xen-devel
Thread
Date
Later messages
Messages by Thread
Re: [PATCH v2] automation: upgrade Yocto to scarthgap
Stefano Stabellini
Re: [PATCH v2] automation: upgrade Yocto to scarthgap
Andrew Cooper
Re: [PATCH 06/22] x86/mm: introduce a local domain variable to write_ptbase()
Andrew Cooper
[ovmf test] 187055: all pass - PUSHED
osstest service owner
Re: [PATCH 05/22] x86/mm: make virt_to_xen_l1e() static
Andrew Cooper
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Andrew Cooper
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Chen, Jiqian
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Chen, Jiqian
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Jan Beulich
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Roger Pau Monné
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Jan Beulich
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Roger Pau Monné
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Jan Beulich
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Roger Pau Monné
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Jan Beulich
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Roger Pau Monné
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Jan Beulich
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Roger Pau Monné
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Jan Beulich
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Roger Pau Monné
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Chen, Jiqian
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Roger Pau Monné
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Chen, Jiqian
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Roger Pau Monné
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Chen, Jiqian
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Jan Beulich
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Jan Beulich
Re: [XEN PATCH v12 2/7] x86/pvh: Allow (un)map_pirq when dom0 is PVH
Chen, Jiqian
[PATCH] x86/APIC: Drop APIC_BASE and use fix_to_virt()
Andrew Cooper
Re: [PATCH] x86/APIC: Drop APIC_BASE and use fix_to_virt()
Jan Beulich
Re: [PATCH] x86/APIC: Drop APIC_BASE and use fix_to_virt()
Andrew Cooper
[PATCH] x86: drop Xeon Phi support
Jan Beulich
Re: [PATCH] x86: drop Xeon Phi support
oleksii . kurochko
Re: [PATCH] x86: drop Xeon Phi support
Roger Pau Monné
Re: [PATCH] x86: drop Xeon Phi support
Jan Beulich
Re: [PATCH] xen: introduce xen_vring_use_dma
Amneesh Singh
Re: [PATCH] xen: introduce xen_vring_use_dma
Stefano Stabellini
[PATCH] SUPPORT.md: split XSM from Flask
Jan Beulich
Re: [PATCH] SUPPORT.md: split XSM from Flask
Daniel Smith
Re: [PATCH] SUPPORT.md: split XSM from Flask
Jan Beulich
Re: [PATCH] SUPPORT.md: split XSM from Flask
Daniel Smith
Re: [PATCH] SUPPORT.md: split XSM from Flask
Jan Beulich
Re: [PATCH] SUPPORT.md: split XSM from Flask
Andrew Cooper
Re: [PATCH] SUPPORT.md: split XSM from Flask
Jan Beulich
Re: [PATCH] SUPPORT.md: split XSM from Flask
Daniel Smith
Re: [PATCH] SUPPORT.md: split XSM from Flask
Jan Beulich
[XEN PATCH v5 00/13] x86: make CPU virtualisation support configurable
Sergiy Kibrik
[XEN PATCH v5 01/13] x86: introduce AMD-V and Intel VT-x Kconfig options
Sergiy Kibrik
[XEN PATCH v5 02/13] x86/monitor: guard altp2m usage
Sergiy Kibrik
Re: [XEN PATCH v5 02/13] x86/monitor: guard altp2m usage
Tamas K Lengyel
[XEN PATCH v5 03/13] x86: introduce CONFIG_ALTP2M Kconfig option
Sergiy Kibrik
[XEN PATCH v5 04/13] x86: introduce using_{svm,vmx}() helpers
Sergiy Kibrik
[XEN PATCH v5 05/13] x86/p2m: guard EPT functions with using_vmx() check
Sergiy Kibrik
[XEN PATCH v5 06/13] x86/traps: guard vmx specific functions with usinc_vmx() check
Sergiy Kibrik
[XEN PATCH v5 07/13] x86/PV: guard svm specific functions with usinc_svm() check
Sergiy Kibrik
[XEN PATCH v5 08/13] x86/oprofile: guard svm specific symbols with CONFIG_AMD_SVM
Sergiy Kibrik
[XEN PATCH v5 09/13] x86/vmx: guard access to cpu_has_vmx_* in common code
Sergiy Kibrik
Re: [XEN PATCH v5 09/13] x86/vmx: guard access to cpu_has_vmx_* in common code
Jan Beulich
Re: [XEN PATCH v5 09/13] x86/vmx: guard access to cpu_has_vmx_* in common code
Sergiy Kibrik
Re: [XEN PATCH v5 09/13] x86/vmx: guard access to cpu_has_vmx_* in common code
Jan Beulich
[XEN PATCH v5 10/13] x86/vpmu: guard calls to vmx/svm functions
Sergiy Kibrik
Re: [XEN PATCH v5 10/13] x86/vpmu: guard calls to vmx/svm functions
Jan Beulich
Re: [XEN PATCH v5 10/13] x86/vpmu: guard calls to vmx/svm functions
Sergiy Kibrik
[XEN PATCH v5 11/13] ioreq: do not build arch_vcpu_ioreq_completion() for non-VMX configurations
Sergiy Kibrik
Re: [XEN PATCH v5 11/13] ioreq: do not build arch_vcpu_ioreq_completion() for non-VMX configurations
Jan Beulich
Re: [XEN PATCH v5 11/13] ioreq: do not build arch_vcpu_ioreq_completion() for non-VMX configurations
Sergiy Kibrik
[XEN PATCH v5 12/13] x86/vmx: replace CONFIG_HVM with CONFIG_INTEL_VMX in vmx.h
Sergiy Kibrik
[XEN PATCH v5 13/13] x86/hvm: make AMD-V and Intel VT-x support configurable
Sergiy Kibrik
Re: [XEN PATCH v5 13/13] x86/hvm: make AMD-V and Intel VT-x support configurable
Jan Beulich
Re: [XEN PATCH v5 13/13] x86/hvm: make AMD-V and Intel VT-x support configurable
Sergiy Kibrik
Re: [XEN PATCH v5 13/17] xen: add deviations for MISRA C 2012 Dir D4.10
Jan Beulich
Re: [XEN PATCH v5 13/17] xen: add deviations for MISRA C 2012 Dir D4.10
Nicola Vetrini
[linux-linus test] 187046: regressions - FAIL
osstest service owner
[PATCH] bunzip2: fix rare decompression failure
Ross Lagerwall
Re: [PATCH] bunzip2: fix rare decompression failure
Jan Beulich
Re: [PATCH] bunzip2: fix rare decompression failure
Ross Lagerwall
[ovmf test] 187052: all pass - PUSHED
osstest service owner
[KEXEC] Lacking documentation and kexec failure with Xen 4.19-rc4 and 4.20-dev on linux host
A Kundu
Re: kexec failure with Xen 4.19-rc4 and 4.20-dev on linux host
A Kundu
Re: kexec failure with Xen 4.19-rc4 and 4.20-dev on linux host
Jan Beulich
Re: kexec failure with Xen 4.19-rc4 and 4.20-dev on linux host
A Kundu
Re: kexec failure with Xen 4.19-rc4 and 4.20-dev on linux host
Jan Beulich
Re: kexec failure with Xen 4.19-rc4 and 4.20-dev on linux host
Juergen Gross
Re: kexec failure with Xen 4.19-rc4 and 4.20-dev on linux host
Jan Beulich
Re: [KEXEC] Lacking documentation and kexec failure with Xen 4.19-rc4 and 4.20-dev on linux host
Juergen Gross
Missing documentation and kexec failure with Xen 4.19-rc4 and 4.20-dev on Linux host
A Kundu
[ovmf test] 187049: all pass - PUSHED
osstest service owner
[xen-unstable test] 187045: tolerable FAIL - PUSHED
osstest service owner
[xen-4.19-testing test] 187044: tolerable FAIL - PUSHED
osstest service owner
[ovmf test] 187047: all pass - PUSHED
osstest service owner
Re: [PATCH] tools/xl: add suspend-to-ram and resume subcommands
zithro
Re: [PATCH] tools/xl: add suspend-to-ram and resume subcommands
zithro
Re: [PATCH] tools/xl: add suspend-to-ram and resume subcommands
Jan Beulich
Re: [PATCH] tools/xl: add suspend-to-ram and resume subcommands
Jason Andryuk
Re: [XEN PATCH v5 7/8] x86/mm: add defensive return
Stefano Stabellini
Re: [XEN PATCH v5 7/8] x86/mm: add defensive return
Stefano Stabellini
Re: [XEN PATCH v5 7/8] x86/mm: add defensive return
Jan Beulich
Re: [XEN PATCH v5 7/8] x86/mm: add defensive return
Roger Pau Monné
Re: [XEN PATCH v5 7/8] x86/mm: add defensive return
Andrew Cooper
Re: [XEN PATCH v5 7/8] x86/mm: add defensive return
Roger Pau Monné
Re: [PATCH v2] x86/shutdown: change default reboot method preference
Marek Marczykowski-Górecki
Re: [PATCH v1] automation: add x86_64 xilinx smoke test
Stefano Stabellini
[linux-linus test] 187041: regressions - FAIL
osstest service owner
[xen-unstable-smoke test] 187043: tolerable all pass - PUSHED
osstest service owner
[ovmf test] 187042: all pass - PUSHED
osstest service owner
Re: [PATCH v11 4/5] xen/riscv: enable GENERIC_BUG_FRAME
oleksii . kurochko
Re: [PATCH v11 4/5] xen/riscv: enable GENERIC_BUG_FRAME
oleksii . kurochko
Re: [PATCH v11 4/5] xen/riscv: enable GENERIC_BUG_FRAME
Jan Beulich
Re: [PATCH v11 4/5] xen/riscv: enable GENERIC_BUG_FRAME
oleksii . kurochko
Re: [PATCH v11 4/5] xen/riscv: enable GENERIC_BUG_FRAME
Jan Beulich
Re: [PATCH v11 4/5] xen/riscv: enable GENERIC_BUG_FRAME
oleksii . kurochko
Re: [PATCH v11 4/5] xen/riscv: enable GENERIC_BUG_FRAME
Jan Beulich
Re: [PATCH v11 4/5] xen/riscv: enable GENERIC_BUG_FRAME
oleksii . kurochko
Re: [RFC XEN PATCH v12 6/7] tools: Add new function to get gsi from dev
Anthony PERARD
Re: [RFC XEN PATCH v12 6/7] tools: Add new function to get gsi from dev
Roger Pau Monné
Re: [RFC XEN PATCH v12 6/7] tools: Add new function to get gsi from dev
Chen, Jiqian
[PATCH] XSM/domctl: Fix permission checks on XEN_DOMCTL_createdomain
Andrew Cooper
Re: [PATCH] XSM/domctl: Fix permission checks on XEN_DOMCTL_createdomain
Jan Beulich
Re: [PATCH] XSM/domctl: Fix permission checks on XEN_DOMCTL_createdomain
Daniel Smith
Re: [PATCH v3 7/9] xen/riscv: introduce and init SBI RFENCE extension
Jan Beulich
Re: [PATCH v3 7/9] xen/riscv: introduce and init SBI RFENCE extension
oleksii . kurochko
Re: [PATCH v3 7/9] xen/riscv: introduce and init SBI RFENCE extension
Jan Beulich
Re: [PATCH v3 7/9] xen/riscv: introduce and init SBI RFENCE extension
oleksii . kurochko
Re: [PATCH v3 7/9] xen/riscv: introduce and init SBI RFENCE extension
Jan Beulich
Re: [PATCH v3 7/9] xen/riscv: introduce and init SBI RFENCE extension
oleksii . kurochko
Re: [PATCH v3 7/9] xen/riscv: introduce and init SBI RFENCE extension
Jan Beulich
Re: [PATCH 03/22] x86/dom0: only disable SMAP for the PV dom0 build
Andrew Cooper
Re: [PATCH 03/22] x86/dom0: only disable SMAP for the PV dom0 build
Roger Pau Monné
Re: [PATCH 03/22] x86/dom0: only disable SMAP for the PV dom0 build
Andrew Cooper
Re: [PATCH 03/22] x86/dom0: only disable SMAP for the PV dom0 build
Roger Pau Monné
Re: [PATCH 03/22] x86/dom0: only disable SMAP for the PV dom0 build
Andrew Cooper
Re: [PATCH 03/22] x86/dom0: only disable SMAP for the PV dom0 build
Roger Pau Monné
Re: [PATCH 03/22] x86/dom0: only disable SMAP for the PV dom0 build
Andrew Cooper
Re: [PATCH 03/22] x86/dom0: only disable SMAP for the PV dom0 build
Roger Pau Monné
Re: [PATCH 22/22] x86/mm: zero stack on stack switch or reset
Andrew Cooper
Re: [PATCH 22/22] x86/mm: zero stack on stack switch or reset
Roger Pau Monné
Re: [PATCH 22/22] x86/mm: zero stack on stack switch or reset
Jan Beulich
Re: [PATCH v3 6/9] xen/riscv: introduce functionality to work with cpu info
Jan Beulich
Re: [PATCH v3 6/9] xen/riscv: introduce functionality to work with cpu info
oleksii . kurochko
Re: [PATCH v3 6/9] xen/riscv: introduce functionality to work with cpu info
Jan Beulich
[PATCH v5] libxl: Enable stubdom cdrom changing
Jason Andryuk
[XEN PATCH v6] tools/lsevtchn: Use errno macro to handle hypercall error cases
Matthew Barnes
Re: [XEN PATCH v6] tools/lsevtchn: Use errno macro to handle hypercall error cases
Anthony PERARD
[XEN PATCH v5] tools/lsevtchn: Use errno macro to handle hypercall error cases
Matthew Barnes
Re: [XEN PATCH v5] tools/lsevtchn: Use errno macro to handle hypercall error cases
Jan Beulich
Re: [PATCH v4] libxl: Enable stubdom cdrom changing
Anthony PERARD
Re: [PATCH v4] libxl: Enable stubdom cdrom changing
Jason Andryuk
Re: [PATCH v3 5/9] xen/riscv: introduce asm/pmap.h header
Jan Beulich
Re: [PATCH v3 5/9] xen/riscv: introduce asm/pmap.h header
oleksii . kurochko
Re: [PATCH v3 5/9] xen/riscv: introduce asm/pmap.h header
Jan Beulich
Re: [PATCH v3 5/9] xen/riscv: introduce asm/pmap.h header
oleksii . kurochko
Re: [PATCH v3 5/9] xen/riscv: introduce asm/pmap.h header
Jan Beulich
Re: [PATCH v3 5/9] xen/riscv: introduce asm/pmap.h header
oleksii . kurochko
[PATCH 0/3] Stack checking on Arm
Stewart Hildebrand
[PATCH 1/3] xen: add no_instrument_function attributes
Stewart Hildebrand
Re: [PATCH 1/3] xen: add no_instrument_function attributes
Jan Beulich
Re: [PATCH 1/3] xen: add no_instrument_function attributes
Stewart Hildebrand
Re: [PATCH 1/3] xen: add no_instrument_function attributes
Jan Beulich
[PATCH 2/3] xen: silence maybe-unitialized warning
Stewart Hildebrand
Re: [PATCH 2/3] xen: silence maybe-unitialized warning
Jürgen Groß
Re: [PATCH 2/3] xen: silence maybe-unitialized warning
Stewart Hildebrand
Re: [PATCH 2/3] xen: silence maybe-unitialized warning
Jürgen Groß
[PATCH 3/3] xen/arm: stack check instrumentation
Stewart Hildebrand
Re: [PATCH 3/3] xen/arm: stack check instrumentation
Jan Beulich
Re: [PATCH 3/3] xen/arm: stack check instrumentation
Julien Grall
Re: [PATCH 3/3] xen/arm: stack check instrumentation
Jan Beulich
Re: [PATCH 3/3] xen/arm: stack check instrumentation
Stewart Hildebrand
Re: [PATCH 3/3] xen/arm: stack check instrumentation
Julien Grall
Re: [PATCH 3/3] xen/arm: stack check instrumentation
Stewart Hildebrand
Re: [PATCH 3/3] xen/arm: stack check instrumentation
Julien Grall
Re: [PATCH 3/3] xen/arm: stack check instrumentation
Stewart Hildebrand
Re: [PATCH 3/3] xen/arm: stack check instrumentation
Julien Grall
Re: [PATCH 3/3] xen/arm: stack check instrumentation
Stewart Hildebrand
Re: [PATCH 0/3] Stack checking on Arm
Julien Grall
Re: [PATCH 0/3] Stack checking on Arm
Julien Grall
Re: [PATCH 0/3] Stack checking on Arm
Stefano Stabellini
Re: [PATCH 0/3] Stack checking on Arm
Andrew Cooper
Re: [XEN PATCH v4] tools/lsevtchn: Use errno macro to handle hypercall error cases
Matthew Barnes
[linux-linus test] 187039: regressions - FAIL
osstest service owner
Re: [PATCH 08/22] x86/mm: avoid passing a domain parameter to L4 init function
Alejandro Vallejo
Re: [PATCH 08/22] x86/mm: avoid passing a domain parameter to L4 init function
Jan Beulich
Re: [PATCH 08/22] x86/mm: avoid passing a domain parameter to L4 init function
Roger Pau Monné
Re: [PATCH 08/22] x86/mm: avoid passing a domain parameter to L4 init function
Jan Beulich
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
Jan Beulich
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
oleksii . kurochko
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
Jan Beulich
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
oleksii . kurochko
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
Jan Beulich
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
oleksii . kurochko
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
oleksii . kurochko
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
oleksii . kurochko
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
Jan Beulich
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
Jan Beulich
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
oleksii . kurochko
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
Jan Beulich
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
oleksii . kurochko
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
oleksii . kurochko
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
Jan Beulich
Re: [PATCH v3 4/9] xen/riscv: setup fixmap mapping
oleksii . kurochko
Re: [PATCH v2] x86/altcall: further refine clang workaround
Jan Beulich
Later messages