ia64/xen-unstable

log

age author revision description
2006-04-28 vhanquez 9895:e0e68942b205 Wait for the device to be connected on the guest (with a 10s timeout)
2006-04-28 kaf24 9894:5931e98cd744 xen/ia64 with dom0 vp model doesn't need the blkbkack ia64 workarounds
2006-04-28 kaf24 9893:eba707397410 Makefile changes for xen/ia64 with dom0 vp model needs.
2006-04-28 kaf24 9892:fb3d073b1cdf xen/ia64 with dom0 vp model needs direct_remap_pfn_range() to be called
2006-04-28 kaf24 9891:84780e2ea775 Define 8 hypercall numbers for arch-specific purposes.
2006-04-28 kaf24 9890:a779d642c22a Recent GUEST_HANDLE related cset broke ia64 compilation.
2006-04-28 kaf24 9889:922f95ab88e4 When boot device is cdrom but the cdrom is not bootable, the guest appears
2006-04-28 kaf24 9888:59161a85a281 Revert the xm-test ramdisk patch until we build new initrds.
2006-04-28 kaf24 9887:3726c0afc5af Allow for arch specific virq definitions.
2006-04-28 kaf24 9886:73435820f513 This patch fixes the buildroot for the xm-test ramdisk. The buildroot xm-test
2006-04-28 kaf24 9885:ef6216b43278 Instead of relying on xm create to always run the bootloader, make sure
2006-04-28 kaf24 9884:268e45409ecd The features for a domain are more a property of the domain than the
2006-04-28 kaf24 9883:f06b6db6823d The bootloader code doesn't actually have to deal with the vcpu config
2006-04-28 kaf24 9882:a8cac38001ca When building with FORTIFY_SOURCE to ensure that return codes of common
2006-04-28 kaf24 9881:dfdc32a9814f Rename {SG}ET_XEN_GUEST_HANDLE to {sg}et_Xen_guest_handle, as they
2006-04-28 kaf24 9880:8bf5637cb269 Relax BUG_ON() state ment in increase_reservation() in balloon.c.
2006-04-27 kaf24 9879:e0d986fc0978 Fix memory_op hypercall mlock/munlock wrapping after the
2006-04-27 kaf24 9878:ef0a56c0784d Add BUILD_BUG_ON() and a handful of users.
2006-04-27 kaf24 9877:4e909143218c Add bounds check to get_mfn_from_gpfn().
2006-04-27 kaf24 9876:15788ab9fce2 Define __XEN_TOOLS__ when building tools. Use this to
2006-04-27 kaf24 9875:4e0f2272fbcd Bump Xen interface version number to 0x00030201 for new
2006-04-27 kaf24 9874:ec61a8c25429 Wrap all GUEST_HANDLEs in structures, and define SET/GET macros to access them
2006-04-27 kaf24 9873:4e1b8be54311 Rename *GUEST_HANDLE to *XEN_GUEST_HANDLE.
2006-04-27 kaf24 9872:a898a6510c5d Occasionally large smp machines fail to reboot properly and die under
2006-04-27 kaf24 9871:e42ed4332053 This patch adds the ability to have restricted write access to some
2006-04-27 kaf24 9870:d66dfd584d2f Check a write() return value in xenbaked.
2006-04-27 kaf24 9869:d265c79031af Just allocate unbound irq only from dynirq range, since
2006-04-27 kaf24 9868:3d884434ec97 Merge with xen-ia64-unstable.hg
2006-04-26 kaf24 9867:4d667a139318 This patch addresses CVE-2006-1056 (information leak from
2006-05-08 awilliam 9866:707737b66f58 [IA64] RSE incomplete cfm