| Published | Title | Version | Author | Status |
|---|---|---|---|---|
| 2026-05-07 20:34 UTC | guest_memfd in-place conversion selftests for SNP | 1 | ackerleytng@google.com | finished in 1h25m0s |
| 2026-05-07 20:22 UTC | guest_memfd: In-place conversion support | 6 | devnull@kernel.org | finished in 4h40m0s |
| 2026-04-30 02:09 UTC | x86/cpu: Skip reading MSR_IA32_PLATFORM_ID in virtualized environment | 2 | binbin.wu@linux.intel.com | finished in 2h45m0s |
| 2026-04-30 01:49 UTC | struct page to PFN conversion for TDX guest private memory | 2 | yan.y.zhao@intel.com | skipped |
| 2026-04-28 23:24 UTC | guest_memfd: In-place conversion support | 5 | devnull@kernel.org | finished in 5h4m0s |
| 2026-04-28 11:05 UTC | KVM: VMX/SVM: use the same SPEC_CTRL assembly code | 3 | pbonzini@redhat.com | finished in 4h27m0s |
| 2026-04-28 02:45 UTC | Fix MSR_IA32_PLATFORM_ID access for TDX guests | 1 | binbin.wu@linux.intel.com | finished in 1h44m0s |
| 2026-04-27 15:27 UTC | Runtime TDX module update support | 8 | chao.gao@intel.com | finished in 1h32m0s |
| 2026-04-27 10:58 UTC | KVM: VMX/SVM: use the same SPEC_CTRL assembly code | 2 | pbonzini@redhat.com |
finished
in 1h21m0s
[1 findings] |
| 2026-04-17 07:35 UTC | KVM: x86: Add a paranoid mode for CPUID verification | 1 | binbin.wu@linux.intel.com | finished in 4h13m0s |
| 2026-04-10 23:26 UTC | KVM: TDX: Fix x2APIC MSR handling in tdx_has_emulated_msr() | 2 | rick.p.edgecombe@intel.com | finished in 1h26m0s |
| 2026-04-02 05:19 UTC | KVM TDP MMU FIXES- Replaced unsafe panic calls with proper error handling | 1 | spujari79@gmail.com | finished in 4h24m0s |
| 2026-03-31 12:41 UTC | Runtime TDX module update support | 7 | chao.gao@intel.com | finished in 55m0s |
| 2026-03-26 23:36 UTC | guest_memfd in-place conversion selftests for SNP | 1 | ackerleytng@google.com | skipped |
| 2026-03-26 22:24 UTC | guest_memfd: In-place conversion support | 4 | ackerleytng@google.com | finished in 3h56m0s |
| 2026-03-26 08:43 UTC | Runtime TDX module update support | 6 | chao.gao@intel.com | finished in 1h0m0s |
| 2026-03-19 00:57 UTC | struct page to PFN conversion for TDX guest private memory | 1 | yan.y.zhao@intel.com | finished in 1h10m0s |
| 2026-03-18 19:01 UTC | KVM: TDX: Fix APIC MSR ranges in tdx_has_emulated_msr() | 1 | dmaluka@chromium.org | finished in 1h30m0s |
| 2026-03-15 13:58 UTC | Runtime TDX module update support | 5 | chao.gao@intel.com | finished in 1h4m0s |
| 2026-03-13 06:12 UTC | guest_memfd: In-place conversion support | 3 | ackerleytng@google.com | finished in 3h59m0s |
| 2026-03-03 03:03 UTC | x86/tdx: Clean up the definitions of TDX TD ATTRIBUTES | 4 | xiaoyao.li@intel.com | finished in 1h1m0s |
| 2026-02-25 01:20 UTC | KVM: x86: Emulator MMIO fix and cleanups | 1 | seanjc@google.com | finished in 4h3m0s |
| 2026-02-12 14:35 UTC | Runtime TDX Module update support | 4 | chao.gao@intel.com | skipped |
| 2026-02-09 15:31 UTC | KVM: x86: synthesize CPUID bits only if CPU capability is set | 2 | clopez@suse.de | finished in 4h1m0s |
| 2026-02-06 09:17 UTC | KVM: s390: add explicit padding to struct kvm_s390_keyop | 1 | arnd@kernel.org | finished in 50m0s |
| 2026-02-02 22:29 UTC | guest_memfd: In-place conversion support | 2 | ackerleytng@google.com | finished in 4h5m0s |
| 2026-01-29 01:14 UTC | TDX: Dynamic PAMT + S-EPT Hugepage | 5 | seanjc@google.com | finished in 3h50m0s |
| 2026-01-28 01:43 UTC | KVM: x86: CET vs. nVMX fix and hardening | 2 | seanjc@google.com | finished in 4h7m0s |
| 2026-01-23 22:15 UTC | KVM: x86: CET vs. nVMX fix and hardening | 1 | seanjc@google.com | finished in 4h3m0s |
| 2026-01-13 08:47 UTC | KVM: VMX: Remove declaration of nested_mark_vmcs12_pages_dirty() | 1 | binbin.wu@linux.intel.com | finished in 1h15m0s |
| 2026-01-06 10:18 UTC | KVM: TDX huge page support for private memory | 3 | yan.y.zhao@intel.com | skipped |
| 2025-11-10 05:04 UTC | KVM: x86: Add a helper to dedup loading guest/host XCR0 and XSS | 2 | binbin.wu@linux.intel.com | skipped |
| 2025-11-06 10:11 UTC | KVM: x86: Add a help to dedup loading guest/host XCR0 and XSS | 1 | binbin.wu@linux.intel.com | skipped |
| 2025-10-30 20:09 UTC | KVM: x86/mmu: TDX post-populate cleanups | 4 | seanjc@google.com | finished in 3h53m0s |
| 2025-10-28 21:20 UTC | TDX KVM selftests | 12 | sagis@google.com | finished in 47m0s |
| 2025-10-28 06:01 UTC | KVM: x86: Call out MSR_IA32_S_CET is not handled by XSAVES | 1 | chao.gao@intel.com | finished in 3h41m0s |
| 2025-10-28 00:28 UTC | KVM: TDX: Take MMU lock around tdh_vp_init() | 1 | rick.p.edgecombe@intel.com | skipped |
| 2025-10-17 20:11 UTC | guest_memfd: In-place conversion support | 1 | ackerleytng@google.com | skipped |
| 2025-10-17 00:32 UTC | KVM: x86/mmu: TDX post-populate cleanups | 3 | seanjc@google.com | finished in 3h39m0s |
| 2025-10-16 18:21 UTC | KVM: VMX: Handle SEAMCALL or TDCALL VM-Exits | 2 | seanjc@google.com | finished in 3h41m0s |
| 2025-10-06 11:35 UTC | Add import export API for confidential guest live migration | 1 | tony.lindgren@linux.intel.com | finished in 42m0s |
| 2025-09-25 17:28 UTC | TDX KVM selftests | 11 | sagis@google.com | finished in 45m0s |
| 2025-09-19 22:32 UTC | KVM: x86: Super Mega CET | 16 | seanjc@google.com | skipped |
| 2025-09-18 05:32 UTC | KVM: TDX: Fix uninitialized error code for __tdx_bringup() | 2 | tony.lindgren@linux.intel.com | finished in 48m0s |
| 2025-09-09 10:16 UTC | KVM: TDX: Fix uninitialized error code for __tdx_bringup() | 1 | tony.lindgren@linux.intel.com | finished in 45m0s |
| 2025-09-04 06:54 UTC | TDX KVM selftests | 10 | sagis@google.com | finished in 1h0m0s |
| 2025-09-04 06:20 UTC | KVM: TDX: Force split irqchip for TDX at irqchip creation time | 4 | sagis@google.com | finished in 4h7m0s |
| 2025-09-01 16:09 UTC | TDX host: kexec/kdump support | 8 | pbonzini@redhat.com | finished in 3h38m0s |
| 2025-08-28 00:52 UTC | x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP | 2 | seanjc@google.com | finished in 38m0s |
| 2025-08-28 00:30 UTC | KVM: TDX: Force split irqchip for TDX at irqchip creation time | 3 | sagis@google.com | finished in 3h42m0s |
| 2025-08-27 01:17 UTC | KVM: TDX: Force split irqchip for TDX at irqchip creation time | 2 | sagis@google.com | finished in 3h36m0s |
| 2025-08-26 21:34 UTC | KVM: TDX: Force split irqchip for TDX at irqchip creation time | 1 | sagis@google.com | finished in 1h7m0s |
| 2025-08-25 22:58 UTC | TDX host: kexec/kdump support | 7 | kai.huang@intel.com | finished in 3h45m0s |
| 2025-08-21 04:28 UTC | TDX KVM selftests | 9 | sagis@google.com | finished in 34m0s |
| 2025-08-19 16:24 UTC | Fixes for recovery for machine check in TDX/SEAM non-root mode | 1 | adrian.hunter@intel.com | finished in 23m0s |
| 2025-08-19 15:58 UTC | x86/tdx: Skip clearing reclaimed pages unless X86_BUG_TDX_PW_MCE is present | 1 | adrian.hunter@intel.com | finished in 1h5m0s |
| 2025-08-16 14:44 UTC | KVM: TDX: MWAIT in guest | 1 | adrian.hunter@intel.com | skipped |
| 2025-08-13 23:59 UTC | TDX host: kexec/kdump support | 6 | kai.huang@intel.com | finished in 3h39m0s |
| 2025-08-12 12:28 UTC | Fixes for recovery for machine check in TDX/SEAM non-root mode | 1 | adrian.hunter@intel.com | finished in 1h12m0s |
| 2025-08-07 20:15 UTC | TDX KVM selftests | 8 | sagis@google.com | finished in 1h6m0s |
| 2025-08-07 09:41 UTC | KVM: TDX huge page support for private memory | 2 | yan.y.zhao@intel.com | skipped |
| 2025-07-28 12:28 UTC | TDX host: kexec/kdump support | 5 | kai.huang@intel.com | finished in 3h33m0s |