xen-changelog - Mail Index


April 30, 24
13:44 [xen staging] x86/cpu-policy: Annotate the accumulated features patchbot
12:55 [xen stable-4.16] x86/spec: adjust logic that elides lfence patchbot
12:55 [xen stable-4.16] x86/spec: fix reporting of BHB clearing usage from guest entry points patchbot
06:44 [xen staging] revert "x86/mm: re-implement get_page_light() using an atomic increment" patchbot
06:44 [xen staging] xen/riscv: improve check-extension() macro patchbot
06:44 [xen staging] xen/x86: Fix Syntax warning in gen-cpuid.py patchbot
06:44 [xen staging] xen/xsm: Wire up get_dom0_console patchbot
06:44 [xen staging] x86/MCE: guard call to Intel-specific intel_get_extended_msrs() patchbot
06:44 [xen staging] x86/msi: passthrough all MSI-X vector ctrl writes to device model patchbot
05:33 [xen stable-4.17] x86/spec: adjust logic that elides lfence patchbot
05:33 [xen stable-4.17] x86/spec: fix reporting of BHB clearing usage from guest entry points patchbot
05:33 [xen stable-4.17] x86/MTRR: correct inadvertently inverted WC check patchbot
00:22 [xen stable-4.18] x86/spec: adjust logic that elides lfence patchbot
00:22 [xen stable-4.18] x86/spec: fix reporting of BHB clearing usage from guest entry points patchbot
00:22 [xen stable-4.18] x86/MTRR: correct inadvertently inverted WC check patchbot
00:22 [xen stable-4.18] x86/rtc: Avoid UIP flag being set for longer than expected patchbot
00:22 [xen stable-4.18] altcall: fix __alt_call_maybe_initdata so it's safe for livepatch patchbot
April 29, 24
08:33 [xen staging-4.15] x86/spec: adjust logic that elides lfence patchbot
08:33 [xen staging-4.15] x86/spec: fix reporting of BHB clearing usage from guest entry points patchbot
08:33 [xen staging-4.16] x86/spec: adjust logic that elides lfence patchbot
08:33 [xen staging-4.16] x86/spec: fix reporting of BHB clearing usage from guest entry points patchbot
07:45 [xen staging-4.17] x86/spec: adjust logic that elides lfence patchbot
07:45 [xen staging-4.17] x86/spec: fix reporting of BHB clearing usage from guest entry points patchbot
07:44 [xen staging-4.17] x86/MTRR: correct inadvertently inverted WC check patchbot
07:44 [xen staging-4.18] x86/spec: adjust logic that elides lfence patchbot
07:44 [xen staging-4.18] x86/spec: fix reporting of BHB clearing usage from guest entry points patchbot
07:44 [xen staging-4.18] x86/MTRR: correct inadvertently inverted WC check patchbot
07:44 [xen staging-4.18] x86/rtc: Avoid UIP flag being set for longer than expected patchbot
07:44 [xen staging-4.18] altcall: fix __alt_call_maybe_initdata so it's safe for livepatch patchbot
April 27, 24
06:48 [xen master] xen-livepatch: fix --force option comparison patchbot
06:48 [xen master] xen/spinlock: use correct pointer patchbot
06:48 [xen master] x86/entry: shrink insn size for some of our EFLAGS manipulation patchbot
06:48 [xen master] gzip: clean up comments and fix code alignment patchbot
06:48 [xen master] arm/vpci: make prefetchable mem 64 bit patchbot
06:47 [xen master] CI: Drop glibc-i386 from the build containers patchbot
06:47 [xen master] automation/eclair: reorganize pipelines patchbot
06:47 [xen master] VMX: no open-coding in vmx_get_cpl() patchbot
06:47 [xen master] MAINTAINERS: Update my email address patchbot
06:47 [xen master] x86/spec: adjust logic that elides lfence patchbot
06:47 [xen master] x86/spec: fix reporting of BHB clearing usage from guest entry points patchbot
06:46 [xen master] tools/ocaml: Fix warnings in config.ml patchbot
06:46 [xen master] x86/hap: Refactor boolean field assignments patchbot
06:46 [xen master] x86/shadow: correct shadow_vcpu_init()'s comment patchbot
06:46 [xen master] x86/paging: vCPU host mode is always set patchbot
06:46 [xen master] x86/msr: add suffix 'U' to MSR_AMD_CSTATE_CFG macro patchbot
06:46 [xen master] x86/pci: add suffix 'U' to PCI_CONF_ADDRESS macro patchbot
06:45 [xen master] livepatch: introduce --force option patchbot
06:45 [xen master] xen-livepatch: fix parameter name parsing patchbot
06:45 [xen master] x86/mm: address violations of MISRA C Rule 20.7 patchbot
06:45 [xen master] x86/debugreg: address violation of MISRA C Rule 20.7 patchbot
06:45 [xen master] x86/vhpet: address violations of MISRA C Rule 20.7 patchbot
06:45 [xen master] x86/acpi: address violations of MISRA Rule 20.7 patchbot
06:44 [xen master] x86/pci: address violation of MISRA C Rule 20.7 patchbot
06:44 [xen master] xen/spinlock: address violations of MISRA C Rule 20.7 patchbot
06:44 [xen master] xen/page-defs: address violation of MISRA C Rule 20.7 patchbot
06:44 [xen master] libelf: address violations of MISRA C Rule 20.7 patchbot
06:44 [xen master] libxl: Support blktap with HVM device model patchbot
06:44 [xen master] hotplug: Update block-tap patchbot
April 26, 24
10:44 [xen staging] xen-livepatch: fix --force option comparison patchbot
10:44 [xen staging] xen/spinlock: use correct pointer patchbot
10:44 [xen staging] x86/entry: shrink insn size for some of our EFLAGS manipulation patchbot
10:44 [xen staging] gzip: clean up comments and fix code alignment patchbot
April 25, 24
20:22 [xen staging] arm/vpci: make prefetchable mem 64 bit patchbot
20:22 [xen staging] CI: Drop glibc-i386 from the build containers patchbot
20:22 [xen staging] automation/eclair: reorganize pipelines patchbot
19:58 [xen master] automation: Add arm64 test for running Xen with GICv3 patchbot
19:57 [xen master] automation: Add arm{64,32} earlyprintk jobs patchbot
19:57 [xen master] automation: Drop some of the non-debug variants of the same Arm jobs patchbot
19:57 [xen master] xen/arm: List static shared memory regions as /memory nodes patchbot
19:57 [xen master] xen/arm: fix duplicate /reserved-memory node in Dom0 patchbot
19:57 [xen master] xen/arm: remove shm holes from extended regions patchbot
19:57 [xen master] xen/arm: Reduce struct membank size on static shared memory patchbot
19:56 [xen master] xen/arm: Introduce helper for static memory pages patchbot
19:56 [xen master] xen/arm: Avoid code duplication in check_reserved_regions_overlap patchbot
19:56 [xen master] xen/arm: Avoid code duplication in find_unallocated_memory patchbot
19:56 [xen master] xen/arm: Conditional compilation of kernel_info.shm_mem member patchbot
19:56 [xen master] xen/arm: Introduce a generic way to access memory bank structures patchbot
19:56 [xen master] xen/arm: Pass struct kernel_info parameter to make_{resv,shm}_memory_node patchbot
19:55 [xen master] xen/arm: avoid repetitive checking in process_shm_node patchbot
19:55 [xen master] xen/arm: remove stale addr_cells/size_cells in assign_shared_memory patchbot
19:55 [xen master] tools/golang: Run `go vet` as part of the build process patchbot
19:55 [xen master] golang/xenlight: Ensure comments aren't interpreted as docstrings patchbot
19:55 [xen master] tools/golang: When returning pointers, actually allocate structrues patchbot
19:55 [xen master] svm/nestedsvm: Introduce nested capabilities bit patchbot
14:44 [xen staging] VMX: no open-coding in vmx_get_cpl() patchbot
14:44 [xen staging] MAINTAINERS: Update my email address patchbot
14:44 [xen staging] x86/spec: adjust logic that elides lfence patchbot
14:44 [xen staging] x86/spec: fix reporting of BHB clearing usage from guest entry points patchbot
12:44 [xen staging] tools/ocaml: Fix warnings in config.ml patchbot
08:02 [xen staging] x86/hap: Refactor boolean field assignments patchbot
08:02 [xen staging] x86/shadow: correct shadow_vcpu_init()'s comment patchbot
08:02 [xen staging] x86/paging: vCPU host mode is always set patchbot
08:02 [xen staging] x86/msr: add suffix 'U' to MSR_AMD_CSTATE_CFG macro patchbot
08:02 [xen staging] x86/pci: add suffix 'U' to PCI_CONF_ADDRESS macro patchbot
08:01 [xen staging] livepatch: introduce --force option patchbot
08:01 [xen staging] xen-livepatch: fix parameter name parsing patchbot
08:01 [xen staging] x86/mm: address violations of MISRA C Rule 20.7 patchbot
08:01 [xen staging] x86/debugreg: address violation of MISRA C Rule 20.7 patchbot
08:01 [xen staging] x86/vhpet: address violations of MISRA C Rule 20.7 patchbot
08:01 [xen staging] x86/acpi: address violations of MISRA Rule 20.7 patchbot
08:00 [xen staging] x86/pci: address violation of MISRA C Rule 20.7 patchbot
08:00 [xen staging] xen/spinlock: address violations of MISRA C Rule 20.7 patchbot
08:00 [xen staging] xen/page-defs: address violation of MISRA C Rule 20.7 patchbot
08:00 [xen staging] libelf: address violations of MISRA C Rule 20.7 patchbot
08:00 [xen staging] libxl: Support blktap with HVM device model patchbot
08:00 [xen staging] hotplug: Update block-tap patchbot
05:55 [xen master] x86/monitor: allow fast-singlestepping without enabling singlestep monitor patchbot
00:11 [xen staging] automation: Add arm64 test for running Xen with GICv3 patchbot
00:11 [xen staging] automation: Add arm{64,32} earlyprintk jobs patchbot
00:11 [xen staging] automation: Drop some of the non-debug variants of the same Arm jobs patchbot
April 24, 24
18:23 [xen staging] xen/arm: List static shared memory regions as /memory nodes patchbot
18:23 [xen staging] xen/arm: fix duplicate /reserved-memory node in Dom0 patchbot
18:23 [xen staging] xen/arm: remove shm holes from extended regions patchbot
18:23 [xen staging] xen/arm: Reduce struct membank size on static shared memory patchbot
18:23 [xen staging] xen/arm: Introduce helper for static memory pages patchbot
18:23 [xen staging] xen/arm: Avoid code duplication in check_reserved_regions_overlap patchbot
18:22 [xen staging] xen/arm: Avoid code duplication in find_unallocated_memory patchbot
18:22 [xen staging] xen/arm: Conditional compilation of kernel_info.shm_mem member patchbot
18:22 [xen staging] xen/arm: Introduce a generic way to access memory bank structures patchbot
18:22 [xen staging] xen/arm: Pass struct kernel_info parameter to make_{resv,shm}_memory_node patchbot
18:22 [xen staging] xen/arm: avoid repetitive checking in process_shm_node patchbot
18:22 [xen staging] xen/arm: remove stale addr_cells/size_cells in assign_shared_memory patchbot
15:55 [xen staging] tools/golang: Run `go vet` as part of the build process patchbot
15:55 [xen staging] golang/xenlight: Ensure comments aren't interpreted as docstrings patchbot
15:55 [xen staging] tools/golang: When returning pointers, actually allocate structrues patchbot
15:55 [xen staging] svm/nestedsvm: Introduce nested capabilities bit patchbot
13:01 [xen master] x86/MTRR: correct inadvertently inverted WC check patchbot
13:00 [xen master] xen: introduce header file with section related symbols patchbot
13:00 [xen master] docs/man: Add xenwatchdog manual page patchbot
13:00 [xen master] tools/misc: Add xenwatchdogd.c copyright notice patchbot
13:00 [xen master] tools/misc: xenwatchdogd enhancements patchbot
13:00 [xen master] tools/misc: xenwatchdogd: add parse_secs() patchbot
13:00 [xen master] x86/rtc: Avoid UIP flag being set for longer than expected patchbot
April 23, 24
21:55 [xen staging] x86/monitor: allow fast-singlestepping without enabling singlestep monitor patchbot
12:23 [xen staging] x86/MTRR: correct inadvertently inverted WC check patchbot
12:22 [xen staging] xen: introduce header file with section related symbols patchbot
12:22 [xen staging] docs/man: Add xenwatchdog manual page patchbot
12:22 [xen staging] tools/misc: Add xenwatchdogd.c copyright notice patchbot
12:22 [xen staging] tools/misc: xenwatchdogd enhancements patchbot
12:22 [xen staging] tools/misc: xenwatchdogd: add parse_secs() patchbot
12:22 [xen staging] x86/rtc: Avoid UIP flag being set for longer than expected patchbot
05:00 [xen master] x86/pvh: zero VGA information patchbot
05:00 [xen master] x86/video: add boot_video_info offset generation to asm-offsets patchbot
05:00 [xen master] automation/eclair_analysis: substitute deprecated service STD.emptrecd patchbot
05:00 [xen master] xen/riscv: check whether the assembler has Zbb extension support patchbot
05:00 [xen master] xen/domain: deviate MISRA C Rule 16.2 violation patchbot
05:00 [xen master] x86/PVH: Use unsigned int for dom0 e820 index patchbot
April 22, 24
13:22 [xen staging] x86/pvh: zero VGA information patchbot
13:22 [xen staging] x86/video: add boot_video_info offset generation to asm-offsets patchbot
13:22 [xen staging] automation/eclair_analysis: substitute deprecated service STD.emptrecd patchbot
13:22 [xen staging] xen/riscv: check whether the assembler has Zbb extension support patchbot
13:22 [xen staging] xen/domain: deviate MISRA C Rule 16.2 violation patchbot
13:22 [xen staging] x86/PVH: Use unsigned int for dom0 e820 index patchbot
April 20, 24
07:22 [xen master] x86/svm: Add flushbyasid in the supported features patchbot
00:33 [xen master] eclair_analysis: deviate x86 emulator for Rule 16.2 patchbot
00:33 [xen master] xen/riscv: add minimal stuff to page.h to build full Xen patchbot
00:33 [xen master] xen/riscv: introduce io.h patchbot
00:33 [xen master] xen/ppc: mm-radix: Replace debug printing code with printk patchbot
00:33 [xen master] x86/MCE: move intel mcheck init code to separate file patchbot
April 19, 24
13:00 [xen staging] x86/svm: Add flushbyasid in the supported features patchbot
06:57 [xen staging] eclair_analysis: deviate x86 emulator for Rule 16.2 patchbot
06:57 [xen staging] xen/riscv: add minimal stuff to page.h to build full Xen patchbot
06:56 [xen staging] xen/riscv: introduce io.h patchbot
06:56 [xen staging] xen/ppc: mm-radix: Replace debug printing code with printk patchbot
06:56 [xen staging] x86/MCE: move intel mcheck init code to separate file patchbot
06:56 [xen master] xen/gzip: Drop huffman code table tracking patchbot
06:56 [xen master] xen/gzip: Remove custom memory allocator patchbot
06:56 [xen master] xen/gzip: Drop unused define checks patchbot
06:55 [xen master] x86/emul: Simplify segment override prefix decoding patchbot
06:55 [xen master] xen/efi: Rewrite DOS/PE magic checking without memcmp() patchbot
06:55 [xen master] docs/misra: mark the gzip folder as adopted code patchbot
06:55 [xen master] Revert "public: s/int/int32_t" patchbot
06:55 [xen master] docs: arm: Update where Xen should be loaded in memory patchbot
06:55 [xen master] public: s/int/int32_t patchbot
April 18, 24
20:00 [xen staging] xen/gzip: Drop huffman code table tracking patchbot
20:00 [xen staging] xen/gzip: Remove custom memory allocator patchbot
20:00 [xen staging] xen/gzip: Drop unused define checks patchbot
20:00 [xen staging] x86/emul: Simplify segment override prefix decoding patchbot
20:00 [xen staging] xen/efi: Rewrite DOS/PE magic checking without memcmp() patchbot
20:00 [xen staging] docs/misra: mark the gzip folder as adopted code patchbot
12:17 [xen stable-4.18] x86/entry: Fix build with older toolchains patchbot
12:17 [xen stable-4.18] Update CHANGELOG.md with 4.18.2 line patchbot
12:17 [xen stable-4.18] Update Xen version to 4.18.2 patchbot
12:16 [xen stable-4.18] x86/spec-ctrl: Support the "long" BHB loop sequence patchbot
12:16 [xen stable-4.18] x86/spec-ctrl: Wire up the Native-BHI software sequences patchbot
12:16 [xen stable-4.18] x86/spec-ctrl: Software BHB-clearing sequences patchbot
12:16 [xen stable-4.18] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI patchbot
12:16 [xen stable-4.18] x86/tsx: Expose RTM_ALWAYS_ABORT to guests patchbot
12:16 [xen stable-4.18] x86: Drop INDIRECT_JMP patchbot
12:15 [xen stable-4.18] x86: Use indirect calls in reset-stack infrastructure patchbot
12:15 [xen stable-4.18] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields patchbot
12:15 [xen stable-4.18] x86/vmx: Add support for virtualize SPEC_CTRL patchbot
12:15 [xen stable-4.18] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* patchbot
12:15 [xen stable-4.18] x86/spec-ctrl: Simplify DO_COND_IBPB patchbot
12:15 [xen stable-4.18] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} patchbot
12:14 [xen stable-4.18] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV patchbot
12:14 [xen stable-4.18] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* patchbot
12:14 [xen stable-4.18] x86/spec-ctrl: Rename spec_ctrl_flags to scf patchbot
12:14 [xen stable-4.18] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests patchbot
12:14 [xen stable-4.18] x86/alternatives: fix .init section reference in _apply_alternatives() patchbot
12:14 [xen stable-4.18] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch patchbot
12:13 [xen stable-4.18] x86/spec-ctrl: Move __read_mostly data into __ro_after_init patchbot
12:13 [xen stable-4.18] VMX: tertiary execution control infrastructure patchbot
12:13 [xen stable-4.18] x86/CPU: convert vendor hook invocations to altcall patchbot
12:13 [xen stable-4.18] x86/guest: finish conversion to altcall patchbot
12:13 [xen stable-4.18] x86: arrange for ENDBR zapping from <vendor>_ctxt_switch_masking() patchbot
12:13 [xen stable-4.18] x86/spec-ctrl: Expose BHI_CTRL to guests patchbot
12:12 [xen stable-4.18] x86/spec-ctrl: Expose RRSBA_CTRL to guests patchbot
12:12 [xen stable-4.18] x86/spec-ctrl: Expose IPRED_CTRL to guests patchbot
12:12 [xen stable-4.18] IRQ: generalize [gs]et_irq_regs() patchbot
12:12 [xen stable-4.18] x86/MCE: switch some callback invocations to altcall patchbot
12:12 [xen stable-4.18] x86/MCE: separate BSP-only initialization patchbot
12:12 [xen stable-4.18] x86/PV: avoid indirect call for I/O emulation quirk hook patchbot
12:11 [xen stable-4.18] x86/MTRR: avoid several indirect calls patchbot
12:11 [xen stable-4.18] core-parking: use alternative_call() patchbot
12:11 [xen stable-4.18] x86/HPET: avoid an indirect call patchbot
12:11 [xen stable-4.18] cpufreq: finish conversion to altcall patchbot
12:11 [xen stable-4.18] x86/APIC: finish genapic conversion to altcall patchbot
12:11 [xen stable-4.18] x86/spec-ctrl: Fix BTC/SRSO mitigations patchbot
06:33 [xen master] docs/misra: add Rule 16.4 patchbot
06:33 [xen master] docs/misra/rules.rst: add rule 5.5 patchbot
02:39 [xen stable-4.17] x86/entry: Fix build with older toolchains patchbot
02:39 [xen stable-4.17] Release: Update CHANGELOG.md patchbot
02:39 [xen stable-4.17] Update Xen version to 4.17.4 patchbot
02:38 [xen stable-4.17] x86/spec-ctrl: Support the "long" BHB loop sequence patchbot
02:38 [xen stable-4.17] x86/spec-ctrl: Wire up the Native-BHI software sequences patchbot
02:38 [xen stable-4.17] x86/spec-ctrl: Software BHB-clearing sequences patchbot
02:38 [xen stable-4.17] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI patchbot
02:38 [xen stable-4.17] x86/tsx: Expose RTM_ALWAYS_ABORT to guests patchbot
02:38 [xen stable-4.17] x86: Drop INDIRECT_JMP patchbot
02:37 [xen stable-4.17] x86: Use indirect calls in reset-stack infrastructure patchbot
02:37 [xen stable-4.17] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields patchbot
02:37 [xen stable-4.17] x86/vmx: Add support for virtualize SPEC_CTRL patchbot
02:37 [xen stable-4.17] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* patchbot
02:37 [xen stable-4.17] x86/spec-ctrl: Simplify DO_COND_IBPB patchbot
02:37 [xen stable-4.17] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} patchbot
02:36 [xen stable-4.17] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV patchbot
02:36 [xen stable-4.17] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* patchbot
02:36 [xen stable-4.17] x86/spec-ctrl: Rename spec_ctrl_flags to scf patchbot
02:36 [xen stable-4.17] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests patchbot
02:36 [xen stable-4.17] x86/alternatives: fix .init section reference in _apply_alternatives() patchbot
02:36 [xen stable-4.17] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch patchbot
02:35 [xen stable-4.17] x86/spec-ctrl: Move __read_mostly data into __ro_after_init patchbot
02:35 [xen stable-4.17] VMX: tertiary execution control infrastructure patchbot
02:35 [xen stable-4.17] x86/CPU: convert vendor hook invocations to altcall patchbot
02:35 [xen stable-4.17] x86/guest: finish conversion to altcall patchbot
02:35 [xen stable-4.17] x86: arrange for ENDBR zapping from <vendor>_ctxt_switch_masking() patchbot
02:35 [xen stable-4.17] x86/spec-ctrl: Expose BHI_CTRL to guests patchbot
02:34 [xen stable-4.17] x86/spec-ctrl: Expose RRSBA_CTRL to guests patchbot
02:34 [xen stable-4.17] x86/spec-ctrl: Expose IPRED_CTRL to guests patchbot
02:34 [xen stable-4.17] IRQ: generalize [gs]et_irq_regs() patchbot
02:34 [xen stable-4.17] x86/MCE: switch some callback invocations to altcall patchbot
02:34 [xen stable-4.17] x86/MCE: separate BSP-only initialization patchbot
02:34 [xen stable-4.17] x86/PV: avoid indirect call for I/O emulation quirk hook patchbot
02:33 [xen stable-4.17] x86/MTRR: avoid several indirect calls patchbot
02:33 [xen stable-4.17] core-parking: use alternative_call() patchbot
02:33 [xen stable-4.17] x86/HPET: avoid an indirect call patchbot
02:33 [xen stable-4.17] cpufreq: finish conversion to altcall patchbot
02:33 [xen stable-4.17] x86/APIC: finish genapic conversion to altcall patchbot
02:33 [xen stable-4.17] x86/spec-ctrl: Fix BTC/SRSO mitigations patchbot
April 17, 24
22:59 [xen stable-4.16] x86/vmx: prevent fallthrough in vmx_set_reg() for handled registers patchbot
22:59 [xen stable-4.16] x86/entry: Fix build with older toolchains patchbot
22:59 [xen stable-4.16] Update Xen version to 4.16.6 patchbot
22:58 [xen stable-4.16] x86/spec-ctrl: Support the "long" BHB loop sequence patchbot
22:58 [xen stable-4.16] x86/spec-ctrl: Wire up the Native-BHI software sequences patchbot
22:58 [xen stable-4.16] x86/spec-ctrl: Software BHB-clearing sequences patchbot
22:58 [xen stable-4.16] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI patchbot
22:58 [xen stable-4.16] x86/tsx: Expose RTM_ALWAYS_ABORT to guests patchbot
22:58 [xen stable-4.16] x86: Drop INDIRECT_JMP patchbot
22:57 [xen stable-4.16] x86: Use indirect calls in reset-stack infrastructure patchbot
22:57 [xen stable-4.16] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields patchbot
22:57 [xen stable-4.16] x86/vmx: Add support for virtualize SPEC_CTRL patchbot
22:57 [xen stable-4.16] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* patchbot
22:57 [xen stable-4.16] x86/spec-ctrl: Simplify DO_COND_IBPB patchbot
22:57 [xen stable-4.16] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} patchbot
22:56 [xen stable-4.16] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV patchbot
22:56 [xen stable-4.16] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* patchbot
22:56 [xen stable-4.16] x86/spec-ctrl: Rename spec_ctrl_flags to scf patchbot
22:56 [xen stable-4.16] x86/spec-ctrl: Make svm_vmexit_spec_ctrl conditional patchbot
22:56 [xen stable-4.16] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests patchbot
22:56 [xen stable-4.16] xen/wait: Remove indirect jump patchbot
22:55 [xen stable-4.16] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch patchbot
22:55 [xen stable-4.16] VMX: tertiary execution control infrastructure patchbot
22:55 [xen stable-4.16] x86/spec-ctrl: Expose BHI_CTRL to guests patchbot
22:55 [xen stable-4.16] x86/spec-ctrl: Expose RRSBA_CTRL to guests patchbot
22:55 [xen stable-4.16] x86/spec-ctrl: Expose IPRED_CTRL to guests patchbot
22:55 [xen stable-4.16] x86/spec-ctrl: Fix BTC/SRSO mitigations patchbot
19:26 [xen stable-4.15] x86/vmx: prevent fallthrough in vmx_set_reg() for handled registers patchbot
19:26 [xen stable-4.15] x86/entry: Fix build with older toolchains patchbot
19:26 [xen stable-4.15] Update Xen version to 4.15.6 patchbot
19:25 [xen stable-4.15] x86/spec-ctrl: Support the "long" BHB loop sequence patchbot
19:25 [xen stable-4.15] x86/spec-ctrl: Wire up the Native-BHI software sequences patchbot
19:25 [xen stable-4.15] x86/spec-ctrl: Software BHB-clearing sequences patchbot
19:25 [xen stable-4.15] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI patchbot
19:25 [xen stable-4.15] x86/tsx: Expose RTM_ALWAYS_ABORT to guests patchbot
19:25 [xen stable-4.15] x86: Drop INDIRECT_JMP patchbot
19:24 [xen stable-4.15] x86: Use indirect calls in reset-stack infrastructure patchbot
19:24 [xen stable-4.15] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields patchbot
19:24 [xen stable-4.15] x86/vmx: Add support for virtualize SPEC_CTRL patchbot
19:24 [xen stable-4.15] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* patchbot
19:24 [xen stable-4.15] x86/spec-ctrl: Simplify DO_COND_IBPB patchbot
19:24 [xen stable-4.15] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} patchbot
19:23 [xen stable-4.15] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV patchbot
19:23 [xen stable-4.15] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* patchbot
19:23 [xen stable-4.15] x86/spec-ctrl: Rename spec_ctrl_flags to scf patchbot
19:23 [xen stable-4.15] x86/spec-ctrl: Make svm_vmexit_spec_ctrl conditional patchbot
19:23 [xen stable-4.15] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests patchbot
19:23 [xen stable-4.15] xen/wait: Remove indirect jump patchbot
19:22 [xen stable-4.15] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch patchbot
19:22 [xen stable-4.15] VMX: tertiary execution control infrastructure patchbot
19:22 [xen stable-4.15] x86/spec-ctrl: Expose BHI_CTRL to guests patchbot
19:22 [xen stable-4.15] x86/spec-ctrl: Expose RRSBA_CTRL to guests patchbot
19:22 [xen stable-4.15] x86/spec-ctrl: Expose IPRED_CTRL to guests patchbot
19:22 [xen stable-4.15] x86/spec-ctrl: Fix BTC/SRSO mitigations patchbot
12:55 [xen staging] Revert "public: s/int/int32_t" patchbot
09:55 [xen staging] docs: arm: Update where Xen should be loaded in memory patchbot
09:55 [xen staging] public: s/int/int32_t patchbot
03:19 [xen master] docs/hypercall-abi: State that the hypercall page is optional patchbot
03:19 [xen master] xen/gzip: Colocate gunzip code files patchbot
03:19 [xen master] altcall: fix __alt_call_maybe_initdata so it's safe for livepatch patchbot
03:19 [xen master] libxl: devd: Spawn QEMU for 9pfs patchbot
03:19 [xen master] libxl: Use vkb=[] for HVMs patchbot
03:19 [xen master] xen/include: move definition of ASM_INT() to xen/linkage.h patchbot
03:18 [xen master] MAINTAINERS: Update livepatch maintainers patchbot
03:18 [xen master] tools/misc: xenwatchdogd: add static qualifier patchbot
03:18 [xen master] tools/misc: rework xenwatchdogd signal handling patchbot
03:18 [xen master] tools/misc: xenwatchdogd: use EXIT_* constants patchbot
03:18 [xen master] xen/acpi: Allow xen/acpi.h to be included on non-ACPI archs patchbot
03:18 [xen master] xen/xsm: address violation of MISRA C Rule 16.2 patchbot
03:17 [xen master] x86/hvm: address violations of MISRA C Rule 16.2 patchbot
03:17 [xen master] xen/domctl: address violations of MISRA C Rule 16.2 patchbot
03:17 [xen master] x86/efi: tidy switch statement and address MISRA violation patchbot
03:17 [xen master] x86/irq: tidy switch statement and address MISRA violation patchbot
03:17 [xen master] x86/cpuid: address violation of MISRA C Rule 16.2 patchbot
03:17 [xen master] x86/vlapic: tidy switch statement and address MISRA violation patchbot
03:16 [xen master] x86/emul: Adjust X86EMUL_OPC_EXT_MASK to placate MISRA patchbot
03:16 [xen master] xen/spinlock: Adjust LOCK_DEBUG_INITVAL to placate MISRA patchbot
03:16 [xen master] xen/vPCI: Remove shadowed variable patchbot
03:16 [xen master] xen/nospec: Remove unreachable code patchbot
03:16 [xen master] x86/hvm: Fix Misra Rule 19.1 regression patchbot
03:16 [xen master] xen/virtual-region: Drop setup_virtual_regions() patchbot
03:15 [xen master] xen/virtual-region: Link the list build time patchbot
03:15 [xen master] xen/virtual-region: Rework how bugframe linkage works patchbot
03:15 [xen master] xen/link: Introduce a common BUGFRAMES definition patchbot
03:15 [xen master] x86/Kconfig: Introduce CONFIG_{AMD,INTEL} and conditionalise ucode patchbot
03:15 [xen master] x86/ucode: Move vendor specifics back out of early_microcode_init() patchbot
03:15 [xen master] docs/misra: document the expected sizes of integer types patchbot
03:14 [xen master] MAINTAINERS: Become a reviewer of iMX8Q{M,XP} related patches patchbot
03:14 [xen master] xen/drivers: imx-lpuart: Replace iMX8QM compatible with iMX8QXP patchbot
03:14 [xen master] xen/arm: Add imx8q{m,x} platform glue patchbot
03:14 [xen master] x86/entry: Fix build with older toolchains patchbot
03:14 [xen master] x86/spec-ctrl: Support the "long" BHB loop sequence patchbot
03:14 [xen master] x86/spec-ctrl: Wire up the Native-BHI software sequences patchbot
03:13 [xen master] x86/spec-ctrl: Software BHB-clearing sequences patchbot
03:13 [xen master] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI patchbot
03:13 [xen master] x86/tsx: Expose RTM_ALWAYS_ABORT to guests patchbot
03:13 [xen master] x86: Drop INDIRECT_JMP patchbot
03:13 [xen master] x86: Use indirect calls in reset-stack infrastructure patchbot
03:13 [xen master] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields patchbot
03:12 [xen master] x86/vmx: Add support for virtualize SPEC_CTRL patchbot
03:12 [xen master] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* patchbot
03:12 [xen master] x86/spec-ctrl: Simplify DO_COND_IBPB patchbot
03:12 [xen master] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} patchbot
03:12 [xen master] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV patchbot
03:12 [xen master] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* patchbot
03:11 [xen master] x86/spec-ctrl: Rename spec_ctrl_flags to scf patchbot
03:11 [xen master] x86/spec-ctrl: Fix BTC/SRSO mitigations patchbot
03:11 [xen master] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests patchbot
03:11 [xen master] x86/alternatives: fix .init section reference in _apply_alternatives() patchbot
03:11 [xen master] hypercall_xlat_continuation: Replace BUG_ON with domain_crash patchbot
03:11 [xen master] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code patchbot
April 16, 24
19:22 [xen staging] docs/misra: add Rule 16.4 patchbot
19:22 [xen staging] docs/misra/rules.rst: add rule 5.5 patchbot
April 15, 24
10:33 [xen staging-4.15] x86/vmx: prevent fallthrough in vmx_set_reg() for handled registers patchbot
10:33 [xen staging-4.15] x86/entry: Fix build with older toolchains patchbot
10:33 [xen staging-4.16] x86/vmx: prevent fallthrough in vmx_set_reg() for handled registers patchbot
April 12, 24
14:55 [xen staging] docs/hypercall-abi: State that the hypercall page is optional patchbot
14:55 [xen staging] xen/gzip: Colocate gunzip code files patchbot
April 11, 24
18:00 [xen staging] altcall: fix __alt_call_maybe_initdata so it's safe for livepatch patchbot
18:00 [xen staging] libxl: devd: Spawn QEMU for 9pfs patchbot
18:00 [xen staging] libxl: Use vkb=[] for HVMs patchbot
18:00 [xen staging] xen/include: move definition of ASM_INT() to xen/linkage.h patchbot
15:44 [xen staging-4.16] x86/entry: Fix build with older toolchains patchbot
15:44 [xen staging-4.17] x86/entry: Fix build with older toolchains patchbot
15:44 [xen staging-4.18] x86/entry: Fix build with older toolchains patchbot
13:25 [xen staging] MAINTAINERS: Update livepatch maintainers patchbot
13:25 [xen staging] tools/misc: xenwatchdogd: add static qualifier patchbot
13:25 [xen staging] tools/misc: rework xenwatchdogd signal handling patchbot
13:24 [xen staging] tools/misc: xenwatchdogd: use EXIT_* constants patchbot
13:24 [xen staging] xen/acpi: Allow xen/acpi.h to be included on non-ACPI archs patchbot
13:24 [xen staging] xen/xsm: address violation of MISRA C Rule 16.2 patchbot
13:24 [xen staging] x86/hvm: address violations of MISRA C Rule 16.2 patchbot
13:24 [xen staging] xen/domctl: address violations of MISRA C Rule 16.2 patchbot
13:24 [xen staging] x86/efi: tidy switch statement and address MISRA violation patchbot
13:23 [xen staging] x86/irq: tidy switch statement and address MISRA violation patchbot
13:23 [xen staging] x86/cpuid: address violation of MISRA C Rule 16.2 patchbot
13:23 [xen staging] x86/vlapic: tidy switch statement and address MISRA violation patchbot
13:23 [xen staging] x86/emul: Adjust X86EMUL_OPC_EXT_MASK to placate MISRA patchbot
13:23 [xen staging] xen/spinlock: Adjust LOCK_DEBUG_INITVAL to placate MISRA patchbot
13:23 [xen staging] xen/vPCI: Remove shadowed variable patchbot
13:22 [xen staging] xen/nospec: Remove unreachable code patchbot
13:22 [xen staging] x86/hvm: Fix Misra Rule 19.1 regression patchbot
13:22 [xen staging] xen/virtual-region: Drop setup_virtual_regions() patchbot
13:22 [xen staging] xen/virtual-region: Link the list build time patchbot
13:22 [xen staging] xen/virtual-region: Rework how bugframe linkage works patchbot
13:22 [xen staging] xen/link: Introduce a common BUGFRAMES definition patchbot
April 10, 24
18:33 [xen stable-4.18] hypercall_xlat_continuation: Replace BUG_ON with domain_crash patchbot
18:33 [xen stable-4.18] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code patchbot
18:00 [xen staging] x86/Kconfig: Introduce CONFIG_{AMD,INTEL} and conditionalise ucode patchbot
18:00 [xen staging] x86/ucode: Move vendor specifics back out of early_microcode_init() patchbot
16:33 [xen stable-4.17] hypercall_xlat_continuation: Replace BUG_ON with domain_crash patchbot
16:33 [xen stable-4.17] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code patchbot
16:33 [xen stable-4.17] xen/livepatch: Fix .altinstructions safety checks patchbot
16:33 [xen stable-4.17] arm/alternatives: Rename alt_instr fields which are used in common code patchbot
10:00 [xen stable-4.16] hypercall_xlat_continuation: Replace BUG_ON with domain_crash patchbot
10:00 [xen stable-4.16] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code patchbot
05:55 [xen stable-4.15] hypercall_xlat_continuation: Replace BUG_ON with domain_crash patchbot
05:55 [xen stable-4.15] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code patchbot
04:22 [xen master] drivers: char: Enable OMAP UART driver for TI K3 devices patchbot
April 09, 24
21:33 [xen staging] docs/misra: document the expected sizes of integer types patchbot
21:33 [xen staging] MAINTAINERS: Become a reviewer of iMX8Q{M,XP} related patches patchbot
21:33 [xen staging] xen/drivers: imx-lpuart: Replace iMX8QM compatible with iMX8QXP patchbot
21:33 [xen staging] xen/arm: Add imx8q{m,x} platform glue patchbot
21:33 [xen staging] x86/entry: Fix build with older toolchains patchbot
17:34 [xen staging-4.15] Update Xen version to 4.15.6 patchbot
17:34 [xen staging-4.15] x86/spec-ctrl: Support the "long" BHB loop sequence patchbot
17:34 [xen staging-4.15] x86/spec-ctrl: Wire up the Native-BHI software sequences patchbot
17:34 [xen staging-4.15] x86/spec-ctrl: Software BHB-clearing sequences patchbot
17:34 [xen staging-4.15] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI patchbot
17:34 [xen staging-4.15] x86/tsx: Expose RTM_ALWAYS_ABORT to guests patchbot
17:33 [xen staging-4.15] x86: Drop INDIRECT_JMP patchbot
17:33 [xen staging-4.15] x86: Use indirect calls in reset-stack infrastructure patchbot
17:33 [xen staging-4.15] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields patchbot
17:33 [xen staging-4.15] x86/vmx: Add support for virtualize SPEC_CTRL patchbot
17:33 [xen staging-4.15] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* patchbot
17:32 [xen staging-4.15] x86/spec-ctrl: Simplify DO_COND_IBPB patchbot
17:32 [xen staging-4.15] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} patchbot
17:32 [xen staging-4.15] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV patchbot
17:32 [xen staging-4.15] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* patchbot
17:32 [xen staging-4.15] x86/spec-ctrl: Rename spec_ctrl_flags to scf patchbot
17:32 [xen staging-4.15] x86/spec-ctrl: Make svm_vmexit_spec_ctrl conditional patchbot
17:31 [xen staging-4.15] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests patchbot
17:31 [xen staging-4.15] xen/wait: Remove indirect jump patchbot
17:31 [xen staging-4.15] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch patchbot
17:31 [xen staging-4.15] VMX: tertiary execution control infrastructure patchbot
17:31 [xen staging-4.15] x86/spec-ctrl: Expose BHI_CTRL to guests patchbot
17:31 [xen staging-4.15] x86/spec-ctrl: Expose RRSBA_CTRL to guests patchbot
17:30 [xen staging-4.15] x86/spec-ctrl: Expose IPRED_CTRL to guests patchbot
17:30 [xen staging-4.15] x86/spec-ctrl: Fix BTC/SRSO mitigations patchbot
17:30 [xen staging-4.16] Update Xen version to 4.16.6 patchbot
17:30 [xen staging-4.16] x86/spec-ctrl: Support the "long" BHB loop sequence patchbot
17:30 [xen staging-4.16] x86/spec-ctrl: Wire up the Native-BHI software sequences patchbot
17:30 [xen staging-4.16] x86/spec-ctrl: Software BHB-clearing sequences patchbot
17:29 [xen staging-4.16] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI patchbot
17:29 [xen staging-4.16] x86/tsx: Expose RTM_ALWAYS_ABORT to guests patchbot
17:29 [xen staging-4.16] x86: Drop INDIRECT_JMP patchbot
17:29 [xen staging-4.16] x86: Use indirect calls in reset-stack infrastructure patchbot
17:29 [xen staging-4.16] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields patchbot
17:29 [xen staging-4.16] x86/vmx: Add support for virtualize SPEC_CTRL patchbot
17:28 [xen staging-4.16] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* patchbot
17:28 [xen staging-4.16] x86/spec-ctrl: Simplify DO_COND_IBPB patchbot
17:28 [xen staging-4.16] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} patchbot
17:28 [xen staging-4.16] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV patchbot
17:28 [xen staging-4.16] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* patchbot
17:28 [xen staging-4.16] x86/spec-ctrl: Rename spec_ctrl_flags to scf patchbot
17:27 [xen staging-4.16] x86/spec-ctrl: Make svm_vmexit_spec_ctrl conditional patchbot
17:27 [xen staging-4.16] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests patchbot
17:27 [xen staging-4.16] xen/wait: Remove indirect jump patchbot
17:27 [xen staging-4.16] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch patchbot
17:27 [xen staging-4.16] VMX: tertiary execution control infrastructure patchbot
17:27 [xen staging-4.16] x86/spec-ctrl: Expose BHI_CTRL to guests patchbot
17:26 [xen staging-4.16] x86/spec-ctrl: Expose RRSBA_CTRL to guests patchbot
17:26 [xen staging-4.16] x86/spec-ctrl: Expose IPRED_CTRL to guests patchbot
17:26 [xen staging-4.16] x86/spec-ctrl: Fix BTC/SRSO mitigations patchbot
17:26 [xen staging-4.17] Release: Update CHANGELOG.md patchbot
17:26 [xen staging-4.17] Update Xen version to 4.17.4 patchbot
17:26 [xen staging-4.17] x86/spec-ctrl: Support the "long" BHB loop sequence patchbot
17:25 [xen staging-4.17] x86/spec-ctrl: Wire up the Native-BHI software sequences patchbot
17:25 [xen staging-4.17] x86/spec-ctrl: Software BHB-clearing sequences patchbot
17:25 [xen staging-4.17] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI patchbot
17:25 [xen staging-4.17] x86/tsx: Expose RTM_ALWAYS_ABORT to guests patchbot
17:25 [xen staging-4.17] x86: Drop INDIRECT_JMP patchbot
17:25 [xen staging-4.17] x86: Use indirect calls in reset-stack infrastructure patchbot
17:24 [xen staging-4.17] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields patchbot
17:24 [xen staging-4.17] x86/vmx: Add support for virtualize SPEC_CTRL patchbot
17:24 [xen staging-4.17] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* patchbot
17:24 [xen staging-4.17] x86/spec-ctrl: Simplify DO_COND_IBPB patchbot
17:24 [xen staging-4.17] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} patchbot
17:24 [xen staging-4.17] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV patchbot
17:23 [xen staging-4.17] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* patchbot
17:23 [xen staging-4.17] x86/spec-ctrl: Rename spec_ctrl_flags to scf patchbot
17:23 [xen staging-4.17] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests patchbot
17:23 [xen staging-4.17] x86/alternatives: fix .init section reference in _apply_alternatives() patchbot
17:23 [xen staging-4.17] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch patchbot
17:23 [xen staging-4.17] x86/spec-ctrl: Move __read_mostly data into __ro_after_init patchbot
17:22 [xen staging-4.17] VMX: tertiary execution control infrastructure patchbot
17:22 [xen staging-4.17] x86/CPU: convert vendor hook invocations to altcall patchbot
17:22 [xen staging-4.17] x86/guest: finish conversion to altcall patchbot
17:22 [xen staging-4.17] x86: arrange for ENDBR zapping from <vendor>_ctxt_switch_masking() patchbot
17:22 [xen staging-4.17] x86/spec-ctrl: Expose BHI_CTRL to guests patchbot
17:22 [xen staging-4.17] x86/spec-ctrl: Expose RRSBA_CTRL to guests patchbot
17:21 [xen staging-4.17] x86/spec-ctrl: Expose IPRED_CTRL to guests patchbot
17:21 [xen staging-4.17] IRQ: generalize [gs]et_irq_regs() patchbot
17:21 [xen staging-4.17] x86/MCE: switch some callback invocations to altcall patchbot
17:21 [xen staging-4.17] x86/MCE: separate BSP-only initialization patchbot
17:21 [xen staging-4.17] x86/PV: avoid indirect call for I/O emulation quirk hook patchbot
17:21 [xen staging-4.17] x86/MTRR: avoid several indirect calls patchbot
17:20 [xen staging-4.17] core-parking: use alternative_call() patchbot
17:20 [xen staging-4.17] x86/HPET: avoid an indirect call patchbot
17:20 [xen staging-4.17] cpufreq: finish conversion to altcall patchbot
17:20 [xen staging-4.17] x86/APIC: finish genapic conversion to altcall patchbot
17:20 [xen staging-4.17] x86/spec-ctrl: Fix BTC/SRSO mitigations patchbot
17:20 [xen staging-4.18] Update CHANGELOG.md with 4.18.2 line patchbot
17:19 [xen staging-4.18] Update Xen version to 4.18.2 patchbot
17:19 [xen staging-4.18] x86/spec-ctrl: Support the "long" BHB loop sequence patchbot
17:19 [xen staging-4.18] x86/spec-ctrl: Wire up the Native-BHI software sequences patchbot
17:19 [xen staging-4.18] x86/spec-ctrl: Software BHB-clearing sequences patchbot
17:19 [xen staging-4.18] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI patchbot
17:18 [xen staging-4.18] x86/tsx: Expose RTM_ALWAYS_ABORT to guests patchbot
17:18 [xen staging-4.18] x86: Drop INDIRECT_JMP patchbot
17:18 [xen staging-4.18] x86: Use indirect calls in reset-stack infrastructure patchbot
17:18 [xen staging-4.18] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields patchbot
17:18 [xen staging-4.18] x86/vmx: Add support for virtualize SPEC_CTRL patchbot
17:18 [xen staging-4.18] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* patchbot
17:17 [xen staging-4.18] x86/spec-ctrl: Simplify DO_COND_IBPB patchbot
17:17 [xen staging-4.18] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} patchbot
17:17 [xen staging-4.18] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV patchbot
17:17 [xen staging-4.18] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* patchbot
17:17 [xen staging-4.18] x86/spec-ctrl: Rename spec_ctrl_flags to scf patchbot
17:17 [xen staging-4.18] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests patchbot
17:16 [xen staging-4.18] x86/alternatives: fix .init section reference in _apply_alternatives() patchbot
17:16 [xen staging-4.18] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch patchbot
17:16 [xen staging-4.18] x86/spec-ctrl: Move __read_mostly data into __ro_after_init patchbot
17:16 [xen staging-4.18] VMX: tertiary execution control infrastructure patchbot
17:16 [xen staging-4.18] x86/CPU: convert vendor hook invocations to altcall patchbot
17:16 [xen staging-4.18] x86/guest: finish conversion to altcall patchbot
17:15 [xen staging-4.18] x86: arrange for ENDBR zapping from <vendor>_ctxt_switch_masking() patchbot
17:15 [xen staging-4.18] x86/spec-ctrl: Expose BHI_CTRL to guests patchbot
17:15 [xen staging-4.18] x86/spec-ctrl: Expose RRSBA_CTRL to guests patchbot
17:15 [xen staging-4.18] x86/spec-ctrl: Expose IPRED_CTRL to guests patchbot
17:15 [xen staging-4.18] IRQ: generalize [gs]et_irq_regs() patchbot
17:15 [xen staging-4.18] x86/MCE: switch some callback invocations to altcall patchbot
17:14 [xen staging-4.18] x86/MCE: separate BSP-only initialization patchbot
17:14 [xen staging-4.18] x86/PV: avoid indirect call for I/O emulation quirk hook patchbot
17:14 [xen staging-4.18] x86/MTRR: avoid several indirect calls patchbot
17:14 [xen staging-4.18] core-parking: use alternative_call() patchbot
17:14 [xen staging-4.18] x86/HPET: avoid an indirect call patchbot
17:14 [xen staging-4.18] cpufreq: finish conversion to altcall patchbot
17:13 [xen staging-4.18] x86/APIC: finish genapic conversion to altcall patchbot
17:13 [xen staging-4.18] x86/spec-ctrl: Fix BTC/SRSO mitigations patchbot
17:13 [xen staging] x86/spec-ctrl: Support the "long" BHB loop sequence patchbot
17:13 [xen staging] x86/spec-ctrl: Wire up the Native-BHI software sequences patchbot
17:13 [xen staging] x86/spec-ctrl: Software BHB-clearing sequences patchbot
17:13 [xen staging] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI patchbot
17:12 [xen staging] x86/tsx: Expose RTM_ALWAYS_ABORT to guests patchbot
17:12 [xen staging] x86: Drop INDIRECT_JMP patchbot
17:12 [xen staging] x86: Use indirect calls in reset-stack infrastructure patchbot
17:12 [xen staging] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields patchbot
17:12 [xen staging] x86/vmx: Add support for virtualize SPEC_CTRL patchbot
17:12 [xen staging] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_* patchbot
17:11 [xen staging] x86/spec-ctrl: Simplify DO_COND_IBPB patchbot
17:11 [xen staging] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR} patchbot
17:11 [xen staging] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV patchbot
17:11 [xen staging] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_* patchbot
17:11 [xen staging] x86/spec-ctrl: Rename spec_ctrl_flags to scf patchbot
17:11 [xen staging] x86/spec-ctrl: Fix BTC/SRSO mitigations patchbot
14:33 [xen staging] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests patchbot
13:11 [xen staging] x86/alternatives: fix .init section reference in _apply_alternatives() patchbot
12:12 [xen staging-4.15] hypercall_xlat_continuation: Replace BUG_ON with domain_crash patchbot
12:12 [xen staging-4.15] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code patchbot
12:12 [xen staging-4.16] hypercall_xlat_continuation: Replace BUG_ON with domain_crash patchbot
12:12 [xen staging-4.16] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code patchbot
12:12 [xen staging-4.17] hypercall_xlat_continuation: Replace BUG_ON with domain_crash patchbot
12:12 [xen staging-4.17] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code patchbot
12:11 [xen staging-4.17] xen/livepatch: Fix .altinstructions safety checks patchbot
12:11 [xen staging-4.17] arm/alternatives: Rename alt_instr fields which are used in common code patchbot
12:11 [xen staging-4.18] hypercall_xlat_continuation: Replace BUG_ON with domain_crash patchbot
12:11 [xen staging-4.18] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code patchbot
12:11 [xen staging] hypercall_xlat_continuation: Replace BUG_ON with domain_crash patchbot
12:11 [xen staging] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code patchbot
00:22 [xen staging] drivers: char: Enable OMAP UART driver for TI K3 devices patchbot
April 08, 24
22:34 [xen master] xen/compiler: address violation of MISRA C Rule 20.9 patchbot
22:34 [xen master] x86/PVH: Support relocatable dom0 kernels patchbot
22:34 [xen master] libelf: Store maximum PHDR p_align patchbot
22:34 [xen master] xen/rwlock: raise the number of possible cpus patchbot
22:33 [xen master] xen/spinlock: support higher number of cpus patchbot
22:33 [xen master] xen/spinlock: let all is_locked and trylock variants return bool patchbot
22:33 [xen master] xen/spinlock: split recursive spinlocks from normal ones patchbot
22:33 [xen master] xen/spinlock: add missing rspin_is_locked() and rspin_barrier() patchbot
22:33 [xen master] xen/spinlock: add another function level patchbot
22:33 [xen master] xen/spinlock: add explicit non-recursive locking functions patchbot
07:34 [xen staging] xen/compiler: address violation of MISRA C Rule 20.9 patchbot
07:34 [xen staging] x86/PVH: Support relocatable dom0 kernels patchbot
07:34 [xen staging] libelf: Store maximum PHDR p_align patchbot
07:34 [xen staging] xen/rwlock: raise the number of possible cpus patchbot
07:33 [xen staging] xen/spinlock: support higher number of cpus patchbot
07:33 [xen staging] xen/spinlock: let all is_locked and trylock variants return bool patchbot
07:33 [xen staging] xen/spinlock: split recursive spinlocks from normal ones patchbot
07:33 [xen staging] xen/spinlock: add missing rspin_is_locked() and rspin_barrier() patchbot
07:33 [xen staging] xen/spinlock: add another function level patchbot
07:33 [xen staging] xen/spinlock: add explicit non-recursive locking functions patchbot
April 06, 24
10:11 [xen master] MISRA C Rule 17.1 states: "The features of `<stdarg.h>' shall not be used" patchbot
10:11 [xen master] MISRA C:2012 Rule 17.1 states: The features of `<stdarg.h>' shall not be used patchbot
10:11 [xen master] automation/eclair: add deviations for Rule 20.7 patchbot
10:11 [xen master] arm/public: address violations of MISRA C Rule 20.7 patchbot
10:11 [xen master] x86: Address MISRA Rule 13.6 patchbot
10:11 [xen master] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch patchbot
April 05, 24
23:22 [xen master] char: lpuart: Drop useless variables from UART structure patchbot
23:22 [xen master] drivers: char: Drop useless suspend/resume stubs in Arm drivers patchbot
18:22 [xen staging] MISRA C Rule 17.1 states: "The features of `<stdarg.h>' shall not be used" patchbot
18:22 [xen staging] MISRA C:2012 Rule 17.1 states: The features of `<stdarg.h>' shall not be used patchbot
18:22 [xen staging] automation/eclair: add deviations for Rule 20.7 patchbot
18:22 [xen staging] arm/public: address violations of MISRA C Rule 20.7 patchbot
14:11 [xen staging] x86: Address MISRA Rule 13.6 patchbot
14:11 [xen staging] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch patchbot
07:44 [xen master] vsprintf: address violations of MISRA C:2012 Rule 16.3 patchbot
07:44 [xen master] xen/sched: address violations of MISRA C:2012 Rule 16.3 patchbot
07:44 [xen master] tools: Move MB/GB() to common-macros.h patchbot
07:44 [xen master] tools/init-xenstore-domain: Replace variable MB() usage patchbot
07:44 [xen master] xen/riscv: introduce extension support check by compiler patchbot
07:44 [xen master] automation: introduce fixed randconfig for RISC-V patchbot
April 04, 24
23:44 [xen staging] char: lpuart: Drop useless variables from UART structure patchbot
23:44 [xen staging] drivers: char: Drop useless suspend/resume stubs in Arm drivers patchbot
21:01 [xen master] docs/misra: add 13.6 to rules.rst patchbot
21:00 [xen master] xen/arm: ffa: support FFA_FEATURES patchbot
21:00 [xen master] xen/arm: ffa: separate rxtx buffer routines patchbot
21:00 [xen master] xen/arm: ffa: separate partition info get routines patchbot
21:00 [xen master] xen/arm: ffa: separate memory sharing routines patchbot
21:00 [xen master] xen/arm: ffa: move common things to ffa_private.h patchbot
21:00 [xen master] xen/arm: ffa: rename functions to use ffa_ prefix patchbot
10:11 [xen staging] vsprintf: address violations of MISRA C:2012 Rule 16.3 patchbot
10:11 [xen staging] xen/sched: address violations of MISRA C:2012 Rule 16.3 patchbot
10:11 [xen staging] tools: Move MB/GB() to common-macros.h patchbot
10:11 [xen staging] tools/init-xenstore-domain: Replace variable MB() usage patchbot
10:11 [xen staging] xen/riscv: introduce extension support check by compiler patchbot
10:11 [xen staging] automation: introduce fixed randconfig for RISC-V patchbot
05:45 [xen master] xen/vm-event: address a violation of MISRA C:2012 Rule 16.3 patchbot
05:45 [xen master] xen/evtchn: address a violation of MISRA C:2012 Rule 16.3 patchbot
05:45 [xen master] console: address a violation of MISRA C:2012 Rule 16.3 patchbot
05:44 [xen master] xen/domctl: address a violation of MISRA C:2012 Rule 16.3 patchbot
05:44 [xen master] x86/amd: address violations of MISRA C Rule 20.7 patchbot
05:44 [xen master] xen/mm: address violations of MISRA C Rule 20.7 patchbot
05:44 [xen master] x86/hvm: address violations of MISRA C Rule 20.7 patchbot
05:44 [xen master] x86/vPMU: address violations of MISRA C Rule 20.7 patchbot
05:44 [xen master] drivers/char: mark extra reserved device memory in memory map patchbot
April 03, 24
23:34 [xen staging] docs/misra: add 13.6 to rules.rst patchbot
23:33 [xen staging] xen/arm: ffa: support FFA_FEATURES patchbot
23:33 [xen staging] xen/arm: ffa: separate rxtx buffer routines patchbot
23:33 [xen staging] xen/arm: ffa: separate partition info get routines patchbot
23:33 [xen staging] xen/arm: ffa: separate memory sharing routines patchbot
23:33 [xen staging] xen/arm: ffa: move common things to ffa_private.h patchbot
23:33 [xen staging] xen/arm: ffa: rename functions to use ffa_ prefix patchbot
07:45 [xen staging] xen/vm-event: address a violation of MISRA C:2012 Rule 16.3 patchbot
07:45 [xen staging] xen/evtchn: address a violation of MISRA C:2012 Rule 16.3 patchbot
07:45 [xen staging] console: address a violation of MISRA C:2012 Rule 16.3 patchbot
07:44 [xen staging] xen/domctl: address a violation of MISRA C:2012 Rule 16.3 patchbot
07:44 [xen staging] x86/amd: address violations of MISRA C Rule 20.7 patchbot
07:44 [xen staging] xen/mm: address violations of MISRA C Rule 20.7 patchbot
07:44 [xen staging] x86/hvm: address violations of MISRA C Rule 20.7 patchbot
07:44 [xen staging] x86/vPMU: address violations of MISRA C Rule 20.7 patchbot
07:44 [xen staging] drivers/char: mark extra reserved device memory in memory map patchbot
03:45 [xen stable-4.17] tests/resource: Fix HVM guest in !SHADOW builds patchbot
03:45 [xen stable-4.17] x86/boot: Support the watchdog on newer AMD systems patchbot
03:44 [xen stable-4.17] x86/livepatch: Relax permissions on rodata too patchbot
03:44 [xen stable-4.17] xen/virtual-region: Include rodata pointers patchbot
03:44 [xen stable-4.17] xen/virtual-region: Rename the start/end fields patchbot
03:44 [xen stable-4.17] x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies patchbot
03:44 [xen stable-4.17] x86/cpu-policy: Hide x2APIC from PV guests patchbot
01:45 [xen stable-4.18] tests/resource: Fix HVM guest in !SHADOW builds patchbot
01:45 [xen stable-4.18] x86/boot: Support the watchdog on newer AMD systems patchbot
01:44 [xen stable-4.18] x86/livepatch: Relax permissions on rodata too patchbot
01:44 [xen stable-4.18] xen/virtual-region: Include rodata pointers patchbot
01:44 [xen stable-4.18] xen/virtual-region: Rename the start/end fields patchbot
01:44 [xen stable-4.18] x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies patchbot
01:44 [xen stable-4.18] x86/cpu-policy: Hide x2APIC from PV guests patchbot
April 02, 24
14:34 [xen staging-4.17] tests/resource: Fix HVM guest in !SHADOW builds patchbot
14:34 [xen staging-4.17] x86/boot: Support the watchdog on newer AMD systems patchbot
14:33 [xen staging-4.17] x86/livepatch: Relax permissions on rodata too patchbot
14:33 [xen staging-4.17] xen/virtual-region: Include rodata pointers patchbot
14:33 [xen staging-4.17] xen/virtual-region: Rename the start/end fields patchbot
14:33 [xen staging-4.17] x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies patchbot
14:33 [xen staging-4.17] x86/cpu-policy: Hide x2APIC from PV guests patchbot
14:33 [xen staging-4.18] tests/resource: Fix HVM guest in !SHADOW builds patchbot
14:23 [xen staging-4.18] x86/boot: Support the watchdog on newer AMD systems patchbot
14:22 [xen staging-4.18] x86/livepatch: Relax permissions on rodata too patchbot
14:22 [xen staging-4.18] xen/virtual-region: Include rodata pointers patchbot
14:22 [xen staging-4.18] xen/virtual-region: Rename the start/end fields patchbot
14:22 [xen staging-4.18] x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies patchbot
14:22 [xen staging-4.18] x86/cpu-policy: Hide x2APIC from PV guests patchbot

Mail converted by MHonArc

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.