xen-devel
Thread
Date
Later messages
Messages by Thread
RE: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
Michael Kelley
Re: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
h...@lst.de
Re: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
Petr Tesařík
RE: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
Michael Kelley
Re: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
h...@lst.de
RE: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
Michael Kelley
Re: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
h...@lst.de
Re: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
Petr Tesařík
RE: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
Michael Kelley
Re: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
h...@lst.de
RE: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
Michael Kelley
Re: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
h...@lst.de
Re: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
Petr Tesařík
Re: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
Petr Tesařík
RE: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
Michael Kelley
RE: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()
Michael Kelley
[linux-linus test] 186268: tolerable FAIL - PUSHED
osstest service owner
[ovmf test] 186267: all pass - PUSHED
osstest service owner
[for-4.19] x86 emulator session outcome
Jan Beulich
Re: [for-4.19] x86 emulator session outcome
Oleksii K.
[libvirt test] 186263: tolerable all pass - PUSHED
osstest service owner
[ovmf test] 186266: all pass - PUSHED
osstest service owner
[XEN PATCH v1] x86/intel: optional build of TSX support
Sergiy Kibrik
Re: [XEN PATCH v1] x86/intel: optional build of TSX support
Jan Beulich
Re: [XEN PATCH v1] x86/intel: optional build of TSX support
Andrew Cooper
[xen-unstable test] 186261: tolerable FAIL
osstest service owner
[linux-linus test] 186260: tolerable FAIL - PUSHED
osstest service owner
[XEN PATCH v1] x86/intel: optional build of PSR support
Sergiy Kibrik
Re: [XEN PATCH v1] x86/intel: optional build of PSR support
Jan Beulich
Re: [PATCH for-4.19? v5 09/10] xen/x86: Disallow creating domains with altp2m enabled and altp2m.nr == 0
Jan Beulich
Re: [PATCH for-4.19? v5 09/10] xen/x86: Disallow creating domains with altp2m enabled and altp2m.nr == 0
Petr Beneš
Re: [PATCH for-4.19? v5 09/10] xen/x86: Disallow creating domains with altp2m enabled and altp2m.nr == 0
Jan Beulich
[ovmf test] 186264: all pass - PUSHED
osstest service owner
Join us for day 3 - Free virtual Xen Summit 2024
Kelly Choi
[PATCH] MAINTAINERS: add an entry for tools/9pfsd
Juergen Gross
[PATCH] MAINTAINERS: add me as scheduer maintainer
Juergen Gross
Re: [PATCH] MAINTAINERS: add me as scheduer maintainer
Jan Beulich
Re: [PATCH] MAINTAINERS: add me as scheduer maintainer
Dario Faggioli
Re: [PATCH] MAINTAINERS: add me as scheduer maintainer
George Dunlap
Re: [PATCH] MAINTAINERS: add an entry for tools/9pfsd
Jürgen Groß
[ovmf test] 186262: all pass - PUSHED
osstest service owner
[ovmf test] 186259: all pass - PUSHED
osstest service owner
[linux-linus test] 186257: tolerable FAIL - PUSHED
osstest service owner
[PATCH] xen/riscv: PE/COFF image header for RISC-V target
milandjokic1995
Re: [PATCH] xen/riscv: PE/COFF image header for RISC-V target
Jan Beulich
[PATCH] xen/riscv: PE/COFF image header for RISC-V target
milandjokic1995
Re: [PATCH] xen/riscv: PE/COFF image header for RISC-V target
Jan Beulich
Re: [PATCH] xen/riscv: PE/COFF image header for RISC-V target
Jan Beulich
Re: [PATCH] xen/riscv: PE/COFF image header for RISC-V target
Milan Đokić
[no subject]
Milan Djokic
[PATCH v4] xen/riscv: PE/COFF image header for RISC-V target
Milan Djokic
Re: [PATCH v4] xen/riscv: PE/COFF image header for RISC-V target
Jan Beulich
Re: [PATCH v4] xen/riscv: PE/COFF image header for RISC-V target
Oleksii
Re: [PATCH v4] xen/riscv: PE/COFF image header for RISC-V target
Milan Đokić
Re: [PATCH v4] xen/riscv: PE/COFF image header for RISC-V target
Jan Beulich
Re: [PATCH v4] xen/riscv: PE/COFF image header for RISC-V target
Milan Đokić
Re: [PATCH v4] xen/riscv: PE/COFF image header for RISC-V target
Jan Beulich
Re: [PATCH 2/2] arch/irq: Centralise no_irq_type
Shawn Anastasio
Re: [PATCH 1/2] arch/irq: Make irq_ack_none() mandatory
Shawn Anastasio
Design session notes: guest unaware migration
Alex Brett
[ovmf test] 186256: all pass - PUSHED
osstest service owner
[PATCH v3 0/3] stdvga: fix screen blanking
Gerd Hoffmann
[PATCH v3 3/3] ui+display: rename is_buffer_shared() -> surface_is_allocated()
Gerd Hoffmann
Re: [PATCH v3 3/3] ui+display: rename is_buffer_shared() -> surface_is_allocated()
Paul Durrant
[PATCH v3 1/3] stdvga: fix screen blanking
Gerd Hoffmann
[PATCH v3 2/3] ui+display: rename is_placeholder() -> surface_is_placeholder()
Gerd Hoffmann
Re: [PATCH v3 2/3] ui+display: rename is_placeholder() -> surface_is_placeholder()
Philippe Mathieu-Daudé
Re: [PATCH v3 0/3] stdvga: fix screen blanking
Marc-André Lureau
Re: [PATCH v3 0/3] stdvga: fix screen blanking
Philippe Mathieu-Daudé
[libvirt test] 186255: tolerable all pass - PUSHED
osstest service owner
Re: [XEN PATCH v5 4/7] xen/arm: allow dynamically assigned SGI handlers
Julien Grall
Join us for day 2 - Free virtual Xen Summit 2024
Kelly Choi
Re: [PATCH v1 0/1] xen/arm: smmuv3: Mark more init-only functions with __init
Julien Grall
Re: [PATCH v1 1/1] xen/arm: smmuv3: Mark more init-only functions with __init
Julien Grall
Re: [PATCH v1 1/1] xen/arm: smmuv3: Mark more init-only functions with __init
Rahul Singh
[xen-unstable test] 186252: tolerable FAIL
osstest service owner
[ovmf test] 186254: all pass - PUSHED
osstest service owner
[linux-linus test] 186250: tolerable FAIL - PUSHED
osstest service owner
[ovmf test] 186251: all pass - PUSHED
osstest service owner
[ovmf test] 186249: all pass - PUSHED
osstest service owner
[linux-linus test] 186248: regressions - FAIL
osstest service owner
[linux-linus test] 186244: regressions - FAIL
osstest service owner
[ovmf test] 186246: all pass - PUSHED
osstest service owner
Re: [XEN PATCH] automation/eclair_analysis: add more clean MISRA guidelines
Oleksii K.
Re: [XEN PATCH] automation/eclair_analysis: add more clean MISRA guidelines
Nicola Vetrini
Re: [XEN PATCH] automation/eclair_analysis: add more clean MISRA guidelines
Oleksii K.
Re: [PATCH v4.2] xen/p2m: put reference for level 2 superpage
Julien Grall
Re: [XEN PATCH v5 7/7] xen/arm: ffa: support notification
Julien Grall
Re: [XEN PATCH v5 7/7] xen/arm: ffa: support notification
Bertrand Marquis
Re: [XEN PATCH v5 7/7] xen/arm: ffa: support notification
Jens Wiklander
Re: [PATCH for-4.19? v5 07/10] xen: Make the maximum number of altp2m views configurable for x86
Julien Grall
Re: [PATCH for-4.19? v5 07/10] xen: Make the maximum number of altp2m views configurable for x86
Jan Beulich
Re: [PATCH for-4.19? v5 07/10] xen: Make the maximum number of altp2m views configurable for x86
Petr Beneš
Re: [PATCH for-4.19? v5 07/10] xen: Make the maximum number of altp2m views configurable for x86
Jan Beulich
Re: [PATCH for-4.19? v5 07/10] xen: Make the maximum number of altp2m views configurable for x86
Petr Beneš
Re: [PATCH for-4.19? v5 07/10] xen: Make the maximum number of altp2m views configurable for x86
Jan Beulich
Re: [PATCH for-4.19? v5 07/10] xen: Make the maximum number of altp2m views configurable for x86
Petr Beneš
Re: [PATCH for-4.19? v5 07/10] xen: Make the maximum number of altp2m views configurable for x86
Jan Beulich
Re: [PATCH for-4.19? v5 07/10] xen: Make the maximum number of altp2m views configurable for x86
Petr Beneš
Re: [PATCH for-4.19? v5 07/10] xen: Make the maximum number of altp2m views configurable for x86
Petr Beneš
Re: [PATCH for-4.19? v5 07/10] xen: Make the maximum number of altp2m views configurable for x86
Jan Beulich
Re: [RFC PATCH v2] arm: dom0less: add TEE support
Julien Grall
Re: [RFC PATCH v2] arm: dom0less: add TEE support
Volodymyr Babchuk
Re: [RFC PATCH v2] arm: dom0less: add TEE support
Julien Grall
[libvirt test] 186243: tolerable all pass - PUSHED
osstest service owner
[ovmf test] 186245: all pass - PUSHED
osstest service owner
[XEN PATCH v1] x86/cpufreq: separate powernow/hwp cpufreq code
Sergiy Kibrik
Re: [XEN PATCH v1] x86/cpufreq: separate powernow/hwp cpufreq code
Jan Beulich
Re: [XEN PATCH v1] x86/cpufreq: separate powernow/hwp cpufreq code
Sergiy Kibrik
Re: [XEN PATCH v1] x86/cpufreq: separate powernow/hwp cpufreq code
Jan Beulich
Re: [XEN PATCH v1] x86/cpufreq: separate powernow/hwp cpufreq code
Sergiy Kibrik
Re: [XEN PATCH v1] x86/cpufreq: separate powernow/hwp cpufreq code
Jan Beulich
Re: [XEN PATCH v1] x86/cpufreq: separate powernow/hwp cpufreq code
Sergiy Kibrik
[ANNOUNCE] Join us TODAY! Free virtual Xen Summit 2024
Kelly Choi
[xen-unstable test] 186241: tolerable FAIL
osstest service owner
[XEN PATCH] x86/cpufreq: clean up stale powernow_cpufreq_init()
Sergiy Kibrik
Re: [XEN PATCH] x86/cpufreq: clean up stale powernow_cpufreq_init()
Jan Beulich
Re: [PATCH for-4.19? v5 00/10] x86: Make MAX_ALTP2M configurable
Christian Lindig
Re: [PATCH for-4.19? v5 06/10] x86/altp2m: Introduce accessor functions for safer array indexing
Jan Beulich
Re: [PATCH for-4.19? v5 03/10] xen: Refactor altp2m options into a structured format
Jan Beulich
Re: [PATCH for-4.19? v5 03/10] xen: Refactor altp2m options into a structured format
Julien Grall
Re: [PATCH v4 4/4] x86/ucode: Utilize ucode_force and remove opt_ucode_allow_same
Jan Beulich
Re: [PATCH v12 2/8] xen: introduce generic non-atomic test_*bit()
Jan Beulich
Re: [XEN PATCH 3/5] x86: deviate violation of MISRA C Rule 20.12
Jan Beulich
Re: [XEN PATCH 3/5] x86: deviate violation of MISRA C Rule 20.12
Nicola Vetrini
Re: [XEN PATCH 2/5] x86/domain: deviate violation of MISRA C Rule 20.12
Jan Beulich
[linux-linus test] 186239: regressions - FAIL
osstest service owner
Re: [RFC XEN PATCH v8 5/5] domctl: Add XEN_DOMCTL_gsi_permission to grant gsi
Chen, Jiqian
Re: [RFC XEN PATCH v8 5/5] domctl: Add XEN_DOMCTL_gsi_permission to grant gsi
Jan Beulich
Re: [RFC XEN PATCH v8 5/5] domctl: Add XEN_DOMCTL_gsi_permission to grant gsi
Chen, Jiqian
Re: [RFC XEN PATCH v8 5/5] domctl: Add XEN_DOMCTL_gsi_permission to grant gsi
Jan Beulich
Re: [RFC XEN PATCH v8 5/5] domctl: Add XEN_DOMCTL_gsi_permission to grant gsi
Chen, Jiqian
Re: [RFC XEN PATCH v8 5/5] domctl: Add XEN_DOMCTL_gsi_permission to grant gsi
Jan Beulich
Re: [RFC XEN PATCH v8 5/5] domctl: Add XEN_DOMCTL_gsi_permission to grant gsi
Chen, Jiqian
Re: [RFC XEN PATCH v8 5/5] domctl: Add XEN_DOMCTL_gsi_permission to grant gsi
Jan Beulich
Re: [RFC XEN PATCH v8 5/5] domctl: Add XEN_DOMCTL_gsi_permission to grant gsi
Chen, Jiqian
Re: [RFC XEN PATCH v8 5/5] domctl: Add XEN_DOMCTL_gsi_permission to grant gsi
Jan Beulich
Re: [RFC XEN PATCH v8 5/5] domctl: Add XEN_DOMCTL_gsi_permission to grant gsi
Chen, Jiqian
Re: [RFC XEN PATCH v8 5/5] domctl: Add XEN_DOMCTL_gsi_permission to grant gsi
Jan Beulich
Re: [RFC XEN PATCH v8 5/5] domctl: Add XEN_DOMCTL_gsi_permission to grant gsi
Jan Beulich
[ovmf test] 186240: all pass - PUSHED
osstest service owner
Re: vcpumask_to_pcpumask() case study
Jan Beulich
Re: vcpumask_to_pcpumask() case study
Andrew Cooper
Re: vcpumask_to_pcpumask() case study
Jan Beulich
Re: vcpumask_to_pcpumask() case study
Andrew Cooper
Re: vcpumask_to_pcpumask() case study
Jan Beulich
Re: [XEN PATCH 4/5] automation/eclair_analysis: address remaining violations of MISRA C Rule 20.12
Jan Beulich
Re: [XEN PATCH 4/5] automation/eclair_analysis: address remaining violations of MISRA C Rule 20.12
Nicola Vetrini
Re: [XEN PATCH 4/5] automation/eclair_analysis: address remaining violations of MISRA C Rule 20.12
Jan Beulich
Re: [XEN PATCH 4/5] automation/eclair_analysis: address remaining violations of MISRA C Rule 20.12
Nicola Vetrini
Re: [XEN PATCH 4/5] automation/eclair_analysis: address remaining violations of MISRA C Rule 20.12
Stefano Stabellini
Re: [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
Mickaël Salaün
Re: [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
Sean Christopherson
Re: [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation
Sean Christopherson
Re: [PATCH v8 1/8] xen: mapcache: Make MCACHE_BUCKET_SHIFT runtime configurable
Philippe Mathieu-Daudé
[PATCH v2 0/3] stdvga: fix screen blanking
Gerd Hoffmann
[PATCH v2 2/3] ui+display: rename is_buffer_shared() -> surface_is_borrowed()
Gerd Hoffmann
[PATCH v2 1/3] stdvga: fix screen blanking
Gerd Hoffmann
Re: [PATCH v2 1/3] stdvga: fix screen blanking
Marc-André Lureau
Re: [PATCH v2 1/3] stdvga: fix screen blanking
Gerd Hoffmann
Re: [PATCH v2 1/3] stdvga: fix screen blanking
Marc-André Lureau
[PATCH v2 3/3] ui+display: rename is_placeholder -> surface_is_placeholder
Gerd Hoffmann
[XEN PATCH] tools/misc: xen-hvmcrash: Inject #DF instead of overwriting RIP
Matthew Barnes
Re: [XEN PATCH] tools/misc: xen-hvmcrash: Inject #DF instead of overwriting RIP
Anthony PERARD
[XEN PATCH] tools/misc: xen-hvmcrash: Inject #DF instead of overwriting RIP
Matthew Barnes
Re: [XEN PATCH] tools/misc: xen-hvmcrash: Inject #DF instead of overwriting RIP
Andrew Cooper
Re: [XEN PATCH] tools/misc: xen-hvmcrash: Inject #DF instead of overwriting RIP
Matthew Barnes
Re: [XEN PATCH 1/5] xen/domain: deviate violation of MISRA C Rule 20.12
Nicola Vetrini
[ovmf test] 186236: all pass - PUSHED
osstest service owner
Re: [PATCH v2 0/7] hw/xen: Simplify legacy backends handling
Philippe Mathieu-Daudé
[XEN PATCH v3 16/16] x86/hvm: make AMD-V and Intel VT-x support configurable
Sergiy Kibrik
[XEN PATCH v3 15/16] x86/vmx: replace CONFIG_HVM with CONFIG_VMX in vmx.h
Sergiy Kibrik
Re: [XEN PATCH v3 15/16] x86/vmx: replace CONFIG_HVM with CONFIG_VMX in vmx.h
Jan Beulich
[XEN PATCH v3 14/16] ioreq: make arch_vcpu_ioreq_completion() an optional callback
Sergiy Kibrik
Re: [XEN PATCH v3 14/16] ioreq: make arch_vcpu_ioreq_completion() an optional callback
Julien Grall
Re: [XEN PATCH v3 14/16] ioreq: make arch_vcpu_ioreq_completion() an optional callback
Jan Beulich
Re: [XEN PATCH v3 14/16] ioreq: make arch_vcpu_ioreq_completion() an optional callback
Sergiy Kibrik
[XEN PATCH v3 13/16] x86/vpmu: guard calls to vmx/svm functions
Sergiy Kibrik
Re: [XEN PATCH v3 13/16] x86/vpmu: guard calls to vmx/svm functions
Jan Beulich
[XEN PATCH v3 12/16] x86/vmx: guard access to cpu_has_vmx_* in common code
Sergiy Kibrik
Re: [XEN PATCH v3 12/16] x86/vmx: guard access to cpu_has_vmx_* in common code
Jan Beulich
[XEN PATCH v3 11/16] x86/oprofile: guard svm specific symbols with CONFIG_SVM
Sergiy Kibrik
[XEN PATCH v3 10/16] x86/domain: guard svm specific functions with usinc_svm macro
Sergiy Kibrik
Re: [XEN PATCH v3 10/16] x86/domain: guard svm specific functions with usinc_svm macro
Jan Beulich
[XEN PATCH v3 09/16] x86/traps: guard vmx specific functions with usinc_vmx macro
Sergiy Kibrik
Re: [XEN PATCH v3 09/16] x86/traps: guard vmx specific functions with usinc_vmx macro
Jan Beulich
[XEN PATCH v3 08/16] x86/p2m: guard EPT functions with using_vmx macro
Sergiy Kibrik
Re: [XEN PATCH v3 08/16] x86/p2m: guard EPT functions with using_vmx macro
Jan Beulich
[XEN PATCH v3 07/16] x86/hvm: guard AMD-V and Intel VT-x hvm_function_table initializers
Sergiy Kibrik
Re: [XEN PATCH v3 07/16] x86/hvm: guard AMD-V and Intel VT-x hvm_function_table initializers
Jan Beulich
Re: [XEN PATCH v3 07/16] x86/hvm: guard AMD-V and Intel VT-x hvm_function_table initializers
Sergiy Kibrik
[XEN PATCH v3 06/16] x86/nestedhvm: switch to using_{svm,vmx} check
Sergiy Kibrik
Re: [XEN PATCH v3 06/16] x86/nestedhvm: switch to using_{svm,vmx} check
Jan Beulich
[XEN PATCH v3 05/16] x86: introduce using_{svm,vmx} macros
Sergiy Kibrik
Re: [XEN PATCH v3 05/16] x86: introduce using_{svm,vmx} macros
Jan Beulich
Re: [XEN PATCH v3 05/16] x86: introduce using_{svm,vmx} macros
Jan Beulich
[XEN PATCH v3 04/16] x86: introduce CONFIG_ALTP2M Kconfig option
Sergiy Kibrik
Re: [XEN PATCH v3 04/16] x86: introduce CONFIG_ALTP2M Kconfig option
Jan Beulich
Re: [XEN PATCH v3 04/16] x86: introduce CONFIG_ALTP2M Kconfig option
Sergiy Kibrik
Re: [XEN PATCH v3 04/16] x86: introduce CONFIG_ALTP2M Kconfig option
Jan Beulich
Later messages