| Published | Title | Version | Author | Status |
|---|---|---|---|---|
| 2026-01-09 19:14 UTC | x86/virt/tdx: Print TDX module version to dmesg | 2 | vishal.l.verma@intel.com | finished in 51m0s |
| 2026-01-08 00:31 UTC | x86/virt/tdx: Print TDX module version to dmesg | 1 | vishal.l.verma@intel.com | finished in 58m0s |
| 2026-01-06 10:18 UTC | KVM: TDX huge page support for private memory | 3 | yan.y.zhao@intel.com | skipped |
| 2026-01-05 07:43 UTC | Expose TDX Module version | 2 | chao.gao@intel.com | skipped |
| 2025-12-23 05:13 UTC | KVM: VMX: Introduce Intel Mode-Based Execute Control (MBEC) | 1 | jon@nutanix.com | finished in 3h48m0s |
| 2025-12-12 13:50 UTC | KVM: x86: Don't read guest CR3 when doing async pf while the MMU is direct | 2 | xiaoyao.li@intel.com | finished in 3h49m0s |
| 2025-12-11 17:20 UTC | riscv control-flow integrity for usermode | 26 | devnull@kernel.org | skipped |
| 2025-12-11 02:29 UTC | KVM: x86: Don't read guest CR3 in async pf flow when guest state is protected | 1 | xiaoyao.li@intel.com | finished in 3h58m0s |
| 2025-12-05 18:41 UTC | riscv control-flow integrity for usermode | 25 | devnull@kernel.org | finished in 4h7m0s |
| 2025-12-05 07:45 UTC | KVM: Avoid literal numbers as return values | 1 | jgross@suse.com | finished in 3h50m0s |
| 2025-12-04 20:03 UTC | riscv control-flow integrity for usermode | 24 | debug@rivosinc.com | finished in 3h51m0s |
| 2025-12-03 06:30 UTC | page_alloc: allow migration of smaller hugepages during contig_alloc | 4 | gourry@gourry.net |
finished
in 38m0s
[1 findings] |
| 2025-12-02 05:08 UTC | TDX: Stop metadata auto-generation, improve readability | 1 | yilun.xu@linux.intel.com | finished in 46m0s |
| 2025-11-26 10:02 UTC | x86/split_lock: Fix and enhancement for TDX guest | 1 | xiaoyao.li@intel.com | finished in 1h20m0s |
| 2025-11-21 00:51 UTC | TDX: Enable Dynamic PAMT | 4 | rick.p.edgecombe@intel.com | skipped |
| 2025-11-18 22:23 UTC | KVM: x86: Cleanup #MC and XCR0/XSS/PKRU handling | 2 | seanjc@google.com | finished in 3h47m0s |
| 2025-11-17 02:22 UTC | PCI/TSM: TDX Connect: SPDM Session and IDE Establishment | 1 | yilun.xu@linux.intel.com | skipped |
| 2025-11-13 00:42 UTC | riscv control-flow integrity for usermode | 23 | devnull@kernel.org | finished in 54m0s |
| 2025-11-12 17:16 UTC | KVM: TDX: Use struct_size and simplify tdx_get_capabilities | 1 | thorsten.blum@linux.dev | finished in 1h3m0s |
| 2025-11-05 15:44 UTC | KVM: TDX: Allow in place TDX.PAGE.ADD | 1 | ira.weiny@intel.com | finished in 1h9m0s |
| 2025-10-31 12:21 UTC | x86/coco/sev: Convert has_cpuflag() to use cpu_feature_enabled() | 1 | bp@alien8.de | skipped |
| 2025-10-30 20:09 UTC | KVM: x86/mmu: TDX post-populate cleanups | 4 | seanjc@google.com | finished in 3h53m0s |
| 2025-10-30 19:15 UTC | KVM: x86: User-return MSR fix+cleanups | 5 | seanjc@google.com | finished in 3h56m0s |
| 2025-10-29 19:48 UTC | x86/virt/tdx: Minor sparse fixups | 1 | dave.hansen@linux.intel.com | finished in 49m0s |
| 2025-10-28 21:20 UTC | TDX KVM selftests | 12 | sagis@google.com | finished in 47m0s |
| 2025-10-28 00:28 UTC | KVM: TDX: Take MMU lock around tdh_vp_init() | 1 | rick.p.edgecombe@intel.com | skipped |
| 2025-10-23 16:51 UTC | riscv control-flow integrity for usermode | 22 | devnull@kernel.org | finished in 3h43m0s |
| 2025-10-17 21:39 UTC | KVM: TDX: Use struct_size and simplify tdx_get_capabilities | 1 | thorsten.blum@linux.dev | finished in 46m0s |
| 2025-10-17 00:32 UTC | KVM: x86/mmu: TDX post-populate cleanups | 3 | seanjc@google.com | finished in 3h39m0s |
| 2025-10-16 22:28 UTC | KVM: x86: User-return MSR cleanups | 4 | seanjc@google.com | finished in 3h42m0s |
| 2025-10-16 18:21 UTC | KVM: VMX: Handle SEAMCALL or TDCALL VM-Exits | 2 | seanjc@google.com | finished in 3h41m0s |
| 2025-10-15 18:13 UTC | riscv control-flow integrity for usermode | 21 | debug@rivosinc.com | finished in 3h40m0s |
| 2025-10-14 23:10 UTC | KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL | 1 | seanjc@google.com | finished in 3h38m0s |
| 2025-10-14 19:43 UTC | Support for SEV-ES guest shadow stack | 4 | john.allen@amd.com | finished in 59m0s |
| 2025-10-13 21:55 UTC | riscv control-flow integrity for usermode | 20 | debug@rivosinc.com | finished in 3h58m0s |
| 2025-10-06 11:35 UTC | Add import export API for confidential guest live migration | 1 | tony.lindgren@linux.intel.com | finished in 42m0s |
| 2025-09-30 20:26 UTC | fs/resctrl: Fix MBM events being unconditionally enabled in mbm_event mode | 1 | babu.moger@amd.com | finished in 43m0s |
| 2025-09-25 17:28 UTC | TDX KVM selftests | 11 | sagis@google.com | finished in 45m0s |
| 2025-09-24 20:08 UTC | Support for SEV-ES guest shadow stack | 3 | john.allen@amd.com | finished in 39m0s |
| 2025-09-19 22:32 UTC | KVM: x86: Super Mega CET | 16 | seanjc@google.com | skipped |
| 2025-09-19 21:42 UTC | KVM: x86: Drop "cache" from user return MSR setter that skips WRMSR | 1 | seanjc@google.com | finished in 3h36m0s |
| 2025-09-18 23:22 UTC | TDX: Enable Dynamic PAMT | 3 | rick.p.edgecombe@intel.com | finished in 3h36m0s |
| 2025-09-18 05:32 UTC | KVM: TDX: Fix uninitialized error code for __tdx_bringup() | 2 | tony.lindgren@linux.intel.com | finished in 48m0s |
| 2025-09-16 21:31 UTC | KVM: TDX: Replace kmalloc + copy_from_user with memdup_user in tdx_td_init | 1 | thorsten.blum@linux.dev | finished in 52m0s |
| 2025-09-12 23:22 UTC | KVM: x86: Mega-CET | 15 | seanjc@google.com | skipped |
| 2025-09-10 14:44 UTC | x86/virt/tdx: Use precalculated TDVPR page physical address | 1 | dave.hansen@linux.intel.com | finished in 58m0s |
| 2025-09-09 18:28 UTC | x86/boot, KVM: Move VMXON/VMXOFF handling from KVM to CPU lifecycle | 1 | xin@zytor.com | finished in 3h49m0s |
| 2025-09-09 18:23 UTC | mfd: max77705: rework interrupts | 3 | dsankouski@gmail.com | finished in 49m0s |
| 2025-09-09 10:16 UTC | KVM: TDX: Fix uninitialized error code for __tdx_bringup() | 1 | tony.lindgren@linux.intel.com | finished in 45m0s |
| 2025-09-09 09:39 UTC | Enable CET Virtualization | 14 | chao.gao@intel.com | skipped |
| 2025-09-08 20:20 UTC | Support for SEV-ES guest shadow stack | 2 | john.allen@amd.com | finished in 50m0s |
| 2025-09-08 20:17 UTC | Enable Shadow Stack Virtualization for SVM | 4 | john.allen@amd.com | skipped |
| 2025-09-05 21:34 UTC | x86,fs/resctrl: Support AMD Assignable Bandwidth Monitoring Counters (ABMC) | 18 | babu.moger@amd.com | finished in 1h11m0s |
| 2025-09-04 06:54 UTC | TDX KVM selftests | 10 | sagis@google.com | finished in 1h0m0s |
| 2025-09-02 22:41 UTC | x86,fs/resctrl: Support L3 Smart Data Cache Injection Allocation Enforcement (SDCIAE) | 9 | babu.moger@amd.com | finished in 1h8m0s |
| 2025-09-01 16:09 UTC | TDX host: kexec/kdump support | 8 | pbonzini@redhat.com | finished in 3h38m0s |
| 2025-08-29 00:06 UTC | KVM: x86/mmu: TDX post-populate cleanups | 2 | seanjc@google.com | finished in 3h37m0s |
| 2025-08-27 00:05 UTC | KVM: x86/mmu: TDX post-populate cleanups | 1 | seanjc@google.com | finished in 3h42m0s |
| 2025-08-25 22:58 UTC | TDX host: kexec/kdump support | 7 | kai.huang@intel.com | finished in 3h45m0s |
| 2025-08-22 08:02 UTC | KVM: Do not reset dirty GFNs in a memslot not enabling dirty tracking | 3 | yan.y.zhao@intel.com | finished in 3h49m0s |
| 2025-08-22 07:03 UTC | KVM: Fix deadlock for invalid memslots | 2 | yan.y.zhao@intel.com | finished in 3h36m0s |
| 2025-08-21 13:30 UTC | Enable CET Virtualization | 13 | chao.gao@intel.com | skipped |
| 2025-08-21 04:28 UTC | TDX KVM selftests | 9 | sagis@google.com | finished in 34m0s |
| 2025-08-19 16:24 UTC | Fixes for recovery for machine check in TDX/SEAM non-root mode | 1 | adrian.hunter@intel.com | finished in 23m0s |
| 2025-08-19 15:58 UTC | x86/tdx: Skip clearing reclaimed pages unless X86_BUG_TDX_PW_MCE is present | 1 | adrian.hunter@intel.com | finished in 1h5m0s |
| 2025-08-16 14:44 UTC | KVM: TDX: MWAIT in guest | 1 | adrian.hunter@intel.com | skipped |
| 2025-08-15 08:54 UTC | pkeys-based page table hardening | 5 | kevin.brodsky@arm.com | finished in 3h53m0s |
| 2025-08-13 23:59 UTC | TDX host: kexec/kdump support | 6 | kai.huang@intel.com | finished in 3h39m0s |
| 2025-08-13 20:59 UTC | KVM: VMX: Make CR4.CET a guest owned bit | 3 | minipli@grsecurity.net | finished in 3h40m0s |
| 2025-08-12 12:28 UTC | Fixes for recovery for machine check in TDX/SEAM non-root mode | 1 | adrian.hunter@intel.com | finished in 1h12m0s |
| 2025-08-12 02:55 UTC | Enable CET Virtualization | 12 | chao.gao@intel.com | finished in 3h36m0s |
| 2025-08-07 20:15 UTC | TDX KVM selftests | 8 | sagis@google.com | finished in 1h6m0s |
| 2025-08-07 09:41 UTC | KVM: TDX huge page support for private memory | 2 | yan.y.zhao@intel.com | skipped |
| 2025-08-06 20:46 UTC | Support for SEV-ES guest shadow stack | 1 | john.allen@amd.com | finished in 1h13m0s |
| 2025-08-06 20:45 UTC | Enable Shadow Stack Virtualization for SVM | 3 | john.allen@amd.com | skipped |
| 2025-07-29 19:33 UTC | KVM: Drop vm_dead, pivot on vm_bugged for -EIO | 1 | seanjc@google.com | finished in 3h37m0s |
| 2025-07-28 12:28 UTC | TDX host: kexec/kdump support | 5 | kai.huang@intel.com | finished in 3h33m0s |