Published Title Version Author Status
2025-11-25 18:05 UTC KVM: x86: Add x2APIC "features" to control EOI broadcast suppression 3 khushit.shah@nutanix.com finished in 3h58m0s
2025-11-25 14:19 UTC KVM: x86: Add x2APIC "features" to control EOI broadcast suppression 2 khushit.shah@nutanix.com skipped
2025-11-21 22:20 UTC KVM: VMX: Always reflect SGX EPCM #PFs back into the guest 1 seanjc@google.com finished in 3h49m0s
2025-11-21 00:51 UTC TDX: Enable Dynamic PAMT 4 rick.p.edgecombe@intel.com skipped
2025-11-12 17:39 UTC x86: Restrict KVM-induced symbol exports to KVM 1 seanjc@google.com finished in 3h55m0s
2025-11-07 09:32 UTC KVM: Add support for the ERAPS feature 6 amit@kernel.org finished in 3h37m0s
2025-10-30 20:09 UTC KVM: x86/mmu: TDX post-populate cleanups 4 seanjc@google.com finished in 3h53m0s
2025-10-28 00:28 UTC KVM: TDX: Take MMU lock around tdh_vp_init() 1 rick.p.edgecombe@intel.com skipped
2025-10-21 11:43 UTC KVM: x86/mmu: Move the misplaced export of kvm_zap_gfn_range() 1 kai.huang@intel.com finished in 4h9m0s
2025-10-17 20:11 UTC guest_memfd: In-place conversion support 1 ackerleytng@google.com skipped
2025-10-17 00:32 UTC KVM: x86/mmu: TDX post-populate cleanups 3 seanjc@google.com finished in 3h39m0s
2025-10-16 18:21 UTC KVM: VMX: Handle SEAMCALL or TDCALL VM-Exits 2 seanjc@google.com finished in 3h41m0s
2025-10-14 23:10 UTC KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL 1 seanjc@google.com finished in 3h38m0s
2025-10-13 06:25 UTC KVM: SVM: Add Page Modification Logging (PML) support 4 nikunj@amd.com finished in 3h39m0s
2025-10-10 22:03 UTC KVM: x86/tdx: Have TDX handle VMXON during bringup 1 seanjc@google.com finished in 3h38m0s
2025-10-06 11:35 UTC Add import export API for confidential guest live migration 1 tony.lindgren@linux.intel.com finished in 42m0s
2025-09-25 10:10 UTC KVM: SVM: Add Page Modification Logging (PML) support 3 nikunj@amd.com finished in 3h38m0s
2025-09-18 23:22 UTC TDX: Enable Dynamic PAMT 3 rick.p.edgecombe@intel.com finished in 3h36m0s
2025-09-18 05:32 UTC KVM: TDX: Fix uninitialized error code for __tdx_bringup() 2 tony.lindgren@linux.intel.com finished in 48m0s
2025-09-17 21:48 UTC KVM: selftests: Add test of SET_NESTED_STATE with 48-bit L2 on 57-bit L1 1 jmattson@google.com finished in 42m0s
2025-09-15 08:59 UTC KVM: SVM: Add Page Modification Logging (PML) support 2 nikunj@amd.com finished in 3h52m0s
2025-09-10 14:44 UTC x86/virt/tdx: Use precalculated TDVPR page physical address 1 dave.hansen@linux.intel.com finished in 58m0s
2025-09-04 06:20 UTC KVM: TDX: Force split irqchip for TDX at irqchip creation time 4 sagis@google.com finished in 4h7m0s
2025-09-01 16:09 UTC TDX host: kexec/kdump support 8 pbonzini@redhat.com finished in 3h38m0s
2025-08-29 00:06 UTC KVM: x86/mmu: TDX post-populate cleanups 2 seanjc@google.com finished in 3h37m0s
2025-08-25 22:58 UTC TDX host: kexec/kdump support 7 kai.huang@intel.com finished in 3h45m0s
2025-08-19 23:48 UTC KVM: SVM: Enable Secure TSC for SEV-SNP 11 seanjc@google.com finished in 1h10m0s
2025-08-19 16:24 UTC Fixes for recovery for machine check in TDX/SEAM non-root mode 1 adrian.hunter@intel.com finished in 23m0s
2025-08-19 15:58 UTC x86/tdx: Skip clearing reclaimed pages unless X86_BUG_TDX_PW_MCE is present 1 adrian.hunter@intel.com finished in 1h5m0s
2025-08-16 14:44 UTC KVM: TDX: MWAIT in guest 1 adrian.hunter@intel.com skipped
2025-08-13 23:59 UTC TDX host: kexec/kdump support 6 kai.huang@intel.com finished in 3h39m0s
2025-08-12 12:28 UTC Fixes for recovery for machine check in TDX/SEAM non-root mode 1 adrian.hunter@intel.com finished in 1h12m0s
2025-08-04 10:37 UTC Enable Secure TSC for SEV-SNP 10 nikunj@amd.com finished in 1h9m0s
2025-07-28 12:28 UTC TDX host: kexec/kdump support 5 kai.huang@intel.com finished in 3h33m0s