xen-changelog Mail Thread Index
- [xen master] x86/spec-ctrl: Move __read_mostly data into __ro_after_init,
patchbot
- [xen master] x86/mm: Refine address alignment checks in modify_xen_mappings_lite(),
patchbot
- [xen stable-4.18] tools/oxenstored: Make Quota.t pure,
patchbot
- [xen stable-4.18] tools/oxenstored: Use Map instead of Hashtbl for quotas,
patchbot
- [xen master] tools/oxenstored: Re-format,
patchbot
- [xen master] nestedsvm: Disable TscRateMSR,
patchbot
- [xen master] x86: Move SVM features exposed to guest into hvm_max_cpu_policy,
patchbot
- [xen master] xen/efi: efibind: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] xen/elfnote: Specify ELF Notes are x86-specific,
patchbot
- [xen master] libelf: Expand ELF note printing,
patchbot
- [xen master] Revert "xen/x86: bzImage parse kernel_alignment",
patchbot
- [xen master] x86/public: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] x86/hvm: address violations of Rule 20.7,
patchbot
- [xen master] xen/page_alloc: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] xen: address MISRA C Rule 20.7 violation in generated hypercall,
patchbot
- [xen master] xentrace: address violation of MISRA C Rule 20.7,
patchbot
- [xen master] xen/list: address violations of MISRA C Rule 20.7,
patchbot
- [xen stable-4.17] tools/oxenstored: Make Quota.t pure,
patchbot
- [xen stable-4.17] tools/oxenstored: Use Map instead of Hashtbl for quotas,
patchbot
- [xen staging] x86/spec-ctrl: Move __read_mostly data into __ro_after_init,
patchbot
- [xen stable-4.18] x86/PoD: tie together P2M update and increment of entry count,
patchbot
- [xen stable-4.18] x86/boot: Fix setup_apic_nmi_watchdog() to fail more cleanly,
patchbot
- [xen stable-4.18] x86/mm: use block_lock_speculation() in _mm_write_lock(),
patchbot
- [xen stable-4.18] update Xen version to 4.18.2-pre,
patchbot
- [xen staging] x86/mm: Refine address alignment checks in modify_xen_mappings_lite(),
patchbot
- [xen stable-4.17] x86/PoD: tie together P2M update and increment of entry count,
patchbot
- [xen stable-4.17] x86/boot: Fix setup_apic_nmi_watchdog() to fail more cleanly,
patchbot
- [xen stable-4.17] x86/mm: use block_lock_speculation() in _mm_write_lock(),
patchbot
- [xen stable-4.17] tools: ipxe: update for fixing build with GCC12,
patchbot
- [xen staging-4.17] tools/oxenstored: Make Quota.t pure,
patchbot
- [xen staging-4.17] tools/oxenstored: Use Map instead of Hashtbl for quotas,
patchbot
- [xen staging-4.18] tools/oxenstored: Make Quota.t pure,
patchbot
- [xen staging-4.18] tools/oxenstored: Use Map instead of Hashtbl for quotas,
patchbot
- [xen staging] tools/oxenstored: Re-format,
patchbot
- [xen staging] nestedsvm: Disable TscRateMSR,
patchbot
- [xen staging] x86: Move SVM features exposed to guest into hvm_max_cpu_policy,
patchbot
- [xen staging-4.17] x86/PoD: tie together P2M update and increment of entry count,
patchbot
- [xen staging-4.17] x86/boot: Fix setup_apic_nmi_watchdog() to fail more cleanly,
patchbot
- [xen staging-4.17] x86/mm: use block_lock_speculation() in _mm_write_lock(),
patchbot
- [xen staging-4.17] tools: ipxe: update for fixing build with GCC12,
patchbot
- [xen staging-4.18] x86/PoD: tie together P2M update and increment of entry count,
patchbot
- [xen staging-4.18] x86/boot: Fix setup_apic_nmi_watchdog() to fail more cleanly,
patchbot
- [xen staging-4.18] x86/mm: use block_lock_speculation() in _mm_write_lock(),
patchbot
- [xen staging-4.18] update Xen version to 4.18.2-pre,
patchbot
- [xen staging] xen/efi: efibind: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] xen/elfnote: Specify ELF Notes are x86-specific,
patchbot
- [xen staging] libelf: Expand ELF note printing,
patchbot
- [xen staging] Revert "xen/x86: bzImage parse kernel_alignment",
patchbot
- [xen staging] x86/public: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] x86/hvm: address violations of Rule 20.7,
patchbot
- [xen staging] xen/page_alloc: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] xen: address MISRA C Rule 20.7 violation in generated hypercall,
patchbot
- [xen staging] xentrace: address violation of MISRA C Rule 20.7,
patchbot
- [xen staging] xen/list: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] xen/xsm: add parentheses to comply with MISRA C Rule 20.7,
patchbot
- [xen master] xen/console: add comment about external console lock helper,
patchbot
- [xen master] x86/vcpu: relax VCPUOP_initialise restriction for non-PV vCPUs,
patchbot
- [xen master] xen/riscv: add minimal stuff to processor.h to build full Xen,
patchbot
- [xen master] EFI: Introduce inline stub for efi_enabled on !X86 && !ARM,
patchbot
- [xen staging] xen/xsm: add parentheses to comply with MISRA C Rule 20.7,
patchbot
- [xen staging] xen/console: add comment about external console lock helper,
patchbot
- [xen staging] x86/vcpu: relax VCPUOP_initialise restriction for non-PV vCPUs,
patchbot
- [xen staging] xen/riscv: add minimal stuff to processor.h to build full Xen,
patchbot
- [xen staging] EFI: Introduce inline stub for efi_enabled on !X86 && !ARM,
patchbot
- [xen master] Revert "xen/page_alloc: introduce preserved page flags macro",
patchbot
- [xen master] x86/cpuid: More AMD features,
patchbot
- [xen master] x86/p2m: Coding style cleanup,
patchbot
- [xen master] xen/ppc: Ensure ELF sections' physical load addresses start at 0x0,
patchbot
- [xen master] AMD/IOMMU: drop remaining guest-IOMMU bits too,
patchbot
- [xen master] x86/PoD: tie together P2M update and increment of entry count,
patchbot
- [xen master] xen/page_alloc: introduce page flag to stop buddy merging,
patchbot
- [xen master] xen/page_alloc: introduce preserved page flags macro,
patchbot
- [xen master] tools/xl_parse: remove message for tsc mode string,
patchbot
- [xen staging] Revert "xen/page_alloc: introduce preserved page flags macro",
patchbot
- [xen master] docs/parse-support-md: Handle BulletList,
patchbot
- [xen staging] x86/cpuid: More AMD features,
patchbot
- [xen staging] x86/p2m: Coding style cleanup,
patchbot
- [xen staging] xen/ppc: Ensure ELF sections' physical load addresses start at 0x0,
patchbot
- [xen staging] AMD/IOMMU: drop remaining guest-IOMMU bits too,
patchbot
- [xen staging] x86/PoD: tie together P2M update and increment of entry count,
patchbot
- [xen staging] xen/page_alloc: introduce page flag to stop buddy merging,
patchbot
- [xen staging] xen/page_alloc: introduce preserved page flags macro,
patchbot
- [xen staging] tools/xl_parse: remove message for tsc mode string,
patchbot
- [xen master] xen/vpci: Improve code generation in mask_write(),
patchbot
- [xen master] x86/boot: Support the watchdog on newer AMD systems,
patchbot
- [xen master] x86/boot: Fix setup_apic_nmi_watchdog() to fail more cleanly,
patchbot
- [xen staging] docs/parse-support-md: Handle BulletList,
patchbot
- [xen master] xen/nospec: Include <xen/stdbool.h>,
patchbot
- [xen master] xen/wait: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] xen/notifier: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] xen/arm: smmu: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] EFI: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] xen/device_tree: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] x86/cpufeature: add parentheses to comply with Rule 20.7,
patchbot
- [xen master] amd/iommu: clean up unused guest iommu related functions,
patchbot
- [xen master] xen/spinlock: make struct lock_profile rspinlock_t aware,
patchbot
- [xen master] xen/spinlock: add rspin_[un]lock_irq[save|restore](),
patchbot
- [xen master] xen/spinlock: rename recursive lock functions,
patchbot
- [xen master] xen/spinlock: introduce new type for recursive spinlocks,
patchbot
- [xen master] IOMMU: store name for extra reserved device memory,
patchbot
- [xen master] x86/mm: use block_lock_speculation() in _mm_write_lock(),
patchbot
- [xen master] xen/sched: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] automation/eclair: allow parameter name "unused",
patchbot
- [xen master] MAINTAINERS: remove myself from various positions,
patchbot
- [xen master] MAINTAINERS: drop AMD IOMMU and Intel VT-d sections,
patchbot
- [xen master] perfc: add pseudo-keyword fallthrough,
patchbot
- [xen master] x86/svmdebug: Print np, sev and sev_es vmcb bits,
patchbot
- [xen master] x86/svm: Drop the suffix _guest from vmcb bit,
patchbot
- [xen staging] xen/vpci: Improve code generation in mask_write(),
patchbot
- [xen staging] x86/boot: Support the watchdog on newer AMD systems,
patchbot
- [xen staging] x86/boot: Fix setup_apic_nmi_watchdog() to fail more cleanly,
patchbot
- [xen staging] xen/nospec: Include <xen/stdbool.h>,
patchbot
- [xen staging] xen/wait: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] xen/notifier: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] xen/arm: smmu: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] EFI: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] xen/device_tree: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] x86/cpufeature: add parentheses to comply with Rule 20.7,
patchbot
- [xen staging] amd/iommu: clean up unused guest iommu related functions,
patchbot
- [xen staging] xen/spinlock: make struct lock_profile rspinlock_t aware,
patchbot
- [xen staging] xen/spinlock: add rspin_[un]lock_irq[save|restore](),
patchbot
- [xen staging] xen/spinlock: rename recursive lock functions,
patchbot
- [xen staging] xen/spinlock: introduce new type for recursive spinlocks,
patchbot
- [xen staging] IOMMU: store name for extra reserved device memory,
patchbot
- [xen stable-4.18] update Xen version to 4.18.1,
patchbot
- [xen staging] x86/mm: use block_lock_speculation() in _mm_write_lock(),
patchbot
- [xen staging] xen/sched: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] automation/eclair: allow parameter name "unused",
patchbot
- [xen staging] MAINTAINERS: remove myself from various positions,
patchbot
- [xen staging] MAINTAINERS: drop AMD IOMMU and Intel VT-d sections,
patchbot
- [xen staging] perfc: add pseudo-keyword fallthrough,
patchbot
- [xen staging] x86/svmdebug: Print np, sev and sev_es vmcb bits,
patchbot
- [xen staging] x86/svm: Drop the suffix _guest from vmcb bit,
patchbot
- [xen staging-4.18] update Xen version to 4.18.1,
patchbot
- [xen master] SUPPORT.MD: Fix matrix generation after 43c416d0d819 and 77c39a53cf5b,
patchbot
- [xen master] xen/arm: arm32: Add emulation of Debug Data Transfer Registers,
patchbot
- [xen master] xen/arm: arm64: Add emulation of Debug Data Transfer Registers,
patchbot
- [xen master] xen/arm: Introduce CONFIG_PARTIAL_EMULATION and "partial-emulation" cmd option,
patchbot
- [xen master] xen/spinlock: remove misra rule 21.1 violations,
patchbot
- [xen master] xen: avoid grep fodder define and undef,
patchbot
- [xen master] MAINTAINERS: Remove myself from several subsystems,
patchbot
- [xen master] x86/svm: Drop the _enabled suffix from vmcb bits,
patchbot
- [xen master] xen/compiler: deviate the inline macro for MISRA C Rule 20.4,
patchbot
- [xen master] xen/lz4: address violations of MISRA C:2012 Directive 4.10,
patchbot
- [xen master] x86/mtrr: address violations of MISRA C:2012 Directive 4.10,
patchbot
- [xen master] restrict concept of pIRQ to x86,
patchbot
- [xen master] automation/eclair_analysis: deviate certain macros for Rule 20.12,
patchbot
- [xen stable-4.18] x86: protect conditional lock taking from speculative execution,
patchbot
- [xen stable-4.18] x86/mm: add speculation barriers to open coded locks,
patchbot
- [xen stable-4.18] locking: attempt to ensure lock wrappers are always inline,
patchbot
- [xen stable-4.18] percpu-rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen stable-4.18] rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen stable-4.18] x86/spinlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen stable-4.18] xen: Swap order of actions in the FREE*() macros,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Mitigation Register File Data Sampling,
patchbot
- [xen stable-4.18] x86/spec-ctrl: VERW-handling adjustments,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Rename VERW related options,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Perform VERW flushing later in exit paths,
patchbot
- [xen stable-4.18] x86/vmx: Perform VERW flushing later in the VMExit path,
patchbot
- [xen stable-4.18] x86: Resync intel-family.h from Linux,
patchbot
- [xen stable-4.18] x86/entry: Introduce EFRAME_* constants,
patchbot
- [xen staging] SUPPORT.MD: Fix matrix generation after 43c416d0d819 and 77c39a53cf5b,
patchbot
- [xen staging] xen/arm: arm32: Add emulation of Debug Data Transfer Registers,
patchbot
- [xen staging] xen/arm: arm64: Add emulation of Debug Data Transfer Registers,
patchbot
- [xen staging] xen/arm: Introduce CONFIG_PARTIAL_EMULATION and "partial-emulation" cmd option,
patchbot
- [xen staging] xen/spinlock: remove misra rule 21.1 violations,
patchbot
- [xen staging] xen: avoid grep fodder define and undef,
patchbot
- [xen staging] MAINTAINERS: Remove myself from several subsystems,
patchbot
- [xen staging] x86/svm: Drop the _enabled suffix from vmcb bits,
patchbot
- [xen staging] xen/compiler: deviate the inline macro for MISRA C Rule 20.4,
patchbot
- [xen staging] xen/lz4: address violations of MISRA C:2012 Directive 4.10,
patchbot
- [xen staging] x86/mtrr: address violations of MISRA C:2012 Directive 4.10,
patchbot
- [xen staging] restrict concept of pIRQ to x86,
patchbot
- [xen stable-4.17] x86: protect conditional lock taking from speculative execution,
patchbot
- [xen stable-4.17] x86/mm: add speculation barriers to open coded locks,
patchbot
- [xen stable-4.17] locking: attempt to ensure lock wrappers are always inline,
patchbot
- [xen stable-4.17] percpu-rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen stable-4.17] rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen stable-4.17] x86/spinlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen stable-4.17] xen: Swap order of actions in the FREE*() macros,
patchbot
- [xen stable-4.17] x86/paging: Delete update_cr3()'s do_locking parameter,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Mitigation Register File Data Sampling,
patchbot
- [xen stable-4.17] x86/spec-ctrl: VERW-handling adjustments,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Rename VERW related options,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Perform VERW flushing later in exit paths,
patchbot
- [xen stable-4.17] x86/vmx: Perform VERW flushing later in the VMExit path,
patchbot
- [xen stable-4.17] x86: Resync intel-family.h from Linux,
patchbot
- [xen stable-4.17] x86/entry: Introduce EFRAME_* constants,
patchbot
- [xen staging] automation/eclair_analysis: deviate certain macros for Rule 20.12,
patchbot
- [xen master] x86: protect conditional lock taking from speculative execution,
patchbot
- [xen master] x86/mm: add speculation barriers to open coded locks,
patchbot
- [xen master] locking: attempt to ensure lock wrappers are always inline,
patchbot
- [xen master] percpu-rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen master] rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen master] x86/spinlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen master] xen: Swap order of actions in the FREE*() macros,
patchbot
- [xen master] x86/spec-ctrl: Mitigation Register File Data Sampling,
patchbot
- [xen master] x86/spec-ctrl: VERW-handling adjustments,
patchbot
- [xen master] x86/spec-ctrl: Rename VERW related options,
patchbot
- [xen master] x86/spec-ctrl: Perform VERW flushing later in exit paths,
patchbot
- [xen master] x86/vmx: Perform VERW flushing later in the VMExit path,
patchbot
- [xen stable-4.16] x86: protect conditional lock taking from speculative execution,
patchbot
- [xen stable-4.16] x86/mm: add speculation barriers to open coded locks,
patchbot
- [xen stable-4.16] locking: attempt to ensure lock wrappers are always inline,
patchbot
- [xen stable-4.16] percpu-rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen stable-4.16] rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen stable-4.16] x86/spinlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen stable-4.16] xen: Swap order of actions in the FREE*() macros,
patchbot
- [xen stable-4.16] x86/paging: Delete update_cr3()'s do_locking parameter,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Mitigation Register File Data Sampling,
patchbot
- [xen stable-4.16] x86/spec-ctrl: VERW-handling adjustments,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Rename VERW related options,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Perform VERW flushing later in exit paths,
patchbot
- [xen stable-4.16] x86/vmx: Perform VERW flushing later in the VMExit path,
patchbot
- [xen stable-4.16] x86/cpu-policy: Allow for levelling of VERW side effects,
patchbot
- [xen stable-4.16] x86/entry: Introduce EFRAME_* constants,
patchbot
- [xen stable-4.15] x86: protect conditional lock taking from speculative execution,
patchbot
- [xen stable-4.15] x86/mm: add speculation barriers to open coded locks,
patchbot
- [xen stable-4.15] locking: attempt to ensure lock wrappers are always inline,
patchbot
- [xen stable-4.15] percpu-rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen stable-4.15] rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen stable-4.15] x86/spinlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen stable-4.15] xen: Swap order of actions in the FREE*() macros,
patchbot
- [xen stable-4.15] x86/paging: Delete update_cr3()'s do_locking parameter,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Mitigation Register File Data Sampling,
patchbot
- [xen stable-4.15] x86/spec-ctrl: VERW-handling adjustments,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Rename VERW related options,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Perform VERW flushing later in exit paths,
patchbot
- [xen stable-4.15] x86/vmx: Perform VERW flushing later in the VMExit path,
patchbot
- [xen stable-4.15] x86/cpu-policy: Allow for levelling of VERW side effects,
patchbot
- [xen stable-4.15] x86/entry: Introduce EFRAME_* constants,
patchbot
- [xen stable-4.18] x86/mm: fix detection of last L1 entry in modify_xen_mappings_lite(),
patchbot
- [xen stable-4.18] hvmloader/PCI: skip huge BARs in certain calculations,
patchbot
- [xen stable-4.17] x86/mm: fix detection of last L1 entry in modify_xen_mappings_lite(),
patchbot
- [xen stable-4.17] hvmloader/PCI: skip huge BARs in certain calculations,
patchbot
- [xen staging-4.15] x86: protect conditional lock taking from speculative execution,
patchbot
- [xen staging-4.15] x86/mm: add speculation barriers to open coded locks,
patchbot
- [xen staging-4.15] locking: attempt to ensure lock wrappers are always inline,
patchbot
- [xen staging-4.15] percpu-rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen staging-4.15] rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen staging-4.15] x86/spinlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen staging-4.15] xen: Swap order of actions in the FREE*() macros,
patchbot
- [xen staging-4.15] x86/paging: Delete update_cr3()'s do_locking parameter,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Mitigation Register File Data Sampling,
patchbot
- [xen staging-4.15] x86/spec-ctrl: VERW-handling adjustments,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Rename VERW related options,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Perform VERW flushing later in exit paths,
patchbot
- [xen staging-4.15] x86/vmx: Perform VERW flushing later in the VMExit path,
patchbot
- [xen staging-4.15] x86/cpu-policy: Allow for levelling of VERW side effects,
patchbot
- [xen staging-4.15] x86/entry: Introduce EFRAME_* constants,
patchbot
- [xen staging-4.16] x86: protect conditional lock taking from speculative execution,
patchbot
- [xen staging-4.16] x86/mm: add speculation barriers to open coded locks,
patchbot
- [xen staging-4.16] locking: attempt to ensure lock wrappers are always inline,
patchbot
- [xen staging-4.16] percpu-rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen staging-4.16] rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen staging-4.16] x86/spinlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen staging-4.16] xen: Swap order of actions in the FREE*() macros,
patchbot
- [xen staging-4.16] x86/paging: Delete update_cr3()'s do_locking parameter,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Mitigation Register File Data Sampling,
patchbot
- [xen staging-4.16] x86/spec-ctrl: VERW-handling adjustments,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Rename VERW related options,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Perform VERW flushing later in exit paths,
patchbot
- [xen staging-4.16] x86/vmx: Perform VERW flushing later in the VMExit path,
patchbot
- [xen staging-4.16] x86/cpu-policy: Allow for levelling of VERW side effects,
patchbot
- [xen staging-4.16] x86/entry: Introduce EFRAME_* constants,
patchbot
- [xen staging-4.17] x86: protect conditional lock taking from speculative execution,
patchbot
- [xen staging-4.17] x86/mm: add speculation barriers to open coded locks,
patchbot
- [xen staging-4.17] locking: attempt to ensure lock wrappers are always inline,
patchbot
- [xen staging-4.17] percpu-rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen staging-4.17] rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen staging-4.17] x86/spinlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen staging-4.17] xen: Swap order of actions in the FREE*() macros,
patchbot
- [xen staging-4.17] x86/paging: Delete update_cr3()'s do_locking parameter,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Mitigation Register File Data Sampling,
patchbot
- [xen staging-4.17] x86/spec-ctrl: VERW-handling adjustments,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Rename VERW related options,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Perform VERW flushing later in exit paths,
patchbot
- [xen staging-4.17] x86/vmx: Perform VERW flushing later in the VMExit path,
patchbot
- [xen staging-4.17] x86: Resync intel-family.h from Linux,
patchbot
- [xen staging-4.17] x86/entry: Introduce EFRAME_* constants,
patchbot
- [xen staging-4.18] x86: protect conditional lock taking from speculative execution,
patchbot
- [xen staging-4.18] x86/mm: add speculation barriers to open coded locks,
patchbot
- [xen staging-4.18] locking: attempt to ensure lock wrappers are always inline,
patchbot
- [xen staging-4.18] percpu-rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen staging-4.18] rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen staging-4.18] x86/spinlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen staging-4.18] xen: Swap order of actions in the FREE*() macros,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Mitigation Register File Data Sampling,
patchbot
- [xen staging-4.18] x86/spec-ctrl: VERW-handling adjustments,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Rename VERW related options,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Perform VERW flushing later in exit paths,
patchbot
- [xen staging-4.18] x86/vmx: Perform VERW flushing later in the VMExit path,
patchbot
- [xen staging-4.18] x86: Resync intel-family.h from Linux,
patchbot
- [xen staging-4.18] x86/entry: Introduce EFRAME_* constants,
patchbot
- [xen staging] x86: protect conditional lock taking from speculative execution,
patchbot
- [xen staging] x86/mm: add speculation barriers to open coded locks,
patchbot
- [xen staging] locking: attempt to ensure lock wrappers are always inline,
patchbot
- [xen staging] percpu-rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen staging] rwlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen staging] x86/spinlock: introduce support for blocking speculation into critical regions,
patchbot
- [xen staging] xen: Swap order of actions in the FREE*() macros,
patchbot
- [xen staging] x86/spec-ctrl: Mitigation Register File Data Sampling,
patchbot
- [xen staging] x86/spec-ctrl: VERW-handling adjustments,
patchbot
- [xen staging] x86/spec-ctrl: Rename VERW related options,
patchbot
- [xen staging] x86/spec-ctrl: Perform VERW flushing later in exit paths,
patchbot
- [xen staging] x86/vmx: Perform VERW flushing later in the VMExit path,
patchbot
- [xen staging-4.17] x86/mm: fix detection of last L1 entry in modify_xen_mappings_lite(),
patchbot
- [xen staging-4.17] hvmloader/PCI: skip huge BARs in certain calculations,
patchbot
- [xen staging-4.18] x86/mm: fix detection of last L1 entry in modify_xen_mappings_lite(),
patchbot
- [xen staging-4.18] hvmloader/PCI: skip huge BARs in certain calculations,
patchbot
- [xen master] x86/mm: fix detection of last L1 entry in modify_xen_mappings_lite(),
patchbot
- [xen master] xen/ppc: switch PPC to use asm-generic/device.h,
patchbot
- [xen master] arm/smmu: address some violations of MISRA C Rule 20.7,
patchbot
- [xen master] x86/irq: parenthesize negative constants,
patchbot
- [xen master] xen/arm: address some violations of MISRA C Rule 20.7,
patchbot
- [xen master] xen/param: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] xen/include: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] xen/spinlock: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] xen/x86: bzImage parse kernel_alignment,
patchbot
- [xen master] features.h: Replace hard tabs,
patchbot
- [xen master] xen/domain.h: Centrialize is_domain_direct_mapped(),
patchbot
- [xen master] MAINTAINERS: drop AMD SVM and Intel VT-x sections,
patchbot
- [xen master] xen/mem-access: ifdef inclusion of <asm/mem_access.h>,
patchbot
- [xen master] xen/asm-generic: introduce stub header monitor.h,
patchbot
- [xen master] automation/eclair: add deviation for MISRA C:2012 Rule 16.6,
patchbot
- [xen master] tools/9pfsd: Fix build error caused by strerror_r,
patchbot
- [xen master] MAINTAINERS: add an entry for tools/9pfsd,
patchbot
- [xen master] x86/livepatch: Relax permissions on rodata too,
patchbot
- [xen master] xen/virtual-region: Include rodata pointers,
patchbot
- [xen master] xen/virtual-region: Rename the start/end fields,
patchbot
- [xen master] SUPPORT.md: add xen-9pfsd,
patchbot
- [xen master] x86/asm: add commas to further macros definitions/invocations,
patchbot
- [xen master] CHANGELOG: add an entry for 9pfsd,
patchbot
- [xen master] x86/asm: add commas to BUILD_BUG_ON,
patchbot
- [xen master] Kbuild: simplify as-insn a little,
patchbot
- [xen master] x86/EFI: correct compiler probing,
patchbot
- [xen staging] x86/mm: fix detection of last L1 entry in modify_xen_mappings_lite(),
patchbot
- [xen staging] xen/ppc: switch PPC to use asm-generic/device.h,
patchbot
- [xen staging] arm/smmu: address some violations of MISRA C Rule 20.7,
patchbot
- [xen staging] x86/irq: parenthesize negative constants,
patchbot
- [xen staging] xen/arm: address some violations of MISRA C Rule 20.7,
patchbot
- [xen staging] xen/param: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] xen/include: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] xen/spinlock: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] xen/x86: bzImage parse kernel_alignment,
patchbot
- [xen staging] features.h: Replace hard tabs,
patchbot
- [xen staging] xen/domain.h: Centrialize is_domain_direct_mapped(),
patchbot
- [xen staging] MAINTAINERS: drop AMD SVM and Intel VT-x sections,
patchbot
- [xen staging] xen/mem-access: ifdef inclusion of <asm/mem_access.h>,
patchbot
- [xen staging] xen/asm-generic: introduce stub header monitor.h,
patchbot
- [xen staging] automation/eclair: add deviation for MISRA C:2012 Rule 16.6,
patchbot
- [xen master] tools/xentop: Add VBD3 support to xentop,
patchbot
- [xen master] 9pfsd: allow building with old glibc,
patchbot
- [xen master] xen/{RISCV,PPC}/xen.lds: Delete duplicate _erodata definitions,
patchbot
- [xen staging] tools/9pfsd: Fix build error caused by strerror_r,
patchbot
- [xen staging] MAINTAINERS: add an entry for tools/9pfsd,
patchbot
- [xen staging] x86/livepatch: Relax permissions on rodata too,
patchbot
- [xen staging] xen/virtual-region: Include rodata pointers,
patchbot
- [xen staging] xen/virtual-region: Rename the start/end fields,
patchbot
- [xen staging] SUPPORT.md: add xen-9pfsd,
patchbot
- [xen staging] x86/asm: add commas to further macros definitions/invocations,
patchbot
- [xen staging] CHANGELOG: add an entry for 9pfsd,
patchbot
- [xen staging] x86/asm: add commas to BUILD_BUG_ON,
patchbot
- [xen staging] Kbuild: simplify as-insn a little,
patchbot
- [xen staging] x86/EFI: correct compiler probing,
patchbot
- [xen master] SUPPORT.md: clarify support of booting 32-bit Xen on ARMv8,
patchbot
- [xen master] x86: i387.c cleanup,
patchbot
- [xen master] hvmloader/PCI: skip huge BARs in certain calculations,
patchbot
- [xen master] xen/riscv: introduces acquire, release and full barriers,
patchbot
- [xen master] Argo: don't obtain excess page references,
patchbot
- [xen staging] tools/xentop: Add VBD3 support to xentop,
patchbot
- [xen staging] 9pfsd: allow building with old glibc,
patchbot
- [xen staging] xen/{RISCV,PPC}/xen.lds: Delete duplicate _erodata definitions,
patchbot
- [xen staging] SUPPORT.md: clarify support of booting 32-bit Xen on ARMv8,
patchbot
- [xen staging] x86: i387.c cleanup,
patchbot
- [xen staging] hvmloader/PCI: skip huge BARs in certain calculations,
patchbot
- [xen staging] xen/riscv: introduces acquire, release and full barriers,
patchbot
- [xen staging] Argo: don't obtain excess page references,
patchbot
- [xen stable-4.18] x86/cpu-policy: Allow for levelling of VERW side effects,
patchbot
- [xen stable-4.18] x86/altcall: always use a temporary parameter stashing variable,
patchbot
- [xen stable-4.18] libxl: Fix segfault in device_model_spawn_outcome,
patchbot
- [xen stable-4.18] xen/livepatch: properly build the noapply and norevert tests,
patchbot
- [xen stable-4.18] xen/livepatch: fix norevert test attempt to open-code revert,
patchbot
- [xen stable-4.18] xen/livepatch: search for symbols in all loaded payloads,
patchbot
- [xen stable-4.18] xen/livepatch: register livepatch regions when loaded,
patchbot
- [xen stable-4.18] x86/spec: do not print thunk option selection if not built-in,
patchbot
- [xen stable-4.18] x86/spec: fix INDIRECT_THUNK option to only be set when build-enabled,
patchbot
- [xen stable-4.18] x86/spec: print the built-in SPECULATIVE_HARDEN_* options,
patchbot
- [xen stable-4.18] xen/sched: Fix UB shift in compat_set_timer_op(),
patchbot
- [xen stable-4.18] x86/HVM: hide SVM/VMX when their enabling is prohibited by firmware,
patchbot
- [xen stable-4.17] x86/cpu-policy: Allow for levelling of VERW side effects,
patchbot
- [xen stable-4.17] x86/altcall: always use a temporary parameter stashing variable,
patchbot
- [xen stable-4.17] libxl: Fix segfault in device_model_spawn_outcome,
patchbot
- [xen stable-4.17] xen/livepatch: properly build the noapply and norevert tests,
patchbot
- [xen stable-4.17] xen/livepatch: fix norevert test attempt to open-code revert,
patchbot
- [xen stable-4.17] xen/livepatch: search for symbols in all loaded payloads,
patchbot
- [xen stable-4.17] xen/livepatch: register livepatch regions when loaded,
patchbot
- [xen stable-4.17] x86/spec: do not print thunk option selection if not built-in,
patchbot
- [xen stable-4.17] x86/spec: fix INDIRECT_THUNK option to only be set when build-enabled,
patchbot
- [xen stable-4.17] x86/spec: print the built-in SPECULATIVE_HARDEN_* options,
patchbot
- [xen stable-4.17] xen/sched: Fix UB shift in compat_set_timer_op(),
patchbot
- [xen stable-4.17] x86/HVM: hide SVM/VMX when their enabling is prohibited by firmware,
patchbot
- [xen staging-4.17] x86/cpu-policy: Allow for levelling of VERW side effects,
patchbot
- [xen staging-4.17] x86/altcall: always use a temporary parameter stashing variable,
patchbot
- [xen staging-4.17] libxl: Fix segfault in device_model_spawn_outcome,
patchbot
- [xen staging-4.17] xen/livepatch: properly build the noapply and norevert tests,
patchbot
- [xen staging-4.17] xen/livepatch: fix norevert test attempt to open-code revert,
patchbot
- [xen staging-4.17] xen/livepatch: search for symbols in all loaded payloads,
patchbot
- [xen staging-4.17] xen/livepatch: register livepatch regions when loaded,
patchbot
- [xen staging-4.17] x86/spec: do not print thunk option selection if not built-in,
patchbot
- [xen staging-4.17] x86/spec: fix INDIRECT_THUNK option to only be set when build-enabled,
patchbot
- [xen staging-4.17] x86/spec: print the built-in SPECULATIVE_HARDEN_* options,
patchbot
- [xen staging-4.17] xen/sched: Fix UB shift in compat_set_timer_op(),
patchbot
- [xen staging-4.17] x86/HVM: hide SVM/VMX when their enabling is prohibited by firmware,
patchbot
- [xen staging-4.18] x86/cpu-policy: Allow for levelling of VERW side effects,
patchbot
- [xen staging-4.18] x86/altcall: always use a temporary parameter stashing variable,
patchbot
- [xen staging-4.18] libxl: Fix segfault in device_model_spawn_outcome,
patchbot
- [xen staging-4.18] xen/livepatch: properly build the noapply and norevert tests,
patchbot
- [xen staging-4.18] xen/livepatch: fix norevert test attempt to open-code revert,
patchbot
- [xen staging-4.18] xen/livepatch: search for symbols in all loaded payloads,
patchbot
- [xen staging-4.18] xen/livepatch: register livepatch regions when loaded,
patchbot
- [xen staging-4.18] x86/spec: do not print thunk option selection if not built-in,
patchbot
- [xen staging-4.18] x86/spec: fix INDIRECT_THUNK option to only be set when build-enabled,
patchbot
- [xen staging-4.18] x86/spec: print the built-in SPECULATIVE_HARDEN_* options,
patchbot
- [xen staging-4.18] xen/sched: Fix UB shift in compat_set_timer_op(),
patchbot
- [xen staging-4.18] x86/HVM: hide SVM/VMX when their enabling is prohibited by firmware,
patchbot
- [xen master] xen/tasklet: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] xen/errno: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] xen/arm: smmuv3: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] arch: move array_index_mask_nospec(),
patchbot
- [xen master] hvmloader: suppress GNU ld 2.39 warning about RWX load segments,
patchbot
- [xen master] docs/misra/rules.rst: add rule 14.4,
patchbot
- [xen master] x86/mm: re-implement get_page_light() using an atomic increment,
patchbot
- [xen master] x86/cpu-policy: Allow for levelling of VERW side effects,
patchbot
- [xen master] tests/resource: Fix HVM guest in !SHADOW builds,
patchbot
- [xen master] x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies,
patchbot
- [xen master] x86/cpu-policy: Hide x2APIC from PV guests,
patchbot
- [xen staging] xen/tasklet: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] xen/errno: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] xen/arm: smmuv3: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] arch: move array_index_mask_nospec(),
patchbot
- [xen staging] hvmloader: suppress GNU ld 2.39 warning about RWX load segments,
patchbot
- [xen stable-4.17] xen/arm: Fix UBSAN failure in start_xen(),
patchbot
- [xen master] docs/misra/rules.rst: Fix entry for 20.12 rule,
patchbot
- [xen staging-4.17] xen/arm: Fix UBSAN failure in start_xen(),
patchbot
- [xen staging] docs/misra/rules.rst: add rule 14.4,
patchbot
- [xen staging] x86/mm: re-implement get_page_light() using an atomic increment,
patchbot
- [xen staging] x86/cpu-policy: Allow for levelling of VERW side effects,
patchbot
- [xen staging] tests/resource: Fix HVM guest in !SHADOW builds,
patchbot
- [xen staging] x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies,
patchbot
- [xen staging] x86/cpu-policy: Hide x2APIC from PV guests,
patchbot
- [xen master] docs/misra/rules.rst: add rule 16.6 and 20.12,
patchbot
- [xen master] automation/eclair: tag MISRA C:2012 Rule 8.2 as clean,
patchbot
- [xen master] automation/eclair: fully deviate MISRA C:2012 Rules 5.7 and 18.7,
patchbot
- [xen master] pci: fix locking around vPCI removal in pci_remove_device(),
patchbot
- [xen master] tools/xenstored: have a single do_control_memreport(),
patchbot
- [xen master] tools/xenstored: support complete log capabilities in stubdom,
patchbot
- [xen master] tools/xenstored: add helpers for filename handling,
patchbot
- [xen master] tools/xenstored: mount 9pfs device in stubdom,
patchbot
- [xen master] stubdom: extend xenstore stubdom configs,
patchbot
- [xen master] config: update Mini-OS commit,
patchbot
- [xen master] xen/riscv: introduce nospec.h,
patchbot
- [xen staging] docs/misra/rules.rst: Fix entry for 20.12 rule,
patchbot
- [xen master] x86/altcall: always use a temporary parameter stashing variable,
patchbot
- [xen master] x86: remove redundant XEN_SHSTK check from reinit_bsp_stack(),
patchbot
- [xen master] docs: Move function and macro properties in docs/misra,
patchbot
- [xen master] x86/memsharing: use an atomic add instead of a cmpxchg loop,
patchbot
- [xen master] libxl: Fix segfault in device_model_spawn_outcome,
patchbot
- [xen master] xen/livepatch: group and document payload hooks,
patchbot
- [xen master] xen/livepatch: properly build the noapply and norevert tests,
patchbot
- [xen master] xen/livepatch: fix norevert test attempt to open-code revert,
patchbot
- [xen master] xen/livepatch: search for symbols in all loaded payloads,
patchbot
- [xen master] xen/livepatch: register livepatch regions when loaded,
patchbot
Mail converted by MHonArc
|