| 2025-11-25 18:05 UTC |
KVM: x86: Add x2APIC "features" to control EOI broadcast suppression |
3 |
khushit.shah@nutanix.com |
finished
in 3h58m0s
|
| 2025-11-25 14:19 UTC |
KVM: x86: Add x2APIC "features" to control EOI broadcast suppression |
2 |
khushit.shah@nutanix.com |
skipped
|
| 2025-11-21 22:20 UTC |
KVM: VMX: Always reflect SGX EPCM #PFs back into the guest |
1 |
seanjc@google.com |
finished
in 3h49m0s
|
| 2025-11-21 00:51 UTC |
TDX: Enable Dynamic PAMT |
4 |
rick.p.edgecombe@intel.com |
skipped
|
| 2025-11-12 17:39 UTC |
x86: Restrict KVM-induced symbol exports to KVM |
1 |
seanjc@google.com |
finished
in 3h55m0s
|
| 2025-11-07 09:32 UTC |
KVM: Add support for the ERAPS feature |
6 |
amit@kernel.org |
finished
in 3h37m0s
|
| 2025-10-30 20:09 UTC |
KVM: x86/mmu: TDX post-populate cleanups |
4 |
seanjc@google.com |
finished
in 3h53m0s
|
| 2025-10-28 00:28 UTC |
KVM: TDX: Take MMU lock around tdh_vp_init() |
1 |
rick.p.edgecombe@intel.com |
skipped
|
| 2025-10-21 11:43 UTC |
KVM: x86/mmu: Move the misplaced export of kvm_zap_gfn_range() |
1 |
kai.huang@intel.com |
finished
in 4h9m0s
|
| 2025-10-17 20:11 UTC |
guest_memfd: In-place conversion support |
1 |
ackerleytng@google.com |
skipped
|
| 2025-10-17 00:32 UTC |
KVM: x86/mmu: TDX post-populate cleanups |
3 |
seanjc@google.com |
finished
in 3h39m0s
|
| 2025-10-16 18:21 UTC |
KVM: VMX: Handle SEAMCALL or TDCALL VM-Exits |
2 |
seanjc@google.com |
finished
in 3h41m0s
|
| 2025-10-14 23:10 UTC |
KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL |
1 |
seanjc@google.com |
finished
in 3h38m0s
|
| 2025-10-13 06:25 UTC |
KVM: SVM: Add Page Modification Logging (PML) support |
4 |
nikunj@amd.com |
finished
in 3h39m0s
|
| 2025-10-10 22:03 UTC |
KVM: x86/tdx: Have TDX handle VMXON during bringup |
1 |
seanjc@google.com |
finished
in 3h38m0s
|
| 2025-10-06 11:35 UTC |
Add import export API for confidential guest live migration |
1 |
tony.lindgren@linux.intel.com |
finished
in 42m0s
|
| 2025-09-25 10:10 UTC |
KVM: SVM: Add Page Modification Logging (PML) support |
3 |
nikunj@amd.com |
finished
in 3h38m0s
|
| 2025-09-18 23:22 UTC |
TDX: Enable Dynamic PAMT |
3 |
rick.p.edgecombe@intel.com |
finished
in 3h36m0s
|
| 2025-09-18 05:32 UTC |
KVM: TDX: Fix uninitialized error code for __tdx_bringup() |
2 |
tony.lindgren@linux.intel.com |
finished
in 48m0s
|
| 2025-09-17 21:48 UTC |
KVM: selftests: Add test of SET_NESTED_STATE with 48-bit L2 on 57-bit L1 |
1 |
jmattson@google.com |
finished
in 42m0s
|
| 2025-09-15 08:59 UTC |
KVM: SVM: Add Page Modification Logging (PML) support |
2 |
nikunj@amd.com |
finished
in 3h52m0s
|
| 2025-09-10 14:44 UTC |
x86/virt/tdx: Use precalculated TDVPR page physical address |
1 |
dave.hansen@linux.intel.com |
finished
in 58m0s
|
| 2025-09-04 06:20 UTC |
KVM: TDX: Force split irqchip for TDX at irqchip creation time |
4 |
sagis@google.com |
finished
in 4h7m0s
|
| 2025-09-01 16:09 UTC |
TDX host: kexec/kdump support |
8 |
pbonzini@redhat.com |
finished
in 3h38m0s
|
| 2025-08-29 00:06 UTC |
KVM: x86/mmu: TDX post-populate cleanups |
2 |
seanjc@google.com |
finished
in 3h37m0s
|
| 2025-08-25 22:58 UTC |
TDX host: kexec/kdump support |
7 |
kai.huang@intel.com |
finished
in 3h45m0s
|
| 2025-08-19 23:48 UTC |
KVM: SVM: Enable Secure TSC for SEV-SNP |
11 |
seanjc@google.com |
finished
in 1h10m0s
|
| 2025-08-19 16:24 UTC |
Fixes for recovery for machine check in TDX/SEAM non-root mode |
1 |
adrian.hunter@intel.com |
finished
in 23m0s
|
| 2025-08-19 15:58 UTC |
x86/tdx: Skip clearing reclaimed pages unless X86_BUG_TDX_PW_MCE is present |
1 |
adrian.hunter@intel.com |
finished
in 1h5m0s
|
| 2025-08-16 14:44 UTC |
KVM: TDX: MWAIT in guest |
1 |
adrian.hunter@intel.com |
skipped
|
| 2025-08-13 23:59 UTC |
TDX host: kexec/kdump support |
6 |
kai.huang@intel.com |
finished
in 3h39m0s
|
| 2025-08-12 12:28 UTC |
Fixes for recovery for machine check in TDX/SEAM non-root mode |
1 |
adrian.hunter@intel.com |
finished
in 1h12m0s
|
| 2025-08-04 10:37 UTC |
Enable Secure TSC for SEV-SNP |
10 |
nikunj@amd.com |
finished
in 1h9m0s
|
| 2025-07-28 12:28 UTC |
TDX host: kexec/kdump support |
5 |
kai.huang@intel.com |
finished
in 3h33m0s
|