August 31, 18 |
15:11 |
[Xen-changelog] [xen staging] x86/hvm: Drop hvm_{vmx, svm} shorthands |
patchbot |
|
15:11 |
[Xen-changelog] [xen staging] x86/svm: Rename arch_svm_struct to svm_vcpu |
patchbot |
|
15:11 |
[Xen-changelog] [xen staging] x86/vmx: Rename arch_vmx_struct to vmx_vcpu |
patchbot |
|
15:11 |
[Xen-changelog] [xen staging] x86/hvm: Rename v->arch.hvm_vcpu to v->arch.hvm |
patchbot |
|
15:11 |
[Xen-changelog] [xen staging] xen/hvm: Rename d->arch.hvm_domain to d->arch.hvm |
patchbot |
|
11:12 |
[Xen-changelog] [xen staging] xen/domain: Allocate d->vcpu[] in domain_create() |
patchbot |
|
11:12 |
[Xen-changelog] [xen staging] xen/dom0: Arrange for dom0_cfg to contain the real max_vcpus value |
patchbot |
|
11:11 |
[Xen-changelog] [xen staging] tools: Pass max_vcpus to XEN_DOMCTL_createdomain |
patchbot |
|
11:11 |
[Xen-changelog] [xen staging] xen/domain: Call arch_domain_create() as early as possible in domain_create() |
patchbot |
|
11:11 |
[Xen-changelog] [xen staging] xen/gnttab: Fold grant_table_{create, set_limits}() into grant_table_init() |
patchbot |
|
11:11 |
[Xen-changelog] [xen staging] xen/domctl: Remove XEN_DOMCTL_set_gnttab_limits |
patchbot |
|
11:11 |
[Xen-changelog] [xen staging] xen/gnttab: Pass max_{grant, maptrack}_frames into grant_table_create() |
patchbot |
|
11:11 |
[Xen-changelog] [xen staging] tools: Pass grant table limits to XEN_DOMCTL_set_gnttab_limits |
patchbot |
|
07:27 |
[Xen-changelog] [xen stable-4.7] x86: write to correct variable in parse_pv_l1tf() |
patchbot |
|
07:27 |
[Xen-changelog] [xen stable-4.7] arm: constify atomic_read parameter |
patchbot |
|
07:27 |
[Xen-changelog] [xen stable-4.7] xl.conf: Add global affinity masks |
patchbot |
|
07:27 |
[Xen-changelog] [xen stable-4.7] x86: Make "spec-ctrl=no" a global disable of all mitigations |
patchbot |
|
07:27 |
[Xen-changelog] [xen stable-4.7] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests |
patchbot |
|
07:26 |
[Xen-changelog] [xen stable-4.7] x86/msr: Virtualise MSR_FLUSH_CMD for guests |
patchbot |
|
07:26 |
[Xen-changelog] [xen stable-4.7] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH |
patchbot |
|
07:26 |
[Xen-changelog] [xen stable-4.7] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE |
patchbot |
|
07:26 |
[Xen-changelog] [xen stable-4.7] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART |
patchbot |
|
07:26 |
[Xen-changelog] [xen stable-4.7] x86/shadow: Infrastructure to force a PV guest into shadow mode |
patchbot |
|
07:25 |
[Xen-changelog] [xen stable-4.7] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests |
patchbot |
|
07:25 |
[Xen-changelog] [xen stable-4.7] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations |
patchbot |
|
07:25 |
[Xen-changelog] [xen stable-4.7] tools/oxenstored: Make evaluation order explicit |
patchbot |
|
07:25 |
[Xen-changelog] [xen stable-4.7] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits |
patchbot |
|
07:25 |
[Xen-changelog] [xen stable-4.7] ARM: disable grant table v2 |
patchbot |
|
07:25 |
[Xen-changelog] [xen stable-4.7] common/gnttab: Introduce command line feature controls |
patchbot |
|
07:24 |
[Xen-changelog] [xen stable-4.7] VMX: fix vmx_{find, del}_msr() build |
patchbot |
|
07:24 |
[Xen-changelog] [xen stable-4.7] x86/vmx: Support load-only guest MSR list entries |
patchbot |
|
07:24 |
[Xen-changelog] [xen stable-4.7] x86/vmx: Support remote access to the MSR lists |
patchbot |
|
07:24 |
[Xen-changelog] [xen stable-4.7] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() |
patchbot |
|
07:24 |
[Xen-changelog] [xen stable-4.7] x86/vmx: Internal cleanup for MSR load/save infrastructure |
patchbot |
|
07:24 |
[Xen-changelog] [xen stable-4.7] x86/vmx: API improvements for MSR load/save infrastructure |
patchbot |
|
07:23 |
[Xen-changelog] [xen stable-4.7] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() |
patchbot |
|
07:23 |
[Xen-changelog] [xen stable-4.7] x86/spec-ctrl: Yet more fixes for xpti= parsing |
patchbot |
|
07:23 |
[Xen-changelog] [xen stable-4.7] x86/spec-ctrl: Fix the parsing of xpti= on fixed Intel hardware |
patchbot |
|
07:23 |
[Xen-changelog] [xen stable-4.7] x86: command line option to avoid use of secondary hyper-threads |
patchbot |
|
07:23 |
[Xen-changelog] [xen stable-4.7] x86: possibly bring up all CPUs even if not all are supposed to be used |
patchbot |
|
07:23 |
[Xen-changelog] [xen stable-4.7] x86: distinguish CPU offlining from CPU removal |
patchbot |
|
07:22 |
[Xen-changelog] [xen stable-4.7] x86/AMD: distinguish compute units from hyper-threads |
patchbot |
|
07:22 |
[Xen-changelog] [xen stable-4.7] cpupools: fix state when downing a CPU failed |
patchbot |
|
07:22 |
[Xen-changelog] [xen stable-4.7] allow cpu_down() to be called earlier |
patchbot |
|
07:22 |
[Xen-changelog] [xen stable-4.7] x86/spec-ctrl: command line handling adjustments |
patchbot |
|
07:22 |
[Xen-changelog] [xen stable-4.7] xen: Port the array_index_nospec() infrastructure from Linux |
patchbot |
|
07:22 |
[Xen-changelog] [xen stable-4.7] cmdline: fix parse_boolean() for NULL incoming end pointer |
patchbot |
|
August 30, 18 |
15:11 |
[Xen-changelog] [qemu-xen master] config: split PVRDMA from RDMA |
patchbot |
|
15:11 |
[Xen-changelog] [qemu-xen master] hw/pvrdma: remove not needed include |
patchbot |
|
12:55 |
[Xen-changelog] [xen staging] x86/pv: Deprecate support for paging out the LDT |
patchbot |
|
09:44 |
[Xen-changelog] [xen staging] x86/pv: Rename v->arch.pv_vcpu to v->arch.pv |
patchbot |
|
09:44 |
[Xen-changelog] [xen staging] x86/pv: Rename d->arch.pv_domain to d->arch.pv |
patchbot |
|
09:11 |
[Xen-changelog] [xen staging] x86/genapic: drop .target_cpus() hook |
patchbot |
|
09:11 |
[Xen-changelog] [xen staging] x86/grant: mute gcc 4.1.x warning in steal_linear_address() |
patchbot |
|
09:11 |
[Xen-changelog] [xen staging] x86/alternatives: allow using assembler macros in favor of C ones |
patchbot |
|
09:11 |
[Xen-changelog] [xen staging] VMX: reduce number of posted-interrupt hooks |
patchbot |
|
09:11 |
[Xen-changelog] [xen staging] x86/mm: re-arrange get_page_from_l<N>e() vs pv_l1tf_check_l<N>e() |
patchbot |
|
07:44 |
[Xen-changelog] [xen staging] x86/pt: split out HVM functions from vtd.c |
patchbot |
|
07:44 |
[Xen-changelog] [xen staging] x86/pt: make it build with !CONFIG_HVM |
patchbot |
|
August 29, 18 |
17:55 |
[Xen-changelog] [xen staging] xen/arm: fix SMMU driver build |
patchbot |
|
15:23 |
[Xen-changelog] [xen master] Revert "x86/hvm: remove default ioreq server" |
patchbot |
|
15:23 |
[Xen-changelog] [xen master] VT-d/dmar: iommu mem leak fix |
patchbot |
|
15:23 |
[Xen-changelog] [xen master] build: remove tboot make targets |
patchbot |
|
15:23 |
[Xen-changelog] [xen master] x86/hvm: remove default ioreq server |
patchbot |
|
15:23 |
[Xen-changelog] [xen master] x86/nestedhvm: provide some stubs for p2m code |
patchbot |
|
15:23 |
[Xen-changelog] [xen master] x86/mm/shadow: split out HVM only code |
patchbot |
|
15:22 |
[Xen-changelog] [xen master] x86/mm/shadow: make it build with !CONFIG_HVM |
patchbot |
|
15:22 |
[Xen-changelog] [xen master] x86/vm_event: put vm_event_fill_regs under CONFIG_HVM |
patchbot |
|
15:22 |
[Xen-changelog] [xen master] x86/mem_access: put HVM only function under CONFIG_HVM |
patchbot |
|
15:22 |
[Xen-changelog] [xen master] x86: guard HAS_VPCI with CONFIG_HVM |
patchbot |
|
15:22 |
[Xen-changelog] [xen master] xenforeignmemory: work around bug in older privcmd |
patchbot |
|
15:22 |
[Xen-changelog] [xen master] tools: building IPXE should be determined by CONFIG_IPXE |
patchbot |
|
14:44 |
[Xen-changelog] [xen staging] x86: reduce "visibility" of spec_ctrl_asm.h |
patchbot |
|
14:44 |
[Xen-changelog] [xen staging] x86: move quoting of __ASM_{STAC, CLAC} |
patchbot |
|
14:44 |
[Xen-changelog] [xen staging] x86/alternatives: fully leverage automatic NOP filling |
patchbot |
|
14:44 |
[Xen-changelog] [xen staging] x86: drop NO_XPTI synthetic feature |
patchbot |
|
14:44 |
[Xen-changelog] [xen staging] x86/spec-ctrl: split reporting for PV and HVM guests |
patchbot |
|
14:44 |
[Xen-changelog] [xen staging] x86: report use of PCID together with reporting XPTI status |
patchbot |
|
13:33 |
[Xen-changelog] [xen staging] x86/alt: Fix build when CONFIG_LIVEPATCH is disabled |
patchbot |
|
August 28, 18 |
18:12 |
[Xen-changelog] [xen staging] x86/build: Use new .nops directive when available |
patchbot |
|
18:12 |
[Xen-changelog] [xen staging] x86/shadow: Use mfn_t in shadow_track_dirty_vram() |
patchbot |
|
18:11 |
[Xen-changelog] [xen staging] x86/shadow: Clean up the MMIO fastpath helpers |
patchbot |
|
18:11 |
[Xen-changelog] [xen staging] x86/shadow: Use MASK_* helpers for the MMIO fastpath PTE manipulation |
patchbot |
|
18:11 |
[Xen-changelog] [xen staging] x86/shadow: Switch shadow_domain.has_fast_mmio_entries to bool |
patchbot |
|
18:11 |
[Xen-changelog] [xen staging] x86/shadow: Use more appropriate conversion functions |
patchbot |
|
18:11 |
[Xen-changelog] [xen staging] x86/mm: Use mfn_eq()/mfn_add() rather than opencoded variations |
patchbot |
|
15:33 |
[Xen-changelog] [xen staging] x86/domctl: XEN_DOMCTL_debug_op is HVM only |
patchbot |
|
15:22 |
[Xen-changelog] [xen staging] x86/mmcfg/drhd: Move acpi_mmcfg_init() call before calling acpi_parse_dmar() |
patchbot |
|
15:22 |
[Xen-changelog] [xen staging] VMX: make vmx_read_guest_msr() cope with callers not checking its return value |
patchbot |
|
15:11 |
[Xen-changelog] [xen staging] xenforeignmemory: fix fd leakage in error path |
patchbot |
|
14:22 |
[Xen-changelog] [xen staging] rombios: remove packed attribute for pushad_regs_t |
patchbot |
|
14:11 |
[Xen-changelog] [xen staging] xen: is_hvm_{domain, vcpu} should evaluate to false when !CONFIG_HVM |
patchbot |
|
13:33 |
[Xen-changelog] [xen staging] xen/xsm: Rename CONFIG_XSM_POLICY to CONFIG_XSM_FLASK_POLICY |
patchbot |
|
13:33 |
[Xen-changelog] [xen staging] xen/xsm: Rename CONFIG_FLASK_* to CONFIG_XSM_FLASK_* |
patchbot |
|
10:55 |
[Xen-changelog] [xen staging] x86/svm: Fixes to OS Visible Workaround handling |
patchbot |
|
09:55 |
[Xen-changelog] [xen staging] xen/pt: io.c contains HVM only code |
patchbot |
|
09:55 |
[Xen-changelog] [xen staging] x86/vpmu: put HVM only code under CONFIG_HVM |
patchbot |
|
09:55 |
[Xen-changelog] [xen staging] x86: provide stub for memory_type_changed |
patchbot |
|
09:55 |
[Xen-changelog] [xen staging] x86/hvm: provide hvm_hap_supported |
patchbot |
|
09:55 |
[Xen-changelog] [xen staging] x86: enclose hvm_op and dm_op in CONFIG_HVM in relevant tables |
patchbot |
|
09:22 |
[Xen-changelog] [qemu-xen staging] config: split PVRDMA from RDMA |
patchbot |
|
09:22 |
[Xen-changelog] [qemu-xen staging] hw/pvrdma: remove not needed include |
patchbot |
|
August 27, 18 |
13:55 |
[Xen-changelog] [xen staging] Revert "x86/hvm: remove default ioreq server" |
patchbot |
|
09:44 |
[Xen-changelog] [xen staging] VT-d/dmar: iommu mem leak fix |
patchbot |
|
09:44 |
[Xen-changelog] [xen staging] build: remove tboot make targets |
patchbot |
|
09:44 |
[Xen-changelog] [xen staging] x86/hvm: remove default ioreq server |
patchbot |
|
August 26, 18 |
10:33 |
[Xen-changelog] [xen staging] x86/nestedhvm: provide some stubs for p2m code |
patchbot |
|
10:33 |
[Xen-changelog] [xen staging] x86/mm/shadow: split out HVM only code |
patchbot |
|
10:33 |
[Xen-changelog] [xen staging] x86/mm/shadow: make it build with !CONFIG_HVM |
patchbot |
|
10:33 |
[Xen-changelog] [xen staging] x86/vm_event: put vm_event_fill_regs under CONFIG_HVM |
patchbot |
|
10:33 |
[Xen-changelog] [xen staging] x86/mem_access: put HVM only function under CONFIG_HVM |
patchbot |
|
10:33 |
[Xen-changelog] [xen staging] x86: guard HAS_VPCI with CONFIG_HVM |
patchbot |
|
10:00 |
[Xen-changelog] [xen staging] xenforeignmemory: work around bug in older privcmd |
patchbot |
|
10:00 |
[Xen-changelog] [xen staging] tools: building IPXE should be determined by CONFIG_IPXE |
patchbot |
|
06:50 |
[Xen-changelog] [xen master] QEMU_TAG update |
patchbot |
|
06:50 |
[Xen-changelog] [xen master] xen/arm: p2m: Introduce a new variable removing_mapping in __p2m_set_entry |
patchbot |
|
06:50 |
[Xen-changelog] [xen master] xen/arm: p2m: Rename ret to mfn in p2m_lookup |
patchbot |
|
06:49 |
[Xen-changelog] [xen master] xen/arm: guest_walk: Use lpae_is_mapping to simplify the code |
patchbot |
|
06:49 |
[Xen-changelog] [xen master] xen/arm: Rename lpae_valid to lpae_is_valid |
patchbot |
|
06:49 |
[Xen-changelog] [xen master] xen/arm: Rework lpae_table |
patchbot |
|
06:49 |
[Xen-changelog] [xen master] xen/arm: Rework lpae_mapping |
patchbot |
|
06:49 |
[Xen-changelog] [xen master] xen/arm: p2m: Limit call to mem access code use in get_page_from_gva |
patchbot |
|
06:49 |
[Xen-changelog] [xen master] xen/arm: p2m: Reduce the locking section in get_page_from_gva |
patchbot |
|
06:48 |
[Xen-changelog] [xen master] xen/arm: cpregs: Fix typo in the documentation of TTBCR |
patchbot |
|
06:48 |
[Xen-changelog] [xen master] xen/arm: cpregs: Allow HSR_CPREG* to receive more than 1 parameter |
patchbot |
|
06:48 |
[Xen-changelog] [xen master] xen/arm: rename acpi_make_chosen_node to make_chosen_node |
patchbot |
|
06:48 |
[Xen-changelog] [xen master] xen/arm: move evtchn_allocate call out of make_hypervisor_node |
patchbot |
|
06:48 |
[Xen-changelog] [xen master] xen/arm: move a few DT related defines to public/device_tree_defs.h |
patchbot |
|
06:47 |
[Xen-changelog] [xen master] xen/arm: do not pass dt_host to make_memory_node and make_hypervisor_node |
patchbot |
|
06:47 |
[Xen-changelog] [xen master] xen/arm: drivers: scif: Remove unused #define-s |
patchbot |
|
06:47 |
[Xen-changelog] [xen master] x86/oprofile: put SVM only code under CONFIG_HVM |
patchbot |
|
06:47 |
[Xen-changelog] [xen master] x86/mtrr: move is_var_mtrr_overlapped |
patchbot |
|
06:47 |
[Xen-changelog] [xen master] x86/amd: skip OSVW function calls if !CONFIG_HVM |
patchbot |
|
06:47 |
[Xen-changelog] [xen master] x86/vmce: enclose HVM load / save code in CONFIG_HVM |
patchbot |
|
06:46 |
[Xen-changelog] [xen master] x86/pt: add HVM check to XEN_DOMCTL_unbind_pt_irq |
patchbot |
|
06:46 |
[Xen-changelog] [xen master] x86/mm: don't reference hvm_funcs directly |
patchbot |
|
06:46 |
[Xen-changelog] [xen master] x86/vvmx: make get_shadow_eptp static function |
patchbot |
|
06:46 |
[Xen-changelog] [xen master] x86: HVM_FEP should depend on HVM |
patchbot |
|
06:46 |
[Xen-changelog] [xen master] xen: fix building !CONFIG_LOCK_PROFILE |
patchbot |
|
06:46 |
[Xen-changelog] [xen master] libxl_qmp: Disable beautify for QMP generated cmd |
patchbot |
|
06:45 |
[Xen-changelog] [xen master] libxl_qmp: Simplify qmp_response_type() prototype |
patchbot |
|
06:45 |
[Xen-changelog] [xen master] libxl_json: libxl__json_object_to_json |
patchbot |
|
06:45 |
[Xen-changelog] [xen master] libxl_json: Enable yajl_allow_trailing_garbage |
patchbot |
|
06:45 |
[Xen-changelog] [xen master] libxl_dm: Add libxl__qemu_qmp_path() |
patchbot |
|
06:45 |
[Xen-changelog] [xen master] libxl_json: constify libxl__json_object_to_yajl_gen arguments |
patchbot |
|
06:45 |
[Xen-changelog] [xen master] libxl_qmp: Remove unused yajl_ctx from handler |
patchbot |
|
06:44 |
[Xen-changelog] [xen master] libxl: Add libxl__prepare_sockaddr_un() helper |
patchbot |
|
06:44 |
[Xen-changelog] [xen master] libxl_qmp: Move struct sockaddr_un variable to qmp_open() |
patchbot |
|
06:44 |
[Xen-changelog] [xen master] tools: fix uninstall: tests/x86_emulator, Linux hotplug |
patchbot |
|
06:44 |
[Xen-changelog] [xen master] libgnttab: Add support for Linux dma-buf |
patchbot |
|
06:44 |
[Xen-changelog] [xen master] MAINTAINERS: add myself as a reviewer for x86 patches |
patchbot |
|
06:44 |
[Xen-changelog] [xen master] automation: build with debian unstable |
patchbot |
|
01:55 |
[Xen-changelog] [xen stable-4.10] tools: prepend to PKG_CONFIG_PATH when configuring qemu |
patchbot |
|
August 24, 18 |
19:33 |
[Xen-changelog] [xen stable-4.11] libxl: start pvqemu when 9pfs is requested |
patchbot |
|
15:22 |
[Xen-changelog] [xen staging-4.10] tools: prepend to PKG_CONFIG_PATH when configuring qemu |
patchbot |
|
August 23, 18 |
14:11 |
[Xen-changelog] [xen staging] QEMU_TAG update |
patchbot |
|
14:11 |
[Xen-changelog] [qemu-xen-traditional master] qemu-trad: stop using the default IOREQ server |
patchbot |
|
August 22, 18 |
15:46 |
[Xen-changelog] [xen staging] xen/arm: p2m: Introduce a new variable removing_mapping in __p2m_set_entry |
patchbot |
|
15:46 |
[Xen-changelog] [xen staging] xen/arm: p2m: Rename ret to mfn in p2m_lookup |
patchbot |
|
15:46 |
[Xen-changelog] [xen staging] xen/arm: guest_walk: Use lpae_is_mapping to simplify the code |
patchbot |
|
15:45 |
[Xen-changelog] [xen staging] xen/arm: Rename lpae_valid to lpae_is_valid |
patchbot |
|
15:45 |
[Xen-changelog] [xen staging] xen/arm: Rework lpae_table |
patchbot |
|
15:45 |
[Xen-changelog] [xen staging] xen/arm: Rework lpae_mapping |
patchbot |
|
15:45 |
[Xen-changelog] [xen staging] xen/arm: p2m: Limit call to mem access code use in get_page_from_gva |
patchbot |
|
15:45 |
[Xen-changelog] [xen staging] xen/arm: p2m: Reduce the locking section in get_page_from_gva |
patchbot |
|
15:45 |
[Xen-changelog] [xen staging] xen/arm: cpregs: Fix typo in the documentation of TTBCR |
patchbot |
|
15:44 |
[Xen-changelog] [xen staging] xen/arm: cpregs: Allow HSR_CPREG* to receive more than 1 parameter |
patchbot |
|
15:44 |
[Xen-changelog] [xen staging] xen/arm: rename acpi_make_chosen_node to make_chosen_node |
patchbot |
|
15:44 |
[Xen-changelog] [xen staging] xen/arm: move evtchn_allocate call out of make_hypervisor_node |
patchbot |
|
15:44 |
[Xen-changelog] [xen staging] xen/arm: move a few DT related defines to public/device_tree_defs.h |
patchbot |
|
15:44 |
[Xen-changelog] [xen staging] xen/arm: do not pass dt_host to make_memory_node and make_hypervisor_node |
patchbot |
|
15:44 |
[Xen-changelog] [xen staging] xen/arm: drivers: scif: Remove unused #define-s |
patchbot |
|
05:55 |
[Xen-changelog] [xen stable-4.10] libxl: start pvqemu when 9pfs is requested |
patchbot |
|
August 21, 18 |
22:14 |
[Xen-changelog] [xen master] tools/tests: fix an xs-test.c issue |
patchbot |
|
22:14 |
[Xen-changelog] [xen master] tools/kdd: work around gcc 8.1 bug |
patchbot |
|
22:14 |
[Xen-changelog] [xen master] xenpmd: make 32 bit gcc 8.1 non-debug build work |
patchbot |
|
22:13 |
[Xen-changelog] [xen master] tools: update ipxe changeset |
patchbot |
|
22:13 |
[Xen-changelog] [xen master] libxl/arm: Fix build on arm64 + acpi w/ gcc 8.2 |
patchbot |
|
22:13 |
[Xen-changelog] [xen master] x86/mmcfg: rename pt_pci_init() and call it from acpi_mmcfg_init() |
patchbot |
|
22:13 |
[Xen-changelog] [xen master] libxc: copy back the result of XEN_DOMCTL_createdomain |
patchbot |
|
22:13 |
[Xen-changelog] [xen master] rangeset: make inquiry functions tolerate NULL inputs |
patchbot |
|
22:13 |
[Xen-changelog] [xen master] dom0/pvh: change the order of the MMCFG initialization |
patchbot |
|
22:12 |
[Xen-changelog] [xen master] x86: remove page.h and processor.h inclusion from asm_defns.h |
patchbot |
|
22:12 |
[Xen-changelog] [xen master] x86/HVM: correct an inverted check in hvm_load() |
patchbot |
|
22:12 |
[Xen-changelog] [xen master] x86: make arch_set_info_guest() match comments in load_segments() |
patchbot |
|
22:12 |
[Xen-changelog] [xen master] x86/setup: Avoid OoB E820 lookup when calculating the L1TF safe address |
patchbot |
|
22:12 |
[Xen-changelog] [xen master] libxl: fix ARM build after 54ed251dc7 |
patchbot |
|
22:12 |
[Xen-changelog] [xen master] x86/mmcfg: remove redundant code in pci_mmcfg_reject_broken() |
patchbot |
|
22:11 |
[Xen-changelog] [xen master] gnttab/ARM: properly implement gnttab_create_status_page() |
patchbot |
|
22:11 |
[Xen-changelog] [xen master] x86/hvm/emulate: make sure rep I/O emulation does not cross GFN boundaries |
patchbot |
|
22:11 |
[Xen-changelog] [xen master] xen/evtchn: Pass max_evtchn_port into evtchn_init() |
patchbot |
|
22:11 |
[Xen-changelog] [xen master] xen/domctl: Merge set_max_evtchn into createdomain |
patchbot |
|
22:11 |
[Xen-changelog] [xen master] tools: Rework xc_domain_create() to take a full xen_domctl_createdomain |
patchbot |
|
22:11 |
[Xen-changelog] [xen master] tools/ocaml: Pass a full domctl_create_config into stub_xc_domain_create() |
patchbot |
|
14:45 |
[Xen-changelog] [xen staging] x86/oprofile: put SVM only code under CONFIG_HVM |
patchbot |
|
14:45 |
[Xen-changelog] [xen staging] x86/mtrr: move is_var_mtrr_overlapped |
patchbot |
|
14:45 |
[Xen-changelog] [xen staging] x86/amd: skip OSVW function calls if !CONFIG_HVM |
patchbot |
|
14:44 |
[Xen-changelog] [xen staging] x86/vmce: enclose HVM load / save code in CONFIG_HVM |
patchbot |
|
14:44 |
[Xen-changelog] [xen staging] x86/pt: add HVM check to XEN_DOMCTL_unbind_pt_irq |
patchbot |
|
14:44 |
[Xen-changelog] [xen staging] x86/mm: don't reference hvm_funcs directly |
patchbot |
|
14:44 |
[Xen-changelog] [xen staging] x86/vvmx: make get_shadow_eptp static function |
patchbot |
|
14:44 |
[Xen-changelog] [xen staging] x86: HVM_FEP should depend on HVM |
patchbot |
|
14:44 |
[Xen-changelog] [xen staging] xen: fix building !CONFIG_LOCK_PROFILE |
patchbot |
|
13:12 |
[Xen-changelog] [xen staging] libxl_qmp: Disable beautify for QMP generated cmd |
patchbot |
|
13:12 |
[Xen-changelog] [xen staging] libxl_qmp: Simplify qmp_response_type() prototype |
patchbot |
|
13:12 |
[Xen-changelog] [xen staging] libxl_json: libxl__json_object_to_json |
patchbot |
|
13:11 |
[Xen-changelog] [xen staging] libxl_json: Enable yajl_allow_trailing_garbage |
patchbot |
|
13:11 |
[Xen-changelog] [xen staging] libxl_dm: Add libxl__qemu_qmp_path() |
patchbot |
|
13:11 |
[Xen-changelog] [xen staging] libxl_json: constify libxl__json_object_to_yajl_gen arguments |
patchbot |
|
13:11 |
[Xen-changelog] [xen staging] libxl_qmp: Remove unused yajl_ctx from handler |
patchbot |
|
13:11 |
[Xen-changelog] [xen staging] libxl: Add libxl__prepare_sockaddr_un() helper |
patchbot |
|
13:11 |
[Xen-changelog] [xen staging] libxl_qmp: Move struct sockaddr_un variable to qmp_open() |
patchbot |
|
08:11 |
[Xen-changelog] [xen staging] tools: fix uninstall: tests/x86_emulator, Linux hotplug |
patchbot |
|
08:00 |
[Xen-changelog] [xen staging] libgnttab: Add support for Linux dma-buf |
patchbot |
|
08:00 |
[Xen-changelog] [xen staging] MAINTAINERS: add myself as a reviewer for x86 patches |
patchbot |
|
August 20, 18 |
22:22 |
[Xen-changelog] [xen staging-4.9] libxl: start pvqemu when 9pfs is requested |
patchbot |
|
22:22 |
[Xen-changelog] [xen staging-4.10] libxl: start pvqemu when 9pfs is requested |
patchbot |
|
22:22 |
[Xen-changelog] [xen staging-4.11] libxl: start pvqemu when 9pfs is requested |
patchbot |
|
13:11 |
[Xen-changelog] [xen staging] automation: build with debian unstable |
patchbot |
|
11:22 |
[Xen-changelog] [xen staging] tools/tests: fix an xs-test.c issue |
patchbot |
|
11:22 |
[Xen-changelog] [xen staging] tools/kdd: work around gcc 8.1 bug |
patchbot |
|
11:22 |
[Xen-changelog] [xen staging] xenpmd: make 32 bit gcc 8.1 non-debug build work |
patchbot |
|
11:22 |
[Xen-changelog] [xen staging] tools: update ipxe changeset |
patchbot |
|
06:15 |
[Xen-changelog] [xen stable-4.10] x86: write to correct variable in parse_pv_l1tf() |
patchbot |
|
06:15 |
[Xen-changelog] [xen stable-4.10] xl.conf: Add global affinity masks |
patchbot |
|
06:14 |
[Xen-changelog] [xen stable-4.10] x86: Make "spec-ctrl=no" a global disable of all mitigations |
patchbot |
|
06:14 |
[Xen-changelog] [xen stable-4.10] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests |
patchbot |
|
06:14 |
[Xen-changelog] [xen stable-4.10] x86/msr: Virtualise MSR_FLUSH_CMD for guests |
patchbot |
|
06:14 |
[Xen-changelog] [xen stable-4.10] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH |
patchbot |
|
06:14 |
[Xen-changelog] [xen stable-4.10] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE |
patchbot |
|
06:14 |
[Xen-changelog] [xen stable-4.10] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART |
patchbot |
|
06:13 |
[Xen-changelog] [xen stable-4.10] x86/shadow: Infrastructure to force a PV guest into shadow mode |
patchbot |
|
06:13 |
[Xen-changelog] [xen stable-4.10] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests |
patchbot |
|
06:13 |
[Xen-changelog] [xen stable-4.10] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations |
patchbot |
|
06:13 |
[Xen-changelog] [xen stable-4.10] tools/oxenstored: Make evaluation order explicit |
patchbot |
|
06:13 |
[Xen-changelog] [xen stable-4.10] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits |
patchbot |
|
06:13 |
[Xen-changelog] [xen stable-4.10] ARM: disable grant table v2 |
patchbot |
|
06:12 |
[Xen-changelog] [xen stable-4.10] common/gnttab: Introduce command line feature controls |
patchbot |
|
06:12 |
[Xen-changelog] [xen stable-4.10] VMX: fix vmx_{find, del}_msr() build |
patchbot |
|
06:12 |
[Xen-changelog] [xen stable-4.10] x86/vmx: Support load-only guest MSR list entries |
patchbot |
|
06:12 |
[Xen-changelog] [xen stable-4.10] x86/vmx: Pass an MSR value into vmx_msr_add() |
patchbot |
|
06:12 |
[Xen-changelog] [xen stable-4.10] x86/vmx: Improvements to LBR MSR handling |
patchbot |
|
06:12 |
[Xen-changelog] [xen stable-4.10] x86/vmx: Support remote access to the MSR lists |
patchbot |
|
06:11 |
[Xen-changelog] [xen stable-4.10] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() |
patchbot |
|
06:11 |
[Xen-changelog] [xen stable-4.10] x86/vmx: Internal cleanup for MSR load/save infrastructure |
patchbot |
|
06:11 |
[Xen-changelog] [xen stable-4.10] x86/vmx: API improvements for MSR load/save infrastructure |
patchbot |
|
06:11 |
[Xen-changelog] [xen stable-4.10] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() |
patchbot |
|
06:11 |
[Xen-changelog] [xen stable-4.10] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit |
patchbot |
|
06:11 |
[Xen-changelog] [xen stable-4.10] x86/spec-ctrl: Yet more fixes for xpti= parsing |
patchbot |
|
02:48 |
[Xen-changelog] [xen stable-4.8] x86: write to correct variable in parse_pv_l1tf() |
patchbot |
|
02:48 |
[Xen-changelog] [xen stable-4.8] xl.conf: Add global affinity masks |
patchbot |
|
02:47 |
[Xen-changelog] [xen stable-4.8] x86: Make "spec-ctrl=no" a global disable of all mitigations |
patchbot |
|
02:47 |
[Xen-changelog] [xen stable-4.8] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests |
patchbot |
|
02:47 |
[Xen-changelog] [xen stable-4.8] x86/msr: Virtualise MSR_FLUSH_CMD for guests |
patchbot |
|
02:47 |
[Xen-changelog] [xen stable-4.8] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH |
patchbot |
|
02:47 |
[Xen-changelog] [xen stable-4.8] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE |
patchbot |
|
02:47 |
[Xen-changelog] [xen stable-4.8] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART |
patchbot |
|
02:46 |
[Xen-changelog] [xen stable-4.8] x86/shadow: Infrastructure to force a PV guest into shadow mode |
patchbot |
|
02:46 |
[Xen-changelog] [xen stable-4.8] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests |
patchbot |
|
02:46 |
[Xen-changelog] [xen stable-4.8] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations |
patchbot |
|
02:46 |
[Xen-changelog] [xen stable-4.8] tools/oxenstored: Make evaluation order explicit |
patchbot |
|
02:46 |
[Xen-changelog] [xen stable-4.8] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits |
patchbot |
|
02:46 |
[Xen-changelog] [xen stable-4.8] ARM: disable grant table v2 |
patchbot |
|
02:45 |
[Xen-changelog] [xen stable-4.8] common/gnttab: Introduce command line feature controls |
patchbot |
|
02:45 |
[Xen-changelog] [xen stable-4.8] VMX: fix vmx_{find, del}_msr() build |
patchbot |
|
02:45 |
[Xen-changelog] [xen stable-4.8] x86/vmx: Support load-only guest MSR list entries |
patchbot |
|
02:45 |
[Xen-changelog] [xen stable-4.8] x86/vmx: Pass an MSR value into vmx_msr_add() |
patchbot |
|
02:45 |
[Xen-changelog] [xen stable-4.8] x86/vmx: Improvements to LBR MSR handling |
patchbot |
|
02:45 |
[Xen-changelog] [xen stable-4.8] x86/vmx: Support remote access to the MSR lists |
patchbot |
|
02:44 |
[Xen-changelog] [xen stable-4.8] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() |
patchbot |
|
02:44 |
[Xen-changelog] [xen stable-4.8] x86/vmx: Internal cleanup for MSR load/save infrastructure |
patchbot |
|
02:44 |
[Xen-changelog] [xen stable-4.8] x86/vmx: API improvements for MSR load/save infrastructure |
patchbot |
|
02:44 |
[Xen-changelog] [xen stable-4.8] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() |
patchbot |
|
02:44 |
[Xen-changelog] [xen stable-4.8] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit |
patchbot |
|
02:44 |
[Xen-changelog] [xen stable-4.8] x86/spec-ctrl: Yet more fixes for xpti= parsing |
patchbot |
|
August 18, 18 |
23:55 |
[Xen-changelog] [xen master] x86/pv: Use xmemdup() for cpuidmasks, rather than opencoding it |
patchbot |
|
23:54 |
[Xen-changelog] [xen master] x86/ptwr: Misc cleanup to ptwr_emulated_update() |
patchbot |
|
23:54 |
[Xen-changelog] [xen master] x86: write to correct variable in parse_pv_l1tf() |
patchbot |
|
23:54 |
[Xen-changelog] [xen master] x86/hvm/ioreq: MMIO range checking completely ignores direction flag |
patchbot |
|
23:54 |
[Xen-changelog] [xen master] libs/foreignmemory: Avoid printing an error for ENOTSUPP |
patchbot |
|
23:54 |
[Xen-changelog] [xen master] libxl: start pvqemu when 9pfs is requested |
patchbot |
|
23:54 |
[Xen-changelog] [xen master] pygrub: fix package version |
patchbot |
|
23:53 |
[Xen-changelog] [xen master] xen: fix stale PVH comment |
patchbot |
|
23:53 |
[Xen-changelog] [xen master] xl.conf: Add global affinity masks |
patchbot |
|
23:53 |
[Xen-changelog] [xen master] x86: Make "spec-ctrl=no" a global disable of all mitigations |
patchbot |
|
23:53 |
[Xen-changelog] [xen master] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests |
patchbot |
|
23:53 |
[Xen-changelog] [xen master] x86/msr: Virtualise MSR_FLUSH_CMD for guests |
patchbot |
|
23:53 |
[Xen-changelog] [xen master] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH |
patchbot |
|
23:52 |
[Xen-changelog] [xen master] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE |
patchbot |
|
23:52 |
[Xen-changelog] [xen master] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART |
patchbot |
|
23:52 |
[Xen-changelog] [xen master] x86/shadow: Infrastructure to force a PV guest into shadow mode |
patchbot |
|
23:52 |
[Xen-changelog] [xen master] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests |
patchbot |
|
23:52 |
[Xen-changelog] [xen master] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations |
patchbot |
|
23:52 |
[Xen-changelog] [xen master] tools/oxenstored: Make evaluation order explicit |
patchbot |
|
23:51 |
[Xen-changelog] [xen master] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits |
patchbot |
|
23:51 |
[Xen-changelog] [xen master] ARM: disable grant table v2 |
patchbot |
|
23:51 |
[Xen-changelog] [xen master] x86/spec-ctrl: Yet more fixes for xpti= parsing |
patchbot |
|
23:51 |
[Xen-changelog] [xen master] tools/libxenctrl: use new xenforeignmemory API to seed grant table |
patchbot |
|
23:51 |
[Xen-changelog] [xen master] common: add a new mappable resource type: XENMEM_resource_grant_table |
patchbot |
|
23:51 |
[Xen-changelog] [xen master] common/gnttab: Explicitly default to gnttab v1 during domain creation |
patchbot |
|
23:50 |
[Xen-changelog] [xen master] x86/vlapic: Bugfixes and improvements to vlapic_{read, write}() |
patchbot |
|
23:50 |
[Xen-changelog] [xen master] x86: move arch_evtchn_inject to x86 common code |
patchbot |
|
23:50 |
[Xen-changelog] [xen master] x86: add missing "inline" keyword |
patchbot |
|
23:50 |
[Xen-changelog] [xen master] x86: put compat.o and x86_64/compat.o under CONFIG_PV |
patchbot |
|
23:50 |
[Xen-changelog] [xen master] drop {,acpi_}reserve_bootmem() |
patchbot |
|
23:50 |
[Xen-changelog] [xen master] x86/hvm: Drop hvm_sr_handlers initializer |
patchbot |
|
23:49 |
[Xen-changelog] [xen master] automation: ensure created are not owned as root |
patchbot |
|
23:49 |
[Xen-changelog] [xen master] automation: remove dead code from containerize |
patchbot |
|
23:49 |
[Xen-changelog] [xen master] automation: drop container name from containerize |
patchbot |
|
23:49 |
[Xen-changelog] [xen master] automation: standardize containerize env names |
patchbot |
|
23:49 |
[Xen-changelog] [xen master] xen: specify support for EXPERT and DEBUG Kconfig options |
patchbot |
|
23:49 |
[Xen-changelog] [xen master] xen: add cloc target |
patchbot |
|
23:48 |
[Xen-changelog] [xen master] xen: add per-platform defaults for NR_CPUS |
patchbot |
|
23:48 |
[Xen-changelog] [xen master] arm: add ALL_PLAT, QEMU, Rcar3 and MPSoC configs |
patchbot |
|
23:48 |
[Xen-changelog] [xen master] arm: add a tiny kconfig configuration |
patchbot |
|
23:48 |
[Xen-changelog] [xen master] arm: make it possible to disable the SMMU driver |
patchbot |
|
23:48 |
[Xen-changelog] [xen master] make it possible to enable/disable UART drivers |
patchbot |
|
23:47 |
[Xen-changelog] [xen master] Make MEM_ACCESS configurable |
patchbot |
|
23:47 |
[Xen-changelog] [xen master] arm: rename HAS_GICV3 to GICV3 |
patchbot |
|
23:47 |
[Xen-changelog] [xen master] arm: make it possible to disable HAS_GICV3 |
patchbot |
|
23:47 |
[Xen-changelog] [xen master] x86/altp2m: make sure EPTP_INDEX is up-to-date when enabling #VE |
patchbot |
|
23:47 |
[Xen-changelog] [xen master] x86/cpuidle: replace a pointless NULL check |
patchbot |
|
23:47 |
[Xen-changelog] [xen master] vtd: cleanup vtd_set_hwdom_mapping after ia64 removal |
patchbot |
|
23:46 |
[Xen-changelog] [xen master] xen: Remove domain_crash_synchronous() completely |
patchbot |
|
23:46 |
[Xen-changelog] [xen master] x86/vmx: Avoid using domain_crash_syncrhonous() in vmx_vmentry_failure() |
patchbot |
|
23:46 |
[Xen-changelog] [xen master] x86/vmx: Avoid hitting BUG_ON() after EPTP-related domain_crash() |
patchbot |
|
23:46 |
[Xen-changelog] [xen master] tools/gdbsx: use inttypes.h instead of custom macros |
patchbot |
|
23:46 |
[Xen-changelog] [xen master] tools/gdbsx: fix 'g' packet response for 64bit guests |
patchbot |
|
23:46 |
[Xen-changelog] [xen master] xenstore-client: Add option for raw in-/output |
patchbot |
|
23:45 |
[Xen-changelog] [xen master] docs: add xenstore-read and xenstore-write man pages |
patchbot |
|
23:45 |
[Xen-changelog] [xen master] xenconsole: add option to avoid escape sequences in log |
patchbot |
|
23:45 |
[Xen-changelog] [xen master] xen: clean up altp2m op comment |
patchbot |
|
23:45 |
[Xen-changelog] [xen master] hvm/altp2m: Clarify the proper way to extend the altp2m interface |
patchbot |
|
23:45 |
[Xen-changelog] [xen master] x86/xstate: correct logging in handle_xsetbv() |
patchbot |
|
23:45 |
[Xen-changelog] [xen master] memory: fix label syntax |
patchbot |
|
23:44 |
[Xen-changelog] [xen master] iommu: remove unneeded return from iommu_hwdom_init |
patchbot |
|
23:44 |
[Xen-changelog] [xen master] x86/efi: split compiler vs linker support |
patchbot |
|
23:44 |
[Xen-changelog] [xen master] x86/efi: move the logic to detect PE build support |
patchbot |
|
23:44 |
[Xen-changelog] [xen master] xen/compiler: introduce a define for weak symbols |
patchbot |
|
23:44 |
[Xen-changelog] [xen master] ci: enable builds with CentOS 7.x |
patchbot |
|
23:44 |
[Xen-changelog] [xen master] automation: add CentOS 7.x image |
patchbot |
|
16:11 |
[Xen-changelog] [xen stable-4.11] x86: write to correct variable in parse_pv_l1tf() |
patchbot |
|
03:37 |
[Xen-changelog] [xen stable-4.6] amend "x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH" |
patchbot |
|
03:37 |
[Xen-changelog] [xen stable-4.6] amend "x86/Intel: Mitigations for GPZ SP4 - Speculative Store Bypass" |
patchbot |
|
03:36 |
[Xen-changelog] [xen stable-4.6] x86: write to correct variable in parse_pv_l1tf() |
patchbot |
|
03:36 |
[Xen-changelog] [xen stable-4.6] arm: constify atomic_read parameter |
patchbot |
|
03:36 |
[Xen-changelog] [xen stable-4.6] xl.conf: Add global affinity masks |
patchbot |
|
03:36 |
[Xen-changelog] [xen stable-4.6] x86: Make "spec-ctrl=no" a global disable of all mitigations |
patchbot |
|
03:36 |
[Xen-changelog] [xen stable-4.6] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests |
patchbot |
|
03:36 |
[Xen-changelog] [xen stable-4.6] x86/msr: Virtualise MSR_FLUSH_CMD for guests |
patchbot |
|
03:35 |
[Xen-changelog] [xen stable-4.6] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH |
patchbot |
|
03:35 |
[Xen-changelog] [xen stable-4.6] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE |
patchbot |
|
03:35 |
[Xen-changelog] [xen stable-4.6] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART |
patchbot |
|
03:35 |
[Xen-changelog] [xen stable-4.6] x86/shadow: Infrastructure to force a PV guest into shadow mode |
patchbot |
|
03:35 |
[Xen-changelog] [xen stable-4.6] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests |
patchbot |
|
03:35 |
[Xen-changelog] [xen stable-4.6] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations |
patchbot |
|
03:34 |
[Xen-changelog] [xen stable-4.6] tools/oxenstored: Make evaluation order explicit |
patchbot |
|
03:34 |
[Xen-changelog] [xen stable-4.6] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits |
patchbot |
|
03:34 |
[Xen-changelog] [xen stable-4.6] ARM: disable grant table v2 |
patchbot |
|
03:34 |
[Xen-changelog] [xen stable-4.6] common/gnttab: Introduce command line feature controls |
patchbot |
|
03:34 |
[Xen-changelog] [xen stable-4.6] VMX: fix vmx_{find, del}_msr() build |
patchbot |
|
03:34 |
[Xen-changelog] [xen stable-4.6] x86/vmx: Support load-only guest MSR list entries |
patchbot |
|
03:33 |
[Xen-changelog] [xen stable-4.6] x86/vmx: Support remote access to the MSR lists |
patchbot |
|
03:33 |
[Xen-changelog] [xen stable-4.6] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() |
patchbot |
|
03:33 |
[Xen-changelog] [xen stable-4.6] x86/vmx: Internal cleanup for MSR load/save infrastructure |
patchbot |
|
03:33 |
[Xen-changelog] [xen stable-4.6] x86/vmx: API improvements for MSR load/save infrastructure |
patchbot |
|
03:33 |
[Xen-changelog] [xen stable-4.6] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() |
patchbot |
|
03:33 |
[Xen-changelog] [xen stable-4.6] x86/spec-ctrl: Yet more fixes for xpti= parsing |
patchbot |
|
August 17, 18 |
15:44 |
[Xen-changelog] [xen staging] libxl/arm: Fix build on arm64 + acpi w/ gcc 8.2 |
patchbot |
|
13:11 |
[Xen-changelog] [xen staging] x86/mmcfg: rename pt_pci_init() and call it from acpi_mmcfg_init() |
patchbot |
|
12:00 |
[Xen-changelog] [xen staging] libxc: copy back the result of XEN_DOMCTL_createdomain |
patchbot |
|
12:00 |
[Xen-changelog] [xen staging] rangeset: make inquiry functions tolerate NULL inputs |
patchbot |
|
12:00 |
[Xen-changelog] [xen staging] dom0/pvh: change the order of the MMCFG initialization |
patchbot |
|
12:00 |
[Xen-changelog] [xen staging] x86: remove page.h and processor.h inclusion from asm_defns.h |
patchbot |
|
12:00 |
[Xen-changelog] [xen staging] x86/HVM: correct an inverted check in hvm_load() |
patchbot |
|
12:00 |
[Xen-changelog] [xen staging] x86: make arch_set_info_guest() match comments in load_segments() |
patchbot |
|
10:44 |
[Xen-changelog] [qemu-xen master] main loop: Big hammer to fix logfile disk DoS in Xen setups |
patchbot |
|
10:34 |
[Xen-changelog] [qemu-xen master] Merge tag 'v3.0.0' into 'staging' |
patchbot |
|
August 16, 18 |
17:11 |
[Xen-changelog] [xen staging] x86/setup: Avoid OoB E820 lookup when calculating the L1TF safe address |
patchbot |
|
11:44 |
[Xen-changelog] [xen staging] libxl: fix ARM build after 54ed251dc7 |
patchbot |
|
10:48 |
[Xen-changelog] [xen stable-4.11] xl.conf: Add global affinity masks |
patchbot |
|
10:47 |
[Xen-changelog] [xen stable-4.11] x86: Make "spec-ctrl=no" a global disable of all mitigations |
patchbot |
|
10:47 |
[Xen-changelog] [xen stable-4.11] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests |
patchbot |
|
10:47 |
[Xen-changelog] [xen stable-4.11] x86/msr: Virtualise MSR_FLUSH_CMD for guests |
patchbot |
|
10:47 |
[Xen-changelog] [xen stable-4.11] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH |
patchbot |
|
10:47 |
[Xen-changelog] [xen stable-4.11] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE |
patchbot |
|
10:46 |
[Xen-changelog] [xen stable-4.11] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART |
patchbot |
|
10:46 |
[Xen-changelog] [xen stable-4.11] x86/shadow: Infrastructure to force a PV guest into shadow mode |
patchbot |
|
10:46 |
[Xen-changelog] [xen stable-4.11] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests |
patchbot |
|
10:46 |
[Xen-changelog] [xen stable-4.11] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations |
patchbot |
|
10:46 |
[Xen-changelog] [xen stable-4.11] tools/oxenstored: Make evaluation order explicit |
patchbot |
|
10:46 |
[Xen-changelog] [xen stable-4.11] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits |
patchbot |
|
10:45 |
[Xen-changelog] [xen stable-4.11] ARM: disable grant table v2 |
patchbot |
|
10:45 |
[Xen-changelog] [xen stable-4.11] VMX: fix vmx_{find, del}_msr() build |
patchbot |
|
10:45 |
[Xen-changelog] [xen stable-4.11] x86/vmx: Support load-only guest MSR list entries |
patchbot |
|
10:45 |
[Xen-changelog] [xen stable-4.11] x86/vmx: Pass an MSR value into vmx_msr_add() |
patchbot |
|
10:45 |
[Xen-changelog] [xen stable-4.11] x86/vmx: Improvements to LBR MSR handling |
patchbot |
|
10:45 |
[Xen-changelog] [xen stable-4.11] x86/vmx: Support remote access to the MSR lists |
patchbot |
|
10:44 |
[Xen-changelog] [xen stable-4.11] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() |
patchbot |
|
10:44 |
[Xen-changelog] [xen stable-4.11] x86/vmx: Internal cleanup for MSR load/save infrastructure |
patchbot |
|
10:44 |
[Xen-changelog] [xen stable-4.11] x86/vmx: API improvements for MSR load/save infrastructure |
patchbot |
|
10:44 |
[Xen-changelog] [xen stable-4.11] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() |
patchbot |
|
10:44 |
[Xen-changelog] [xen stable-4.11] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit |
patchbot |
|
10:44 |
[Xen-changelog] [xen stable-4.11] x86/spec-ctrl: Yet more fixes for xpti= parsing |
patchbot |
|
07:44 |
[Xen-changelog] [xen staging] x86/mmcfg: remove redundant code in pci_mmcfg_reject_broken() |
patchbot |
|
07:44 |
[Xen-changelog] [xen staging] gnttab/ARM: properly implement gnttab_create_status_page() |
patchbot |
|
07:44 |
[Xen-changelog] [xen staging] x86/hvm/emulate: make sure rep I/O emulation does not cross GFN boundaries |
patchbot |
|
August 15, 18 |
18:55 |
[Xen-changelog] [xen staging] xen/evtchn: Pass max_evtchn_port into evtchn_init() |
patchbot |
|
18:55 |
[Xen-changelog] [xen staging] xen/domctl: Merge set_max_evtchn into createdomain |
patchbot |
|
18:55 |
[Xen-changelog] [xen staging] tools: Rework xc_domain_create() to take a full xen_domctl_createdomain |
patchbot |
|
18:55 |
[Xen-changelog] [xen staging] tools/ocaml: Pass a full domctl_create_config into stub_xc_domain_create() |
patchbot |
|
15:44 |
[Xen-changelog] [xen staging] x86/pv: Use xmemdup() for cpuidmasks, rather than opencoding it |
patchbot |
|
15:44 |
[Xen-changelog] [xen staging] x86/ptwr: Misc cleanup to ptwr_emulated_update() |
patchbot |
|
12:34 |
[Xen-changelog] [xen staging-4.6] amend "x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH" |
patchbot |
|
12:34 |
[Xen-changelog] [xen staging-4.6] amend "x86/Intel: Mitigations for GPZ SP4 - Speculative Store Bypass" |
patchbot |
|
12:33 |
[Xen-changelog] [xen staging-4.6] x86: write to correct variable in parse_pv_l1tf() |
patchbot |
|
12:33 |
[Xen-changelog] [xen staging-4.7] x86: write to correct variable in parse_pv_l1tf() |
patchbot |
|
12:33 |
[Xen-changelog] [xen staging-4.8] x86: write to correct variable in parse_pv_l1tf() |
patchbot |
|
12:33 |
[Xen-changelog] [xen staging-4.9] x86: write to correct variable in parse_pv_l1tf() |
patchbot |
|
12:33 |
[Xen-changelog] [xen staging-4.10] x86: write to correct variable in parse_pv_l1tf() |
patchbot |
|
12:22 |
[Xen-changelog] [xen staging-4.11] x86: write to correct variable in parse_pv_l1tf() |
patchbot |
|
12:22 |
[Xen-changelog] [xen staging] x86: write to correct variable in parse_pv_l1tf() |
patchbot |
|
12:22 |
[Xen-changelog] [xen staging] x86/hvm/ioreq: MMIO range checking completely ignores direction flag |
patchbot |
|
11:44 |
[Xen-changelog] [qemu-xen staging] main loop: Big hammer to fix logfile disk DoS in Xen setups |
patchbot |
|
11:34 |
[Xen-changelog] [qemu-xen staging] Merge tag 'v3.0.0' into 'staging' |
patchbot |
|
09:33 |
[Xen-changelog] [xen staging-4.6] arm: constify atomic_read parameter |
patchbot |
|
09:33 |
[Xen-changelog] [xen staging-4.7] arm: constify atomic_read parameter |
patchbot |
|
09:33 |
[Xen-changelog] [xen staging] libs/foreignmemory: Avoid printing an error for ENOTSUPP |
patchbot |
|
09:33 |
[Xen-changelog] [xen staging] libxl: start pvqemu when 9pfs is requested |
patchbot |
|
09:33 |
[Xen-changelog] [xen staging] pygrub: fix package version |
patchbot |
|
09:33 |
[Xen-changelog] [xen staging] xen: fix stale PVH comment |
patchbot |
|
August 14, 18 |
17:37 |
[Xen-changelog] [xen staging-4.6] xl.conf: Add global affinity masks |
patchbot |
|
17:37 |
[Xen-changelog] [xen staging-4.6] x86: Make "spec-ctrl=no" a global disable of all mitigations |
patchbot |
|
17:37 |
[Xen-changelog] [xen staging-4.6] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests |
patchbot |
|
17:37 |
[Xen-changelog] [xen staging-4.6] x86/msr: Virtualise MSR_FLUSH_CMD for guests |
patchbot |
|
17:36 |
[Xen-changelog] [xen staging-4.6] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH |
patchbot |
|
17:36 |
[Xen-changelog] [xen staging-4.6] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE |
patchbot |
|
17:36 |
[Xen-changelog] [xen staging-4.6] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART |
patchbot |
|
17:36 |
[Xen-changelog] [xen staging-4.6] x86/shadow: Infrastructure to force a PV guest into shadow mode |
patchbot |
|
17:36 |
[Xen-changelog] [xen staging-4.6] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests |
patchbot |
|
17:36 |
[Xen-changelog] [xen staging-4.6] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations |
patchbot |
|
17:35 |
[Xen-changelog] [xen staging-4.6] tools/oxenstored: Make evaluation order explicit |
patchbot |
|
17:35 |
[Xen-changelog] [xen staging-4.6] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits |
patchbot |
|
17:35 |
[Xen-changelog] [xen staging-4.6] ARM: disable grant table v2 |
patchbot |
|
17:35 |
[Xen-changelog] [xen staging-4.6] common/gnttab: Introduce command line feature controls |
patchbot |
|
17:35 |
[Xen-changelog] [xen staging-4.6] VMX: fix vmx_{find, del}_msr() build |
patchbot |
|
17:35 |
[Xen-changelog] [xen staging-4.6] x86/vmx: Support load-only guest MSR list entries |
patchbot |
|
17:34 |
[Xen-changelog] [xen staging-4.6] x86/vmx: Support remote access to the MSR lists |
patchbot |
|
17:34 |
[Xen-changelog] [xen staging-4.6] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() |
patchbot |
|
17:34 |
[Xen-changelog] [xen staging-4.6] x86/vmx: Internal cleanup for MSR load/save infrastructure |
patchbot |
|
17:34 |
[Xen-changelog] [xen staging-4.6] x86/vmx: API improvements for MSR load/save infrastructure |
patchbot |
|
17:34 |
[Xen-changelog] [xen staging-4.6] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() |
patchbot |
|
17:33 |
[Xen-changelog] [xen staging-4.6] x86/spec-ctrl: Yet more fixes for xpti= parsing |
patchbot |
|
17:33 |
[Xen-changelog] [xen staging-4.7] xl.conf: Add global affinity masks |
patchbot |
|
17:33 |
[Xen-changelog] [xen staging-4.7] x86: Make "spec-ctrl=no" a global disable of all mitigations |
patchbot |
|
17:33 |
[Xen-changelog] [xen staging-4.7] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests |
patchbot |
|
17:33 |
[Xen-changelog] [xen staging-4.7] x86/msr: Virtualise MSR_FLUSH_CMD for guests |
patchbot |
|
17:33 |
[Xen-changelog] [xen staging-4.7] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH |
patchbot |
|
17:32 |
[Xen-changelog] [xen staging-4.7] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE |
patchbot |
|
17:32 |
[Xen-changelog] [xen staging-4.7] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART |
patchbot |
|
17:32 |
[Xen-changelog] [xen staging-4.7] x86/shadow: Infrastructure to force a PV guest into shadow mode |
patchbot |
|
17:32 |
[Xen-changelog] [xen staging-4.7] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests |
patchbot |
|
17:32 |
[Xen-changelog] [xen staging-4.7] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations |
patchbot |
|
17:32 |
[Xen-changelog] [xen staging-4.7] tools/oxenstored: Make evaluation order explicit |
patchbot |
|
17:31 |
[Xen-changelog] [xen staging-4.7] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits |
patchbot |
|
17:31 |
[Xen-changelog] [xen staging-4.7] ARM: disable grant table v2 |
patchbot |
|
17:31 |
[Xen-changelog] [xen staging-4.7] common/gnttab: Introduce command line feature controls |
patchbot |
|
17:31 |
[Xen-changelog] [xen staging-4.7] VMX: fix vmx_{find, del}_msr() build |
patchbot |
|
17:31 |
[Xen-changelog] [xen staging-4.7] x86/vmx: Support load-only guest MSR list entries |
patchbot |
|
17:31 |
[Xen-changelog] [xen staging-4.7] x86/vmx: Support remote access to the MSR lists |
patchbot |
|
17:30 |
[Xen-changelog] [xen staging-4.7] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() |
patchbot |
|
17:30 |
[Xen-changelog] [xen staging-4.7] x86/vmx: Internal cleanup for MSR load/save infrastructure |
patchbot |
|
17:30 |
[Xen-changelog] [xen staging-4.7] x86/vmx: API improvements for MSR load/save infrastructure |
patchbot |
|
17:30 |
[Xen-changelog] [xen staging-4.7] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() |
patchbot |
|
17:30 |
[Xen-changelog] [xen staging-4.7] x86/spec-ctrl: Yet more fixes for xpti= parsing |
patchbot |
|
17:30 |
[Xen-changelog] [xen staging-4.8] xl.conf: Add global affinity masks |
patchbot |
|
17:29 |
[Xen-changelog] [xen staging-4.8] x86: Make "spec-ctrl=no" a global disable of all mitigations |
patchbot |
|
17:29 |
[Xen-changelog] [xen staging-4.8] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests |
patchbot |
|
17:29 |
[Xen-changelog] [xen staging-4.8] x86/msr: Virtualise MSR_FLUSH_CMD for guests |
patchbot |
|
17:29 |
[Xen-changelog] [xen staging-4.8] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH |
patchbot |
|
17:29 |
[Xen-changelog] [xen staging-4.8] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE |
patchbot |
|
17:29 |
[Xen-changelog] [xen staging-4.8] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART |
patchbot |
|
17:28 |
[Xen-changelog] [xen staging-4.8] x86/shadow: Infrastructure to force a PV guest into shadow mode |
patchbot |
|
17:28 |
[Xen-changelog] [xen staging-4.8] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests |
patchbot |
|
17:28 |
[Xen-changelog] [xen staging-4.8] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations |
patchbot |
|
17:28 |
[Xen-changelog] [xen staging-4.8] tools/oxenstored: Make evaluation order explicit |
patchbot |
|
17:28 |
[Xen-changelog] [xen staging-4.8] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits |
patchbot |
|
17:28 |
[Xen-changelog] [xen staging-4.8] ARM: disable grant table v2 |
patchbot |
|
17:27 |
[Xen-changelog] [xen staging-4.8] common/gnttab: Introduce command line feature controls |
patchbot |
|
17:27 |
[Xen-changelog] [xen staging-4.8] VMX: fix vmx_{find, del}_msr() build |
patchbot |
|
17:27 |
[Xen-changelog] [xen staging-4.8] x86/vmx: Support load-only guest MSR list entries |
patchbot |
|
17:27 |
[Xen-changelog] [xen staging-4.8] x86/vmx: Pass an MSR value into vmx_msr_add() |
patchbot |
|
17:27 |
[Xen-changelog] [xen staging-4.8] x86/vmx: Improvements to LBR MSR handling |
patchbot |
|
17:27 |
[Xen-changelog] [xen staging-4.8] x86/vmx: Support remote access to the MSR lists |
patchbot |
|
17:26 |
[Xen-changelog] [xen staging-4.8] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() |
patchbot |
|
17:26 |
[Xen-changelog] [xen staging-4.8] x86/vmx: Internal cleanup for MSR load/save infrastructure |
patchbot |
|
17:26 |
[Xen-changelog] [xen staging-4.8] x86/vmx: API improvements for MSR load/save infrastructure |
patchbot |
|
17:26 |
[Xen-changelog] [xen staging-4.8] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() |
patchbot |
|
17:26 |
[Xen-changelog] [xen staging-4.8] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit |
patchbot |
|
17:25 |
[Xen-changelog] [xen staging-4.8] x86/spec-ctrl: Yet more fixes for xpti= parsing |
patchbot |
|
17:25 |
[Xen-changelog] [xen staging-4.9] xl.conf: Add global affinity masks |
patchbot |
|
17:25 |
[Xen-changelog] [xen staging-4.9] x86: Make "spec-ctrl=no" a global disable of all mitigations |
patchbot |
|
17:25 |
[Xen-changelog] [xen staging-4.9] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests |
patchbot |
|
17:25 |
[Xen-changelog] [xen staging-4.9] x86/msr: Virtualise MSR_FLUSH_CMD for guests |
patchbot |
|
17:25 |
[Xen-changelog] [xen staging-4.9] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH |
patchbot |
|
17:24 |
[Xen-changelog] [xen staging-4.9] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE |
patchbot |
|
17:24 |
[Xen-changelog] [xen staging-4.9] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART |
patchbot |
|
17:24 |
[Xen-changelog] [xen staging-4.9] x86/shadow: Infrastructure to force a PV guest into shadow mode |
patchbot |
|
17:24 |
[Xen-changelog] [xen staging-4.9] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests |
patchbot |
|
17:24 |
[Xen-changelog] [xen staging-4.9] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations |
patchbot |
|
17:24 |
[Xen-changelog] [xen staging-4.9] tools/oxenstored: Make evaluation order explicit |
patchbot |
|
17:23 |
[Xen-changelog] [xen staging-4.9] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits |
patchbot |
|
17:23 |
[Xen-changelog] [xen staging-4.9] ARM: disable grant table v2 |
patchbot |
|
17:23 |
[Xen-changelog] [xen staging-4.9] common/gnttab: Introduce command line feature controls |
patchbot |
|
17:23 |
[Xen-changelog] [xen staging-4.9] VMX: fix vmx_{find, del}_msr() build |
patchbot |
|
17:23 |
[Xen-changelog] [xen staging-4.9] x86/vmx: Support load-only guest MSR list entries |
patchbot |
|
17:23 |
[Xen-changelog] [xen staging-4.9] x86/vmx: Pass an MSR value into vmx_msr_add() |
patchbot |
|
17:22 |
[Xen-changelog] [xen staging-4.9] x86/vmx: Improvements to LBR MSR handling |
patchbot |
|
17:22 |
[Xen-changelog] [xen staging-4.9] x86/vmx: Support remote access to the MSR lists |
patchbot |
|
17:22 |
[Xen-changelog] [xen staging-4.9] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() |
patchbot |
|
17:22 |
[Xen-changelog] [xen staging-4.9] x86/vmx: Internal cleanup for MSR load/save infrastructure |
patchbot |
|
17:22 |
[Xen-changelog] [xen staging-4.9] x86/vmx: API improvements for MSR load/save infrastructure |
patchbot |
|
17:22 |
[Xen-changelog] [xen staging-4.9] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() |
patchbot |
|
17:21 |
[Xen-changelog] [xen staging-4.9] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit |
patchbot |
|
17:21 |
[Xen-changelog] [xen staging-4.9] x86/spec-ctrl: Yet more fixes for xpti= parsing |
patchbot |
|
17:21 |
[Xen-changelog] [xen staging-4.10] xl.conf: Add global affinity masks |
patchbot |
|
17:21 |
[Xen-changelog] [xen staging-4.10] x86: Make "spec-ctrl=no" a global disable of all mitigations |
patchbot |
|
17:21 |
[Xen-changelog] [xen staging-4.10] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests |
patchbot |
|
17:21 |
[Xen-changelog] [xen staging-4.10] x86/msr: Virtualise MSR_FLUSH_CMD for guests |
patchbot |
|
17:20 |
[Xen-changelog] [xen staging-4.10] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH |
patchbot |
|
17:20 |
[Xen-changelog] [xen staging-4.10] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE |
patchbot |
|
17:20 |
[Xen-changelog] [xen staging-4.10] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART |
patchbot |
|
17:20 |
[Xen-changelog] [xen staging-4.10] x86/shadow: Infrastructure to force a PV guest into shadow mode |
patchbot |
|
17:20 |
[Xen-changelog] [xen staging-4.10] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests |
patchbot |
|
17:19 |
[Xen-changelog] [xen staging-4.10] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations |
patchbot |
|
17:19 |
[Xen-changelog] [xen staging-4.10] tools/oxenstored: Make evaluation order explicit |
patchbot |
|
17:19 |
[Xen-changelog] [xen staging-4.10] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits |
patchbot |
|
17:19 |
[Xen-changelog] [xen staging-4.10] ARM: disable grant table v2 |
patchbot |
|
17:19 |
[Xen-changelog] [xen staging-4.10] common/gnttab: Introduce command line feature controls |
patchbot |
|
17:19 |
[Xen-changelog] [xen staging-4.10] VMX: fix vmx_{find, del}_msr() build |
patchbot |
|
17:18 |
[Xen-changelog] [xen staging-4.10] x86/vmx: Support load-only guest MSR list entries |
patchbot |
|
17:18 |
[Xen-changelog] [xen staging-4.10] x86/vmx: Pass an MSR value into vmx_msr_add() |
patchbot |
|
17:18 |
[Xen-changelog] [xen staging-4.10] x86/vmx: Improvements to LBR MSR handling |
patchbot |
|
17:18 |
[Xen-changelog] [xen staging-4.10] x86/vmx: Support remote access to the MSR lists |
patchbot |
|
17:18 |
[Xen-changelog] [xen staging-4.10] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() |
patchbot |
|
17:18 |
[Xen-changelog] [xen staging-4.10] x86/vmx: Internal cleanup for MSR load/save infrastructure |
patchbot |
|
17:17 |
[Xen-changelog] [xen staging-4.10] x86/vmx: API improvements for MSR load/save infrastructure |
patchbot |
|
17:17 |
[Xen-changelog] [xen staging-4.10] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() |
patchbot |
|
17:17 |
[Xen-changelog] [xen staging-4.10] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit |
patchbot |
|
17:17 |
[Xen-changelog] [xen staging-4.10] x86/spec-ctrl: Yet more fixes for xpti= parsing |
patchbot |
|
17:17 |
[Xen-changelog] [xen staging-4.11] xl.conf: Add global affinity masks |
patchbot |
|
17:17 |
[Xen-changelog] [xen staging-4.11] x86: Make "spec-ctrl=no" a global disable of all mitigations |
patchbot |
|
17:16 |
[Xen-changelog] [xen staging-4.11] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests |
patchbot |
|
17:16 |
[Xen-changelog] [xen staging-4.11] x86/msr: Virtualise MSR_FLUSH_CMD for guests |
patchbot |
|
17:16 |
[Xen-changelog] [xen staging-4.11] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH |
patchbot |
|
17:16 |
[Xen-changelog] [xen staging-4.11] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE |
patchbot |
|
17:16 |
[Xen-changelog] [xen staging-4.11] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART |
patchbot |
|
17:16 |
[Xen-changelog] [xen staging-4.11] x86/shadow: Infrastructure to force a PV guest into shadow mode |
patchbot |
|
17:15 |
[Xen-changelog] [xen staging-4.11] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests |
patchbot |
|
17:15 |
[Xen-changelog] [xen staging-4.11] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations |
patchbot |
|
17:15 |
[Xen-changelog] [xen staging-4.11] tools/oxenstored: Make evaluation order explicit |
patchbot |
|
17:15 |
[Xen-changelog] [xen staging-4.11] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits |
patchbot |
|
17:15 |
[Xen-changelog] [xen staging-4.11] ARM: disable grant table v2 |
patchbot |
|
17:15 |
[Xen-changelog] [xen staging-4.11] VMX: fix vmx_{find, del}_msr() build |
patchbot |
|
17:14 |
[Xen-changelog] [xen staging-4.11] x86/vmx: Support load-only guest MSR list entries |
patchbot |
|
17:14 |
[Xen-changelog] [xen staging-4.11] x86/vmx: Pass an MSR value into vmx_msr_add() |
patchbot |
|
17:14 |
[Xen-changelog] [xen staging-4.11] x86/vmx: Improvements to LBR MSR handling |
patchbot |
|
17:14 |
[Xen-changelog] [xen staging-4.11] x86/vmx: Support remote access to the MSR lists |
patchbot |
|
17:14 |
[Xen-changelog] [xen staging-4.11] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr() |
patchbot |
|
17:14 |
[Xen-changelog] [xen staging-4.11] x86/vmx: Internal cleanup for MSR load/save infrastructure |
patchbot |
|
17:13 |
[Xen-changelog] [xen staging-4.11] x86/vmx: API improvements for MSR load/save infrastructure |
patchbot |
|
17:13 |
[Xen-changelog] [xen staging-4.11] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs() |
patchbot |
|
17:13 |
[Xen-changelog] [xen staging-4.11] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit |
patchbot |
|
17:13 |
[Xen-changelog] [xen staging-4.11] x86/spec-ctrl: Yet more fixes for xpti= parsing |
patchbot |
|
17:13 |
[Xen-changelog] [xen staging] xl.conf: Add global affinity masks |
patchbot |
|
17:13 |
[Xen-changelog] [xen staging] x86: Make "spec-ctrl=no" a global disable of all mitigations |
patchbot |
|
17:12 |
[Xen-changelog] [xen staging] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests |
patchbot |
|
17:12 |
[Xen-changelog] [xen staging] x86/msr: Virtualise MSR_FLUSH_CMD for guests |
patchbot |
|
17:12 |
[Xen-changelog] [xen staging] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH |
patchbot |
|
17:12 |
[Xen-changelog] [xen staging] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE |
patchbot |
|
17:12 |
[Xen-changelog] [xen staging] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART |
patchbot |
|
17:11 |
[Xen-changelog] [xen staging] x86/shadow: Infrastructure to force a PV guest into shadow mode |
patchbot |
|
17:11 |
[Xen-changelog] [xen staging] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests |
patchbot |
|
17:11 |
[Xen-changelog] [xen staging] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations |
patchbot |
|
17:11 |
[Xen-changelog] [xen staging] tools/oxenstored: Make evaluation order explicit |
patchbot |
|
17:11 |
[Xen-changelog] [xen staging] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits |
patchbot |
|
17:11 |
[Xen-changelog] [xen staging] ARM: disable grant table v2 |
patchbot |
|
August 10, 18 |
13:11 |
[Xen-changelog] [xen staging] x86/spec-ctrl: Yet more fixes for xpti= parsing |
patchbot |
|
12:33 |
[Xen-changelog] [xen staging] tools/libxenctrl: use new xenforeignmemory API to seed grant table |
patchbot |
|
12:33 |
[Xen-changelog] [xen staging] common: add a new mappable resource type: XENMEM_resource_grant_table |
patchbot |
|
12:33 |
[Xen-changelog] [xen staging] common/gnttab: Explicitly default to gnttab v1 during domain creation |
patchbot |
|
12:33 |
[Xen-changelog] [xen staging] x86/vlapic: Bugfixes and improvements to vlapic_{read, write}() |
patchbot |
|
August 08, 18 |
09:44 |
[Xen-changelog] [xen staging] x86: move arch_evtchn_inject to x86 common code |
patchbot |
|
09:44 |
[Xen-changelog] [xen staging] x86: add missing "inline" keyword |
patchbot |
|
09:44 |
[Xen-changelog] [xen staging] x86: put compat.o and x86_64/compat.o under CONFIG_PV |
patchbot |
|
August 03, 18 |
15:44 |
[Xen-changelog] [xen staging] drop {,acpi_}reserve_bootmem() |
patchbot |
|
15:44 |
[Xen-changelog] [xen staging] x86/hvm: Drop hvm_sr_handlers initializer |
patchbot |
|
15:22 |
[Xen-changelog] [xen staging] automation: ensure created are not owned as root |
patchbot |
|
15:22 |
[Xen-changelog] [xen staging] automation: remove dead code from containerize |
patchbot |
|
15:22 |
[Xen-changelog] [xen staging] automation: drop container name from containerize |
patchbot |
|
15:22 |
[Xen-changelog] [xen staging] automation: standardize containerize env names |
patchbot |
|
August 02, 18 |
12:12 |
[Xen-changelog] [xen staging] xen: specify support for EXPERT and DEBUG Kconfig options |
patchbot |
|
12:12 |
[Xen-changelog] [xen staging] xen: add cloc target |
patchbot |
|
12:12 |
[Xen-changelog] [xen staging] xen: add per-platform defaults for NR_CPUS |
patchbot |
|
12:12 |
[Xen-changelog] [xen staging] arm: add ALL_PLAT, QEMU, Rcar3 and MPSoC configs |
patchbot |
|
12:11 |
[Xen-changelog] [xen staging] arm: add a tiny kconfig configuration |
patchbot |
|
12:11 |
[Xen-changelog] [xen staging] arm: make it possible to disable the SMMU driver |
patchbot |
|
12:11 |
[Xen-changelog] [xen staging] make it possible to enable/disable UART drivers |
patchbot |
|
12:11 |
[Xen-changelog] [xen staging] Make MEM_ACCESS configurable |
patchbot |
|
12:11 |
[Xen-changelog] [xen staging] arm: rename HAS_GICV3 to GICV3 |
patchbot |
|
12:11 |
[Xen-changelog] [xen staging] arm: make it possible to disable HAS_GICV3 |
patchbot |
|
10:22 |
[Xen-changelog] [xen staging] x86/altp2m: make sure EPTP_INDEX is up-to-date when enabling #VE |
patchbot |
|
10:22 |
[Xen-changelog] [xen staging] x86/cpuidle: replace a pointless NULL check |
patchbot |
|
10:22 |
[Xen-changelog] [xen staging] vtd: cleanup vtd_set_hwdom_mapping after ia64 removal |
patchbot |
|
09:22 |
[Xen-changelog] [xen staging] xen: Remove domain_crash_synchronous() completely |
patchbot |
|
09:22 |
[Xen-changelog] [xen staging] x86/vmx: Avoid using domain_crash_syncrhonous() in vmx_vmentry_failure() |
patchbot |
|
09:22 |
[Xen-changelog] [xen staging] x86/vmx: Avoid hitting BUG_ON() after EPTP-related domain_crash() |
patchbot |
|
August 01, 18 |
23:34 |
[Xen-changelog] [xen stable-4.6] x86/spec-ctrl: Fix the parsing of xpti= on fixed Intel hardware |
patchbot |
|
23:34 |
[Xen-changelog] [xen stable-4.6] x86: command line option to avoid use of secondary hyper-threads |
patchbot |
|
23:34 |
[Xen-changelog] [xen stable-4.6] x86: possibly bring up all CPUs even if not all are supposed to be used |
patchbot |
|
23:34 |
[Xen-changelog] [xen stable-4.6] x86: distinguish CPU offlining from CPU removal |
patchbot |
|
23:33 |
[Xen-changelog] [xen stable-4.6] x86/AMD: distinguish compute units from hyper-threads |
patchbot |
|
23:33 |
[Xen-changelog] [xen stable-4.6] cpupools: fix state when downing a CPU failed |
patchbot |
|
23:33 |
[Xen-changelog] [xen stable-4.6] allow cpu_down() to be called earlier |
patchbot |
|
23:33 |
[Xen-changelog] [xen stable-4.6] x86/spec-ctrl: command line handling adjustments |
patchbot |
|
23:33 |
[Xen-changelog] [xen stable-4.6] xen: Port the array_index_nospec() infrastructure from Linux |
patchbot |
|
23:33 |
[Xen-changelog] [xen stable-4.6] cmdline: fix parse_boolean() for NULL incoming end pointer |
patchbot |
|
17:24 |
[Xen-changelog] [xen stable-4.8] x86/spec-ctrl: Fix the parsing of xpti= on fixed Intel hardware |
patchbot |
|
17:24 |
[Xen-changelog] [xen stable-4.8] x86/hvm: Disallow unknown MSR_EFER bits |
patchbot |
|
17:24 |
[Xen-changelog] [xen stable-4.8] x86/xstate: Make errors in xstate calculations more obvious by crashing the domain |
patchbot |
|
17:24 |
[Xen-changelog] [xen stable-4.8] x86/xstate: Use a guests CPUID policy, rather than allowing all features |
patchbot |
|
17:24 |
[Xen-changelog] [xen stable-4.8] x86/vmx: Don't clobber %dr6 while debugging state is lazy |
patchbot |
|
17:23 |
[Xen-changelog] [xen stable-4.8] x86: command line option to avoid use of secondary hyper-threads |
patchbot |
|
17:23 |
[Xen-changelog] [xen stable-4.8] x86: possibly bring up all CPUs even if not all are supposed to be used |
patchbot |
|
17:23 |
[Xen-changelog] [xen stable-4.8] x86: distinguish CPU offlining from CPU removal |
patchbot |
|
17:23 |
[Xen-changelog] [xen stable-4.8] x86/AMD: distinguish compute units from hyper-threads |
patchbot |
|
17:23 |
[Xen-changelog] [xen stable-4.8] cpupools: fix state when downing a CPU failed |
patchbot |
|
17:23 |
[Xen-changelog] [xen stable-4.8] allow cpu_down() to be called earlier |
patchbot |
|
17:22 |
[Xen-changelog] [xen stable-4.8] xen: oprofile/nmi_int.c: Drop unwanted sexual reference |
patchbot |
|
17:22 |
[Xen-changelog] [xen stable-4.8] x86/spec-ctrl: command line handling adjustments |
patchbot |
|
17:22 |
[Xen-changelog] [xen stable-4.8] x86: correctly set nonlazy_xstate_used when loading full state |
patchbot |
|
17:22 |
[Xen-changelog] [xen stable-4.8] xen: Port the array_index_nospec() infrastructure from Linux |
patchbot |
|
17:22 |
[Xen-changelog] [xen stable-4.8] cmdline: fix parse_boolean() for NULL incoming end pointer |
patchbot |
|
17:22 |
[Xen-changelog] [xen stable-4.8] update Xen version to 4.8.5-pre |
patchbot |
|
14:35 |
[Xen-changelog] [xen stable-4.10] x86/spec-ctrl: Fix the parsing of xpti= on fixed Intel hardware |
patchbot |
|
14:35 |
[Xen-changelog] [xen stable-4.10] x86/hvm: Disallow unknown MSR_EFER bits |
patchbot |
|
14:35 |
[Xen-changelog] [xen stable-4.10] x86/xstate: Make errors in xstate calculations more obvious by crashing the domain |
patchbot |
|
14:35 |
[Xen-changelog] [xen stable-4.10] x86/xstate: Use a guests CPUID policy, rather than allowing all features |
patchbot |
|
14:35 |
[Xen-changelog] [xen stable-4.10] x86/vmx: Don't clobber %dr6 while debugging state is lazy |
patchbot |
|
14:34 |
[Xen-changelog] [xen stable-4.10] x86: command line option to avoid use of secondary hyper-threads |
patchbot |
|
14:34 |
[Xen-changelog] [xen stable-4.10] x86: possibly bring up all CPUs even if not all are supposed to be used |
patchbot |
|
14:34 |
[Xen-changelog] [xen stable-4.10] x86: distinguish CPU offlining from CPU removal |
patchbot |
|
14:34 |
[Xen-changelog] [xen stable-4.10] x86/AMD: distinguish compute units from hyper-threads |
patchbot |
|
14:34 |
[Xen-changelog] [xen stable-4.10] cpupools: fix state when downing a CPU failed |
patchbot |
|
14:34 |
[Xen-changelog] [xen stable-4.10] x86/svm Fixes and cleanup to svm_inject_event() |
patchbot |
|
14:33 |
[Xen-changelog] [xen stable-4.10] allow cpu_down() to be called earlier |
patchbot |
|
14:33 |
[Xen-changelog] [xen stable-4.10] xen: oprofile/nmi_int.c: Drop unwanted sexual reference |
patchbot |
|
14:33 |
[Xen-changelog] [xen stable-4.10] mm/page_alloc: correct first_dirty calculations during block merging |
patchbot |
|
14:33 |
[Xen-changelog] [xen stable-4.10] x86/spec-ctrl: command line handling adjustments |
patchbot |
|
14:33 |
[Xen-changelog] [xen stable-4.10] x86: correctly set nonlazy_xstate_used when loading full state |
patchbot |
|
14:33 |
[Xen-changelog] [xen stable-4.10] xen: Port the array_index_nospec() infrastructure from Linux |
patchbot |
|
10:44 |
[Xen-changelog] [xen staging] tools/gdbsx: use inttypes.h instead of custom macros |
patchbot |
|
10:44 |
[Xen-changelog] [xen staging] tools/gdbsx: fix 'g' packet response for 64bit guests |
patchbot |
|
10:44 |
[Xen-changelog] [xen staging] xenstore-client: Add option for raw in-/output |
patchbot |
|
10:44 |
[Xen-changelog] [xen staging] docs: add xenstore-read and xenstore-write man pages |
patchbot |
|
10:44 |
[Xen-changelog] [xen staging] xenconsole: add option to avoid escape sequences in log |
patchbot |
|
10:44 |
[Xen-changelog] [xen staging] xen: clean up altp2m op comment |
patchbot |
|
03:33 |
[Xen-changelog] [xen master] libxl_qmp: Add a warning to not trust QEMU |
patchbot |
|
03:33 |
[Xen-changelog] [xen master] libxl_qmp: Move the buffer realloc to the same scope level as read |
patchbot |
|
03:33 |
[Xen-changelog] [xen master] libxl_json: fix build with DEBUG_ANSWER |
patchbot |
|
03:33 |
[Xen-changelog] [xen master] libxl_qmp: Fix use of DEBUG_RECEIVED |
patchbot |
|
03:33 |
[Xen-changelog] [xen master] libxl_qmp: Documentation of the logic of the QMP client |
patchbot |
|
03:33 |
[Xen-changelog] [xen master] libxl_event: Fix DEBUG prints |
patchbot |
|