xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-09-10 12:05:37 to 2019-09-12 05:06:46 UTC [more...]

[Xen-devel] [libvirt test] 141226: tolerable all pass - PUSHED
 2019-09-12  5:05 UTC 

[Xen-devel] [linux-linus test] 141222: regressions - FAIL
 2019-09-12  3:12 UTC 

[Xen-devel] [linux-4.9 test] 141218: regressions - FAIL
 2019-09-12  1:17 UTC 

[Xen-devel] [xen-unstable test] 141215: regressions - FAIL
 2019-09-11 22:45 UTC 

[Xen-devel] [RFC] Generating Go bindings for libxl
 2019-09-11 20:25 UTC  (11+ messages)

[Xen-devel] [PATCH 0/8] x86/cpuid: Switch to using XEN_DOMCTL_set_cpumsr_policy
 2019-09-11 20:05 UTC  (9+ messages)
` [Xen-devel] [PATCH 1/8] libx86: Introduce x86_cpu_policies_are_compatible()
` [Xen-devel] [PATCH 2/8] x86/cpuid: Split update_domain_cpuid_info() in half
` [Xen-devel] [PATCH 3/8] x86/domctl: Implement XEN_DOMCTL_set_cpumsr_policy
` [Xen-devel] [PATCH 4/8] tools/libxc: Pre-cleanup for xc_cpuid_{set, apply_policy}()
` [Xen-devel] [PATCH 5/8] tools/libxc: Rework xc_cpuid_set() to use {get, set}_cpu_policy()
` [Xen-devel] [PATCH 6/8] tools/libxc: Rework xc_cpuid_apply_policy() "
` [Xen-devel] [PATCH 7/8] x86/domctl: Drop XEN_DOMCTL_set_cpuid
` [Xen-devel] [PATCH 8/8] x86/cpuid: Enable CPUID Faulting for the control domain

[Xen-devel] [PATCH V2] arm: xen: mm: use __GPF_DMA32 for arm64
 2019-09-11 19:12 UTC  (6+ messages)

[Xen-devel] [PATCH 0/5] arch/arm: optee: fix TODOs and remove "experimental" status
 2019-09-11 18:53 UTC  (15+ messages)
` [Xen-devel] [PATCH 1/5] xen/arm: optee: impose limit on shared buffer size
` [Xen-devel] [PATCH 2/5] xen/arm: optee: check for preemption while freeing shared buffers
` [Xen-devel] [PATCH 4/5] xen/arm: optee: handle share buffer translation error
` [Xen-devel] [PATCH 5/5] xen/arm: optee: remove experimental status

[Xen-devel] [linux-4.14 test] 141211: regressions - FAIL
 2019-09-11 18:44 UTC 

[Xen-devel] [RFC 0/9] Changes to time accounting
 2019-09-11 18:01 UTC  (12+ messages)
` [Xen-devel] [RFC 1/9] schedule: Introduce per-pcpu "
` [Xen-devel] [RFC 2/9] sysctl: extend XEN_SYSCTL_getcpuinfo interface
` [Xen-devel] [RFC 3/9] xentop: show CPU load information
` [Xen-devel] [RFC 4/9] arm64: utilize time accounting
` [Xen-devel] [RFC 5/9] tacc: Introduce a lockless interface for guest time
` [Xen-devel] [RFC 6/9] sched:rtds: get guest time from time accounting code
` [Xen-devel] [RFC 7/9] tacc: Introduce a locked interface for guest time
` [Xen-devel] [RFC 8/9] sched:credit: get guest time from time accounting code
` [Xen-devel] [RFC 9/9] sched:credit2: "

[Xen-devel] [RFC PATCH V3] xen/arm: Restrict "p2m_ipa_bits" according to the IOMMU requirements
 2019-09-11 17:59 UTC 

[Xen-devel] [PATCH] xen/arm: bootfd: Fix indentation in process_multiboot_node()
 2019-09-11 17:58 UTC  (3+ messages)

[Xen-devel] [PATCH] xen/arm: setup: Relocate the Device-Tree later on in the boot
 2019-09-11 17:24 UTC  (2+ messages)

[Xen-devel] [PATCH v2 00/48] xen: add core scheduling support
 2019-09-11 17:20 UTC  (38+ messages)
` [Xen-devel] [PATCH v2 08/48] xen/sched: switch vcpu_schedule_lock to unit_schedule_lock
` [Xen-devel] [PATCH v2 10/48] xen/sched: add scheduler helpers hiding vcpu
` [Xen-devel] [PATCH v2 13/48] xen/sched: add is_running indicator to struct sched_unit
` [Xen-devel] [PATCH v2 19/48] xen: add sched_unit_pause_nosync() and sched_unit_unpause()
` [Xen-devel] [PATCH v2 20/48] xen: let vcpu_create() select processor
` [Xen-devel] [PATCH v2 26/48] xen/sched: rework and rename vcpu_force_reschedule()
` [Xen-devel] [PATCH v2 27/48] xen/sched: Change vcpu_migrate_*() to operate on schedule unit
` [Xen-devel] [PATCH v2 28/48] xen/sched: move struct task_slice into struct sched_unit
` [Xen-devel] [PATCH v2 29/48] xen/sched: add code to sync scheduling of all vcpus of a sched unit
` [Xen-devel] [PATCH v2 30/48] xen/sched: introduce unit_runnable_state()
` [Xen-devel] [PATCH v2 31/48] xen/sched: add support for multiple vcpus per sched unit where missing
` [Xen-devel] [PATCH v2 35/48] xen/sched: add fall back to idle vcpu when scheduling unit
` [Xen-devel] [PATCH v2 40/48] xen/sched: reject switching smt on/off with core scheduling active

[Xen-devel] [ovmf test] 141212: all pass - PUSHED
 2019-09-11 17:15 UTC 

[Xen-devel] [freebsd-master test] 141221: regressions - trouble: blocked/fail
 2019-09-11 16:58 UTC 

[Xen-devel] [linux-4.4 test] 141208: regressions - FAIL
 2019-09-11 16:55 UTC 

[Xen-devel] [PATCH] [RFC V2] xen/arm: Restrict "p2m_ipa_bits" according to the IOMMU requirements
 2019-09-11 16:44 UTC  (6+ messages)

[Xen-devel] [PATCH 0/3] xen: fix a potential crash in xen-bus
 2019-09-11 16:15 UTC  (5+ messages)
` [Xen-devel] [PATCH 1/3] xen / notify: introduce a new XenWatchList abstraction
` [Xen-devel] [PATCH 2/3] xen: introduce separate XenWatchList for XenDevice objects
` [Xen-devel] [PATCH 3/3] xen: perform XenDevice clean-up in XenBus watch handler

[Xen-devel] [xen-unstable-smoke test] 141228: tolerable all pass - PUSHED
 2019-09-11 16:08 UTC 

[Xen-devel] [PATCH] read grubenv and set default from saved_entry or next_entry
 2019-09-11 15:57 UTC  (8+ messages)
            ` [Xen-devel] [PATCH] read grubenv and set default from saved_entry or next_entry [and 1 more messages]

[Xen-devel] [PATCH v4 0/3] Allow get_maintainer.pl / add_maintainers.pl scripts to be called outside of xen.git
 2019-09-11 15:41 UTC  (10+ messages)
` [Xen-devel] [PATCH v4 1/3] Remove hardcoding from scripts/add_maintainers.pl
` [Xen-devel] [PATCH v4 2/3] Add V section entry to allow identification of Xen MAINTAINERS file
` [Xen-devel] [PATCH v4 3/3] Add logic to use V section entry in THE REST for identifying xen trees

[Xen-devel] [PATCH V3 0/8] iommu/arm: Add Renesas IPMMU-VMSA support + Linux's iommu_fwspec
 2019-09-11 15:29 UTC  (11+ messages)
` [Xen-devel] [PATCH V3 7/8] iommu/arm: Introduce iommu_add_dt_device API
` [Xen-devel] [PATCH V3 8/8] iommu/arm: Add Renesas IPMMU-VMSA support

[Xen-devel] [PATCH RESEND/PING 0/9] XSA-292 follow-up
 2019-09-11 15:26 UTC  (10+ messages)
` [Xen-devel] [PATCH 1/9] x86: adjust cr3_pcid() return type
` [Xen-devel] [PATCH 2/9] x86: limit the amount of TLB flushing in switch_cr3_cr4()
` [Xen-devel] [PATCH 3/9] x86/mm: honor opt_pcid also for 32-bit PV domains
` [Xen-devel] [PATCH 4/9] x86/HVM: move NOFLUSH handling out of hvm_set_cr3()
` [Xen-devel] [PATCH 5/9] x86/HVM: refuse CR3 loads with reserved (upper) bits set
` [Xen-devel] [PATCH 6/9] x86/HVM: relax shadow mode check in hvm_set_cr3()
` [Xen-devel] [PATCH 7/9] x86/HVM: cosmetics to hvm_set_cr3()
` [Xen-devel] [PATCH 8/9] x86/CPUID: drop INVPCID dependency on PCID
` [Xen-devel] [PATCH 9/9] x86: PCID is unused when !PV

[Xen-devel] [RFC PATCH 0/5] Add hypervisor sysfs-like support
 2019-09-11 15:26 UTC  (24+ messages)
` [Xen-devel] [RFC PATCH 1/5] docs: add feature document for Xen "
` [Xen-devel] [RFC PATCH 2/5] xen: add basic hypervisor filesystem support
` [Xen-devel] [RFC PATCH 3/5] libs: add libxenfs
` [Xen-devel] [RFC PATCH 4/5] tools: add xenfs tool
` [Xen-devel] [RFC PATCH 5/5] xen: add /buildinfo/config entry to hypervisor filesystem

[Xen-devel] [qemu-mainline test] 141204: regressions - FAIL
 2019-09-11 14:27 UTC 

[Xen-devel] dom0less + sched=null => broken in staging
 2019-09-11 13:53 UTC  (11+ messages)

[Xen-devel] [libvirt test] 141205: regressions - FAIL
 2019-09-11 12:21 UTC 

[Xen-devel] [linux-4.19 test] 141198: regressions - FAIL
 2019-09-11 11:59 UTC 

[Xen-devel] [PATCH v9] x86/emulate: Send vm_event from emulate
 2019-09-11 11:44 UTC  (6+ messages)

[Xen-devel] [linux-linus test] 141196: regressions - FAIL
 2019-09-11 11:01 UTC 

[Xen-devel] swiotlb-xen cleanups v4
 2019-09-11 10:45 UTC  (2+ messages)

[Xen-devel] [PATCH] tools: fix linking hypervisor includes to tools include directory
 2019-09-11 10:39 UTC  (2+ messages)

[Xen-devel] [xen-unstable-coverity test] 141220: all pass - PUSHED
 2019-09-11 10:04 UTC 

[Xen-devel] [PATCH] xen/pci: try to reserve MCFG areas earlier
 2019-09-11  9:13 UTC  (16+ messages)

[Xen-devel] [xen-unstable test] 141192: regressions - FAIL
 2019-09-11  9:05 UTC  (2+ messages)

[Xen-devel] [PATCH] x86/shadow: fold p2m page accounting into sh_min_allocation()
 2019-09-11  7:14 UTC  (2+ messages)

[Xen-devel] [linux-4.9 test] 141194: regressions - FAIL
 2019-09-11  5:28 UTC 

[Xen-devel] [linux-4.14 test] 141186: regressions - FAIL
 2019-09-11  1:22 UTC 

[Xen-devel] [linux-next test] 141160: trouble: blocked/broken
 2019-09-10 23:44 UTC 

[Xen-devel] [linux-4.4 test] 141181: regressions - FAIL
 2019-09-10 22:16 UTC 

[Xen-devel] [xen-unstable-smoke test] 141190: tolerable all pass - PUSHED
 2019-09-10 21:59 UTC 

[Xen-devel] [libvirt test] 141107: trouble: blocked/broken/pass
 2019-09-10 21:49 UTC 

[Xen-devel] [ovmf test] 141189: all pass - PUSHED
 2019-09-10 21:42 UTC 

[Xen-devel] [qemu-mainline test] 141179: regressions - FAIL
 2019-09-10 21:22 UTC 

[Xen-devel] [linux-4.19 test] 141175: trouble: blocked/broken
 2019-09-10 19:27 UTC 

[Xen-devel] [linux-linus test] 141173: trouble: blocked/broken/starved
 2019-09-10 18:52 UTC 

[Xen-devel] [linux-4.9 test] 141171: trouble: blocked/broken
 2019-09-10 18:27 UTC 

[Xen-devel] [xen-unstable test] 141172: trouble: blocked/broken
 2019-09-10 18:09 UTC 

[Xen-devel] [ovmf test] 141180: regressions - FAIL
 2019-09-10 17:24 UTC 

[Xen-devel] [xen-unstable-smoke test] 141182: regressions - FAIL
 2019-09-10 17:08 UTC 

[Xen-devel] [linux-4.14 test] 141155: trouble: blocked/broken
 2019-09-10 16:39 UTC 

[Xen-devel] [PATCH v4 1/2] sysctl/libxl: choose a sane default for HAP
 2019-09-10 15:44 UTC  (6+ messages)
` [Xen-devel] [PATCH v4 2/2] sysctl: report shadow paging capability

[Xen-devel] [PATCH] tools/ocaml: abi check: #include on x86 only
 2019-09-10 15:20 UTC  (2+ messages)

[Xen-devel] [PATCH v3 2/2] sysctl/libxl: choose a sane default for HAP
 2019-09-10 14:44 UTC  (4+ messages)
` [Xen-devel] [PATCH] fixup "

[Xen-devel] [PATCH v2 00/11] ioreq: add support for internal servers
 2019-09-10 14:40 UTC  (27+ messages)
` [Xen-devel] [PATCH v2 01/11] ioreq: fix hvm_all_ioreq_servers_add_vcpu fail path cleanup
` [Xen-devel] [PATCH v2 03/11] ioreq: switch selection and forwarding to use ioservid_t
` [Xen-devel] [PATCH v2 04/11] ioreq: add fields to allow internal ioreq servers
` [Xen-devel] [PATCH v2 05/11] ioreq: add internal ioreq initialization support
` [Xen-devel] [PATCH v2 06/11] ioreq: allow dispatching ioreqs to internal servers
` [Xen-devel] [PATCH v2 07/11] ioreq: allow registering internal ioreq server handler
` [Xen-devel] [PATCH v2 08/11] ioreq: allow decoding accesses to MMCFG regions
` [Xen-devel] [PATCH v2 09/11] vpci: register as an internal ioreq server
` [Xen-devel] [PATCH v2 10/11] ioreq: split the code to detect PCI config space accesses
` [Xen-devel] [PATCH v2 11/11] ioreq: provide support for long-running operations

[Xen-devel] [PATCH] tools/ocaml: Fix build error with CentOS 7
 2019-09-10 14:08 UTC 

[Xen-devel] [xen-unstable-smoke test] 141176: trouble: blocked/broken
 2019-09-10 13:45 UTC 

[Xen-devel] [PATCH v3 00/12] ocaml abi fixes
 2019-09-10 13:45 UTC  (19+ messages)
` [Xen-devel] [PATCH v3 03/12] tools/ocaml: Introduce xenctrl ABI build-time checks
` [Xen-devel] [PATCH v3 04/12] xen/domctl: Drop guest suffix from XEN_DOMCTL_CDF_hvm
` [Xen-devel] [PATCH v3 06/12] tools/ocaml: abi handling: Provide ocaml->C conversion/check
` [Xen-devel] [PATCH v3 10/12] tools/ocaml: abi-check: Check properly
` [Xen-devel] [PATCH v3 11/12] tools/ocaml: tools/ocaml: Add missing CDF_* values
` [Xen-devel] [PATCH v3 12/12] tools/ocaml: abi: Use formal conversion and check in more places

[Xen-devel] [linux-4.4 test] 141147: trouble: blocked/broken
 2019-09-10 13:34 UTC 

[Xen-devel] [ovmf test] 141168: trouble: blocked/broken
 2019-09-10 13:27 UTC 

[Xen-devel] [PATCH 0/3] x86: (largely) LAPIC related cleanup
 2019-09-10 13:08 UTC  (3+ messages)
` [Xen-devel] [PATCH 2/3] x86/apic: include the LDR when clearing out APIC registers

[Xen-devel] [PATCH 0/3] Remove __online_page_set_limits()
 2019-09-10 12:58 UTC  (4+ messages)

[Xen-devel] [qemu-mainline test] 141165: trouble: blocked/broken
 2019-09-10 12:14 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).