index
:
linux.git
for-next
master
Linus' kernel tree
Russell King
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
arch
/
x86
/
kernel
Age
Commit message (
Expand
)
Author
2024-07-02
x86/resctrl: Split the rdt_domain and rdt_hw_domain structures
Tony Luck
2024-07-02
x86/resctrl: Prepare for different scope for control/monitor operations
Tony Luck
2024-07-02
x86/resctrl: Prepare to split rdt_domain structure
Tony Luck
2024-07-02
x86/resctrl: Prepare for new domain scope
Tony Luck
2024-07-02
x86/efi: Drop support for fake EFI memory maps
Ard Biesheuvel
2024-07-01
x86/alternatives, kvm: Fix a couple of CALLs without a frame pointer
Borislav Petkov (AMD)
2024-06-29
x86/cpu/intel: Drop stray FAM6 check with new Intel CPU model defines
Andrew Cooper
2024-06-28
x86: stop playing stack games in profile_pc()
Linus Torvalds
2024-06-28
x86/bugs: Add 'spectre_bhi=vmexit' cmdline option
Josh Poimboeuf
2024-06-27
Merge back cpufreq material for v6.11.
Rafael J. Wysocki
2024-06-25
x86/vmware: Add TDX hypercall support
Alexey Makhalov
2024-06-25
x86/vmware: Correct macro names
Alexey Makhalov
2024-06-25
x86/vmware: Use VMware hypercall API
Alexey Makhalov
2024-06-25
x86/vmware: Introduce VMware hypercall API
Alexey Makhalov
2024-06-24
x86/of: Return consistent error type from x86_of_pci_irq_enable()
Ilpo Järvinen
2024-06-24
clocksource: hyper-v: Use lapic timer in a TDX VM without paravisor
Dexuan Cui
2024-06-20
x86/cpufeatures: Flip the /proc/cpuinfo appearance logic
Borislav Petkov (AMD)
2024-06-19
x86/alternatives: Make FineIBT mode Kconfig selectable
Kees Cook
2024-06-19
runtime constants: add x86 architecture support
Linus Torvalds
2024-06-19
x86/resctrl: Don't try to free nonexistent RMIDs
Dave Martin
2024-06-19
Merge drm/drm-next into drm-intel-next
Jani Nikula
2024-06-17
x86/sev: Allow non-VMPL0 execution when an SVSM is present
Tom Lendacky
2024-06-17
x86/sev: Extend the config-fs attestation support for an SVSM
Tom Lendacky
2024-06-17
virt: sev-guest: Choose the VMPCK key based on executing VMPL
Tom Lendacky
2024-06-17
x86/sev: Provide guest VMPL level to userspace
Tom Lendacky
2024-06-17
x86/sev: Provide SVSM discovery support
Tom Lendacky
2024-06-17
x86/sev: Use the SVSM to create a vCPU when not in VMPL0
Tom Lendacky
2024-06-17
x86/sev: Perform PVALIDATE using the SVSM when not at VMPL0
Tom Lendacky
2024-06-17
x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method
Kirill A. Shutemov
2024-06-17
x86/smp: Add smp_ops.stop_this_cpu() callback
Kirill A. Shutemov
2024-06-17
x86/acpi: Do not attempt to bring up secondary CPUs in the kexec case
Kirill A. Shutemov
2024-06-17
x86/acpi: Rename fields in the acpi_madt_multiproc_wakeup structure
Kirill A. Shutemov
2024-06-17
x86/mm: Make e820__end_ram_pfn() cover E820_TYPE_ACPI ranges
Kirill A. Shutemov
2024-06-17
x86/mm: Add callbacks to prepare encrypted memory for kexec
Kirill A. Shutemov
2024-06-17
x86/mm: Make x86_platform.guest.enc_status_change_*() return an error
Kirill A. Shutemov
2024-06-17
x86/kexec: Keep CR4.MCE set during kexec for TDX guest
Kirill A. Shutemov
2024-06-17
x86/relocate_kernel: Use named labels for less confusion
Borislav Petkov
2024-06-17
cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup
Kirill A. Shutemov
2024-06-17
x86/apic: Mark acpi_mp_wake_* variables as __ro_after_init
Kirill A. Shutemov
2024-06-17
x86/acpi: Extract ACPI MADT wakeup code into a separate file
Kirill A. Shutemov
2024-06-17
x86/kexec: Remove spurious unconditional JMP from from identity_mapped()
Nikolay Borisov
2024-06-13
x86/CPU/AMD: Always inline amd_clear_divider()
Mateusz Guzik
2024-06-12
x86/amd_nb: Enhance SMN access error checking
Yazen Ghannam
2024-06-12
uprobe: Add uretprobe syscall to speed up return probe
Jiri Olsa
2024-06-12
x86/shstk: Make return uprobe work with shadow stack
Jiri Olsa
2024-06-11
x86/cpufeatures: Add AMD FAST CPPC feature flag
Perry Yuan
2024-06-11
x86/alternative: Convert ALTERNATIVE_3()
Borislav Petkov (AMD)
2024-06-11
x86/alternatives: Add nested alternatives macros
Peter Zijlstra
2024-06-11
x86/sev: Use kernel provided SVSM Calling Areas
Tom Lendacky
2024-06-11
x86/sev: Check for the presence of an SVSM in the SNP secrets page
Tom Lendacky
[prev]
[next]