ia64/xen-unstable

view docs/ChangeLog @ 16729:0a88a8fe5e97

Update API changelog for new feature flags.
Signed-off-by: Keir Fraser <keir.fraser@citrix.com>
author Keir Fraser <keir.fraser@citrix.com>
date Thu Jan 17 13:03:22 2008 +0000 (2008-01-17)
parents a407a8a51319
children c364f80eb4b5
line source
1 This file contains a list of changes and additions to the API/ABI that
2 might affect cross-OS compatibility or otherwise impact OS
3 implementations, in particular any changes to hypervisor interfaces and
4 the inter-domain protocols. When making such a change you are expected
5 to add it here (bonus points for a link to fuller documentation). New
6 entries should be part of the patch making the change (so the history of
7 this file will give the relevant changeset), added to the top of the
8 file, and in a format like:
10 2008-01-08 Add ChangeLog file
12 Add a ChangeLog file indicating changes to the API/ABI, as discussed
13 here:
14 http://lists.xensource.com/archives/html/xen-devel/2008-01/msg00010.html
16 Xen 3.3 release
17 ---------------
19 16725: XENFEAT_mmu_pt_update_reserve_ad
20 http://xenbits.xensource.com/xen-unstable.hg?rev/847bc9b19c48
22 New feature flag available via the version hypercall indicates whether the
23 Xen host supports MMU_PT_UPDATE_PRESERVE_AD for this guest.
25 16724: CPUID feature flag for MMU_PT_UPDATE_PRESERVE_AD hypercall
26 http://xenbits.xensource.com/xen-unstable.hg?rev/a66bdc82d8fa
28 The x86 CPUID_4000_0002_ECX[0] flag indicates whether the Xen host
29 supports MMU_PT_UPDATE_PRESERVE_AD for this guest.
31 16718: MMU_PT_UPDATE_PRESERVE_AD
32 http://xenbits.xensource.com/xen-unstable.hg?rev/fba4e7357744
34 A subcommand of the x86-only mmu_update() hypercall to allow batched
35 updates of pagetable entries, while atomically preserving the current
36 status of accessed and dirty bits in each entry.
38 Xen 3.2 release
39 ---------------
41 16592: XEN_DOMCTL_test_assign_device
42 http://xenbits.xensource.com/xen-unstable.hg?rev/ef83b50fc4a4
44 Test VT-d device assignability in xend. If VT-d is not enabled, or the
45 device is not exist, or the device has already been assigned to other
46 domain, it fails and quits the domain creation.
48 16549: GNTST_address_too_big
49 http://xenbits.xensource.com/xen-unstable.hg?rev/baf90ee3c1da
51 32-on-64 related additional error return.
53 16512: XEN_DOMCTL_set_opt_feature
54 http://xenbits.xensource.com/xen-unstable.hg?rev/1de4e5056394
56 Allows the domain builder to set optimization features for a guest. This
57 is currently only used by the IA64 domain builder to identify identity
58 mapped regions based on the guest_os_type specified in the domain config
59 file. Other architectures may extend this domctl to enable features
60 specific to their architecture.
62 16504: flush cache disk op
63 http://xenbits.xensource.com/xen-unstable.hg?rev/ebfb3b26010d
65 Adds a BLKIF_OP_FLUSH_DISKCACHE request. The backend is expected to ask
66 underlying storage to flush its cache upon receiving this request.
67 Backend advertises availability via 'feature-flush-cache' xenstore node.
68 Needed for correct behaviour of disk-cache-aware filesystems such as
69 ZFS.
71 16425: multicast notifications
72 http://xenbits.xensource.com/xen-unstable.hg?rev/d3041196ae69
74 Adds XEN_NETIF_EXTRA_TYPE_MCAST_ADD and XEN_NETIF_EXTRA_TYPE_MCAST_DEL
75 operations to the networking driver, which it uses to request multicast
76 addresses it's interested in. Available if the backend has
77 'feature-multicast-control', requested by the frontend with
78 'request-multicast-control'. Used by Solaris: this avoids having to
79 always put the backend's underlying networking device into promiscuous
80 mode.
82 16402: gnttab page attributes
83 http://xenbits.xensource.com/xen-unstable.hg?rev/2e5d922b7ee3
85 Adds new grant tab flags for table entries.
87 Older changes are not recorded further.