xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-04-21 14:16:09 to 2021-04-23 07:00:45 UTC [more...]

[PATCH] xen/gntdev: fix gntdev_mmap() error exit path
 2021-04-23  7:00 UTC  (3+ messages)

cleanup and fix swiotlb sizing
 2021-04-23  5:23 UTC  (9+ messages)
` [PATCH 1/7] swiotlb: pass bytes instead of nslabs to swiotlb_init_with_tbl
` [PATCH 2/7] swiotlb: use swiotlb_size_or_default in swiotlb_init
` [PATCH 3/7] swiotlb: use swiotlb_adjust_size in setup_io_tlb_npages
` [PATCH 4/7] powerpc/pseries: simplify svm_swiotlb_init
` [PATCH 5/7] MIPS/octeon: simplify swiotlb initialization
` [PATCH 6/7] swiotlb: replace default_nslabs with a byte value
` [PATCH 7/7] swiotlb: don't override the command line in swiotlb_adjust_size

kernel NULL pointer dereference in gntdev_mmap -> mmu_interval_notifier_remove
 2021-04-23  3:22 UTC  (3+ messages)

[PATCH v5 00/16] Restricted DMA
 2021-04-23  2:52 UTC  (18+ messages)
` [PATCH v5 01/16] swiotlb: Fix the type of index
` [PATCH v5 02/16] swiotlb: Refactor swiotlb init functions
` [PATCH v5 03/16] swiotlb: Refactor swiotlb_create_debugfs
` [PATCH v5 04/16] swiotlb: Add DMA_RESTRICTED_POOL
` [PATCH v5 05/16] swiotlb: Add restricted DMA pool initialization
` [PATCH v5 06/16] swiotlb: Add a new get_io_tlb_mem getter
` [PATCH v5 07/16] swiotlb: Update is_swiotlb_buffer to add a struct device argument
` [PATCH v5 08/16] swiotlb: Update is_swiotlb_active "
` [PATCH v5 09/16] swiotlb: Bounce data from/to restricted DMA pool if available
` [PATCH v5 10/16] swiotlb: Move alloc_size to find_slots
` [PATCH v5 11/16] swiotlb: Refactor swiotlb_tbl_unmap_single
` [PATCH v5 12/16] dma-direct: Add a new wrapper __dma_direct_free_pages()
` [PATCH v5 13/16] swiotlb: Add restricted DMA alloc/free support
` [PATCH v5 14/16] dma-direct: Allocate memory from restricted DMA pool if available
` [PATCH v5 15/16] dt-bindings: of: Add restricted DMA pool
` [PATCH v5 16/16] of: Add plumbing for "

[xen-4.12-testing test] 161383: regressions - FAIL
 2021-04-23  2:51 UTC 

[linux-linus test] 161371: regressions - FAIL
 2021-04-23  1:56 UTC 

[xen-unstable-smoke test] 161392: tolerable all pass - PUSHED
 2021-04-23  0:39 UTC 

[xen-unstable test] 161368: tolerable FAIL - PUSHED
 2021-04-22 22:16 UTC 

[xtf test] 161375: all pass - PUSHED
 2021-04-22 21:41 UTC 

[xen-unstable-smoke test] 161386: tolerable all pass - PUSHED
 2021-04-22 21:01 UTC 

[PATCH] xen/arm: Ensure the vCPU context is seen before clearing the _VPF_down
 2021-04-22 20:33 UTC  (12+ messages)

[qemu-mainline test] 161364: regressions - FAIL
 2021-04-22 18:45 UTC 

[PATCH 0/7] xen: Switch to using -Og for debug builds
 2021-04-22 18:20 UTC  (5+ messages)
` [PATCH 1/7] xen/arm: Make make_cpus_node() compile at -Og
` [PATCH 6/7] x86/shadow: Make _shadow_prealloc() "

[PATCH] x86/mm: fix wrong unmap call
 2021-04-22 17:42 UTC 

[PATCH v10 00/13] switch to domheap for Xen page tables
 2021-04-22 17:28 UTC  (21+ messages)
` [PATCH v10 01/13] x86/mm: rewrite virt_to_xen_l*e
` [PATCH v10 02/13] x86/mm: switch to new APIs in map_pages_to_xen
` [PATCH v10 03/13] x86/mm: switch to new APIs in modify_xen_mappings
` [PATCH v10 04/13] x86_64/mm: introduce pl2e in paging_init
` [PATCH v10 05/13] x86_64/mm: switch to new APIs "
` [PATCH v10 06/13] x86_64/mm: switch to new APIs in setup_m2p_table
` [PATCH v10 07/13] efi: use new page table APIs in copy_mapping
` [PATCH v10 08/13] efi: switch to new APIs in EFI code
` [PATCH v10 09/13] x86/smpboot: add exit path for clone_mapping()
` [PATCH v10 10/13] x86/smpboot: switch clone_mapping() to new APIs
` [PATCH v10 11/13] x86/mm: drop old page table APIs
` [PATCH v10 12/13] x86: switch to use domheap page for page tables
` [PATCH v10 13/13] x86/mm: drop _new suffix for page table APIs

[xen-unstable-smoke test] 161380: regressions - FAIL
 2021-04-22 17:12 UTC 

[xen-4.12-testing test] 161360: regressions - FAIL
 2021-04-22 16:19 UTC 

[PATCH 0/8] x86/EFI: build adjustments
 2021-04-22 16:01 UTC  (28+ messages)
` [PATCH 3/8] x86/EFI: program headers are an ELF concept
` [PATCH 4/8] x86/EFI: redo .reloc section bounds determination
` [PATCH 6/8] x86/EFI: avoid use of GNU ld's --disable-reloc-section when possible
` [PATCH 7/8] x86/EFI: keep debug info in xen.efi

[PATCH 0/3] xen: remove some checks for always present Xen features
 2021-04-22 15:51 UTC  (13+ messages)
` [PATCH 1/3] xen: check required "
` [PATCH 2/3] xen: assume XENFEAT_mmu_pt_update_preserve_ad being set for pv guests
` [PATCH 3/3] xen: assume XENFEAT_gnttab_map_avail_bits "

[PATCH v3 00/22] xvmalloc() / x86 xstate area / x86 CPUID / AMX+XFD
 2021-04-22 15:11 UTC  (25+ messages)
` [PATCH v3 01/22] mm: introduce xvmalloc() et al and use for grant table allocations
` [PATCH v3 02/22] x86/xstate: use xvzalloc() for save area allocation
` [PATCH v3 03/22] x86/xstate: re-size save area when CPUID policy changes
` [PATCH v3 04/22] x86/xstate: re-use valid_xcr0() for boot-time checks
` [PATCH v3 05/22] x86/xstate: drop xstate_offsets[] and xstate_sizes[]
` [PATCH v3 06/22] x86/xstate: replace xsave_cntxt_size and drop XCNTXT_MASK
` [PATCH v3 07/22] x86/xstate: avoid accounting for unsupported components
` [PATCH v3 08/22] x86: use xvmalloc() for extended context buffer allocations
` [PATCH v3 09/22] x86/xstate: enable AMX components
` [PATCH v3 10/22] x86/CPUID: adjust extended leaves out of range clearing
` [PATCH v3 11/22] x86/CPUID: move bounding of max_{,sub}leaf fields to library code
` [PATCH v3 12/22] x86/CPUID: enable AMX leaves
` [PATCH v3 13/22] x86: XFD enabling
` [PATCH v3 14/22] x86emul: introduce X86EMUL_FPU_{tilecfg,tile}
` [PATCH v3 15/22] x86emul: support TILERELEASE
` [PATCH v3 16/22] x86: introduce struct for TILECFG register
` [PATCH v3 17/22] x86emul: support {LD,ST}TILECFG
` [PATCH v3 18/22] x86emul: support TILEZERO
` [PATCH v3 19/22] x86emul: support TILELOADD{,T1} and TILESTORE
` [PATCH v3 20/22] x86emul: support tile multiplication insns
` [PATCH v3 21/22] x86emul: test AMX insns
` [PATCH v3 22/22] x86: permit guests to use AMX and XFD

[PATCH v3 0/2] VMX: apic access page handling adjustments
 2021-04-22 15:05 UTC  (7+ messages)
` [PATCH v4] VMX: use a single, global APIC access page

[xen-unstable-smoke test] 161377: tolerable all pass - PUSHED
 2021-04-22 14:55 UTC 

[PATCH 0/9] xen/arm64: Get rid of READ/WRITE_SYSREG32
 2021-04-22 13:40 UTC  (13+ messages)
` [PATCH 5/9] arm/mm: "
` [PATCH 6/9] arm/page: "
` [PATCH 7/9] arm/time,vtimer: "
` [PATCH 8/9] arm: Change type of hsr to register_t
` [PATCH 9/9] xen/arm64: Remove READ/WRITE_SYSREG32 helper macros

[libvirt test] 161369: regressions - FAIL
 2021-04-22 13:08 UTC 

[PATCH v4] tools: create libxensaverestore
 2021-04-22 12:46 UTC  (4+ messages)

[PATCH v3] x86/CPUID: shrink max_{,sub}leaf fields according to actual leaf contents
 2021-04-22 12:36 UTC  (4+ messages)
` Ping: "

[PATCH 00/16] Remove the direct map
 2021-04-22 12:31 UTC  (3+ messages)
` [PATCH 13/16] xen/page_alloc: add a path for xenheap when there is no "

[PATCH v2 00/21] libs/guest: new CPUID/MSR interface
 2021-04-22 12:08 UTC  (20+ messages)
` [PATCH v2 14/21] libs/guest: introduce helper to check cpu policy compatibility
` [PATCH v2 15/21] libs/guest: obtain a compatible cpu policy from two input ones

[xtf test] 161363: all pass - PUSHED
 2021-04-22 10:42 UTC 

[linux-5.4 test] 161352: tolerable FAIL - PUSHED
 2021-04-22  9:36 UTC 

[qemu-mainline bisection] complete test-amd64-i386-xl-qemuu-debianhvm-i386-xsm
 2021-04-22  9:19 UTC 

[PATCH v2 0/2] common: XSA-327 follow-up
 2021-04-22  9:19 UTC  (4+ messages)
` [PATCH v3] evtchn/fifo: don't enforce higher than necessary alignment

[PATCH v5 0/6] evtchn: (not so) recent XSAs follow-on
 2021-04-22  8:53 UTC  (4+ messages)
` Ping: "

[PATCH v4 00/14] Restricted DMA
 2021-04-22  8:20 UTC  (2+ messages)

[PATCH v2 0/3] Use Doxygen and sphinx for html documentation
 2021-04-22  8:06 UTC  (9+ messages)
` [PATCH v2 3/3] docs/doxygen: doxygen documentation for grant_table.h

[linux-linus test] 161343: regressions - FAIL
 2021-04-22  6:15 UTC 

[xen-unstable test] 161340: tolerable FAIL - PUSHED
 2021-04-22  3:54 UTC 

[qemu-mainline test] 161334: regressions - FAIL
 2021-04-21 23:19 UTC 

[RFC v2 0/7] add function support to IDL
 2021-04-21 21:28 UTC  (4+ messages)

[libvirt test] 161345: regressions - FAIL
 2021-04-21 20:51 UTC 

[xen-4.12-testing test] 161330: regressions - FAIL
 2021-04-21 20:29 UTC 

[PATCH v2 00/20] further population of xen/lib/
 2021-04-21 19:21 UTC  (23+ messages)
` [PATCH v2 01/20] lib: move memset()
` [PATCH v2 02/20] lib: move memcpy()
` [PATCH v2 03/20] lib: move memmove()
` [PATCH v2 04/20] lib: move memcmp()
` [PATCH v2 05/20] lib: move memchr()
` [PATCH v2 06/20] lib: move memchr_inv()
` [PATCH v2 07/20] lib: move strlen()
` [PATCH v2 08/20] lib: move strnlen()
` [PATCH v2 09/20] lib: move strcmp()
` [PATCH v2 10/20] lib: move strncmp()
` [PATCH v2 11/20] lib: move strlcpy()
` [PATCH v2 12/20] lib: move strlcat()
` [PATCH v2 13/20] lib: move strchr()
` [PATCH v2 14/20] lib: move strrchr()
` [PATCH v2 15/20] lib: move strstr()
` [PATCH v2 16/20] lib: move strcasecmp()
` [PATCH v2 17/20] lib: move/rename strnicmp() to strncasecmp()
` [PATCH v2 18/20] lib: move strspn()
` [PATCH v2 19/20] lib: move strpbrk()
` [PATCH v2 20/20] lib: move strsep()

[PATCH v2 0/8] assorted replacement of x[mz]alloc_bytes()
 2021-04-21 15:32 UTC  (11+ messages)
` [PATCH v2 1/8] x86/MCE: avoid effectively open-coding xmalloc_array()
` [PATCH v2 2/8] x86/HVM: "
` [PATCH v2 3/8] x86/oprofile: "
` [PATCH v2 4/8] x86/IRQ: avoid over-alignment in alloc_pirq_struct()
` [PATCH v2 5/8] EFI/runtime: avoid effectively open-coding x{m,z}alloc_array()
` [PATCH v2 6/8] kexec: avoid effectively open-coding xzalloc_flex_struct()
` [PATCH v2 7/8] video/lfb: avoid effectively open-coding xzalloc_array()
` [PATCH v2 8/8] Arm/optee: don't open-code xzalloc_flex_struct()

[PATCH] tools/xenstored: Wire properly the command line option -M/--path-max
 2021-04-21 15:07 UTC  (2+ messages)

[ovmf test] 161326: all pass - PUSHED
 2021-04-21 14:37 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).