Xen-Devel Archive mirror
 help / color / mirror / Atom feed
 messages from 2023-12-04 14:19:26 to 2023-12-05 14:43:43 UTC [more...]

[BUG] Nested Virtualization Bug on x86-64 AMD CPU
 2023-12-05 14:43 UTC  (2+ messages)

[PATCH 0/2] xen: have a more generic unaligned.h header
 2023-12-05 14:37 UTC  (18+ messages)
` [PATCH 1/2] xen: make include/xen/unaligned.h usable on all architectures
` [PATCH 2/2] xen: remove asm/unaligned.h

[PATCH v2 0/6] x86/iommu: improve setup time of hwdom IOMMU
 2023-12-05 14:32 UTC  (6+ messages)
` [PATCH v2 1/6] iommu/vt-d: do not assume page table levels for quarantine domain
` [PATCH v2 2/6] amd-vi: set IOMMU page table levels based on guest reported paddr width

[PATCH v3 0/6] x86/HVM: load state checking
 2023-12-05 14:29 UTC  (7+ messages)
` [PATCH v3 2/6] x86/HVM: split restore state checking from state loading
` [PATCH v3 4/6] x86/vPIT: check values loaded from state save record

[BUG]i2c_hid_acpi broken with 4.17.2 on Framework Laptop 13 AMD
 2023-12-05 14:18 UTC  (8+ messages)

[PATCH] livepatch-build-tools: allow livepatching version.c
 2023-12-05 14:15 UTC  (2+ messages)

Clang-format configuration discussion - pt 2
 2023-12-05 14:07 UTC  (3+ messages)

[PATCH 0/5] xen/livepatch: fixes for the pre-apply / post-revert hooks
 2023-12-05 13:47 UTC  (3+ messages)
` [PATCH 1/5] xen/livepatch: register livepatch regions when loaded

[PATCH v2 0/5] xen/x86: add testing for self modifying code and livepatch
 2023-12-05 13:42 UTC  (7+ messages)
` [PATCH v2 1/5] x86/livepatch: set function alignment to ensure minimal function size
` [PATCH v2 4/5] x86/livepatch: introduce a basic live patch test to gitlab CI

[RFC PATCH] xen/arm: Add emulation of Debug Data Transfer Registers
 2023-12-05 13:40 UTC  (11+ messages)

[PATCH v2] x86/DMI: adjustments to comply with Misra C:2012 Rule 9.3
 2023-12-05 13:35 UTC 

SAF-* comment at the end of the line
 2023-12-05 13:22 UTC 

[xen-unstable-smoke test] 183994: tolerable all pass - PUSHED
 2023-12-05 13:15 UTC 

[PATCH -next RFC 00/14] block: don't access bd_inode directly from other modules
 2023-12-05 12:39 UTC  (15+ messages)
` [PATCH -next RFC 01/14] block: add some bdev apis
` [PATCH -next RFC 02/14] xen/blkback: use bdev api in xen_update_blkif_status()
` [PATCH -next RFC 03/14] bcache: use bdev api in read_super()
` [PATCH -next RFC 04/14] mtd: block2mtd: use bdev apis
` [PATCH -next RFC 05/14] s390/dasd: use bdev api in dasd_format()
` [PATCH -next RFC 06/14] scsicam: use bdev api in scsi_bios_ptable()
` [PATCH -next RFC 07/14] bcachefs: remove dead function bdev_sectors()
` [PATCH -next RFC 08/14] btrfs: use bdev apis
` [PATCH -next RFC 09/14] cramfs: use bdev apis in cramfs_blkdev_read()
` [PATCH -next RFC 10/14] erofs: use bdev api
` [PATCH -next RFC 11/14] ext4: use bdev apis
` [PATCH -next RFC 12/14] jbd2: "
` [PATCH -next RFC 13/14] gfs2: use bdev api
` [PATCH -next RFC 14/14] nilfs2: use bdev api in nilfs_attach_log_writer()

xen | Failed pipeline for staging | ff117806
 2023-12-05 12:45 UTC 

[PATCH v13 00/35] x86: enable FRED for x86-64
 2023-12-05 12:25 UTC  (37+ messages)
` [PATCH v13 01/35] x86/cpufeatures,opcode,msr: Add the WRMSRNS instruction support
` [PATCH v13 02/35] x86/entry: Remove idtentry_sysvec from entry_{32,64}.S
` [PATCH v13 03/35] x86/trapnr: Add event type macros to <asm/trapnr.h>
` [PATCH v13 04/35] Documentation/x86/64: Add a documentation for FRED
` [PATCH v13 05/35] x86/fred: Add Kconfig option for FRED (CONFIG_X86_FRED)
` [PATCH v13 06/35] x86/cpufeatures: Add the CPU feature bit for FRED
` [PATCH v13 07/35] x86/fred: Disable FRED support if CONFIG_X86_FRED is disabled
` [PATCH v13 08/35] x86/fred: Disable FRED by default in its early stage
` [PATCH v13 09/35] x86/opcode: Add ERET[US] instructions to the x86 opcode map
` [PATCH v13 10/35] x86/objtool: Teach objtool about ERET[US]
` [PATCH v13 11/35] x86/cpu: Add X86_CR4_FRED macro
` [PATCH v13 12/35] x86/cpu: Add MSR numbers for FRED configuration
` [PATCH v13 13/35] x86/ptrace: Cleanup the definition of the pt_regs structure
` [PATCH v13 14/35] x86/ptrace: Add FRED additional information to "
` [PATCH v13 15/35] x86/fred: Add a new header file for FRED definitions
` [PATCH v13 16/35] x86/fred: Reserve space for the FRED stack frame
` [PATCH v13 17/35] x86/fred: Update MSR_IA32_FRED_RSP0 during task switch
` [PATCH v13 18/35] x86/fred: Disallow the swapgs instruction when FRED is enabled
` [PATCH v13 19/35] x86/fred: No ESPFIX needed "
` [PATCH v13 20/35] x86/fred: Allow single-step trap and NMI when starting a new task
` [PATCH v13 21/35] x86/fred: Make exc_page_fault() work for FRED
` [PATCH v13 22/35] x86/idtentry: Incorporate definitions/declarations of the FRED entries
` [PATCH v13 23/35] x86/fred: Add a debug fault entry stub for FRED
` [PATCH v13 24/35] x86/fred: Add a NMI "
` [PATCH v13 25/35] x86/fred: Add a machine check "
` [PATCH v13 26/35] x86/fred: FRED entry/exit and dispatch code
` [PATCH v13 27/35] x86/traps: Add sysvec_install() to install a system interrupt handler
` [PATCH v13 28/35] x86/fred: Let ret_from_fork_asm() jmp to asm_fred_exit_user when FRED is enabled
` [PATCH v13 29/35] x86/fred: Fixup fault on ERETU by jumping to fred_entrypoint_user
` [PATCH v13 30/35] x86/entry/calling: Allow PUSH_AND_CLEAR_REGS being used beyond actual entry code
` [PATCH v13 31/35] x86/entry: Add fred_entry_from_kvm() for VMX to handle IRQ/NMI
` [PATCH v13 32/35] KVM: VMX: Call fred_entry_from_kvm() for IRQ/NMI handling
` [PATCH v13 33/35] x86/syscall: Split IDT syscall setup code into idt_syscall_init()
` [PATCH v13 34/35] x86/fred: Add FRED initialization functions
` [PATCH v13 35/35] x86/fred: Invoke FRED initialization code to enable FRED

[XEN PATCH 0/6] xen: address violations of MISRA C:2012 Rule 8.2
 2023-12-05 11:55 UTC  (7+ messages)
` [XEN PATCH 1/6] xen/acpi: address remaining "
` [XEN PATCH 2/6] x86/mm: address "
` [XEN PATCH 3/6] AMD/IOMMU: "
` [XEN PATCH 4/6] x86/page: "
` [XEN PATCH 5/6] x86/mce: "
` [XEN PATCH 6/6] xen/pci: "

[PATCH] xen: update PV-device interface headers
 2023-12-05 11:51 UTC 

[RFC XEN PATCH] xen/arm: ffa: reclaim shared memory on guest destroy
 2023-12-05 11:49 UTC  (7+ messages)

[PATCH] config: update Mini-OS commit
 2023-12-05 11:38 UTC  (2+ messages)

[PATCH v6 0/5] Kconfig for PCI passthrough on ARM
 2023-12-05 11:08 UTC  (8+ messages)
` [PATCH v6 4/5] [FUTURE] xen/arm: enable vPCI for domUs

[RFC KERNEL PATCH v2 0/3] Support device passthrough when dom0 is PVH on Xen
 2023-12-05 10:32 UTC  (21+ messages)
` [RFC KERNEL PATCH v2 1/3] xen/pci: Add xen_reset_device_state function
` [RFC KERNEL PATCH v2 2/3] xen/pvh: Unmask irq for passthrough device in PVH dom0

[linux-linus test] 183989: regressions - FAIL
 2023-12-05  8:56 UTC 

[PATCH] xen/domain: fix error path in domain_create()
 2023-12-05  8:26 UTC  (2+ messages)

[ovmf test] 183991: all pass - PUSHED
 2023-12-05  7:53 UTC 

[PATCH v11 00/17] PCI devices passthrough on Arm, part 3
 2023-12-05  7:42 UTC  (16+ messages)
` [PATCH v11 09/17] rangeset: add rangeset_empty() function
` [PATCH v11 06/17] vpci/header: rework exit path in init_bars
` [PATCH v11 12/17] vpci/header: emulate PCI_COMMAND register for guests
` [PATCH v11 16/17] xen/arm: vpci: permit access to guest vpci space
      ` [PATCH v11.1 "
      ` [PATCH v11.2 "

[PATCH] CODING_STYLE: Add a section of the naming convention
 2023-12-05  7:41 UTC  (5+ messages)

[PATCH] sched: correct sched_move_domain()'s cleanup path
 2023-12-05  7:26 UTC  (10+ messages)

[PATCH v2 00/29] tools: enable xenstore-stubdom to use 9pfs
 2023-12-05  6:32 UTC  (4+ messages)
` [PATCH v2 05/29] tools/xenlogd: add 9pfs response generation support

Trying add smt=off disabled cores to cpupool crash xen
 2023-12-05  6:21 UTC  (8+ messages)

[RFC XEN PATCH v2 0/3] Support device passthrough when dom0 is PVH on Xen
 2023-12-05  5:49 UTC  (10+ messages)
` [RFC XEN PATCH v2 1/3] xen/vpci: Clear all vpci status of device

Informal voting proposal
 2023-12-05  1:31 UTC  (2+ messages)

INFORMAL VOTE REQUIRED - DOCUMENTATION WORDING
 2023-12-04 23:51 UTC  (7+ messages)

[XEN PATCH 0/7] address some violations of MISRA C Rule 8.4
 2023-12-04 23:19 UTC  (16+ messages)
` [XEN PATCH 6/7] xen/x86: remove stale comment
` [XEN PATCH 7/7] xen/page_alloc: deviate first_valid_mfn for MISRA C Rule 8.4

[XEN PATCH] docs/misra: deviate deliberately unused labels
 2023-12-04 23:16 UTC  (2+ messages)

[XEN PATCH v2 0/3] xen: address violations of MISRA C:2012 Rule 13.1
 2023-12-04 23:13 UTC  (5+ messages)
` [XEN PATCH v2 1/3] automation/eclair: tag function calls to "

[PATCH v10 0/2] vPCI capabilities filtering
 2023-12-04 21:09 UTC  (3+ messages)
` [PATCH v10 1/2] xen/vpci: header: status register handler
` [PATCH v10 2/2] xen/vpci: header: filter PCI capabilities

[ANNOUNCE] Call for agenda items for YYY Community Call @ 1500 UTC
 2023-12-04 19:34 UTC  (3+ messages)
  ` [ANNOUNCE] Call for agenda items for 7 DECEMBER Community Call @ 1600 UTC

[PATCH v3] xen: address violations of MISRA C:2012 Rule 11.8
 2023-12-04 17:28 UTC  (4+ messages)

[linux-linus test] 183984: regressions - FAIL
 2023-12-04 17:23 UTC 

[PATCH v2 0/3] xen/sched: fixes and cleanup related to cpupools
 2023-12-04 16:56 UTC  (6+ messages)
` [PATCH v2 1/3] xen/sched: fix adding offline cpu to cpupool
` [PATCH v2 2/3] xen/sched: fix sched_move_domain()
` [PATCH v2 3/3] xen/sched: do some minor cleanup of sched_move_domain()

[XEN PATCH 0/2] x86/p2m: address a violation of MISRA C:2012 Rule 8.3
 2023-12-04 16:45 UTC  (8+ messages)
` [XEN PATCH 1/2] x86/p2m: preparation work for xenmem_add_to_physmap_one()
` [XEN PATCH 2/2] x86/p2m: address a violation of MISRA C:2012 Rule 8.3

[PATCH 00/12] aio: remove AioContext lock
 2023-12-04 15:28 UTC  (14+ messages)
` [PATCH 01/12] virtio-scsi: replace AioContext lock with tmf_bh_lock
` [PATCH 05/12] block: remove AioContext locking
` [PATCH 06/12] scsi: "

[PATCH v4 3/6] xen: decouple generic xen code from legacy backends codebase
 2023-12-04 14:50 UTC  (2+ messages)

[linux-linus test] 183981: regressions - FAIL
 2023-12-04 14:49 UTC  (4+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).