xen-changelog Mail Thread Index
- [xen master] MAINTAINERS: add Rahul as SMMU maintainer,
patchbot
- [xen master] x86/mem_sharing: make fork_reset more configurable,
patchbot
- [xen master] PCI: replace "secondary" flavors of PCI_{DEVFN,BDF,SBDF}(),
patchbot
- [xen master] PCI: replace stray uses of PCI_{DEVFN,BDF}2(),
patchbot
- [xen master] x86+libxl: correct p2m (shadow) memory pool size calculation,
patchbot
- [xen master] x86/mwait-idle: add SPR support,
patchbot
- [xen master] x86/mwait-idle: switch to asm/intel-family.h naming,
patchbot
- [xen master] xen/public: add new macro to ring.h,
patchbot
- [xen master] drivers/exynos4210: Remove unused-but-set variable,
patchbot
- [xen master] platforms/omap: Remove unused-but-set variable,
patchbot
- [xen master] platforms/xgene: Make use of dt_device_get_address return value,
patchbot
- [xen master] xen/sched: Remove unused-but-set variable,
patchbot
- [xen master] xen/arm: smmu.c: Remove unused-but-set variable,
patchbot
- [xen master] efi/boot.c: Remove unused-but-set variable,
patchbot
- [xen master] xen/arm: bootfdt.c: Remove unused-but-set variable,
patchbot
- [xen master] xen/arm64: io: Handle data abort due to cache maintenance instructions,
patchbot
- [xen master] xen/arm: alternative: Don't call vmap() within stop_machine_run(),
patchbot
- [xen master] EFI: don't mistakenly delete a file we never installed,
patchbot
- [xen master] libxl: retry QMP PCI device_add,
patchbot
- [xen master] x86/vmx: add hvm functions to get/set non-register state,
patchbot
- [xen staging] MAINTAINERS: add Rahul as SMMU maintainer,
patchbot
- [xen staging] x86/mem_sharing: make fork_reset more configurable,
patchbot
- [xen staging] PCI: replace "secondary" flavors of PCI_{DEVFN,BDF,SBDF}(),
patchbot
- [xen staging] PCI: replace stray uses of PCI_{DEVFN,BDF}2(),
patchbot
- [xen staging] x86+libxl: correct p2m (shadow) memory pool size calculation,
patchbot
- [xen staging] x86/mwait-idle: add SPR support,
patchbot
- [xen staging] x86/mwait-idle: switch to asm/intel-family.h naming,
patchbot
- [xen staging] xen/public: add new macro to ring.h,
patchbot
- [xen staging] drivers/exynos4210: Remove unused-but-set variable,
patchbot
- [xen staging] platforms/omap: Remove unused-but-set variable,
patchbot
- [xen staging] platforms/xgene: Make use of dt_device_get_address return value,
patchbot
- [xen staging] xen/sched: Remove unused-but-set variable,
patchbot
- [xen staging] xen/arm: smmu.c: Remove unused-but-set variable,
patchbot
- [xen staging] efi/boot.c: Remove unused-but-set variable,
patchbot
- [xen staging] xen/arm: bootfdt.c: Remove unused-but-set variable,
patchbot
- [xen master] Revert "page_alloc: assert IRQs are enabled in heap alloc/free",
patchbot
- [xen master] page_alloc: assert IRQs are enabled in heap alloc/free,
patchbot
- [xen master] xsm/flask: code style formatting,
patchbot
- [xen master] IOMMU: make domctl handler tolerate NULL domain,
patchbot
- [xen master] xen/iommu: cleanup iommu related domctl handling,
patchbot
- [xen staging] xen/arm64: io: Handle data abort due to cache maintenance instructions,
patchbot
- [xen staging] xen/arm: alternative: Don't call vmap() within stop_machine_run(),
patchbot
- [xen staging] EFI: don't mistakenly delete a file we never installed,
patchbot
- [xen staging] libxl: retry QMP PCI device_add,
patchbot
- [xen staging] x86/vmx: add hvm functions to get/set non-register state,
patchbot
- [xen staging] Revert "page_alloc: assert IRQs are enabled in heap alloc/free",
patchbot
- [xen staging] page_alloc: assert IRQs are enabled in heap alloc/free,
patchbot
- [xen staging] xsm/flask: code style formatting,
patchbot
- [xen staging] IOMMU: make domctl handler tolerate NULL domain,
patchbot
- [xen staging] xen/iommu: cleanup iommu related domctl handling,
patchbot
- [xen master] tools/libs/light: don't set errno to a negative value,
patchbot
- [xen master] tools/libs/guest: don't set errno to a negative value,
patchbot
- [xen master] tools/libs/ctrl: don't set errno to a negative value,
patchbot
- [xen master] tools/libs/evtchn: don't set errno to negative values,
patchbot
- [xen master] xen: Split x86/debugger.h into common and arch specific parts,
patchbot
- [xen master] x86/debugger: Misc cleanup prior to splitting,
patchbot
- [xen master] x86/gdbstub: Clean up includes,
patchbot
- [xen master] x86/gdbsx: Move domain_pause_for_debugger() into gdbsx,
patchbot
- [xen master] x86/gdbsx: Rename debug.c to gdbsx.c,
patchbot
- [xen master] x86/debugger: Remove debugger_trap_entry(),
patchbot
- [xen master] xen/build: Fix MAP rule when called in isolation,
patchbot
- [xen master] x86/build: make linking work again with ld incapable of generating build ID,
patchbot
- [xen master] AMD/IOMMU: drop stray TLB flush,
patchbot
- [xen master] IOMMU: have vendor code announce supported page sizes,
patchbot
- [xen master] VT-d: limit page table population in domain_pgd_maddr(),
patchbot
- [xen master] VT-d: have callers specify the target level for page table walks,
patchbot
- [xen master] AMD/IOMMU: have callers specify the target level for page table walks,
patchbot
- [xen master] gitlab-ci: add an ARM32 qemu-based smoke test,
patchbot
- [xen master] gitlab-ci: add qemu-system-arm to the existing tests-artifacts container,
patchbot
- [xen staging] tools/libs/light: don't set errno to a negative value,
patchbot
- [xen staging] tools/libs/guest: don't set errno to a negative value,
patchbot
- [xen staging] tools/libs/ctrl: don't set errno to a negative value,
patchbot
- [xen staging] tools/libs/evtchn: don't set errno to negative values,
patchbot
- [xen staging] xen: Split x86/debugger.h into common and arch specific parts,
patchbot
- [xen staging] x86/debugger: Misc cleanup prior to splitting,
patchbot
- [xen staging] x86/gdbstub: Clean up includes,
patchbot
- [xen staging] x86/gdbsx: Move domain_pause_for_debugger() into gdbsx,
patchbot
- [xen staging] x86/gdbsx: Rename debug.c to gdbsx.c,
patchbot
- [xen staging] x86/debugger: Remove debugger_trap_entry(),
patchbot
- [xen staging] xen/build: Fix MAP rule when called in isolation,
patchbot
- [xen staging] x86/build: make linking work again with ld incapable of generating build ID,
patchbot
- [xen staging] AMD/IOMMU: drop stray TLB flush,
patchbot
- [xen staging] IOMMU: have vendor code announce supported page sizes,
patchbot
- [xen staging] VT-d: limit page table population in domain_pgd_maddr(),
patchbot
- [xen staging] VT-d: have callers specify the target level for page table walks,
patchbot
- [xen staging] AMD/IOMMU: have callers specify the target level for page table walks,
patchbot
- [xen staging] gitlab-ci: add an ARM32 qemu-based smoke test,
patchbot
- [xen staging] gitlab-ci: add qemu-system-arm to the existing tests-artifacts container,
patchbot
- [xen master] x86/build: Rework binary conversion for boot/{cmdline,reloc}.c,
patchbot
- [xen master] xen/build: Fix dependency for the MAP rule,
patchbot
- [xen master] x86/mm: avoid inadvertently degrading a TLB flush to local only,
patchbot
- [xen master] VT-d: refuse to use IOMMU with reserved CAP.ND value,
patchbot
- [xen master] VT-d: plug memory leaks in iommu_alloc(),
patchbot
- [xen master] VT-d: drop ROOT_ENTRY_NR,
patchbot
- [xen master] IOMMU/x86: drop locking from quarantine_init() hooks,
patchbot
- [xen master] include/public: add command result definitions to vscsiif.h,
patchbot
- [xen master] xen/arm: Add i.MX lpuart early printk support,
patchbot
- [xen master] xen/arm: Add i.MX lpuart driver,
patchbot
- [xen master] xen/arm: Make use of DT_MATCH_TIMER in make_timer_node,
patchbot
- [xen staging] x86/build: Rework binary conversion for boot/{cmdline,reloc}.c,
patchbot
- [xen staging] xen/build: Fix dependency for the MAP rule,
patchbot
- [xen staging] x86/mm: avoid inadvertently degrading a TLB flush to local only,
patchbot
- [xen staging] VT-d: refuse to use IOMMU with reserved CAP.ND value,
patchbot
- [xen staging] VT-d: plug memory leaks in iommu_alloc(),
patchbot
- [xen staging] VT-d: drop ROOT_ENTRY_NR,
patchbot
- [xen staging] IOMMU/x86: drop locking from quarantine_init() hooks,
patchbot
- [xen staging] include/public: add command result definitions to vscsiif.h,
patchbot
- [xen master] xen: cleanup gdbsx_guest_mem_io() call,
patchbot
- [xen master] xen: fix XEN_DOMCTL_gdbsx_guestmemio crash,
patchbot
- [xen staging] xen/arm: Add i.MX lpuart early printk support,
patchbot
- [xen staging] xen/arm: Add i.MX lpuart driver,
patchbot
- [xen staging] xen/arm: Make use of DT_MATCH_TIMER in make_timer_node,
patchbot
- [xen master] x86/debug: Drop unnecessary include of compile.h,
patchbot
- [xen staging] xen: cleanup gdbsx_guest_mem_io() call,
patchbot
- [xen staging] xen: fix XEN_DOMCTL_gdbsx_guestmemio crash,
patchbot
- [xen staging] x86/debug: Drop unnecessary include of compile.h,
patchbot
- [xen master] IOMMU: log appropriate SBDF,
patchbot
- [xen master] AMD/IOMMU: replace a few PCI_BDF2(),
patchbot
- [xen master] build: adding out-of-tree support to the xen build,
patchbot
- [xen staging] IOMMU: log appropriate SBDF,
patchbot
- [xen staging] AMD/IOMMU: replace a few PCI_BDF2(),
patchbot
- [xen staging] build: adding out-of-tree support to the xen build,
patchbot
- [xen stable-4.16] update Xen version to 4.16.1,
patchbot
- [xen stable-4.14] update Xen version to 4.14.5,
patchbot
- [xen master] MAINTAINERS: add myself as Continuous Integration maintainer,
patchbot
- [xen staging-4.16] update Xen version to 4.16.1,
patchbot
- [xen staging-4.14] update Xen version to 4.14.5,
patchbot
- [xen staging] MAINTAINERS: add myself as Continuous Integration maintainer,
patchbot
- [xen master] tools/xl: fix vif and vcpupin parse tests,
patchbot
- [xen master] x86/boot: LEA -> MOV in video handling code,
patchbot
- [xen master] Merge branch 'staging' of xenbits.xen.org:/home/xen/git/xen into staging,
patchbot
- [xen master] xen: Populate xen.lds.h and make use of its macros,
patchbot
- [xen master] xen: Introduce a header to store common linker scripts content,
patchbot
- [xen master] x86/boot: obtain video info from boot loader,
patchbot
- [xen master] x86/boot: make "vga=current" work with graphics modes,
patchbot
- [xen staging] tools/xl: fix vif and vcpupin parse tests,
patchbot
- [xen staging] x86/boot: LEA -> MOV in video handling code,
patchbot
- [xen staging] Merge branch 'staging' of xenbits.xen.org:/home/xen/git/xen into staging,
patchbot
- [xen staging] x86/boot: obtain video info from boot loader,
patchbot
- [xen staging] x86/boot: make "vga=current" work with graphics modes,
patchbot
- [xen staging] xen: Populate xen.lds.h and make use of its macros,
patchbot
- [xen staging] xen: Introduce a header to store common linker scripts content,
patchbot
- [xen master] SUPPORT.md: add Dom0less as Supported,
patchbot
- [xen stable-4.16] livepatch: avoid relocations referencing ignored section symbols,
patchbot
- [xen stable-4.16] livepatch: do not ignore sections with 0 size,
patchbot
- [xen stable-4.16] vPCI: fix MSI-X PBA read/write gprintk()s,
patchbot
- [xen stable-4.16] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies,
patchbot
- [xen stable-4.16] VT-d: avoid infinite recursion on domain_context_mapping_one() error path,
patchbot
- [xen stable-4.16] VT-d: avoid NULL deref on domain_context_mapping_one() error paths,
patchbot
- [xen stable-4.16] VT-d: don't needlessly look up DID,
patchbot
- [xen master] x86/irq: skip unmap_domain_pirq XSM during destruction,
patchbot
- [xen master] x86/P2M: the majority for struct p2m_domain's fields are HVM-only,
patchbot
- [xen master] x86/P2M: p2m.c is HVM-only,
patchbot
- [xen master] paged_pages field is MEM_PAGING-only,
patchbot
- [xen master] shr_pages field is MEM_SHARING-only,
patchbot
- [xen master] x86/p2m: re-arrange {,__}put_gfn(),
patchbot
- [xen master] x86/P2M: derive HVM-only variant from __get_gfn_type_access(),
patchbot
- [xen master] x86/P2M: p2m_get_page_from_gfn() is HVM-only,
patchbot
- [xen master] x86/P2M: split out init/teardown functions,
patchbot
- [xen master] x86/P2M: PoD, altp2m, and nested-p2m are HVM-only,
patchbot
- [xen master] x86/P2M: p2m_{alloc,free}_ptp() and p2m_alloc_table() are HVM-only,
patchbot
- [xen master] x86/mm: split set_identity_p2m_entry() into PV and HVM parts,
patchbot
- [xen master] livepatch: avoid relocations referencing ignored section symbols,
patchbot
- [xen master] livepatch: do not ignore sections with 0 size,
patchbot
- [xen stable-4.14] livepatch: avoid relocations referencing ignored section symbols,
patchbot
- [xen stable-4.14] livepatch: do not ignore sections with 0 size,
patchbot
- [xen stable-4.14] vPCI: replace %pp,
patchbot
- [xen stable-4.14] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies,
patchbot
- [xen stable-4.14] VT-d: avoid infinite recursion on domain_context_mapping_one() error path,
patchbot
- [xen stable-4.14] VT-d: avoid NULL deref on domain_context_mapping_one() error paths,
patchbot
- [xen stable-4.14] VT-d: don't needlessly look up DID,
patchbot
- [xen stable-4.13] VT-d: avoid infinite recursion on domain_context_mapping_one() error path,
patchbot
- [xen stable-4.13] VT-d: avoid NULL deref on domain_context_mapping_one() error paths,
patchbot
- [xen stable-4.13] VT-d: don't needlessly look up DID,
patchbot
- [xen stable-4.12] VT-d: avoid infinite recursion on domain_context_mapping_one() error path,
patchbot
- [xen stable-4.12] VT-d: don't needlessly look up DID,
patchbot
- [xen stable-4.12] VT-d: avoid NULL deref on domain_context_mapping_one() error paths,
patchbot
- [xen stable-4.15] livepatch: avoid relocations referencing ignored section symbols,
patchbot
- [xen stable-4.15] livepatch: do not ignore sections with 0 size,
patchbot
- [xen stable-4.15] vPCI: fix MSI-X PBA read/write gprintk()s,
patchbot
- [xen stable-4.15] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies,
patchbot
- [xen stable-4.15] VT-d: avoid infinite recursion on domain_context_mapping_one() error path,
patchbot
- [xen stable-4.15] VT-d: avoid NULL deref on domain_context_mapping_one() error paths,
patchbot
- [xen stable-4.15] VT-d: don't needlessly look up DID,
patchbot
- [xen staging] SUPPORT.md: add Dom0less as Supported,
patchbot
- [xen master] vPCI: fix MSI-X PBA read/write gprintk()s,
patchbot
- [xen master] build: shuffle main Makefile,
patchbot
- [xen master] build: specify source tree in include/ for prerequisite,
patchbot
- [xen master] build: rework "headers*.chk" prerequisite in include/,
patchbot
- [xen master] build: replace $(BASEDIR) and use $(srctree),
patchbot
- [xen master] build: replace $(BASEDIR) by $(objtree),
patchbot
- [xen staging-4.12] VT-d: avoid infinite recursion on domain_context_mapping_one() error path,
patchbot
- [xen staging-4.12] VT-d: avoid NULL deref on domain_context_mapping_one() error paths,
patchbot
- [xen staging-4.12] VT-d: don't needlessly look up DID,
patchbot
- [xen staging-4.13] VT-d: avoid infinite recursion on domain_context_mapping_one() error path,
patchbot
- [xen staging-4.13] VT-d: avoid NULL deref on domain_context_mapping_one() error paths,
patchbot
- [xen staging-4.13] VT-d: don't needlessly look up DID,
patchbot
- [xen staging-4.14] livepatch: avoid relocations referencing ignored section symbols,
patchbot
- [xen staging-4.14] livepatch: do not ignore sections with 0 size,
patchbot
- [xen staging-4.14] vPCI: replace %pp,
patchbot
- [xen staging-4.14] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies,
patchbot
- [xen staging-4.14] VT-d: avoid infinite recursion on domain_context_mapping_one() error path,
patchbot
- [xen staging-4.14] VT-d: avoid NULL deref on domain_context_mapping_one() error paths,
patchbot
- [xen staging-4.14] VT-d: don't needlessly look up DID,
patchbot
- [xen staging-4.15] livepatch: avoid relocations referencing ignored section symbols,
patchbot
- [xen staging-4.15] livepatch: do not ignore sections with 0 size,
patchbot
- [xen staging-4.15] vPCI: fix MSI-X PBA read/write gprintk()s,
patchbot
- [xen staging-4.15] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies,
patchbot
- [xen staging-4.15] VT-d: avoid infinite recursion on domain_context_mapping_one() error path,
patchbot
- [xen staging-4.15] VT-d: avoid NULL deref on domain_context_mapping_one() error paths,
patchbot
- [xen staging-4.15] VT-d: don't needlessly look up DID,
patchbot
- [xen staging-4.16] livepatch: avoid relocations referencing ignored section symbols,
patchbot
- [xen staging-4.16] livepatch: do not ignore sections with 0 size,
patchbot
- [xen staging-4.16] vPCI: fix MSI-X PBA read/write gprintk()s,
patchbot
- [xen staging-4.16] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies,
patchbot
- [xen staging-4.16] VT-d: avoid infinite recursion on domain_context_mapping_one() error path,
patchbot
- [xen staging-4.16] VT-d: avoid NULL deref on domain_context_mapping_one() error paths,
patchbot
- [xen staging-4.16] VT-d: don't needlessly look up DID,
patchbot
- [xen staging] x86/irq: skip unmap_domain_pirq XSM during destruction,
patchbot
- [xen staging] x86/P2M: the majority for struct p2m_domain's fields are HVM-only,
patchbot
- [xen staging] x86/P2M: p2m.c is HVM-only,
patchbot
- [xen staging] paged_pages field is MEM_PAGING-only,
patchbot
- [xen staging] shr_pages field is MEM_SHARING-only,
patchbot
- [xen staging] x86/p2m: re-arrange {,__}put_gfn(),
patchbot
- [xen staging] x86/P2M: derive HVM-only variant from __get_gfn_type_access(),
patchbot
- [xen staging] x86/P2M: p2m_get_page_from_gfn() is HVM-only,
patchbot
- [xen staging] x86/P2M: split out init/teardown functions,
patchbot
- [xen staging] x86/P2M: PoD, altp2m, and nested-p2m are HVM-only,
patchbot
- [xen staging] x86/P2M: p2m_{alloc,free}_ptp() and p2m_alloc_table() are HVM-only,
patchbot
- [xen staging] x86/mm: split set_identity_p2m_entry() into PV and HVM parts,
patchbot
- [xen master] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies,
patchbot
- [xen master] VT-d: avoid infinite recursion on domain_context_mapping_one() error path,
patchbot
- [xen master] VT-d: avoid NULL deref on domain_context_mapping_one() error paths,
patchbot
- [xen master] VT-d: don't needlessly look up DID,
patchbot
- [xen master] platform/cpufreq: add public defines for CPUFREQ_SHARED_TYPE_,
patchbot
- [xen master] EFI: correct indentation in efi_tables(),
patchbot
- [xen master] x86/boot: fold two MOVs into an ADD,
patchbot
- [xen master] x86/boot: fold/replace moves in video handling code,
patchbot
- [xen master] x86/boot: fold branches in video handling code,
patchbot
- [xen master] x86/boot: simplify mode_table,
patchbot
- [xen master] x86/EFI: retrieve EDID,
patchbot
- [xen master] x86/mm: move guest_physmap_{add,remove}_page(),
patchbot
- [xen master] x86/P2M: introduce p2m_{add,remove}_page(),
patchbot
- [xen master] x86/P2M: rename p2m_remove_page(),
patchbot
- [xen staging] livepatch: avoid relocations referencing ignored section symbols,
patchbot
- [xen staging] livepatch: do not ignore sections with 0 size,
patchbot
- [xen stable-4.12] IOMMU/x86: use per-device page tables for quarantining,
patchbot
- [xen stable-4.12] AMD/IOMMU: abstract maximum number of page table levels,
patchbot
- [xen stable-4.12] IOMMU/x86: drop TLB flushes from quarantine_init() hooks,
patchbot
- [xen stable-4.12] IOMMU/x86: maintain a per-device pseudo domain ID,
patchbot
- [xen stable-4.12] VT-d: prepare for per-device quarantine page tables (part II),
patchbot
- [xen stable-4.12] VT-d: prepare for per-device quarantine page tables (part I),
patchbot
- [xen stable-4.12] AMD/IOMMU: re-assign devices directly,
patchbot
- [xen stable-4.12] VT-d: re-assign devices directly,
patchbot
- [xen stable-4.12] VT-d: drop ownership checking from domain_context_mapping_one(),
patchbot
- [xen stable-4.12] VT-d: fix add/remove ordering when RMRRs are in use,
patchbot
- [xen stable-4.12] VT-d: fix (de)assign ordering when RMRRs are in use,
patchbot
- [xen stable-4.12] VT-d: split domid map cleanup check into a function,
patchbot
- [xen stable-4.12] VT-d: correct ordering of operations in cleanup_domid_map(),
patchbot
- [xen stable-4.12] x86/hap: do not switch on log dirty for VRAM tracking,
patchbot
- [xen stable-4.14] tools/firmware: do not add a .note.gnu.property section,
patchbot
- [xen stable-4.14] tools/firmware: force -fcf-protection=none,
patchbot
- [xen stable-4.14] libxl: Re-scope qmp_proxy_spawn.ao usage,
patchbot
- [xen stable-4.14] libxl: Don't segfault on soft-reset failure,
patchbot
- [xen stable-4.14] xl: Fix global pci options,
patchbot
- [xen stable-4.14] vpci/msix: fix PBA accesses,
patchbot
- [xen stable-4.14] xz: validate the value before assigning it to an enum variable,
patchbot
- [xen stable-4.14] xz: avoid overlapping memcpy() with invalid input with in-place decompression,
patchbot
- [xen stable-4.14] tools/libxl: don't allow IOMMU usage with PoD,
patchbot
- [xen stable-4.14] x86/console: process softirqs between warning prints,
patchbot
- [xen stable-4.14] x86emul: fix VPBLENDMW with mask and memory operand,
patchbot
- [xen stable-4.14] build: fix exported variable name CFLAGS_stack_boundary,
patchbot
- [xen stable-4.14] tools/libs/light: set video_mem for PVH guests,
patchbot
- [xen stable-4.14] tools/libxl: Correctly align the ACPI tables,
patchbot
- [xen stable-4.14] update Xen version to 4.14.5-pre,
patchbot
- [xen staging] vPCI: fix MSI-X PBA read/write gprintk()s,
patchbot
- [xen staging] build: shuffle main Makefile,
patchbot
- [xen staging] build: specify source tree in include/ for prerequisite,
patchbot
- [xen staging] build: rework "headers*.chk" prerequisite in include/,
patchbot
- [xen staging] build: replace $(BASEDIR) and use $(srctree),
patchbot
- [xen staging] build: replace $(BASEDIR) by $(objtree),
patchbot
- [xen staging] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies,
patchbot
- [xen staging] VT-d: avoid infinite recursion on domain_context_mapping_one() error path,
patchbot
- [xen staging] VT-d: avoid NULL deref on domain_context_mapping_one() error paths,
patchbot
- [xen staging] VT-d: don't needlessly look up DID,
patchbot
- [xen staging] platform/cpufreq: add public defines for CPUFREQ_SHARED_TYPE_,
patchbot
- [xen staging-4.14] tools/firmware: do not add a .note.gnu.property section,
patchbot
- [xen staging-4.14] tools/firmware: force -fcf-protection=none,
patchbot
- [xen staging-4.14] libxl: Re-scope qmp_proxy_spawn.ao usage,
patchbot
- [xen staging-4.14] libxl: Don't segfault on soft-reset failure,
patchbot
- [xen staging-4.14] xl: Fix global pci options,
patchbot
- [xen staging-4.14] vpci/msix: fix PBA accesses,
patchbot
- [xen staging-4.14] xz: validate the value before assigning it to an enum variable,
patchbot
- [xen staging-4.14] xz: avoid overlapping memcpy() with invalid input with in-place decompression,
patchbot
- [xen staging-4.14] tools/libxl: don't allow IOMMU usage with PoD,
patchbot
- [xen staging-4.14] x86/console: process softirqs between warning prints,
patchbot
- [xen staging-4.14] x86emul: fix VPBLENDMW with mask and memory operand,
patchbot
- [xen staging-4.14] build: fix exported variable name CFLAGS_stack_boundary,
patchbot
- [xen staging-4.14] tools/libs/light: set video_mem for PVH guests,
patchbot
- [xen staging-4.14] tools/libxl: Correctly align the ACPI tables,
patchbot
- [xen staging-4.14] update Xen version to 4.14.5-pre,
patchbot
- [xen staging] EFI: correct indentation in efi_tables(),
patchbot
- [xen staging] x86/boot: fold two MOVs into an ADD,
patchbot
- [xen staging] x86/boot: fold/replace moves in video handling code,
patchbot
- [xen staging] x86/boot: fold branches in video handling code,
patchbot
- [xen staging] x86/boot: simplify mode_table,
patchbot
- [xen staging] x86/EFI: retrieve EDID,
patchbot
- [xen staging] x86/mm: move guest_physmap_{add,remove}_page(),
patchbot
- [xen staging] x86/P2M: introduce p2m_{add,remove}_page(),
patchbot
- [xen staging] x86/P2M: rename p2m_remove_page(),
patchbot
- [xen stable-4.15] tools/firmware: do not add a .note.gnu.property section,
patchbot
- [xen stable-4.15] tools/firmware: force -fcf-protection=none,
patchbot
- [xen stable-4.15] libxl: Re-scope qmp_proxy_spawn.ao usage,
patchbot
- [xen stable-4.15] libxl: Don't segfault on soft-reset failure,
patchbot
- [xen stable-4.15] xl: Fix global pci options,
patchbot
- [xen stable-4.15] tools/libs/light: set video_mem for PVH guests,
patchbot
- [xen stable-4.16] tools/firmware: do not add a .note.gnu.property section,
patchbot
- [xen stable-4.16] tools/firmware: force -fcf-protection=none,
patchbot
- [xen stable-4.16] libxl: Re-scope qmp_proxy_spawn.ao usage,
patchbot
- [xen stable-4.16] libxl: Don't segfault on soft-reset failure,
patchbot
- [xen stable-4.16] xl: Fix global pci options,
patchbot
- [xen stable-4.16] tools/libs/light: set video_mem for PVH guests,
patchbot
- [xen master] IOMMU/x86: use per-device page tables for quarantining,
patchbot
- [xen master] AMD/IOMMU: abstract maximum number of page table levels,
patchbot
- [xen master] IOMMU/x86: drop TLB flushes from quarantine_init() hooks,
patchbot
- [xen master] IOMMU/x86: maintain a per-device pseudo domain ID,
patchbot
- [xen master] VT-d: prepare for per-device quarantine page tables (part II),
patchbot
- [xen master] VT-d: prepare for per-device quarantine page tables (part I),
patchbot
- [xen master] AMD/IOMMU: re-assign devices directly,
patchbot
- [xen master] VT-d: re-assign devices directly,
patchbot
- [xen master] VT-d: drop ownership checking from domain_context_mapping_one(),
patchbot
- [xen master] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter,
patchbot
- [xen master] VT-d: fix add/remove ordering when RMRRs are in use,
patchbot
- [xen master] VT-d: fix (de)assign ordering when RMRRs are in use,
patchbot
- [xen master] VT-d: correct ordering of operations in cleanup_domid_map(),
patchbot
- [xen master] x86/hap: do not switch on log dirty for VRAM tracking,
patchbot
- [xen master] x86/time: use fake read_tsc(),
patchbot
- [xen master] include: move STR() and IS_ALIGNED(),
patchbot
- [xen master] x86/APIC: make connections between seemingly arbitrary numbers,
patchbot
- [xen master] x86/APIC: calibrate against platform timer when possible,
patchbot
- [xen master] build: grab common EFI source files in arch specific dir,
patchbot
- [xen stable-4.14] IOMMU/x86: use per-device page tables for quarantining,
patchbot
- [xen stable-4.14] AMD/IOMMU: abstract maximum number of page table levels,
patchbot
- [xen stable-4.14] IOMMU/x86: drop TLB flushes from quarantine_init() hooks,
patchbot
- [xen stable-4.14] IOMMU/x86: maintain a per-device pseudo domain ID,
patchbot
- [xen stable-4.14] VT-d: prepare for per-device quarantine page tables (part II),
patchbot
- [xen stable-4.14] VT-d: prepare for per-device quarantine page tables (part I),
patchbot
- [xen stable-4.14] AMD/IOMMU: re-assign devices directly,
patchbot
- [xen stable-4.14] VT-d: re-assign devices directly,
patchbot
- [xen stable-4.14] VT-d: drop ownership checking from domain_context_mapping_one(),
patchbot
- [xen stable-4.14] VT-d: fix add/remove ordering when RMRRs are in use,
patchbot
- [xen stable-4.14] VT-d: fix (de)assign ordering when RMRRs are in use,
patchbot
- [xen stable-4.14] VT-d: correct ordering of operations in cleanup_domid_map(),
patchbot
- [xen stable-4.14] x86/hap: do not switch on log dirty for VRAM tracking,
patchbot
- [xen stable-4.14] livepatch: account for patch offset when applying NOP patch,
patchbot
- [xen stable-4.14] livepatch: resolve old address before function verification,
patchbot
- [xen stable-4.14] x86/cet: Remove XEN_SHSTK's dependency on EXPERT,
patchbot
- [xen stable-4.14] xen/x86: Livepatch: support patching CET-enhanced functions,
patchbot
- [xen stable-4.14] x86/cet: Remove writeable mapping of the BSPs shadow stack,
patchbot
- [xen stable-4.14] x86/cet: Clear IST supervisor token busy bits on S3 resume,
patchbot
- [xen stable-4.14] x86/kexec: Fix kexec-reboot with CET active,
patchbot
- [xen stable-4.14] x86/spec-ctrl: Disable retpolines with CET-IBT,
patchbot
- [xen stable-4.14] x86/CET: Fix S3 resume with shadow stacks active,
patchbot
- [xen stable-4.14] x86: Enable CET Indirect Branch Tracking,
patchbot
- [xen stable-4.14] x86/EFI: Disable CET-IBT around Runtime Services calls,
patchbot
- [xen stable-4.14] x86/setup: Rework MSR_S_CET handling for CET-IBT,
patchbot
- [xen stable-4.14] x86/entry: Make IDT entrypoints CET-IBT compatible,
patchbot
- [xen stable-4.14] x86/entry: Make syscall/sysenter entrypoints CET-IBT compatible,
patchbot
- [xen stable-4.14] x86/emul: Update emulation stubs to be CET-IBT compatible,
patchbot
- [xen stable-4.14] x86: Introduce helpers/checks for endbr64 instructions,
patchbot
- [xen stable-4.14] x86/traps: Rework write_stub_trampoline() to not hardcode the jmp,
patchbot
- [xen stable-4.14] x86/alternatives: Clear CR4.CET when clearing CR0.WP,
patchbot
- [xen stable-4.14] x86/setup: Read CR4 earlier in __start_xen(),
patchbot
- [xen stable-4.14] x86: Introduce support for CET-IBT,
patchbot
- [xen staging-4.15] tools/firmware: do not add a .note.gnu.property section,
patchbot
- [xen staging-4.15] tools/firmware: force -fcf-protection=none,
patchbot
- [xen staging-4.15] libxl: Re-scope qmp_proxy_spawn.ao usage,
patchbot
- [xen staging-4.15] libxl: Don't segfault on soft-reset failure,
patchbot
- [xen staging-4.15] xl: Fix global pci options,
patchbot
- [xen staging-4.15] tools/libs/light: set video_mem for PVH guests,
patchbot
- [xen staging-4.16] tools/firmware: do not add a .note.gnu.property section,
patchbot
- [xen staging-4.16] tools/firmware: force -fcf-protection=none,
patchbot
- [xen staging-4.16] libxl: Re-scope qmp_proxy_spawn.ao usage,
patchbot
- [xen staging-4.16] libxl: Don't segfault on soft-reset failure,
patchbot
- [xen staging-4.16] xl: Fix global pci options,
patchbot
- [xen staging-4.16] tools/libs/light: set video_mem for PVH guests,
patchbot
- [xen stable-4.16] IOMMU/x86: use per-device page tables for quarantining,
patchbot
- [xen stable-4.16] AMD/IOMMU: abstract maximum number of page table levels,
patchbot
- [xen stable-4.16] IOMMU/x86: drop TLB flushes from quarantine_init() hooks,
patchbot
- [xen stable-4.16] IOMMU/x86: maintain a per-device pseudo domain ID,
patchbot
- [xen stable-4.16] VT-d: prepare for per-device quarantine page tables (part II),
patchbot
- [xen stable-4.16] VT-d: prepare for per-device quarantine page tables (part I),
patchbot
- [xen stable-4.16] AMD/IOMMU: re-assign devices directly,
patchbot
- [xen stable-4.16] VT-d: re-assign devices directly,
patchbot
- [xen stable-4.16] VT-d: drop ownership checking from domain_context_mapping_one(),
patchbot
- [xen stable-4.16] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter,
patchbot
- [xen stable-4.16] VT-d: fix add/remove ordering when RMRRs are in use,
patchbot
- [xen stable-4.16] VT-d: fix (de)assign ordering when RMRRs are in use,
patchbot
- [xen stable-4.16] VT-d: correct ordering of operations in cleanup_domid_map(),
patchbot
- [xen stable-4.16] x86/hap: do not switch on log dirty for VRAM tracking,
patchbot
- [xen stable-4.13] IOMMU/x86: use per-device page tables for quarantining,
patchbot
- [xen stable-4.13] AMD/IOMMU: abstract maximum number of page table levels,
patchbot
- [xen stable-4.13] IOMMU/x86: drop TLB flushes from quarantine_init() hooks,
patchbot
- [xen stable-4.13] IOMMU/x86: maintain a per-device pseudo domain ID,
patchbot
- [xen stable-4.13] VT-d: prepare for per-device quarantine page tables (part II),
patchbot
- [xen stable-4.13] VT-d: prepare for per-device quarantine page tables (part I),
patchbot
- [xen stable-4.13] AMD/IOMMU: re-assign devices directly,
patchbot
- [xen stable-4.13] VT-d: re-assign devices directly,
patchbot
- [xen stable-4.13] VT-d: drop ownership checking from domain_context_mapping_one(),
patchbot
- [xen stable-4.13] VT-d: fix add/remove ordering when RMRRs are in use,
patchbot
- [xen stable-4.13] VT-d: fix (de)assign ordering when RMRRs are in use,
patchbot
- [xen stable-4.13] VT-d: correct ordering of operations in cleanup_domid_map(),
patchbot
- [xen stable-4.13] x86/hap: do not switch on log dirty for VRAM tracking,
patchbot
- [xen stable-4.13] VT-d: split domid map cleanup check into a function,
patchbot
- [xen stable-4.15] IOMMU/x86: use per-device page tables for quarantining,
patchbot
- [xen stable-4.15] AMD/IOMMU: abstract maximum number of page table levels,
patchbot
- [xen stable-4.15] IOMMU/x86: drop TLB flushes from quarantine_init() hooks,
patchbot
- [xen stable-4.15] IOMMU/x86: maintain a per-device pseudo domain ID,
patchbot
- [xen stable-4.15] VT-d: prepare for per-device quarantine page tables (part II),
patchbot
- [xen stable-4.15] VT-d: prepare for per-device quarantine page tables (part I),
patchbot
- [xen stable-4.15] AMD/IOMMU: re-assign devices directly,
patchbot
- [xen stable-4.15] VT-d: re-assign devices directly,
patchbot
- [xen stable-4.15] VT-d: drop ownership checking from domain_context_mapping_one(),
patchbot
- [xen stable-4.15] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter,
patchbot
- [xen stable-4.15] VT-d: fix add/remove ordering when RMRRs are in use,
patchbot
- [xen stable-4.15] VT-d: fix (de)assign ordering when RMRRs are in use,
patchbot
- [xen stable-4.15] VT-d: correct ordering of operations in cleanup_domid_map(),
patchbot
- [xen stable-4.15] x86/hap: do not switch on log dirty for VRAM tracking,
patchbot
- [xen staging-4.12] IOMMU/x86: use per-device page tables for quarantining,
patchbot
- [xen staging-4.12] AMD/IOMMU: abstract maximum number of page table levels,
patchbot
- [xen staging-4.12] IOMMU/x86: drop TLB flushes from quarantine_init() hooks,
patchbot
- [xen staging-4.12] IOMMU/x86: maintain a per-device pseudo domain ID,
patchbot
- [xen staging-4.12] VT-d: prepare for per-device quarantine page tables (part II),
patchbot
- [xen staging-4.12] VT-d: prepare for per-device quarantine page tables (part I),
patchbot
- [xen staging-4.12] AMD/IOMMU: re-assign devices directly,
patchbot
- [xen staging-4.12] VT-d: re-assign devices directly,
patchbot
- [xen staging-4.12] VT-d: drop ownership checking from domain_context_mapping_one(),
patchbot
- [xen staging-4.12] VT-d: fix add/remove ordering when RMRRs are in use,
patchbot
- [xen staging-4.12] VT-d: fix (de)assign ordering when RMRRs are in use,
patchbot
- [xen staging-4.12] VT-d: split domid map cleanup check into a function,
patchbot
- [xen staging-4.12] VT-d: correct ordering of operations in cleanup_domid_map(),
patchbot
- [xen staging-4.12] x86/hap: do not switch on log dirty for VRAM tracking,
patchbot
- [xen staging-4.13] IOMMU/x86: use per-device page tables for quarantining,
patchbot
- [xen staging-4.13] AMD/IOMMU: abstract maximum number of page table levels,
patchbot
- [xen staging-4.13] IOMMU/x86: drop TLB flushes from quarantine_init() hooks,
patchbot
- [xen staging-4.13] IOMMU/x86: maintain a per-device pseudo domain ID,
patchbot
- [xen staging-4.13] VT-d: prepare for per-device quarantine page tables (part II),
patchbot
- [xen staging-4.13] VT-d: prepare for per-device quarantine page tables (part I),
patchbot
- [xen staging-4.13] AMD/IOMMU: re-assign devices directly,
patchbot
- [xen staging-4.13] VT-d: re-assign devices directly,
patchbot
- [xen staging-4.13] VT-d: drop ownership checking from domain_context_mapping_one(),
patchbot
- [xen staging-4.13] VT-d: fix add/remove ordering when RMRRs are in use,
patchbot
- [xen staging-4.13] VT-d: fix (de)assign ordering when RMRRs are in use,
patchbot
- [xen staging-4.13] VT-d: correct ordering of operations in cleanup_domid_map(),
patchbot
- [xen staging-4.13] x86/hap: do not switch on log dirty for VRAM tracking,
patchbot
- [xen staging-4.13] VT-d: split domid map cleanup check into a function,
patchbot
- [xen staging-4.14] IOMMU/x86: use per-device page tables for quarantining,
patchbot
- [xen staging-4.14] AMD/IOMMU: abstract maximum number of page table levels,
patchbot
- [xen staging-4.14] IOMMU/x86: drop TLB flushes from quarantine_init() hooks,
patchbot
- [xen staging-4.14] IOMMU/x86: maintain a per-device pseudo domain ID,
patchbot
- [xen staging-4.14] VT-d: prepare for per-device quarantine page tables (part II),
patchbot
- [xen staging-4.14] VT-d: prepare for per-device quarantine page tables (part I),
patchbot
- [xen staging-4.14] AMD/IOMMU: re-assign devices directly,
patchbot
- [xen staging-4.14] VT-d: re-assign devices directly,
patchbot
- [xen staging-4.14] VT-d: drop ownership checking from domain_context_mapping_one(),
patchbot
- [xen staging-4.14] VT-d: fix add/remove ordering when RMRRs are in use,
patchbot
- [xen staging-4.14] VT-d: fix (de)assign ordering when RMRRs are in use,
patchbot
- [xen staging-4.14] VT-d: correct ordering of operations in cleanup_domid_map(),
patchbot
- [xen staging-4.14] x86/hap: do not switch on log dirty for VRAM tracking,
patchbot
- [xen staging-4.15] IOMMU/x86: use per-device page tables for quarantining,
patchbot
- [xen staging-4.15] AMD/IOMMU: abstract maximum number of page table levels,
patchbot
- [xen staging-4.15] IOMMU/x86: drop TLB flushes from quarantine_init() hooks,
patchbot
- [xen staging-4.15] IOMMU/x86: maintain a per-device pseudo domain ID,
patchbot
- [xen staging-4.15] VT-d: prepare for per-device quarantine page tables (part II),
patchbot
- [xen staging-4.15] VT-d: prepare for per-device quarantine page tables (part I),
patchbot
- [xen staging-4.15] AMD/IOMMU: re-assign devices directly,
patchbot
- [xen staging-4.15] VT-d: re-assign devices directly,
patchbot
- [xen staging-4.15] VT-d: drop ownership checking from domain_context_mapping_one(),
patchbot
- [xen staging-4.15] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter,
patchbot
- [xen staging-4.15] VT-d: fix add/remove ordering when RMRRs are in use,
patchbot
- [xen staging-4.15] VT-d: fix (de)assign ordering when RMRRs are in use,
patchbot
- [xen staging-4.15] VT-d: correct ordering of operations in cleanup_domid_map(),
patchbot
- [xen staging-4.15] x86/hap: do not switch on log dirty for VRAM tracking,
patchbot
- [xen staging-4.16] IOMMU/x86: use per-device page tables for quarantining,
patchbot
- [xen staging-4.16] AMD/IOMMU: abstract maximum number of page table levels,
patchbot
- [xen staging-4.16] IOMMU/x86: drop TLB flushes from quarantine_init() hooks,
patchbot
- [xen staging-4.16] IOMMU/x86: maintain a per-device pseudo domain ID,
patchbot
- [xen staging-4.16] VT-d: prepare for per-device quarantine page tables (part II),
patchbot
- [xen staging-4.16] VT-d: prepare for per-device quarantine page tables (part I),
patchbot
- [xen staging-4.16] AMD/IOMMU: re-assign devices directly,
patchbot
- [xen staging-4.16] VT-d: re-assign devices directly,
patchbot
- [xen staging-4.16] VT-d: drop ownership checking from domain_context_mapping_one(),
patchbot
- [xen staging-4.16] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter,
patchbot
- [xen staging-4.16] VT-d: fix add/remove ordering when RMRRs are in use,
patchbot
- [xen staging-4.16] VT-d: fix (de)assign ordering when RMRRs are in use,
patchbot
- [xen staging-4.16] VT-d: correct ordering of operations in cleanup_domid_map(),
patchbot
- [xen staging-4.16] x86/hap: do not switch on log dirty for VRAM tracking,
patchbot
- [xen staging] IOMMU/x86: use per-device page tables for quarantining,
patchbot
- [xen staging] AMD/IOMMU: abstract maximum number of page table levels,
patchbot
- [xen staging] IOMMU/x86: drop TLB flushes from quarantine_init() hooks,
patchbot
- [xen staging] IOMMU/x86: maintain a per-device pseudo domain ID,
patchbot
- [xen staging] VT-d: prepare for per-device quarantine page tables (part II),
patchbot
- [xen staging] VT-d: prepare for per-device quarantine page tables (part I),
patchbot
- [xen staging] AMD/IOMMU: re-assign devices directly,
patchbot
- [xen staging] VT-d: re-assign devices directly,
patchbot
- [xen staging] VT-d: drop ownership checking from domain_context_mapping_one(),
patchbot
- [xen staging] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter,
patchbot
- [xen staging] VT-d: fix add/remove ordering when RMRRs are in use,
patchbot
- [xen staging] VT-d: fix (de)assign ordering when RMRRs are in use,
patchbot
- [xen staging] VT-d: correct ordering of operations in cleanup_domid_map(),
patchbot
- [xen staging] x86/hap: do not switch on log dirty for VRAM tracking,
patchbot
- [xen staging] x86/time: use fake read_tsc(),
patchbot
- [xen staging] include: move STR() and IS_ALIGNED(),
patchbot
- [xen staging] x86/APIC: make connections between seemingly arbitrary numbers,
patchbot
- [xen staging] x86/APIC: calibrate against platform timer when possible,
patchbot
- [xen staging] build: grab common EFI source files in arch specific dir,
patchbot
- [xen master] tools/firmware: do not add a .note.gnu.property section,
patchbot
- [xen master] tools/firmware: fix setting of fcf-protection=none,
patchbot
- [xen stable-4.15] livepatch: account for patch offset when applying NOP patch,
patchbot
- [xen stable-4.15] vpci/msix: fix PBA accesses,
patchbot
- [xen stable-4.15] livepatch: resolve old address before function verification,
patchbot
- [xen stable-4.15] x86/cet: Remove XEN_SHSTK's dependency on EXPERT,
patchbot
- [xen stable-4.15] xen/x86: Livepatch: support patching CET-enhanced functions,
patchbot
- [xen stable-4.15] x86/cet: Remove writeable mapping of the BSPs shadow stack,
patchbot
- [xen stable-4.15] x86/cet: Clear IST supervisor token busy bits on S3 resume,
patchbot
- [xen stable-4.15] x86/kexec: Fix kexec-reboot with CET active,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Disable retpolines with CET-IBT,
patchbot
- [xen stable-4.15] x86/CET: Fix S3 resume with shadow stacks active,
patchbot
- [xen stable-4.15] x86: Enable CET Indirect Branch Tracking,
patchbot
- [xen stable-4.15] x86/EFI: Disable CET-IBT around Runtime Services calls,
patchbot
- [xen stable-4.15] x86/setup: Rework MSR_S_CET handling for CET-IBT,
patchbot
- [xen stable-4.15] x86/entry: Make IDT entrypoints CET-IBT compatible,
patchbot
- [xen stable-4.15] x86/entry: Make syscall/sysenter entrypoints CET-IBT compatible,
patchbot
- [xen stable-4.15] x86/emul: Update emulation stubs to be CET-IBT compatible,
patchbot
- [xen stable-4.15] x86: Introduce helpers/checks for endbr64 instructions,
patchbot
- [xen stable-4.15] x86/traps: Rework write_stub_trampoline() to not hardcode the jmp,
patchbot
- [xen stable-4.15] x86/alternatives: Clear CR4.CET when clearing CR0.WP,
patchbot
- [xen stable-4.15] x86/setup: Read CR4 earlier in __start_xen(),
patchbot
- [xen stable-4.15] x86: Introduce support for CET-IBT,
patchbot
- [xen staging-4.14] livepatch: account for patch offset when applying NOP patch,
patchbot
- [xen staging-4.15] livepatch: account for patch offset when applying NOP patch,
patchbot
- [xen staging-4.15] vpci/msix: fix PBA accesses,
patchbot
- [xen staging] tools/firmware: do not add a .note.gnu.property section,
patchbot
- [xen staging] tools/firmware: fix setting of fcf-protection=none,
patchbot
- [xen master] libxl: Re-scope qmp_proxy_spawn.ao usage,
patchbot
- [xen master] libxl: Don't segfault on soft-reset failure,
patchbot
- [xen stable-4.16] livepatch: account for patch offset when applying NOP patch,
patchbot
- [xen stable-4.16] vpci/msix: fix PBA accesses,
patchbot
- [xen stable-4.16] x86/Kconfig: introduce option to select retpoline usage,
patchbot
- [xen stable-4.16] x86/clang: add retpoline support,
patchbot
- [xen stable-4.16] x86/retpoline: split retpoline compiler support into separate option,
patchbot
- [xen stable-4.16] livepatch: resolve old address before function verification,
patchbot
- [xen stable-4.16] x86/cet: Remove XEN_SHSTK's dependency on EXPERT,
patchbot
- [xen stable-4.16] xen/x86: Livepatch: support patching CET-enhanced functions,
patchbot
- [xen stable-4.16] x86/cet: Remove writeable mapping of the BSPs shadow stack,
patchbot
- [xen stable-4.16] x86/cet: Clear IST supervisor token busy bits on S3 resume,
patchbot
- [xen stable-4.16] x86/kexec: Fix kexec-reboot with CET active,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Disable retpolines with CET-IBT,
patchbot
- [xen stable-4.16] x86/CET: Fix S3 resume with shadow stacks active,
patchbot
- [xen stable-4.16] x86: Enable CET Indirect Branch Tracking,
patchbot
- [xen stable-4.16] x86/EFI: Disable CET-IBT around Runtime Services calls,
patchbot
- [xen stable-4.16] x86/setup: Rework MSR_S_CET handling for CET-IBT,
patchbot
- [xen stable-4.16] x86/entry: Make IDT entrypoints CET-IBT compatible,
patchbot
- [xen stable-4.16] x86/entry: Make syscall/sysenter entrypoints CET-IBT compatible,
patchbot
- [xen stable-4.16] x86/emul: Update emulation stubs to be CET-IBT compatible,
patchbot
- [xen stable-4.16] x86: Introduce helpers/checks for endbr64 instructions,
patchbot
- [xen stable-4.16] x86/traps: Rework write_stub_trampoline() to not hardcode the jmp,
patchbot
- [xen stable-4.16] x86/alternatives: Clear CR4.CET when clearing CR0.WP,
patchbot
- [xen stable-4.16] x86/setup: Read CR4 earlier in __start_xen(),
patchbot
- [xen stable-4.16] x86: Introduce support for CET-IBT,
patchbot
- [xen master] libxl: constify libxl__stubdomain_is_linux,
patchbot
- [xen master] xl: Fix global pci options,
patchbot
- [xen master] livepatch: account for patch offset when applying NOP patch,
patchbot
- [xen master] livepatch: fix typos,
patchbot
- [xen staging] libxl: Re-scope qmp_proxy_spawn.ao usage,
patchbot
- [xen staging] libxl: Don't segfault on soft-reset failure,
patchbot
Mail converted by MHonArc
|