April 30, 24 |
13:44 |
[xen staging] x86/cpu-policy: Annotate the accumulated features |
patchbot |
|
12:55 |
[xen stable-4.16] x86/spec: adjust logic that elides lfence |
patchbot |
|
12:55 |
[xen stable-4.16] x86/spec: fix reporting of BHB clearing usage from guest entry points |
patchbot |
|
06:44 |
[xen staging] revert "x86/mm: re-implement get_page_light() using an atomic increment" |
patchbot |
|
06:44 |
[xen staging] xen/riscv: improve check-extension() macro |
patchbot |
|
06:44 |
[xen staging] xen/x86: Fix Syntax warning in gen-cpuid.py |
patchbot |
|
06:44 |
[xen staging] xen/xsm: Wire up get_dom0_console |
patchbot |
|
06:44 |
[xen staging] x86/MCE: guard call to Intel-specific intel_get_extended_msrs() |
patchbot |
|
06:44 |
[xen staging] x86/msi: passthrough all MSI-X vector ctrl writes to device model |
patchbot |
|
05:33 |
[xen stable-4.17] x86/spec: adjust logic that elides lfence |
patchbot |
|
05:33 |
[xen stable-4.17] x86/spec: fix reporting of BHB clearing usage from guest entry points |
patchbot |
|
05:33 |
[xen stable-4.17] x86/MTRR: correct inadvertently inverted WC check |
patchbot |
|
00:22 |
[xen stable-4.18] x86/spec: adjust logic that elides lfence |
patchbot |
|
00:22 |
[xen stable-4.18] x86/spec: fix reporting of BHB clearing usage from guest entry points |
patchbot |
|
00:22 |
[xen stable-4.18] x86/MTRR: correct inadvertently inverted WC check |
patchbot |
|
00:22 |
[xen stable-4.18] x86/rtc: Avoid UIP flag being set for longer than expected |
patchbot |
|
00:22 |
[xen stable-4.18] altcall: fix __alt_call_maybe_initdata so it's safe for livepatch |
patchbot |
|
April 29, 24 |
08:33 |
[xen staging-4.15] x86/spec: adjust logic that elides lfence |
patchbot |
|
08:33 |
[xen staging-4.15] x86/spec: fix reporting of BHB clearing usage from guest entry points |
patchbot |
|
08:33 |
[xen staging-4.16] x86/spec: adjust logic that elides lfence |
patchbot |
|
08:33 |
[xen staging-4.16] x86/spec: fix reporting of BHB clearing usage from guest entry points |
patchbot |
|
07:45 |
[xen staging-4.17] x86/spec: adjust logic that elides lfence |
patchbot |
|
07:45 |
[xen staging-4.17] x86/spec: fix reporting of BHB clearing usage from guest entry points |
patchbot |
|
07:44 |
[xen staging-4.17] x86/MTRR: correct inadvertently inverted WC check |
patchbot |
|
07:44 |
[xen staging-4.18] x86/spec: adjust logic that elides lfence |
patchbot |
|
07:44 |
[xen staging-4.18] x86/spec: fix reporting of BHB clearing usage from guest entry points |
patchbot |
|
07:44 |
[xen staging-4.18] x86/MTRR: correct inadvertently inverted WC check |
patchbot |
|
07:44 |
[xen staging-4.18] x86/rtc: Avoid UIP flag being set for longer than expected |
patchbot |
|
07:44 |
[xen staging-4.18] altcall: fix __alt_call_maybe_initdata so it's safe for livepatch |
patchbot |
|
April 27, 24 |
06:48 |
[xen master] xen-livepatch: fix --force option comparison |
patchbot |
|
06:48 |
[xen master] xen/spinlock: use correct pointer |
patchbot |
|
06:48 |
[xen master] x86/entry: shrink insn size for some of our EFLAGS manipulation |
patchbot |
|
06:48 |
[xen master] gzip: clean up comments and fix code alignment |
patchbot |
|
06:48 |
[xen master] arm/vpci: make prefetchable mem 64 bit |
patchbot |
|
06:47 |
[xen master] CI: Drop glibc-i386 from the build containers |
patchbot |
|
06:47 |
[xen master] automation/eclair: reorganize pipelines |
patchbot |
|
06:47 |
[xen master] VMX: no open-coding in vmx_get_cpl() |
patchbot |
|
06:47 |
[xen master] MAINTAINERS: Update my email address |
patchbot |
|
06:47 |
[xen master] x86/spec: adjust logic that elides lfence |
patchbot |
|
06:47 |
[xen master] x86/spec: fix reporting of BHB clearing usage from guest entry points |
patchbot |
|
06:46 |
[xen master] tools/ocaml: Fix warnings in config.ml |
patchbot |
|
06:46 |
[xen master] x86/hap: Refactor boolean field assignments |
patchbot |
|
06:46 |
[xen master] x86/shadow: correct shadow_vcpu_init()'s comment |
patchbot |
|
06:46 |
[xen master] x86/paging: vCPU host mode is always set |
patchbot |
|
06:46 |
[xen master] x86/msr: add suffix 'U' to MSR_AMD_CSTATE_CFG macro |
patchbot |
|
06:46 |
[xen master] x86/pci: add suffix 'U' to PCI_CONF_ADDRESS macro |
patchbot |
|
06:45 |
[xen master] livepatch: introduce --force option |
patchbot |
|
06:45 |
[xen master] xen-livepatch: fix parameter name parsing |
patchbot |
|
06:45 |
[xen master] x86/mm: address violations of MISRA C Rule 20.7 |
patchbot |
|
06:45 |
[xen master] x86/debugreg: address violation of MISRA C Rule 20.7 |
patchbot |
|
06:45 |
[xen master] x86/vhpet: address violations of MISRA C Rule 20.7 |
patchbot |
|
06:45 |
[xen master] x86/acpi: address violations of MISRA Rule 20.7 |
patchbot |
|
06:44 |
[xen master] x86/pci: address violation of MISRA C Rule 20.7 |
patchbot |
|
06:44 |
[xen master] xen/spinlock: address violations of MISRA C Rule 20.7 |
patchbot |
|
06:44 |
[xen master] xen/page-defs: address violation of MISRA C Rule 20.7 |
patchbot |
|
06:44 |
[xen master] libelf: address violations of MISRA C Rule 20.7 |
patchbot |
|
06:44 |
[xen master] libxl: Support blktap with HVM device model |
patchbot |
|
06:44 |
[xen master] hotplug: Update block-tap |
patchbot |
|
April 26, 24 |
10:44 |
[xen staging] xen-livepatch: fix --force option comparison |
patchbot |
|
10:44 |
[xen staging] xen/spinlock: use correct pointer |
patchbot |
|
10:44 |
[xen staging] x86/entry: shrink insn size for some of our EFLAGS manipulation |
patchbot |
|
10:44 |
[xen staging] gzip: clean up comments and fix code alignment |
patchbot |
|
April 25, 24 |
20:22 |
[xen staging] arm/vpci: make prefetchable mem 64 bit |
patchbot |
|
20:22 |
[xen staging] CI: Drop glibc-i386 from the build containers |
patchbot |
|
20:22 |
[xen staging] automation/eclair: reorganize pipelines |
patchbot |
|
19:58 |
[xen master] automation: Add arm64 test for running Xen with GICv3 |
patchbot |
|
19:57 |
[xen master] automation: Add arm{64,32} earlyprintk jobs |
patchbot |
|
19:57 |
[xen master] automation: Drop some of the non-debug variants of the same Arm jobs |
patchbot |
|
19:57 |
[xen master] xen/arm: List static shared memory regions as /memory nodes |
patchbot |
|
19:57 |
[xen master] xen/arm: fix duplicate /reserved-memory node in Dom0 |
patchbot |
|
19:57 |
[xen master] xen/arm: remove shm holes from extended regions |
patchbot |
|
19:57 |
[xen master] xen/arm: Reduce struct membank size on static shared memory |
patchbot |
|
19:56 |
[xen master] xen/arm: Introduce helper for static memory pages |
patchbot |
|
19:56 |
[xen master] xen/arm: Avoid code duplication in check_reserved_regions_overlap |
patchbot |
|
19:56 |
[xen master] xen/arm: Avoid code duplication in find_unallocated_memory |
patchbot |
|
19:56 |
[xen master] xen/arm: Conditional compilation of kernel_info.shm_mem member |
patchbot |
|
19:56 |
[xen master] xen/arm: Introduce a generic way to access memory bank structures |
patchbot |
|
19:56 |
[xen master] xen/arm: Pass struct kernel_info parameter to make_{resv,shm}_memory_node |
patchbot |
|
19:55 |
[xen master] xen/arm: avoid repetitive checking in process_shm_node |
patchbot |
|
19:55 |
[xen master] xen/arm: remove stale addr_cells/size_cells in assign_shared_memory |
patchbot |
|
19:55 |
[xen master] tools/golang: Run `go vet` as part of the build process |
patchbot |
|
19:55 |
[xen master] golang/xenlight: Ensure comments aren't interpreted as docstrings |
patchbot |
|
19:55 |
[xen master] tools/golang: When returning pointers, actually allocate structrues |
patchbot |
|
19:55 |
[xen master] svm/nestedsvm: Introduce nested capabilities bit |
patchbot |
|
14:44 |
[xen staging] VMX: no open-coding in vmx_get_cpl() |
patchbot |
|
14:44 |
[xen staging] MAINTAINERS: Update my email address |
patchbot |
|
14:44 |
[xen staging] x86/spec: adjust logic that elides lfence |
patchbot |
|
14:44 |
[xen staging] x86/spec: fix reporting of BHB clearing usage from guest entry points |
patchbot |
|
12:44 |
[xen staging] tools/ocaml: Fix warnings in config.ml |
patchbot |
|
08:02 |
[xen staging] x86/hap: Refactor boolean field assignments |
patchbot |
|
08:02 |
[xen staging] x86/shadow: correct shadow_vcpu_init()'s comment |
patchbot |
|
08:02 |
[xen staging] x86/paging: vCPU host mode is always set |
patchbot |
|
08:02 |
[xen staging] x86/msr: add suffix 'U' to MSR_AMD_CSTATE_CFG macro |
patchbot |
|
08:02 |
[xen staging] x86/pci: add suffix 'U' to PCI_CONF_ADDRESS macro |
patchbot |
|
08:01 |
[xen staging] livepatch: introduce --force option |
patchbot |
|
08:01 |
[xen staging] xen-livepatch: fix parameter name parsing |
patchbot |
|
08:01 |
[xen staging] x86/mm: address violations of MISRA C Rule 20.7 |
patchbot |
|
08:01 |
[xen staging] x86/debugreg: address violation of MISRA C Rule 20.7 |
patchbot |
|
08:01 |
[xen staging] x86/vhpet: address violations of MISRA C Rule 20.7 |
patchbot |
|
08:01 |
[xen staging] x86/acpi: address violations of MISRA Rule 20.7 |
patchbot |
|
08:00 |
[xen staging] x86/pci: address violation of MISRA C Rule 20.7 |
patchbot |
|
08:00 |
[xen staging] xen/spinlock: address violations of MISRA C Rule 20.7 |
patchbot |
|
08:00 |
[xen staging] xen/page-defs: address violation of MISRA C Rule 20.7 |
patchbot |
|
08:00 |
[xen staging] libelf: address violations of MISRA C Rule 20.7 |
patchbot |
|
08:00 |
[xen staging] libxl: Support blktap with HVM device model |
patchbot |
|
08:00 |
[xen staging] hotplug: Update block-tap |
patchbot |
|
05:55 |
[xen master] x86/monitor: allow fast-singlestepping without enabling singlestep monitor |
patchbot |
|
00:11 |
[xen staging] automation: Add arm64 test for running Xen with GICv3 |
patchbot |
|
00:11 |
[xen staging] automation: Add arm{64,32} earlyprintk jobs |
patchbot |
|
00:11 |
[xen staging] automation: Drop some of the non-debug variants of the same Arm jobs |
patchbot |
|
April 24, 24 |
18:23 |
[xen staging] xen/arm: List static shared memory regions as /memory nodes |
patchbot |
|
18:23 |
[xen staging] xen/arm: fix duplicate /reserved-memory node in Dom0 |
patchbot |
|
18:23 |
[xen staging] xen/arm: remove shm holes from extended regions |
patchbot |
|
18:23 |
[xen staging] xen/arm: Reduce struct membank size on static shared memory |
patchbot |
|
18:23 |
[xen staging] xen/arm: Introduce helper for static memory pages |
patchbot |
|
18:23 |
[xen staging] xen/arm: Avoid code duplication in check_reserved_regions_overlap |
patchbot |
|
18:22 |
[xen staging] xen/arm: Avoid code duplication in find_unallocated_memory |
patchbot |
|
18:22 |
[xen staging] xen/arm: Conditional compilation of kernel_info.shm_mem member |
patchbot |
|
18:22 |
[xen staging] xen/arm: Introduce a generic way to access memory bank structures |
patchbot |
|
18:22 |
[xen staging] xen/arm: Pass struct kernel_info parameter to make_{resv,shm}_memory_node |
patchbot |
|
18:22 |
[xen staging] xen/arm: avoid repetitive checking in process_shm_node |
patchbot |
|
18:22 |
[xen staging] xen/arm: remove stale addr_cells/size_cells in assign_shared_memory |
patchbot |
|
15:55 |
[xen staging] tools/golang: Run `go vet` as part of the build process |
patchbot |
|
15:55 |
[xen staging] golang/xenlight: Ensure comments aren't interpreted as docstrings |
patchbot |
|
15:55 |
[xen staging] tools/golang: When returning pointers, actually allocate structrues |
patchbot |
|
15:55 |
[xen staging] svm/nestedsvm: Introduce nested capabilities bit |
patchbot |
|
13:01 |
[xen master] x86/MTRR: correct inadvertently inverted WC check |
patchbot |
|
13:00 |
[xen master] xen: introduce header file with section related symbols |
patchbot |
|
13:00 |
[xen master] docs/man: Add xenwatchdog manual page |
patchbot |
|
13:00 |
[xen master] tools/misc: Add xenwatchdogd.c copyright notice |
patchbot |
|
13:00 |
[xen master] tools/misc: xenwatchdogd enhancements |
patchbot |
|
13:00 |
[xen master] tools/misc: xenwatchdogd: add parse_secs() |
patchbot |
|
13:00 |
[xen master] x86/rtc: Avoid UIP flag being set for longer than expected |
patchbot |
|
April 23, 24 |
21:55 |
[xen staging] x86/monitor: allow fast-singlestepping without enabling singlestep monitor |
patchbot |
|
12:23 |
[xen staging] x86/MTRR: correct inadvertently inverted WC check |
patchbot |
|
12:22 |
[xen staging] xen: introduce header file with section related symbols |
patchbot |
|
12:22 |
[xen staging] docs/man: Add xenwatchdog manual page |
patchbot |
|
12:22 |
[xen staging] tools/misc: Add xenwatchdogd.c copyright notice |
patchbot |
|
12:22 |
[xen staging] tools/misc: xenwatchdogd enhancements |
patchbot |
|
12:22 |
[xen staging] tools/misc: xenwatchdogd: add parse_secs() |
patchbot |
|
12:22 |
[xen staging] x86/rtc: Avoid UIP flag being set for longer than expected |
patchbot |
|
05:00 |
[xen master] x86/pvh: zero VGA information |
patchbot |
|
05:00 |
[xen master] x86/video: add boot_video_info offset generation to asm-offsets |
patchbot |
|
05:00 |
[xen master] automation/eclair_analysis: substitute deprecated service STD.emptrecd |
patchbot |
|
05:00 |
[xen master] xen/riscv: check whether the assembler has Zbb extension support |
patchbot |
|
05:00 |
[xen master] xen/domain: deviate MISRA C Rule 16.2 violation |
patchbot |
|
05:00 |
[xen master] x86/PVH: Use unsigned int for dom0 e820 index |
patchbot |
|
April 22, 24 |
13:22 |
[xen staging] x86/pvh: zero VGA information |
patchbot |
|
13:22 |
[xen staging] x86/video: add boot_video_info offset generation to asm-offsets |
patchbot |
|
13:22 |
[xen staging] automation/eclair_analysis: substitute deprecated service STD.emptrecd |
patchbot |
|
13:22 |
[xen staging] xen/riscv: check whether the assembler has Zbb extension support |
patchbot |
|
13:22 |
[xen staging] xen/domain: deviate MISRA C Rule 16.2 violation |
patchbot |
|
13:22 |
[xen staging] x86/PVH: Use unsigned int for dom0 e820 index |
patchbot |
|
April 20, 24 |
07:22 |
[xen master] x86/svm: Add flushbyasid in the supported features |
patchbot |
|
00:33 |
[xen master] eclair_analysis: deviate x86 emulator for Rule 16.2 |
patchbot |
|
00:33 |
[xen master] xen/riscv: add minimal stuff to page.h to build full Xen |
patchbot |
|
00:33 |
[xen master] xen/riscv: introduce io.h |
patchbot |
|
00:33 |
[xen master] xen/ppc: mm-radix: Replace debug printing code with printk |
patchbot |
|
00:33 |
[xen master] x86/MCE: move intel mcheck init code to separate file |
patchbot |
|
April 19, 24 |
13:00 |
[xen staging] x86/svm: Add flushbyasid in the supported features |
patchbot |
|
06:57 |
[xen staging] eclair_analysis: deviate x86 emulator for Rule 16.2 |
patchbot |
|
06:57 |
[xen staging] xen/riscv: add minimal stuff to page.h to build full Xen |
patchbot |
|
06:56 |
[xen staging] xen/riscv: introduce io.h |
patchbot |
|
06:56 |
[xen staging] xen/ppc: mm-radix: Replace debug printing code with printk |
patchbot |
|
06:56 |
[xen staging] x86/MCE: move intel mcheck init code to separate file |
patchbot |
|
06:56 |
[xen master] xen/gzip: Drop huffman code table tracking |
patchbot |
|
06:56 |
[xen master] xen/gzip: Remove custom memory allocator |
patchbot |
|
06:56 |
[xen master] xen/gzip: Drop unused define checks |
patchbot |
|
06:55 |
[xen master] x86/emul: Simplify segment override prefix decoding |
patchbot |
|
06:55 |
[xen master] xen/efi: Rewrite DOS/PE magic checking without memcmp() |
patchbot |
|
06:55 |
[xen master] docs/misra: mark the gzip folder as adopted code |
patchbot |
|
06:55 |
[xen master] Revert "public: s/int/int32_t" |
patchbot |
|
06:55 |
[xen master] docs: arm: Update where Xen should be loaded in memory |
patchbot |
|
06:55 |
[xen master] public: s/int/int32_t |
patchbot |
|
April 18, 24 |
20:00 |
[xen staging] xen/gzip: Drop huffman code table tracking |
patchbot |
|
20:00 |
[xen staging] xen/gzip: Remove custom memory allocator |
patchbot |
|
20:00 |
[xen staging] xen/gzip: Drop unused define checks |
patchbot |
|
20:00 |
[xen staging] x86/emul: Simplify segment override prefix decoding |
patchbot |
|
20:00 |
[xen staging] xen/efi: Rewrite DOS/PE magic checking without memcmp() |
patchbot |
|
20:00 |
[xen staging] docs/misra: mark the gzip folder as adopted code |
patchbot |
|
12:17 |
[xen stable-4.18] x86/entry: Fix build with older toolchains |
patchbot |
|
12:17 |
[xen stable-4.18] Update CHANGELOG.md with 4.18.2 line |
patchbot |
|
12:17 |
[xen stable-4.18] Update Xen version to 4.18.2 |
patchbot |
|
12:16 |
[xen stable-4.18] x86/spec-ctrl: Support the "long" BHB loop sequence |
patchbot |
|
12:16 |
[xen stable-4.18] x86/spec-ctrl: Wire up the Native-BHI software sequences |
patchbot |
|
12:16 |
[xen stable-4.18] x86/spec-ctrl: Software BHB-clearing sequences |
patchbot |
|
12:16 |
[xen stable-4.18] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI |
patchbot |
|
12:16 |
[xen stable-4.18] x86/tsx: Expose RTM_ALWAYS_ABORT to guests |
patchbot |
|
12:16 |
[xen stable-4.18] x86: Drop INDIRECT_JMP |
patchbot |
|
12:15 |
[xen stable-4.18] x86: Use indirect calls in reset-stack infrastructure |
patchbot |
|
12:15 |
[xen stable-4.18] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields |
patchbot |
|
12:15 |
[xen stable-4.18] x86/vmx: Add support for virtualize SPEC_CTRL |
patchbot |
|
12:15 |
[xen stable-4.18] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* |
patchbot |
|
12:15 |
[xen stable-4.18] x86/spec-ctrl: Simplify DO_COND_IBPB |
patchbot |
|
12:15 |
[xen stable-4.18] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} |
patchbot |
|
12:14 |
[xen stable-4.18] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV |
patchbot |
|
12:14 |
[xen stable-4.18] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* |
patchbot |
|
12:14 |
[xen stable-4.18] x86/spec-ctrl: Rename spec_ctrl_flags to scf |
patchbot |
|
12:14 |
[xen stable-4.18] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests |
patchbot |
|
12:14 |
[xen stable-4.18] x86/alternatives: fix .init section reference in _apply_alternatives() |
patchbot |
|
12:14 |
[xen stable-4.18] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch |
patchbot |
|
12:13 |
[xen stable-4.18] x86/spec-ctrl: Move __read_mostly data into __ro_after_init |
patchbot |
|
12:13 |
[xen stable-4.18] VMX: tertiary execution control infrastructure |
patchbot |
|
12:13 |
[xen stable-4.18] x86/CPU: convert vendor hook invocations to altcall |
patchbot |
|
12:13 |
[xen stable-4.18] x86/guest: finish conversion to altcall |
patchbot |
|
12:13 |
[xen stable-4.18] x86: arrange for ENDBR zapping from <vendor>_ctxt_switch_masking() |
patchbot |
|
12:13 |
[xen stable-4.18] x86/spec-ctrl: Expose BHI_CTRL to guests |
patchbot |
|
12:12 |
[xen stable-4.18] x86/spec-ctrl: Expose RRSBA_CTRL to guests |
patchbot |
|
12:12 |
[xen stable-4.18] x86/spec-ctrl: Expose IPRED_CTRL to guests |
patchbot |
|
12:12 |
[xen stable-4.18] IRQ: generalize [gs]et_irq_regs() |
patchbot |
|
12:12 |
[xen stable-4.18] x86/MCE: switch some callback invocations to altcall |
patchbot |
|
12:12 |
[xen stable-4.18] x86/MCE: separate BSP-only initialization |
patchbot |
|
12:12 |
[xen stable-4.18] x86/PV: avoid indirect call for I/O emulation quirk hook |
patchbot |
|
12:11 |
[xen stable-4.18] x86/MTRR: avoid several indirect calls |
patchbot |
|
12:11 |
[xen stable-4.18] core-parking: use alternative_call() |
patchbot |
|
12:11 |
[xen stable-4.18] x86/HPET: avoid an indirect call |
patchbot |
|
12:11 |
[xen stable-4.18] cpufreq: finish conversion to altcall |
patchbot |
|
12:11 |
[xen stable-4.18] x86/APIC: finish genapic conversion to altcall |
patchbot |
|
12:11 |
[xen stable-4.18] x86/spec-ctrl: Fix BTC/SRSO mitigations |
patchbot |
|
06:33 |
[xen master] docs/misra: add Rule 16.4 |
patchbot |
|
06:33 |
[xen master] docs/misra/rules.rst: add rule 5.5 |
patchbot |
|
02:39 |
[xen stable-4.17] x86/entry: Fix build with older toolchains |
patchbot |
|
02:39 |
[xen stable-4.17] Release: Update CHANGELOG.md |
patchbot |
|
02:39 |
[xen stable-4.17] Update Xen version to 4.17.4 |
patchbot |
|
02:38 |
[xen stable-4.17] x86/spec-ctrl: Support the "long" BHB loop sequence |
patchbot |
|
02:38 |
[xen stable-4.17] x86/spec-ctrl: Wire up the Native-BHI software sequences |
patchbot |
|
02:38 |
[xen stable-4.17] x86/spec-ctrl: Software BHB-clearing sequences |
patchbot |
|
02:38 |
[xen stable-4.17] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI |
patchbot |
|
02:38 |
[xen stable-4.17] x86/tsx: Expose RTM_ALWAYS_ABORT to guests |
patchbot |
|
02:38 |
[xen stable-4.17] x86: Drop INDIRECT_JMP |
patchbot |
|
02:37 |
[xen stable-4.17] x86: Use indirect calls in reset-stack infrastructure |
patchbot |
|
02:37 |
[xen stable-4.17] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields |
patchbot |
|
02:37 |
[xen stable-4.17] x86/vmx: Add support for virtualize SPEC_CTRL |
patchbot |
|
02:37 |
[xen stable-4.17] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* |
patchbot |
|
02:37 |
[xen stable-4.17] x86/spec-ctrl: Simplify DO_COND_IBPB |
patchbot |
|
02:37 |
[xen stable-4.17] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} |
patchbot |
|
02:36 |
[xen stable-4.17] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV |
patchbot |
|
02:36 |
[xen stable-4.17] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* |
patchbot |
|
02:36 |
[xen stable-4.17] x86/spec-ctrl: Rename spec_ctrl_flags to scf |
patchbot |
|
02:36 |
[xen stable-4.17] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests |
patchbot |
|
02:36 |
[xen stable-4.17] x86/alternatives: fix .init section reference in _apply_alternatives() |
patchbot |
|
02:36 |
[xen stable-4.17] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch |
patchbot |
|
02:35 |
[xen stable-4.17] x86/spec-ctrl: Move __read_mostly data into __ro_after_init |
patchbot |
|
02:35 |
[xen stable-4.17] VMX: tertiary execution control infrastructure |
patchbot |
|
02:35 |
[xen stable-4.17] x86/CPU: convert vendor hook invocations to altcall |
patchbot |
|
02:35 |
[xen stable-4.17] x86/guest: finish conversion to altcall |
patchbot |
|
02:35 |
[xen stable-4.17] x86: arrange for ENDBR zapping from <vendor>_ctxt_switch_masking() |
patchbot |
|
02:35 |
[xen stable-4.17] x86/spec-ctrl: Expose BHI_CTRL to guests |
patchbot |
|
02:34 |
[xen stable-4.17] x86/spec-ctrl: Expose RRSBA_CTRL to guests |
patchbot |
|
02:34 |
[xen stable-4.17] x86/spec-ctrl: Expose IPRED_CTRL to guests |
patchbot |
|
02:34 |
[xen stable-4.17] IRQ: generalize [gs]et_irq_regs() |
patchbot |
|
02:34 |
[xen stable-4.17] x86/MCE: switch some callback invocations to altcall |
patchbot |
|
02:34 |
[xen stable-4.17] x86/MCE: separate BSP-only initialization |
patchbot |
|
02:34 |
[xen stable-4.17] x86/PV: avoid indirect call for I/O emulation quirk hook |
patchbot |
|
02:33 |
[xen stable-4.17] x86/MTRR: avoid several indirect calls |
patchbot |
|
02:33 |
[xen stable-4.17] core-parking: use alternative_call() |
patchbot |
|
02:33 |
[xen stable-4.17] x86/HPET: avoid an indirect call |
patchbot |
|
02:33 |
[xen stable-4.17] cpufreq: finish conversion to altcall |
patchbot |
|
02:33 |
[xen stable-4.17] x86/APIC: finish genapic conversion to altcall |
patchbot |
|
02:33 |
[xen stable-4.17] x86/spec-ctrl: Fix BTC/SRSO mitigations |
patchbot |
|
April 17, 24 |
22:59 |
[xen stable-4.16] x86/vmx: prevent fallthrough in vmx_set_reg() for handled registers |
patchbot |
|
22:59 |
[xen stable-4.16] x86/entry: Fix build with older toolchains |
patchbot |
|
22:59 |
[xen stable-4.16] Update Xen version to 4.16.6 |
patchbot |
|
22:58 |
[xen stable-4.16] x86/spec-ctrl: Support the "long" BHB loop sequence |
patchbot |
|
22:58 |
[xen stable-4.16] x86/spec-ctrl: Wire up the Native-BHI software sequences |
patchbot |
|
22:58 |
[xen stable-4.16] x86/spec-ctrl: Software BHB-clearing sequences |
patchbot |
|
22:58 |
[xen stable-4.16] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI |
patchbot |
|
22:58 |
[xen stable-4.16] x86/tsx: Expose RTM_ALWAYS_ABORT to guests |
patchbot |
|
22:58 |
[xen stable-4.16] x86: Drop INDIRECT_JMP |
patchbot |
|
22:57 |
[xen stable-4.16] x86: Use indirect calls in reset-stack infrastructure |
patchbot |
|
22:57 |
[xen stable-4.16] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields |
patchbot |
|
22:57 |
[xen stable-4.16] x86/vmx: Add support for virtualize SPEC_CTRL |
patchbot |
|
22:57 |
[xen stable-4.16] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* |
patchbot |
|
22:57 |
[xen stable-4.16] x86/spec-ctrl: Simplify DO_COND_IBPB |
patchbot |
|
22:57 |
[xen stable-4.16] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} |
patchbot |
|
22:56 |
[xen stable-4.16] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV |
patchbot |
|
22:56 |
[xen stable-4.16] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* |
patchbot |
|
22:56 |
[xen stable-4.16] x86/spec-ctrl: Rename spec_ctrl_flags to scf |
patchbot |
|
22:56 |
[xen stable-4.16] x86/spec-ctrl: Make svm_vmexit_spec_ctrl conditional |
patchbot |
|
22:56 |
[xen stable-4.16] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests |
patchbot |
|
22:56 |
[xen stable-4.16] xen/wait: Remove indirect jump |
patchbot |
|
22:55 |
[xen stable-4.16] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch |
patchbot |
|
22:55 |
[xen stable-4.16] VMX: tertiary execution control infrastructure |
patchbot |
|
22:55 |
[xen stable-4.16] x86/spec-ctrl: Expose BHI_CTRL to guests |
patchbot |
|
22:55 |
[xen stable-4.16] x86/spec-ctrl: Expose RRSBA_CTRL to guests |
patchbot |
|
22:55 |
[xen stable-4.16] x86/spec-ctrl: Expose IPRED_CTRL to guests |
patchbot |
|
22:55 |
[xen stable-4.16] x86/spec-ctrl: Fix BTC/SRSO mitigations |
patchbot |
|
19:26 |
[xen stable-4.15] x86/vmx: prevent fallthrough in vmx_set_reg() for handled registers |
patchbot |
|
19:26 |
[xen stable-4.15] x86/entry: Fix build with older toolchains |
patchbot |
|
19:26 |
[xen stable-4.15] Update Xen version to 4.15.6 |
patchbot |
|
19:25 |
[xen stable-4.15] x86/spec-ctrl: Support the "long" BHB loop sequence |
patchbot |
|
19:25 |
[xen stable-4.15] x86/spec-ctrl: Wire up the Native-BHI software sequences |
patchbot |
|
19:25 |
[xen stable-4.15] x86/spec-ctrl: Software BHB-clearing sequences |
patchbot |
|
19:25 |
[xen stable-4.15] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI |
patchbot |
|
19:25 |
[xen stable-4.15] x86/tsx: Expose RTM_ALWAYS_ABORT to guests |
patchbot |
|
19:25 |
[xen stable-4.15] x86: Drop INDIRECT_JMP |
patchbot |
|
19:24 |
[xen stable-4.15] x86: Use indirect calls in reset-stack infrastructure |
patchbot |
|
19:24 |
[xen stable-4.15] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields |
patchbot |
|
19:24 |
[xen stable-4.15] x86/vmx: Add support for virtualize SPEC_CTRL |
patchbot |
|
19:24 |
[xen stable-4.15] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* |
patchbot |
|
19:24 |
[xen stable-4.15] x86/spec-ctrl: Simplify DO_COND_IBPB |
patchbot |
|
19:24 |
[xen stable-4.15] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} |
patchbot |
|
19:23 |
[xen stable-4.15] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV |
patchbot |
|
19:23 |
[xen stable-4.15] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* |
patchbot |
|
19:23 |
[xen stable-4.15] x86/spec-ctrl: Rename spec_ctrl_flags to scf |
patchbot |
|
19:23 |
[xen stable-4.15] x86/spec-ctrl: Make svm_vmexit_spec_ctrl conditional |
patchbot |
|
19:23 |
[xen stable-4.15] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests |
patchbot |
|
19:23 |
[xen stable-4.15] xen/wait: Remove indirect jump |
patchbot |
|
19:22 |
[xen stable-4.15] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch |
patchbot |
|
19:22 |
[xen stable-4.15] VMX: tertiary execution control infrastructure |
patchbot |
|
19:22 |
[xen stable-4.15] x86/spec-ctrl: Expose BHI_CTRL to guests |
patchbot |
|
19:22 |
[xen stable-4.15] x86/spec-ctrl: Expose RRSBA_CTRL to guests |
patchbot |
|
19:22 |
[xen stable-4.15] x86/spec-ctrl: Expose IPRED_CTRL to guests |
patchbot |
|
19:22 |
[xen stable-4.15] x86/spec-ctrl: Fix BTC/SRSO mitigations |
patchbot |
|
12:55 |
[xen staging] Revert "public: s/int/int32_t" |
patchbot |
|
09:55 |
[xen staging] docs: arm: Update where Xen should be loaded in memory |
patchbot |
|
09:55 |
[xen staging] public: s/int/int32_t |
patchbot |
|
03:19 |
[xen master] docs/hypercall-abi: State that the hypercall page is optional |
patchbot |
|
03:19 |
[xen master] xen/gzip: Colocate gunzip code files |
patchbot |
|
03:19 |
[xen master] altcall: fix __alt_call_maybe_initdata so it's safe for livepatch |
patchbot |
|
03:19 |
[xen master] libxl: devd: Spawn QEMU for 9pfs |
patchbot |
|
03:19 |
[xen master] libxl: Use vkb=[] for HVMs |
patchbot |
|
03:19 |
[xen master] xen/include: move definition of ASM_INT() to xen/linkage.h |
patchbot |
|
03:18 |
[xen master] MAINTAINERS: Update livepatch maintainers |
patchbot |
|
03:18 |
[xen master] tools/misc: xenwatchdogd: add static qualifier |
patchbot |
|
03:18 |
[xen master] tools/misc: rework xenwatchdogd signal handling |
patchbot |
|
03:18 |
[xen master] tools/misc: xenwatchdogd: use EXIT_* constants |
patchbot |
|
03:18 |
[xen master] xen/acpi: Allow xen/acpi.h to be included on non-ACPI archs |
patchbot |
|
03:18 |
[xen master] xen/xsm: address violation of MISRA C Rule 16.2 |
patchbot |
|
03:17 |
[xen master] x86/hvm: address violations of MISRA C Rule 16.2 |
patchbot |
|
03:17 |
[xen master] xen/domctl: address violations of MISRA C Rule 16.2 |
patchbot |
|
03:17 |
[xen master] x86/efi: tidy switch statement and address MISRA violation |
patchbot |
|
03:17 |
[xen master] x86/irq: tidy switch statement and address MISRA violation |
patchbot |
|
03:17 |
[xen master] x86/cpuid: address violation of MISRA C Rule 16.2 |
patchbot |
|
03:17 |
[xen master] x86/vlapic: tidy switch statement and address MISRA violation |
patchbot |
|
03:16 |
[xen master] x86/emul: Adjust X86EMUL_OPC_EXT_MASK to placate MISRA |
patchbot |
|
03:16 |
[xen master] xen/spinlock: Adjust LOCK_DEBUG_INITVAL to placate MISRA |
patchbot |
|
03:16 |
[xen master] xen/vPCI: Remove shadowed variable |
patchbot |
|
03:16 |
[xen master] xen/nospec: Remove unreachable code |
patchbot |
|
03:16 |
[xen master] x86/hvm: Fix Misra Rule 19.1 regression |
patchbot |
|
03:16 |
[xen master] xen/virtual-region: Drop setup_virtual_regions() |
patchbot |
|
03:15 |
[xen master] xen/virtual-region: Link the list build time |
patchbot |
|
03:15 |
[xen master] xen/virtual-region: Rework how bugframe linkage works |
patchbot |
|
03:15 |
[xen master] xen/link: Introduce a common BUGFRAMES definition |
patchbot |
|
03:15 |
[xen master] x86/Kconfig: Introduce CONFIG_{AMD,INTEL} and conditionalise ucode |
patchbot |
|
03:15 |
[xen master] x86/ucode: Move vendor specifics back out of early_microcode_init() |
patchbot |
|
03:15 |
[xen master] docs/misra: document the expected sizes of integer types |
patchbot |
|
03:14 |
[xen master] MAINTAINERS: Become a reviewer of iMX8Q{M,XP} related patches |
patchbot |
|
03:14 |
[xen master] xen/drivers: imx-lpuart: Replace iMX8QM compatible with iMX8QXP |
patchbot |
|
03:14 |
[xen master] xen/arm: Add imx8q{m,x} platform glue |
patchbot |
|
03:14 |
[xen master] x86/entry: Fix build with older toolchains |
patchbot |
|
03:14 |
[xen master] x86/spec-ctrl: Support the "long" BHB loop sequence |
patchbot |
|
03:14 |
[xen master] x86/spec-ctrl: Wire up the Native-BHI software sequences |
patchbot |
|
03:13 |
[xen master] x86/spec-ctrl: Software BHB-clearing sequences |
patchbot |
|
03:13 |
[xen master] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI |
patchbot |
|
03:13 |
[xen master] x86/tsx: Expose RTM_ALWAYS_ABORT to guests |
patchbot |
|
03:13 |
[xen master] x86: Drop INDIRECT_JMP |
patchbot |
|
03:13 |
[xen master] x86: Use indirect calls in reset-stack infrastructure |
patchbot |
|
03:13 |
[xen master] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields |
patchbot |
|
03:12 |
[xen master] x86/vmx: Add support for virtualize SPEC_CTRL |
patchbot |
|
03:12 |
[xen master] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* |
patchbot |
|
03:12 |
[xen master] x86/spec-ctrl: Simplify DO_COND_IBPB |
patchbot |
|
03:12 |
[xen master] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} |
patchbot |
|
03:12 |
[xen master] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV |
patchbot |
|
03:12 |
[xen master] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* |
patchbot |
|
03:11 |
[xen master] x86/spec-ctrl: Rename spec_ctrl_flags to scf |
patchbot |
|
03:11 |
[xen master] x86/spec-ctrl: Fix BTC/SRSO mitigations |
patchbot |
|
03:11 |
[xen master] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests |
patchbot |
|
03:11 |
[xen master] x86/alternatives: fix .init section reference in _apply_alternatives() |
patchbot |
|
03:11 |
[xen master] hypercall_xlat_continuation: Replace BUG_ON with domain_crash |
patchbot |
|
03:11 |
[xen master] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code |
patchbot |
|
April 16, 24 |
19:22 |
[xen staging] docs/misra: add Rule 16.4 |
patchbot |
|
19:22 |
[xen staging] docs/misra/rules.rst: add rule 5.5 |
patchbot |
|
April 15, 24 |
10:33 |
[xen staging-4.15] x86/vmx: prevent fallthrough in vmx_set_reg() for handled registers |
patchbot |
|
10:33 |
[xen staging-4.15] x86/entry: Fix build with older toolchains |
patchbot |
|
10:33 |
[xen staging-4.16] x86/vmx: prevent fallthrough in vmx_set_reg() for handled registers |
patchbot |
|
April 12, 24 |
14:55 |
[xen staging] docs/hypercall-abi: State that the hypercall page is optional |
patchbot |
|
14:55 |
[xen staging] xen/gzip: Colocate gunzip code files |
patchbot |
|
April 11, 24 |
18:00 |
[xen staging] altcall: fix __alt_call_maybe_initdata so it's safe for livepatch |
patchbot |
|
18:00 |
[xen staging] libxl: devd: Spawn QEMU for 9pfs |
patchbot |
|
18:00 |
[xen staging] libxl: Use vkb=[] for HVMs |
patchbot |
|
18:00 |
[xen staging] xen/include: move definition of ASM_INT() to xen/linkage.h |
patchbot |
|
15:44 |
[xen staging-4.16] x86/entry: Fix build with older toolchains |
patchbot |
|
15:44 |
[xen staging-4.17] x86/entry: Fix build with older toolchains |
patchbot |
|
15:44 |
[xen staging-4.18] x86/entry: Fix build with older toolchains |
patchbot |
|
13:25 |
[xen staging] MAINTAINERS: Update livepatch maintainers |
patchbot |
|
13:25 |
[xen staging] tools/misc: xenwatchdogd: add static qualifier |
patchbot |
|
13:25 |
[xen staging] tools/misc: rework xenwatchdogd signal handling |
patchbot |
|
13:24 |
[xen staging] tools/misc: xenwatchdogd: use EXIT_* constants |
patchbot |
|
13:24 |
[xen staging] xen/acpi: Allow xen/acpi.h to be included on non-ACPI archs |
patchbot |
|
13:24 |
[xen staging] xen/xsm: address violation of MISRA C Rule 16.2 |
patchbot |
|
13:24 |
[xen staging] x86/hvm: address violations of MISRA C Rule 16.2 |
patchbot |
|
13:24 |
[xen staging] xen/domctl: address violations of MISRA C Rule 16.2 |
patchbot |
|
13:24 |
[xen staging] x86/efi: tidy switch statement and address MISRA violation |
patchbot |
|
13:23 |
[xen staging] x86/irq: tidy switch statement and address MISRA violation |
patchbot |
|
13:23 |
[xen staging] x86/cpuid: address violation of MISRA C Rule 16.2 |
patchbot |
|
13:23 |
[xen staging] x86/vlapic: tidy switch statement and address MISRA violation |
patchbot |
|
13:23 |
[xen staging] x86/emul: Adjust X86EMUL_OPC_EXT_MASK to placate MISRA |
patchbot |
|
13:23 |
[xen staging] xen/spinlock: Adjust LOCK_DEBUG_INITVAL to placate MISRA |
patchbot |
|
13:23 |
[xen staging] xen/vPCI: Remove shadowed variable |
patchbot |
|
13:22 |
[xen staging] xen/nospec: Remove unreachable code |
patchbot |
|
13:22 |
[xen staging] x86/hvm: Fix Misra Rule 19.1 regression |
patchbot |
|
13:22 |
[xen staging] xen/virtual-region: Drop setup_virtual_regions() |
patchbot |
|
13:22 |
[xen staging] xen/virtual-region: Link the list build time |
patchbot |
|
13:22 |
[xen staging] xen/virtual-region: Rework how bugframe linkage works |
patchbot |
|
13:22 |
[xen staging] xen/link: Introduce a common BUGFRAMES definition |
patchbot |
|
April 10, 24 |
18:33 |
[xen stable-4.18] hypercall_xlat_continuation: Replace BUG_ON with domain_crash |
patchbot |
|
18:33 |
[xen stable-4.18] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code |
patchbot |
|
18:00 |
[xen staging] x86/Kconfig: Introduce CONFIG_{AMD,INTEL} and conditionalise ucode |
patchbot |
|
18:00 |
[xen staging] x86/ucode: Move vendor specifics back out of early_microcode_init() |
patchbot |
|
16:33 |
[xen stable-4.17] hypercall_xlat_continuation: Replace BUG_ON with domain_crash |
patchbot |
|
16:33 |
[xen stable-4.17] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code |
patchbot |
|
16:33 |
[xen stable-4.17] xen/livepatch: Fix .altinstructions safety checks |
patchbot |
|
16:33 |
[xen stable-4.17] arm/alternatives: Rename alt_instr fields which are used in common code |
patchbot |
|
10:00 |
[xen stable-4.16] hypercall_xlat_continuation: Replace BUG_ON with domain_crash |
patchbot |
|
10:00 |
[xen stable-4.16] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code |
patchbot |
|
05:55 |
[xen stable-4.15] hypercall_xlat_continuation: Replace BUG_ON with domain_crash |
patchbot |
|
05:55 |
[xen stable-4.15] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code |
patchbot |
|
04:22 |
[xen master] drivers: char: Enable OMAP UART driver for TI K3 devices |
patchbot |
|
April 09, 24 |
21:33 |
[xen staging] docs/misra: document the expected sizes of integer types |
patchbot |
|
21:33 |
[xen staging] MAINTAINERS: Become a reviewer of iMX8Q{M,XP} related patches |
patchbot |
|
21:33 |
[xen staging] xen/drivers: imx-lpuart: Replace iMX8QM compatible with iMX8QXP |
patchbot |
|
21:33 |
[xen staging] xen/arm: Add imx8q{m,x} platform glue |
patchbot |
|
21:33 |
[xen staging] x86/entry: Fix build with older toolchains |
patchbot |
|
17:34 |
[xen staging-4.15] Update Xen version to 4.15.6 |
patchbot |
|
17:34 |
[xen staging-4.15] x86/spec-ctrl: Support the "long" BHB loop sequence |
patchbot |
|
17:34 |
[xen staging-4.15] x86/spec-ctrl: Wire up the Native-BHI software sequences |
patchbot |
|
17:34 |
[xen staging-4.15] x86/spec-ctrl: Software BHB-clearing sequences |
patchbot |
|
17:34 |
[xen staging-4.15] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI |
patchbot |
|
17:34 |
[xen staging-4.15] x86/tsx: Expose RTM_ALWAYS_ABORT to guests |
patchbot |
|
17:33 |
[xen staging-4.15] x86: Drop INDIRECT_JMP |
patchbot |
|
17:33 |
[xen staging-4.15] x86: Use indirect calls in reset-stack infrastructure |
patchbot |
|
17:33 |
[xen staging-4.15] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields |
patchbot |
|
17:33 |
[xen staging-4.15] x86/vmx: Add support for virtualize SPEC_CTRL |
patchbot |
|
17:33 |
[xen staging-4.15] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* |
patchbot |
|
17:32 |
[xen staging-4.15] x86/spec-ctrl: Simplify DO_COND_IBPB |
patchbot |
|
17:32 |
[xen staging-4.15] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} |
patchbot |
|
17:32 |
[xen staging-4.15] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV |
patchbot |
|
17:32 |
[xen staging-4.15] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* |
patchbot |
|
17:32 |
[xen staging-4.15] x86/spec-ctrl: Rename spec_ctrl_flags to scf |
patchbot |
|
17:32 |
[xen staging-4.15] x86/spec-ctrl: Make svm_vmexit_spec_ctrl conditional |
patchbot |
|
17:31 |
[xen staging-4.15] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests |
patchbot |
|
17:31 |
[xen staging-4.15] xen/wait: Remove indirect jump |
patchbot |
|
17:31 |
[xen staging-4.15] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch |
patchbot |
|
17:31 |
[xen staging-4.15] VMX: tertiary execution control infrastructure |
patchbot |
|
17:31 |
[xen staging-4.15] x86/spec-ctrl: Expose BHI_CTRL to guests |
patchbot |
|
17:31 |
[xen staging-4.15] x86/spec-ctrl: Expose RRSBA_CTRL to guests |
patchbot |
|
17:30 |
[xen staging-4.15] x86/spec-ctrl: Expose IPRED_CTRL to guests |
patchbot |
|
17:30 |
[xen staging-4.15] x86/spec-ctrl: Fix BTC/SRSO mitigations |
patchbot |
|
17:30 |
[xen staging-4.16] Update Xen version to 4.16.6 |
patchbot |
|
17:30 |
[xen staging-4.16] x86/spec-ctrl: Support the "long" BHB loop sequence |
patchbot |
|
17:30 |
[xen staging-4.16] x86/spec-ctrl: Wire up the Native-BHI software sequences |
patchbot |
|
17:30 |
[xen staging-4.16] x86/spec-ctrl: Software BHB-clearing sequences |
patchbot |
|
17:29 |
[xen staging-4.16] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI |
patchbot |
|
17:29 |
[xen staging-4.16] x86/tsx: Expose RTM_ALWAYS_ABORT to guests |
patchbot |
|
17:29 |
[xen staging-4.16] x86: Drop INDIRECT_JMP |
patchbot |
|
17:29 |
[xen staging-4.16] x86: Use indirect calls in reset-stack infrastructure |
patchbot |
|
17:29 |
[xen staging-4.16] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields |
patchbot |
|
17:29 |
[xen staging-4.16] x86/vmx: Add support for virtualize SPEC_CTRL |
patchbot |
|
17:28 |
[xen staging-4.16] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* |
patchbot |
|
17:28 |
[xen staging-4.16] x86/spec-ctrl: Simplify DO_COND_IBPB |
patchbot |
|
17:28 |
[xen staging-4.16] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} |
patchbot |
|
17:28 |
[xen staging-4.16] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV |
patchbot |
|
17:28 |
[xen staging-4.16] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* |
patchbot |
|
17:28 |
[xen staging-4.16] x86/spec-ctrl: Rename spec_ctrl_flags to scf |
patchbot |
|
17:27 |
[xen staging-4.16] x86/spec-ctrl: Make svm_vmexit_spec_ctrl conditional |
patchbot |
|
17:27 |
[xen staging-4.16] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests |
patchbot |
|
17:27 |
[xen staging-4.16] xen/wait: Remove indirect jump |
patchbot |
|
17:27 |
[xen staging-4.16] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch |
patchbot |
|
17:27 |
[xen staging-4.16] VMX: tertiary execution control infrastructure |
patchbot |
|
17:27 |
[xen staging-4.16] x86/spec-ctrl: Expose BHI_CTRL to guests |
patchbot |
|
17:26 |
[xen staging-4.16] x86/spec-ctrl: Expose RRSBA_CTRL to guests |
patchbot |
|
17:26 |
[xen staging-4.16] x86/spec-ctrl: Expose IPRED_CTRL to guests |
patchbot |
|
17:26 |
[xen staging-4.16] x86/spec-ctrl: Fix BTC/SRSO mitigations |
patchbot |
|
17:26 |
[xen staging-4.17] Release: Update CHANGELOG.md |
patchbot |
|
17:26 |
[xen staging-4.17] Update Xen version to 4.17.4 |
patchbot |
|
17:26 |
[xen staging-4.17] x86/spec-ctrl: Support the "long" BHB loop sequence |
patchbot |
|
17:25 |
[xen staging-4.17] x86/spec-ctrl: Wire up the Native-BHI software sequences |
patchbot |
|
17:25 |
[xen staging-4.17] x86/spec-ctrl: Software BHB-clearing sequences |
patchbot |
|
17:25 |
[xen staging-4.17] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI |
patchbot |
|
17:25 |
[xen staging-4.17] x86/tsx: Expose RTM_ALWAYS_ABORT to guests |
patchbot |
|
17:25 |
[xen staging-4.17] x86: Drop INDIRECT_JMP |
patchbot |
|
17:25 |
[xen staging-4.17] x86: Use indirect calls in reset-stack infrastructure |
patchbot |
|
17:24 |
[xen staging-4.17] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields |
patchbot |
|
17:24 |
[xen staging-4.17] x86/vmx: Add support for virtualize SPEC_CTRL |
patchbot |
|
17:24 |
[xen staging-4.17] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* |
patchbot |
|
17:24 |
[xen staging-4.17] x86/spec-ctrl: Simplify DO_COND_IBPB |
patchbot |
|
17:24 |
[xen staging-4.17] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} |
patchbot |
|
17:24 |
[xen staging-4.17] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV |
patchbot |
|
17:23 |
[xen staging-4.17] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* |
patchbot |
|
17:23 |
[xen staging-4.17] x86/spec-ctrl: Rename spec_ctrl_flags to scf |
patchbot |
|
17:23 |
[xen staging-4.17] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests |
patchbot |
|
17:23 |
[xen staging-4.17] x86/alternatives: fix .init section reference in _apply_alternatives() |
patchbot |
|
17:23 |
[xen staging-4.17] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch |
patchbot |
|
17:23 |
[xen staging-4.17] x86/spec-ctrl: Move __read_mostly data into __ro_after_init |
patchbot |
|
17:22 |
[xen staging-4.17] VMX: tertiary execution control infrastructure |
patchbot |
|
17:22 |
[xen staging-4.17] x86/CPU: convert vendor hook invocations to altcall |
patchbot |
|
17:22 |
[xen staging-4.17] x86/guest: finish conversion to altcall |
patchbot |
|
17:22 |
[xen staging-4.17] x86: arrange for ENDBR zapping from <vendor>_ctxt_switch_masking() |
patchbot |
|
17:22 |
[xen staging-4.17] x86/spec-ctrl: Expose BHI_CTRL to guests |
patchbot |
|
17:22 |
[xen staging-4.17] x86/spec-ctrl: Expose RRSBA_CTRL to guests |
patchbot |
|
17:21 |
[xen staging-4.17] x86/spec-ctrl: Expose IPRED_CTRL to guests |
patchbot |
|
17:21 |
[xen staging-4.17] IRQ: generalize [gs]et_irq_regs() |
patchbot |
|
17:21 |
[xen staging-4.17] x86/MCE: switch some callback invocations to altcall |
patchbot |
|
17:21 |
[xen staging-4.17] x86/MCE: separate BSP-only initialization |
patchbot |
|
17:21 |
[xen staging-4.17] x86/PV: avoid indirect call for I/O emulation quirk hook |
patchbot |
|
17:21 |
[xen staging-4.17] x86/MTRR: avoid several indirect calls |
patchbot |
|
17:20 |
[xen staging-4.17] core-parking: use alternative_call() |
patchbot |
|
17:20 |
[xen staging-4.17] x86/HPET: avoid an indirect call |
patchbot |
|
17:20 |
[xen staging-4.17] cpufreq: finish conversion to altcall |
patchbot |
|
17:20 |
[xen staging-4.17] x86/APIC: finish genapic conversion to altcall |
patchbot |
|
17:20 |
[xen staging-4.17] x86/spec-ctrl: Fix BTC/SRSO mitigations |
patchbot |
|
17:20 |
[xen staging-4.18] Update CHANGELOG.md with 4.18.2 line |
patchbot |
|
17:19 |
[xen staging-4.18] Update Xen version to 4.18.2 |
patchbot |
|
17:19 |
[xen staging-4.18] x86/spec-ctrl: Support the "long" BHB loop sequence |
patchbot |
|
17:19 |
[xen staging-4.18] x86/spec-ctrl: Wire up the Native-BHI software sequences |
patchbot |
|
17:19 |
[xen staging-4.18] x86/spec-ctrl: Software BHB-clearing sequences |
patchbot |
|
17:19 |
[xen staging-4.18] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI |
patchbot |
|
17:18 |
[xen staging-4.18] x86/tsx: Expose RTM_ALWAYS_ABORT to guests |
patchbot |
|
17:18 |
[xen staging-4.18] x86: Drop INDIRECT_JMP |
patchbot |
|
17:18 |
[xen staging-4.18] x86: Use indirect calls in reset-stack infrastructure |
patchbot |
|
17:18 |
[xen staging-4.18] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields |
patchbot |
|
17:18 |
[xen staging-4.18] x86/vmx: Add support for virtualize SPEC_CTRL |
patchbot |
|
17:18 |
[xen staging-4.18] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* |
patchbot |
|
17:17 |
[xen staging-4.18] x86/spec-ctrl: Simplify DO_COND_IBPB |
patchbot |
|
17:17 |
[xen staging-4.18] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} |
patchbot |
|
17:17 |
[xen staging-4.18] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV |
patchbot |
|
17:17 |
[xen staging-4.18] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* |
patchbot |
|
17:17 |
[xen staging-4.18] x86/spec-ctrl: Rename spec_ctrl_flags to scf |
patchbot |
|
17:17 |
[xen staging-4.18] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests |
patchbot |
|
17:16 |
[xen staging-4.18] x86/alternatives: fix .init section reference in _apply_alternatives() |
patchbot |
|
17:16 |
[xen staging-4.18] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch |
patchbot |
|
17:16 |
[xen staging-4.18] x86/spec-ctrl: Move __read_mostly data into __ro_after_init |
patchbot |
|
17:16 |
[xen staging-4.18] VMX: tertiary execution control infrastructure |
patchbot |
|
17:16 |
[xen staging-4.18] x86/CPU: convert vendor hook invocations to altcall |
patchbot |
|
17:16 |
[xen staging-4.18] x86/guest: finish conversion to altcall |
patchbot |
|
17:15 |
[xen staging-4.18] x86: arrange for ENDBR zapping from <vendor>_ctxt_switch_masking() |
patchbot |
|
17:15 |
[xen staging-4.18] x86/spec-ctrl: Expose BHI_CTRL to guests |
patchbot |
|
17:15 |
[xen staging-4.18] x86/spec-ctrl: Expose RRSBA_CTRL to guests |
patchbot |
|
17:15 |
[xen staging-4.18] x86/spec-ctrl: Expose IPRED_CTRL to guests |
patchbot |
|
17:15 |
[xen staging-4.18] IRQ: generalize [gs]et_irq_regs() |
patchbot |
|
17:15 |
[xen staging-4.18] x86/MCE: switch some callback invocations to altcall |
patchbot |
|
17:14 |
[xen staging-4.18] x86/MCE: separate BSP-only initialization |
patchbot |
|
17:14 |
[xen staging-4.18] x86/PV: avoid indirect call for I/O emulation quirk hook |
patchbot |
|
17:14 |
[xen staging-4.18] x86/MTRR: avoid several indirect calls |
patchbot |
|
17:14 |
[xen staging-4.18] core-parking: use alternative_call() |
patchbot |
|
17:14 |
[xen staging-4.18] x86/HPET: avoid an indirect call |
patchbot |
|
17:14 |
[xen staging-4.18] cpufreq: finish conversion to altcall |
patchbot |
|
17:13 |
[xen staging-4.18] x86/APIC: finish genapic conversion to altcall |
patchbot |
|
17:13 |
[xen staging-4.18] x86/spec-ctrl: Fix BTC/SRSO mitigations |
patchbot |
|
17:13 |
[xen staging] x86/spec-ctrl: Support the "long" BHB loop sequence |
patchbot |
|
17:13 |
[xen staging] x86/spec-ctrl: Wire up the Native-BHI software sequences |
patchbot |
|
17:13 |
[xen staging] x86/spec-ctrl: Software BHB-clearing sequences |
patchbot |
|
17:13 |
[xen staging] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI |
patchbot |
|
17:12 |
[xen staging] x86/tsx: Expose RTM_ALWAYS_ABORT to guests |
patchbot |
|
17:12 |
[xen staging] x86: Drop INDIRECT_JMP |
patchbot |
|
17:12 |
[xen staging] x86: Use indirect calls in reset-stack infrastructure |
patchbot |
|
17:12 |
[xen staging] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields |
patchbot |
|
17:12 |
[xen staging] x86/vmx: Add support for virtualize SPEC_CTRL |
patchbot |
|
17:12 |
[xen staging] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* |
patchbot |
|
17:11 |
[xen staging] x86/spec-ctrl: Simplify DO_COND_IBPB |
patchbot |
|
17:11 |
[xen staging] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} |
patchbot |
|
17:11 |
[xen staging] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV |
patchbot |
|
17:11 |
[xen staging] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* |
patchbot |
|
17:11 |
[xen staging] x86/spec-ctrl: Rename spec_ctrl_flags to scf |
patchbot |
|
17:11 |
[xen staging] x86/spec-ctrl: Fix BTC/SRSO mitigations |
patchbot |
|
14:33 |
[xen staging] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests |
patchbot |
|
13:11 |
[xen staging] x86/alternatives: fix .init section reference in _apply_alternatives() |
patchbot |
|
12:12 |
[xen staging-4.15] hypercall_xlat_continuation: Replace BUG_ON with domain_crash |
patchbot |
|
12:12 |
[xen staging-4.15] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code |
patchbot |
|
12:12 |
[xen staging-4.16] hypercall_xlat_continuation: Replace BUG_ON with domain_crash |
patchbot |
|
12:12 |
[xen staging-4.16] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code |
patchbot |
|
12:12 |
[xen staging-4.17] hypercall_xlat_continuation: Replace BUG_ON with domain_crash |
patchbot |
|
12:12 |
[xen staging-4.17] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code |
patchbot |
|
12:11 |
[xen staging-4.17] xen/livepatch: Fix .altinstructions safety checks |
patchbot |
|
12:11 |
[xen staging-4.17] arm/alternatives: Rename alt_instr fields which are used in common code |
patchbot |
|
12:11 |
[xen staging-4.18] hypercall_xlat_continuation: Replace BUG_ON with domain_crash |
patchbot |
|
12:11 |
[xen staging-4.18] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code |
patchbot |
|
12:11 |
[xen staging] hypercall_xlat_continuation: Replace BUG_ON with domain_crash |
patchbot |
|
12:11 |
[xen staging] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code |
patchbot |
|
00:22 |
[xen staging] drivers: char: Enable OMAP UART driver for TI K3 devices |
patchbot |
|
April 08, 24 |
22:34 |
[xen master] xen/compiler: address violation of MISRA C Rule 20.9 |
patchbot |
|
22:34 |
[xen master] x86/PVH: Support relocatable dom0 kernels |
patchbot |
|
22:34 |
[xen master] libelf: Store maximum PHDR p_align |
patchbot |
|
22:34 |
[xen master] xen/rwlock: raise the number of possible cpus |
patchbot |
|
22:33 |
[xen master] xen/spinlock: support higher number of cpus |
patchbot |
|
22:33 |
[xen master] xen/spinlock: let all is_locked and trylock variants return bool |
patchbot |
|
22:33 |
[xen master] xen/spinlock: split recursive spinlocks from normal ones |
patchbot |
|
22:33 |
[xen master] xen/spinlock: add missing rspin_is_locked() and rspin_barrier() |
patchbot |
|
22:33 |
[xen master] xen/spinlock: add another function level |
patchbot |
|
22:33 |
[xen master] xen/spinlock: add explicit non-recursive locking functions |
patchbot |
|
07:34 |
[xen staging] xen/compiler: address violation of MISRA C Rule 20.9 |
patchbot |
|
07:34 |
[xen staging] x86/PVH: Support relocatable dom0 kernels |
patchbot |
|
07:34 |
[xen staging] libelf: Store maximum PHDR p_align |
patchbot |
|
07:34 |
[xen staging] xen/rwlock: raise the number of possible cpus |
patchbot |
|
07:33 |
[xen staging] xen/spinlock: support higher number of cpus |
patchbot |
|
07:33 |
[xen staging] xen/spinlock: let all is_locked and trylock variants return bool |
patchbot |
|
07:33 |
[xen staging] xen/spinlock: split recursive spinlocks from normal ones |
patchbot |
|
07:33 |
[xen staging] xen/spinlock: add missing rspin_is_locked() and rspin_barrier() |
patchbot |
|
07:33 |
[xen staging] xen/spinlock: add another function level |
patchbot |
|
07:33 |
[xen staging] xen/spinlock: add explicit non-recursive locking functions |
patchbot |
|
April 06, 24 |
10:11 |
[xen master] MISRA C Rule 17.1 states: "The features of `<stdarg.h>' shall not be used" |
patchbot |
|
10:11 |
[xen master] MISRA C:2012 Rule 17.1 states: The features of `<stdarg.h>' shall not be used |
patchbot |
|
10:11 |
[xen master] automation/eclair: add deviations for Rule 20.7 |
patchbot |
|
10:11 |
[xen master] arm/public: address violations of MISRA C Rule 20.7 |
patchbot |
|
10:11 |
[xen master] x86: Address MISRA Rule 13.6 |
patchbot |
|
10:11 |
[xen master] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch |
patchbot |
|
April 05, 24 |
23:22 |
[xen master] char: lpuart: Drop useless variables from UART structure |
patchbot |
|
23:22 |
[xen master] drivers: char: Drop useless suspend/resume stubs in Arm drivers |
patchbot |
|
18:22 |
[xen staging] MISRA C Rule 17.1 states: "The features of `<stdarg.h>' shall not be used" |
patchbot |
|
18:22 |
[xen staging] MISRA C:2012 Rule 17.1 states: The features of `<stdarg.h>' shall not be used |
patchbot |
|
18:22 |
[xen staging] automation/eclair: add deviations for Rule 20.7 |
patchbot |
|
18:22 |
[xen staging] arm/public: address violations of MISRA C Rule 20.7 |
patchbot |
|
14:11 |
[xen staging] x86: Address MISRA Rule 13.6 |
patchbot |
|
14:11 |
[xen staging] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch |
patchbot |
|
07:44 |
[xen master] vsprintf: address violations of MISRA C:2012 Rule 16.3 |
patchbot |
|
07:44 |
[xen master] xen/sched: address violations of MISRA C:2012 Rule 16.3 |
patchbot |
|
07:44 |
[xen master] tools: Move MB/GB() to common-macros.h |
patchbot |
|
07:44 |
[xen master] tools/init-xenstore-domain: Replace variable MB() usage |
patchbot |
|
07:44 |
[xen master] xen/riscv: introduce extension support check by compiler |
patchbot |
|
07:44 |
[xen master] automation: introduce fixed randconfig for RISC-V |
patchbot |
|
April 04, 24 |
23:44 |
[xen staging] char: lpuart: Drop useless variables from UART structure |
patchbot |
|
23:44 |
[xen staging] drivers: char: Drop useless suspend/resume stubs in Arm drivers |
patchbot |
|
21:01 |
[xen master] docs/misra: add 13.6 to rules.rst |
patchbot |
|
21:00 |
[xen master] xen/arm: ffa: support FFA_FEATURES |
patchbot |
|
21:00 |
[xen master] xen/arm: ffa: separate rxtx buffer routines |
patchbot |
|
21:00 |
[xen master] xen/arm: ffa: separate partition info get routines |
patchbot |
|
21:00 |
[xen master] xen/arm: ffa: separate memory sharing routines |
patchbot |
|
21:00 |
[xen master] xen/arm: ffa: move common things to ffa_private.h |
patchbot |
|
21:00 |
[xen master] xen/arm: ffa: rename functions to use ffa_ prefix |
patchbot |
|
10:11 |
[xen staging] vsprintf: address violations of MISRA C:2012 Rule 16.3 |
patchbot |
|
10:11 |
[xen staging] xen/sched: address violations of MISRA C:2012 Rule 16.3 |
patchbot |
|
10:11 |
[xen staging] tools: Move MB/GB() to common-macros.h |
patchbot |
|
10:11 |
[xen staging] tools/init-xenstore-domain: Replace variable MB() usage |
patchbot |
|
10:11 |
[xen staging] xen/riscv: introduce extension support check by compiler |
patchbot |
|
10:11 |
[xen staging] automation: introduce fixed randconfig for RISC-V |
patchbot |
|
05:45 |
[xen master] xen/vm-event: address a violation of MISRA C:2012 Rule 16.3 |
patchbot |
|
05:45 |
[xen master] xen/evtchn: address a violation of MISRA C:2012 Rule 16.3 |
patchbot |
|
05:45 |
[xen master] console: address a violation of MISRA C:2012 Rule 16.3 |
patchbot |
|
05:44 |
[xen master] xen/domctl: address a violation of MISRA C:2012 Rule 16.3 |
patchbot |
|
05:44 |
[xen master] x86/amd: address violations of MISRA C Rule 20.7 |
patchbot |
|
05:44 |
[xen master] xen/mm: address violations of MISRA C Rule 20.7 |
patchbot |
|
05:44 |
[xen master] x86/hvm: address violations of MISRA C Rule 20.7 |
patchbot |
|
05:44 |
[xen master] x86/vPMU: address violations of MISRA C Rule 20.7 |
patchbot |
|
05:44 |
[xen master] drivers/char: mark extra reserved device memory in memory map |
patchbot |
|
April 03, 24 |
23:34 |
[xen staging] docs/misra: add 13.6 to rules.rst |
patchbot |
|
23:33 |
[xen staging] xen/arm: ffa: support FFA_FEATURES |
patchbot |
|
23:33 |
[xen staging] xen/arm: ffa: separate rxtx buffer routines |
patchbot |
|
23:33 |
[xen staging] xen/arm: ffa: separate partition info get routines |
patchbot |
|
23:33 |
[xen staging] xen/arm: ffa: separate memory sharing routines |
patchbot |
|
23:33 |
[xen staging] xen/arm: ffa: move common things to ffa_private.h |
patchbot |
|
23:33 |
[xen staging] xen/arm: ffa: rename functions to use ffa_ prefix |
patchbot |
|
07:45 |
[xen staging] xen/vm-event: address a violation of MISRA C:2012 Rule 16.3 |
patchbot |
|
07:45 |
[xen staging] xen/evtchn: address a violation of MISRA C:2012 Rule 16.3 |
patchbot |
|
07:45 |
[xen staging] console: address a violation of MISRA C:2012 Rule 16.3 |
patchbot |
|
07:44 |
[xen staging] xen/domctl: address a violation of MISRA C:2012 Rule 16.3 |
patchbot |
|
07:44 |
[xen staging] x86/amd: address violations of MISRA C Rule 20.7 |
patchbot |
|
07:44 |
[xen staging] xen/mm: address violations of MISRA C Rule 20.7 |
patchbot |
|
07:44 |
[xen staging] x86/hvm: address violations of MISRA C Rule 20.7 |
patchbot |
|
07:44 |
[xen staging] x86/vPMU: address violations of MISRA C Rule 20.7 |
patchbot |
|
07:44 |
[xen staging] drivers/char: mark extra reserved device memory in memory map |
patchbot |
|
03:45 |
[xen stable-4.17] tests/resource: Fix HVM guest in !SHADOW builds |
patchbot |
|
03:45 |
[xen stable-4.17] x86/boot: Support the watchdog on newer AMD systems |
patchbot |
|
03:44 |
[xen stable-4.17] x86/livepatch: Relax permissions on rodata too |
patchbot |
|
03:44 |
[xen stable-4.17] xen/virtual-region: Include rodata pointers |
patchbot |
|
03:44 |
[xen stable-4.17] xen/virtual-region: Rename the start/end fields |
patchbot |
|
03:44 |
[xen stable-4.17] x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies |
patchbot |
|
03:44 |
[xen stable-4.17] x86/cpu-policy: Hide x2APIC from PV guests |
patchbot |
|
01:45 |
[xen stable-4.18] tests/resource: Fix HVM guest in !SHADOW builds |
patchbot |
|
01:45 |
[xen stable-4.18] x86/boot: Support the watchdog on newer AMD systems |
patchbot |
|
01:44 |
[xen stable-4.18] x86/livepatch: Relax permissions on rodata too |
patchbot |
|
01:44 |
[xen stable-4.18] xen/virtual-region: Include rodata pointers |
patchbot |
|
01:44 |
[xen stable-4.18] xen/virtual-region: Rename the start/end fields |
patchbot |
|
01:44 |
[xen stable-4.18] x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies |
patchbot |
|
01:44 |
[xen stable-4.18] x86/cpu-policy: Hide x2APIC from PV guests |
patchbot |
|
April 02, 24 |
14:34 |
[xen staging-4.17] tests/resource: Fix HVM guest in !SHADOW builds |
patchbot |
|
14:34 |
[xen staging-4.17] x86/boot: Support the watchdog on newer AMD systems |
patchbot |
|
14:33 |
[xen staging-4.17] x86/livepatch: Relax permissions on rodata too |
patchbot |
|
14:33 |
[xen staging-4.17] xen/virtual-region: Include rodata pointers |
patchbot |
|
14:33 |
[xen staging-4.17] xen/virtual-region: Rename the start/end fields |
patchbot |
|
14:33 |
[xen staging-4.17] x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies |
patchbot |
|
14:33 |
[xen staging-4.17] x86/cpu-policy: Hide x2APIC from PV guests |
patchbot |
|
14:33 |
[xen staging-4.18] tests/resource: Fix HVM guest in !SHADOW builds |
patchbot |
|
14:23 |
[xen staging-4.18] x86/boot: Support the watchdog on newer AMD systems |
patchbot |
|
14:22 |
[xen staging-4.18] x86/livepatch: Relax permissions on rodata too |
patchbot |
|
14:22 |
[xen staging-4.18] xen/virtual-region: Include rodata pointers |
patchbot |
|
14:22 |
[xen staging-4.18] xen/virtual-region: Rename the start/end fields |
patchbot |
|
14:22 |
[xen staging-4.18] x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies |
patchbot |
|
14:22 |
[xen staging-4.18] x86/cpu-policy: Hide x2APIC from PV guests |
patchbot |
|