel-1634/+106
2025-05-04x86/boot: Provide __pti_set_user_pgtbl() to startup codeArd Biesheuvel-0/+9
2025-05-04x86/sev: Move instruction decoder into separate source fileArd Biesheuvel-41/+62
2025-05-04x86/sev: Make sev_snp_enabled() a static functionArd Biesheuvel-3/+1
2025-05-04x86/boot: Disregard __supported_pte_mask in __startup_64()Ard Biesheuvel-2/+0
2025-05-04x86/boot: Move early_setup_gdt() back into head64.cArd Biesheuvel-14/+1
2025-05-04Merge branch 'x86/urgent' into x86/boot, to pick up fixesIngo Molnar-5/+44
2025-05-04x86/boot/sev: Support memory acceptance in the EFI stub under SVSMArd Biesheuvel-4/+43
2025-04-24x86/boot: Work around broken busybox 'truncate' toolArd Biesheuvel-1/+1
2025-04-24x86/sev: Share the sev_secrets_pa value againTom Lendacky-2/+2