aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Update Xen version to 4.1.1-rc14.1.1-rc1Keir Fraser2011-05-212-2/+2
|
* gcc-4.6 compile fix: build with -Wno-unused-but-set-variableOlaf Hering2011-05-211-0/+1
| | | | | | | | | Avoid "error: variable 'unused' set but not used [-Werror=unused-but-set-variable]" with gcc 4.6. Signed-off-by: Olaf Hering <olaf@aepfle.de> xen-unstable changeset: 23368:0f670f5146c8 xen-unstable date: Sat May 21 07:55:46 2011 +0100
* x86/mca: Fix debug output.Liu, Jinsong2011-05-201-4/+5
| | | | | | | | | | At x86_mcinfo_dump(), a little bug at printk information, illusively= indicate an CMCI/POLLED error to a MCE error, this will make debug confusing. Signed-off-by: Liu, Jinsong <jinsong.liu@intel.com> xen-unstable changeset: 23362:c2a55fe9c006 xen-unstable date: Fri May 20 13:42:23 2011 +0100
* x86/AMD: don't set ARAT feature flag on family F CPUsJan Beulich2011-05-201-1/+1
| | | | | | | | | Following Linux commit 14fb57dccb6e1defe9f89a66f548fcb24c374c1d from Borislav Petkov. Signed-off-by: Jan Beulich <jbeulich@novell.com> xen-unstable changeset: 23356:c8f00ee51e15 xen-unstable date: Fri May 20 09:11:54 2011 +0100
* x86: clear CPUID output of leaf 0xd for Dom0 when xsave is disabledJan Beulich2011-05-201-0/+4
| | | | | | | | | | | | Linux starting with 2.6.36 uses the XSAVEOPT instruction and has certain code paths that look only at the feature bit reported through CPUID leaf 0xd sub-leaf 1 (i.e. without qualifying the check with one evaluating leaf 4 output). Consequently the hypervisor ought to mimic actual hardware in clearing leaf 0xd output when not supporting xsave. Signed-off-by: Jan Beulich <jbeulich@novell.com> xen-unstable changeset: 23353:a768a10d32b4 xen-unstable date: Fri May 20 08:54:45 2011 +0100
* pci_remove_device: fix linked list disciplineTim Deegan2011-05-201-2/+2
| | | | | | Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com> xen-unstable changeset: 23352:ea48976517af xen-unstable date: Fri May 20 08:52:22 2011 +0100
* Makefile: install-tools does not depend on ioemu-dir if CONFIG_IOEMU=nKeir Fraser2011-05-201-1/+5
| | | | | | | | Based on patch by George Dunlap. Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 23351:0e9322ece398 xen-unstable date: Fri May 20 08:48:33 2011 +0100
* x86/mm: add HVMOP_get_mem_type hvmopOlaf Hering2011-05-203-5/+52
| | | | | | | | | | | | | | | | | | | | The balloon driver in the guest frees guest pages and marks them as mmio. When the kernel crashes and the crash kernel attempts to read the oldmem via /proc/vmcore a read from ballooned pages will generate 100% load in dom0 because Xen asks qemu-dm for the page content. Since the reads come in as 8byte requests each ballooned page is tried 512 times. Add a new hvmop HVMOP_get_mem_type to return the hvmmem_type_t for the given pfn. Pages which are neither ram or mmio will be HVMMEM_mmio_dm. This interface enables the crash kernel to skip ballooned pages. Signed-off-by: Olaf Hering <olaf@aepfle.de> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> xen-unstable changeset: 23298:26413986e6e0 xen-unstable date: Wed May 04 13:37:58 2011 +0100
* x86-64: remove left over uses of .got entriesJan Beulich2011-05-162-2/+5
| | | | | | | | | These were caused by some declarations happening before the compiler would have seen the visibility pragma. Signed-off-by: Jan Beulich <jbeulich@novell.com> xen-unstable changeset: 23345:ba4bd20e581a xen-unstable date: Mon May 16 13:32:37 2011 +0100
* VT-d: Fix resource leaks on error pathsIgor Mammedov2011-05-161-2/+8
| | | | | | | | | | On error exit from functions, maped pages should be unmapped and acquired locks released. Signed-off-by: Igor Mammedov <imammedo@redhat.com> Acked-by: Allen Kay <allen.m.kay@intel.com> xen-unstable changeset: 23343:edcf8fc77b64 xen-unstable date: Mon May 16 13:29:24 2011 +0100
* x86/tsc: Remove incorrect assertion from cstate_restore_tsc()...Keir Fraser2011-05-163-4/+13
| | | | | | | | ..fix and move to write_tsc(). Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 23342:16d12acccacf xen-unstable date: Mon May 16 13:24:05 2011 +0100
* x86/ioapic: avoid gcc 4.6 warnings about uninitialised variablesIan Campbell2011-05-161-73/+63
| | | | | | | | | | | | | | | | | | | | | | | | | gcc 4.6 complains: io_apic.c: In function 'restore_IO_APIC_setup': /build/user-xen_4.1.0-3-amd64-zSon7K/xen-4.1.0/debian/build/build-hypervisor_amd64_amd64/xen/include/asm/io_apic.h:150:26: error: '*((void *)&entry+4)' may be used uninitialized in this function [-Werror=uninitialized] io_apic.c:221:32: note: '*((void *)&entry+4)' was declared here /build/user-xen_4.1.0-3-amd64-zSon7K/xen-4.1.0/debian/build/build-hypervisor_amd64_amd64/xen/include/asm/io_apic.h:150:26: error: 'entry' may be used uninitialized in this function [-Werror=uninitialized] io_apic.c:221:32: note: 'entry' was declared here cc1: all warnings being treated as errors Add functions to read/write an entire IO APIC entry using an explicit union to allow gcc to spot the initialisation. Reported as Debian bug #625438, thanks to Matthias Klose. Signed-off-by: Ian Campbell <ian.campbell@citrix.com> Acked-by: Jan Beulich <jbeulich@novell.com> xen-unstable changeset: 23341:87084ca76c9c xen-unstable date: Mon May 16 13:13:41 2011 +0100
* x86: Check for valid pirq values in hvm_domain_use_pirqStefano Stabellini2011-05-121-1/+1
| | | | | | Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com> xen-unstable changeset: 23339:f9bb0bbea7c2 xen-unstable date: Thu May 12 16:42:54 2011 +0100
* x86, vtd: [CVE-2011-1898] Protect against malicious MSIs from untrusted devices.Keir Fraser2011-05-124-5/+37
| | | | | | | | | | | | | | | | | | | | | | | In the absence of VT-d interrupt remapping support, a device can send arbitrary APIC messages to host CPUs. One class of attack that results is to confuse the hypervisor by delivering asynchronous interrupts to vectors that are expected to handle only synchronous traps/exceptions. We block this class of attack by: (1) setting APIC.TPR=0x10, to block all interrupts below vector 0x20. This blocks delivery to all architectural exception vectors. (2) checking APIC.ISR[vec] for vectors 0x80 (fast syscall) and 0x82 (hypercall). In these cases we BUG if we detect we are handling a hardware interrupt -- turning a potentially more severe infiltration into a straightforward system crash (i.e, DoS). Thanks to Invisible Things Lab <http://www.invisiblethingslab.com> for discovery and detailed investigation of this attack. Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 23337:cc91832a02c7 xen-unstable date: Thu May 12 16:39:31 2011 +0100
* x86/hvm: pv-on-hvm: fix de/assert_irq checksStefano Stabellini2011-05-121-2/+3
| | | | | | | | | | | | | The checks in assert_irq and deassert_irq to distinguish interrupts that have been remapped onto event channels from the others that have to be injected using the emulated lapic are wrong. Fix the condition checks using the convenient hvm_domain_use_pirq function. Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com> xen-unstable changeset: 23335:0957e0c5f0e4 xen-unstable date: Thu May 12 09:15:05 2011 +0100
* x86: use compat hypercall handlers for calls from 32-bit HVM guestsTim Deegan2011-05-122-3/+20
| | | | | | | | | | | On 64-bit Xen, hypercalls from 32-bit HVM guests are handled as a special case, but not all the hypercalls are corrently redirected to their compat-mode wrappers. Use compat_* for xen_version, sched_op and set_timer_op for consistency. Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com> xen-unstable changeset: 23333:fabdd682420c xen-unstable date: Thu May 12 09:13:18 2011 +0100
* tools/xm-test: portability fix: Avoid using == in /bin/sh scriptChristoph Egger2011-05-121-1/+1
| | | | | | | From: David Brownlee <abs@netbsd.org> Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> xen-unstable changeset: 23328:6767d92dff13 xen-unstable date: Thu May 12 08:55:12 2011 +0100
* libxc: [CVE-2011-1583] pv kernel image validationIan Jackson2011-05-091-43/+94
| | | | | | | | | | | | | | | | | | | | | | The functions which interpret the kernel image supplied for a paravirtualised guest, and decompress it into memory when booting the domain, are incautious. Specifically: (i) Integer overflow in the decompression loop memory allocator might result in overrunning the buffer used for the decompressed image; (ii) Integer overflows and lack of checking of certain length fields can result in the loader reading its own address space beyond the size of the supplied kernel image file. (iii) Lack of error checking in the decompression loop can lead to an infinite loop. This patch fixes these problems. CVE-2011-1583. Signed-off-by: Ian Campbell <Ian.Campbell@eu.citrix.com> Signed-off-by: Ian Jackson <ian.jackson@eu.citrix.com> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com>
* tools/tests/xen-access: minor bug fixesAravindh Puthiyaparambil2011-05-091-5/+2
| | | | | | | | | | Fix a couple of minor bugs in xen-access test program: * Fix -m option handling. * Fix a segfault that was occurring during program exit. Signed-off-by: Aravindh Puthiyaparambil <aravindh@virtuata.com> xen-unstable changeset: 23307:1649275965f0 xen-unstable date: Mon May 09 09:56:39 2011 +0100
* x86: set ARAT feature flag for non-buggy AMD CPUsJan Beulich2011-05-092-0/+8
| | | | | | | | This is the equivalent of a recent Linux change. Signed-off-by: Jan Beulich <jbeulich@novell.com> xen-unstable changeset: 23290:1ac7336b6298 xen-unstable date: Sun May 01 10:14:15 2011 +0100
* Clean up licensing in the public header directory.Keir Fraser2011-05-096-62/+92
| | | | | | | | | | | | | | | | | | The COPYING file at xen/include/public/COPYING clearly states that all public header files are distributed under a permissive MIT license. Therefore make sure the same permissive license is included at the top of every header file (i.e., not GPL). Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 23286:6f48f5f843f0 xen-unstable date: Sun May 01 10:08:40 2011 +0100 public/arch-ia64/debug_op.h: Reinsert copyright that I accidentally deleted. Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 23294:c0a8f889ca9e xen-unstable date: Sun May 01 13:03:37 2011 +0100
* x86: Clean up smp_call_function handling.Keir Fraser2011-05-091-9/+5
| | | | | | | | | We don't need so many communication fields between caller and handler. Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 23285:a7ac0a0170b0 xen-unstable date: Sun May 01 09:32:48 2011 +0100
* credit2: add a callback to migrate to a new cpuKeir Fraser2011-04-273-20/+24
| | | | | | | | | | | | | | | | In credit2, there needs to be a strong correlation between v->processor and the runqueue to which a vcpu is assigned; much of the code relies on this invariant. Allow credit2 to manage the actual migration itself. This fixes the most recent credit2 bug reported on the list (Xen BUG at sched_credit2.c:1606) in Xen 4.1, as well as the bug at sched_credit2.c:811 in -unstable (which catches the same condition earlier). Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com> xen-unstable changeset: 23250:7745109e3c6e xen-unstable date: Wed Apr 27 13:36:15 2011 +0100
* credit2: remove two nested functions, replacing them with static onesKeir Fraser2011-04-271-98/+108
| | | | | | | | | | and passing the outer scope's variables in explicitly. This is needed to compile xen with clang. Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com> Acked-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 22982:591c459ee00a xen-unstable date: Mon Mar 07 11:21:11 2011 +0000
* pv-grub: Fix for incorrect dom->p2m_host[] list initializationDaniel Kiper2011-04-271-0/+14
| | | | | | | | | | | | | | | | | | | | | | | | | | Introduction of Linux Kernel git commit ceefccc93932b920a8ec6f35f596db05202a12fe (x86: default CONFIG_PHYSICAL_START and CONFIG_PHYSICAL_ALIGN to 16 MB) revealed deeply hidden bug in pv-grub. During kernel load stage dom->p2m_host[] list has been incorrectly initialized. At the beginning of kernel load stage dom->p2m_host[] list is populated with current PFN->MFN layout. Later during memory allocation (memory is allocated page by page in kexec_allocate()) page order is changed to establish linear layout in new domain. It is done by exchanging subsequent MFNs with newly allocated MFNs. dom->p2m_host[] list is indexed by currently requested PFN (it is incremented from 0) and PFN of newly allocated paged. If PFN of newly allocated page is less than currently requested PFN then earlier allocated MFN is overwritten which leads to domain crash later. This patch corrects that issue. If PFN of newly allocated page is less then currently requested PFN then relevant PFN/MFN pair is properly calculated and usual exchange occurs later. Signed-off-by: Daniel Kiper <dkiper@net-space.pl> Reviewed-by: Samuel Thibault <samuel.thibault@ens-lyon.org> xen-unstable changeset: 23249:83fe79c0225f xen-unstable date: Wed Apr 27 13:29:14 2011 +0100
* x86: Bail from hpet_disable_legacy_broadcast() if legacy_hpet_event is ↵Keir Fraser2011-04-261-0/+3
| | | | | | uninitialised. Signed-off-by: Keir Fraser <keir@xen.org>
* libxc: Fill in XSAVE-related CPUID leaves for PV guests.Keir Fraser2011-04-251-4/+10
| | | | | | Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 23248:16aac67e948c xen-unstable date: Mon Apr 25 15:27:56 2011 +0100
* vtd: check and print EPT compatibility once, at boot.Tim Deegan2011-04-251-29/+5
| | | | | | | | | | Merge the check for EPT/VT-D pagetable compatibility into the other VT-D boot-time checks. Previously it was checking and printing many times on each VM boot. Signed-off-by: Tim Deegan <Tim.Deegan@citrix.com> xen-unstable changeset: 23247:80401982465d xen-unstable date: Mon Apr 25 13:17:05 2011 +0100
* tools: hvmloader: attempt to SHUTDOWN_crash on BUGKeir Fraser2011-04-252-6/+18
| | | | | | | | | | Executing UD2 (invalid opcode) triggers a triple fault which signals reboot to the toolstack, rather than crash. Signed-off-by: Ian Campbell <ian.campbell@citrix.com> Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 23245:3539ef956a37 xen-unstable date: Mon Apr 18 18:34:45 2011 +0100
* hvmloader: Fix _start-relative calculation of hypercall page address.Keir Fraser2011-04-252-1/+3
| | | | | | | | | We got away with it because _start-HYPERCALL_PHYSICAL_ADDRESS happens to equal HYPERCALL_PHYSICAL_ADDRESS. Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 23244:024b06de81ca xen-unstable date: Mon Apr 18 18:08:47 2011 +0100
* x86: don't write_tsc() non-zero values on CPUs updating only the lower 32 bitsKeir Fraser2011-04-256-2/+88
| | | | | | | | | | | | This means suppressing the uses in time_calibration_tsc_rendezvous(), cstate_restore_tsc(), and synchronize_tsc_slave(), and fixes a boot hang of Linux Dom0 when loading processor.ko on such systems that have support for C states above C1. Signed-off-by: Jan Beulich <jbeulich@novell.com> Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 23228:1329d99b4f16 xen-unstable date: Fri Apr 15 08:52:08 2011 +0100
* remus: fix incorrect error handling for switch_qemu_logdirty in checkpoint codeShriram Rajagopalan2011-04-251-1/+1
| | | | | | | | | | | c/s 22275: "tools: cleanup domain save switch_qemu_logdirty callback" introduced a whole bunch of error code fixups. In the process, it also ended up treating the success return code (0) from switch_qemu_logdirty as an error and vice versa. Signed-off-by: Shriram Rajagopalan <rshriram@cs.ubc.ca> xen-unstable changeset: 23202:67911039ac94 xen-unstable date: Tue Apr 12 13:28:51 2011 +0100
* AMD IOMMU: Fix an interrupt remapping issueWei Wang2011-04-251-43/+61
| | | | | | | | | | | | | | | | | Some device could generate bogus interrupts if an IO-APIC RTE and an iommu interrupt remapping entry are not consistent during 2 adjacent 64bits IO-APIC RTE updates. For example, if the 2nd operation updates destination bits in RTE for SATA device and unmask it, in some case, SATA device will assert ioapic pin to generate interrupt immediately using new destination but iommu could still translate it into the old destination, then dom0 would be confused. To fix that, we sync up interrupt remapping entry with IO-APIC IRE on every 32 bits operation and forward IOAPIC RTE updates after interrupt. Signed-off-by: Wei Wang <wei.wang2@amd.com> Acked-by: Jan Beulich <jbeulich@novell.com> xen-unstable changeset: 23200:995a0c01a076 xen-unstable date: Tue Apr 12 13:26:19 2011 +0100
* remus: proper cleanup on checkpoint failure.Shriram Rajagopalan2011-04-252-1/+8
| | | | | | | | | | | | | | While running remus, when an error occurs during checkpointing (e.g., timeouts on primary, failing to checkpoint network buffer or disk or even communication failure) the domU is sometimes left in suspended state on primary. Instead of blindly closing the checkpoint file handle, attempt to resume the domain before the close. Signed-off-by: Shriram Rajagopalan <rshriram@cs.ubc.ca> Committed-by: Ian Jackson <ian.jackson@eu.citrix.com> xen-unstable changeset: 23195:13ec53a59a42 xen-unstable date: Fri Apr 08 16:49:04 2011 +0100
* libxc: set all VCPU's online by default in HVM info tableGianni Tedesco2011-04-071-0/+1
| | | | | | | | | | | | This sets a saner default for the cpu-online-map by setting all bits to 1. The default assumption ought to be that nr-vcpus == nr-vcpus-at-start. If that is not true, then the toolstack must modify the bitmap, but if it is true, the toolstack oughtn't need to do anything further. Signed-off-by: Gianni Tedesco <gianni.tedesco@citrix.com> xen-unstable changeset: 23179:2b66b83b19b6 xen-unstable date: Thu Apr 07 12:13:58 2011 +0100
* X86: offline/broken page handler for pod cacheLiu, Jinsong2011-04-073-0/+98
| | | | | | | | | | | | When offline a page, or, when a broken page occur, the page maybe populated, or, may at pod cache. This patch is to handle the offline/broken page at pod cache. It scan pod cache, if hit, remove and replace it, and then put the offline/broken page to page_offlined_list/page_broken_list Signed-off-by: Liu, Jinsong <jinsong.liu@intel.com> xen-unstable changeset: 23178:fd8b81db422d xen-unstable date: Thu Apr 07 12:12:38 2011 +0100
* X86: Fix mce offline page bugLiu, Jinsong2011-04-071-10/+1
| | | | | | | | | | | | | c/s 19913 break mce offline page logic: For page_state_is(pg, free), it's impossible to trigger the case; For page_state_is(pg, offlined), it in fact didn't offline related page; This patch fix the bug, and remove an ambiguous comment. Signed-off-by: Liu, Jinsong <jinsong.liu@intel.com> xen-unstable changeset: 23177:d8bb2de119de xen-unstable date: Thu Apr 07 12:12:01 2011 +0100
* x86/hvm: load CPU structures from xen versions <=3.4George Dunlap2011-04-071-1/+126
| | | | | | | | | | | | | Xen 4.0 added "msr_tsc_aux" in the middle of the hvm_hw_cpu structure, making it incompatible with pre-3.4 savefiles. This patch uses the recently introduced backwards-compatibility infrastructure to convert the old to the new. Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> xen-unstable changeset: 23172:dc8b05d22a59 xen-unstable date: Wed Apr 06 11:40:54 2011 +0100
* hvm: infrastructure for backwards-compatible loadingGeorge Dunlap2011-04-072-8/+36
| | | | | | | | | | | | | | | | | | | | | | | | The hvm_save code is used to save and restore hypervisor-related hvm state, either for classic save/restore, or for migration (including remus). This is meant to be backwards-compatible across some hypervisor versions; but if it does change, there is no way to handle the old format as well as the new. This patch introduces the infrastructure to allow a single older version ("compat") of any given "save type" to be defined, along with a function to turn the "old" version into the "new" version. If the size check fails for the "normal" version, it will check the "compat" version, and if it matches, will read the old entry and call the conversion function. This patch involves some preprocessor hackery, but I'm only extending the hackery that's already there. Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> Committed-by: Tim Deegan <Tim.Deegan@citrix.com> xen-unstable changeset: 23171:6a5830de7b54 xen-unstable date: Wed Apr 06 11:40:51 2011 +0100
* x86, amd, MTRR: remove k8_enable_fixed_iorrs()Wei Huang2011-04-071-18/+0
| | | | | | | | | | | | | | AMD64 defines two special bits (bit 3 and 4) RdMem and WrMem in fixed MTRR type. Their values are supposed to be 0 after BIOS hands the control to OS according to AMD BKDG. Unless OS specificially turn them on, they are kept 0 all the time. As a result, k8_enable_fixed_iorrs() is unnecessary and removed from upstream kernel (see https://patchwork.kernel.org/patch/11425/). This patch does the same thing. Signed-off-by: Wei Huang <wei.huang2@amd.com> xen-unstable changeset: 23154:42fa70e0761b xen-unstable date: Wed Apr 06 09:02:13 2011 +0100
* x86, amd, MTRR: correct DramModEn bit of SYS_CFG MSRWei Huang2011-04-071-0/+28
| | | | | | | | | | Some buggy BIOS might set SYS_CFG DramModEn bit to 1, which can cause unexpected behavior on AMD platforms. This patch clears DramModEn bit if it is 1. Signed-off-by: Wei Huang <wei.huang2@amd.com> xen-unstable changeset: 23153:8fb61c9ebe49 xen-unstable date: Wed Apr 06 09:01:31 2011 +0100
* xsm: Error code consistencyMachon Gregory2011-04-072-1/+8
| | | | | | Signed-off-by: Machon Gregory <mbgrego@tycho.ncsc.mil> xen-unstable changeset: 23140:967e1925775c xen-unstable date: Mon Apr 04 15:54:45 2011 +0100
* x86/mm: fix PSE alignment checks in pagetable walker.Tim Deegan2011-04-071-2/+21
| | | | | | | | | | | The PSE handling doesn't check bits 1...8 (or 1...9 for non-PAE guests) being zero, thus allowing bad (not 2Mb/4Mb aligned) large pages to be handled. Signed-off-by: Jan Beulich <jbeulich@novell.com> Acked-by: Tim Deegan <Tim.Deegan@citrix.com> xen-unstable changeset: 23138:777aaa2172c8 xen-unstable date: Mon Apr 04 10:38:27 2011 +0100
* xen: fix reloc.S generation for non-gnu toolchainChristoph Egger2011-04-021-2/+2
| | | | | | | | The output of AT&T UNIX and GNU od(1) are different. Signed-off-by: Christoph Egger <Christoph.Egger@amd.com> xen-unstable changeset: 23130:0e88c781a8a8 xen-unstable date: Sat Apr 02 15:53:35 2011 +0100
* x86: __pirq_guest_eoi() must check it is called for a fullyKeir Fraser2011-04-021-0/+6
| | | | | | | | guest-bound irq before accessing desc->action. Signed-off-by: Keir Fraser <keir@xen.org> xen-unstable changeset: 23103:48dac730a93b xen-unstable date: Sat Mar 26 09:42:01 2011 +0000
* Update Xen version to 4.1.1-rc1-preKeir Fraser2011-04-021-1/+1
|
* Added signature for changeset 6a2089f00dc7Keir Fraser2011-03-251-0/+1
|
* Added tag RELEASE-4.1.0 for changeset 6a2089f00dc7Keir Fraser2011-03-251-0/+1
|
* Update Xen version to 4.1.0RELEASE-4.1.0Keir Fraser2011-03-252-2/+2
|
* Added signature for changeset 98c580505053Keir Fraser2011-03-211-0/+1
|