xen-changelog - Mail Index


April 30, 22
12:36 [xen master] Revert "page_alloc: assert IRQs are enabled in heap alloc/free" patchbot
12:36 [xen master] MAINTAINERS: add Rahul as SMMU maintainer patchbot
12:36 [xen master] x86/mem_sharing: make fork_reset more configurable patchbot
12:36 [xen master] PCI: replace "secondary" flavors of PCI_{DEVFN,BDF,SBDF}() patchbot
12:35 [xen master] PCI: replace stray uses of PCI_{DEVFN,BDF}2() patchbot
12:35 [xen master] x86+libxl: correct p2m (shadow) memory pool size calculation patchbot
12:35 [xen master] x86/mwait-idle: add SPR support patchbot
12:35 [xen master] x86/mwait-idle: switch to asm/intel-family.h naming patchbot
12:35 [xen master] xen/public: add new macro to ring.h patchbot
12:35 [xen master] drivers/exynos4210: Remove unused-but-set variable patchbot
12:34 [xen master] platforms/omap: Remove unused-but-set variable patchbot
12:34 [xen master] platforms/xgene: Make use of dt_device_get_address return value patchbot
12:34 [xen master] xen/sched: Remove unused-but-set variable patchbot
12:34 [xen master] xen/arm: smmu.c: Remove unused-but-set variable patchbot
12:34 [xen master] efi/boot.c: Remove unused-but-set variable patchbot
12:34 [xen master] xen/arm: bootfdt.c: Remove unused-but-set variable patchbot
12:33 [xen master] xen/arm64: io: Handle data abort due to cache maintenance instructions patchbot
12:33 [xen master] page_alloc: assert IRQs are enabled in heap alloc/free patchbot
12:33 [xen master] xen/arm: alternative: Don't call vmap() within stop_machine_run() patchbot
12:33 [xen master] EFI: don't mistakenly delete a file we never installed patchbot
12:33 [xen master] libxl: retry QMP PCI device_add patchbot
12:33 [xen master] x86/vmx: add hvm functions to get/set non-register state patchbot
April 29, 22
09:11 [xen staging] Revert "page_alloc: assert IRQs are enabled in heap alloc/free" patchbot
April 28, 22
23:44 [xen staging] MAINTAINERS: add Rahul as SMMU maintainer patchbot
14:22 [xen staging] x86/mem_sharing: make fork_reset more configurable patchbot
14:22 [xen staging] PCI: replace "secondary" flavors of PCI_{DEVFN,BDF,SBDF}() patchbot
14:22 [xen staging] PCI: replace stray uses of PCI_{DEVFN,BDF}2() patchbot
08:11 [xen staging] x86+libxl: correct p2m (shadow) memory pool size calculation patchbot
08:11 [xen staging] x86/mwait-idle: add SPR support patchbot
08:11 [xen staging] x86/mwait-idle: switch to asm/intel-family.h naming patchbot
08:11 [xen staging] xen/public: add new macro to ring.h patchbot
April 27, 22
22:34 [xen staging] drivers/exynos4210: Remove unused-but-set variable patchbot
22:34 [xen staging] platforms/omap: Remove unused-but-set variable patchbot
22:34 [xen staging] platforms/xgene: Make use of dt_device_get_address return value patchbot
22:34 [xen staging] xen/sched: Remove unused-but-set variable patchbot
22:34 [xen staging] xen/arm: smmu.c: Remove unused-but-set variable patchbot
22:34 [xen staging] efi/boot.c: Remove unused-but-set variable patchbot
22:33 [xen staging] xen/arm: bootfdt.c: Remove unused-but-set variable patchbot
22:33 [xen master] Revert "page_alloc: assert IRQs are enabled in heap alloc/free" patchbot
22:33 [xen master] page_alloc: assert IRQs are enabled in heap alloc/free patchbot
22:33 [xen master] xsm/flask: code style formatting patchbot
22:33 [xen master] IOMMU: make domctl handler tolerate NULL domain patchbot
22:33 [xen master] xen/iommu: cleanup iommu related domctl handling patchbot
15:33 [xen staging] xen/arm64: io: Handle data abort due to cache maintenance instructions patchbot
08:55 [xen staging] page_alloc: assert IRQs are enabled in heap alloc/free patchbot
08:55 [xen staging] xen/arm: alternative: Don't call vmap() within stop_machine_run() patchbot
07:22 [xen staging] EFI: don't mistakenly delete a file we never installed patchbot
07:22 [xen staging] libxl: retry QMP PCI device_add patchbot
07:22 [xen staging] x86/vmx: add hvm functions to get/set non-register state patchbot
April 26, 22
14:11 [xen staging] Revert "page_alloc: assert IRQs are enabled in heap alloc/free" patchbot
08:44 [xen staging] page_alloc: assert IRQs are enabled in heap alloc/free patchbot
08:44 [xen staging] xsm/flask: code style formatting patchbot
08:44 [xen staging] IOMMU: make domctl handler tolerate NULL domain patchbot
08:44 [xen staging] xen/iommu: cleanup iommu related domctl handling patchbot
April 23, 22
12:13 [xen master] tools/libs/light: don't set errno to a negative value patchbot
12:13 [xen master] tools/libs/guest: don't set errno to a negative value patchbot
12:13 [xen master] tools/libs/ctrl: don't set errno to a negative value patchbot
12:13 [xen master] tools/libs/evtchn: don't set errno to negative values patchbot
12:13 [xen master] xen: Split x86/debugger.h into common and arch specific parts patchbot
12:12 [xen master] x86/debugger: Misc cleanup prior to splitting patchbot
12:12 [xen master] x86/gdbstub: Clean up includes patchbot
12:12 [xen master] x86/gdbsx: Move domain_pause_for_debugger() into gdbsx patchbot
12:12 [xen master] x86/gdbsx: Rename debug.c to gdbsx.c patchbot
12:12 [xen master] x86/debugger: Remove debugger_trap_entry() patchbot
12:12 [xen master] xen/build: Fix MAP rule when called in isolation patchbot
12:11 [xen master] x86/build: make linking work again with ld incapable of generating build ID patchbot
12:11 [xen master] AMD/IOMMU: drop stray TLB flush patchbot
12:11 [xen master] IOMMU: have vendor code announce supported page sizes patchbot
12:11 [xen master] VT-d: limit page table population in domain_pgd_maddr() patchbot
12:11 [xen master] VT-d: have callers specify the target level for page table walks patchbot
12:11 [xen master] AMD/IOMMU: have callers specify the target level for page table walks patchbot
02:00 [xen master] gitlab-ci: add an ARM32 qemu-based smoke test patchbot
02:00 [xen master] gitlab-ci: add qemu-system-arm to the existing tests-artifacts container patchbot
April 22, 22
19:45 [xen staging] tools/libs/light: don't set errno to a negative value patchbot
19:45 [xen staging] tools/libs/guest: don't set errno to a negative value patchbot
19:45 [xen staging] tools/libs/ctrl: don't set errno to a negative value patchbot
19:45 [xen staging] tools/libs/evtchn: don't set errno to negative values patchbot
19:45 [xen staging] xen: Split x86/debugger.h into common and arch specific parts patchbot
19:44 [xen staging] x86/debugger: Misc cleanup prior to splitting patchbot
19:44 [xen staging] x86/gdbstub: Clean up includes patchbot
19:44 [xen staging] x86/gdbsx: Move domain_pause_for_debugger() into gdbsx patchbot
19:44 [xen staging] x86/gdbsx: Rename debug.c to gdbsx.c patchbot
19:44 [xen staging] x86/debugger: Remove debugger_trap_entry() patchbot
19:44 [xen staging] xen/build: Fix MAP rule when called in isolation patchbot
13:00 [xen staging] x86/build: make linking work again with ld incapable of generating build ID patchbot
13:00 [xen staging] AMD/IOMMU: drop stray TLB flush patchbot
13:00 [xen staging] IOMMU: have vendor code announce supported page sizes patchbot
13:00 [xen staging] VT-d: limit page table population in domain_pgd_maddr() patchbot
13:00 [xen staging] VT-d: have callers specify the target level for page table walks patchbot
13:00 [xen staging] AMD/IOMMU: have callers specify the target level for page table walks patchbot
April 21, 22
23:22 [xen staging] gitlab-ci: add an ARM32 qemu-based smoke test patchbot
23:22 [xen staging] gitlab-ci: add qemu-system-arm to the existing tests-artifacts container patchbot
11:12 [xen master] x86/build: Rework binary conversion for boot/{cmdline,reloc}.c patchbot
11:12 [xen master] xen/build: Fix dependency for the MAP rule patchbot
11:11 [xen master] x86/mm: avoid inadvertently degrading a TLB flush to local only patchbot
11:11 [xen master] VT-d: refuse to use IOMMU with reserved CAP.ND value patchbot
11:11 [xen master] VT-d: plug memory leaks in iommu_alloc() patchbot
11:11 [xen master] VT-d: drop ROOT_ENTRY_NR patchbot
11:11 [xen master] IOMMU/x86: drop locking from quarantine_init() hooks patchbot
11:11 [xen master] include/public: add command result definitions to vscsiif.h patchbot
00:22 [xen master] xen/arm: Add i.MX lpuart early printk support patchbot
00:22 [xen master] xen/arm: Add i.MX lpuart driver patchbot
00:22 [xen master] xen/arm: Make use of DT_MATCH_TIMER in make_timer_node patchbot
April 20, 22
18:22 [xen staging] x86/build: Rework binary conversion for boot/{cmdline,reloc}.c patchbot
18:22 [xen staging] xen/build: Fix dependency for the MAP rule patchbot
08:56 [xen staging] x86/mm: avoid inadvertently degrading a TLB flush to local only patchbot
08:56 [xen staging] VT-d: refuse to use IOMMU with reserved CAP.ND value patchbot
08:55 [xen staging] VT-d: plug memory leaks in iommu_alloc() patchbot
08:55 [xen staging] VT-d: drop ROOT_ENTRY_NR patchbot
08:55 [xen staging] IOMMU/x86: drop locking from quarantine_init() hooks patchbot
08:55 [xen staging] include/public: add command result definitions to vscsiif.h patchbot
08:55 [xen master] xen: cleanup gdbsx_guest_mem_io() call patchbot
08:55 [xen master] xen: fix XEN_DOMCTL_gdbsx_guestmemio crash patchbot
00:44 [xen staging] xen/arm: Add i.MX lpuart early printk support patchbot
00:44 [xen staging] xen/arm: Add i.MX lpuart driver patchbot
00:44 [xen staging] xen/arm: Make use of DT_MATCH_TIMER in make_timer_node patchbot
April 19, 22
20:44 [xen master] x86/debug: Drop unnecessary include of compile.h patchbot
17:11 [xen staging] xen: cleanup gdbsx_guest_mem_io() call patchbot
17:11 [xen staging] xen: fix XEN_DOMCTL_gdbsx_guestmemio crash patchbot
09:33 [xen staging] x86/debug: Drop unnecessary include of compile.h patchbot
April 14, 22
01:11 [xen master] IOMMU: log appropriate SBDF patchbot
01:11 [xen master] AMD/IOMMU: replace a few PCI_BDF2() patchbot
01:11 [xen master] build: adding out-of-tree support to the xen build patchbot
April 13, 22
10:44 [xen staging] IOMMU: log appropriate SBDF patchbot
10:44 [xen staging] AMD/IOMMU: replace a few PCI_BDF2() patchbot
10:44 [xen staging] build: adding out-of-tree support to the xen build patchbot
April 12, 22
23:00 [xen stable-4.16] update Xen version to 4.16.1 patchbot
18:55 [xen stable-4.14] update Xen version to 4.14.5 patchbot
18:44 [xen master] MAINTAINERS: add myself as Continuous Integration maintainer patchbot
12:22 [xen staging-4.16] update Xen version to 4.16.1 patchbot
10:33 [xen staging-4.14] update Xen version to 4.14.5 patchbot
01:44 [xen staging] MAINTAINERS: add myself as Continuous Integration maintainer patchbot
April 11, 22
21:56 [xen master] tools/xl: fix vif and vcpupin parse tests patchbot
21:55 [xen master] x86/boot: LEA -> MOV in video handling code patchbot
21:55 [xen master] Merge branch 'staging' of xenbits.xen.org:/home/xen/git/xen into staging patchbot
21:55 [xen master] xen: Populate xen.lds.h and make use of its macros patchbot
21:55 [xen master] xen: Introduce a header to store common linker scripts content patchbot
21:55 [xen master] x86/boot: obtain video info from boot loader patchbot
21:55 [xen master] x86/boot: make "vga=current" work with graphics modes patchbot
10:44 [xen staging] tools/xl: fix vif and vcpupin parse tests patchbot
10:44 [xen staging] x86/boot: LEA -> MOV in video handling code patchbot
10:44 [xen staging] Merge branch 'staging' of xenbits.xen.org:/home/xen/git/xen into staging patchbot
10:44 [xen staging] x86/boot: obtain video info from boot loader patchbot
10:44 [xen staging] x86/boot: make "vga=current" work with graphics modes patchbot
10:33 [xen staging] xen: Populate xen.lds.h and make use of its macros patchbot
10:33 [xen staging] xen: Introduce a header to store common linker scripts content patchbot
April 10, 22
07:22 [xen master] SUPPORT.md: add Dom0less as Supported patchbot
April 09, 22
23:23 [xen stable-4.16] livepatch: avoid relocations referencing ignored section symbols patchbot
23:22 [xen stable-4.16] livepatch: do not ignore sections with 0 size patchbot
23:22 [xen stable-4.16] vPCI: fix MSI-X PBA read/write gprintk()s patchbot
23:22 [xen stable-4.16] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies patchbot
23:22 [xen stable-4.16] VT-d: avoid infinite recursion on domain_context_mapping_one() error path patchbot
23:22 [xen stable-4.16] VT-d: avoid NULL deref on domain_context_mapping_one() error paths patchbot
23:22 [xen stable-4.16] VT-d: don't needlessly look up DID patchbot
20:57 [xen master] x86/irq: skip unmap_domain_pirq XSM during destruction patchbot
20:57 [xen master] x86/P2M: the majority for struct p2m_domain's fields are HVM-only patchbot
20:56 [xen master] x86/P2M: p2m.c is HVM-only patchbot
20:56 [xen master] paged_pages field is MEM_PAGING-only patchbot
20:56 [xen master] shr_pages field is MEM_SHARING-only patchbot
20:56 [xen master] x86/p2m: re-arrange {,__}put_gfn() patchbot
20:56 [xen master] x86/P2M: derive HVM-only variant from __get_gfn_type_access() patchbot
20:56 [xen master] x86/P2M: p2m_get_page_from_gfn() is HVM-only patchbot
20:55 [xen master] x86/P2M: split out init/teardown functions patchbot
20:55 [xen master] x86/P2M: PoD, altp2m, and nested-p2m are HVM-only patchbot
20:55 [xen master] x86/P2M: p2m_{alloc,free}_ptp() and p2m_alloc_table() are HVM-only patchbot
20:55 [xen master] x86/mm: split set_identity_p2m_entry() into PV and HVM parts patchbot
20:55 [xen master] livepatch: avoid relocations referencing ignored section symbols patchbot
20:55 [xen master] livepatch: do not ignore sections with 0 size patchbot
11:34 [xen stable-4.14] livepatch: avoid relocations referencing ignored section symbols patchbot
11:33 [xen stable-4.14] livepatch: do not ignore sections with 0 size patchbot
11:33 [xen stable-4.14] vPCI: replace %pp patchbot
11:33 [xen stable-4.14] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies patchbot
11:33 [xen stable-4.14] VT-d: avoid infinite recursion on domain_context_mapping_one() error path patchbot
11:33 [xen stable-4.14] VT-d: avoid NULL deref on domain_context_mapping_one() error paths patchbot
11:33 [xen stable-4.14] VT-d: don't needlessly look up DID patchbot
09:00 [xen stable-4.13] VT-d: avoid infinite recursion on domain_context_mapping_one() error path patchbot
09:00 [xen stable-4.13] VT-d: avoid NULL deref on domain_context_mapping_one() error paths patchbot
09:00 [xen stable-4.13] VT-d: don't needlessly look up DID patchbot
06:00 [xen stable-4.12] VT-d: avoid infinite recursion on domain_context_mapping_one() error path patchbot
06:00 [xen stable-4.12] VT-d: don't needlessly look up DID patchbot
06:00 [xen stable-4.12] VT-d: avoid NULL deref on domain_context_mapping_one() error paths patchbot
April 08, 22
23:56 [xen stable-4.15] livepatch: avoid relocations referencing ignored section symbols patchbot
23:55 [xen stable-4.15] livepatch: do not ignore sections with 0 size patchbot
23:55 [xen stable-4.15] vPCI: fix MSI-X PBA read/write gprintk()s patchbot
23:55 [xen stable-4.15] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies patchbot
23:55 [xen stable-4.15] VT-d: avoid infinite recursion on domain_context_mapping_one() error path patchbot
23:55 [xen stable-4.15] VT-d: avoid NULL deref on domain_context_mapping_one() error paths patchbot
23:55 [xen stable-4.15] VT-d: don't needlessly look up DID patchbot
19:45 [xen staging] SUPPORT.md: add Dom0less as Supported patchbot
19:44 [xen master] vPCI: fix MSI-X PBA read/write gprintk()s patchbot
19:44 [xen master] build: shuffle main Makefile patchbot
19:44 [xen master] build: specify source tree in include/ for prerequisite patchbot
19:44 [xen master] build: rework "headers*.chk" prerequisite in include/ patchbot
19:44 [xen master] build: replace $(BASEDIR) and use $(srctree) patchbot
19:44 [xen master] build: replace $(BASEDIR) by $(objtree) patchbot
13:33 [xen staging-4.12] VT-d: avoid infinite recursion on domain_context_mapping_one() error path patchbot
13:33 [xen staging-4.12] VT-d: avoid NULL deref on domain_context_mapping_one() error paths patchbot
13:33 [xen staging-4.12] VT-d: don't needlessly look up DID patchbot
13:33 [xen staging-4.13] VT-d: avoid infinite recursion on domain_context_mapping_one() error path patchbot
13:33 [xen staging-4.13] VT-d: avoid NULL deref on domain_context_mapping_one() error paths patchbot
13:33 [xen staging-4.13] VT-d: don't needlessly look up DID patchbot
13:13 [xen staging-4.14] livepatch: avoid relocations referencing ignored section symbols patchbot
13:13 [xen staging-4.14] livepatch: do not ignore sections with 0 size patchbot
13:12 [xen staging-4.14] vPCI: replace %pp patchbot
13:12 [xen staging-4.14] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies patchbot
13:12 [xen staging-4.14] VT-d: avoid infinite recursion on domain_context_mapping_one() error path patchbot
13:12 [xen staging-4.14] VT-d: avoid NULL deref on domain_context_mapping_one() error paths patchbot
13:12 [xen staging-4.14] VT-d: don't needlessly look up DID patchbot
13:12 [xen staging-4.15] livepatch: avoid relocations referencing ignored section symbols patchbot
13:11 [xen staging-4.15] livepatch: do not ignore sections with 0 size patchbot
13:11 [xen staging-4.15] vPCI: fix MSI-X PBA read/write gprintk()s patchbot
13:11 [xen staging-4.15] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies patchbot
13:11 [xen staging-4.15] VT-d: avoid infinite recursion on domain_context_mapping_one() error path patchbot
13:11 [xen staging-4.15] VT-d: avoid NULL deref on domain_context_mapping_one() error paths patchbot
13:11 [xen staging-4.15] VT-d: don't needlessly look up DID patchbot
13:01 [xen staging-4.16] livepatch: avoid relocations referencing ignored section symbols patchbot
13:00 [xen staging-4.16] livepatch: do not ignore sections with 0 size patchbot
13:00 [xen staging-4.16] vPCI: fix MSI-X PBA read/write gprintk()s patchbot
13:00 [xen staging-4.16] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies patchbot
13:00 [xen staging-4.16] VT-d: avoid infinite recursion on domain_context_mapping_one() error path patchbot
13:00 [xen staging-4.16] VT-d: avoid NULL deref on domain_context_mapping_one() error paths patchbot
13:00 [xen staging-4.16] VT-d: don't needlessly look up DID patchbot
12:56 [xen staging] x86/irq: skip unmap_domain_pirq XSM during destruction patchbot
12:56 [xen staging] x86/P2M: the majority for struct p2m_domain's fields are HVM-only patchbot
12:56 [xen staging] x86/P2M: p2m.c is HVM-only patchbot
12:56 [xen staging] paged_pages field is MEM_PAGING-only patchbot
12:56 [xen staging] shr_pages field is MEM_SHARING-only patchbot
12:56 [xen staging] x86/p2m: re-arrange {,__}put_gfn() patchbot
12:55 [xen staging] x86/P2M: derive HVM-only variant from __get_gfn_type_access() patchbot
12:55 [xen staging] x86/P2M: p2m_get_page_from_gfn() is HVM-only patchbot
12:55 [xen staging] x86/P2M: split out init/teardown functions patchbot
12:55 [xen staging] x86/P2M: PoD, altp2m, and nested-p2m are HVM-only patchbot
12:55 [xen staging] x86/P2M: p2m_{alloc,free}_ptp() and p2m_alloc_table() are HVM-only patchbot
12:55 [xen staging] x86/mm: split set_identity_p2m_entry() into PV and HVM parts patchbot
09:57 [xen master] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies patchbot
09:57 [xen master] VT-d: avoid infinite recursion on domain_context_mapping_one() error path patchbot
09:56 [xen master] VT-d: avoid NULL deref on domain_context_mapping_one() error paths patchbot
09:56 [xen master] VT-d: don't needlessly look up DID patchbot
09:56 [xen master] platform/cpufreq: add public defines for CPUFREQ_SHARED_TYPE_ patchbot
09:56 [xen master] EFI: correct indentation in efi_tables() patchbot
09:56 [xen master] x86/boot: fold two MOVs into an ADD patchbot
09:56 [xen master] x86/boot: fold/replace moves in video handling code patchbot
09:55 [xen master] x86/boot: fold branches in video handling code patchbot
09:55 [xen master] x86/boot: simplify mode_table patchbot
09:55 [xen master] x86/EFI: retrieve EDID patchbot
09:55 [xen master] x86/mm: move guest_physmap_{add,remove}_page() patchbot
09:55 [xen master] x86/P2M: introduce p2m_{add,remove}_page() patchbot
09:55 [xen master] x86/P2M: rename p2m_remove_page() patchbot
08:33 [xen staging] livepatch: avoid relocations referencing ignored section symbols patchbot
08:33 [xen staging] livepatch: do not ignore sections with 0 size patchbot
02:13 [xen stable-4.12] IOMMU/x86: use per-device page tables for quarantining patchbot
02:13 [xen stable-4.12] AMD/IOMMU: abstract maximum number of page table levels patchbot
02:12 [xen stable-4.12] IOMMU/x86: drop TLB flushes from quarantine_init() hooks patchbot
02:12 [xen stable-4.12] IOMMU/x86: maintain a per-device pseudo domain ID patchbot
02:12 [xen stable-4.12] VT-d: prepare for per-device quarantine page tables (part II) patchbot
02:12 [xen stable-4.12] VT-d: prepare for per-device quarantine page tables (part I) patchbot
02:12 [xen stable-4.12] AMD/IOMMU: re-assign devices directly patchbot
02:12 [xen stable-4.12] VT-d: re-assign devices directly patchbot
02:11 [xen stable-4.12] VT-d: drop ownership checking from domain_context_mapping_one() patchbot
02:11 [xen stable-4.12] VT-d: fix add/remove ordering when RMRRs are in use patchbot
02:11 [xen stable-4.12] VT-d: fix (de)assign ordering when RMRRs are in use patchbot
02:11 [xen stable-4.12] VT-d: split domid map cleanup check into a function patchbot
02:11 [xen stable-4.12] VT-d: correct ordering of operations in cleanup_domid_map() patchbot
02:11 [xen stable-4.12] x86/hap: do not switch on log dirty for VRAM tracking patchbot
00:02 [xen stable-4.14] tools/firmware: do not add a .note.gnu.property section patchbot
00:02 [xen stable-4.14] tools/firmware: force -fcf-protection=none patchbot
00:02 [xen stable-4.14] libxl: Re-scope qmp_proxy_spawn.ao usage patchbot
00:01 [xen stable-4.14] libxl: Don't segfault on soft-reset failure patchbot
00:01 [xen stable-4.14] xl: Fix global pci options patchbot
00:01 [xen stable-4.14] vpci/msix: fix PBA accesses patchbot
00:01 [xen stable-4.14] xz: validate the value before assigning it to an enum variable patchbot
00:01 [xen stable-4.14] xz: avoid overlapping memcpy() with invalid input with in-place decompression patchbot
00:01 [xen stable-4.14] tools/libxl: don't allow IOMMU usage with PoD patchbot
00:00 [xen stable-4.14] x86/console: process softirqs between warning prints patchbot
00:00 [xen stable-4.14] x86emul: fix VPBLENDMW with mask and memory operand patchbot
00:00 [xen stable-4.14] build: fix exported variable name CFLAGS_stack_boundary patchbot
00:00 [xen stable-4.14] tools/libs/light: set video_mem for PVH guests patchbot
00:00 [xen stable-4.14] tools/libxl: Correctly align the ACPI tables patchbot
00:00 [xen stable-4.14] update Xen version to 4.14.5-pre patchbot
April 07, 22
16:11 [xen staging] vPCI: fix MSI-X PBA read/write gprintk()s patchbot
16:11 [xen staging] build: shuffle main Makefile patchbot
16:11 [xen staging] build: specify source tree in include/ for prerequisite patchbot
16:11 [xen staging] build: rework "headers*.chk" prerequisite in include/ patchbot
16:11 [xen staging] build: replace $(BASEDIR) and use $(srctree) patchbot
16:11 [xen staging] build: replace $(BASEDIR) by $(objtree) patchbot
10:44 [xen staging] x86/cpuid: Clobber CPUID leaves 0x800000{1d..20} in policies patchbot
10:33 [xen staging] VT-d: avoid infinite recursion on domain_context_mapping_one() error path patchbot
10:33 [xen staging] VT-d: avoid NULL deref on domain_context_mapping_one() error paths patchbot
10:33 [xen staging] VT-d: don't needlessly look up DID patchbot
10:33 [xen staging] platform/cpufreq: add public defines for CPUFREQ_SHARED_TYPE_ patchbot
07:24 [xen staging-4.14] tools/firmware: do not add a .note.gnu.property section patchbot
07:24 [xen staging-4.14] tools/firmware: force -fcf-protection=none patchbot
07:24 [xen staging-4.14] libxl: Re-scope qmp_proxy_spawn.ao usage patchbot
07:23 [xen staging-4.14] libxl: Don't segfault on soft-reset failure patchbot
07:23 [xen staging-4.14] xl: Fix global pci options patchbot
07:23 [xen staging-4.14] vpci/msix: fix PBA accesses patchbot
07:23 [xen staging-4.14] xz: validate the value before assigning it to an enum variable patchbot
07:23 [xen staging-4.14] xz: avoid overlapping memcpy() with invalid input with in-place decompression patchbot
07:23 [xen staging-4.14] tools/libxl: don't allow IOMMU usage with PoD patchbot
07:22 [xen staging-4.14] x86/console: process softirqs between warning prints patchbot
07:22 [xen staging-4.14] x86emul: fix VPBLENDMW with mask and memory operand patchbot
07:22 [xen staging-4.14] build: fix exported variable name CFLAGS_stack_boundary patchbot
07:22 [xen staging-4.14] tools/libs/light: set video_mem for PVH guests patchbot
07:22 [xen staging-4.14] tools/libxl: Correctly align the ACPI tables patchbot
07:22 [xen staging-4.14] update Xen version to 4.14.5-pre patchbot
06:45 [xen staging] EFI: correct indentation in efi_tables() patchbot
06:45 [xen staging] x86/boot: fold two MOVs into an ADD patchbot
06:45 [xen staging] x86/boot: fold/replace moves in video handling code patchbot
06:44 [xen staging] x86/boot: fold branches in video handling code patchbot
06:44 [xen staging] x86/boot: simplify mode_table patchbot
06:44 [xen staging] x86/EFI: retrieve EDID patchbot
06:44 [xen staging] x86/mm: move guest_physmap_{add,remove}_page() patchbot
06:44 [xen staging] x86/P2M: introduce p2m_{add,remove}_page() patchbot
06:44 [xen staging] x86/P2M: rename p2m_remove_page() patchbot
04:33 [xen stable-4.15] tools/firmware: do not add a .note.gnu.property section patchbot
04:33 [xen stable-4.15] tools/firmware: force -fcf-protection=none patchbot
04:33 [xen stable-4.15] libxl: Re-scope qmp_proxy_spawn.ao usage patchbot
04:33 [xen stable-4.15] libxl: Don't segfault on soft-reset failure patchbot
04:33 [xen stable-4.15] xl: Fix global pci options patchbot
04:33 [xen stable-4.15] tools/libs/light: set video_mem for PVH guests patchbot
03:55 [xen stable-4.16] tools/firmware: do not add a .note.gnu.property section patchbot
03:55 [xen stable-4.16] tools/firmware: force -fcf-protection=none patchbot
03:55 [xen stable-4.16] libxl: Re-scope qmp_proxy_spawn.ao usage patchbot
03:55 [xen stable-4.16] libxl: Don't segfault on soft-reset failure patchbot
03:55 [xen stable-4.16] xl: Fix global pci options patchbot
03:55 [xen stable-4.16] tools/libs/light: set video_mem for PVH guests patchbot
April 06, 22
21:47 [xen master] IOMMU/x86: use per-device page tables for quarantining patchbot
21:46 [xen master] AMD/IOMMU: abstract maximum number of page table levels patchbot
21:46 [xen master] IOMMU/x86: drop TLB flushes from quarantine_init() hooks patchbot
21:46 [xen master] IOMMU/x86: maintain a per-device pseudo domain ID patchbot
21:46 [xen master] VT-d: prepare for per-device quarantine page tables (part II) patchbot
21:46 [xen master] VT-d: prepare for per-device quarantine page tables (part I) patchbot
21:46 [xen master] AMD/IOMMU: re-assign devices directly patchbot
21:45 [xen master] VT-d: re-assign devices directly patchbot
21:45 [xen master] VT-d: drop ownership checking from domain_context_mapping_one() patchbot
21:45 [xen master] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter patchbot
21:45 [xen master] VT-d: fix add/remove ordering when RMRRs are in use patchbot
21:45 [xen master] VT-d: fix (de)assign ordering when RMRRs are in use patchbot
21:45 [xen master] VT-d: correct ordering of operations in cleanup_domid_map() patchbot
21:44 [xen master] x86/hap: do not switch on log dirty for VRAM tracking patchbot
21:44 [xen master] x86/time: use fake read_tsc() patchbot
21:44 [xen master] include: move STR() and IS_ALIGNED() patchbot
21:44 [xen master] x86/APIC: make connections between seemingly arbitrary numbers patchbot
21:44 [xen master] x86/APIC: calibrate against platform timer when possible patchbot
21:44 [xen master] build: grab common EFI source files in arch specific dir patchbot
16:38 [xen stable-4.14] IOMMU/x86: use per-device page tables for quarantining patchbot
16:38 [xen stable-4.14] AMD/IOMMU: abstract maximum number of page table levels patchbot
16:38 [xen stable-4.14] IOMMU/x86: drop TLB flushes from quarantine_init() hooks patchbot
16:37 [xen stable-4.14] IOMMU/x86: maintain a per-device pseudo domain ID patchbot
16:37 [xen stable-4.14] VT-d: prepare for per-device quarantine page tables (part II) patchbot
16:37 [xen stable-4.14] VT-d: prepare for per-device quarantine page tables (part I) patchbot
16:37 [xen stable-4.14] AMD/IOMMU: re-assign devices directly patchbot
16:37 [xen stable-4.14] VT-d: re-assign devices directly patchbot
16:37 [xen stable-4.14] VT-d: drop ownership checking from domain_context_mapping_one() patchbot
16:36 [xen stable-4.14] VT-d: fix add/remove ordering when RMRRs are in use patchbot
16:36 [xen stable-4.14] VT-d: fix (de)assign ordering when RMRRs are in use patchbot
16:36 [xen stable-4.14] VT-d: correct ordering of operations in cleanup_domid_map() patchbot
16:36 [xen stable-4.14] x86/hap: do not switch on log dirty for VRAM tracking patchbot
16:36 [xen stable-4.14] livepatch: account for patch offset when applying NOP patch patchbot
16:36 [xen stable-4.14] livepatch: resolve old address before function verification patchbot
16:35 [xen stable-4.14] x86/cet: Remove XEN_SHSTK's dependency on EXPERT patchbot
16:35 [xen stable-4.14] xen/x86: Livepatch: support patching CET-enhanced functions patchbot
16:35 [xen stable-4.14] x86/cet: Remove writeable mapping of the BSPs shadow stack patchbot
16:35 [xen stable-4.14] x86/cet: Clear IST supervisor token busy bits on S3 resume patchbot
16:35 [xen stable-4.14] x86/kexec: Fix kexec-reboot with CET active patchbot
16:35 [xen stable-4.14] x86/spec-ctrl: Disable retpolines with CET-IBT patchbot
16:34 [xen stable-4.14] x86/CET: Fix S3 resume with shadow stacks active patchbot
16:34 [xen stable-4.14] x86: Enable CET Indirect Branch Tracking patchbot
16:34 [xen stable-4.14] x86/EFI: Disable CET-IBT around Runtime Services calls patchbot
16:34 [xen stable-4.14] x86/setup: Rework MSR_S_CET handling for CET-IBT patchbot
16:34 [xen stable-4.14] x86/entry: Make IDT entrypoints CET-IBT compatible patchbot
16:34 [xen stable-4.14] x86/entry: Make syscall/sysenter entrypoints CET-IBT compatible patchbot
16:33 [xen stable-4.14] x86/emul: Update emulation stubs to be CET-IBT compatible patchbot
16:33 [xen stable-4.14] x86: Introduce helpers/checks for endbr64 instructions patchbot
16:33 [xen stable-4.14] x86/traps: Rework write_stub_trampoline() to not hardcode the jmp patchbot
16:33 [xen stable-4.14] x86/alternatives: Clear CR4.CET when clearing CR0.WP patchbot
16:33 [xen stable-4.14] x86/setup: Read CR4 earlier in __start_xen() patchbot
16:33 [xen stable-4.14] x86: Introduce support for CET-IBT patchbot
08:33 [xen staging-4.15] tools/firmware: do not add a .note.gnu.property section patchbot
08:33 [xen staging-4.15] tools/firmware: force -fcf-protection=none patchbot
08:33 [xen staging-4.15] libxl: Re-scope qmp_proxy_spawn.ao usage patchbot
08:33 [xen staging-4.15] libxl: Don't segfault on soft-reset failure patchbot
08:33 [xen staging-4.15] xl: Fix global pci options patchbot
08:33 [xen staging-4.15] tools/libs/light: set video_mem for PVH guests patchbot
08:22 [xen staging-4.16] tools/firmware: do not add a .note.gnu.property section patchbot
08:22 [xen staging-4.16] tools/firmware: force -fcf-protection=none patchbot
08:22 [xen staging-4.16] libxl: Re-scope qmp_proxy_spawn.ao usage patchbot
08:22 [xen staging-4.16] libxl: Don't segfault on soft-reset failure patchbot
08:22 [xen staging-4.16] xl: Fix global pci options patchbot
08:22 [xen staging-4.16] tools/libs/light: set video_mem for PVH guests patchbot
06:02 [xen stable-4.16] IOMMU/x86: use per-device page tables for quarantining patchbot
06:02 [xen stable-4.16] AMD/IOMMU: abstract maximum number of page table levels patchbot
06:01 [xen stable-4.16] IOMMU/x86: drop TLB flushes from quarantine_init() hooks patchbot
06:01 [xen stable-4.16] IOMMU/x86: maintain a per-device pseudo domain ID patchbot
06:01 [xen stable-4.16] VT-d: prepare for per-device quarantine page tables (part II) patchbot
06:01 [xen stable-4.16] VT-d: prepare for per-device quarantine page tables (part I) patchbot
06:01 [xen stable-4.16] AMD/IOMMU: re-assign devices directly patchbot
06:01 [xen stable-4.16] VT-d: re-assign devices directly patchbot
06:00 [xen stable-4.16] VT-d: drop ownership checking from domain_context_mapping_one() patchbot
06:00 [xen stable-4.16] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter patchbot
06:00 [xen stable-4.16] VT-d: fix add/remove ordering when RMRRs are in use patchbot
06:00 [xen stable-4.16] VT-d: fix (de)assign ordering when RMRRs are in use patchbot
06:00 [xen stable-4.16] VT-d: correct ordering of operations in cleanup_domid_map() patchbot
06:00 [xen stable-4.16] x86/hap: do not switch on log dirty for VRAM tracking patchbot
05:35 [xen stable-4.13] IOMMU/x86: use per-device page tables for quarantining patchbot
05:35 [xen stable-4.13] AMD/IOMMU: abstract maximum number of page table levels patchbot
05:34 [xen stable-4.13] IOMMU/x86: drop TLB flushes from quarantine_init() hooks patchbot
05:34 [xen stable-4.13] IOMMU/x86: maintain a per-device pseudo domain ID patchbot
05:34 [xen stable-4.13] VT-d: prepare for per-device quarantine page tables (part II) patchbot
05:34 [xen stable-4.13] VT-d: prepare for per-device quarantine page tables (part I) patchbot
05:34 [xen stable-4.13] AMD/IOMMU: re-assign devices directly patchbot
05:34 [xen stable-4.13] VT-d: re-assign devices directly patchbot
05:33 [xen stable-4.13] VT-d: drop ownership checking from domain_context_mapping_one() patchbot
05:33 [xen stable-4.13] VT-d: fix add/remove ordering when RMRRs are in use patchbot
05:33 [xen stable-4.13] VT-d: fix (de)assign ordering when RMRRs are in use patchbot
05:33 [xen stable-4.13] VT-d: correct ordering of operations in cleanup_domid_map() patchbot
05:33 [xen stable-4.13] x86/hap: do not switch on log dirty for VRAM tracking patchbot
05:33 [xen stable-4.13] VT-d: split domid map cleanup check into a function patchbot
02:35 [xen stable-4.15] IOMMU/x86: use per-device page tables for quarantining patchbot
02:35 [xen stable-4.15] AMD/IOMMU: abstract maximum number of page table levels patchbot
02:34 [xen stable-4.15] IOMMU/x86: drop TLB flushes from quarantine_init() hooks patchbot
02:34 [xen stable-4.15] IOMMU/x86: maintain a per-device pseudo domain ID patchbot
02:34 [xen stable-4.15] VT-d: prepare for per-device quarantine page tables (part II) patchbot
02:34 [xen stable-4.15] VT-d: prepare for per-device quarantine page tables (part I) patchbot
02:34 [xen stable-4.15] AMD/IOMMU: re-assign devices directly patchbot
02:34 [xen stable-4.15] VT-d: re-assign devices directly patchbot
02:33 [xen stable-4.15] VT-d: drop ownership checking from domain_context_mapping_one() patchbot
02:33 [xen stable-4.15] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter patchbot
02:33 [xen stable-4.15] VT-d: fix add/remove ordering when RMRRs are in use patchbot
02:33 [xen stable-4.15] VT-d: fix (de)assign ordering when RMRRs are in use patchbot
02:33 [xen stable-4.15] VT-d: correct ordering of operations in cleanup_domid_map() patchbot
02:33 [xen stable-4.15] x86/hap: do not switch on log dirty for VRAM tracking patchbot
April 05, 22
13:46 [xen staging-4.12] IOMMU/x86: use per-device page tables for quarantining patchbot
13:46 [xen staging-4.12] AMD/IOMMU: abstract maximum number of page table levels patchbot
13:45 [xen staging-4.12] IOMMU/x86: drop TLB flushes from quarantine_init() hooks patchbot
13:45 [xen staging-4.12] IOMMU/x86: maintain a per-device pseudo domain ID patchbot
13:45 [xen staging-4.12] VT-d: prepare for per-device quarantine page tables (part II) patchbot
13:45 [xen staging-4.12] VT-d: prepare for per-device quarantine page tables (part I) patchbot
13:45 [xen staging-4.12] AMD/IOMMU: re-assign devices directly patchbot
13:45 [xen staging-4.12] VT-d: re-assign devices directly patchbot
13:44 [xen staging-4.12] VT-d: drop ownership checking from domain_context_mapping_one() patchbot
13:44 [xen staging-4.12] VT-d: fix add/remove ordering when RMRRs are in use patchbot
13:44 [xen staging-4.12] VT-d: fix (de)assign ordering when RMRRs are in use patchbot
13:44 [xen staging-4.12] VT-d: split domid map cleanup check into a function patchbot
13:44 [xen staging-4.12] VT-d: correct ordering of operations in cleanup_domid_map() patchbot
13:44 [xen staging-4.12] x86/hap: do not switch on log dirty for VRAM tracking patchbot
13:35 [xen staging-4.13] IOMMU/x86: use per-device page tables for quarantining patchbot
13:35 [xen staging-4.13] AMD/IOMMU: abstract maximum number of page table levels patchbot
13:34 [xen staging-4.13] IOMMU/x86: drop TLB flushes from quarantine_init() hooks patchbot
13:34 [xen staging-4.13] IOMMU/x86: maintain a per-device pseudo domain ID patchbot
13:34 [xen staging-4.13] VT-d: prepare for per-device quarantine page tables (part II) patchbot
13:34 [xen staging-4.13] VT-d: prepare for per-device quarantine page tables (part I) patchbot
13:34 [xen staging-4.13] AMD/IOMMU: re-assign devices directly patchbot
13:34 [xen staging-4.13] VT-d: re-assign devices directly patchbot
13:33 [xen staging-4.13] VT-d: drop ownership checking from domain_context_mapping_one() patchbot
13:33 [xen staging-4.13] VT-d: fix add/remove ordering when RMRRs are in use patchbot
13:33 [xen staging-4.13] VT-d: fix (de)assign ordering when RMRRs are in use patchbot
13:33 [xen staging-4.13] VT-d: correct ordering of operations in cleanup_domid_map() patchbot
13:33 [xen staging-4.13] x86/hap: do not switch on log dirty for VRAM tracking patchbot
13:33 [xen staging-4.13] VT-d: split domid map cleanup check into a function patchbot
13:24 [xen staging-4.14] IOMMU/x86: use per-device page tables for quarantining patchbot
13:23 [xen staging-4.14] AMD/IOMMU: abstract maximum number of page table levels patchbot
13:23 [xen staging-4.14] IOMMU/x86: drop TLB flushes from quarantine_init() hooks patchbot
13:23 [xen staging-4.14] IOMMU/x86: maintain a per-device pseudo domain ID patchbot
13:23 [xen staging-4.14] VT-d: prepare for per-device quarantine page tables (part II) patchbot
13:23 [xen staging-4.14] VT-d: prepare for per-device quarantine page tables (part I) patchbot
13:23 [xen staging-4.14] AMD/IOMMU: re-assign devices directly patchbot
13:22 [xen staging-4.14] VT-d: re-assign devices directly patchbot
13:22 [xen staging-4.14] VT-d: drop ownership checking from domain_context_mapping_one() patchbot
13:22 [xen staging-4.14] VT-d: fix add/remove ordering when RMRRs are in use patchbot
13:22 [xen staging-4.14] VT-d: fix (de)assign ordering when RMRRs are in use patchbot
13:22 [xen staging-4.14] VT-d: correct ordering of operations in cleanup_domid_map() patchbot
13:22 [xen staging-4.14] x86/hap: do not switch on log dirty for VRAM tracking patchbot
13:13 [xen staging-4.15] IOMMU/x86: use per-device page tables for quarantining patchbot
13:13 [xen staging-4.15] AMD/IOMMU: abstract maximum number of page table levels patchbot
13:12 [xen staging-4.15] IOMMU/x86: drop TLB flushes from quarantine_init() hooks patchbot
13:12 [xen staging-4.15] IOMMU/x86: maintain a per-device pseudo domain ID patchbot
13:12 [xen staging-4.15] VT-d: prepare for per-device quarantine page tables (part II) patchbot
13:12 [xen staging-4.15] VT-d: prepare for per-device quarantine page tables (part I) patchbot
13:12 [xen staging-4.15] AMD/IOMMU: re-assign devices directly patchbot
13:12 [xen staging-4.15] VT-d: re-assign devices directly patchbot
13:11 [xen staging-4.15] VT-d: drop ownership checking from domain_context_mapping_one() patchbot
13:11 [xen staging-4.15] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter patchbot
13:11 [xen staging-4.15] VT-d: fix add/remove ordering when RMRRs are in use patchbot
13:11 [xen staging-4.15] VT-d: fix (de)assign ordering when RMRRs are in use patchbot
13:11 [xen staging-4.15] VT-d: correct ordering of operations in cleanup_domid_map() patchbot
13:11 [xen staging-4.15] x86/hap: do not switch on log dirty for VRAM tracking patchbot
12:57 [xen staging-4.16] IOMMU/x86: use per-device page tables for quarantining patchbot
12:57 [xen staging-4.16] AMD/IOMMU: abstract maximum number of page table levels patchbot
12:56 [xen staging-4.16] IOMMU/x86: drop TLB flushes from quarantine_init() hooks patchbot
12:56 [xen staging-4.16] IOMMU/x86: maintain a per-device pseudo domain ID patchbot
12:56 [xen staging-4.16] VT-d: prepare for per-device quarantine page tables (part II) patchbot
12:56 [xen staging-4.16] VT-d: prepare for per-device quarantine page tables (part I) patchbot
12:56 [xen staging-4.16] AMD/IOMMU: re-assign devices directly patchbot
12:56 [xen staging-4.16] VT-d: re-assign devices directly patchbot
12:55 [xen staging-4.16] VT-d: drop ownership checking from domain_context_mapping_one() patchbot
12:55 [xen staging-4.16] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter patchbot
12:55 [xen staging-4.16] VT-d: fix add/remove ordering when RMRRs are in use patchbot
12:55 [xen staging-4.16] VT-d: fix (de)assign ordering when RMRRs are in use patchbot
12:55 [xen staging-4.16] VT-d: correct ordering of operations in cleanup_domid_map() patchbot
12:55 [xen staging-4.16] x86/hap: do not switch on log dirty for VRAM tracking patchbot
12:35 [xen staging] IOMMU/x86: use per-device page tables for quarantining patchbot
12:35 [xen staging] AMD/IOMMU: abstract maximum number of page table levels patchbot
12:34 [xen staging] IOMMU/x86: drop TLB flushes from quarantine_init() hooks patchbot
12:34 [xen staging] IOMMU/x86: maintain a per-device pseudo domain ID patchbot
12:34 [xen staging] VT-d: prepare for per-device quarantine page tables (part II) patchbot
12:34 [xen staging] VT-d: prepare for per-device quarantine page tables (part I) patchbot
12:34 [xen staging] AMD/IOMMU: re-assign devices directly patchbot
12:34 [xen staging] VT-d: re-assign devices directly patchbot
12:33 [xen staging] VT-d: drop ownership checking from domain_context_mapping_one() patchbot
12:33 [xen staging] IOMMU/x86: tighten iommu_alloc_pgtable()'s parameter patchbot
12:33 [xen staging] VT-d: fix add/remove ordering when RMRRs are in use patchbot
12:33 [xen staging] VT-d: fix (de)assign ordering when RMRRs are in use patchbot
12:33 [xen staging] VT-d: correct ordering of operations in cleanup_domid_map() patchbot
12:33 [xen staging] x86/hap: do not switch on log dirty for VRAM tracking patchbot
09:44 [xen staging] x86/time: use fake read_tsc() patchbot
09:44 [xen staging] include: move STR() and IS_ALIGNED() patchbot
09:44 [xen staging] x86/APIC: make connections between seemingly arbitrary numbers patchbot
09:44 [xen staging] x86/APIC: calibrate against platform timer when possible patchbot
09:44 [xen staging] build: grab common EFI source files in arch specific dir patchbot
04:44 [xen master] tools/firmware: do not add a .note.gnu.property section patchbot
04:44 [xen master] tools/firmware: fix setting of fcf-protection=none patchbot
02:14 [xen stable-4.15] livepatch: account for patch offset when applying NOP patch patchbot
02:14 [xen stable-4.15] vpci/msix: fix PBA accesses patchbot
02:14 [xen stable-4.15] livepatch: resolve old address before function verification patchbot
02:13 [xen stable-4.15] x86/cet: Remove XEN_SHSTK's dependency on EXPERT patchbot
02:13 [xen stable-4.15] xen/x86: Livepatch: support patching CET-enhanced functions patchbot
02:13 [xen stable-4.15] x86/cet: Remove writeable mapping of the BSPs shadow stack patchbot
02:13 [xen stable-4.15] x86/cet: Clear IST supervisor token busy bits on S3 resume patchbot
02:13 [xen stable-4.15] x86/kexec: Fix kexec-reboot with CET active patchbot
02:13 [xen stable-4.15] x86/spec-ctrl: Disable retpolines with CET-IBT patchbot
02:12 [xen stable-4.15] x86/CET: Fix S3 resume with shadow stacks active patchbot
02:12 [xen stable-4.15] x86: Enable CET Indirect Branch Tracking patchbot
02:12 [xen stable-4.15] x86/EFI: Disable CET-IBT around Runtime Services calls patchbot
02:12 [xen stable-4.15] x86/setup: Rework MSR_S_CET handling for CET-IBT patchbot
02:12 [xen stable-4.15] x86/entry: Make IDT entrypoints CET-IBT compatible patchbot
02:12 [xen stable-4.15] x86/entry: Make syscall/sysenter entrypoints CET-IBT compatible patchbot
02:11 [xen stable-4.15] x86/emul: Update emulation stubs to be CET-IBT compatible patchbot
02:11 [xen stable-4.15] x86: Introduce helpers/checks for endbr64 instructions patchbot
02:11 [xen stable-4.15] x86/traps: Rework write_stub_trampoline() to not hardcode the jmp patchbot
02:11 [xen stable-4.15] x86/alternatives: Clear CR4.CET when clearing CR0.WP patchbot
02:11 [xen stable-4.15] x86/setup: Read CR4 earlier in __start_xen() patchbot
02:11 [xen stable-4.15] x86: Introduce support for CET-IBT patchbot
April 04, 22
14:00 [xen staging-4.14] livepatch: account for patch offset when applying NOP patch patchbot
13:33 [xen staging-4.15] livepatch: account for patch offset when applying NOP patch patchbot
13:33 [xen staging-4.15] vpci/msix: fix PBA accesses patchbot
11:33 [xen staging] tools/firmware: do not add a .note.gnu.property section patchbot
11:33 [xen staging] tools/firmware: fix setting of fcf-protection=none patchbot
April 03, 22
02:00 [xen master] libxl: Re-scope qmp_proxy_spawn.ao usage patchbot
02:00 [xen master] libxl: Don't segfault on soft-reset failure patchbot
April 02, 22
18:03 [xen stable-4.16] livepatch: account for patch offset when applying NOP patch patchbot
18:03 [xen stable-4.16] vpci/msix: fix PBA accesses patchbot
18:03 [xen stable-4.16] x86/Kconfig: introduce option to select retpoline usage patchbot
18:03 [xen stable-4.16] x86/clang: add retpoline support patchbot
18:03 [xen stable-4.16] x86/retpoline: split retpoline compiler support into separate option patchbot
18:03 [xen stable-4.16] livepatch: resolve old address before function verification patchbot
18:02 [xen stable-4.16] x86/cet: Remove XEN_SHSTK's dependency on EXPERT patchbot
18:02 [xen stable-4.16] xen/x86: Livepatch: support patching CET-enhanced functions patchbot
18:02 [xen stable-4.16] x86/cet: Remove writeable mapping of the BSPs shadow stack patchbot
18:02 [xen stable-4.16] x86/cet: Clear IST supervisor token busy bits on S3 resume patchbot
18:02 [xen stable-4.16] x86/kexec: Fix kexec-reboot with CET active patchbot
18:02 [xen stable-4.16] x86/spec-ctrl: Disable retpolines with CET-IBT patchbot
18:01 [xen stable-4.16] x86/CET: Fix S3 resume with shadow stacks active patchbot
18:01 [xen stable-4.16] x86: Enable CET Indirect Branch Tracking patchbot
18:01 [xen stable-4.16] x86/EFI: Disable CET-IBT around Runtime Services calls patchbot
18:01 [xen stable-4.16] x86/setup: Rework MSR_S_CET handling for CET-IBT patchbot
18:01 [xen stable-4.16] x86/entry: Make IDT entrypoints CET-IBT compatible patchbot
18:01 [xen stable-4.16] x86/entry: Make syscall/sysenter entrypoints CET-IBT compatible patchbot
18:00 [xen stable-4.16] x86/emul: Update emulation stubs to be CET-IBT compatible patchbot
18:00 [xen stable-4.16] x86: Introduce helpers/checks for endbr64 instructions patchbot
18:00 [xen stable-4.16] x86/traps: Rework write_stub_trampoline() to not hardcode the jmp patchbot
18:00 [xen stable-4.16] x86/alternatives: Clear CR4.CET when clearing CR0.WP patchbot
18:00 [xen stable-4.16] x86/setup: Read CR4 earlier in __start_xen() patchbot
18:00 [xen stable-4.16] x86: Introduce support for CET-IBT patchbot
03:33 [xen master] libxl: constify libxl__stubdomain_is_linux patchbot
03:33 [xen master] xl: Fix global pci options patchbot
03:33 [xen master] livepatch: account for patch offset when applying NOP patch patchbot
03:33 [xen master] livepatch: fix typos patchbot
April 01, 22
16:11 [xen staging] libxl: Re-scope qmp_proxy_spawn.ao usage patchbot
16:11 [xen staging] libxl: Don't segfault on soft-reset failure patchbot

Mail converted by MHonArc

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.