index
:
linux
for-next
master
Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
arch
/
x86
/
coco
Age
Commit message (
Expand
)
Author
Lines
13 days
x86/sev: Allow IBPB-on-Entry feature for SNP guests
Kim Phillips
-0
/
+1
2026-02-21
Convert 'alloc_obj' family to use the new default GFP_KERNEL argument
Linus Torvalds
-3
/
+3
2026-02-21
treewide: Replace kmalloc with kmalloc_obj for non-scalar types
Kees Cook
-3
/
+3
2026-02-10
Merge tag 'x86_sev_for_v7.0_rc1' of git://git.kernel.org/pub/scm/linux/kernel...
Linus Torvalds
-387
/
+493
2026-01-20
x86/sev: Use kfree_sensitive() when freeing a SNP message descriptor
Borislav Petkov (AMD)
-2
/
+1
2026-01-19
x86/sev: Rename sev_es_ghcb_handle_msr() to __vc_handle_msr()
Borislav Petkov (AMD)
-5
/
+5
2026-01-05
x86/sev: Disable GCOV on noinstr object
Brendan Jackman
-0
/
+2
2025-12-31
x86/sev: Carve out the SVSM code into a separate compilation unit
Borislav Petkov (AMD)
-378
/
+392
2025-12-31
x86/sev: Add internal header guards
Borislav Petkov (AMD)
-0
/
+3
2025-12-31
x86/sev: Move the internal header
Borislav Petkov (AMD)
-3
/
+93
2025-11-11
x86/coco/sev: Convert has_cpuflag() to use cpu_feature_enabled()
Borislav Petkov (AMD)
-2
/
+1
2025-10-30
x86/sev: Include XSS value in GHCB CPUID request
John Allen
-0
/
+11
2025-09-05
Merge branch 'x86/apic' into x86/sev, to resolve conflict
Ingo Molnar
-5
/
+121
2025-09-04
x86/apic/savic: Do not use snp_abort()
Borislav Petkov (AMD)
-2
/
+2
2025-09-03
x86/boot: Create a confined code area for startup code
Ard Biesheuvel
-1
/
+1
2025-09-03
x86/sev: Move __sev_[get|put]_ghcb() into separate noinstr object
Ard Biesheuvel
-4
/
+78
2025-09-03
x86/sev: Provide PIC aliases for SEV related data objects
Ard Biesheuvel
-0
/
+34
2025-09-03
x86/sev: Use boot SVSM CA for all startup and init code
Ard Biesheuvel
-25
/
+22
2025-09-03
x86/sev: Pass SVSM calling area down to early page state change API
Ard Biesheuvel
-2
/
+5
2025-09-03
x86/sev: Avoid global variable to store virtual address of SVSM area
Ard Biesheuvel
-9
/
+0
2025-09-03
x86/sev: Move GHCB page based HV communication out of startup code
Ard Biesheuvel
-0
/
+172
2025-09-01
x86/sev: Prevent SECURE_AVIC_CONTROL MSR interception for Secure AVIC guests
Neeraj Upadhyay
-0
/
+9
2025-09-01
x86/apic: Add kexec support for Secure AVIC
Neeraj Upadhyay
-0
/
+23
2025-09-01
x86/sev: Enable NMI support for Secure AVIC
Kishon Vijay Abraham I
-1
/
+1
2025-09-01
x86/sev: Initialize VGIF for secondary vCPUs for Secure AVIC
Kishon Vijay Abraham I
-0
/
+3
2025-09-01
x86/apic: Support LAPIC timer for Secure AVIC
Neeraj Upadhyay
-0
/
+26
2025-09-01
x86/apic: Add support to send IPI for Secure AVIC
Neeraj Upadhyay
-5
/
+34
2025-08-31
x86/apic: Initialize Secure AVIC APIC backing page
Neeraj Upadhyay
-0
/
+22
2025-08-28
x86/apic: Add new driver for Secure AVIC
Neeraj Upadhyay
-0
/
+4
2025-08-28
x86/sev: Separate MSR and GHCB based snp_cpuid() via a callback
Ard Biesheuvel
-1
/
+48
2025-08-17
Merge tag 'x86_urgent_for_v6.17_rc2' of git://git.kernel.org/pub/scm/linux/ke...
Linus Torvalds
-15
/
+18
2025-08-15
x86/sev: Ensure SVSM reserved fields in a page validation entry are initializ...
Tom Lendacky
-0
/
+2
2025-08-12
x86/sev: Improve handling of writes to intercepted TSC MSRs
Nikunj A Dadhania
-15
/
+16
2025-08-06
x86/sev: Evict cache lines during SNP memory validation
Tom Lendacky
-0
/
+21
2025-07-29
Merge tag 'x86_sev_for_v6.17_rc1' of git://git.kernel.org/pub/scm/linux/kerne...
Linus Torvalds
-42
/
+56
2025-07-15
x86/sev: Work around broken noinstr on GCC
Ard Biesheuvel
-1
/
+2
2025-07-01
x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation
Nikunj A Dadhania
-3
/
+19
2025-06-27
x86/sev: Let sev_es_efi_map_ghcbs() map the CA pages too
Gerd Hoffmann
-2
/
+15
2025-06-27
x86/sev/vc: Fix EFI runtime instruction emulation
Gerd Hoffmann
-1
/
+8
2025-06-18
x86/sev: Drop unnecessary parameter in snp_issue_guest_request()
Alexey Kardashevskiy
-2
/
+3
2025-06-18
x86/sev: Document requirement for linear mapping of guest request buffers
Alexey Kardashevskiy
-0
/
+9
2025-06-18
x86/sev: Allocate request in TSC_INFO_REQ on stack
Alexey Kardashevskiy
-18
/
+12
2025-06-18
virt: sev-guest: Contain snp_guest_request_ioctl in sev-guest
Alexey Kardashevskiy
-23
/
+13
2025-06-03
Merge tag 'hyperv-next-signed-20250602' of git://git.kernel.org/pub/scm/linux...
Linus Torvalds
-11
/
+2
2025-05-29
Merge tag 'tsm-for-6.16' of git://git.kernel.org/pub/scm/linux/kernel/git/dev...
Linus Torvalds
-5
/
+45
2025-05-27
Merge tag 'x86_sev_for_v6.16_rc1' of git://git.kernel.org/pub/scm/linux/kerne...
Linus Torvalds
-1
/
+68
2025-05-23
arch/x86: Provide the CPU number in the wakeup AP callback
Roman Kisel
-11
/
+2
2025-05-21
Merge tag 'v6.15-rc7' into x86/core, to pick up fixes
Ingo Molnar
-90
/
+165
2025-05-15
x86/cpuid: Set <asm/cpuid/api.h> as the main CPUID header
Ahmed S. Darwish
-2
/
+2
2025-05-13
x86/sev: Make sure pages are not skipped during kdump
Ashish Kalra
-4
/
+7
[next]