xen-changelog Mail Thread Index
- [xen staging] x86/cpu-policy: Annotate the accumulated features,
patchbot
- [xen stable-4.16] x86/spec: adjust logic that elides lfence,
patchbot
- [xen stable-4.16] x86/spec: fix reporting of BHB clearing usage from guest entry points,
patchbot
- [xen staging] revert "x86/mm: re-implement get_page_light() using an atomic increment",
patchbot
- [xen staging] xen/riscv: improve check-extension() macro,
patchbot
- [xen staging] xen/x86: Fix Syntax warning in gen-cpuid.py,
patchbot
- [xen staging] xen/xsm: Wire up get_dom0_console,
patchbot
- [xen staging] x86/MCE: guard call to Intel-specific intel_get_extended_msrs(),
patchbot
- [xen staging] x86/msi: passthrough all MSI-X vector ctrl writes to device model,
patchbot
- [xen stable-4.17] x86/spec: adjust logic that elides lfence,
patchbot
- [xen stable-4.17] x86/spec: fix reporting of BHB clearing usage from guest entry points,
patchbot
- [xen stable-4.17] x86/MTRR: correct inadvertently inverted WC check,
patchbot
- [xen stable-4.18] x86/spec: adjust logic that elides lfence,
patchbot
- [xen stable-4.18] x86/spec: fix reporting of BHB clearing usage from guest entry points,
patchbot
- [xen stable-4.18] x86/MTRR: correct inadvertently inverted WC check,
patchbot
- [xen stable-4.18] x86/rtc: Avoid UIP flag being set for longer than expected,
patchbot
- [xen stable-4.18] altcall: fix __alt_call_maybe_initdata so it's safe for livepatch,
patchbot
- [xen staging-4.15] x86/spec: adjust logic that elides lfence,
patchbot
- [xen staging-4.15] x86/spec: fix reporting of BHB clearing usage from guest entry points,
patchbot
- [xen staging-4.16] x86/spec: adjust logic that elides lfence,
patchbot
- [xen staging-4.16] x86/spec: fix reporting of BHB clearing usage from guest entry points,
patchbot
- [xen staging-4.17] x86/spec: adjust logic that elides lfence,
patchbot
- [xen staging-4.17] x86/spec: fix reporting of BHB clearing usage from guest entry points,
patchbot
- [xen staging-4.17] x86/MTRR: correct inadvertently inverted WC check,
patchbot
- [xen staging-4.18] x86/spec: adjust logic that elides lfence,
patchbot
- [xen staging-4.18] x86/spec: fix reporting of BHB clearing usage from guest entry points,
patchbot
- [xen staging-4.18] x86/MTRR: correct inadvertently inverted WC check,
patchbot
- [xen staging-4.18] x86/rtc: Avoid UIP flag being set for longer than expected,
patchbot
- [xen staging-4.18] altcall: fix __alt_call_maybe_initdata so it's safe for livepatch,
patchbot
- [xen master] xen-livepatch: fix --force option comparison,
patchbot
- [xen master] xen/spinlock: use correct pointer,
patchbot
- [xen master] x86/entry: shrink insn size for some of our EFLAGS manipulation,
patchbot
- [xen master] gzip: clean up comments and fix code alignment,
patchbot
- [xen master] arm/vpci: make prefetchable mem 64 bit,
patchbot
- [xen master] CI: Drop glibc-i386 from the build containers,
patchbot
- [xen master] automation/eclair: reorganize pipelines,
patchbot
- [xen master] VMX: no open-coding in vmx_get_cpl(),
patchbot
- [xen master] MAINTAINERS: Update my email address,
patchbot
- [xen master] x86/spec: adjust logic that elides lfence,
patchbot
- [xen master] x86/spec: fix reporting of BHB clearing usage from guest entry points,
patchbot
- [xen master] tools/ocaml: Fix warnings in config.ml,
patchbot
- [xen master] x86/hap: Refactor boolean field assignments,
patchbot
- [xen master] x86/shadow: correct shadow_vcpu_init()'s comment,
patchbot
- [xen master] x86/paging: vCPU host mode is always set,
patchbot
- [xen master] x86/msr: add suffix 'U' to MSR_AMD_CSTATE_CFG macro,
patchbot
- [xen master] x86/pci: add suffix 'U' to PCI_CONF_ADDRESS macro,
patchbot
- [xen master] livepatch: introduce --force option,
patchbot
- [xen master] xen-livepatch: fix parameter name parsing,
patchbot
- [xen master] x86/mm: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] x86/debugreg: address violation of MISRA C Rule 20.7,
patchbot
- [xen master] x86/vhpet: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] x86/acpi: address violations of MISRA Rule 20.7,
patchbot
- [xen master] x86/pci: address violation of MISRA C Rule 20.7,
patchbot
- [xen master] xen/spinlock: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] xen/page-defs: address violation of MISRA C Rule 20.7,
patchbot
- [xen master] libelf: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] libxl: Support blktap with HVM device model,
patchbot
- [xen master] hotplug: Update block-tap,
patchbot
- [xen staging] xen-livepatch: fix --force option comparison,
patchbot
- [xen staging] xen/spinlock: use correct pointer,
patchbot
- [xen staging] x86/entry: shrink insn size for some of our EFLAGS manipulation,
patchbot
- [xen staging] gzip: clean up comments and fix code alignment,
patchbot
- [xen staging] arm/vpci: make prefetchable mem 64 bit,
patchbot
- [xen staging] CI: Drop glibc-i386 from the build containers,
patchbot
- [xen staging] automation/eclair: reorganize pipelines,
patchbot
- [xen master] automation: Add arm64 test for running Xen with GICv3,
patchbot
- [xen master] automation: Add arm{64,32} earlyprintk jobs,
patchbot
- [xen master] automation: Drop some of the non-debug variants of the same Arm jobs,
patchbot
- [xen master] xen/arm: List static shared memory regions as /memory nodes,
patchbot
- [xen master] xen/arm: fix duplicate /reserved-memory node in Dom0,
patchbot
- [xen master] xen/arm: remove shm holes from extended regions,
patchbot
- [xen master] xen/arm: Reduce struct membank size on static shared memory,
patchbot
- [xen master] xen/arm: Introduce helper for static memory pages,
patchbot
- [xen master] xen/arm: Avoid code duplication in check_reserved_regions_overlap,
patchbot
- [xen master] xen/arm: Avoid code duplication in find_unallocated_memory,
patchbot
- [xen master] xen/arm: Conditional compilation of kernel_info.shm_mem member,
patchbot
- [xen master] xen/arm: Introduce a generic way to access memory bank structures,
patchbot
- [xen master] xen/arm: Pass struct kernel_info parameter to make_{resv,shm}_memory_node,
patchbot
- [xen master] xen/arm: avoid repetitive checking in process_shm_node,
patchbot
- [xen master] xen/arm: remove stale addr_cells/size_cells in assign_shared_memory,
patchbot
- [xen master] tools/golang: Run `go vet` as part of the build process,
patchbot
- [xen master] golang/xenlight: Ensure comments aren't interpreted as docstrings,
patchbot
- [xen master] tools/golang: When returning pointers, actually allocate structrues,
patchbot
- [xen master] svm/nestedsvm: Introduce nested capabilities bit,
patchbot
- [xen staging] VMX: no open-coding in vmx_get_cpl(),
patchbot
- [xen staging] MAINTAINERS: Update my email address,
patchbot
- [xen staging] x86/spec: adjust logic that elides lfence,
patchbot
- [xen staging] x86/spec: fix reporting of BHB clearing usage from guest entry points,
patchbot
- [xen staging] tools/ocaml: Fix warnings in config.ml,
patchbot
- [xen staging] x86/hap: Refactor boolean field assignments,
patchbot
- [xen staging] x86/shadow: correct shadow_vcpu_init()'s comment,
patchbot
- [xen staging] x86/paging: vCPU host mode is always set,
patchbot
- [xen staging] x86/msr: add suffix 'U' to MSR_AMD_CSTATE_CFG macro,
patchbot
- [xen staging] x86/pci: add suffix 'U' to PCI_CONF_ADDRESS macro,
patchbot
- [xen staging] livepatch: introduce --force option,
patchbot
- [xen staging] xen-livepatch: fix parameter name parsing,
patchbot
- [xen staging] x86/mm: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] x86/debugreg: address violation of MISRA C Rule 20.7,
patchbot
- [xen staging] x86/vhpet: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] x86/acpi: address violations of MISRA Rule 20.7,
patchbot
- [xen staging] x86/pci: address violation of MISRA C Rule 20.7,
patchbot
- [xen staging] xen/spinlock: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] xen/page-defs: address violation of MISRA C Rule 20.7,
patchbot
- [xen staging] libelf: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] libxl: Support blktap with HVM device model,
patchbot
- [xen staging] hotplug: Update block-tap,
patchbot
- [xen master] x86/monitor: allow fast-singlestepping without enabling singlestep monitor,
patchbot
- [xen staging] automation: Add arm64 test for running Xen with GICv3,
patchbot
- [xen staging] automation: Add arm{64,32} earlyprintk jobs,
patchbot
- [xen staging] automation: Drop some of the non-debug variants of the same Arm jobs,
patchbot
- [xen staging] xen/arm: List static shared memory regions as /memory nodes,
patchbot
- [xen staging] xen/arm: fix duplicate /reserved-memory node in Dom0,
patchbot
- [xen staging] xen/arm: remove shm holes from extended regions,
patchbot
- [xen staging] xen/arm: Reduce struct membank size on static shared memory,
patchbot
- [xen staging] xen/arm: Introduce helper for static memory pages,
patchbot
- [xen staging] xen/arm: Avoid code duplication in check_reserved_regions_overlap,
patchbot
- [xen staging] xen/arm: Avoid code duplication in find_unallocated_memory,
patchbot
- [xen staging] xen/arm: Conditional compilation of kernel_info.shm_mem member,
patchbot
- [xen staging] xen/arm: Introduce a generic way to access memory bank structures,
patchbot
- [xen staging] xen/arm: Pass struct kernel_info parameter to make_{resv,shm}_memory_node,
patchbot
- [xen staging] xen/arm: avoid repetitive checking in process_shm_node,
patchbot
- [xen staging] xen/arm: remove stale addr_cells/size_cells in assign_shared_memory,
patchbot
- [xen staging] tools/golang: Run `go vet` as part of the build process,
patchbot
- [xen staging] golang/xenlight: Ensure comments aren't interpreted as docstrings,
patchbot
- [xen staging] tools/golang: When returning pointers, actually allocate structrues,
patchbot
- [xen staging] svm/nestedsvm: Introduce nested capabilities bit,
patchbot
- [xen master] x86/MTRR: correct inadvertently inverted WC check,
patchbot
- [xen master] xen: introduce header file with section related symbols,
patchbot
- [xen master] docs/man: Add xenwatchdog manual page,
patchbot
- [xen master] tools/misc: Add xenwatchdogd.c copyright notice,
patchbot
- [xen master] tools/misc: xenwatchdogd enhancements,
patchbot
- [xen master] tools/misc: xenwatchdogd: add parse_secs(),
patchbot
- [xen master] x86/rtc: Avoid UIP flag being set for longer than expected,
patchbot
- [xen staging] x86/monitor: allow fast-singlestepping without enabling singlestep monitor,
patchbot
- [xen staging] x86/MTRR: correct inadvertently inverted WC check,
patchbot
- [xen staging] xen: introduce header file with section related symbols,
patchbot
- [xen staging] docs/man: Add xenwatchdog manual page,
patchbot
- [xen staging] tools/misc: Add xenwatchdogd.c copyright notice,
patchbot
- [xen staging] tools/misc: xenwatchdogd enhancements,
patchbot
- [xen staging] tools/misc: xenwatchdogd: add parse_secs(),
patchbot
- [xen staging] x86/rtc: Avoid UIP flag being set for longer than expected,
patchbot
- [xen master] x86/pvh: zero VGA information,
patchbot
- [xen master] x86/video: add boot_video_info offset generation to asm-offsets,
patchbot
- [xen master] automation/eclair_analysis: substitute deprecated service STD.emptrecd,
patchbot
- [xen master] xen/riscv: check whether the assembler has Zbb extension support,
patchbot
- [xen master] xen/domain: deviate MISRA C Rule 16.2 violation,
patchbot
- [xen master] x86/PVH: Use unsigned int for dom0 e820 index,
patchbot
- [xen staging] x86/pvh: zero VGA information,
patchbot
- [xen staging] x86/video: add boot_video_info offset generation to asm-offsets,
patchbot
- [xen staging] automation/eclair_analysis: substitute deprecated service STD.emptrecd,
patchbot
- [xen staging] xen/riscv: check whether the assembler has Zbb extension support,
patchbot
- [xen staging] xen/domain: deviate MISRA C Rule 16.2 violation,
patchbot
- [xen staging] x86/PVH: Use unsigned int for dom0 e820 index,
patchbot
- [xen master] x86/svm: Add flushbyasid in the supported features,
patchbot
- [xen master] eclair_analysis: deviate x86 emulator for Rule 16.2,
patchbot
- [xen master] xen/riscv: add minimal stuff to page.h to build full Xen,
patchbot
- [xen master] xen/riscv: introduce io.h,
patchbot
- [xen master] xen/ppc: mm-radix: Replace debug printing code with printk,
patchbot
- [xen master] x86/MCE: move intel mcheck init code to separate file,
patchbot
- [xen staging] x86/svm: Add flushbyasid in the supported features,
patchbot
- [xen staging] eclair_analysis: deviate x86 emulator for Rule 16.2,
patchbot
- [xen staging] xen/riscv: add minimal stuff to page.h to build full Xen,
patchbot
- [xen staging] xen/riscv: introduce io.h,
patchbot
- [xen staging] xen/ppc: mm-radix: Replace debug printing code with printk,
patchbot
- [xen staging] x86/MCE: move intel mcheck init code to separate file,
patchbot
- [xen master] xen/gzip: Drop huffman code table tracking,
patchbot
- [xen master] xen/gzip: Remove custom memory allocator,
patchbot
- [xen master] xen/gzip: Drop unused define checks,
patchbot
- [xen master] x86/emul: Simplify segment override prefix decoding,
patchbot
- [xen master] xen/efi: Rewrite DOS/PE magic checking without memcmp(),
patchbot
- [xen master] docs/misra: mark the gzip folder as adopted code,
patchbot
- [xen master] Revert "public: s/int/int32_t",
patchbot
- [xen master] docs: arm: Update where Xen should be loaded in memory,
patchbot
- [xen master] public: s/int/int32_t,
patchbot
- [xen staging] xen/gzip: Drop huffman code table tracking,
patchbot
- [xen staging] xen/gzip: Remove custom memory allocator,
patchbot
- [xen staging] xen/gzip: Drop unused define checks,
patchbot
- [xen staging] x86/emul: Simplify segment override prefix decoding,
patchbot
- [xen staging] xen/efi: Rewrite DOS/PE magic checking without memcmp(),
patchbot
- [xen staging] docs/misra: mark the gzip folder as adopted code,
patchbot
- [xen stable-4.18] x86/entry: Fix build with older toolchains,
patchbot
- [xen stable-4.18] Update CHANGELOG.md with 4.18.2 line,
patchbot
- [xen stable-4.18] Update Xen version to 4.18.2,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Support the "long" BHB loop sequence,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Wire up the Native-BHI software sequences,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Software BHB-clearing sequences,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI,
patchbot
- [xen stable-4.18] x86/tsx: Expose RTM_ALWAYS_ABORT to guests,
patchbot
- [xen stable-4.18] x86: Drop INDIRECT_JMP,
patchbot
- [xen stable-4.18] x86: Use indirect calls in reset-stack infrastructure,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields,
patchbot
- [xen stable-4.18] x86/vmx: Add support for virtualize SPEC_CTRL,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_*,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Simplify DO_COND_IBPB,
patchbot
- [xen stable-4.18] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR},
patchbot
- [xen stable-4.18] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_*,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Rename spec_ctrl_flags to scf,
patchbot
- [xen stable-4.18] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests,
patchbot
- [xen stable-4.18] x86/alternatives: fix .init section reference in _apply_alternatives(),
patchbot
- [xen stable-4.18] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Move __read_mostly data into __ro_after_init,
patchbot
- [xen stable-4.18] VMX: tertiary execution control infrastructure,
patchbot
- [xen stable-4.18] x86/CPU: convert vendor hook invocations to altcall,
patchbot
- [xen stable-4.18] x86/guest: finish conversion to altcall,
patchbot
- [xen stable-4.18] x86: arrange for ENDBR zapping from <vendor>_ctxt_switch_masking(),
patchbot
- [xen stable-4.18] x86/spec-ctrl: Expose BHI_CTRL to guests,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Expose RRSBA_CTRL to guests,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Expose IPRED_CTRL to guests,
patchbot
- [xen stable-4.18] IRQ: generalize [gs]et_irq_regs(),
patchbot
- [xen stable-4.18] x86/MCE: switch some callback invocations to altcall,
patchbot
- [xen stable-4.18] x86/MCE: separate BSP-only initialization,
patchbot
- [xen stable-4.18] x86/PV: avoid indirect call for I/O emulation quirk hook,
patchbot
- [xen stable-4.18] x86/MTRR: avoid several indirect calls,
patchbot
- [xen stable-4.18] core-parking: use alternative_call(),
patchbot
- [xen stable-4.18] x86/HPET: avoid an indirect call,
patchbot
- [xen stable-4.18] cpufreq: finish conversion to altcall,
patchbot
- [xen stable-4.18] x86/APIC: finish genapic conversion to altcall,
patchbot
- [xen stable-4.18] x86/spec-ctrl: Fix BTC/SRSO mitigations,
patchbot
- [xen master] docs/misra: add Rule 16.4,
patchbot
- [xen master] docs/misra/rules.rst: add rule 5.5,
patchbot
- [xen stable-4.17] x86/entry: Fix build with older toolchains,
patchbot
- [xen stable-4.17] Release: Update CHANGELOG.md,
patchbot
- [xen stable-4.17] Update Xen version to 4.17.4,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Support the "long" BHB loop sequence,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Wire up the Native-BHI software sequences,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Software BHB-clearing sequences,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI,
patchbot
- [xen stable-4.17] x86/tsx: Expose RTM_ALWAYS_ABORT to guests,
patchbot
- [xen stable-4.17] x86: Drop INDIRECT_JMP,
patchbot
- [xen stable-4.17] x86: Use indirect calls in reset-stack infrastructure,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields,
patchbot
- [xen stable-4.17] x86/vmx: Add support for virtualize SPEC_CTRL,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_*,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Simplify DO_COND_IBPB,
patchbot
- [xen stable-4.17] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR},
patchbot
- [xen stable-4.17] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_*,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Rename spec_ctrl_flags to scf,
patchbot
- [xen stable-4.17] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests,
patchbot
- [xen stable-4.17] x86/alternatives: fix .init section reference in _apply_alternatives(),
patchbot
- [xen stable-4.17] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Move __read_mostly data into __ro_after_init,
patchbot
- [xen stable-4.17] VMX: tertiary execution control infrastructure,
patchbot
- [xen stable-4.17] x86/CPU: convert vendor hook invocations to altcall,
patchbot
- [xen stable-4.17] x86/guest: finish conversion to altcall,
patchbot
- [xen stable-4.17] x86: arrange for ENDBR zapping from <vendor>_ctxt_switch_masking(),
patchbot
- [xen stable-4.17] x86/spec-ctrl: Expose BHI_CTRL to guests,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Expose RRSBA_CTRL to guests,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Expose IPRED_CTRL to guests,
patchbot
- [xen stable-4.17] IRQ: generalize [gs]et_irq_regs(),
patchbot
- [xen stable-4.17] x86/MCE: switch some callback invocations to altcall,
patchbot
- [xen stable-4.17] x86/MCE: separate BSP-only initialization,
patchbot
- [xen stable-4.17] x86/PV: avoid indirect call for I/O emulation quirk hook,
patchbot
- [xen stable-4.17] x86/MTRR: avoid several indirect calls,
patchbot
- [xen stable-4.17] core-parking: use alternative_call(),
patchbot
- [xen stable-4.17] x86/HPET: avoid an indirect call,
patchbot
- [xen stable-4.17] cpufreq: finish conversion to altcall,
patchbot
- [xen stable-4.17] x86/APIC: finish genapic conversion to altcall,
patchbot
- [xen stable-4.17] x86/spec-ctrl: Fix BTC/SRSO mitigations,
patchbot
- [xen stable-4.16] x86/vmx: prevent fallthrough in vmx_set_reg() for handled registers,
patchbot
- [xen stable-4.16] x86/entry: Fix build with older toolchains,
patchbot
- [xen stable-4.16] Update Xen version to 4.16.6,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Support the "long" BHB loop sequence,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Wire up the Native-BHI software sequences,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Software BHB-clearing sequences,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI,
patchbot
- [xen stable-4.16] x86/tsx: Expose RTM_ALWAYS_ABORT to guests,
patchbot
- [xen stable-4.16] x86: Drop INDIRECT_JMP,
patchbot
- [xen stable-4.16] x86: Use indirect calls in reset-stack infrastructure,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields,
patchbot
- [xen stable-4.16] x86/vmx: Add support for virtualize SPEC_CTRL,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_*,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Simplify DO_COND_IBPB,
patchbot
- [xen stable-4.16] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR},
patchbot
- [xen stable-4.16] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_*,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Rename spec_ctrl_flags to scf,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Make svm_vmexit_spec_ctrl conditional,
patchbot
- [xen stable-4.16] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests,
patchbot
- [xen stable-4.16] xen/wait: Remove indirect jump,
patchbot
- [xen stable-4.16] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch,
patchbot
- [xen stable-4.16] VMX: tertiary execution control infrastructure,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Expose BHI_CTRL to guests,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Expose RRSBA_CTRL to guests,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Expose IPRED_CTRL to guests,
patchbot
- [xen stable-4.16] x86/spec-ctrl: Fix BTC/SRSO mitigations,
patchbot
- [xen stable-4.15] x86/vmx: prevent fallthrough in vmx_set_reg() for handled registers,
patchbot
- [xen stable-4.15] x86/entry: Fix build with older toolchains,
patchbot
- [xen stable-4.15] Update Xen version to 4.15.6,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Support the "long" BHB loop sequence,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Wire up the Native-BHI software sequences,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Software BHB-clearing sequences,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI,
patchbot
- [xen stable-4.15] x86/tsx: Expose RTM_ALWAYS_ABORT to guests,
patchbot
- [xen stable-4.15] x86: Drop INDIRECT_JMP,
patchbot
- [xen stable-4.15] x86: Use indirect calls in reset-stack infrastructure,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields,
patchbot
- [xen stable-4.15] x86/vmx: Add support for virtualize SPEC_CTRL,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_*,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Simplify DO_COND_IBPB,
patchbot
- [xen stable-4.15] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR},
patchbot
- [xen stable-4.15] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_*,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Rename spec_ctrl_flags to scf,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Make svm_vmexit_spec_ctrl conditional,
patchbot
- [xen stable-4.15] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests,
patchbot
- [xen stable-4.15] xen/wait: Remove indirect jump,
patchbot
- [xen stable-4.15] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch,
patchbot
- [xen stable-4.15] VMX: tertiary execution control infrastructure,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Expose BHI_CTRL to guests,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Expose RRSBA_CTRL to guests,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Expose IPRED_CTRL to guests,
patchbot
- [xen stable-4.15] x86/spec-ctrl: Fix BTC/SRSO mitigations,
patchbot
- [xen staging] Revert "public: s/int/int32_t",
patchbot
- [xen staging] docs: arm: Update where Xen should be loaded in memory,
patchbot
- [xen staging] public: s/int/int32_t,
patchbot
- [xen master] docs/hypercall-abi: State that the hypercall page is optional,
patchbot
- [xen master] xen/gzip: Colocate gunzip code files,
patchbot
- [xen master] altcall: fix __alt_call_maybe_initdata so it's safe for livepatch,
patchbot
- [xen master] libxl: devd: Spawn QEMU for 9pfs,
patchbot
- [xen master] libxl: Use vkb=[] for HVMs,
patchbot
- [xen master] xen/include: move definition of ASM_INT() to xen/linkage.h,
patchbot
- [xen master] MAINTAINERS: Update livepatch maintainers,
patchbot
- [xen master] tools/misc: xenwatchdogd: add static qualifier,
patchbot
- [xen master] tools/misc: rework xenwatchdogd signal handling,
patchbot
- [xen master] tools/misc: xenwatchdogd: use EXIT_* constants,
patchbot
- [xen master] xen/acpi: Allow xen/acpi.h to be included on non-ACPI archs,
patchbot
- [xen master] xen/xsm: address violation of MISRA C Rule 16.2,
patchbot
- [xen master] x86/hvm: address violations of MISRA C Rule 16.2,
patchbot
- [xen master] xen/domctl: address violations of MISRA C Rule 16.2,
patchbot
- [xen master] x86/efi: tidy switch statement and address MISRA violation,
patchbot
- [xen master] x86/irq: tidy switch statement and address MISRA violation,
patchbot
- [xen master] x86/cpuid: address violation of MISRA C Rule 16.2,
patchbot
- [xen master] x86/vlapic: tidy switch statement and address MISRA violation,
patchbot
- [xen master] x86/emul: Adjust X86EMUL_OPC_EXT_MASK to placate MISRA,
patchbot
- [xen master] xen/spinlock: Adjust LOCK_DEBUG_INITVAL to placate MISRA,
patchbot
- [xen master] xen/vPCI: Remove shadowed variable,
patchbot
- [xen master] xen/nospec: Remove unreachable code,
patchbot
- [xen master] x86/hvm: Fix Misra Rule 19.1 regression,
patchbot
- [xen master] xen/virtual-region: Drop setup_virtual_regions(),
patchbot
- [xen master] xen/virtual-region: Link the list build time,
patchbot
- [xen master] xen/virtual-region: Rework how bugframe linkage works,
patchbot
- [xen master] xen/link: Introduce a common BUGFRAMES definition,
patchbot
- [xen master] x86/Kconfig: Introduce CONFIG_{AMD,INTEL} and conditionalise ucode,
patchbot
- [xen master] x86/ucode: Move vendor specifics back out of early_microcode_init(),
patchbot
- [xen master] docs/misra: document the expected sizes of integer types,
patchbot
- [xen master] MAINTAINERS: Become a reviewer of iMX8Q{M,XP} related patches,
patchbot
- [xen master] xen/drivers: imx-lpuart: Replace iMX8QM compatible with iMX8QXP,
patchbot
- [xen master] xen/arm: Add imx8q{m,x} platform glue,
patchbot
- [xen master] x86/entry: Fix build with older toolchains,
patchbot
- [xen master] x86/spec-ctrl: Support the "long" BHB loop sequence,
patchbot
- [xen master] x86/spec-ctrl: Wire up the Native-BHI software sequences,
patchbot
- [xen master] x86/spec-ctrl: Software BHB-clearing sequences,
patchbot
- [xen master] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI,
patchbot
- [xen master] x86/tsx: Expose RTM_ALWAYS_ABORT to guests,
patchbot
- [xen master] x86: Drop INDIRECT_JMP,
patchbot
- [xen master] x86: Use indirect calls in reset-stack infrastructure,
patchbot
- [xen master] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields,
patchbot
- [xen master] x86/vmx: Add support for virtualize SPEC_CTRL,
patchbot
- [xen master] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_*,
patchbot
- [xen master] x86/spec-ctrl: Simplify DO_COND_IBPB,
patchbot
- [xen master] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR},
patchbot
- [xen master] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV,
patchbot
- [xen master] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_*,
patchbot
- [xen master] x86/spec-ctrl: Rename spec_ctrl_flags to scf,
patchbot
- [xen master] x86/spec-ctrl: Fix BTC/SRSO mitigations,
patchbot
- [xen master] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests,
patchbot
- [xen master] x86/alternatives: fix .init section reference in _apply_alternatives(),
patchbot
- [xen master] hypercall_xlat_continuation: Replace BUG_ON with domain_crash,
patchbot
- [xen master] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code,
patchbot
- [xen staging] docs/misra: add Rule 16.4,
patchbot
- [xen staging] docs/misra/rules.rst: add rule 5.5,
patchbot
- [xen staging-4.15] x86/vmx: prevent fallthrough in vmx_set_reg() for handled registers,
patchbot
- [xen staging-4.15] x86/entry: Fix build with older toolchains,
patchbot
- [xen staging-4.16] x86/vmx: prevent fallthrough in vmx_set_reg() for handled registers,
patchbot
- [xen staging] docs/hypercall-abi: State that the hypercall page is optional,
patchbot
- [xen staging] xen/gzip: Colocate gunzip code files,
patchbot
- [xen staging] altcall: fix __alt_call_maybe_initdata so it's safe for livepatch,
patchbot
- [xen staging] libxl: devd: Spawn QEMU for 9pfs,
patchbot
- [xen staging] libxl: Use vkb=[] for HVMs,
patchbot
- [xen staging] xen/include: move definition of ASM_INT() to xen/linkage.h,
patchbot
- [xen staging-4.16] x86/entry: Fix build with older toolchains,
patchbot
- [xen staging-4.17] x86/entry: Fix build with older toolchains,
patchbot
- [xen staging-4.18] x86/entry: Fix build with older toolchains,
patchbot
- [xen staging] MAINTAINERS: Update livepatch maintainers,
patchbot
- [xen staging] tools/misc: xenwatchdogd: add static qualifier,
patchbot
- [xen staging] tools/misc: rework xenwatchdogd signal handling,
patchbot
- [xen staging] tools/misc: xenwatchdogd: use EXIT_* constants,
patchbot
- [xen staging] xen/acpi: Allow xen/acpi.h to be included on non-ACPI archs,
patchbot
- [xen staging] xen/xsm: address violation of MISRA C Rule 16.2,
patchbot
- [xen staging] x86/hvm: address violations of MISRA C Rule 16.2,
patchbot
- [xen staging] xen/domctl: address violations of MISRA C Rule 16.2,
patchbot
- [xen staging] x86/efi: tidy switch statement and address MISRA violation,
patchbot
- [xen staging] x86/irq: tidy switch statement and address MISRA violation,
patchbot
- [xen staging] x86/cpuid: address violation of MISRA C Rule 16.2,
patchbot
- [xen staging] x86/vlapic: tidy switch statement and address MISRA violation,
patchbot
- [xen staging] x86/emul: Adjust X86EMUL_OPC_EXT_MASK to placate MISRA,
patchbot
- [xen staging] xen/spinlock: Adjust LOCK_DEBUG_INITVAL to placate MISRA,
patchbot
- [xen staging] xen/vPCI: Remove shadowed variable,
patchbot
- [xen staging] xen/nospec: Remove unreachable code,
patchbot
- [xen staging] x86/hvm: Fix Misra Rule 19.1 regression,
patchbot
- [xen staging] xen/virtual-region: Drop setup_virtual_regions(),
patchbot
- [xen staging] xen/virtual-region: Link the list build time,
patchbot
- [xen staging] xen/virtual-region: Rework how bugframe linkage works,
patchbot
- [xen staging] xen/link: Introduce a common BUGFRAMES definition,
patchbot
- [xen stable-4.18] hypercall_xlat_continuation: Replace BUG_ON with domain_crash,
patchbot
- [xen stable-4.18] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code,
patchbot
- [xen staging] x86/Kconfig: Introduce CONFIG_{AMD,INTEL} and conditionalise ucode,
patchbot
- [xen staging] x86/ucode: Move vendor specifics back out of early_microcode_init(),
patchbot
- [xen stable-4.17] hypercall_xlat_continuation: Replace BUG_ON with domain_crash,
patchbot
- [xen stable-4.17] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code,
patchbot
- [xen stable-4.17] xen/livepatch: Fix .altinstructions safety checks,
patchbot
- [xen stable-4.17] arm/alternatives: Rename alt_instr fields which are used in common code,
patchbot
- [xen stable-4.16] hypercall_xlat_continuation: Replace BUG_ON with domain_crash,
patchbot
- [xen stable-4.16] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code,
patchbot
- [xen stable-4.15] hypercall_xlat_continuation: Replace BUG_ON with domain_crash,
patchbot
- [xen stable-4.15] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code,
patchbot
- [xen master] drivers: char: Enable OMAP UART driver for TI K3 devices,
patchbot
- [xen staging] docs/misra: document the expected sizes of integer types,
patchbot
- [xen staging] MAINTAINERS: Become a reviewer of iMX8Q{M,XP} related patches,
patchbot
- [xen staging] xen/drivers: imx-lpuart: Replace iMX8QM compatible with iMX8QXP,
patchbot
- [xen staging] xen/arm: Add imx8q{m,x} platform glue,
patchbot
- [xen staging] x86/entry: Fix build with older toolchains,
patchbot
- [xen staging-4.15] Update Xen version to 4.15.6,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Support the "long" BHB loop sequence,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Wire up the Native-BHI software sequences,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Software BHB-clearing sequences,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI,
patchbot
- [xen staging-4.15] x86/tsx: Expose RTM_ALWAYS_ABORT to guests,
patchbot
- [xen staging-4.15] x86: Drop INDIRECT_JMP,
patchbot
- [xen staging-4.15] x86: Use indirect calls in reset-stack infrastructure,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields,
patchbot
- [xen staging-4.15] x86/vmx: Add support for virtualize SPEC_CTRL,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_*,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Simplify DO_COND_IBPB,
patchbot
- [xen staging-4.15] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR},
patchbot
- [xen staging-4.15] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_*,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Rename spec_ctrl_flags to scf,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Make svm_vmexit_spec_ctrl conditional,
patchbot
- [xen staging-4.15] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests,
patchbot
- [xen staging-4.15] xen/wait: Remove indirect jump,
patchbot
- [xen staging-4.15] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch,
patchbot
- [xen staging-4.15] VMX: tertiary execution control infrastructure,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Expose BHI_CTRL to guests,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Expose RRSBA_CTRL to guests,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Expose IPRED_CTRL to guests,
patchbot
- [xen staging-4.15] x86/spec-ctrl: Fix BTC/SRSO mitigations,
patchbot
- [xen staging-4.16] Update Xen version to 4.16.6,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Support the "long" BHB loop sequence,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Wire up the Native-BHI software sequences,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Software BHB-clearing sequences,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI,
patchbot
- [xen staging-4.16] x86/tsx: Expose RTM_ALWAYS_ABORT to guests,
patchbot
- [xen staging-4.16] x86: Drop INDIRECT_JMP,
patchbot
- [xen staging-4.16] x86: Use indirect calls in reset-stack infrastructure,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields,
patchbot
- [xen staging-4.16] x86/vmx: Add support for virtualize SPEC_CTRL,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_*,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Simplify DO_COND_IBPB,
patchbot
- [xen staging-4.16] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR},
patchbot
- [xen staging-4.16] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_*,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Rename spec_ctrl_flags to scf,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Make svm_vmexit_spec_ctrl conditional,
patchbot
- [xen staging-4.16] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests,
patchbot
- [xen staging-4.16] xen/wait: Remove indirect jump,
patchbot
- [xen staging-4.16] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch,
patchbot
- [xen staging-4.16] VMX: tertiary execution control infrastructure,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Expose BHI_CTRL to guests,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Expose RRSBA_CTRL to guests,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Expose IPRED_CTRL to guests,
patchbot
- [xen staging-4.16] x86/spec-ctrl: Fix BTC/SRSO mitigations,
patchbot
- [xen staging-4.17] Release: Update CHANGELOG.md,
patchbot
- [xen staging-4.17] Update Xen version to 4.17.4,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Support the "long" BHB loop sequence,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Wire up the Native-BHI software sequences,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Software BHB-clearing sequences,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI,
patchbot
- [xen staging-4.17] x86/tsx: Expose RTM_ALWAYS_ABORT to guests,
patchbot
- [xen staging-4.17] x86: Drop INDIRECT_JMP,
patchbot
- [xen staging-4.17] x86: Use indirect calls in reset-stack infrastructure,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields,
patchbot
- [xen staging-4.17] x86/vmx: Add support for virtualize SPEC_CTRL,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_*,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Simplify DO_COND_IBPB,
patchbot
- [xen staging-4.17] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR},
patchbot
- [xen staging-4.17] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_*,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Rename spec_ctrl_flags to scf,
patchbot
- [xen staging-4.17] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests,
patchbot
- [xen staging-4.17] x86/alternatives: fix .init section reference in _apply_alternatives(),
patchbot
- [xen staging-4.17] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Move __read_mostly data into __ro_after_init,
patchbot
- [xen staging-4.17] VMX: tertiary execution control infrastructure,
patchbot
- [xen staging-4.17] x86/CPU: convert vendor hook invocations to altcall,
patchbot
- [xen staging-4.17] x86/guest: finish conversion to altcall,
patchbot
- [xen staging-4.17] x86: arrange for ENDBR zapping from <vendor>_ctxt_switch_masking(),
patchbot
- [xen staging-4.17] x86/spec-ctrl: Expose BHI_CTRL to guests,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Expose RRSBA_CTRL to guests,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Expose IPRED_CTRL to guests,
patchbot
- [xen staging-4.17] IRQ: generalize [gs]et_irq_regs(),
patchbot
- [xen staging-4.17] x86/MCE: switch some callback invocations to altcall,
patchbot
- [xen staging-4.17] x86/MCE: separate BSP-only initialization,
patchbot
- [xen staging-4.17] x86/PV: avoid indirect call for I/O emulation quirk hook,
patchbot
- [xen staging-4.17] x86/MTRR: avoid several indirect calls,
patchbot
- [xen staging-4.17] core-parking: use alternative_call(),
patchbot
- [xen staging-4.17] x86/HPET: avoid an indirect call,
patchbot
- [xen staging-4.17] cpufreq: finish conversion to altcall,
patchbot
- [xen staging-4.17] x86/APIC: finish genapic conversion to altcall,
patchbot
- [xen staging-4.17] x86/spec-ctrl: Fix BTC/SRSO mitigations,
patchbot
- [xen staging-4.18] Update CHANGELOG.md with 4.18.2 line,
patchbot
- [xen staging-4.18] Update Xen version to 4.18.2,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Support the "long" BHB loop sequence,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Wire up the Native-BHI software sequences,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Software BHB-clearing sequences,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI,
patchbot
- [xen staging-4.18] x86/tsx: Expose RTM_ALWAYS_ABORT to guests,
patchbot
- [xen staging-4.18] x86: Drop INDIRECT_JMP,
patchbot
- [xen staging-4.18] x86: Use indirect calls in reset-stack infrastructure,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields,
patchbot
- [xen staging-4.18] x86/vmx: Add support for virtualize SPEC_CTRL,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_*,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Simplify DO_COND_IBPB,
patchbot
- [xen staging-4.18] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR},
patchbot
- [xen staging-4.18] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_*,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Rename spec_ctrl_flags to scf,
patchbot
- [xen staging-4.18] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests,
patchbot
- [xen staging-4.18] x86/alternatives: fix .init section reference in _apply_alternatives(),
patchbot
- [xen staging-4.18] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Move __read_mostly data into __ro_after_init,
patchbot
- [xen staging-4.18] VMX: tertiary execution control infrastructure,
patchbot
- [xen staging-4.18] x86/CPU: convert vendor hook invocations to altcall,
patchbot
- [xen staging-4.18] x86/guest: finish conversion to altcall,
patchbot
- [xen staging-4.18] x86: arrange for ENDBR zapping from <vendor>_ctxt_switch_masking(),
patchbot
- [xen staging-4.18] x86/spec-ctrl: Expose BHI_CTRL to guests,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Expose RRSBA_CTRL to guests,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Expose IPRED_CTRL to guests,
patchbot
- [xen staging-4.18] IRQ: generalize [gs]et_irq_regs(),
patchbot
- [xen staging-4.18] x86/MCE: switch some callback invocations to altcall,
patchbot
- [xen staging-4.18] x86/MCE: separate BSP-only initialization,
patchbot
- [xen staging-4.18] x86/PV: avoid indirect call for I/O emulation quirk hook,
patchbot
- [xen staging-4.18] x86/MTRR: avoid several indirect calls,
patchbot
- [xen staging-4.18] core-parking: use alternative_call(),
patchbot
- [xen staging-4.18] x86/HPET: avoid an indirect call,
patchbot
- [xen staging-4.18] cpufreq: finish conversion to altcall,
patchbot
- [xen staging-4.18] x86/APIC: finish genapic conversion to altcall,
patchbot
- [xen staging-4.18] x86/spec-ctrl: Fix BTC/SRSO mitigations,
patchbot
- [xen staging] x86/spec-ctrl: Support the "long" BHB loop sequence,
patchbot
- [xen staging] x86/spec-ctrl: Wire up the Native-BHI software sequences,
patchbot
- [xen staging] x86/spec-ctrl: Software BHB-clearing sequences,
patchbot
- [xen staging] x86/spec-ctrl: Support BHI_DIS_S in order to mitigate BHI,
patchbot
- [xen staging] x86/tsx: Expose RTM_ALWAYS_ABORT to guests,
patchbot
- [xen staging] x86: Drop INDIRECT_JMP,
patchbot
- [xen staging] x86: Use indirect calls in reset-stack infrastructure,
patchbot
- [xen staging] x86/spec-ctrl: Widen the {xen,last,default}_spec_ctrl fields,
patchbot
- [xen staging] x86/vmx: Add support for virtualize SPEC_CTRL,
patchbot
- [xen staging] x86/spec-ctrl: Detail the safety properties in SPEC_CTRL_ENTRY_*,
patchbot
- [xen staging] x86/spec-ctrl: Simplify DO_COND_IBPB,
patchbot
- [xen staging] x86/spec_ctrl: Hold SCF in %ebx across SPEC_CTRL_ENTRY_{PV,INTR},
patchbot
- [xen staging] x86/entry: Arrange for %r14 to be STACK_END across SPEC_CTRL_ENTRY_FROM_PV,
patchbot
- [xen staging] x86/spec-ctrl: Rework conditional safety for SPEC_CTRL_ENTRY_*,
patchbot
- [xen staging] x86/spec-ctrl: Rename spec_ctrl_flags to scf,
patchbot
- [xen staging] x86/spec-ctrl: Fix BTC/SRSO mitigations,
patchbot
- [xen staging] x86/cpuid: Don't expose {IPRED,RRSBA,BHI}_CTRL to PV guests,
patchbot
- [xen staging] x86/alternatives: fix .init section reference in _apply_alternatives(),
patchbot
- [xen staging-4.15] hypercall_xlat_continuation: Replace BUG_ON with domain_crash,
patchbot
- [xen staging-4.15] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code,
patchbot
- [xen staging-4.16] hypercall_xlat_continuation: Replace BUG_ON with domain_crash,
patchbot
- [xen staging-4.16] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code,
patchbot
- [xen staging-4.17] hypercall_xlat_continuation: Replace BUG_ON with domain_crash,
patchbot
- [xen staging-4.17] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code,
patchbot
- [xen staging-4.17] xen/livepatch: Fix .altinstructions safety checks,
patchbot
- [xen staging-4.17] arm/alternatives: Rename alt_instr fields which are used in common code,
patchbot
- [xen staging-4.18] hypercall_xlat_continuation: Replace BUG_ON with domain_crash,
patchbot
- [xen staging-4.18] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code,
patchbot
- [xen staging] hypercall_xlat_continuation: Replace BUG_ON with domain_crash,
patchbot
- [xen staging] x86/HVM: clear upper halves of GPRs upon entry from 32-bit code,
patchbot
- [xen staging] drivers: char: Enable OMAP UART driver for TI K3 devices,
patchbot
- [xen master] xen/compiler: address violation of MISRA C Rule 20.9,
patchbot
- [xen master] x86/PVH: Support relocatable dom0 kernels,
patchbot
- [xen master] libelf: Store maximum PHDR p_align,
patchbot
- [xen master] xen/rwlock: raise the number of possible cpus,
patchbot
- [xen master] xen/spinlock: support higher number of cpus,
patchbot
- [xen master] xen/spinlock: let all is_locked and trylock variants return bool,
patchbot
- [xen master] xen/spinlock: split recursive spinlocks from normal ones,
patchbot
- [xen master] xen/spinlock: add missing rspin_is_locked() and rspin_barrier(),
patchbot
- [xen master] xen/spinlock: add another function level,
patchbot
- [xen master] xen/spinlock: add explicit non-recursive locking functions,
patchbot
- [xen staging] xen/compiler: address violation of MISRA C Rule 20.9,
patchbot
- [xen staging] x86/PVH: Support relocatable dom0 kernels,
patchbot
- [xen staging] libelf: Store maximum PHDR p_align,
patchbot
- [xen staging] xen/rwlock: raise the number of possible cpus,
patchbot
- [xen staging] xen/spinlock: support higher number of cpus,
patchbot
- [xen staging] xen/spinlock: let all is_locked and trylock variants return bool,
patchbot
- [xen staging] xen/spinlock: split recursive spinlocks from normal ones,
patchbot
- [xen staging] xen/spinlock: add missing rspin_is_locked() and rspin_barrier(),
patchbot
- [xen staging] xen/spinlock: add another function level,
patchbot
- [xen staging] xen/spinlock: add explicit non-recursive locking functions,
patchbot
- [xen master] MISRA C Rule 17.1 states: "The features of `<stdarg.h>' shall not be used",
patchbot
- [xen master] MISRA C:2012 Rule 17.1 states: The features of `<stdarg.h>' shall not be used,
patchbot
- [xen master] automation/eclair: add deviations for Rule 20.7,
patchbot
- [xen master] arm/public: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] x86: Address MISRA Rule 13.6,
patchbot
- [xen master] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch,
patchbot
- [xen master] char: lpuart: Drop useless variables from UART structure,
patchbot
- [xen master] drivers: char: Drop useless suspend/resume stubs in Arm drivers,
patchbot
- [xen staging] MISRA C Rule 17.1 states: "The features of `<stdarg.h>' shall not be used",
patchbot
- [xen staging] MISRA C:2012 Rule 17.1 states: The features of `<stdarg.h>' shall not be used,
patchbot
- [xen staging] automation/eclair: add deviations for Rule 20.7,
patchbot
- [xen staging] arm/public: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] x86: Address MISRA Rule 13.6,
patchbot
- [xen staging] x86/tsx: Cope with RTM_ALWAYS_ABORT vs RTM mismatch,
patchbot
- [xen master] vsprintf: address violations of MISRA C:2012 Rule 16.3,
patchbot
- [xen master] xen/sched: address violations of MISRA C:2012 Rule 16.3,
patchbot
- [xen master] tools: Move MB/GB() to common-macros.h,
patchbot
- [xen master] tools/init-xenstore-domain: Replace variable MB() usage,
patchbot
- [xen master] xen/riscv: introduce extension support check by compiler,
patchbot
- [xen master] automation: introduce fixed randconfig for RISC-V,
patchbot
- [xen staging] char: lpuart: Drop useless variables from UART structure,
patchbot
- [xen staging] drivers: char: Drop useless suspend/resume stubs in Arm drivers,
patchbot
- [xen master] docs/misra: add 13.6 to rules.rst,
patchbot
- [xen master] xen/arm: ffa: support FFA_FEATURES,
patchbot
- [xen master] xen/arm: ffa: separate rxtx buffer routines,
patchbot
- [xen master] xen/arm: ffa: separate partition info get routines,
patchbot
- [xen master] xen/arm: ffa: separate memory sharing routines,
patchbot
- [xen master] xen/arm: ffa: move common things to ffa_private.h,
patchbot
- [xen master] xen/arm: ffa: rename functions to use ffa_ prefix,
patchbot
- [xen staging] vsprintf: address violations of MISRA C:2012 Rule 16.3,
patchbot
- [xen staging] xen/sched: address violations of MISRA C:2012 Rule 16.3,
patchbot
- [xen staging] tools: Move MB/GB() to common-macros.h,
patchbot
- [xen staging] tools/init-xenstore-domain: Replace variable MB() usage,
patchbot
- [xen staging] xen/riscv: introduce extension support check by compiler,
patchbot
- [xen staging] automation: introduce fixed randconfig for RISC-V,
patchbot
- [xen master] xen/vm-event: address a violation of MISRA C:2012 Rule 16.3,
patchbot
- [xen master] xen/evtchn: address a violation of MISRA C:2012 Rule 16.3,
patchbot
- [xen master] console: address a violation of MISRA C:2012 Rule 16.3,
patchbot
- [xen master] xen/domctl: address a violation of MISRA C:2012 Rule 16.3,
patchbot
- [xen master] x86/amd: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] xen/mm: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] x86/hvm: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] x86/vPMU: address violations of MISRA C Rule 20.7,
patchbot
- [xen master] drivers/char: mark extra reserved device memory in memory map,
patchbot
- [xen staging] docs/misra: add 13.6 to rules.rst,
patchbot
- [xen staging] xen/arm: ffa: support FFA_FEATURES,
patchbot
- [xen staging] xen/arm: ffa: separate rxtx buffer routines,
patchbot
- [xen staging] xen/arm: ffa: separate partition info get routines,
patchbot
- [xen staging] xen/arm: ffa: separate memory sharing routines,
patchbot
- [xen staging] xen/arm: ffa: move common things to ffa_private.h,
patchbot
- [xen staging] xen/arm: ffa: rename functions to use ffa_ prefix,
patchbot
- [xen staging] xen/vm-event: address a violation of MISRA C:2012 Rule 16.3,
patchbot
- [xen staging] xen/evtchn: address a violation of MISRA C:2012 Rule 16.3,
patchbot
- [xen staging] console: address a violation of MISRA C:2012 Rule 16.3,
patchbot
- [xen staging] xen/domctl: address a violation of MISRA C:2012 Rule 16.3,
patchbot
- [xen staging] x86/amd: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] xen/mm: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] x86/hvm: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] x86/vPMU: address violations of MISRA C Rule 20.7,
patchbot
- [xen staging] drivers/char: mark extra reserved device memory in memory map,
patchbot
- [xen stable-4.17] tests/resource: Fix HVM guest in !SHADOW builds,
patchbot
- [xen stable-4.17] x86/boot: Support the watchdog on newer AMD systems,
patchbot
- [xen stable-4.17] x86/livepatch: Relax permissions on rodata too,
patchbot
- [xen stable-4.17] xen/virtual-region: Include rodata pointers,
patchbot
- [xen stable-4.17] xen/virtual-region: Rename the start/end fields,
patchbot
- [xen stable-4.17] x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies,
patchbot
- [xen stable-4.17] x86/cpu-policy: Hide x2APIC from PV guests,
patchbot
- [xen stable-4.18] tests/resource: Fix HVM guest in !SHADOW builds,
patchbot
- [xen stable-4.18] x86/boot: Support the watchdog on newer AMD systems,
patchbot
- [xen stable-4.18] x86/livepatch: Relax permissions on rodata too,
patchbot
- [xen stable-4.18] xen/virtual-region: Include rodata pointers,
patchbot
- [xen stable-4.18] xen/virtual-region: Rename the start/end fields,
patchbot
- [xen stable-4.18] x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies,
patchbot
- [xen stable-4.18] x86/cpu-policy: Hide x2APIC from PV guests,
patchbot
- [xen staging-4.17] tests/resource: Fix HVM guest in !SHADOW builds,
patchbot
- [xen staging-4.17] x86/boot: Support the watchdog on newer AMD systems,
patchbot
- [xen staging-4.17] x86/livepatch: Relax permissions on rodata too,
patchbot
- [xen staging-4.17] xen/virtual-region: Include rodata pointers,
patchbot
- [xen staging-4.17] xen/virtual-region: Rename the start/end fields,
patchbot
- [xen staging-4.17] x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies,
patchbot
- [xen staging-4.17] x86/cpu-policy: Hide x2APIC from PV guests,
patchbot
- [xen staging-4.18] tests/resource: Fix HVM guest in !SHADOW builds,
patchbot
- [xen staging-4.18] x86/boot: Support the watchdog on newer AMD systems,
patchbot
- [xen staging-4.18] x86/livepatch: Relax permissions on rodata too,
patchbot
- [xen staging-4.18] xen/virtual-region: Include rodata pointers,
patchbot
- [xen staging-4.18] xen/virtual-region: Rename the start/end fields,
patchbot
- [xen staging-4.18] x86/cpu-policy: Fix visibility of HTT/CMP_LEGACY in max policies,
patchbot
- [xen staging-4.18] x86/cpu-policy: Hide x2APIC from PV guests,
patchbot
Mail converted by MHonArc
|