xen-changelog - Mail Index


August 31, 18
15:11 [Xen-changelog] [xen staging] x86/hvm: Drop hvm_{vmx, svm} shorthands patchbot
15:11 [Xen-changelog] [xen staging] x86/svm: Rename arch_svm_struct to svm_vcpu patchbot
15:11 [Xen-changelog] [xen staging] x86/vmx: Rename arch_vmx_struct to vmx_vcpu patchbot
15:11 [Xen-changelog] [xen staging] x86/hvm: Rename v->arch.hvm_vcpu to v->arch.hvm patchbot
15:11 [Xen-changelog] [xen staging] xen/hvm: Rename d->arch.hvm_domain to d->arch.hvm patchbot
11:12 [Xen-changelog] [xen staging] xen/domain: Allocate d->vcpu[] in domain_create() patchbot
11:12 [Xen-changelog] [xen staging] xen/dom0: Arrange for dom0_cfg to contain the real max_vcpus value patchbot
11:11 [Xen-changelog] [xen staging] tools: Pass max_vcpus to XEN_DOMCTL_createdomain patchbot
11:11 [Xen-changelog] [xen staging] xen/domain: Call arch_domain_create() as early as possible in domain_create() patchbot
11:11 [Xen-changelog] [xen staging] xen/gnttab: Fold grant_table_{create, set_limits}() into grant_table_init() patchbot
11:11 [Xen-changelog] [xen staging] xen/domctl: Remove XEN_DOMCTL_set_gnttab_limits patchbot
11:11 [Xen-changelog] [xen staging] xen/gnttab: Pass max_{grant, maptrack}_frames into grant_table_create() patchbot
11:11 [Xen-changelog] [xen staging] tools: Pass grant table limits to XEN_DOMCTL_set_gnttab_limits patchbot
07:27 [Xen-changelog] [xen stable-4.7] x86: write to correct variable in parse_pv_l1tf() patchbot
07:27 [Xen-changelog] [xen stable-4.7] arm: constify atomic_read parameter patchbot
07:27 [Xen-changelog] [xen stable-4.7] xl.conf: Add global affinity masks patchbot
07:27 [Xen-changelog] [xen stable-4.7] x86: Make "spec-ctrl=no" a global disable of all mitigations patchbot
07:27 [Xen-changelog] [xen stable-4.7] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests patchbot
07:26 [Xen-changelog] [xen stable-4.7] x86/msr: Virtualise MSR_FLUSH_CMD for guests patchbot
07:26 [Xen-changelog] [xen stable-4.7] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH patchbot
07:26 [Xen-changelog] [xen stable-4.7] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE patchbot
07:26 [Xen-changelog] [xen stable-4.7] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART patchbot
07:26 [Xen-changelog] [xen stable-4.7] x86/shadow: Infrastructure to force a PV guest into shadow mode patchbot
07:25 [Xen-changelog] [xen stable-4.7] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests patchbot
07:25 [Xen-changelog] [xen stable-4.7] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations patchbot
07:25 [Xen-changelog] [xen stable-4.7] tools/oxenstored: Make evaluation order explicit patchbot
07:25 [Xen-changelog] [xen stable-4.7] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits patchbot
07:25 [Xen-changelog] [xen stable-4.7] ARM: disable grant table v2 patchbot
07:25 [Xen-changelog] [xen stable-4.7] common/gnttab: Introduce command line feature controls patchbot
07:24 [Xen-changelog] [xen stable-4.7] VMX: fix vmx_{find, del}_msr() build patchbot
07:24 [Xen-changelog] [xen stable-4.7] x86/vmx: Support load-only guest MSR list entries patchbot
07:24 [Xen-changelog] [xen stable-4.7] x86/vmx: Support remote access to the MSR lists patchbot
07:24 [Xen-changelog] [xen stable-4.7] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() patchbot
07:24 [Xen-changelog] [xen stable-4.7] x86/vmx: Internal cleanup for MSR load/save infrastructure patchbot
07:24 [Xen-changelog] [xen stable-4.7] x86/vmx: API improvements for MSR load/save infrastructure patchbot
07:23 [Xen-changelog] [xen stable-4.7] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() patchbot
07:23 [Xen-changelog] [xen stable-4.7] x86/spec-ctrl: Yet more fixes for xpti= parsing patchbot
07:23 [Xen-changelog] [xen stable-4.7] x86/spec-ctrl: Fix the parsing of xpti= on fixed Intel hardware patchbot
07:23 [Xen-changelog] [xen stable-4.7] x86: command line option to avoid use of secondary hyper-threads patchbot
07:23 [Xen-changelog] [xen stable-4.7] x86: possibly bring up all CPUs even if not all are supposed to be used patchbot
07:23 [Xen-changelog] [xen stable-4.7] x86: distinguish CPU offlining from CPU removal patchbot
07:22 [Xen-changelog] [xen stable-4.7] x86/AMD: distinguish compute units from hyper-threads patchbot
07:22 [Xen-changelog] [xen stable-4.7] cpupools: fix state when downing a CPU failed patchbot
07:22 [Xen-changelog] [xen stable-4.7] allow cpu_down() to be called earlier patchbot
07:22 [Xen-changelog] [xen stable-4.7] x86/spec-ctrl: command line handling adjustments patchbot
07:22 [Xen-changelog] [xen stable-4.7] xen: Port the array_index_nospec() infrastructure from Linux patchbot
07:22 [Xen-changelog] [xen stable-4.7] cmdline: fix parse_boolean() for NULL incoming end pointer patchbot
August 30, 18
15:11 [Xen-changelog] [qemu-xen master] config: split PVRDMA from RDMA patchbot
15:11 [Xen-changelog] [qemu-xen master] hw/pvrdma: remove not needed include patchbot
12:55 [Xen-changelog] [xen staging] x86/pv: Deprecate support for paging out the LDT patchbot
09:44 [Xen-changelog] [xen staging] x86/pv: Rename v->arch.pv_vcpu to v->arch.pv patchbot
09:44 [Xen-changelog] [xen staging] x86/pv: Rename d->arch.pv_domain to d->arch.pv patchbot
09:11 [Xen-changelog] [xen staging] x86/genapic: drop .target_cpus() hook patchbot
09:11 [Xen-changelog] [xen staging] x86/grant: mute gcc 4.1.x warning in steal_linear_address() patchbot
09:11 [Xen-changelog] [xen staging] x86/alternatives: allow using assembler macros in favor of C ones patchbot
09:11 [Xen-changelog] [xen staging] VMX: reduce number of posted-interrupt hooks patchbot
09:11 [Xen-changelog] [xen staging] x86/mm: re-arrange get_page_from_l<N>e() vs pv_l1tf_check_l<N>e() patchbot
07:44 [Xen-changelog] [xen staging] x86/pt: split out HVM functions from vtd.c patchbot
07:44 [Xen-changelog] [xen staging] x86/pt: make it build with !CONFIG_HVM patchbot
August 29, 18
17:55 [Xen-changelog] [xen staging] xen/arm: fix SMMU driver build patchbot
15:23 [Xen-changelog] [xen master] Revert "x86/hvm: remove default ioreq server" patchbot
15:23 [Xen-changelog] [xen master] VT-d/dmar: iommu mem leak fix patchbot
15:23 [Xen-changelog] [xen master] build: remove tboot make targets patchbot
15:23 [Xen-changelog] [xen master] x86/hvm: remove default ioreq server patchbot
15:23 [Xen-changelog] [xen master] x86/nestedhvm: provide some stubs for p2m code patchbot
15:23 [Xen-changelog] [xen master] x86/mm/shadow: split out HVM only code patchbot
15:22 [Xen-changelog] [xen master] x86/mm/shadow: make it build with !CONFIG_HVM patchbot
15:22 [Xen-changelog] [xen master] x86/vm_event: put vm_event_fill_regs under CONFIG_HVM patchbot
15:22 [Xen-changelog] [xen master] x86/mem_access: put HVM only function under CONFIG_HVM patchbot
15:22 [Xen-changelog] [xen master] x86: guard HAS_VPCI with CONFIG_HVM patchbot
15:22 [Xen-changelog] [xen master] xenforeignmemory: work around bug in older privcmd patchbot
15:22 [Xen-changelog] [xen master] tools: building IPXE should be determined by CONFIG_IPXE patchbot
14:44 [Xen-changelog] [xen staging] x86: reduce "visibility" of spec_ctrl_asm.h patchbot
14:44 [Xen-changelog] [xen staging] x86: move quoting of __ASM_{STAC, CLAC} patchbot
14:44 [Xen-changelog] [xen staging] x86/alternatives: fully leverage automatic NOP filling patchbot
14:44 [Xen-changelog] [xen staging] x86: drop NO_XPTI synthetic feature patchbot
14:44 [Xen-changelog] [xen staging] x86/spec-ctrl: split reporting for PV and HVM guests patchbot
14:44 [Xen-changelog] [xen staging] x86: report use of PCID together with reporting XPTI status patchbot
13:33 [Xen-changelog] [xen staging] x86/alt: Fix build when CONFIG_LIVEPATCH is disabled patchbot
August 28, 18
18:12 [Xen-changelog] [xen staging] x86/build: Use new .nops directive when available patchbot
18:12 [Xen-changelog] [xen staging] x86/shadow: Use mfn_t in shadow_track_dirty_vram() patchbot
18:11 [Xen-changelog] [xen staging] x86/shadow: Clean up the MMIO fastpath helpers patchbot
18:11 [Xen-changelog] [xen staging] x86/shadow: Use MASK_* helpers for the MMIO fastpath PTE manipulation patchbot
18:11 [Xen-changelog] [xen staging] x86/shadow: Switch shadow_domain.has_fast_mmio_entries to bool patchbot
18:11 [Xen-changelog] [xen staging] x86/shadow: Use more appropriate conversion functions patchbot
18:11 [Xen-changelog] [xen staging] x86/mm: Use mfn_eq()/mfn_add() rather than opencoded variations patchbot
15:33 [Xen-changelog] [xen staging] x86/domctl: XEN_DOMCTL_debug_op is HVM only patchbot
15:22 [Xen-changelog] [xen staging] x86/mmcfg/drhd: Move acpi_mmcfg_init() call before calling acpi_parse_dmar() patchbot
15:22 [Xen-changelog] [xen staging] VMX: make vmx_read_guest_msr() cope with callers not checking its return value patchbot
15:11 [Xen-changelog] [xen staging] xenforeignmemory: fix fd leakage in error path patchbot
14:22 [Xen-changelog] [xen staging] rombios: remove packed attribute for pushad_regs_t patchbot
14:11 [Xen-changelog] [xen staging] xen: is_hvm_{domain, vcpu} should evaluate to false when !CONFIG_HVM patchbot
13:33 [Xen-changelog] [xen staging] xen/xsm: Rename CONFIG_XSM_POLICY to CONFIG_XSM_FLASK_POLICY patchbot
13:33 [Xen-changelog] [xen staging] xen/xsm: Rename CONFIG_FLASK_* to CONFIG_XSM_FLASK_* patchbot
10:55 [Xen-changelog] [xen staging] x86/svm: Fixes to OS Visible Workaround handling patchbot
09:55 [Xen-changelog] [xen staging] xen/pt: io.c contains HVM only code patchbot
09:55 [Xen-changelog] [xen staging] x86/vpmu: put HVM only code under CONFIG_HVM patchbot
09:55 [Xen-changelog] [xen staging] x86: provide stub for memory_type_changed patchbot
09:55 [Xen-changelog] [xen staging] x86/hvm: provide hvm_hap_supported patchbot
09:55 [Xen-changelog] [xen staging] x86: enclose hvm_op and dm_op in CONFIG_HVM in relevant tables patchbot
09:22 [Xen-changelog] [qemu-xen staging] config: split PVRDMA from RDMA patchbot
09:22 [Xen-changelog] [qemu-xen staging] hw/pvrdma: remove not needed include patchbot
August 27, 18
13:55 [Xen-changelog] [xen staging] Revert "x86/hvm: remove default ioreq server" patchbot
09:44 [Xen-changelog] [xen staging] VT-d/dmar: iommu mem leak fix patchbot
09:44 [Xen-changelog] [xen staging] build: remove tboot make targets patchbot
09:44 [Xen-changelog] [xen staging] x86/hvm: remove default ioreq server patchbot
August 26, 18
10:33 [Xen-changelog] [xen staging] x86/nestedhvm: provide some stubs for p2m code patchbot
10:33 [Xen-changelog] [xen staging] x86/mm/shadow: split out HVM only code patchbot
10:33 [Xen-changelog] [xen staging] x86/mm/shadow: make it build with !CONFIG_HVM patchbot
10:33 [Xen-changelog] [xen staging] x86/vm_event: put vm_event_fill_regs under CONFIG_HVM patchbot
10:33 [Xen-changelog] [xen staging] x86/mem_access: put HVM only function under CONFIG_HVM patchbot
10:33 [Xen-changelog] [xen staging] x86: guard HAS_VPCI with CONFIG_HVM patchbot
10:00 [Xen-changelog] [xen staging] xenforeignmemory: work around bug in older privcmd patchbot
10:00 [Xen-changelog] [xen staging] tools: building IPXE should be determined by CONFIG_IPXE patchbot
06:50 [Xen-changelog] [xen master] QEMU_TAG update patchbot
06:50 [Xen-changelog] [xen master] xen/arm: p2m: Introduce a new variable removing_mapping in __p2m_set_entry patchbot
06:50 [Xen-changelog] [xen master] xen/arm: p2m: Rename ret to mfn in p2m_lookup patchbot
06:49 [Xen-changelog] [xen master] xen/arm: guest_walk: Use lpae_is_mapping to simplify the code patchbot
06:49 [Xen-changelog] [xen master] xen/arm: Rename lpae_valid to lpae_is_valid patchbot
06:49 [Xen-changelog] [xen master] xen/arm: Rework lpae_table patchbot
06:49 [Xen-changelog] [xen master] xen/arm: Rework lpae_mapping patchbot
06:49 [Xen-changelog] [xen master] xen/arm: p2m: Limit call to mem access code use in get_page_from_gva patchbot
06:49 [Xen-changelog] [xen master] xen/arm: p2m: Reduce the locking section in get_page_from_gva patchbot
06:48 [Xen-changelog] [xen master] xen/arm: cpregs: Fix typo in the documentation of TTBCR patchbot
06:48 [Xen-changelog] [xen master] xen/arm: cpregs: Allow HSR_CPREG* to receive more than 1 parameter patchbot
06:48 [Xen-changelog] [xen master] xen/arm: rename acpi_make_chosen_node to make_chosen_node patchbot
06:48 [Xen-changelog] [xen master] xen/arm: move evtchn_allocate call out of make_hypervisor_node patchbot
06:48 [Xen-changelog] [xen master] xen/arm: move a few DT related defines to public/device_tree_defs.h patchbot
06:47 [Xen-changelog] [xen master] xen/arm: do not pass dt_host to make_memory_node and make_hypervisor_node patchbot
06:47 [Xen-changelog] [xen master] xen/arm: drivers: scif: Remove unused #define-s patchbot
06:47 [Xen-changelog] [xen master] x86/oprofile: put SVM only code under CONFIG_HVM patchbot
06:47 [Xen-changelog] [xen master] x86/mtrr: move is_var_mtrr_overlapped patchbot
06:47 [Xen-changelog] [xen master] x86/amd: skip OSVW function calls if !CONFIG_HVM patchbot
06:47 [Xen-changelog] [xen master] x86/vmce: enclose HVM load / save code in CONFIG_HVM patchbot
06:46 [Xen-changelog] [xen master] x86/pt: add HVM check to XEN_DOMCTL_unbind_pt_irq patchbot
06:46 [Xen-changelog] [xen master] x86/mm: don't reference hvm_funcs directly patchbot
06:46 [Xen-changelog] [xen master] x86/vvmx: make get_shadow_eptp static function patchbot
06:46 [Xen-changelog] [xen master] x86: HVM_FEP should depend on HVM patchbot
06:46 [Xen-changelog] [xen master] xen: fix building !CONFIG_LOCK_PROFILE patchbot
06:46 [Xen-changelog] [xen master] libxl_qmp: Disable beautify for QMP generated cmd patchbot
06:45 [Xen-changelog] [xen master] libxl_qmp: Simplify qmp_response_type() prototype patchbot
06:45 [Xen-changelog] [xen master] libxl_json: libxl__json_object_to_json patchbot
06:45 [Xen-changelog] [xen master] libxl_json: Enable yajl_allow_trailing_garbage patchbot
06:45 [Xen-changelog] [xen master] libxl_dm: Add libxl__qemu_qmp_path() patchbot
06:45 [Xen-changelog] [xen master] libxl_json: constify libxl__json_object_to_yajl_gen arguments patchbot
06:45 [Xen-changelog] [xen master] libxl_qmp: Remove unused yajl_ctx from handler patchbot
06:44 [Xen-changelog] [xen master] libxl: Add libxl__prepare_sockaddr_un() helper patchbot
06:44 [Xen-changelog] [xen master] libxl_qmp: Move struct sockaddr_un variable to qmp_open() patchbot
06:44 [Xen-changelog] [xen master] tools: fix uninstall: tests/x86_emulator, Linux hotplug patchbot
06:44 [Xen-changelog] [xen master] libgnttab: Add support for Linux dma-buf patchbot
06:44 [Xen-changelog] [xen master] MAINTAINERS: add myself as a reviewer for x86 patches patchbot
06:44 [Xen-changelog] [xen master] automation: build with debian unstable patchbot
01:55 [Xen-changelog] [xen stable-4.10] tools: prepend to PKG_CONFIG_PATH when configuring qemu patchbot
August 24, 18
19:33 [Xen-changelog] [xen stable-4.11] libxl: start pvqemu when 9pfs is requested patchbot
15:22 [Xen-changelog] [xen staging-4.10] tools: prepend to PKG_CONFIG_PATH when configuring qemu patchbot
August 23, 18
14:11 [Xen-changelog] [xen staging] QEMU_TAG update patchbot
14:11 [Xen-changelog] [qemu-xen-traditional master] qemu-trad: stop using the default IOREQ server patchbot
August 22, 18
15:46 [Xen-changelog] [xen staging] xen/arm: p2m: Introduce a new variable removing_mapping in __p2m_set_entry patchbot
15:46 [Xen-changelog] [xen staging] xen/arm: p2m: Rename ret to mfn in p2m_lookup patchbot
15:46 [Xen-changelog] [xen staging] xen/arm: guest_walk: Use lpae_is_mapping to simplify the code patchbot
15:45 [Xen-changelog] [xen staging] xen/arm: Rename lpae_valid to lpae_is_valid patchbot
15:45 [Xen-changelog] [xen staging] xen/arm: Rework lpae_table patchbot
15:45 [Xen-changelog] [xen staging] xen/arm: Rework lpae_mapping patchbot
15:45 [Xen-changelog] [xen staging] xen/arm: p2m: Limit call to mem access code use in get_page_from_gva patchbot
15:45 [Xen-changelog] [xen staging] xen/arm: p2m: Reduce the locking section in get_page_from_gva patchbot
15:45 [Xen-changelog] [xen staging] xen/arm: cpregs: Fix typo in the documentation of TTBCR patchbot
15:44 [Xen-changelog] [xen staging] xen/arm: cpregs: Allow HSR_CPREG* to receive more than 1 parameter patchbot
15:44 [Xen-changelog] [xen staging] xen/arm: rename acpi_make_chosen_node to make_chosen_node patchbot
15:44 [Xen-changelog] [xen staging] xen/arm: move evtchn_allocate call out of make_hypervisor_node patchbot
15:44 [Xen-changelog] [xen staging] xen/arm: move a few DT related defines to public/device_tree_defs.h patchbot
15:44 [Xen-changelog] [xen staging] xen/arm: do not pass dt_host to make_memory_node and make_hypervisor_node patchbot
15:44 [Xen-changelog] [xen staging] xen/arm: drivers: scif: Remove unused #define-s patchbot
05:55 [Xen-changelog] [xen stable-4.10] libxl: start pvqemu when 9pfs is requested patchbot
August 21, 18
22:14 [Xen-changelog] [xen master] tools/tests: fix an xs-test.c issue patchbot
22:14 [Xen-changelog] [xen master] tools/kdd: work around gcc 8.1 bug patchbot
22:14 [Xen-changelog] [xen master] xenpmd: make 32 bit gcc 8.1 non-debug build work patchbot
22:13 [Xen-changelog] [xen master] tools: update ipxe changeset patchbot
22:13 [Xen-changelog] [xen master] libxl/arm: Fix build on arm64 + acpi w/ gcc 8.2 patchbot
22:13 [Xen-changelog] [xen master] x86/mmcfg: rename pt_pci_init() and call it from acpi_mmcfg_init() patchbot
22:13 [Xen-changelog] [xen master] libxc: copy back the result of XEN_DOMCTL_createdomain patchbot
22:13 [Xen-changelog] [xen master] rangeset: make inquiry functions tolerate NULL inputs patchbot
22:13 [Xen-changelog] [xen master] dom0/pvh: change the order of the MMCFG initialization patchbot
22:12 [Xen-changelog] [xen master] x86: remove page.h and processor.h inclusion from asm_defns.h patchbot
22:12 [Xen-changelog] [xen master] x86/HVM: correct an inverted check in hvm_load() patchbot
22:12 [Xen-changelog] [xen master] x86: make arch_set_info_guest() match comments in load_segments() patchbot
22:12 [Xen-changelog] [xen master] x86/setup: Avoid OoB E820 lookup when calculating the L1TF safe address patchbot
22:12 [Xen-changelog] [xen master] libxl: fix ARM build after 54ed251dc7 patchbot
22:12 [Xen-changelog] [xen master] x86/mmcfg: remove redundant code in pci_mmcfg_reject_broken() patchbot
22:11 [Xen-changelog] [xen master] gnttab/ARM: properly implement gnttab_create_status_page() patchbot
22:11 [Xen-changelog] [xen master] x86/hvm/emulate: make sure rep I/O emulation does not cross GFN boundaries patchbot
22:11 [Xen-changelog] [xen master] xen/evtchn: Pass max_evtchn_port into evtchn_init() patchbot
22:11 [Xen-changelog] [xen master] xen/domctl: Merge set_max_evtchn into createdomain patchbot
22:11 [Xen-changelog] [xen master] tools: Rework xc_domain_create() to take a full xen_domctl_createdomain patchbot
22:11 [Xen-changelog] [xen master] tools/ocaml: Pass a full domctl_create_config into stub_xc_domain_create() patchbot
14:45 [Xen-changelog] [xen staging] x86/oprofile: put SVM only code under CONFIG_HVM patchbot
14:45 [Xen-changelog] [xen staging] x86/mtrr: move is_var_mtrr_overlapped patchbot
14:45 [Xen-changelog] [xen staging] x86/amd: skip OSVW function calls if !CONFIG_HVM patchbot
14:44 [Xen-changelog] [xen staging] x86/vmce: enclose HVM load / save code in CONFIG_HVM patchbot
14:44 [Xen-changelog] [xen staging] x86/pt: add HVM check to XEN_DOMCTL_unbind_pt_irq patchbot
14:44 [Xen-changelog] [xen staging] x86/mm: don't reference hvm_funcs directly patchbot
14:44 [Xen-changelog] [xen staging] x86/vvmx: make get_shadow_eptp static function patchbot
14:44 [Xen-changelog] [xen staging] x86: HVM_FEP should depend on HVM patchbot
14:44 [Xen-changelog] [xen staging] xen: fix building !CONFIG_LOCK_PROFILE patchbot
13:12 [Xen-changelog] [xen staging] libxl_qmp: Disable beautify for QMP generated cmd patchbot
13:12 [Xen-changelog] [xen staging] libxl_qmp: Simplify qmp_response_type() prototype patchbot
13:12 [Xen-changelog] [xen staging] libxl_json: libxl__json_object_to_json patchbot
13:11 [Xen-changelog] [xen staging] libxl_json: Enable yajl_allow_trailing_garbage patchbot
13:11 [Xen-changelog] [xen staging] libxl_dm: Add libxl__qemu_qmp_path() patchbot
13:11 [Xen-changelog] [xen staging] libxl_json: constify libxl__json_object_to_yajl_gen arguments patchbot
13:11 [Xen-changelog] [xen staging] libxl_qmp: Remove unused yajl_ctx from handler patchbot
13:11 [Xen-changelog] [xen staging] libxl: Add libxl__prepare_sockaddr_un() helper patchbot
13:11 [Xen-changelog] [xen staging] libxl_qmp: Move struct sockaddr_un variable to qmp_open() patchbot
08:11 [Xen-changelog] [xen staging] tools: fix uninstall: tests/x86_emulator, Linux hotplug patchbot
08:00 [Xen-changelog] [xen staging] libgnttab: Add support for Linux dma-buf patchbot
08:00 [Xen-changelog] [xen staging] MAINTAINERS: add myself as a reviewer for x86 patches patchbot
August 20, 18
22:22 [Xen-changelog] [xen staging-4.9] libxl: start pvqemu when 9pfs is requested patchbot
22:22 [Xen-changelog] [xen staging-4.10] libxl: start pvqemu when 9pfs is requested patchbot
22:22 [Xen-changelog] [xen staging-4.11] libxl: start pvqemu when 9pfs is requested patchbot
13:11 [Xen-changelog] [xen staging] automation: build with debian unstable patchbot
11:22 [Xen-changelog] [xen staging] tools/tests: fix an xs-test.c issue patchbot
11:22 [Xen-changelog] [xen staging] tools/kdd: work around gcc 8.1 bug patchbot
11:22 [Xen-changelog] [xen staging] xenpmd: make 32 bit gcc 8.1 non-debug build work patchbot
11:22 [Xen-changelog] [xen staging] tools: update ipxe changeset patchbot
06:15 [Xen-changelog] [xen stable-4.10] x86: write to correct variable in parse_pv_l1tf() patchbot
06:15 [Xen-changelog] [xen stable-4.10] xl.conf: Add global affinity masks patchbot
06:14 [Xen-changelog] [xen stable-4.10] x86: Make "spec-ctrl=no" a global disable of all mitigations patchbot
06:14 [Xen-changelog] [xen stable-4.10] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests patchbot
06:14 [Xen-changelog] [xen stable-4.10] x86/msr: Virtualise MSR_FLUSH_CMD for guests patchbot
06:14 [Xen-changelog] [xen stable-4.10] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH patchbot
06:14 [Xen-changelog] [xen stable-4.10] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE patchbot
06:14 [Xen-changelog] [xen stable-4.10] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART patchbot
06:13 [Xen-changelog] [xen stable-4.10] x86/shadow: Infrastructure to force a PV guest into shadow mode patchbot
06:13 [Xen-changelog] [xen stable-4.10] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests patchbot
06:13 [Xen-changelog] [xen stable-4.10] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations patchbot
06:13 [Xen-changelog] [xen stable-4.10] tools/oxenstored: Make evaluation order explicit patchbot
06:13 [Xen-changelog] [xen stable-4.10] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits patchbot
06:13 [Xen-changelog] [xen stable-4.10] ARM: disable grant table v2 patchbot
06:12 [Xen-changelog] [xen stable-4.10] common/gnttab: Introduce command line feature controls patchbot
06:12 [Xen-changelog] [xen stable-4.10] VMX: fix vmx_{find, del}_msr() build patchbot
06:12 [Xen-changelog] [xen stable-4.10] x86/vmx: Support load-only guest MSR list entries patchbot
06:12 [Xen-changelog] [xen stable-4.10] x86/vmx: Pass an MSR value into vmx_msr_add() patchbot
06:12 [Xen-changelog] [xen stable-4.10] x86/vmx: Improvements to LBR MSR handling patchbot
06:12 [Xen-changelog] [xen stable-4.10] x86/vmx: Support remote access to the MSR lists patchbot
06:11 [Xen-changelog] [xen stable-4.10] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() patchbot
06:11 [Xen-changelog] [xen stable-4.10] x86/vmx: Internal cleanup for MSR load/save infrastructure patchbot
06:11 [Xen-changelog] [xen stable-4.10] x86/vmx: API improvements for MSR load/save infrastructure patchbot
06:11 [Xen-changelog] [xen stable-4.10] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() patchbot
06:11 [Xen-changelog] [xen stable-4.10] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit patchbot
06:11 [Xen-changelog] [xen stable-4.10] x86/spec-ctrl: Yet more fixes for xpti= parsing patchbot
02:48 [Xen-changelog] [xen stable-4.8] x86: write to correct variable in parse_pv_l1tf() patchbot
02:48 [Xen-changelog] [xen stable-4.8] xl.conf: Add global affinity masks patchbot
02:47 [Xen-changelog] [xen stable-4.8] x86: Make "spec-ctrl=no" a global disable of all mitigations patchbot
02:47 [Xen-changelog] [xen stable-4.8] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests patchbot
02:47 [Xen-changelog] [xen stable-4.8] x86/msr: Virtualise MSR_FLUSH_CMD for guests patchbot
02:47 [Xen-changelog] [xen stable-4.8] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH patchbot
02:47 [Xen-changelog] [xen stable-4.8] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE patchbot
02:47 [Xen-changelog] [xen stable-4.8] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART patchbot
02:46 [Xen-changelog] [xen stable-4.8] x86/shadow: Infrastructure to force a PV guest into shadow mode patchbot
02:46 [Xen-changelog] [xen stable-4.8] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests patchbot
02:46 [Xen-changelog] [xen stable-4.8] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations patchbot
02:46 [Xen-changelog] [xen stable-4.8] tools/oxenstored: Make evaluation order explicit patchbot
02:46 [Xen-changelog] [xen stable-4.8] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits patchbot
02:46 [Xen-changelog] [xen stable-4.8] ARM: disable grant table v2 patchbot
02:45 [Xen-changelog] [xen stable-4.8] common/gnttab: Introduce command line feature controls patchbot
02:45 [Xen-changelog] [xen stable-4.8] VMX: fix vmx_{find, del}_msr() build patchbot
02:45 [Xen-changelog] [xen stable-4.8] x86/vmx: Support load-only guest MSR list entries patchbot
02:45 [Xen-changelog] [xen stable-4.8] x86/vmx: Pass an MSR value into vmx_msr_add() patchbot
02:45 [Xen-changelog] [xen stable-4.8] x86/vmx: Improvements to LBR MSR handling patchbot
02:45 [Xen-changelog] [xen stable-4.8] x86/vmx: Support remote access to the MSR lists patchbot
02:44 [Xen-changelog] [xen stable-4.8] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() patchbot
02:44 [Xen-changelog] [xen stable-4.8] x86/vmx: Internal cleanup for MSR load/save infrastructure patchbot
02:44 [Xen-changelog] [xen stable-4.8] x86/vmx: API improvements for MSR load/save infrastructure patchbot
02:44 [Xen-changelog] [xen stable-4.8] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() patchbot
02:44 [Xen-changelog] [xen stable-4.8] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit patchbot
02:44 [Xen-changelog] [xen stable-4.8] x86/spec-ctrl: Yet more fixes for xpti= parsing patchbot
August 18, 18
23:55 [Xen-changelog] [xen master] x86/pv: Use xmemdup() for cpuidmasks, rather than opencoding it patchbot
23:54 [Xen-changelog] [xen master] x86/ptwr: Misc cleanup to ptwr_emulated_update() patchbot
23:54 [Xen-changelog] [xen master] x86: write to correct variable in parse_pv_l1tf() patchbot
23:54 [Xen-changelog] [xen master] x86/hvm/ioreq: MMIO range checking completely ignores direction flag patchbot
23:54 [Xen-changelog] [xen master] libs/foreignmemory: Avoid printing an error for ENOTSUPP patchbot
23:54 [Xen-changelog] [xen master] libxl: start pvqemu when 9pfs is requested patchbot
23:54 [Xen-changelog] [xen master] pygrub: fix package version patchbot
23:53 [Xen-changelog] [xen master] xen: fix stale PVH comment patchbot
23:53 [Xen-changelog] [xen master] xl.conf: Add global affinity masks patchbot
23:53 [Xen-changelog] [xen master] x86: Make "spec-ctrl=no" a global disable of all mitigations patchbot
23:53 [Xen-changelog] [xen master] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests patchbot
23:53 [Xen-changelog] [xen master] x86/msr: Virtualise MSR_FLUSH_CMD for guests patchbot
23:53 [Xen-changelog] [xen master] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH patchbot
23:52 [Xen-changelog] [xen master] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE patchbot
23:52 [Xen-changelog] [xen master] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART patchbot
23:52 [Xen-changelog] [xen master] x86/shadow: Infrastructure to force a PV guest into shadow mode patchbot
23:52 [Xen-changelog] [xen master] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests patchbot
23:52 [Xen-changelog] [xen master] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations patchbot
23:52 [Xen-changelog] [xen master] tools/oxenstored: Make evaluation order explicit patchbot
23:51 [Xen-changelog] [xen master] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits patchbot
23:51 [Xen-changelog] [xen master] ARM: disable grant table v2 patchbot
23:51 [Xen-changelog] [xen master] x86/spec-ctrl: Yet more fixes for xpti= parsing patchbot
23:51 [Xen-changelog] [xen master] tools/libxenctrl: use new xenforeignmemory API to seed grant table patchbot
23:51 [Xen-changelog] [xen master] common: add a new mappable resource type: XENMEM_resource_grant_table patchbot
23:51 [Xen-changelog] [xen master] common/gnttab: Explicitly default to gnttab v1 during domain creation patchbot
23:50 [Xen-changelog] [xen master] x86/vlapic: Bugfixes and improvements to vlapic_{read, write}() patchbot
23:50 [Xen-changelog] [xen master] x86: move arch_evtchn_inject to x86 common code patchbot
23:50 [Xen-changelog] [xen master] x86: add missing "inline" keyword patchbot
23:50 [Xen-changelog] [xen master] x86: put compat.o and x86_64/compat.o under CONFIG_PV patchbot
23:50 [Xen-changelog] [xen master] drop {,acpi_}reserve_bootmem() patchbot
23:50 [Xen-changelog] [xen master] x86/hvm: Drop hvm_sr_handlers initializer patchbot
23:49 [Xen-changelog] [xen master] automation: ensure created are not owned as root patchbot
23:49 [Xen-changelog] [xen master] automation: remove dead code from containerize patchbot
23:49 [Xen-changelog] [xen master] automation: drop container name from containerize patchbot
23:49 [Xen-changelog] [xen master] automation: standardize containerize env names patchbot
23:49 [Xen-changelog] [xen master] xen: specify support for EXPERT and DEBUG Kconfig options patchbot
23:49 [Xen-changelog] [xen master] xen: add cloc target patchbot
23:48 [Xen-changelog] [xen master] xen: add per-platform defaults for NR_CPUS patchbot
23:48 [Xen-changelog] [xen master] arm: add ALL_PLAT, QEMU, Rcar3 and MPSoC configs patchbot
23:48 [Xen-changelog] [xen master] arm: add a tiny kconfig configuration patchbot
23:48 [Xen-changelog] [xen master] arm: make it possible to disable the SMMU driver patchbot
23:48 [Xen-changelog] [xen master] make it possible to enable/disable UART drivers patchbot
23:47 [Xen-changelog] [xen master] Make MEM_ACCESS configurable patchbot
23:47 [Xen-changelog] [xen master] arm: rename HAS_GICV3 to GICV3 patchbot
23:47 [Xen-changelog] [xen master] arm: make it possible to disable HAS_GICV3 patchbot
23:47 [Xen-changelog] [xen master] x86/altp2m: make sure EPTP_INDEX is up-to-date when enabling #VE patchbot
23:47 [Xen-changelog] [xen master] x86/cpuidle: replace a pointless NULL check patchbot
23:47 [Xen-changelog] [xen master] vtd: cleanup vtd_set_hwdom_mapping after ia64 removal patchbot
23:46 [Xen-changelog] [xen master] xen: Remove domain_crash_synchronous() completely patchbot
23:46 [Xen-changelog] [xen master] x86/vmx: Avoid using domain_crash_syncrhonous() in vmx_vmentry_failure() patchbot
23:46 [Xen-changelog] [xen master] x86/vmx: Avoid hitting BUG_ON() after EPTP-related domain_crash() patchbot
23:46 [Xen-changelog] [xen master] tools/gdbsx: use inttypes.h instead of custom macros patchbot
23:46 [Xen-changelog] [xen master] tools/gdbsx: fix 'g' packet response for 64bit guests patchbot
23:46 [Xen-changelog] [xen master] xenstore-client: Add option for raw in-/output patchbot
23:45 [Xen-changelog] [xen master] docs: add xenstore-read and xenstore-write man pages patchbot
23:45 [Xen-changelog] [xen master] xenconsole: add option to avoid escape sequences in log patchbot
23:45 [Xen-changelog] [xen master] xen: clean up altp2m op comment patchbot
23:45 [Xen-changelog] [xen master] hvm/altp2m: Clarify the proper way to extend the altp2m interface patchbot
23:45 [Xen-changelog] [xen master] x86/xstate: correct logging in handle_xsetbv() patchbot
23:45 [Xen-changelog] [xen master] memory: fix label syntax patchbot
23:44 [Xen-changelog] [xen master] iommu: remove unneeded return from iommu_hwdom_init patchbot
23:44 [Xen-changelog] [xen master] x86/efi: split compiler vs linker support patchbot
23:44 [Xen-changelog] [xen master] x86/efi: move the logic to detect PE build support patchbot
23:44 [Xen-changelog] [xen master] xen/compiler: introduce a define for weak symbols patchbot
23:44 [Xen-changelog] [xen master] ci: enable builds with CentOS 7.x patchbot
23:44 [Xen-changelog] [xen master] automation: add CentOS 7.x image patchbot
16:11 [Xen-changelog] [xen stable-4.11] x86: write to correct variable in parse_pv_l1tf() patchbot
03:37 [Xen-changelog] [xen stable-4.6] amend "x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH" patchbot
03:37 [Xen-changelog] [xen stable-4.6] amend "x86/Intel: Mitigations for GPZ SP4 - Speculative Store Bypass" patchbot
03:36 [Xen-changelog] [xen stable-4.6] x86: write to correct variable in parse_pv_l1tf() patchbot
03:36 [Xen-changelog] [xen stable-4.6] arm: constify atomic_read parameter patchbot
03:36 [Xen-changelog] [xen stable-4.6] xl.conf: Add global affinity masks patchbot
03:36 [Xen-changelog] [xen stable-4.6] x86: Make "spec-ctrl=no" a global disable of all mitigations patchbot
03:36 [Xen-changelog] [xen stable-4.6] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests patchbot
03:36 [Xen-changelog] [xen stable-4.6] x86/msr: Virtualise MSR_FLUSH_CMD for guests patchbot
03:35 [Xen-changelog] [xen stable-4.6] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH patchbot
03:35 [Xen-changelog] [xen stable-4.6] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE patchbot
03:35 [Xen-changelog] [xen stable-4.6] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART patchbot
03:35 [Xen-changelog] [xen stable-4.6] x86/shadow: Infrastructure to force a PV guest into shadow mode patchbot
03:35 [Xen-changelog] [xen stable-4.6] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests patchbot
03:35 [Xen-changelog] [xen stable-4.6] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations patchbot
03:34 [Xen-changelog] [xen stable-4.6] tools/oxenstored: Make evaluation order explicit patchbot
03:34 [Xen-changelog] [xen stable-4.6] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits patchbot
03:34 [Xen-changelog] [xen stable-4.6] ARM: disable grant table v2 patchbot
03:34 [Xen-changelog] [xen stable-4.6] common/gnttab: Introduce command line feature controls patchbot
03:34 [Xen-changelog] [xen stable-4.6] VMX: fix vmx_{find, del}_msr() build patchbot
03:34 [Xen-changelog] [xen stable-4.6] x86/vmx: Support load-only guest MSR list entries patchbot
03:33 [Xen-changelog] [xen stable-4.6] x86/vmx: Support remote access to the MSR lists patchbot
03:33 [Xen-changelog] [xen stable-4.6] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() patchbot
03:33 [Xen-changelog] [xen stable-4.6] x86/vmx: Internal cleanup for MSR load/save infrastructure patchbot
03:33 [Xen-changelog] [xen stable-4.6] x86/vmx: API improvements for MSR load/save infrastructure patchbot
03:33 [Xen-changelog] [xen stable-4.6] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() patchbot
03:33 [Xen-changelog] [xen stable-4.6] x86/spec-ctrl: Yet more fixes for xpti= parsing patchbot
August 17, 18
15:44 [Xen-changelog] [xen staging] libxl/arm: Fix build on arm64 + acpi w/ gcc 8.2 patchbot
13:11 [Xen-changelog] [xen staging] x86/mmcfg: rename pt_pci_init() and call it from acpi_mmcfg_init() patchbot
12:00 [Xen-changelog] [xen staging] libxc: copy back the result of XEN_DOMCTL_createdomain patchbot
12:00 [Xen-changelog] [xen staging] rangeset: make inquiry functions tolerate NULL inputs patchbot
12:00 [Xen-changelog] [xen staging] dom0/pvh: change the order of the MMCFG initialization patchbot
12:00 [Xen-changelog] [xen staging] x86: remove page.h and processor.h inclusion from asm_defns.h patchbot
12:00 [Xen-changelog] [xen staging] x86/HVM: correct an inverted check in hvm_load() patchbot
12:00 [Xen-changelog] [xen staging] x86: make arch_set_info_guest() match comments in load_segments() patchbot
10:44 [Xen-changelog] [qemu-xen master] main loop: Big hammer to fix logfile disk DoS in Xen setups patchbot
10:34 [Xen-changelog] [qemu-xen master] Merge tag 'v3.0.0' into 'staging' patchbot
August 16, 18
17:11 [Xen-changelog] [xen staging] x86/setup: Avoid OoB E820 lookup when calculating the L1TF safe address patchbot
11:44 [Xen-changelog] [xen staging] libxl: fix ARM build after 54ed251dc7 patchbot
10:48 [Xen-changelog] [xen stable-4.11] xl.conf: Add global affinity masks patchbot
10:47 [Xen-changelog] [xen stable-4.11] x86: Make "spec-ctrl=no" a global disable of all mitigations patchbot
10:47 [Xen-changelog] [xen stable-4.11] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests patchbot
10:47 [Xen-changelog] [xen stable-4.11] x86/msr: Virtualise MSR_FLUSH_CMD for guests patchbot
10:47 [Xen-changelog] [xen stable-4.11] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH patchbot
10:47 [Xen-changelog] [xen stable-4.11] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE patchbot
10:46 [Xen-changelog] [xen stable-4.11] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART patchbot
10:46 [Xen-changelog] [xen stable-4.11] x86/shadow: Infrastructure to force a PV guest into shadow mode patchbot
10:46 [Xen-changelog] [xen stable-4.11] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests patchbot
10:46 [Xen-changelog] [xen stable-4.11] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations patchbot
10:46 [Xen-changelog] [xen stable-4.11] tools/oxenstored: Make evaluation order explicit patchbot
10:46 [Xen-changelog] [xen stable-4.11] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits patchbot
10:45 [Xen-changelog] [xen stable-4.11] ARM: disable grant table v2 patchbot
10:45 [Xen-changelog] [xen stable-4.11] VMX: fix vmx_{find, del}_msr() build patchbot
10:45 [Xen-changelog] [xen stable-4.11] x86/vmx: Support load-only guest MSR list entries patchbot
10:45 [Xen-changelog] [xen stable-4.11] x86/vmx: Pass an MSR value into vmx_msr_add() patchbot
10:45 [Xen-changelog] [xen stable-4.11] x86/vmx: Improvements to LBR MSR handling patchbot
10:45 [Xen-changelog] [xen stable-4.11] x86/vmx: Support remote access to the MSR lists patchbot
10:44 [Xen-changelog] [xen stable-4.11] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() patchbot
10:44 [Xen-changelog] [xen stable-4.11] x86/vmx: Internal cleanup for MSR load/save infrastructure patchbot
10:44 [Xen-changelog] [xen stable-4.11] x86/vmx: API improvements for MSR load/save infrastructure patchbot
10:44 [Xen-changelog] [xen stable-4.11] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() patchbot
10:44 [Xen-changelog] [xen stable-4.11] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit patchbot
10:44 [Xen-changelog] [xen stable-4.11] x86/spec-ctrl: Yet more fixes for xpti= parsing patchbot
07:44 [Xen-changelog] [xen staging] x86/mmcfg: remove redundant code in pci_mmcfg_reject_broken() patchbot
07:44 [Xen-changelog] [xen staging] gnttab/ARM: properly implement gnttab_create_status_page() patchbot
07:44 [Xen-changelog] [xen staging] x86/hvm/emulate: make sure rep I/O emulation does not cross GFN boundaries patchbot
August 15, 18
18:55 [Xen-changelog] [xen staging] xen/evtchn: Pass max_evtchn_port into evtchn_init() patchbot
18:55 [Xen-changelog] [xen staging] xen/domctl: Merge set_max_evtchn into createdomain patchbot
18:55 [Xen-changelog] [xen staging] tools: Rework xc_domain_create() to take a full xen_domctl_createdomain patchbot
18:55 [Xen-changelog] [xen staging] tools/ocaml: Pass a full domctl_create_config into stub_xc_domain_create() patchbot
15:44 [Xen-changelog] [xen staging] x86/pv: Use xmemdup() for cpuidmasks, rather than opencoding it patchbot
15:44 [Xen-changelog] [xen staging] x86/ptwr: Misc cleanup to ptwr_emulated_update() patchbot
12:34 [Xen-changelog] [xen staging-4.6] amend "x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH" patchbot
12:34 [Xen-changelog] [xen staging-4.6] amend "x86/Intel: Mitigations for GPZ SP4 - Speculative Store Bypass" patchbot
12:33 [Xen-changelog] [xen staging-4.6] x86: write to correct variable in parse_pv_l1tf() patchbot
12:33 [Xen-changelog] [xen staging-4.7] x86: write to correct variable in parse_pv_l1tf() patchbot
12:33 [Xen-changelog] [xen staging-4.8] x86: write to correct variable in parse_pv_l1tf() patchbot
12:33 [Xen-changelog] [xen staging-4.9] x86: write to correct variable in parse_pv_l1tf() patchbot
12:33 [Xen-changelog] [xen staging-4.10] x86: write to correct variable in parse_pv_l1tf() patchbot
12:22 [Xen-changelog] [xen staging-4.11] x86: write to correct variable in parse_pv_l1tf() patchbot
12:22 [Xen-changelog] [xen staging] x86: write to correct variable in parse_pv_l1tf() patchbot
12:22 [Xen-changelog] [xen staging] x86/hvm/ioreq: MMIO range checking completely ignores direction flag patchbot
11:44 [Xen-changelog] [qemu-xen staging] main loop: Big hammer to fix logfile disk DoS in Xen setups patchbot
11:34 [Xen-changelog] [qemu-xen staging] Merge tag 'v3.0.0' into 'staging' patchbot
09:33 [Xen-changelog] [xen staging-4.6] arm: constify atomic_read parameter patchbot
09:33 [Xen-changelog] [xen staging-4.7] arm: constify atomic_read parameter patchbot
09:33 [Xen-changelog] [xen staging] libs/foreignmemory: Avoid printing an error for ENOTSUPP patchbot
09:33 [Xen-changelog] [xen staging] libxl: start pvqemu when 9pfs is requested patchbot
09:33 [Xen-changelog] [xen staging] pygrub: fix package version patchbot
09:33 [Xen-changelog] [xen staging] xen: fix stale PVH comment patchbot
August 14, 18
17:37 [Xen-changelog] [xen staging-4.6] xl.conf: Add global affinity masks patchbot
17:37 [Xen-changelog] [xen staging-4.6] x86: Make "spec-ctrl=no" a global disable of all mitigations patchbot
17:37 [Xen-changelog] [xen staging-4.6] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests patchbot
17:37 [Xen-changelog] [xen staging-4.6] x86/msr: Virtualise MSR_FLUSH_CMD for guests patchbot
17:36 [Xen-changelog] [xen staging-4.6] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH patchbot
17:36 [Xen-changelog] [xen staging-4.6] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE patchbot
17:36 [Xen-changelog] [xen staging-4.6] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART patchbot
17:36 [Xen-changelog] [xen staging-4.6] x86/shadow: Infrastructure to force a PV guest into shadow mode patchbot
17:36 [Xen-changelog] [xen staging-4.6] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests patchbot
17:36 [Xen-changelog] [xen staging-4.6] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations patchbot
17:35 [Xen-changelog] [xen staging-4.6] tools/oxenstored: Make evaluation order explicit patchbot
17:35 [Xen-changelog] [xen staging-4.6] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits patchbot
17:35 [Xen-changelog] [xen staging-4.6] ARM: disable grant table v2 patchbot
17:35 [Xen-changelog] [xen staging-4.6] common/gnttab: Introduce command line feature controls patchbot
17:35 [Xen-changelog] [xen staging-4.6] VMX: fix vmx_{find, del}_msr() build patchbot
17:35 [Xen-changelog] [xen staging-4.6] x86/vmx: Support load-only guest MSR list entries patchbot
17:34 [Xen-changelog] [xen staging-4.6] x86/vmx: Support remote access to the MSR lists patchbot
17:34 [Xen-changelog] [xen staging-4.6] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() patchbot
17:34 [Xen-changelog] [xen staging-4.6] x86/vmx: Internal cleanup for MSR load/save infrastructure patchbot
17:34 [Xen-changelog] [xen staging-4.6] x86/vmx: API improvements for MSR load/save infrastructure patchbot
17:34 [Xen-changelog] [xen staging-4.6] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() patchbot
17:33 [Xen-changelog] [xen staging-4.6] x86/spec-ctrl: Yet more fixes for xpti= parsing patchbot
17:33 [Xen-changelog] [xen staging-4.7] xl.conf: Add global affinity masks patchbot
17:33 [Xen-changelog] [xen staging-4.7] x86: Make "spec-ctrl=no" a global disable of all mitigations patchbot
17:33 [Xen-changelog] [xen staging-4.7] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests patchbot
17:33 [Xen-changelog] [xen staging-4.7] x86/msr: Virtualise MSR_FLUSH_CMD for guests patchbot
17:33 [Xen-changelog] [xen staging-4.7] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH patchbot
17:32 [Xen-changelog] [xen staging-4.7] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE patchbot
17:32 [Xen-changelog] [xen staging-4.7] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART patchbot
17:32 [Xen-changelog] [xen staging-4.7] x86/shadow: Infrastructure to force a PV guest into shadow mode patchbot
17:32 [Xen-changelog] [xen staging-4.7] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests patchbot
17:32 [Xen-changelog] [xen staging-4.7] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations patchbot
17:32 [Xen-changelog] [xen staging-4.7] tools/oxenstored: Make evaluation order explicit patchbot
17:31 [Xen-changelog] [xen staging-4.7] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits patchbot
17:31 [Xen-changelog] [xen staging-4.7] ARM: disable grant table v2 patchbot
17:31 [Xen-changelog] [xen staging-4.7] common/gnttab: Introduce command line feature controls patchbot
17:31 [Xen-changelog] [xen staging-4.7] VMX: fix vmx_{find, del}_msr() build patchbot
17:31 [Xen-changelog] [xen staging-4.7] x86/vmx: Support load-only guest MSR list entries patchbot
17:31 [Xen-changelog] [xen staging-4.7] x86/vmx: Support remote access to the MSR lists patchbot
17:30 [Xen-changelog] [xen staging-4.7] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() patchbot
17:30 [Xen-changelog] [xen staging-4.7] x86/vmx: Internal cleanup for MSR load/save infrastructure patchbot
17:30 [Xen-changelog] [xen staging-4.7] x86/vmx: API improvements for MSR load/save infrastructure patchbot
17:30 [Xen-changelog] [xen staging-4.7] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() patchbot
17:30 [Xen-changelog] [xen staging-4.7] x86/spec-ctrl: Yet more fixes for xpti= parsing patchbot
17:30 [Xen-changelog] [xen staging-4.8] xl.conf: Add global affinity masks patchbot
17:29 [Xen-changelog] [xen staging-4.8] x86: Make "spec-ctrl=no" a global disable of all mitigations patchbot
17:29 [Xen-changelog] [xen staging-4.8] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests patchbot
17:29 [Xen-changelog] [xen staging-4.8] x86/msr: Virtualise MSR_FLUSH_CMD for guests patchbot
17:29 [Xen-changelog] [xen staging-4.8] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH patchbot
17:29 [Xen-changelog] [xen staging-4.8] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE patchbot
17:29 [Xen-changelog] [xen staging-4.8] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART patchbot
17:28 [Xen-changelog] [xen staging-4.8] x86/shadow: Infrastructure to force a PV guest into shadow mode patchbot
17:28 [Xen-changelog] [xen staging-4.8] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests patchbot
17:28 [Xen-changelog] [xen staging-4.8] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations patchbot
17:28 [Xen-changelog] [xen staging-4.8] tools/oxenstored: Make evaluation order explicit patchbot
17:28 [Xen-changelog] [xen staging-4.8] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits patchbot
17:28 [Xen-changelog] [xen staging-4.8] ARM: disable grant table v2 patchbot
17:27 [Xen-changelog] [xen staging-4.8] common/gnttab: Introduce command line feature controls patchbot
17:27 [Xen-changelog] [xen staging-4.8] VMX: fix vmx_{find, del}_msr() build patchbot
17:27 [Xen-changelog] [xen staging-4.8] x86/vmx: Support load-only guest MSR list entries patchbot
17:27 [Xen-changelog] [xen staging-4.8] x86/vmx: Pass an MSR value into vmx_msr_add() patchbot
17:27 [Xen-changelog] [xen staging-4.8] x86/vmx: Improvements to LBR MSR handling patchbot
17:27 [Xen-changelog] [xen staging-4.8] x86/vmx: Support remote access to the MSR lists patchbot
17:26 [Xen-changelog] [xen staging-4.8] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() patchbot
17:26 [Xen-changelog] [xen staging-4.8] x86/vmx: Internal cleanup for MSR load/save infrastructure patchbot
17:26 [Xen-changelog] [xen staging-4.8] x86/vmx: API improvements for MSR load/save infrastructure patchbot
17:26 [Xen-changelog] [xen staging-4.8] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() patchbot
17:26 [Xen-changelog] [xen staging-4.8] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit patchbot
17:25 [Xen-changelog] [xen staging-4.8] x86/spec-ctrl: Yet more fixes for xpti= parsing patchbot
17:25 [Xen-changelog] [xen staging-4.9] xl.conf: Add global affinity masks patchbot
17:25 [Xen-changelog] [xen staging-4.9] x86: Make "spec-ctrl=no" a global disable of all mitigations patchbot
17:25 [Xen-changelog] [xen staging-4.9] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests patchbot
17:25 [Xen-changelog] [xen staging-4.9] x86/msr: Virtualise MSR_FLUSH_CMD for guests patchbot
17:25 [Xen-changelog] [xen staging-4.9] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH patchbot
17:24 [Xen-changelog] [xen staging-4.9] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE patchbot
17:24 [Xen-changelog] [xen staging-4.9] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART patchbot
17:24 [Xen-changelog] [xen staging-4.9] x86/shadow: Infrastructure to force a PV guest into shadow mode patchbot
17:24 [Xen-changelog] [xen staging-4.9] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests patchbot
17:24 [Xen-changelog] [xen staging-4.9] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations patchbot
17:24 [Xen-changelog] [xen staging-4.9] tools/oxenstored: Make evaluation order explicit patchbot
17:23 [Xen-changelog] [xen staging-4.9] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits patchbot
17:23 [Xen-changelog] [xen staging-4.9] ARM: disable grant table v2 patchbot
17:23 [Xen-changelog] [xen staging-4.9] common/gnttab: Introduce command line feature controls patchbot
17:23 [Xen-changelog] [xen staging-4.9] VMX: fix vmx_{find, del}_msr() build patchbot
17:23 [Xen-changelog] [xen staging-4.9] x86/vmx: Support load-only guest MSR list entries patchbot
17:23 [Xen-changelog] [xen staging-4.9] x86/vmx: Pass an MSR value into vmx_msr_add() patchbot
17:22 [Xen-changelog] [xen staging-4.9] x86/vmx: Improvements to LBR MSR handling patchbot
17:22 [Xen-changelog] [xen staging-4.9] x86/vmx: Support remote access to the MSR lists patchbot
17:22 [Xen-changelog] [xen staging-4.9] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() patchbot
17:22 [Xen-changelog] [xen staging-4.9] x86/vmx: Internal cleanup for MSR load/save infrastructure patchbot
17:22 [Xen-changelog] [xen staging-4.9] x86/vmx: API improvements for MSR load/save infrastructure patchbot
17:22 [Xen-changelog] [xen staging-4.9] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() patchbot
17:21 [Xen-changelog] [xen staging-4.9] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit patchbot
17:21 [Xen-changelog] [xen staging-4.9] x86/spec-ctrl: Yet more fixes for xpti= parsing patchbot
17:21 [Xen-changelog] [xen staging-4.10] xl.conf: Add global affinity masks patchbot
17:21 [Xen-changelog] [xen staging-4.10] x86: Make "spec-ctrl=no" a global disable of all mitigations patchbot
17:21 [Xen-changelog] [xen staging-4.10] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests patchbot
17:21 [Xen-changelog] [xen staging-4.10] x86/msr: Virtualise MSR_FLUSH_CMD for guests patchbot
17:20 [Xen-changelog] [xen staging-4.10] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH patchbot
17:20 [Xen-changelog] [xen staging-4.10] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE patchbot
17:20 [Xen-changelog] [xen staging-4.10] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART patchbot
17:20 [Xen-changelog] [xen staging-4.10] x86/shadow: Infrastructure to force a PV guest into shadow mode patchbot
17:20 [Xen-changelog] [xen staging-4.10] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests patchbot
17:19 [Xen-changelog] [xen staging-4.10] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations patchbot
17:19 [Xen-changelog] [xen staging-4.10] tools/oxenstored: Make evaluation order explicit patchbot
17:19 [Xen-changelog] [xen staging-4.10] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits patchbot
17:19 [Xen-changelog] [xen staging-4.10] ARM: disable grant table v2 patchbot
17:19 [Xen-changelog] [xen staging-4.10] common/gnttab: Introduce command line feature controls patchbot
17:19 [Xen-changelog] [xen staging-4.10] VMX: fix vmx_{find, del}_msr() build patchbot
17:18 [Xen-changelog] [xen staging-4.10] x86/vmx: Support load-only guest MSR list entries patchbot
17:18 [Xen-changelog] [xen staging-4.10] x86/vmx: Pass an MSR value into vmx_msr_add() patchbot
17:18 [Xen-changelog] [xen staging-4.10] x86/vmx: Improvements to LBR MSR handling patchbot
17:18 [Xen-changelog] [xen staging-4.10] x86/vmx: Support remote access to the MSR lists patchbot
17:18 [Xen-changelog] [xen staging-4.10] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() patchbot
17:18 [Xen-changelog] [xen staging-4.10] x86/vmx: Internal cleanup for MSR load/save infrastructure patchbot
17:17 [Xen-changelog] [xen staging-4.10] x86/vmx: API improvements for MSR load/save infrastructure patchbot
17:17 [Xen-changelog] [xen staging-4.10] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() patchbot
17:17 [Xen-changelog] [xen staging-4.10] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit patchbot
17:17 [Xen-changelog] [xen staging-4.10] x86/spec-ctrl: Yet more fixes for xpti= parsing patchbot
17:17 [Xen-changelog] [xen staging-4.11] xl.conf: Add global affinity masks patchbot
17:17 [Xen-changelog] [xen staging-4.11] x86: Make "spec-ctrl=no" a global disable of all mitigations patchbot
17:16 [Xen-changelog] [xen staging-4.11] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests patchbot
17:16 [Xen-changelog] [xen staging-4.11] x86/msr: Virtualise MSR_FLUSH_CMD for guests patchbot
17:16 [Xen-changelog] [xen staging-4.11] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH patchbot
17:16 [Xen-changelog] [xen staging-4.11] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE patchbot
17:16 [Xen-changelog] [xen staging-4.11] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART patchbot
17:16 [Xen-changelog] [xen staging-4.11] x86/shadow: Infrastructure to force a PV guest into shadow mode patchbot
17:15 [Xen-changelog] [xen staging-4.11] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests patchbot
17:15 [Xen-changelog] [xen staging-4.11] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations patchbot
17:15 [Xen-changelog] [xen staging-4.11] tools/oxenstored: Make evaluation order explicit patchbot
17:15 [Xen-changelog] [xen staging-4.11] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits patchbot
17:15 [Xen-changelog] [xen staging-4.11] ARM: disable grant table v2 patchbot
17:15 [Xen-changelog] [xen staging-4.11] VMX: fix vmx_{find, del}_msr() build patchbot
17:14 [Xen-changelog] [xen staging-4.11] x86/vmx: Support load-only guest MSR list entries patchbot
17:14 [Xen-changelog] [xen staging-4.11] x86/vmx: Pass an MSR value into vmx_msr_add() patchbot
17:14 [Xen-changelog] [xen staging-4.11] x86/vmx: Improvements to LBR MSR handling patchbot
17:14 [Xen-changelog] [xen staging-4.11] x86/vmx: Support remote access to the MSR lists patchbot
17:14 [Xen-changelog] [xen staging-4.11] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() patchbot
17:14 [Xen-changelog] [xen staging-4.11] x86/vmx: Internal cleanup for MSR load/save infrastructure patchbot
17:13 [Xen-changelog] [xen staging-4.11] x86/vmx: API improvements for MSR load/save infrastructure patchbot
17:13 [Xen-changelog] [xen staging-4.11] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() patchbot
17:13 [Xen-changelog] [xen staging-4.11] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit patchbot
17:13 [Xen-changelog] [xen staging-4.11] x86/spec-ctrl: Yet more fixes for xpti= parsing patchbot
17:13 [Xen-changelog] [xen staging] xl.conf: Add global affinity masks patchbot
17:13 [Xen-changelog] [xen staging] x86: Make "spec-ctrl=no" a global disable of all mitigations patchbot
17:12 [Xen-changelog] [xen staging] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests patchbot
17:12 [Xen-changelog] [xen staging] x86/msr: Virtualise MSR_FLUSH_CMD for guests patchbot
17:12 [Xen-changelog] [xen staging] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH patchbot
17:12 [Xen-changelog] [xen staging] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE patchbot
17:12 [Xen-changelog] [xen staging] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART patchbot
17:11 [Xen-changelog] [xen staging] x86/shadow: Infrastructure to force a PV guest into shadow mode patchbot
17:11 [Xen-changelog] [xen staging] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests patchbot
17:11 [Xen-changelog] [xen staging] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations patchbot
17:11 [Xen-changelog] [xen staging] tools/oxenstored: Make evaluation order explicit patchbot
17:11 [Xen-changelog] [xen staging] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits patchbot
17:11 [Xen-changelog] [xen staging] ARM: disable grant table v2 patchbot
August 10, 18
13:11 [Xen-changelog] [xen staging] x86/spec-ctrl: Yet more fixes for xpti= parsing patchbot
12:33 [Xen-changelog] [xen staging] tools/libxenctrl: use new xenforeignmemory API to seed grant table patchbot
12:33 [Xen-changelog] [xen staging] common: add a new mappable resource type: XENMEM_resource_grant_table patchbot
12:33 [Xen-changelog] [xen staging] common/gnttab: Explicitly default to gnttab v1 during domain creation patchbot
12:33 [Xen-changelog] [xen staging] x86/vlapic: Bugfixes and improvements to vlapic_{read, write}() patchbot
August 08, 18
09:44 [Xen-changelog] [xen staging] x86: move arch_evtchn_inject to x86 common code patchbot
09:44 [Xen-changelog] [xen staging] x86: add missing "inline" keyword patchbot
09:44 [Xen-changelog] [xen staging] x86: put compat.o and x86_64/compat.o under CONFIG_PV patchbot
August 03, 18
15:44 [Xen-changelog] [xen staging] drop {,acpi_}reserve_bootmem() patchbot
15:44 [Xen-changelog] [xen staging] x86/hvm: Drop hvm_sr_handlers initializer patchbot
15:22 [Xen-changelog] [xen staging] automation: ensure created are not owned as root patchbot
15:22 [Xen-changelog] [xen staging] automation: remove dead code from containerize patchbot
15:22 [Xen-changelog] [xen staging] automation: drop container name from containerize patchbot
15:22 [Xen-changelog] [xen staging] automation: standardize containerize env names patchbot
August 02, 18
12:12 [Xen-changelog] [xen staging] xen: specify support for EXPERT and DEBUG Kconfig options patchbot
12:12 [Xen-changelog] [xen staging] xen: add cloc target patchbot
12:12 [Xen-changelog] [xen staging] xen: add per-platform defaults for NR_CPUS patchbot
12:12 [Xen-changelog] [xen staging] arm: add ALL_PLAT, QEMU, Rcar3 and MPSoC configs patchbot
12:11 [Xen-changelog] [xen staging] arm: add a tiny kconfig configuration patchbot
12:11 [Xen-changelog] [xen staging] arm: make it possible to disable the SMMU driver patchbot
12:11 [Xen-changelog] [xen staging] make it possible to enable/disable UART drivers patchbot
12:11 [Xen-changelog] [xen staging] Make MEM_ACCESS configurable patchbot
12:11 [Xen-changelog] [xen staging] arm: rename HAS_GICV3 to GICV3 patchbot
12:11 [Xen-changelog] [xen staging] arm: make it possible to disable HAS_GICV3 patchbot
10:22 [Xen-changelog] [xen staging] x86/altp2m: make sure EPTP_INDEX is up-to-date when enabling #VE patchbot
10:22 [Xen-changelog] [xen staging] x86/cpuidle: replace a pointless NULL check patchbot
10:22 [Xen-changelog] [xen staging] vtd: cleanup vtd_set_hwdom_mapping after ia64 removal patchbot
09:22 [Xen-changelog] [xen staging] xen: Remove domain_crash_synchronous() completely patchbot
09:22 [Xen-changelog] [xen staging] x86/vmx: Avoid using domain_crash_syncrhonous() in vmx_vmentry_failure() patchbot
09:22 [Xen-changelog] [xen staging] x86/vmx: Avoid hitting BUG_ON() after EPTP-related domain_crash() patchbot
August 01, 18
23:34 [Xen-changelog] [xen stable-4.6] x86/spec-ctrl: Fix the parsing of xpti= on fixed Intel hardware patchbot
23:34 [Xen-changelog] [xen stable-4.6] x86: command line option to avoid use of secondary hyper-threads patchbot
23:34 [Xen-changelog] [xen stable-4.6] x86: possibly bring up all CPUs even if not all are supposed to be used patchbot
23:34 [Xen-changelog] [xen stable-4.6] x86: distinguish CPU offlining from CPU removal patchbot
23:33 [Xen-changelog] [xen stable-4.6] x86/AMD: distinguish compute units from hyper-threads patchbot
23:33 [Xen-changelog] [xen stable-4.6] cpupools: fix state when downing a CPU failed patchbot
23:33 [Xen-changelog] [xen stable-4.6] allow cpu_down() to be called earlier patchbot
23:33 [Xen-changelog] [xen stable-4.6] x86/spec-ctrl: command line handling adjustments patchbot
23:33 [Xen-changelog] [xen stable-4.6] xen: Port the array_index_nospec() infrastructure from Linux patchbot
23:33 [Xen-changelog] [xen stable-4.6] cmdline: fix parse_boolean() for NULL incoming end pointer patchbot
17:24 [Xen-changelog] [xen stable-4.8] x86/spec-ctrl: Fix the parsing of xpti= on fixed Intel hardware patchbot
17:24 [Xen-changelog] [xen stable-4.8] x86/hvm: Disallow unknown MSR_EFER bits patchbot
17:24 [Xen-changelog] [xen stable-4.8] x86/xstate: Make errors in xstate calculations more obvious by crashing the domain patchbot
17:24 [Xen-changelog] [xen stable-4.8] x86/xstate: Use a guests CPUID policy, rather than allowing all features patchbot
17:24 [Xen-changelog] [xen stable-4.8] x86/vmx: Don't clobber %dr6 while debugging state is lazy patchbot
17:23 [Xen-changelog] [xen stable-4.8] x86: command line option to avoid use of secondary hyper-threads patchbot
17:23 [Xen-changelog] [xen stable-4.8] x86: possibly bring up all CPUs even if not all are supposed to be used patchbot
17:23 [Xen-changelog] [xen stable-4.8] x86: distinguish CPU offlining from CPU removal patchbot
17:23 [Xen-changelog] [xen stable-4.8] x86/AMD: distinguish compute units from hyper-threads patchbot
17:23 [Xen-changelog] [xen stable-4.8] cpupools: fix state when downing a CPU failed patchbot
17:23 [Xen-changelog] [xen stable-4.8] allow cpu_down() to be called earlier patchbot
17:22 [Xen-changelog] [xen stable-4.8] xen: oprofile/nmi_int.c: Drop unwanted sexual reference patchbot
17:22 [Xen-changelog] [xen stable-4.8] x86/spec-ctrl: command line handling adjustments patchbot
17:22 [Xen-changelog] [xen stable-4.8] x86: correctly set nonlazy_xstate_used when loading full state patchbot
17:22 [Xen-changelog] [xen stable-4.8] xen: Port the array_index_nospec() infrastructure from Linux patchbot
17:22 [Xen-changelog] [xen stable-4.8] cmdline: fix parse_boolean() for NULL incoming end pointer patchbot
17:22 [Xen-changelog] [xen stable-4.8] update Xen version to 4.8.5-pre patchbot
14:35 [Xen-changelog] [xen stable-4.10] x86/spec-ctrl: Fix the parsing of xpti= on fixed Intel hardware patchbot
14:35 [Xen-changelog] [xen stable-4.10] x86/hvm: Disallow unknown MSR_EFER bits patchbot
14:35 [Xen-changelog] [xen stable-4.10] x86/xstate: Make errors in xstate calculations more obvious by crashing the domain patchbot
14:35 [Xen-changelog] [xen stable-4.10] x86/xstate: Use a guests CPUID policy, rather than allowing all features patchbot
14:35 [Xen-changelog] [xen stable-4.10] x86/vmx: Don't clobber %dr6 while debugging state is lazy patchbot
14:34 [Xen-changelog] [xen stable-4.10] x86: command line option to avoid use of secondary hyper-threads patchbot
14:34 [Xen-changelog] [xen stable-4.10] x86: possibly bring up all CPUs even if not all are supposed to be used patchbot
14:34 [Xen-changelog] [xen stable-4.10] x86: distinguish CPU offlining from CPU removal patchbot
14:34 [Xen-changelog] [xen stable-4.10] x86/AMD: distinguish compute units from hyper-threads patchbot
14:34 [Xen-changelog] [xen stable-4.10] cpupools: fix state when downing a CPU failed patchbot
14:34 [Xen-changelog] [xen stable-4.10] x86/svm Fixes and cleanup to svm_inject_event() patchbot
14:33 [Xen-changelog] [xen stable-4.10] allow cpu_down() to be called earlier patchbot
14:33 [Xen-changelog] [xen stable-4.10] xen: oprofile/nmi_int.c: Drop unwanted sexual reference patchbot
14:33 [Xen-changelog] [xen stable-4.10] mm/page_alloc: correct first_dirty calculations during block merging patchbot
14:33 [Xen-changelog] [xen stable-4.10] x86/spec-ctrl: command line handling adjustments patchbot
14:33 [Xen-changelog] [xen stable-4.10] x86: correctly set nonlazy_xstate_used when loading full state patchbot
14:33 [Xen-changelog] [xen stable-4.10] xen: Port the array_index_nospec() infrastructure from Linux patchbot
10:44 [Xen-changelog] [xen staging] tools/gdbsx: use inttypes.h instead of custom macros patchbot
10:44 [Xen-changelog] [xen staging] tools/gdbsx: fix 'g' packet response for 64bit guests patchbot
10:44 [Xen-changelog] [xen staging] xenstore-client: Add option for raw in-/output patchbot
10:44 [Xen-changelog] [xen staging] docs: add xenstore-read and xenstore-write man pages patchbot
10:44 [Xen-changelog] [xen staging] xenconsole: add option to avoid escape sequences in log patchbot
10:44 [Xen-changelog] [xen staging] xen: clean up altp2m op comment patchbot
03:33 [Xen-changelog] [xen master] libxl_qmp: Add a warning to not trust QEMU patchbot
03:33 [Xen-changelog] [xen master] libxl_qmp: Move the buffer realloc to the same scope level as read patchbot
03:33 [Xen-changelog] [xen master] libxl_json: fix build with DEBUG_ANSWER patchbot
03:33 [Xen-changelog] [xen master] libxl_qmp: Fix use of DEBUG_RECEIVED patchbot
03:33 [Xen-changelog] [xen master] libxl_qmp: Documentation of the logic of the QMP client patchbot
03:33 [Xen-changelog] [xen master] libxl_event: Fix DEBUG prints patchbot

Mail converted by MHonArc

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.