April 30, 22 |
12:36 |
[xen master] Revert "page_alloc: assert IRQs are enabled in heap alloc/free" |
patchbot |
|
12:36 |
[xen master] MAINTAINERS: add Rahul as SMMU maintainer |
patchbot |
|
12:36 |
[xen master] x86/mem_sharing: make fork_reset more configurable |
patchbot |
|
12:36 |
[xen master] PCI: replace "secondary" flavors of PCI_{DEVFN,BDF,SBDF}() |
patchbot |
|
12:35 |
[xen master] PCI: replace stray uses of PCI_{DEVFN,BDF}2() |
patchbot |
|
12:35 |
[xen master] x86+libxl: correct p2m (shadow) memory pool size calculation |
patchbot |
|
12:35 |
[xen master] x86/mwait-idle: add SPR support |
patchbot |
|
12:35 |
[xen master] x86/mwait-idle: switch to asm/intel-family.h naming |
patchbot |
|
12:35 |
[xen master] xen/public: add new macro to ring.h |
patchbot |
|
12:35 |
[xen master] drivers/exynos4210: Remove unused-but-set variable |
patchbot |
|
12:34 |
[xen master] platforms/omap: Remove unused-but-set variable |
patchbot |
|
12:34 |
[xen master] platforms/xgene: Make use of dt_device_get_address return value |
patchbot |
|
12:34 |
[xen master] xen/sched: Remove unused-but-set variable |
patchbot |
|
12:34 |
[xen master] xen/arm: smmu.c: Remove unused-but-set variable |
patchbot |
|
12:34 |
[xen master] efi/boot.c: Remove unused-but-set variable |
patchbot |
|
12:34 |
[xen master] xen/arm: bootfdt.c: Remove unused-but-set variable |
patchbot |
|
12:33 |
[xen master] xen/arm64: io: Handle data abort due to cache maintenance instructions |
patchbot |
|
12:33 |
[xen master] page_alloc: assert IRQs are enabled in heap alloc/free |
patchbot |
|
12:33 |
[xen master] xen/arm: alternative: Don't call vmap() within stop_machine_run() |
patchbot |
|
12:33 |
[xen master] EFI: don't mistakenly delete a file we never installed |
patchbot |
|
12:33 |
[xen master] libxl: retry QMP PCI device_add |
patchbot |
|
12:33 |
[xen master] x86/vmx: add hvm functions to get/set non-register state |
patchbot |
|
April 29, 22 |
09:11 |
[xen staging] Revert "page_alloc: assert IRQs are enabled in heap alloc/free" |
patchbot |
|
April 28, 22 |
23:44 |
[xen staging] MAINTAINERS: add Rahul as SMMU maintainer |
patchbot |
|
14:22 |
[xen staging] x86/mem_sharing: make fork_reset more configurable |
patchbot |
|
14:22 |
[xen staging] PCI: replace "secondary" flavors of PCI_{DEVFN,BDF,SBDF}() |
patchbot |
|
14:22 |
[xen staging] PCI: replace stray uses of PCI_{DEVFN,BDF}2() |
patchbot |
|
08:11 |
[xen staging] x86+libxl: correct p2m (shadow) memory pool size calculation |
patchbot |
|
08:11 |
[xen staging] x86/mwait-idle: add SPR support |
patchbot |
|
08:11 |
[xen staging] x86/mwait-idle: switch to asm/intel-family.h naming |
patchbot |
|
08:11 |
[xen staging] xen/public: add new macro to ring.h |
patchbot |
|
April 27, 22 |
22:34 |
[xen staging] drivers/exynos4210: Remove unused-but-set variable |
patchbot |
|
22:34 |
[xen staging] platforms/omap: Remove unused-but-set variable |
patchbot |
|
22:34 |
[xen staging] platforms/xgene: Make use of dt_device_get_address return value |
patchbot |
|
22:34 |
[xen staging] xen/sched: Remove unused-but-set variable |
patchbot |
|
22:34 |
[xen staging] xen/arm: smmu.c: Remove unused-but-set variable |
patchbot |
|
22:34 |
[xen staging] efi/boot.c: Remove unused-but-set variable |
patchbot |
|
22:33 |
[xen staging] xen/arm: bootfdt.c: Remove unused-but-set variable |
patchbot |
|
22:33 |
[xen master] Revert "page_alloc: assert IRQs are enabled in heap alloc/free" |
patchbot |
|
22:33 |
[xen master] page_alloc: assert IRQs are enabled in heap alloc/free |
patchbot |
|
22:33 |
[xen master] xsm/flask: code style formatting |
patchbot |
|
22:33 |
[xen master] IOMMU: make domctl handler tolerate NULL domain |
patchbot |
|
22:33 |
[xen master] xen/iommu: cleanup iommu related domctl handling |
patchbot |
|
15:33 |
[xen staging] xen/arm64: io: Handle data abort due to cache maintenance instructions |
patchbot |
|
08:55 |
[xen staging] page_alloc: assert IRQs are enabled in heap alloc/free |
patchbot |
|
08:55 |
[xen staging] xen/arm: alternative: Don't call vmap() within stop_machine_run() |
patchbot |
|
07:22 |
[xen staging] EFI: don't mistakenly delete a file we never installed |
patchbot |
|
07:22 |
[xen staging] libxl: retry QMP PCI device_add |
patchbot |
|
07:22 |
[xen staging] x86/vmx: add hvm functions to get/set non-register state |
patchbot |
|
April 26, 22 |
14:11 |
[xen staging] Revert "page_alloc: assert IRQs are enabled in heap alloc/free" |
patchbot |
|
08:44 |
[xen staging] page_alloc: assert IRQs are enabled in heap alloc/free |
patchbot |
|
08:44 |
[xen staging] xsm/flask: code style formatting |
patchbot |
|
08:44 |
[xen staging] IOMMU: make domctl handler tolerate NULL domain |
patchbot |
|
08:44 |
[xen staging] xen/iommu: cleanup iommu related domctl handling |
patchbot |
|
April 23, 22 |
12:13 |
[xen master] tools/libs/light: don't set errno to a negative value |
patchbot |
|
12:13 |
[xen master] tools/libs/guest: don't set errno to a negative value |
patchbot |
|
12:13 |
[xen master] tools/libs/ctrl: don't set errno to a negative value |
patchbot |
|
12:13 |
[xen master] tools/libs/evtchn: don't set errno to negative values |
patchbot |
|
12:13 |
[xen master] xen: Split x86/debugger.h into common and arch specific parts |
patchbot |
|
12:12 |
[xen master] x86/debugger: Misc cleanup prior to splitting |
patchbot |
|
12:12 |
[xen master] x86/gdbstub: Clean up includes |
patchbot |
|
12:12 |
[xen master] x86/gdbsx: Move domain_pause_for_debugger() into gdbsx |
patchbot |
|
12:12 |
[xen master] x86/gdbsx: Rename debug.c to gdbsx.c |
patchbot |
|
12:12 |
[xen master] x86/debugger: Remove debugger_trap_entry() |
patchbot |
|
12:12 |
[xen master] xen/build: Fix MAP rule when called in isolation |
patchbot |
|
12:11 |
[xen master] x86/build: make linking work again with ld incapable of generating build ID |
patchbot |
|
12:11 |
[xen master] AMD/IOMMU: drop stray TLB flush |
patchbot |
|
12:11 |
[xen master] IOMMU: have vendor code announce supported page sizes |
patchbot |
|
12:11 |
[xen master] VT-d: limit page table population in domain_pgd_maddr() |
patchbot |
|
12:11 |
[xen master] VT-d: have callers specify the target level for page table walks |
patchbot |
|
12:11 |
[xen master] AMD/IOMMU: have callers specify the target level for page table walks |
patchbot |
|
02:00 |
[xen master] gitlab-ci: add an ARM32 qemu-based smoke test |
patchbot |
|
02:00 |
[xen master] gitlab-ci: add qemu-system-arm to the existing tests-artifacts container |
patchbot |
|
April 22, 22 |
19:45 |
[xen staging] tools/libs/light: don't set errno to a negative value |
patchbot |
|
19:45 |
[xen staging] tools/libs/guest: don't set errno to a negative value |
patchbot |
|
19:45 |
[xen staging] tools/libs/ctrl: don't set errno to a negative value |
patchbot |
|
19:45 |
[xen staging] tools/libs/evtchn: don't set errno to negative values |
patchbot |
|
19:45 |
[xen staging] xen: Split x86/debugger.h into common and arch specific parts |
patchbot |
|
19:44 |
[xen staging] x86/debugger: Misc cleanup prior to splitting |
patchbot |
|
19:44 |
[xen staging] x86/gdbstub: Clean up includes |
patchbot |
|
19:44 |
[xen staging] x86/gdbsx: Move domain_pause_for_debugger() into gdbsx |
patchbot |
|
19:44 |
[xen staging] x86/gdbsx: Rename debug.c to gdbsx.c |
patchbot |
|
19:44 |
[xen staging] x86/debugger: Remove debugger_trap_entry() |
patchbot |
|
19:44 |
[xen staging] xen/build: Fix MAP rule when called in isolation |
patchbot |
|
13:00 |
[xen staging] x86/build: make linking work again with ld incapable of generating build ID |
patchbot |
|
13:00 |
[xen staging] AMD/IOMMU: drop stray TLB flush |
patchbot |
|
13:00 |
[xen staging] IOMMU: have vendor code announce supported page sizes |
patchbot |
|
13:00 |
[xen staging] VT-d: limit page table population in domain_pgd_maddr() |
patchbot |
|
13:00 |
[xen staging] VT-d: have callers specify the target level for page table walks |
patchbot |
|
13:00 |
[xen staging] AMD/IOMMU: have callers specify the target level for page table walks |
patchbot |
|
April 21, 22 |
23:22 |
[xen staging] gitlab-ci: add an ARM32 qemu-based smoke test |
patchbot |
|
23:22 |
[xen staging] gitlab-ci: add qemu-system-arm to the existing tests-artifacts container |
patchbot |
|
11:12 |
[xen master] x86/build: Rework binary conversion for boot/{cmdline,reloc}.c |
patchbot |
|
11:12 |
[xen master] xen/build: Fix dependency for the MAP rule |
patchbot |
|
11:11 |
[xen master] x86/mm: avoid inadvertently degrading a TLB flush to local only |
patchbot |
|
11:11 |
[xen master] VT-d: refuse to use IOMMU with reserved CAP.ND value |
patchbot |
|
11:11 |
[xen master] VT-d: plug memory leaks in iommu_alloc() |
patchbot |
|
11:11 |
[xen master] VT-d: drop ROOT_ENTRY_NR |
patchbot |
|
11:11 |
[xen master] IOMMU/x86: drop locking from quarantine_init() hooks |
patchbot |
|
11:11 |
[xen master] include/public: add command result definitions to vscsiif.h |
patchbot |
|
00:22 |
[xen master] xen/arm: Add i.MX lpuart early printk support |
patchbot |
|
00:22 |
[xen master] xen/arm: Add i.MX lpuart driver |
patchbot |
|
00:22 |
[xen master] xen/arm: Make use of DT_MATCH_TIMER in make_timer_node |
patchbot |
|
April 20, 22 |
18:22 |
[xen staging] x86/build: Rework binary conversion for boot/{cmdline,reloc}.c |
patchbot |
|
18:22 |
[xen staging] xen/build: Fix dependency for the MAP rule |
patchbot |
|
08:56 |
[xen staging] x86/mm: avoid inadvertently degrading a TLB flush to local only |
patchbot |
|
08:56 |
[xen staging] VT-d: refuse to use IOMMU with reserved CAP.ND value |
patchbot |
|
08:55 |
[xen staging] VT-d: plug memory leaks in iommu_alloc() |
patchbot |
|
08:55 |
[xen staging] VT-d: drop ROOT_ENTRY_NR |
patchbot |
|
08:55 |
[xen staging] IOMMU/x86: drop locking from quarantine_init() hooks |
patchbot |
|
08:55 |
[xen staging] include/public: add command result definitions to vscsiif.h |
patchbot |
|
08:55 |
[xen master] xen: cleanup gdbsx_guest_mem_io() call |
patchbot |
|
08:55 |
[xen master] xen: fix XEN_DOMCTL_gdbsx_guestmemio crash |
patchbot |
|
00:44 |
[xen staging] xen/arm: Add i.MX lpuart early printk support |
patchbot |
|
00:44 |
[xen staging] xen/arm: Add i.MX lpuart driver |
patchbot |
|
00:44 |
[xen staging] xen/arm: Make use of DT_MATCH_TIMER in make_timer_node |
patchbot |
|
April 19, 22 |
20:44 |
[xen master] x86/debug: Drop unnecessary include of compile.h |
patchbot |
|
17:11 |
[xen staging] xen: cleanup gdbsx_guest_mem_io() call |
patchbot |
|
17:11 |
[xen staging] xen: fix XEN_DOMCTL_gdbsx_guestmemio crash |
patchbot |
|
09:33 |
[xen staging] x86/debug: Drop unnecessary include of compile.h |
patchbot |
|
April 14, 22 |
01:11 |
[xen master] IOMMU: log appropriate SBDF |
patchbot |
|
01:11 |
[xen master] AMD/IOMMU: replace a few PCI_BDF2() |
patchbot |
|
01:11 |
[xen master] build: adding out-of-tree support to the xen build |
patchbot |
|
April 13, 22 |
10:44 |
[xen staging] IOMMU: log appropriate SBDF |
patchbot |
|
10:44 |
[xen staging] AMD/IOMMU: replace a few PCI_BDF2() |
patchbot |
|
10:44 |
[xen staging] build: adding out-of-tree support to the xen build |
patchbot |
|
April 12, 22 |
23:00 |
[xen stable-4.16] update Xen version to 4.16.1 |
patchbot |
|
18:55 |
[xen stable-4.14] update Xen version to 4.14.5 |
patchbot |
|
18:44 |
[xen master] MAINTAINERS: add myself as Continuous Integration maintainer |
patchbot |
|
12:22 |
[xen staging-4.16] update Xen version to 4.16.1 |
patchbot |
|
10:33 |
[xen staging-4.14] update Xen version to 4.14.5 |
patchbot |
|
01:44 |
[xen staging] MAINTAINERS: add myself as Continuous Integration maintainer |
patchbot |
|
April 11, 22 |
21:56 |
[xen master] tools/xl: fix vif and vcpupin parse tests |
patchbot |
|
21:55 |
[xen master] x86/boot: LEA -> MOV in video handling code |
patchbot |
|
21:55 |
[xen master] Merge branch 'staging' of xenbits.xen.org:/home/xen/git/xen into staging |
patchbot |
|
21:55 |
[xen master] xen: Populate xen.lds.h and make use of its macros |
patchbot |
|
21:55 |
[xen master] xen: Introduce a header to store common linker scripts content |
patchbot |
|
21:55 |
[xen master] x86/boot: obtain video info from boot loader |
patchbot |
|
21:55 |
[xen master] x86/boot: make "vga=current" work with graphics modes |
patchbot |
|
10:44 |
[xen staging] tools/xl: fix vif and vcpupin parse tests |
patchbot |
|
10:44 |
[xen staging] x86/boot: LEA -> MOV in video handling code |
patchbot |
|
10:44 |
[xen staging] Merge branch 'staging' of xenbits.xen.org:/home/xen/git/xen into staging |
patchbot |
|
10:44 |
[xen staging] x86/boot: obtain video info from boot loader |
patchbot |
|
10:44 |
[xen staging] x86/boot: make "vga=current" work with graphics modes |
patchbot |
|
10:33 |
[xen staging] xen: Populate xen.lds.h and make use of its macros |
patchbot |
|
10:33 |
[xen staging] xen: Introduce a header to store common linker scripts content |
patchbot |
|
April 10, 22 |
07:22 |
[xen master] SUPPORT.md: add Dom0less as Supported |
patchbot |
|
April 09, 22 |
23:23 |
[xen stable-4.16] livepatch: avoid relocations referencing ignored section symbols |
patchbot |
|
23:22 |
[xen stable-4.16] livepatch: do not ignore sections with 0 size |
patchbot |
|
23:22 |
[xen stable-4.16] vPCI: fix MSI-X PBA read/write gprintk()s |
patchbot |
|
23:22 |
[xen stable-4.16] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies |
patchbot |
|
23:22 |
[xen stable-4.16] VT-d: avoid infinite recursion on domain_context_mapping_one() error path |
patchbot |
|
23:22 |
[xen stable-4.16] VT-d: avoid NULL deref on domain_context_mapping_one() error paths |
patchbot |
|
23:22 |
[xen stable-4.16] VT-d: don't needlessly look up DID |
patchbot |
|
20:57 |
[xen master] x86/irq: skip unmap_domain_pirq XSM during destruction |
patchbot |
|
20:57 |
[xen master] x86/P2M: the majority for struct p2m_domain's fields are HVM-only |
patchbot |
|
20:56 |
[xen master] x86/P2M: p2m.c is HVM-only |
patchbot |
|
20:56 |
[xen master] paged_pages field is MEM_PAGING-only |
patchbot |
|
20:56 |
[xen master] shr_pages field is MEM_SHARING-only |
patchbot |
|
20:56 |
[xen master] x86/p2m: re-arrange {,__}put_gfn() |
patchbot |
|
20:56 |
[xen master] x86/P2M: derive HVM-only variant from __get_gfn_type_access() |
patchbot |
|
20:56 |
[xen master] x86/P2M: p2m_get_page_from_gfn() is HVM-only |
patchbot |
|
20:55 |
[xen master] x86/P2M: split out init/teardown functions |
patchbot |
|
20:55 |
[xen master] x86/P2M: PoD, altp2m, and nested-p2m are HVM-only |
patchbot |
|
20:55 |
[xen master] x86/P2M: p2m_{alloc,free}_ptp() and p2m_alloc_table() are HVM-only |
patchbot |
|
20:55 |
[xen master] x86/mm: split set_identity_p2m_entry() into PV and HVM parts |
patchbot |
|
20:55 |
[xen master] livepatch: avoid relocations referencing ignored section symbols |
patchbot |
|
20:55 |
[xen master] livepatch: do not ignore sections with 0 size |
patchbot |
|
11:34 |
[xen stable-4.14] livepatch: avoid relocations referencing ignored section symbols |
patchbot |
|
11:33 |
[xen stable-4.14] livepatch: do not ignore sections with 0 size |
patchbot |
|
11:33 |
[xen stable-4.14] vPCI: replace %pp |
patchbot |
|
11:33 |
[xen stable-4.14] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies |
patchbot |
|
11:33 |
[xen stable-4.14] VT-d: avoid infinite recursion on domain_context_mapping_one() error path |
patchbot |
|
11:33 |
[xen stable-4.14] VT-d: avoid NULL deref on domain_context_mapping_one() error paths |
patchbot |
|
11:33 |
[xen stable-4.14] VT-d: don't needlessly look up DID |
patchbot |
|
09:00 |
[xen stable-4.13] VT-d: avoid infinite recursion on domain_context_mapping_one() error path |
patchbot |
|
09:00 |
[xen stable-4.13] VT-d: avoid NULL deref on domain_context_mapping_one() error paths |
patchbot |
|
09:00 |
[xen stable-4.13] VT-d: don't needlessly look up DID |
patchbot |
|
06:00 |
[xen stable-4.12] VT-d: avoid infinite recursion on domain_context_mapping_one() error path |
patchbot |
|
06:00 |
[xen stable-4.12] VT-d: don't needlessly look up DID |
patchbot |
|
06:00 |
[xen stable-4.12] VT-d: avoid NULL deref on domain_context_mapping_one() error paths |
patchbot |
|
April 08, 22 |
23:56 |
[xen stable-4.15] livepatch: avoid relocations referencing ignored section symbols |
patchbot |
|
23:55 |
[xen stable-4.15] livepatch: do not ignore sections with 0 size |
patchbot |
|
23:55 |
[xen stable-4.15] vPCI: fix MSI-X PBA read/write gprintk()s |
patchbot |
|
23:55 |
[xen stable-4.15] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies |
patchbot |
|
23:55 |
[xen stable-4.15] VT-d: avoid infinite recursion on domain_context_mapping_one() error path |
patchbot |
|
23:55 |
[xen stable-4.15] VT-d: avoid NULL deref on domain_context_mapping_one() error paths |
patchbot |
|
23:55 |
[xen stable-4.15] VT-d: don't needlessly look up DID |
patchbot |
|
19:45 |
[xen staging] SUPPORT.md: add Dom0less as Supported |
patchbot |
|
19:44 |
[xen master] vPCI: fix MSI-X PBA read/write gprintk()s |
patchbot |
|
19:44 |
[xen master] build: shuffle main Makefile |
patchbot |
|
19:44 |
[xen master] build: specify source tree in include/ for prerequisite |
patchbot |
|
19:44 |
[xen master] build: rework "headers*.chk" prerequisite in include/ |
patchbot |
|
19:44 |
[xen master] build: replace $(BASEDIR) and use $(srctree) |
patchbot |
|
19:44 |
[xen master] build: replace $(BASEDIR) by $(objtree) |
patchbot |
|
13:33 |
[xen staging-4.12] VT-d: avoid infinite recursion on domain_context_mapping_one() error path |
patchbot |
|
13:33 |
[xen staging-4.12] VT-d: avoid NULL deref on domain_context_mapping_one() error paths |
patchbot |
|
13:33 |
[xen staging-4.12] VT-d: don't needlessly look up DID |
patchbot |
|
13:33 |
[xen staging-4.13] VT-d: avoid infinite recursion on domain_context_mapping_one() error path |
patchbot |
|
13:33 |
[xen staging-4.13] VT-d: avoid NULL deref on domain_context_mapping_one() error paths |
patchbot |
|
13:33 |
[xen staging-4.13] VT-d: don't needlessly look up DID |
patchbot |
|
13:13 |
[xen staging-4.14] livepatch: avoid relocations referencing ignored section symbols |
patchbot |
|
13:13 |
[xen staging-4.14] livepatch: do not ignore sections with 0 size |
patchbot |
|
13:12 |
[xen staging-4.14] vPCI: replace %pp |
patchbot |
|
13:12 |
[xen staging-4.14] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies |
patchbot |
|
13:12 |
[xen staging-4.14] VT-d: avoid infinite recursion on domain_context_mapping_one() error path |
patchbot |
|
13:12 |
[xen staging-4.14] VT-d: avoid NULL deref on domain_context_mapping_one() error paths |
patchbot |
|
13:12 |
[xen staging-4.14] VT-d: don't needlessly look up DID |
patchbot |
|
13:12 |
[xen staging-4.15] livepatch: avoid relocations referencing ignored section symbols |
patchbot |
|
13:11 |
[xen staging-4.15] livepatch: do not ignore sections with 0 size |
patchbot |
|
13:11 |
[xen staging-4.15] vPCI: fix MSI-X PBA read/write gprintk()s |
patchbot |
|
13:11 |
[xen staging-4.15] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies |
patchbot |
|
13:11 |
[xen staging-4.15] VT-d: avoid infinite recursion on domain_context_mapping_one() error path |
patchbot |
|
13:11 |
[xen staging-4.15] VT-d: avoid NULL deref on domain_context_mapping_one() error paths |
patchbot |
|
13:11 |
[xen staging-4.15] VT-d: don't needlessly look up DID |
patchbot |
|
13:01 |
[xen staging-4.16] livepatch: avoid relocations referencing ignored section symbols |
patchbot |
|
13:00 |
[xen staging-4.16] livepatch: do not ignore sections with 0 size |
patchbot |
|
13:00 |
[xen staging-4.16] vPCI: fix MSI-X PBA read/write gprintk()s |
patchbot |
|
13:00 |
[xen staging-4.16] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies |
patchbot |
|
13:00 |
[xen staging-4.16] VT-d: avoid infinite recursion on domain_context_mapping_one() error path |
patchbot |
|
13:00 |
[xen staging-4.16] VT-d: avoid NULL deref on domain_context_mapping_one() error paths |
patchbot |
|
13:00 |
[xen staging-4.16] VT-d: don't needlessly look up DID |
patchbot |
|
12:56 |
[xen staging] x86/irq: skip unmap_domain_pirq XSM during destruction |
patchbot |
|
12:56 |
[xen staging] x86/P2M: the majority for struct p2m_domain's fields are HVM-only |
patchbot |
|
12:56 |
[xen staging] x86/P2M: p2m.c is HVM-only |
patchbot |
|
12:56 |
[xen staging] paged_pages field is MEM_PAGING-only |
patchbot |
|
12:56 |
[xen staging] shr_pages field is MEM_SHARING-only |
patchbot |
|
12:56 |
[xen staging] x86/p2m: re-arrange {,__}put_gfn() |
patchbot |
|
12:55 |
[xen staging] x86/P2M: derive HVM-only variant from __get_gfn_type_access() |
patchbot |
|
12:55 |
[xen staging] x86/P2M: p2m_get_page_from_gfn() is HVM-only |
patchbot |
|
12:55 |
[xen staging] x86/P2M: split out init/teardown functions |
patchbot |
|
12:55 |
[xen staging] x86/P2M: PoD, altp2m, and nested-p2m are HVM-only |
patchbot |
|
12:55 |
[xen staging] x86/P2M: p2m_{alloc,free}_ptp() and p2m_alloc_table() are HVM-only |
patchbot |
|
12:55 |
[xen staging] x86/mm: split set_identity_p2m_entry() into PV and HVM parts |
patchbot |
|
09:57 |
[xen master] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies |
patchbot |
|
09:57 |
[xen master] VT-d: avoid infinite recursion on domain_context_mapping_one() error path |
patchbot |
|
09:56 |
[xen master] VT-d: avoid NULL deref on domain_context_mapping_one() error paths |
patchbot |
|
09:56 |
[xen master] VT-d: don't needlessly look up DID |
patchbot |
|
09:56 |
[xen master] platform/cpufreq: add public defines for CPUFREQ_SHARED_TYPE_ |
patchbot |
|
09:56 |
[xen master] EFI: correct indentation in efi_tables() |
patchbot |
|
09:56 |
[xen master] x86/boot: fold two MOVs into an ADD |
patchbot |
|
09:56 |
[xen master] x86/boot: fold/replace moves in video handling code |
patchbot |
|
09:55 |
[xen master] x86/boot: fold branches in video handling code |
patchbot |
|
09:55 |
[xen master] x86/boot: simplify mode_table |
patchbot |
|
09:55 |
[xen master] x86/EFI: retrieve EDID |
patchbot |
|
09:55 |
[xen master] x86/mm: move guest_physmap_{add,remove}_page() |
patchbot |
|
09:55 |
[xen master] x86/P2M: introduce p2m_{add,remove}_page() |
patchbot |
|
09:55 |
[xen master] x86/P2M: rename p2m_remove_page() |
patchbot |
|
08:33 |
[xen staging] livepatch: avoid relocations referencing ignored section symbols |
patchbot |
|
08:33 |
[xen staging] livepatch: do not ignore sections with 0 size |
patchbot |
|
02:13 |
[xen stable-4.12] IOMMU/x86: use per-device page tables for quarantining |
patchbot |
|
02:13 |
[xen stable-4.12] AMD/IOMMU: abstract maximum number of page table levels |
patchbot |
|
02:12 |
[xen stable-4.12] IOMMU/x86: drop TLB flushes from quarantine_init() hooks |
patchbot |
|
02:12 |
[xen stable-4.12] IOMMU/x86: maintain a per-device pseudo domain ID |
patchbot |
|
02:12 |
[xen stable-4.12] VT-d: prepare for per-device quarantine page tables (part II) |
patchbot |
|
02:12 |
[xen stable-4.12] VT-d: prepare for per-device quarantine page tables (part I) |
patchbot |
|
02:12 |
[xen stable-4.12] AMD/IOMMU: re-assign devices directly |
patchbot |
|
02:12 |
[xen stable-4.12] VT-d: re-assign devices directly |
patchbot |
|
02:11 |
[xen stable-4.12] VT-d: drop ownership checking from domain_context_mapping_one() |
patchbot |
|
02:11 |
[xen stable-4.12] VT-d: fix add/remove ordering when RMRRs are in use |
patchbot |
|
02:11 |
[xen stable-4.12] VT-d: fix (de)assign ordering when RMRRs are in use |
patchbot |
|
02:11 |
[xen stable-4.12] VT-d: split domid map cleanup check into a function |
patchbot |
|
02:11 |
[xen stable-4.12] VT-d: correct ordering of operations in cleanup_domid_map() |
patchbot |
|
02:11 |
[xen stable-4.12] x86/hap: do not switch on log dirty for VRAM tracking |
patchbot |
|
00:02 |
[xen stable-4.14] tools/firmware: do not add a .note.gnu.property section |
patchbot |
|
00:02 |
[xen stable-4.14] tools/firmware: force -fcf-protection=none |
patchbot |
|
00:02 |
[xen stable-4.14] libxl: Re-scope qmp_proxy_spawn.ao usage |
patchbot |
|
00:01 |
[xen stable-4.14] libxl: Don't segfault on soft-reset failure |
patchbot |
|
00:01 |
[xen stable-4.14] xl: Fix global pci options |
patchbot |
|
00:01 |
[xen stable-4.14] vpci/msix: fix PBA accesses |
patchbot |
|
00:01 |
[xen stable-4.14] xz: validate the value before assigning it to an enum variable |
patchbot |
|
00:01 |
[xen stable-4.14] xz: avoid overlapping memcpy() with invalid input with in-place decompression |
patchbot |
|
00:01 |
[xen stable-4.14] tools/libxl: don't allow IOMMU usage with PoD |
patchbot |
|
00:00 |
[xen stable-4.14] x86/console: process softirqs between warning prints |
patchbot |
|
00:00 |
[xen stable-4.14] x86emul: fix VPBLENDMW with mask and memory operand |
patchbot |
|
00:00 |
[xen stable-4.14] build: fix exported variable name CFLAGS_stack_boundary |
patchbot |
|
00:00 |
[xen stable-4.14] tools/libs/light: set video_mem for PVH guests |
patchbot |
|
00:00 |
[xen stable-4.14] tools/libxl: Correctly align the ACPI tables |
patchbot |
|
00:00 |
[xen stable-4.14] update Xen version to 4.14.5-pre |
patchbot |
|
April 07, 22 |
16:11 |
[xen staging] vPCI: fix MSI-X PBA read/write gprintk()s |
patchbot |
|
16:11 |
[xen staging] build: shuffle main Makefile |
patchbot |
|
16:11 |
[xen staging] build: specify source tree in include/ for prerequisite |
patchbot |
|
16:11 |
[xen staging] build: rework "headers*.chk" prerequisite in include/ |
patchbot |
|
16:11 |
[xen staging] build: replace $(BASEDIR) and use $(srctree) |
patchbot |
|
16:11 |
[xen staging] build: replace $(BASEDIR) by $(objtree) |
patchbot |
|
10:44 |
[xen staging] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies |
patchbot |
|
10:33 |
[xen staging] VT-d: avoid infinite recursion on domain_context_mapping_one() error path |
patchbot |
|
10:33 |
[xen staging] VT-d: avoid NULL deref on domain_context_mapping_one() error paths |
patchbot |
|
10:33 |
[xen staging] VT-d: don't needlessly look up DID |
patchbot |
|
10:33 |
[xen staging] platform/cpufreq: add public defines for CPUFREQ_SHARED_TYPE_ |
patchbot |
|
07:24 |
[xen staging-4.14] tools/firmware: do not add a .note.gnu.property section |
patchbot |
|
07:24 |
[xen staging-4.14] tools/firmware: force -fcf-protection=none |
patchbot |
|
07:24 |
[xen staging-4.14] libxl: Re-scope qmp_proxy_spawn.ao usage |
patchbot |
|
07:23 |
[xen staging-4.14] libxl: Don't segfault on soft-reset failure |
patchbot |
|
07:23 |
[xen staging-4.14] xl: Fix global pci options |
patchbot |
|
07:23 |
[xen staging-4.14] vpci/msix: fix PBA accesses |
patchbot |
|
07:23 |
[xen staging-4.14] xz: validate the value before assigning it to an enum variable |
patchbot |
|
07:23 |
[xen staging-4.14] xz: avoid overlapping memcpy() with invalid input with in-place decompression |
patchbot |
|
07:23 |
[xen staging-4.14] tools/libxl: don't allow IOMMU usage with PoD |
patchbot |
|
07:22 |
[xen staging-4.14] x86/console: process softirqs between warning prints |
patchbot |
|
07:22 |
[xen staging-4.14] x86emul: fix VPBLENDMW with mask and memory operand |
patchbot |
|
07:22 |
[xen staging-4.14] build: fix exported variable name CFLAGS_stack_boundary |
patchbot |
|
07:22 |
[xen staging-4.14] tools/libs/light: set video_mem for PVH guests |
patchbot |
|
07:22 |
[xen staging-4.14] tools/libxl: Correctly align the ACPI tables |
patchbot |
|
07:22 |
[xen staging-4.14] update Xen version to 4.14.5-pre |
patchbot |
|
06:45 |
[xen staging] EFI: correct indentation in efi_tables() |
patchbot |
|
06:45 |
[xen staging] x86/boot: fold two MOVs into an ADD |
patchbot |
|
06:45 |
[xen staging] x86/boot: fold/replace moves in video handling code |
patchbot |
|
06:44 |
[xen staging] x86/boot: fold branches in video handling code |
patchbot |
|
06:44 |
[xen staging] x86/boot: simplify mode_table |
patchbot |
|
06:44 |
[xen staging] x86/EFI: retrieve EDID |
patchbot |
|
06:44 |
[xen staging] x86/mm: move guest_physmap_{add,remove}_page() |
patchbot |
|
06:44 |
[xen staging] x86/P2M: introduce p2m_{add,remove}_page() |
patchbot |
|
06:44 |
[xen staging] x86/P2M: rename p2m_remove_page() |
patchbot |
|
04:33 |
[xen stable-4.15] tools/firmware: do not add a .note.gnu.property section |
patchbot |
|
04:33 |
[xen stable-4.15] tools/firmware: force -fcf-protection=none |
patchbot |
|
04:33 |
[xen stable-4.15] libxl: Re-scope qmp_proxy_spawn.ao usage |
patchbot |
|
04:33 |
[xen stable-4.15] libxl: Don't segfault on soft-reset failure |
patchbot |
|
04:33 |
[xen stable-4.15] xl: Fix global pci options |
patchbot |
|
04:33 |
[xen stable-4.15] tools/libs/light: set video_mem for PVH guests |
patchbot |
|
03:55 |
[xen stable-4.16] tools/firmware: do not add a .note.gnu.property section |
patchbot |
|
03:55 |
[xen stable-4.16] tools/firmware: force -fcf-protection=none |
patchbot |
|
03:55 |
[xen stable-4.16] libxl: Re-scope qmp_proxy_spawn.ao usage |
patchbot |
|
03:55 |
[xen stable-4.16] libxl: Don't segfault on soft-reset failure |
patchbot |
|
03:55 |
[xen stable-4.16] xl: Fix global pci options |
patchbot |
|
03:55 |
[xen stable-4.16] tools/libs/light: set video_mem for PVH guests |
patchbot |
|
April 06, 22 |
21:47 |
[xen master] IOMMU/x86: use per-device page tables for quarantining |
patchbot |
|
21:46 |
[xen master] AMD/IOMMU: abstract maximum number of page table levels |
patchbot |
|
21:46 |
[xen master] IOMMU/x86: drop TLB flushes from quarantine_init() hooks |
patchbot |
|
21:46 |
[xen master] IOMMU/x86: maintain a per-device pseudo domain ID |
patchbot |
|
21:46 |
[xen master] VT-d: prepare for per-device quarantine page tables (part II) |
patchbot |
|
21:46 |
[xen master] VT-d: prepare for per-device quarantine page tables (part I) |
patchbot |
|
21:46 |
[xen master] AMD/IOMMU: re-assign devices directly |
patchbot |
|
21:45 |
[xen master] VT-d: re-assign devices directly |
patchbot |
|
21:45 |
[xen master] VT-d: drop ownership checking from domain_context_mapping_one() |
patchbot |
|
21:45 |
[xen master] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter |
patchbot |
|
21:45 |
[xen master] VT-d: fix add/remove ordering when RMRRs are in use |
patchbot |
|
21:45 |
[xen master] VT-d: fix (de)assign ordering when RMRRs are in use |
patchbot |
|
21:45 |
[xen master] VT-d: correct ordering of operations in cleanup_domid_map() |
patchbot |
|
21:44 |
[xen master] x86/hap: do not switch on log dirty for VRAM tracking |
patchbot |
|
21:44 |
[xen master] x86/time: use fake read_tsc() |
patchbot |
|
21:44 |
[xen master] include: move STR() and IS_ALIGNED() |
patchbot |
|
21:44 |
[xen master] x86/APIC: make connections between seemingly arbitrary numbers |
patchbot |
|
21:44 |
[xen master] x86/APIC: calibrate against platform timer when possible |
patchbot |
|
21:44 |
[xen master] build: grab common EFI source files in arch specific dir |
patchbot |
|
16:38 |
[xen stable-4.14] IOMMU/x86: use per-device page tables for quarantining |
patchbot |
|
16:38 |
[xen stable-4.14] AMD/IOMMU: abstract maximum number of page table levels |
patchbot |
|
16:38 |
[xen stable-4.14] IOMMU/x86: drop TLB flushes from quarantine_init() hooks |
patchbot |
|
16:37 |
[xen stable-4.14] IOMMU/x86: maintain a per-device pseudo domain ID |
patchbot |
|
16:37 |
[xen stable-4.14] VT-d: prepare for per-device quarantine page tables (part II) |
patchbot |
|
16:37 |
[xen stable-4.14] VT-d: prepare for per-device quarantine page tables (part I) |
patchbot |
|
16:37 |
[xen stable-4.14] AMD/IOMMU: re-assign devices directly |
patchbot |
|
16:37 |
[xen stable-4.14] VT-d: re-assign devices directly |
patchbot |
|
16:37 |
[xen stable-4.14] VT-d: drop ownership checking from domain_context_mapping_one() |
patchbot |
|
16:36 |
[xen stable-4.14] VT-d: fix add/remove ordering when RMRRs are in use |
patchbot |
|
16:36 |
[xen stable-4.14] VT-d: fix (de)assign ordering when RMRRs are in use |
patchbot |
|
16:36 |
[xen stable-4.14] VT-d: correct ordering of operations in cleanup_domid_map() |
patchbot |
|
16:36 |
[xen stable-4.14] x86/hap: do not switch on log dirty for VRAM tracking |
patchbot |
|
16:36 |
[xen stable-4.14] livepatch: account for patch offset when applying NOP patch |
patchbot |
|
16:36 |
[xen stable-4.14] livepatch: resolve old address before function verification |
patchbot |
|
16:35 |
[xen stable-4.14] x86/cet: Remove XEN_SHSTK's dependency on EXPERT |
patchbot |
|
16:35 |
[xen stable-4.14] xen/x86: Livepatch: support patching CET-enhanced functions |
patchbot |
|
16:35 |
[xen stable-4.14] x86/cet: Remove writeable mapping of the BSPs shadow stack |
patchbot |
|
16:35 |
[xen stable-4.14] x86/cet: Clear IST supervisor token busy bits on S3 resume |
patchbot |
|
16:35 |
[xen stable-4.14] x86/kexec: Fix kexec-reboot with CET active |
patchbot |
|
16:35 |
[xen stable-4.14] x86/spec-ctrl: Disable retpolines with CET-IBT |
patchbot |
|
16:34 |
[xen stable-4.14] x86/CET: Fix S3 resume with shadow stacks active |
patchbot |
|
16:34 |
[xen stable-4.14] x86: Enable CET Indirect Branch Tracking |
patchbot |
|
16:34 |
[xen stable-4.14] x86/EFI: Disable CET-IBT around Runtime Services calls |
patchbot |
|
16:34 |
[xen stable-4.14] x86/setup: Rework MSR_S_CET handling for CET-IBT |
patchbot |
|
16:34 |
[xen stable-4.14] x86/entry: Make IDT entrypoints CET-IBT compatible |
patchbot |
|
16:34 |
[xen stable-4.14] x86/entry: Make syscall/sysenter entrypoints CET-IBT compatible |
patchbot |
|
16:33 |
[xen stable-4.14] x86/emul: Update emulation stubs to be CET-IBT compatible |
patchbot |
|
16:33 |
[xen stable-4.14] x86: Introduce helpers/checks for endbr64 instructions |
patchbot |
|
16:33 |
[xen stable-4.14] x86/traps: Rework write_stub_trampoline() to not hardcode the jmp |
patchbot |
|
16:33 |
[xen stable-4.14] x86/alternatives: Clear CR4.CET when clearing CR0.WP |
patchbot |
|
16:33 |
[xen stable-4.14] x86/setup: Read CR4 earlier in __start_xen() |
patchbot |
|
16:33 |
[xen stable-4.14] x86: Introduce support for CET-IBT |
patchbot |
|
08:33 |
[xen staging-4.15] tools/firmware: do not add a .note.gnu.property section |
patchbot |
|
08:33 |
[xen staging-4.15] tools/firmware: force -fcf-protection=none |
patchbot |
|
08:33 |
[xen staging-4.15] libxl: Re-scope qmp_proxy_spawn.ao usage |
patchbot |
|
08:33 |
[xen staging-4.15] libxl: Don't segfault on soft-reset failure |
patchbot |
|
08:33 |
[xen staging-4.15] xl: Fix global pci options |
patchbot |
|
08:33 |
[xen staging-4.15] tools/libs/light: set video_mem for PVH guests |
patchbot |
|
08:22 |
[xen staging-4.16] tools/firmware: do not add a .note.gnu.property section |
patchbot |
|
08:22 |
[xen staging-4.16] tools/firmware: force -fcf-protection=none |
patchbot |
|
08:22 |
[xen staging-4.16] libxl: Re-scope qmp_proxy_spawn.ao usage |
patchbot |
|
08:22 |
[xen staging-4.16] libxl: Don't segfault on soft-reset failure |
patchbot |
|
08:22 |
[xen staging-4.16] xl: Fix global pci options |
patchbot |
|
08:22 |
[xen staging-4.16] tools/libs/light: set video_mem for PVH guests |
patchbot |
|
06:02 |
[xen stable-4.16] IOMMU/x86: use per-device page tables for quarantining |
patchbot |
|
06:02 |
[xen stable-4.16] AMD/IOMMU: abstract maximum number of page table levels |
patchbot |
|
06:01 |
[xen stable-4.16] IOMMU/x86: drop TLB flushes from quarantine_init() hooks |
patchbot |
|
06:01 |
[xen stable-4.16] IOMMU/x86: maintain a per-device pseudo domain ID |
patchbot |
|
06:01 |
[xen stable-4.16] VT-d: prepare for per-device quarantine page tables (part II) |
patchbot |
|
06:01 |
[xen stable-4.16] VT-d: prepare for per-device quarantine page tables (part I) |
patchbot |
|
06:01 |
[xen stable-4.16] AMD/IOMMU: re-assign devices directly |
patchbot |
|
06:01 |
[xen stable-4.16] VT-d: re-assign devices directly |
patchbot |
|
06:00 |
[xen stable-4.16] VT-d: drop ownership checking from domain_context_mapping_one() |
patchbot |
|
06:00 |
[xen stable-4.16] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter |
patchbot |
|
06:00 |
[xen stable-4.16] VT-d: fix add/remove ordering when RMRRs are in use |
patchbot |
|
06:00 |
[xen stable-4.16] VT-d: fix (de)assign ordering when RMRRs are in use |
patchbot |
|
06:00 |
[xen stable-4.16] VT-d: correct ordering of operations in cleanup_domid_map() |
patchbot |
|
06:00 |
[xen stable-4.16] x86/hap: do not switch on log dirty for VRAM tracking |
patchbot |
|
05:35 |
[xen stable-4.13] IOMMU/x86: use per-device page tables for quarantining |
patchbot |
|
05:35 |
[xen stable-4.13] AMD/IOMMU: abstract maximum number of page table levels |
patchbot |
|
05:34 |
[xen stable-4.13] IOMMU/x86: drop TLB flushes from quarantine_init() hooks |
patchbot |
|
05:34 |
[xen stable-4.13] IOMMU/x86: maintain a per-device pseudo domain ID |
patchbot |
|
05:34 |
[xen stable-4.13] VT-d: prepare for per-device quarantine page tables (part II) |
patchbot |
|
05:34 |
[xen stable-4.13] VT-d: prepare for per-device quarantine page tables (part I) |
patchbot |
|
05:34 |
[xen stable-4.13] AMD/IOMMU: re-assign devices directly |
patchbot |
|
05:34 |
[xen stable-4.13] VT-d: re-assign devices directly |
patchbot |
|
05:33 |
[xen stable-4.13] VT-d: drop ownership checking from domain_context_mapping_one() |
patchbot |
|
05:33 |
[xen stable-4.13] VT-d: fix add/remove ordering when RMRRs are in use |
patchbot |
|
05:33 |
[xen stable-4.13] VT-d: fix (de)assign ordering when RMRRs are in use |
patchbot |
|
05:33 |
[xen stable-4.13] VT-d: correct ordering of operations in cleanup_domid_map() |
patchbot |
|
05:33 |
[xen stable-4.13] x86/hap: do not switch on log dirty for VRAM tracking |
patchbot |
|
05:33 |
[xen stable-4.13] VT-d: split domid map cleanup check into a function |
patchbot |
|
02:35 |
[xen stable-4.15] IOMMU/x86: use per-device page tables for quarantining |
patchbot |
|
02:35 |
[xen stable-4.15] AMD/IOMMU: abstract maximum number of page table levels |
patchbot |
|
02:34 |
[xen stable-4.15] IOMMU/x86: drop TLB flushes from quarantine_init() hooks |
patchbot |
|
02:34 |
[xen stable-4.15] IOMMU/x86: maintain a per-device pseudo domain ID |
patchbot |
|
02:34 |
[xen stable-4.15] VT-d: prepare for per-device quarantine page tables (part II) |
patchbot |
|
02:34 |
[xen stable-4.15] VT-d: prepare for per-device quarantine page tables (part I) |
patchbot |
|
02:34 |
[xen stable-4.15] AMD/IOMMU: re-assign devices directly |
patchbot |
|
02:34 |
[xen stable-4.15] VT-d: re-assign devices directly |
patchbot |
|
02:33 |
[xen stable-4.15] VT-d: drop ownership checking from domain_context_mapping_one() |
patchbot |
|
02:33 |
[xen stable-4.15] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter |
patchbot |
|
02:33 |
[xen stable-4.15] VT-d: fix add/remove ordering when RMRRs are in use |
patchbot |
|
02:33 |
[xen stable-4.15] VT-d: fix (de)assign ordering when RMRRs are in use |
patchbot |
|
02:33 |
[xen stable-4.15] VT-d: correct ordering of operations in cleanup_domid_map() |
patchbot |
|
02:33 |
[xen stable-4.15] x86/hap: do not switch on log dirty for VRAM tracking |
patchbot |
|
April 05, 22 |
13:46 |
[xen staging-4.12] IOMMU/x86: use per-device page tables for quarantining |
patchbot |
|
13:46 |
[xen staging-4.12] AMD/IOMMU: abstract maximum number of page table levels |
patchbot |
|
13:45 |
[xen staging-4.12] IOMMU/x86: drop TLB flushes from quarantine_init() hooks |
patchbot |
|
13:45 |
[xen staging-4.12] IOMMU/x86: maintain a per-device pseudo domain ID |
patchbot |
|
13:45 |
[xen staging-4.12] VT-d: prepare for per-device quarantine page tables (part II) |
patchbot |
|
13:45 |
[xen staging-4.12] VT-d: prepare for per-device quarantine page tables (part I) |
patchbot |
|
13:45 |
[xen staging-4.12] AMD/IOMMU: re-assign devices directly |
patchbot |
|
13:45 |
[xen staging-4.12] VT-d: re-assign devices directly |
patchbot |
|
13:44 |
[xen staging-4.12] VT-d: drop ownership checking from domain_context_mapping_one() |
patchbot |
|
13:44 |
[xen staging-4.12] VT-d: fix add/remove ordering when RMRRs are in use |
patchbot |
|
13:44 |
[xen staging-4.12] VT-d: fix (de)assign ordering when RMRRs are in use |
patchbot |
|
13:44 |
[xen staging-4.12] VT-d: split domid map cleanup check into a function |
patchbot |
|
13:44 |
[xen staging-4.12] VT-d: correct ordering of operations in cleanup_domid_map() |
patchbot |
|
13:44 |
[xen staging-4.12] x86/hap: do not switch on log dirty for VRAM tracking |
patchbot |
|
13:35 |
[xen staging-4.13] IOMMU/x86: use per-device page tables for quarantining |
patchbot |
|
13:35 |
[xen staging-4.13] AMD/IOMMU: abstract maximum number of page table levels |
patchbot |
|
13:34 |
[xen staging-4.13] IOMMU/x86: drop TLB flushes from quarantine_init() hooks |
patchbot |
|
13:34 |
[xen staging-4.13] IOMMU/x86: maintain a per-device pseudo domain ID |
patchbot |
|
13:34 |
[xen staging-4.13] VT-d: prepare for per-device quarantine page tables (part II) |
patchbot |
|
13:34 |
[xen staging-4.13] VT-d: prepare for per-device quarantine page tables (part I) |
patchbot |
|
13:34 |
[xen staging-4.13] AMD/IOMMU: re-assign devices directly |
patchbot |
|
13:34 |
[xen staging-4.13] VT-d: re-assign devices directly |
patchbot |
|
13:33 |
[xen staging-4.13] VT-d: drop ownership checking from domain_context_mapping_one() |
patchbot |
|
13:33 |
[xen staging-4.13] VT-d: fix add/remove ordering when RMRRs are in use |
patchbot |
|
13:33 |
[xen staging-4.13] VT-d: fix (de)assign ordering when RMRRs are in use |
patchbot |
|
13:33 |
[xen staging-4.13] VT-d: correct ordering of operations in cleanup_domid_map() |
patchbot |
|
13:33 |
[xen staging-4.13] x86/hap: do not switch on log dirty for VRAM tracking |
patchbot |
|
13:33 |
[xen staging-4.13] VT-d: split domid map cleanup check into a function |
patchbot |
|
13:24 |
[xen staging-4.14] IOMMU/x86: use per-device page tables for quarantining |
patchbot |
|
13:23 |
[xen staging-4.14] AMD/IOMMU: abstract maximum number of page table levels |
patchbot |
|
13:23 |
[xen staging-4.14] IOMMU/x86: drop TLB flushes from quarantine_init() hooks |
patchbot |
|
13:23 |
[xen staging-4.14] IOMMU/x86: maintain a per-device pseudo domain ID |
patchbot |
|
13:23 |
[xen staging-4.14] VT-d: prepare for per-device quarantine page tables (part II) |
patchbot |
|
13:23 |
[xen staging-4.14] VT-d: prepare for per-device quarantine page tables (part I) |
patchbot |
|
13:23 |
[xen staging-4.14] AMD/IOMMU: re-assign devices directly |
patchbot |
|
13:22 |
[xen staging-4.14] VT-d: re-assign devices directly |
patchbot |
|
13:22 |
[xen staging-4.14] VT-d: drop ownership checking from domain_context_mapping_one() |
patchbot |
|
13:22 |
[xen staging-4.14] VT-d: fix add/remove ordering when RMRRs are in use |
patchbot |
|
13:22 |
[xen staging-4.14] VT-d: fix (de)assign ordering when RMRRs are in use |
patchbot |
|
13:22 |
[xen staging-4.14] VT-d: correct ordering of operations in cleanup_domid_map() |
patchbot |
|
13:22 |
[xen staging-4.14] x86/hap: do not switch on log dirty for VRAM tracking |
patchbot |
|
13:13 |
[xen staging-4.15] IOMMU/x86: use per-device page tables for quarantining |
patchbot |
|
13:13 |
[xen staging-4.15] AMD/IOMMU: abstract maximum number of page table levels |
patchbot |
|
13:12 |
[xen staging-4.15] IOMMU/x86: drop TLB flushes from quarantine_init() hooks |
patchbot |
|
13:12 |
[xen staging-4.15] IOMMU/x86: maintain a per-device pseudo domain ID |
patchbot |
|
13:12 |
[xen staging-4.15] VT-d: prepare for per-device quarantine page tables (part II) |
patchbot |
|
13:12 |
[xen staging-4.15] VT-d: prepare for per-device quarantine page tables (part I) |
patchbot |
|
13:12 |
[xen staging-4.15] AMD/IOMMU: re-assign devices directly |
patchbot |
|
13:12 |
[xen staging-4.15] VT-d: re-assign devices directly |
patchbot |
|
13:11 |
[xen staging-4.15] VT-d: drop ownership checking from domain_context_mapping_one() |
patchbot |
|
13:11 |
[xen staging-4.15] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter |
patchbot |
|
13:11 |
[xen staging-4.15] VT-d: fix add/remove ordering when RMRRs are in use |
patchbot |
|
13:11 |
[xen staging-4.15] VT-d: fix (de)assign ordering when RMRRs are in use |
patchbot |
|
13:11 |
[xen staging-4.15] VT-d: correct ordering of operations in cleanup_domid_map() |
patchbot |
|
13:11 |
[xen staging-4.15] x86/hap: do not switch on log dirty for VRAM tracking |
patchbot |
|
12:57 |
[xen staging-4.16] IOMMU/x86: use per-device page tables for quarantining |
patchbot |
|
12:57 |
[xen staging-4.16] AMD/IOMMU: abstract maximum number of page table levels |
patchbot |
|
12:56 |
[xen staging-4.16] IOMMU/x86: drop TLB flushes from quarantine_init() hooks |
patchbot |
|
12:56 |
[xen staging-4.16] IOMMU/x86: maintain a per-device pseudo domain ID |
patchbot |
|
12:56 |
[xen staging-4.16] VT-d: prepare for per-device quarantine page tables (part II) |
patchbot |
|
12:56 |
[xen staging-4.16] VT-d: prepare for per-device quarantine page tables (part I) |
patchbot |
|
12:56 |
[xen staging-4.16] AMD/IOMMU: re-assign devices directly |
patchbot |
|
12:56 |
[xen staging-4.16] VT-d: re-assign devices directly |
patchbot |
|
12:55 |
[xen staging-4.16] VT-d: drop ownership checking from domain_context_mapping_one() |
patchbot |
|
12:55 |
[xen staging-4.16] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter |
patchbot |
|
12:55 |
[xen staging-4.16] VT-d: fix add/remove ordering when RMRRs are in use |
patchbot |
|
12:55 |
[xen staging-4.16] VT-d: fix (de)assign ordering when RMRRs are in use |
patchbot |
|
12:55 |
[xen staging-4.16] VT-d: correct ordering of operations in cleanup_domid_map() |
patchbot |
|
12:55 |
[xen staging-4.16] x86/hap: do not switch on log dirty for VRAM tracking |
patchbot |
|
12:35 |
[xen staging] IOMMU/x86: use per-device page tables for quarantining |
patchbot |
|
12:35 |
[xen staging] AMD/IOMMU: abstract maximum number of page table levels |
patchbot |
|
12:34 |
[xen staging] IOMMU/x86: drop TLB flushes from quarantine_init() hooks |
patchbot |
|
12:34 |
[xen staging] IOMMU/x86: maintain a per-device pseudo domain ID |
patchbot |
|
12:34 |
[xen staging] VT-d: prepare for per-device quarantine page tables (part II) |
patchbot |
|
12:34 |
[xen staging] VT-d: prepare for per-device quarantine page tables (part I) |
patchbot |
|
12:34 |
[xen staging] AMD/IOMMU: re-assign devices directly |
patchbot |
|
12:34 |
[xen staging] VT-d: re-assign devices directly |
patchbot |
|
12:33 |
[xen staging] VT-d: drop ownership checking from domain_context_mapping_one() |
patchbot |
|
12:33 |
[xen staging] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter |
patchbot |
|
12:33 |
[xen staging] VT-d: fix add/remove ordering when RMRRs are in use |
patchbot |
|
12:33 |
[xen staging] VT-d: fix (de)assign ordering when RMRRs are in use |
patchbot |
|
12:33 |
[xen staging] VT-d: correct ordering of operations in cleanup_domid_map() |
patchbot |
|
12:33 |
[xen staging] x86/hap: do not switch on log dirty for VRAM tracking |
patchbot |
|
09:44 |
[xen staging] x86/time: use fake read_tsc() |
patchbot |
|
09:44 |
[xen staging] include: move STR() and IS_ALIGNED() |
patchbot |
|
09:44 |
[xen staging] x86/APIC: make connections between seemingly arbitrary numbers |
patchbot |
|
09:44 |
[xen staging] x86/APIC: calibrate against platform timer when possible |
patchbot |
|
09:44 |
[xen staging] build: grab common EFI source files in arch specific dir |
patchbot |
|
04:44 |
[xen master] tools/firmware: do not add a .note.gnu.property section |
patchbot |
|
04:44 |
[xen master] tools/firmware: fix setting of fcf-protection=none |
patchbot |
|
02:14 |
[xen stable-4.15] livepatch: account for patch offset when applying NOP patch |
patchbot |
|
02:14 |
[xen stable-4.15] vpci/msix: fix PBA accesses |
patchbot |
|
02:14 |
[xen stable-4.15] livepatch: resolve old address before function verification |
patchbot |
|
02:13 |
[xen stable-4.15] x86/cet: Remove XEN_SHSTK's dependency on EXPERT |
patchbot |
|
02:13 |
[xen stable-4.15] xen/x86: Livepatch: support patching CET-enhanced functions |
patchbot |
|
02:13 |
[xen stable-4.15] x86/cet: Remove writeable mapping of the BSPs shadow stack |
patchbot |
|
02:13 |
[xen stable-4.15] x86/cet: Clear IST supervisor token busy bits on S3 resume |
patchbot |
|
02:13 |
[xen stable-4.15] x86/kexec: Fix kexec-reboot with CET active |
patchbot |
|
02:13 |
[xen stable-4.15] x86/spec-ctrl: Disable retpolines with CET-IBT |
patchbot |
|
02:12 |
[xen stable-4.15] x86/CET: Fix S3 resume with shadow stacks active |
patchbot |
|
02:12 |
[xen stable-4.15] x86: Enable CET Indirect Branch Tracking |
patchbot |
|
02:12 |
[xen stable-4.15] x86/EFI: Disable CET-IBT around Runtime Services calls |
patchbot |
|
02:12 |
[xen stable-4.15] x86/setup: Rework MSR_S_CET handling for CET-IBT |
patchbot |
|
02:12 |
[xen stable-4.15] x86/entry: Make IDT entrypoints CET-IBT compatible |
patchbot |
|
02:12 |
[xen stable-4.15] x86/entry: Make syscall/sysenter entrypoints CET-IBT compatible |
patchbot |
|
02:11 |
[xen stable-4.15] x86/emul: Update emulation stubs to be CET-IBT compatible |
patchbot |
|
02:11 |
[xen stable-4.15] x86: Introduce helpers/checks for endbr64 instructions |
patchbot |
|
02:11 |
[xen stable-4.15] x86/traps: Rework write_stub_trampoline() to not hardcode the jmp |
patchbot |
|
02:11 |
[xen stable-4.15] x86/alternatives: Clear CR4.CET when clearing CR0.WP |
patchbot |
|
02:11 |
[xen stable-4.15] x86/setup: Read CR4 earlier in __start_xen() |
patchbot |
|
02:11 |
[xen stable-4.15] x86: Introduce support for CET-IBT |
patchbot |
|
April 04, 22 |
14:00 |
[xen staging-4.14] livepatch: account for patch offset when applying NOP patch |
patchbot |
|
13:33 |
[xen staging-4.15] livepatch: account for patch offset when applying NOP patch |
patchbot |
|
13:33 |
[xen staging-4.15] vpci/msix: fix PBA accesses |
patchbot |
|
11:33 |
[xen staging] tools/firmware: do not add a .note.gnu.property section |
patchbot |
|
11:33 |
[xen staging] tools/firmware: fix setting of fcf-protection=none |
patchbot |
|
April 03, 22 |
02:00 |
[xen master] libxl: Re-scope qmp_proxy_spawn.ao usage |
patchbot |
|
02:00 |
[xen master] libxl: Don't segfault on soft-reset failure |
patchbot |
|
April 02, 22 |
18:03 |
[xen stable-4.16] livepatch: account for patch offset when applying NOP patch |
patchbot |
|
18:03 |
[xen stable-4.16] vpci/msix: fix PBA accesses |
patchbot |
|
18:03 |
[xen stable-4.16] x86/Kconfig: introduce option to select retpoline usage |
patchbot |
|
18:03 |
[xen stable-4.16] x86/clang: add retpoline support |
patchbot |
|
18:03 |
[xen stable-4.16] x86/retpoline: split retpoline compiler support into separate option |
patchbot |
|
18:03 |
[xen stable-4.16] livepatch: resolve old address before function verification |
patchbot |
|
18:02 |
[xen stable-4.16] x86/cet: Remove XEN_SHSTK's dependency on EXPERT |
patchbot |
|
18:02 |
[xen stable-4.16] xen/x86: Livepatch: support patching CET-enhanced functions |
patchbot |
|
18:02 |
[xen stable-4.16] x86/cet: Remove writeable mapping of the BSPs shadow stack |
patchbot |
|
18:02 |
[xen stable-4.16] x86/cet: Clear IST supervisor token busy bits on S3 resume |
patchbot |
|
18:02 |
[xen stable-4.16] x86/kexec: Fix kexec-reboot with CET active |
patchbot |
|
18:02 |
[xen stable-4.16] x86/spec-ctrl: Disable retpolines with CET-IBT |
patchbot |
|
18:01 |
[xen stable-4.16] x86/CET: Fix S3 resume with shadow stacks active |
patchbot |
|
18:01 |
[xen stable-4.16] x86: Enable CET Indirect Branch Tracking |
patchbot |
|
18:01 |
[xen stable-4.16] x86/EFI: Disable CET-IBT around Runtime Services calls |
patchbot |
|
18:01 |
[xen stable-4.16] x86/setup: Rework MSR_S_CET handling for CET-IBT |
patchbot |
|
18:01 |
[xen stable-4.16] x86/entry: Make IDT entrypoints CET-IBT compatible |
patchbot |
|
18:01 |
[xen stable-4.16] x86/entry: Make syscall/sysenter entrypoints CET-IBT compatible |
patchbot |
|
18:00 |
[xen stable-4.16] x86/emul: Update emulation stubs to be CET-IBT compatible |
patchbot |
|
18:00 |
[xen stable-4.16] x86: Introduce helpers/checks for endbr64 instructions |
patchbot |
|
18:00 |
[xen stable-4.16] x86/traps: Rework write_stub_trampoline() to not hardcode the jmp |
patchbot |
|
18:00 |
[xen stable-4.16] x86/alternatives: Clear CR4.CET when clearing CR0.WP |
patchbot |
|
18:00 |
[xen stable-4.16] x86/setup: Read CR4 earlier in __start_xen() |
patchbot |
|
18:00 |
[xen stable-4.16] x86: Introduce support for CET-IBT |
patchbot |
|
03:33 |
[xen master] libxl: constify libxl__stubdomain_is_linux |
patchbot |
|
03:33 |
[xen master] xl: Fix global pci options |
patchbot |
|
03:33 |
[xen master] livepatch: account for patch offset when applying NOP patch |
patchbot |
|
03:33 |
[xen master] livepatch: fix typos |
patchbot |
|
April 01, 22 |
16:11 |
[xen staging] libxl: Re-scope qmp_proxy_spawn.ao usage |
patchbot |
|
16:11 |
[xen staging] libxl: Don't segfault on soft-reset failure |
patchbot |
|