xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-12-15 09:23:35 to 2020-12-17 09:32:06 UTC [more...]

[PATCH v3 00/15] x86: major paravirt cleanup
 2020-12-17  9:31 UTC  (4+ messages)
` [PATCH v3 01/15] x86/xen: use specific Xen pv interrupt entry for MCE
` [PATCH v3 02/15] x86/xen: use specific Xen pv interrupt entry for DF
` [PATCH v3 04/15] x86/xen: drop USERGS_SYSRET64 paravirt call

[ovmf test] 157612: regressions - FAIL
 2020-12-17  9:09 UTC 

[xen-unstable-smoke bisection] complete build-amd64-libvirt
 2020-12-17  8:29 UTC  (5+ messages)

arm32 tools/flask build failure
 2020-12-17  8:13 UTC  (3+ messages)

[PATCH v3 0/8] xen: support per-cpupool scheduling granularity
 2020-12-17  7:54 UTC  (14+ messages)
` [PATCH v3 1/8] xen/cpupool: support moving domain between cpupools with different granularity
` [PATCH v3 2/8] xen/hypfs: switch write function handles to const
` [PATCH v3 3/8] xen/hypfs: add new enter() and exit() per node callbacks

XSA-351 causing Solaris-11 systems to panic during boot
 2020-12-17  7:40 UTC  (4+ messages)

[xen-4.13-testing test] 157597: regressions - FAIL
 2020-12-17  5:52 UTC 

[xen-unstable-smoke test] 157621: tolerable all pass - PUSHED
 2020-12-17  5:08 UTC 

[xen-4.12-testing test] 157594: regressions - FAIL
 2020-12-17  5:02 UTC 

[openxt-dev] Re: Follow up on libxl-fix-reboot.patch
 2020-12-17  2:19 UTC  (6+ messages)

[linux-linus test] 157573: regressions - FAIL
 2020-12-17  1:16 UTC 

[xen-unstable test] 157568: tolerable FAIL - PUSHED
 2020-12-17  0:24 UTC 

[xen-unstable-smoke test] 157611: tolerable all pass - PUSHED
 2020-12-16 22:10 UTC 

[qemu-mainline test] 157569: regressions - FAIL
 2020-12-16 21:40 UTC 

[ovmf test] 157571: regressions - FAIL
 2020-12-16 21:07 UTC 

[GIT PULL] xen: branch for v5.11-rc1
 2020-12-16 20:16 UTC  (2+ messages)

Xen-ARM DomUs
 2020-12-16 20:13 UTC  (7+ messages)

[PATCH v2 0/4] nbd/server: Quiesce coroutines on context switch
 2020-12-16 18:31 UTC  (14+ messages)
` [PATCH v2 1/4] block: Honor blk_set_aio_context() context requirements
` [PATCH v2 2/4] block: Avoid processing BDS twice in bdrv_set_aio_context_ignore()
` [PATCH v2 4/4] block: Close block exports in two steps

[xen-unstable-smoke test] 157609: regressions - FAIL
 2020-12-16 18:23 UTC 

[libvirt test] 157593: regressions - FAIL
 2020-12-16 18:09 UTC 

[PATCH v2 00/12] x86: major paravirt cleanup
 2020-12-16 17:58 UTC  (11+ messages)

Xen Security Advisory 358 v5 (CVE-2020-29570) - FIFO event channels control block related ordering
 2020-12-16 17:04 UTC 

Xen Security Advisory 343 v5 (CVE-2020-25599) - races with evtchn_reset()
 2020-12-16 17:04 UTC 

Xen Security Advisory 322 v5 (CVE-2020-29481) - Xenstore: new domains inheriting existing node permissions
 2020-12-16 16:41 UTC 

[xen-unstable-smoke test] 157606: regressions - FAIL
 2020-12-16 15:40 UTC 

[PATCH] xen: Kconfig: remove X86_64 depends from XEN_512GB
 2020-12-16 15:08 UTC  (2+ messages)

Recent upgrade of 4.13 -> 4.14 issue
 2020-12-16 13:10 UTC  (4+ messages)

[xen-4.11-testing test] 157566: tolerable FAIL - PUSHED
 2020-12-16 12:56 UTC 

[xen-unstable-smoke test] 157600: regressions - FAIL
 2020-12-16 12:12 UTC 

[PATCH v10 00/25] tools/xenstore: support live update for xenstored
 2020-12-16 11:33 UTC  (30+ messages)
` [PATCH v10 01/25] tools/xenstore: switch barf[_perror]() to use syslog()
` [PATCH v10 02/25] tools/xenstore: make set_tdb_key() non-static
` [PATCH v10 03/25] tools/xenstore: remove unused cruft from xenstored_domain.c
` [PATCH v10 04/25] tools/libxenevtchn: add possibility to not close file descriptor on exec
` [PATCH v10 05/25] tools/xenstore: refactor XS_CONTROL handling
` [PATCH v10 06/25] tools/xenstore: add live update command to xenstore-control
` [PATCH v10 07/25] tools/xenstore: add basic live-update command parsing
` [PATCH v10 08/25] tools/xenstore: introduce live update status block
` [PATCH v10 09/25] tools/xenstore: save new binary for live update
` [PATCH v10 10/25] tools/xenstore: add command line handling "
` [PATCH v10 11/25] tools/xenstore: add the basic framework for doing the "
` [PATCH v10 12/25] tools/xenstore: allow live update only with no transaction active
` [PATCH v10 13/25] docs: update the xenstore migration stream documentation
` [PATCH v10 14/25] tools/xenstore: add include file for state structure definitions
` [PATCH v10 15/25] tools/xenstore: dump the xenstore state for live update
` [PATCH v10 16/25] tools/xenstore: handle CLOEXEC flag for local files and pipes
` [PATCH v10 17/25] tools/xenstore: split off domain introduction from do_introduce()
` [PATCH v10 18/25] tools/xenstore: evaluate the live update flag when starting
` [PATCH v10 19/25] tools/xenstore: read internal state when doing live upgrade
` [PATCH v10 20/25] tools/xenstore: add reading global state for live update
` [PATCH v10 21/25] tools/xenstore: add read connection "
` [PATCH v10 22/25] tools/xenstore: add read node "
` [PATCH v10 23/25] tools/xenstore: add read watch "
` [PATCH v10 24/25] tools/xenstore: handle dying domains in "
` [PATCH v10 25/25] tools/xenstore: activate new binary for "

[xen-4.10-testing test] 157565: tolerable FAIL - PUSHED
 2020-12-16 10:07 UTC 

[xen-unstable-coverity test] 157602: all pass - PUSHED
 2020-12-16  9:50 UTC 

[xen-unstable-smoke test] 157598: regressions - FAIL
 2020-12-16  8:28 UTC 

[PATCH v2] xen/xenbus: make xs_talkv() interruptible
 2020-12-16  8:21 UTC  (4+ messages)

[PATCH] xen: remove trailing semicolon in macro definition
 2020-12-16  7:02 UTC  (2+ messages)

[PATCH 000/141] Fix fall-through warnings for Clang
 2020-12-16  7:02 UTC  (5+ messages)
` [PATCH 058/141] xen-blkfront: "
` [PATCH 138/141] xen/manage: "

[PATCH 0/2] Remove Xen PVH dependency on PCI
 2020-12-16  7:01 UTC  (2+ messages)

[PATCH -next v2] x86/xen: Convert to DEFINE_SHOW_ATTRIBUTE
 2020-12-16  7:01 UTC  (2+ messages)

[xen-4.14-testing test] 157564: tolerable FAIL - PUSHED
 2020-12-16  6:04 UTC 

[xen-unstable-smoke test] 157590: regressions - FAIL
 2020-12-16  5:59 UTC 

[xen-4.13-testing test] 157563: regressions - FAIL
 2020-12-16  4:26 UTC 

[xen-4.12-testing test] 157562: regressions - FAIL
 2020-12-16  4:21 UTC 

[xen-unstable-smoke test] 157582: regressions - FAIL
 2020-12-16  2:52 UTC 

[xen-unstable-smoke test] 157575: regressions - FAIL
 2020-12-15 23:00 UTC 

[SPECIFICATION RFC] The firmware and bootloader log specification
 2020-12-15 20:25 UTC  (2+ messages)

[xen-unstable-smoke test] 157570: regressions - FAIL
 2020-12-15 19:50 UTC 

[RFC PATCH v2 00/15] xen/arm: port Linux LL/SC and LSE atomics helpers to Xen
 2020-12-15 19:31 UTC  (6+ messages)
` [RFC PATCH v2 08/15] xen/arm64: port Linux's arm64 atomic_ll_sc.h "
` [RFC PATCH v2 10/15] xen/arm64: port Linux's arm64 cmpxchg.h "

[linux-linus test] 157555: regressions - FAIL
 2020-12-15 18:59 UTC 

[RFC PATCH 0/6] Port Linux LL/SC and LSE atomics to Xen
 2020-12-15 18:19 UTC  (3+ messages)
` [RFC PATCH 1/6] xen/arm: Support detection of CPU features in other ID registers

[PATCH 0/6] x86/p2m: restrict more code to build just for HVM
 2020-12-15 17:05 UTC  (8+ messages)
` [PATCH 1/6] x86/p2m: tidy p2m_add_foreign() a little
` [PATCH 2/6] x86/mm: p2m_add_foreign() is HVM-only
` [PATCH 3/6] x86/p2m: set_{foreign,mmio}_p2m_entry() are HVM-only
` [PATCH 4/6] x86/p2m: {,un}map_mmio_regions() "
` [PATCH 5/6] x86/mm: the gva_to_gfn() hook is HVM-only
` [PATCH 6/6] x86/p2m: set_shared_p2m_entry() is MEM_SHARING-only

[ovmf test] 157561: regressions - FAIL
 2020-12-15 16:46 UTC 

[PATCH v2 0/4] x86: XSA-348 follow-up
 2020-12-15 16:34 UTC  (9+ messages)
` [PATCH v2 1/4] x86: verify function type (and maybe attribute) in switch_stack_and_jump()
` [PATCH v2 2/4] x86: clobber registers in switch_stack_and_jump() when !LIVEPATCH
` [PATCH v2 3/4] x86/PV: avoid double stack reset during schedule tail handling
` [PATCH v2 4/4] livepatch: adjust a stale comment

[PATCH v1 1/3] tools: allocate bitmaps in units of unsigned long
 2020-12-15 16:30 UTC  (8+ messages)
` [PATCH v1 2/3] tools: remove unused ORDER_LONG
` [PATCH v1 3/3] tools: add API to work with sevaral bits at once

[PATCH] xen: Rework WARN_ON() to return whether a warning was triggered
 2020-12-15 16:20 UTC  (7+ messages)

[qemu-mainline test] 157548: regressions - FAIL
 2020-12-15 16:15 UTC 

[xen-unstable-smoke test] 157560: tolerable all pass - PUSHED
 2020-12-15 16:12 UTC 

[PATCH v6 00/25] xl / libxl: named PCI pass-through devices
 2020-12-15 16:03 UTC  (11+ messages)
` [PATCH v6 01/25] libxl: s/pcidev/pci and remove DEFINE_DEVICE_TYPE_STRUCT_X
` [PATCH v6 02/25] xl: s/pcidev/pci where possible
` [PATCH v6 21/25] libxl: convert internal functions in libxl_pci.c
` [PATCH v6 22/25] libxl: introduce libxl_pci_bdf_assignable_add/remove/list/list_free(),
` [PATCH v6 23/25] xl: support naming of assignable devices

[PATCH] tools/xenstore: rework path length check
 2020-12-15 15:55 UTC  (3+ messages)

[PATCH] examples: Add PVH example to config example list
 2020-12-15 15:49 UTC  (2+ messages)

[PATCH v4 23/32] qdev: Move dev->realized check to qdev_property_set()
 2020-12-15 14:24 UTC  (4+ messages)

[PATCH v5 0/3] xen: add support for automatic debug key actions in case of crash
 2020-12-15 13:59 UTC  (6+ messages)
` [PATCH v5 1/3] xen/arm: add support for run_in_exception_handler()

[ovmf test] 157549: regressions - FAIL
 2020-12-15 13:07 UTC 

Xen Security Advisory 348 v3 (CVE-2020-29566) - undue recursion in x86 HVM context switch code
 2020-12-15 12:20 UTC 

Xen Security Advisory 354 v4 (CVE-2020-29487) - XAPI: guest-triggered excessive memory usage
 2020-12-15 12:20 UTC 

Xen Security Advisory 359 v3 (CVE-2020-29571) - FIFO event channels control structure ordering
 2020-12-15 12:20 UTC 

Xen Security Advisory 353 v4 (CVE-2020-29479) - oxenstored: permissions not checked on root node
 2020-12-15 12:20 UTC 

Xen Security Advisory 356 v3 (CVE-2020-29567) - infinite loop when cleaning up IRQ vectors
 2020-12-15 12:20 UTC 

Xen Security Advisory 349 v3 (CVE-2020-29568) - Frontends can trigger OOM in Backends by update a watched path
 2020-12-15 12:20 UTC 

Xen Security Advisory 358 v4 (CVE-2020-29570) - FIFO event channels control block related ordering
 2020-12-15 12:20 UTC 

Xen Security Advisory 330 v3 (CVE-2020-29485) - oxenstored memory leak in reset_watches
 2020-12-15 12:20 UTC 

Xen Security Advisory 350 v4 (CVE-2020-29569) - Use after free triggered by block frontend in Linux blkback
 2020-12-15 12:20 UTC 

Xen Security Advisory 352 v3 (CVE-2020-29486) - oxenstored: node ownership can be changed by unprivileged clients
 2020-12-15 12:20 UTC 

Xen Security Advisory 325 v3 (CVE-2020-29483) - Xenstore: guests can disturb domain cleanup
 2020-12-15 12:20 UTC 

Xen Security Advisory 322 v4 (CVE-2020-29481) - Xenstore: new domains inheriting existing node permissions
 2020-12-15 12:20 UTC 

Xen Security Advisory 324 v3 (CVE-2020-29484) - Xenstore: guests can crash xenstored via watchs
 2020-12-15 12:20 UTC 

Xen Security Advisory 323 v3 (CVE-2020-29482) - Xenstore: wrong path length check
 2020-12-15 12:20 UTC 

Xen Security Advisory 115 v4 (CVE-2020-29480) - xenstore watch notifications lacking permission checks
 2020-12-15 12:18 UTC 

[PATCH v3 0/8] xen/arm: Add support for SMMUv3 driver
 2020-12-15 11:35 UTC  (10+ messages)
` [PATCH v3 7/8] "

[linux-linus test] 157538: regressions - FAIL
 2020-12-15 10:57 UTC 

xen/evtchn: Interrupt for port 34, but apparently not enabled; per-user 00000000a86a4c1b on 5.10
 2020-12-15 10:20 UTC  (3+ messages)

[xen-unstable test] 157536: regressions - FAIL
 2020-12-15 10:19 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).