xen-changelog Mail Thread Index
- [Xen-changelog] [xen staging] x86/hvm: Drop hvm_{vmx, svm} shorthands,
patchbot
- [Xen-changelog] [xen staging] x86/svm: Rename arch_svm_struct to svm_vcpu,
patchbot
- [Xen-changelog] [xen staging] x86/vmx: Rename arch_vmx_struct to vmx_vcpu,
patchbot
- [Xen-changelog] [xen staging] x86/hvm: Rename v->arch.hvm_vcpu to v->arch.hvm,
patchbot
- [Xen-changelog] [xen staging] xen/hvm: Rename d->arch.hvm_domain to d->arch.hvm,
patchbot
- [Xen-changelog] [xen staging] xen/domain: Allocate d->vcpu[] in domain_create(),
patchbot
- [Xen-changelog] [xen staging] xen/dom0: Arrange for dom0_cfg to contain the real max_vcpus value,
patchbot
- [Xen-changelog] [xen staging] tools: Pass max_vcpus to XEN_DOMCTL_createdomain,
patchbot
- [Xen-changelog] [xen staging] xen/domain: Call arch_domain_create() as early as possible in domain_create(),
patchbot
- [Xen-changelog] [xen staging] xen/gnttab: Fold grant_table_{create, set_limits}() into grant_table_init(),
patchbot
- [Xen-changelog] [xen staging] xen/domctl: Remove XEN_DOMCTL_set_gnttab_limits,
patchbot
- [Xen-changelog] [xen staging] xen/gnttab: Pass max_{grant, maptrack}_frames into grant_table_create(),
patchbot
- [Xen-changelog] [xen staging] tools: Pass grant table limits to XEN_DOMCTL_set_gnttab_limits,
patchbot
- [Xen-changelog] [xen stable-4.7] x86: write to correct variable in parse_pv_l1tf(),
patchbot
- [Xen-changelog] [xen stable-4.7] arm: constify atomic_read parameter,
patchbot
- [Xen-changelog] [xen stable-4.7] xl.conf: Add global affinity masks,
patchbot
- [Xen-changelog] [xen stable-4.7] x86: Make "spec-ctrl=no" a global disable of all mitigations,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/msr: Virtualise MSR_FLUSH_CMD for guests,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/shadow: Infrastructure to force a PV guest into shadow mode,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations,
patchbot
- [Xen-changelog] [xen stable-4.7] tools/oxenstored: Make evaluation order explicit,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits,
patchbot
- [Xen-changelog] [xen stable-4.7] ARM: disable grant table v2,
patchbot
- [Xen-changelog] [xen stable-4.7] common/gnttab: Introduce command line feature controls,
patchbot
- [Xen-changelog] [xen stable-4.7] VMX: fix vmx_{find, del}_msr() build,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/vmx: Support load-only guest MSR list entries,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/vmx: Support remote access to the MSR lists,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr(),
patchbot
- [Xen-changelog] [xen stable-4.7] x86/vmx: Internal cleanup for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/vmx: API improvements for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs(),
patchbot
- [Xen-changelog] [xen stable-4.7] x86/spec-ctrl: Yet more fixes for xpti= parsing,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/spec-ctrl: Fix the parsing of xpti= on fixed Intel hardware,
patchbot
- [Xen-changelog] [xen stable-4.7] x86: command line option to avoid use of secondary hyper-threads,
patchbot
- [Xen-changelog] [xen stable-4.7] x86: possibly bring up all CPUs even if not all are supposed to be used,
patchbot
- [Xen-changelog] [xen stable-4.7] x86: distinguish CPU offlining from CPU removal,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/AMD: distinguish compute units from hyper-threads,
patchbot
- [Xen-changelog] [xen stable-4.7] cpupools: fix state when downing a CPU failed,
patchbot
- [Xen-changelog] [xen stable-4.7] allow cpu_down() to be called earlier,
patchbot
- [Xen-changelog] [xen stable-4.7] x86/spec-ctrl: command line handling adjustments,
patchbot
- [Xen-changelog] [xen stable-4.7] xen: Port the array_index_nospec() infrastructure from Linux,
patchbot
- [Xen-changelog] [xen stable-4.7] cmdline: fix parse_boolean() for NULL incoming end pointer,
patchbot
- [Xen-changelog] [qemu-xen master] config: split PVRDMA from RDMA,
patchbot
- [Xen-changelog] [qemu-xen master] hw/pvrdma: remove not needed include,
patchbot
- [Xen-changelog] [xen staging] x86/pv: Deprecate support for paging out the LDT,
patchbot
- [Xen-changelog] [xen staging] x86/pv: Rename v->arch.pv_vcpu to v->arch.pv,
patchbot
- [Xen-changelog] [xen staging] x86/pv: Rename d->arch.pv_domain to d->arch.pv,
patchbot
- [Xen-changelog] [xen staging] x86/genapic: drop .target_cpus() hook,
patchbot
- [Xen-changelog] [xen staging] x86/grant: mute gcc 4.1.x warning in steal_linear_address(),
patchbot
- [Xen-changelog] [xen staging] x86/alternatives: allow using assembler macros in favor of C ones,
patchbot
- [Xen-changelog] [xen staging] VMX: reduce number of posted-interrupt hooks,
patchbot
- [Xen-changelog] [xen staging] x86/mm: re-arrange get_page_from_l<N>e() vs pv_l1tf_check_l<N>e(),
patchbot
- [Xen-changelog] [xen staging] x86/pt: split out HVM functions from vtd.c,
patchbot
- [Xen-changelog] [xen staging] x86/pt: make it build with !CONFIG_HVM,
patchbot
- [Xen-changelog] [xen staging] xen/arm: fix SMMU driver build,
patchbot
- [Xen-changelog] [xen master] Revert "x86/hvm: remove default ioreq server",
patchbot
- [Xen-changelog] [xen master] VT-d/dmar: iommu mem leak fix,
patchbot
- [Xen-changelog] [xen master] build: remove tboot make targets,
patchbot
- [Xen-changelog] [xen master] x86/hvm: remove default ioreq server,
patchbot
- [Xen-changelog] [xen master] x86/nestedhvm: provide some stubs for p2m code,
patchbot
- [Xen-changelog] [xen master] x86/mm/shadow: split out HVM only code,
patchbot
- [Xen-changelog] [xen master] x86/mm/shadow: make it build with !CONFIG_HVM,
patchbot
- [Xen-changelog] [xen master] x86/vm_event: put vm_event_fill_regs under CONFIG_HVM,
patchbot
- [Xen-changelog] [xen master] x86/mem_access: put HVM only function under CONFIG_HVM,
patchbot
- [Xen-changelog] [xen master] x86: guard HAS_VPCI with CONFIG_HVM,
patchbot
- [Xen-changelog] [xen master] xenforeignmemory: work around bug in older privcmd,
patchbot
- [Xen-changelog] [xen master] tools: building IPXE should be determined by CONFIG_IPXE,
patchbot
- [Xen-changelog] [xen staging] x86: reduce "visibility" of spec_ctrl_asm.h,
patchbot
- [Xen-changelog] [xen staging] x86: move quoting of __ASM_{STAC, CLAC},
patchbot
- [Xen-changelog] [xen staging] x86/alternatives: fully leverage automatic NOP filling,
patchbot
- [Xen-changelog] [xen staging] x86: drop NO_XPTI synthetic feature,
patchbot
- [Xen-changelog] [xen staging] x86/spec-ctrl: split reporting for PV and HVM guests,
patchbot
- [Xen-changelog] [xen staging] x86: report use of PCID together with reporting XPTI status,
patchbot
- [Xen-changelog] [xen staging] x86/alt: Fix build when CONFIG_LIVEPATCH is disabled,
patchbot
- [Xen-changelog] [xen staging] x86/build: Use new .nops directive when available,
patchbot
- [Xen-changelog] [xen staging] x86/shadow: Use mfn_t in shadow_track_dirty_vram(),
patchbot
- [Xen-changelog] [xen staging] x86/shadow: Clean up the MMIO fastpath helpers,
patchbot
- [Xen-changelog] [xen staging] x86/shadow: Use MASK_* helpers for the MMIO fastpath PTE manipulation,
patchbot
- [Xen-changelog] [xen staging] x86/shadow: Switch shadow_domain.has_fast_mmio_entries to bool,
patchbot
- [Xen-changelog] [xen staging] x86/shadow: Use more appropriate conversion functions,
patchbot
- [Xen-changelog] [xen staging] x86/mm: Use mfn_eq()/mfn_add() rather than opencoded variations,
patchbot
- [Xen-changelog] [xen staging] x86/domctl: XEN_DOMCTL_debug_op is HVM only,
patchbot
- [Xen-changelog] [xen staging] x86/mmcfg/drhd: Move acpi_mmcfg_init() call before calling acpi_parse_dmar(),
patchbot
- [Xen-changelog] [xen staging] VMX: make vmx_read_guest_msr() cope with callers not checking its return value,
patchbot
- [Xen-changelog] [xen staging] xenforeignmemory: fix fd leakage in error path,
patchbot
- [Xen-changelog] [xen staging] rombios: remove packed attribute for pushad_regs_t,
patchbot
- [Xen-changelog] [xen staging] xen: is_hvm_{domain, vcpu} should evaluate to false when !CONFIG_HVM,
patchbot
- [Xen-changelog] [xen staging] xen/xsm: Rename CONFIG_XSM_POLICY to CONFIG_XSM_FLASK_POLICY,
patchbot
- [Xen-changelog] [xen staging] xen/xsm: Rename CONFIG_FLASK_* to CONFIG_XSM_FLASK_*,
patchbot
- [Xen-changelog] [xen staging] x86/svm: Fixes to OS Visible Workaround handling,
patchbot
- [Xen-changelog] [xen staging] xen/pt: io.c contains HVM only code,
patchbot
- [Xen-changelog] [xen staging] x86/vpmu: put HVM only code under CONFIG_HVM,
patchbot
- [Xen-changelog] [xen staging] x86: provide stub for memory_type_changed,
patchbot
- [Xen-changelog] [xen staging] x86/hvm: provide hvm_hap_supported,
patchbot
- [Xen-changelog] [xen staging] x86: enclose hvm_op and dm_op in CONFIG_HVM in relevant tables,
patchbot
- [Xen-changelog] [qemu-xen staging] config: split PVRDMA from RDMA,
patchbot
- [Xen-changelog] [qemu-xen staging] hw/pvrdma: remove not needed include,
patchbot
- [Xen-changelog] [xen staging] Revert "x86/hvm: remove default ioreq server",
patchbot
- [Xen-changelog] [xen staging] VT-d/dmar: iommu mem leak fix,
patchbot
- [Xen-changelog] [xen staging] build: remove tboot make targets,
patchbot
- [Xen-changelog] [xen staging] x86/hvm: remove default ioreq server,
patchbot
- [Xen-changelog] [xen staging] x86/nestedhvm: provide some stubs for p2m code,
patchbot
- [Xen-changelog] [xen staging] x86/mm/shadow: split out HVM only code,
patchbot
- [Xen-changelog] [xen staging] x86/mm/shadow: make it build with !CONFIG_HVM,
patchbot
- [Xen-changelog] [xen staging] x86/vm_event: put vm_event_fill_regs under CONFIG_HVM,
patchbot
- [Xen-changelog] [xen staging] x86/mem_access: put HVM only function under CONFIG_HVM,
patchbot
- [Xen-changelog] [xen staging] x86: guard HAS_VPCI with CONFIG_HVM,
patchbot
- [Xen-changelog] [xen staging] xenforeignmemory: work around bug in older privcmd,
patchbot
- [Xen-changelog] [xen staging] tools: building IPXE should be determined by CONFIG_IPXE,
patchbot
- [Xen-changelog] [xen master] QEMU_TAG update,
patchbot
- [Xen-changelog] [xen master] xen/arm: p2m: Introduce a new variable removing_mapping in __p2m_set_entry,
patchbot
- [Xen-changelog] [xen master] xen/arm: p2m: Rename ret to mfn in p2m_lookup,
patchbot
- [Xen-changelog] [xen master] xen/arm: guest_walk: Use lpae_is_mapping to simplify the code,
patchbot
- [Xen-changelog] [xen master] xen/arm: Rename lpae_valid to lpae_is_valid,
patchbot
- [Xen-changelog] [xen master] xen/arm: Rework lpae_table,
patchbot
- [Xen-changelog] [xen master] xen/arm: Rework lpae_mapping,
patchbot
- [Xen-changelog] [xen master] xen/arm: p2m: Limit call to mem access code use in get_page_from_gva,
patchbot
- [Xen-changelog] [xen master] xen/arm: p2m: Reduce the locking section in get_page_from_gva,
patchbot
- [Xen-changelog] [xen master] xen/arm: cpregs: Fix typo in the documentation of TTBCR,
patchbot
- [Xen-changelog] [xen master] xen/arm: cpregs: Allow HSR_CPREG* to receive more than 1 parameter,
patchbot
- [Xen-changelog] [xen master] xen/arm: rename acpi_make_chosen_node to make_chosen_node,
patchbot
- [Xen-changelog] [xen master] xen/arm: move evtchn_allocate call out of make_hypervisor_node,
patchbot
- [Xen-changelog] [xen master] xen/arm: move a few DT related defines to public/device_tree_defs.h,
patchbot
- [Xen-changelog] [xen master] xen/arm: do not pass dt_host to make_memory_node and make_hypervisor_node,
patchbot
- [Xen-changelog] [xen master] xen/arm: drivers: scif: Remove unused #define-s,
patchbot
- [Xen-changelog] [xen master] x86/oprofile: put SVM only code under CONFIG_HVM,
patchbot
- [Xen-changelog] [xen master] x86/mtrr: move is_var_mtrr_overlapped,
patchbot
- [Xen-changelog] [xen master] x86/amd: skip OSVW function calls if !CONFIG_HVM,
patchbot
- [Xen-changelog] [xen master] x86/vmce: enclose HVM load / save code in CONFIG_HVM,
patchbot
- [Xen-changelog] [xen master] x86/pt: add HVM check to XEN_DOMCTL_unbind_pt_irq,
patchbot
- [Xen-changelog] [xen master] x86/mm: don't reference hvm_funcs directly,
patchbot
- [Xen-changelog] [xen master] x86/vvmx: make get_shadow_eptp static function,
patchbot
- [Xen-changelog] [xen master] x86: HVM_FEP should depend on HVM,
patchbot
- [Xen-changelog] [xen master] xen: fix building !CONFIG_LOCK_PROFILE,
patchbot
- [Xen-changelog] [xen master] libxl_qmp: Disable beautify for QMP generated cmd,
patchbot
- [Xen-changelog] [xen master] libxl_qmp: Simplify qmp_response_type() prototype,
patchbot
- [Xen-changelog] [xen master] libxl_json: libxl__json_object_to_json,
patchbot
- [Xen-changelog] [xen master] libxl_json: Enable yajl_allow_trailing_garbage,
patchbot
- [Xen-changelog] [xen master] libxl_dm: Add libxl__qemu_qmp_path(),
patchbot
- [Xen-changelog] [xen master] libxl_json: constify libxl__json_object_to_yajl_gen arguments,
patchbot
- [Xen-changelog] [xen master] libxl_qmp: Remove unused yajl_ctx from handler,
patchbot
- [Xen-changelog] [xen master] libxl: Add libxl__prepare_sockaddr_un() helper,
patchbot
- [Xen-changelog] [xen master] libxl_qmp: Move struct sockaddr_un variable to qmp_open(),
patchbot
- [Xen-changelog] [xen master] tools: fix uninstall: tests/x86_emulator, Linux hotplug,
patchbot
- [Xen-changelog] [xen master] libgnttab: Add support for Linux dma-buf,
patchbot
- [Xen-changelog] [xen master] MAINTAINERS: add myself as a reviewer for x86 patches,
patchbot
- [Xen-changelog] [xen master] automation: build with debian unstable,
patchbot
- [Xen-changelog] [xen stable-4.10] tools: prepend to PKG_CONFIG_PATH when configuring qemu,
patchbot
- [Xen-changelog] [xen stable-4.11] libxl: start pvqemu when 9pfs is requested,
patchbot
- [Xen-changelog] [xen staging-4.10] tools: prepend to PKG_CONFIG_PATH when configuring qemu,
patchbot
- [Xen-changelog] [xen staging] QEMU_TAG update,
patchbot
- [Xen-changelog] [qemu-xen-traditional master] qemu-trad: stop using the default IOREQ server,
patchbot
- [Xen-changelog] [xen staging] xen/arm: p2m: Introduce a new variable removing_mapping in __p2m_set_entry,
patchbot
- [Xen-changelog] [xen staging] xen/arm: p2m: Rename ret to mfn in p2m_lookup,
patchbot
- [Xen-changelog] [xen staging] xen/arm: guest_walk: Use lpae_is_mapping to simplify the code,
patchbot
- [Xen-changelog] [xen staging] xen/arm: Rename lpae_valid to lpae_is_valid,
patchbot
- [Xen-changelog] [xen staging] xen/arm: Rework lpae_table,
patchbot
- [Xen-changelog] [xen staging] xen/arm: Rework lpae_mapping,
patchbot
- [Xen-changelog] [xen staging] xen/arm: p2m: Limit call to mem access code use in get_page_from_gva,
patchbot
- [Xen-changelog] [xen staging] xen/arm: p2m: Reduce the locking section in get_page_from_gva,
patchbot
- [Xen-changelog] [xen staging] xen/arm: cpregs: Fix typo in the documentation of TTBCR,
patchbot
- [Xen-changelog] [xen staging] xen/arm: cpregs: Allow HSR_CPREG* to receive more than 1 parameter,
patchbot
- [Xen-changelog] [xen staging] xen/arm: rename acpi_make_chosen_node to make_chosen_node,
patchbot
- [Xen-changelog] [xen staging] xen/arm: move evtchn_allocate call out of make_hypervisor_node,
patchbot
- [Xen-changelog] [xen staging] xen/arm: move a few DT related defines to public/device_tree_defs.h,
patchbot
- [Xen-changelog] [xen staging] xen/arm: do not pass dt_host to make_memory_node and make_hypervisor_node,
patchbot
- [Xen-changelog] [xen staging] xen/arm: drivers: scif: Remove unused #define-s,
patchbot
- [Xen-changelog] [xen stable-4.10] libxl: start pvqemu when 9pfs is requested,
patchbot
- [Xen-changelog] [xen master] tools/tests: fix an xs-test.c issue,
patchbot
- [Xen-changelog] [xen master] tools/kdd: work around gcc 8.1 bug,
patchbot
- [Xen-changelog] [xen master] xenpmd: make 32 bit gcc 8.1 non-debug build work,
patchbot
- [Xen-changelog] [xen master] tools: update ipxe changeset,
patchbot
- [Xen-changelog] [xen master] libxl/arm: Fix build on arm64 + acpi w/ gcc 8.2,
patchbot
- [Xen-changelog] [xen master] x86/mmcfg: rename pt_pci_init() and call it from acpi_mmcfg_init(),
patchbot
- [Xen-changelog] [xen master] libxc: copy back the result of XEN_DOMCTL_createdomain,
patchbot
- [Xen-changelog] [xen master] rangeset: make inquiry functions tolerate NULL inputs,
patchbot
- [Xen-changelog] [xen master] dom0/pvh: change the order of the MMCFG initialization,
patchbot
- [Xen-changelog] [xen master] x86: remove page.h and processor.h inclusion from asm_defns.h,
patchbot
- [Xen-changelog] [xen master] x86/HVM: correct an inverted check in hvm_load(),
patchbot
- [Xen-changelog] [xen master] x86: make arch_set_info_guest() match comments in load_segments(),
patchbot
- [Xen-changelog] [xen master] x86/setup: Avoid OoB E820 lookup when calculating the L1TF safe address,
patchbot
- [Xen-changelog] [xen master] libxl: fix ARM build after 54ed251dc7,
patchbot
- [Xen-changelog] [xen master] x86/mmcfg: remove redundant code in pci_mmcfg_reject_broken(),
patchbot
- [Xen-changelog] [xen master] gnttab/ARM: properly implement gnttab_create_status_page(),
patchbot
- [Xen-changelog] [xen master] x86/hvm/emulate: make sure rep I/O emulation does not cross GFN boundaries,
patchbot
- [Xen-changelog] [xen master] xen/evtchn: Pass max_evtchn_port into evtchn_init(),
patchbot
- [Xen-changelog] [xen master] xen/domctl: Merge set_max_evtchn into createdomain,
patchbot
- [Xen-changelog] [xen master] tools: Rework xc_domain_create() to take a full xen_domctl_createdomain,
patchbot
- [Xen-changelog] [xen master] tools/ocaml: Pass a full domctl_create_config into stub_xc_domain_create(),
patchbot
- [Xen-changelog] [xen staging] x86/oprofile: put SVM only code under CONFIG_HVM,
patchbot
- [Xen-changelog] [xen staging] x86/mtrr: move is_var_mtrr_overlapped,
patchbot
- [Xen-changelog] [xen staging] x86/amd: skip OSVW function calls if !CONFIG_HVM,
patchbot
- [Xen-changelog] [xen staging] x86/vmce: enclose HVM load / save code in CONFIG_HVM,
patchbot
- [Xen-changelog] [xen staging] x86/pt: add HVM check to XEN_DOMCTL_unbind_pt_irq,
patchbot
- [Xen-changelog] [xen staging] x86/mm: don't reference hvm_funcs directly,
patchbot
- [Xen-changelog] [xen staging] x86/vvmx: make get_shadow_eptp static function,
patchbot
- [Xen-changelog] [xen staging] x86: HVM_FEP should depend on HVM,
patchbot
- [Xen-changelog] [xen staging] xen: fix building !CONFIG_LOCK_PROFILE,
patchbot
- [Xen-changelog] [xen staging] libxl_qmp: Disable beautify for QMP generated cmd,
patchbot
- [Xen-changelog] [xen staging] libxl_qmp: Simplify qmp_response_type() prototype,
patchbot
- [Xen-changelog] [xen staging] libxl_json: libxl__json_object_to_json,
patchbot
- [Xen-changelog] [xen staging] libxl_json: Enable yajl_allow_trailing_garbage,
patchbot
- [Xen-changelog] [xen staging] libxl_dm: Add libxl__qemu_qmp_path(),
patchbot
- [Xen-changelog] [xen staging] libxl_json: constify libxl__json_object_to_yajl_gen arguments,
patchbot
- [Xen-changelog] [xen staging] libxl_qmp: Remove unused yajl_ctx from handler,
patchbot
- [Xen-changelog] [xen staging] libxl: Add libxl__prepare_sockaddr_un() helper,
patchbot
- [Xen-changelog] [xen staging] libxl_qmp: Move struct sockaddr_un variable to qmp_open(),
patchbot
- [Xen-changelog] [xen staging] tools: fix uninstall: tests/x86_emulator, Linux hotplug,
patchbot
- [Xen-changelog] [xen staging] libgnttab: Add support for Linux dma-buf,
patchbot
- [Xen-changelog] [xen staging] MAINTAINERS: add myself as a reviewer for x86 patches,
patchbot
- [Xen-changelog] [xen staging-4.9] libxl: start pvqemu when 9pfs is requested,
patchbot
- [Xen-changelog] [xen staging-4.10] libxl: start pvqemu when 9pfs is requested,
patchbot
- [Xen-changelog] [xen staging-4.11] libxl: start pvqemu when 9pfs is requested,
patchbot
- [Xen-changelog] [xen staging] automation: build with debian unstable,
patchbot
- [Xen-changelog] [xen staging] tools/tests: fix an xs-test.c issue,
patchbot
- [Xen-changelog] [xen staging] tools/kdd: work around gcc 8.1 bug,
patchbot
- [Xen-changelog] [xen staging] xenpmd: make 32 bit gcc 8.1 non-debug build work,
patchbot
- [Xen-changelog] [xen staging] tools: update ipxe changeset,
patchbot
- [Xen-changelog] [xen stable-4.10] x86: write to correct variable in parse_pv_l1tf(),
patchbot
- [Xen-changelog] [xen stable-4.10] xl.conf: Add global affinity masks,
patchbot
- [Xen-changelog] [xen stable-4.10] x86: Make "spec-ctrl=no" a global disable of all mitigations,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/msr: Virtualise MSR_FLUSH_CMD for guests,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/shadow: Infrastructure to force a PV guest into shadow mode,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations,
patchbot
- [Xen-changelog] [xen stable-4.10] tools/oxenstored: Make evaluation order explicit,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits,
patchbot
- [Xen-changelog] [xen stable-4.10] ARM: disable grant table v2,
patchbot
- [Xen-changelog] [xen stable-4.10] common/gnttab: Introduce command line feature controls,
patchbot
- [Xen-changelog] [xen stable-4.10] VMX: fix vmx_{find, del}_msr() build,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/vmx: Support load-only guest MSR list entries,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/vmx: Pass an MSR value into vmx_msr_add(),
patchbot
- [Xen-changelog] [xen stable-4.10] x86/vmx: Improvements to LBR MSR handling,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/vmx: Support remote access to the MSR lists,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr(),
patchbot
- [Xen-changelog] [xen stable-4.10] x86/vmx: Internal cleanup for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/vmx: API improvements for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs(),
patchbot
- [Xen-changelog] [xen stable-4.10] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/spec-ctrl: Yet more fixes for xpti= parsing,
patchbot
- [Xen-changelog] [xen stable-4.8] x86: write to correct variable in parse_pv_l1tf(),
patchbot
- [Xen-changelog] [xen stable-4.8] xl.conf: Add global affinity masks,
patchbot
- [Xen-changelog] [xen stable-4.8] x86: Make "spec-ctrl=no" a global disable of all mitigations,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/msr: Virtualise MSR_FLUSH_CMD for guests,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/shadow: Infrastructure to force a PV guest into shadow mode,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations,
patchbot
- [Xen-changelog] [xen stable-4.8] tools/oxenstored: Make evaluation order explicit,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits,
patchbot
- [Xen-changelog] [xen stable-4.8] ARM: disable grant table v2,
patchbot
- [Xen-changelog] [xen stable-4.8] common/gnttab: Introduce command line feature controls,
patchbot
- [Xen-changelog] [xen stable-4.8] VMX: fix vmx_{find, del}_msr() build,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/vmx: Support load-only guest MSR list entries,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/vmx: Pass an MSR value into vmx_msr_add(),
patchbot
- [Xen-changelog] [xen stable-4.8] x86/vmx: Improvements to LBR MSR handling,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/vmx: Support remote access to the MSR lists,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr(),
patchbot
- [Xen-changelog] [xen stable-4.8] x86/vmx: Internal cleanup for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/vmx: API improvements for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs(),
patchbot
- [Xen-changelog] [xen stable-4.8] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/spec-ctrl: Yet more fixes for xpti= parsing,
patchbot
- [Xen-changelog] [xen master] x86/pv: Use xmemdup() for cpuidmasks, rather than opencoding it,
patchbot
- [Xen-changelog] [xen master] x86/ptwr: Misc cleanup to ptwr_emulated_update(),
patchbot
- [Xen-changelog] [xen master] x86: write to correct variable in parse_pv_l1tf(),
patchbot
- [Xen-changelog] [xen master] x86/hvm/ioreq: MMIO range checking completely ignores direction flag,
patchbot
- [Xen-changelog] [xen master] libs/foreignmemory: Avoid printing an error for ENOTSUPP,
patchbot
- [Xen-changelog] [xen master] libxl: start pvqemu when 9pfs is requested,
patchbot
- [Xen-changelog] [xen master] pygrub: fix package version,
patchbot
- [Xen-changelog] [xen master] xen: fix stale PVH comment,
patchbot
- [Xen-changelog] [xen master] xl.conf: Add global affinity masks,
patchbot
- [Xen-changelog] [xen master] x86: Make "spec-ctrl=no" a global disable of all mitigations,
patchbot
- [Xen-changelog] [xen master] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests,
patchbot
- [Xen-changelog] [xen master] x86/msr: Virtualise MSR_FLUSH_CMD for guests,
patchbot
- [Xen-changelog] [xen master] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH,
patchbot
- [Xen-changelog] [xen master] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE,
patchbot
- [Xen-changelog] [xen master] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART,
patchbot
- [Xen-changelog] [xen master] x86/shadow: Infrastructure to force a PV guest into shadow mode,
patchbot
- [Xen-changelog] [xen master] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests,
patchbot
- [Xen-changelog] [xen master] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations,
patchbot
- [Xen-changelog] [xen master] tools/oxenstored: Make evaluation order explicit,
patchbot
- [Xen-changelog] [xen master] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits,
patchbot
- [Xen-changelog] [xen master] ARM: disable grant table v2,
patchbot
- [Xen-changelog] [xen master] x86/spec-ctrl: Yet more fixes for xpti= parsing,
patchbot
- [Xen-changelog] [xen master] tools/libxenctrl: use new xenforeignmemory API to seed grant table,
patchbot
- [Xen-changelog] [xen master] common: add a new mappable resource type: XENMEM_resource_grant_table,
patchbot
- [Xen-changelog] [xen master] common/gnttab: Explicitly default to gnttab v1 during domain creation,
patchbot
- [Xen-changelog] [xen master] x86/vlapic: Bugfixes and improvements to vlapic_{read, write}(),
patchbot
- [Xen-changelog] [xen master] x86: move arch_evtchn_inject to x86 common code,
patchbot
- [Xen-changelog] [xen master] x86: add missing "inline" keyword,
patchbot
- [Xen-changelog] [xen master] x86: put compat.o and x86_64/compat.o under CONFIG_PV,
patchbot
- [Xen-changelog] [xen master] drop {,acpi_}reserve_bootmem(),
patchbot
- [Xen-changelog] [xen master] x86/hvm: Drop hvm_sr_handlers initializer,
patchbot
- [Xen-changelog] [xen master] automation: ensure created are not owned as root,
patchbot
- [Xen-changelog] [xen master] automation: remove dead code from containerize,
patchbot
- [Xen-changelog] [xen master] automation: drop container name from containerize,
patchbot
- [Xen-changelog] [xen master] automation: standardize containerize env names,
patchbot
- [Xen-changelog] [xen master] xen: specify support for EXPERT and DEBUG Kconfig options,
patchbot
- [Xen-changelog] [xen master] xen: add cloc target,
patchbot
- [Xen-changelog] [xen master] xen: add per-platform defaults for NR_CPUS,
patchbot
- [Xen-changelog] [xen master] arm: add ALL_PLAT, QEMU, Rcar3 and MPSoC configs,
patchbot
- [Xen-changelog] [xen master] arm: add a tiny kconfig configuration,
patchbot
- [Xen-changelog] [xen master] arm: make it possible to disable the SMMU driver,
patchbot
- [Xen-changelog] [xen master] make it possible to enable/disable UART drivers,
patchbot
- [Xen-changelog] [xen master] Make MEM_ACCESS configurable,
patchbot
- [Xen-changelog] [xen master] arm: rename HAS_GICV3 to GICV3,
patchbot
- [Xen-changelog] [xen master] arm: make it possible to disable HAS_GICV3,
patchbot
- [Xen-changelog] [xen master] x86/altp2m: make sure EPTP_INDEX is up-to-date when enabling #VE,
patchbot
- [Xen-changelog] [xen master] x86/cpuidle: replace a pointless NULL check,
patchbot
- [Xen-changelog] [xen master] vtd: cleanup vtd_set_hwdom_mapping after ia64 removal,
patchbot
- [Xen-changelog] [xen master] xen: Remove domain_crash_synchronous() completely,
patchbot
- [Xen-changelog] [xen master] x86/vmx: Avoid using domain_crash_syncrhonous() in vmx_vmentry_failure(),
patchbot
- [Xen-changelog] [xen master] x86/vmx: Avoid hitting BUG_ON() after EPTP-related domain_crash(),
patchbot
- [Xen-changelog] [xen master] tools/gdbsx: use inttypes.h instead of custom macros,
patchbot
- [Xen-changelog] [xen master] tools/gdbsx: fix 'g' packet response for 64bit guests,
patchbot
- [Xen-changelog] [xen master] xenstore-client: Add option for raw in-/output,
patchbot
- [Xen-changelog] [xen master] docs: add xenstore-read and xenstore-write man pages,
patchbot
- [Xen-changelog] [xen master] xenconsole: add option to avoid escape sequences in log,
patchbot
- [Xen-changelog] [xen master] xen: clean up altp2m op comment,
patchbot
- [Xen-changelog] [xen master] hvm/altp2m: Clarify the proper way to extend the altp2m interface,
patchbot
- [Xen-changelog] [xen master] x86/xstate: correct logging in handle_xsetbv(),
patchbot
- [Xen-changelog] [xen master] memory: fix label syntax,
patchbot
- [Xen-changelog] [xen master] iommu: remove unneeded return from iommu_hwdom_init,
patchbot
- [Xen-changelog] [xen master] x86/efi: split compiler vs linker support,
patchbot
- [Xen-changelog] [xen master] x86/efi: move the logic to detect PE build support,
patchbot
- [Xen-changelog] [xen master] xen/compiler: introduce a define for weak symbols,
patchbot
- [Xen-changelog] [xen master] ci: enable builds with CentOS 7.x,
patchbot
- [Xen-changelog] [xen master] automation: add CentOS 7.x image,
patchbot
- [Xen-changelog] [xen stable-4.11] x86: write to correct variable in parse_pv_l1tf(),
patchbot
- [Xen-changelog] [xen stable-4.6] amend "x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH",
patchbot
- [Xen-changelog] [xen stable-4.6] amend "x86/Intel: Mitigations for GPZ SP4 - Speculative Store Bypass",
patchbot
- [Xen-changelog] [xen stable-4.6] x86: write to correct variable in parse_pv_l1tf(),
patchbot
- [Xen-changelog] [xen stable-4.6] arm: constify atomic_read parameter,
patchbot
- [Xen-changelog] [xen stable-4.6] xl.conf: Add global affinity masks,
patchbot
- [Xen-changelog] [xen stable-4.6] x86: Make "spec-ctrl=no" a global disable of all mitigations,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/msr: Virtualise MSR_FLUSH_CMD for guests,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/shadow: Infrastructure to force a PV guest into shadow mode,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations,
patchbot
- [Xen-changelog] [xen stable-4.6] tools/oxenstored: Make evaluation order explicit,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits,
patchbot
- [Xen-changelog] [xen stable-4.6] ARM: disable grant table v2,
patchbot
- [Xen-changelog] [xen stable-4.6] common/gnttab: Introduce command line feature controls,
patchbot
- [Xen-changelog] [xen stable-4.6] VMX: fix vmx_{find, del}_msr() build,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/vmx: Support load-only guest MSR list entries,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/vmx: Support remote access to the MSR lists,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr(),
patchbot
- [Xen-changelog] [xen stable-4.6] x86/vmx: Internal cleanup for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/vmx: API improvements for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs(),
patchbot
- [Xen-changelog] [xen stable-4.6] x86/spec-ctrl: Yet more fixes for xpti= parsing,
patchbot
- [Xen-changelog] [xen staging] libxl/arm: Fix build on arm64 + acpi w/ gcc 8.2,
patchbot
- [Xen-changelog] [xen staging] x86/mmcfg: rename pt_pci_init() and call it from acpi_mmcfg_init(),
patchbot
- [Xen-changelog] [xen staging] libxc: copy back the result of XEN_DOMCTL_createdomain,
patchbot
- [Xen-changelog] [xen staging] rangeset: make inquiry functions tolerate NULL inputs,
patchbot
- [Xen-changelog] [xen staging] dom0/pvh: change the order of the MMCFG initialization,
patchbot
- [Xen-changelog] [xen staging] x86: remove page.h and processor.h inclusion from asm_defns.h,
patchbot
- [Xen-changelog] [xen staging] x86/HVM: correct an inverted check in hvm_load(),
patchbot
- [Xen-changelog] [xen staging] x86: make arch_set_info_guest() match comments in load_segments(),
patchbot
- [Xen-changelog] [qemu-xen master] main loop: Big hammer to fix logfile disk DoS in Xen setups,
patchbot
- [Xen-changelog] [qemu-xen master] Merge tag 'v3.0.0' into 'staging',
patchbot
- [Xen-changelog] [xen staging] x86/setup: Avoid OoB E820 lookup when calculating the L1TF safe address,
patchbot
- [Xen-changelog] [xen staging] libxl: fix ARM build after 54ed251dc7,
patchbot
- [Xen-changelog] [xen stable-4.11] xl.conf: Add global affinity masks,
patchbot
- [Xen-changelog] [xen stable-4.11] x86: Make "spec-ctrl=no" a global disable of all mitigations,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/msr: Virtualise MSR_FLUSH_CMD for guests,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/shadow: Infrastructure to force a PV guest into shadow mode,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations,
patchbot
- [Xen-changelog] [xen stable-4.11] tools/oxenstored: Make evaluation order explicit,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits,
patchbot
- [Xen-changelog] [xen stable-4.11] ARM: disable grant table v2,
patchbot
- [Xen-changelog] [xen stable-4.11] VMX: fix vmx_{find, del}_msr() build,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/vmx: Support load-only guest MSR list entries,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/vmx: Pass an MSR value into vmx_msr_add(),
patchbot
- [Xen-changelog] [xen stable-4.11] x86/vmx: Improvements to LBR MSR handling,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/vmx: Support remote access to the MSR lists,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr(),
patchbot
- [Xen-changelog] [xen stable-4.11] x86/vmx: Internal cleanup for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/vmx: API improvements for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs(),
patchbot
- [Xen-changelog] [xen stable-4.11] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit,
patchbot
- [Xen-changelog] [xen stable-4.11] x86/spec-ctrl: Yet more fixes for xpti= parsing,
patchbot
- [Xen-changelog] [xen staging] x86/mmcfg: remove redundant code in pci_mmcfg_reject_broken(),
patchbot
- [Xen-changelog] [xen staging] gnttab/ARM: properly implement gnttab_create_status_page(),
patchbot
- [Xen-changelog] [xen staging] x86/hvm/emulate: make sure rep I/O emulation does not cross GFN boundaries,
patchbot
- [Xen-changelog] [xen staging] xen/evtchn: Pass max_evtchn_port into evtchn_init(),
patchbot
- [Xen-changelog] [xen staging] xen/domctl: Merge set_max_evtchn into createdomain,
patchbot
- [Xen-changelog] [xen staging] tools: Rework xc_domain_create() to take a full xen_domctl_createdomain,
patchbot
- [Xen-changelog] [xen staging] tools/ocaml: Pass a full domctl_create_config into stub_xc_domain_create(),
patchbot
- [Xen-changelog] [xen staging] x86/pv: Use xmemdup() for cpuidmasks, rather than opencoding it,
patchbot
- [Xen-changelog] [xen staging] x86/ptwr: Misc cleanup to ptwr_emulated_update(),
patchbot
- [Xen-changelog] [xen staging-4.6] amend "x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH",
patchbot
- [Xen-changelog] [xen staging-4.6] amend "x86/Intel: Mitigations for GPZ SP4 - Speculative Store Bypass",
patchbot
- [Xen-changelog] [xen staging-4.6] x86: write to correct variable in parse_pv_l1tf(),
patchbot
- [Xen-changelog] [xen staging-4.7] x86: write to correct variable in parse_pv_l1tf(),
patchbot
- [Xen-changelog] [xen staging-4.8] x86: write to correct variable in parse_pv_l1tf(),
patchbot
- [Xen-changelog] [xen staging-4.9] x86: write to correct variable in parse_pv_l1tf(),
patchbot
- [Xen-changelog] [xen staging-4.10] x86: write to correct variable in parse_pv_l1tf(),
patchbot
- [Xen-changelog] [xen staging-4.11] x86: write to correct variable in parse_pv_l1tf(),
patchbot
- [Xen-changelog] [xen staging] x86: write to correct variable in parse_pv_l1tf(),
patchbot
- [Xen-changelog] [xen staging] x86/hvm/ioreq: MMIO range checking completely ignores direction flag,
patchbot
- [Xen-changelog] [qemu-xen staging] main loop: Big hammer to fix logfile disk DoS in Xen setups,
patchbot
- [Xen-changelog] [qemu-xen staging] Merge tag 'v3.0.0' into 'staging',
patchbot
- [Xen-changelog] [xen staging-4.6] arm: constify atomic_read parameter,
patchbot
- [Xen-changelog] [xen staging-4.7] arm: constify atomic_read parameter,
patchbot
- [Xen-changelog] [xen staging] libs/foreignmemory: Avoid printing an error for ENOTSUPP,
patchbot
- [Xen-changelog] [xen staging] libxl: start pvqemu when 9pfs is requested,
patchbot
- [Xen-changelog] [xen staging] pygrub: fix package version,
patchbot
- [Xen-changelog] [xen staging] xen: fix stale PVH comment,
patchbot
- [Xen-changelog] [xen staging-4.6] xl.conf: Add global affinity masks,
patchbot
- [Xen-changelog] [xen staging-4.6] x86: Make "spec-ctrl=no" a global disable of all mitigations,
patchbot
- [Xen-changelog] [xen staging-4.6] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests,
patchbot
- [Xen-changelog] [xen staging-4.6] x86/msr: Virtualise MSR_FLUSH_CMD for guests,
patchbot
- [Xen-changelog] [xen staging-4.6] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH,
patchbot
- [Xen-changelog] [xen staging-4.6] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE,
patchbot
- [Xen-changelog] [xen staging-4.6] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART,
patchbot
- [Xen-changelog] [xen staging-4.6] x86/shadow: Infrastructure to force a PV guest into shadow mode,
patchbot
- [Xen-changelog] [xen staging-4.6] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests,
patchbot
- [Xen-changelog] [xen staging-4.6] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations,
patchbot
- [Xen-changelog] [xen staging-4.6] tools/oxenstored: Make evaluation order explicit,
patchbot
- [Xen-changelog] [xen staging-4.6] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits,
patchbot
- [Xen-changelog] [xen staging-4.6] ARM: disable grant table v2,
patchbot
- [Xen-changelog] [xen staging-4.6] common/gnttab: Introduce command line feature controls,
patchbot
- [Xen-changelog] [xen staging-4.6] VMX: fix vmx_{find, del}_msr() build,
patchbot
- [Xen-changelog] [xen staging-4.6] x86/vmx: Support load-only guest MSR list entries,
patchbot
- [Xen-changelog] [xen staging-4.6] x86/vmx: Support remote access to the MSR lists,
patchbot
- [Xen-changelog] [xen staging-4.6] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr(),
patchbot
- [Xen-changelog] [xen staging-4.6] x86/vmx: Internal cleanup for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen staging-4.6] x86/vmx: API improvements for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen staging-4.6] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs(),
patchbot
- [Xen-changelog] [xen staging-4.6] x86/spec-ctrl: Yet more fixes for xpti= parsing,
patchbot
- [Xen-changelog] [xen staging-4.7] xl.conf: Add global affinity masks,
patchbot
- [Xen-changelog] [xen staging-4.7] x86: Make "spec-ctrl=no" a global disable of all mitigations,
patchbot
- [Xen-changelog] [xen staging-4.7] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests,
patchbot
- [Xen-changelog] [xen staging-4.7] x86/msr: Virtualise MSR_FLUSH_CMD for guests,
patchbot
- [Xen-changelog] [xen staging-4.7] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH,
patchbot
- [Xen-changelog] [xen staging-4.7] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE,
patchbot
- [Xen-changelog] [xen staging-4.7] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART,
patchbot
- [Xen-changelog] [xen staging-4.7] x86/shadow: Infrastructure to force a PV guest into shadow mode,
patchbot
- [Xen-changelog] [xen staging-4.7] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests,
patchbot
- [Xen-changelog] [xen staging-4.7] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations,
patchbot
- [Xen-changelog] [xen staging-4.7] tools/oxenstored: Make evaluation order explicit,
patchbot
- [Xen-changelog] [xen staging-4.7] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits,
patchbot
- [Xen-changelog] [xen staging-4.7] ARM: disable grant table v2,
patchbot
- [Xen-changelog] [xen staging-4.7] common/gnttab: Introduce command line feature controls,
patchbot
- [Xen-changelog] [xen staging-4.7] VMX: fix vmx_{find, del}_msr() build,
patchbot
- [Xen-changelog] [xen staging-4.7] x86/vmx: Support load-only guest MSR list entries,
patchbot
- [Xen-changelog] [xen staging-4.7] x86/vmx: Support remote access to the MSR lists,
patchbot
- [Xen-changelog] [xen staging-4.7] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr(),
patchbot
- [Xen-changelog] [xen staging-4.7] x86/vmx: Internal cleanup for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen staging-4.7] x86/vmx: API improvements for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen staging-4.7] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs(),
patchbot
- [Xen-changelog] [xen staging-4.7] x86/spec-ctrl: Yet more fixes for xpti= parsing,
patchbot
- [Xen-changelog] [xen staging-4.8] xl.conf: Add global affinity masks,
patchbot
- [Xen-changelog] [xen staging-4.8] x86: Make "spec-ctrl=no" a global disable of all mitigations,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/msr: Virtualise MSR_FLUSH_CMD for guests,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/shadow: Infrastructure to force a PV guest into shadow mode,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations,
patchbot
- [Xen-changelog] [xen staging-4.8] tools/oxenstored: Make evaluation order explicit,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits,
patchbot
- [Xen-changelog] [xen staging-4.8] ARM: disable grant table v2,
patchbot
- [Xen-changelog] [xen staging-4.8] common/gnttab: Introduce command line feature controls,
patchbot
- [Xen-changelog] [xen staging-4.8] VMX: fix vmx_{find, del}_msr() build,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/vmx: Support load-only guest MSR list entries,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/vmx: Pass an MSR value into vmx_msr_add(),
patchbot
- [Xen-changelog] [xen staging-4.8] x86/vmx: Improvements to LBR MSR handling,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/vmx: Support remote access to the MSR lists,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr(),
patchbot
- [Xen-changelog] [xen staging-4.8] x86/vmx: Internal cleanup for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/vmx: API improvements for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs(),
patchbot
- [Xen-changelog] [xen staging-4.8] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit,
patchbot
- [Xen-changelog] [xen staging-4.8] x86/spec-ctrl: Yet more fixes for xpti= parsing,
patchbot
- [Xen-changelog] [xen staging-4.9] xl.conf: Add global affinity masks,
patchbot
- [Xen-changelog] [xen staging-4.9] x86: Make "spec-ctrl=no" a global disable of all mitigations,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/msr: Virtualise MSR_FLUSH_CMD for guests,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/shadow: Infrastructure to force a PV guest into shadow mode,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations,
patchbot
- [Xen-changelog] [xen staging-4.9] tools/oxenstored: Make evaluation order explicit,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits,
patchbot
- [Xen-changelog] [xen staging-4.9] ARM: disable grant table v2,
patchbot
- [Xen-changelog] [xen staging-4.9] common/gnttab: Introduce command line feature controls,
patchbot
- [Xen-changelog] [xen staging-4.9] VMX: fix vmx_{find, del}_msr() build,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/vmx: Support load-only guest MSR list entries,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/vmx: Pass an MSR value into vmx_msr_add(),
patchbot
- [Xen-changelog] [xen staging-4.9] x86/vmx: Improvements to LBR MSR handling,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/vmx: Support remote access to the MSR lists,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr(),
patchbot
- [Xen-changelog] [xen staging-4.9] x86/vmx: Internal cleanup for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/vmx: API improvements for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs(),
patchbot
- [Xen-changelog] [xen staging-4.9] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit,
patchbot
- [Xen-changelog] [xen staging-4.9] x86/spec-ctrl: Yet more fixes for xpti= parsing,
patchbot
- [Xen-changelog] [xen staging-4.10] xl.conf: Add global affinity masks,
patchbot
- [Xen-changelog] [xen staging-4.10] x86: Make "spec-ctrl=no" a global disable of all mitigations,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/msr: Virtualise MSR_FLUSH_CMD for guests,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/shadow: Infrastructure to force a PV guest into shadow mode,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations,
patchbot
- [Xen-changelog] [xen staging-4.10] tools/oxenstored: Make evaluation order explicit,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits,
patchbot
- [Xen-changelog] [xen staging-4.10] ARM: disable grant table v2,
patchbot
- [Xen-changelog] [xen staging-4.10] common/gnttab: Introduce command line feature controls,
patchbot
- [Xen-changelog] [xen staging-4.10] VMX: fix vmx_{find, del}_msr() build,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/vmx: Support load-only guest MSR list entries,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/vmx: Pass an MSR value into vmx_msr_add(),
patchbot
- [Xen-changelog] [xen staging-4.10] x86/vmx: Improvements to LBR MSR handling,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/vmx: Support remote access to the MSR lists,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr(),
patchbot
- [Xen-changelog] [xen staging-4.10] x86/vmx: Internal cleanup for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/vmx: API improvements for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs(),
patchbot
- [Xen-changelog] [xen staging-4.10] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit,
patchbot
- [Xen-changelog] [xen staging-4.10] x86/spec-ctrl: Yet more fixes for xpti= parsing,
patchbot
- [Xen-changelog] [xen staging-4.11] xl.conf: Add global affinity masks,
patchbot
- [Xen-changelog] [xen staging-4.11] x86: Make "spec-ctrl=no" a global disable of all mitigations,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/msr: Virtualise MSR_FLUSH_CMD for guests,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/shadow: Infrastructure to force a PV guest into shadow mode,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations,
patchbot
- [Xen-changelog] [xen staging-4.11] tools/oxenstored: Make evaluation order explicit,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits,
patchbot
- [Xen-changelog] [xen staging-4.11] ARM: disable grant table v2,
patchbot
- [Xen-changelog] [xen staging-4.11] VMX: fix vmx_{find, del}_msr() build,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/vmx: Support load-only guest MSR list entries,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/vmx: Pass an MSR value into vmx_msr_add(),
patchbot
- [Xen-changelog] [xen staging-4.11] x86/vmx: Improvements to LBR MSR handling,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/vmx: Support remote access to the MSR lists,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/vmx: Factor locate_msr_entry() out of vmx_find_msr() and vmx_add_msr(),
patchbot
- [Xen-changelog] [xen staging-4.11] x86/vmx: Internal cleanup for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/vmx: API improvements for MSR load/save infrastructure,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/vmx: Defer vmx_vmcs_exit() as long as possible in construct_vmcs(),
patchbot
- [Xen-changelog] [xen staging-4.11] x86/vmx: Fix handing of MSR_DEBUGCTL on VMExit,
patchbot
- [Xen-changelog] [xen staging-4.11] x86/spec-ctrl: Yet more fixes for xpti= parsing,
patchbot
- [Xen-changelog] [xen staging] xl.conf: Add global affinity masks,
patchbot
- [Xen-changelog] [xen staging] x86: Make "spec-ctrl=no" a global disable of all mitigations,
patchbot
- [Xen-changelog] [xen staging] x86/spec-ctrl: Introduce an option to control L1D_FLUSH for HVM HAP guests,
patchbot
- [Xen-changelog] [xen staging] x86/msr: Virtualise MSR_FLUSH_CMD for guests,
patchbot
- [Xen-changelog] [xen staging] x86/spec-ctrl: CPUID/MSR definitions for L1D_FLUSH,
patchbot
- [Xen-changelog] [xen staging] x86/pv: Force a guest into shadow mode when it writes an L1TF-vulnerable PTE,
patchbot
- [Xen-changelog] [xen staging] x86/mm: Plumbing to allow any PTE update to fail with -ERESTART,
patchbot
- [Xen-changelog] [xen staging] x86/shadow: Infrastructure to force a PV guest into shadow mode,
patchbot
- [Xen-changelog] [xen staging] x86/spec-ctrl: Introduce an option to control L1TF mitigation for PV guests,
patchbot
- [Xen-changelog] [xen staging] x86/spec-ctrl: Calculate safe PTE addresses for L1TF mitigations,
patchbot
- [Xen-changelog] [xen staging] tools/oxenstored: Make evaluation order explicit,
patchbot
- [Xen-changelog] [xen staging] x86/vtx: Fix the checking for unknown/invalid MSR_DEBUGCTL bits,
patchbot
- [Xen-changelog] [xen staging] ARM: disable grant table v2,
patchbot
- [Xen-changelog] [xen staging] x86/spec-ctrl: Yet more fixes for xpti= parsing,
patchbot
- [Xen-changelog] [xen staging] tools/libxenctrl: use new xenforeignmemory API to seed grant table,
patchbot
- [Xen-changelog] [xen staging] common: add a new mappable resource type: XENMEM_resource_grant_table,
patchbot
- [Xen-changelog] [xen staging] common/gnttab: Explicitly default to gnttab v1 during domain creation,
patchbot
- [Xen-changelog] [xen staging] x86/vlapic: Bugfixes and improvements to vlapic_{read, write}(),
patchbot
- [Xen-changelog] [xen staging] x86: move arch_evtchn_inject to x86 common code,
patchbot
- [Xen-changelog] [xen staging] x86: add missing "inline" keyword,
patchbot
- [Xen-changelog] [xen staging] x86: put compat.o and x86_64/compat.o under CONFIG_PV,
patchbot
- [Xen-changelog] [xen staging] drop {,acpi_}reserve_bootmem(),
patchbot
- [Xen-changelog] [xen staging] x86/hvm: Drop hvm_sr_handlers initializer,
patchbot
- [Xen-changelog] [xen staging] automation: ensure created are not owned as root,
patchbot
- [Xen-changelog] [xen staging] automation: remove dead code from containerize,
patchbot
- [Xen-changelog] [xen staging] automation: drop container name from containerize,
patchbot
- [Xen-changelog] [xen staging] automation: standardize containerize env names,
patchbot
- [Xen-changelog] [xen staging] xen: specify support for EXPERT and DEBUG Kconfig options,
patchbot
- [Xen-changelog] [xen staging] xen: add cloc target,
patchbot
- [Xen-changelog] [xen staging] xen: add per-platform defaults for NR_CPUS,
patchbot
- [Xen-changelog] [xen staging] arm: add ALL_PLAT, QEMU, Rcar3 and MPSoC configs,
patchbot
- [Xen-changelog] [xen staging] arm: add a tiny kconfig configuration,
patchbot
- [Xen-changelog] [xen staging] arm: make it possible to disable the SMMU driver,
patchbot
- [Xen-changelog] [xen staging] make it possible to enable/disable UART drivers,
patchbot
- [Xen-changelog] [xen staging] Make MEM_ACCESS configurable,
patchbot
- [Xen-changelog] [xen staging] arm: rename HAS_GICV3 to GICV3,
patchbot
- [Xen-changelog] [xen staging] arm: make it possible to disable HAS_GICV3,
patchbot
- [Xen-changelog] [xen staging] x86/altp2m: make sure EPTP_INDEX is up-to-date when enabling #VE,
patchbot
- [Xen-changelog] [xen staging] x86/cpuidle: replace a pointless NULL check,
patchbot
- [Xen-changelog] [xen staging] vtd: cleanup vtd_set_hwdom_mapping after ia64 removal,
patchbot
- [Xen-changelog] [xen staging] xen: Remove domain_crash_synchronous() completely,
patchbot
- [Xen-changelog] [xen staging] x86/vmx: Avoid using domain_crash_syncrhonous() in vmx_vmentry_failure(),
patchbot
- [Xen-changelog] [xen staging] x86/vmx: Avoid hitting BUG_ON() after EPTP-related domain_crash(),
patchbot
- [Xen-changelog] [xen stable-4.6] x86/spec-ctrl: Fix the parsing of xpti= on fixed Intel hardware,
patchbot
- [Xen-changelog] [xen stable-4.6] x86: command line option to avoid use of secondary hyper-threads,
patchbot
- [Xen-changelog] [xen stable-4.6] x86: possibly bring up all CPUs even if not all are supposed to be used,
patchbot
- [Xen-changelog] [xen stable-4.6] x86: distinguish CPU offlining from CPU removal,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/AMD: distinguish compute units from hyper-threads,
patchbot
- [Xen-changelog] [xen stable-4.6] cpupools: fix state when downing a CPU failed,
patchbot
- [Xen-changelog] [xen stable-4.6] allow cpu_down() to be called earlier,
patchbot
- [Xen-changelog] [xen stable-4.6] x86/spec-ctrl: command line handling adjustments,
patchbot
- [Xen-changelog] [xen stable-4.6] xen: Port the array_index_nospec() infrastructure from Linux,
patchbot
- [Xen-changelog] [xen stable-4.6] cmdline: fix parse_boolean() for NULL incoming end pointer,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/spec-ctrl: Fix the parsing of xpti= on fixed Intel hardware,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/hvm: Disallow unknown MSR_EFER bits,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/xstate: Make errors in xstate calculations more obvious by crashing the domain,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/xstate: Use a guests CPUID policy, rather than allowing all features,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/vmx: Don't clobber %dr6 while debugging state is lazy,
patchbot
- [Xen-changelog] [xen stable-4.8] x86: command line option to avoid use of secondary hyper-threads,
patchbot
- [Xen-changelog] [xen stable-4.8] x86: possibly bring up all CPUs even if not all are supposed to be used,
patchbot
- [Xen-changelog] [xen stable-4.8] x86: distinguish CPU offlining from CPU removal,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/AMD: distinguish compute units from hyper-threads,
patchbot
- [Xen-changelog] [xen stable-4.8] cpupools: fix state when downing a CPU failed,
patchbot
- [Xen-changelog] [xen stable-4.8] allow cpu_down() to be called earlier,
patchbot
- [Xen-changelog] [xen stable-4.8] xen: oprofile/nmi_int.c: Drop unwanted sexual reference,
patchbot
- [Xen-changelog] [xen stable-4.8] x86/spec-ctrl: command line handling adjustments,
patchbot
- [Xen-changelog] [xen stable-4.8] x86: correctly set nonlazy_xstate_used when loading full state,
patchbot
- [Xen-changelog] [xen stable-4.8] xen: Port the array_index_nospec() infrastructure from Linux,
patchbot
- [Xen-changelog] [xen stable-4.8] cmdline: fix parse_boolean() for NULL incoming end pointer,
patchbot
- [Xen-changelog] [xen stable-4.8] update Xen version to 4.8.5-pre,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/spec-ctrl: Fix the parsing of xpti= on fixed Intel hardware,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/hvm: Disallow unknown MSR_EFER bits,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/xstate: Make errors in xstate calculations more obvious by crashing the domain,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/xstate: Use a guests CPUID policy, rather than allowing all features,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/vmx: Don't clobber %dr6 while debugging state is lazy,
patchbot
- [Xen-changelog] [xen stable-4.10] x86: command line option to avoid use of secondary hyper-threads,
patchbot
- [Xen-changelog] [xen stable-4.10] x86: possibly bring up all CPUs even if not all are supposed to be used,
patchbot
- [Xen-changelog] [xen stable-4.10] x86: distinguish CPU offlining from CPU removal,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/AMD: distinguish compute units from hyper-threads,
patchbot
- [Xen-changelog] [xen stable-4.10] cpupools: fix state when downing a CPU failed,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/svm Fixes and cleanup to svm_inject_event(),
patchbot
- [Xen-changelog] [xen stable-4.10] allow cpu_down() to be called earlier,
patchbot
- [Xen-changelog] [xen stable-4.10] xen: oprofile/nmi_int.c: Drop unwanted sexual reference,
patchbot
- [Xen-changelog] [xen stable-4.10] mm/page_alloc: correct first_dirty calculations during block merging,
patchbot
- [Xen-changelog] [xen stable-4.10] x86/spec-ctrl: command line handling adjustments,
patchbot
- [Xen-changelog] [xen stable-4.10] x86: correctly set nonlazy_xstate_used when loading full state,
patchbot
- [Xen-changelog] [xen stable-4.10] xen: Port the array_index_nospec() infrastructure from Linux,
patchbot
- [Xen-changelog] [xen staging] tools/gdbsx: use inttypes.h instead of custom macros,
patchbot
- [Xen-changelog] [xen staging] tools/gdbsx: fix 'g' packet response for 64bit guests,
patchbot
- [Xen-changelog] [xen staging] xenstore-client: Add option for raw in-/output,
patchbot
- [Xen-changelog] [xen staging] docs: add xenstore-read and xenstore-write man pages,
patchbot
- [Xen-changelog] [xen staging] xenconsole: add option to avoid escape sequences in log,
patchbot
- [Xen-changelog] [xen staging] xen: clean up altp2m op comment,
patchbot
- [Xen-changelog] [xen master] libxl_qmp: Add a warning to not trust QEMU,
patchbot
- [Xen-changelog] [xen master] libxl_qmp: Move the buffer realloc to the same scope level as read,
patchbot
- [Xen-changelog] [xen master] libxl_json: fix build with DEBUG_ANSWER,
patchbot
- [Xen-changelog] [xen master] libxl_qmp: Fix use of DEBUG_RECEIVED,
patchbot
- [Xen-changelog] [xen master] libxl_qmp: Documentation of the logic of the QMP client,
patchbot
- [Xen-changelog] [xen master] libxl_event: Fix DEBUG prints,
patchbot
Mail converted by MHonArc
|