/xen-4.10.0-shim-comet/docs/ |
A D | README.xen-bugtool | 8 The information collated can either be posted to a Xen Bugzilla bug (this bug
|
/xen-4.10.0-shim-comet/docs/process/ |
A D | xen-release-management.pandoc | 33 During freeze period, the tree is closed for new features. Only bug fixes are 153 committers so that they can commit bug fixes at will. As we approach late 264 When sending bug reports, please CC relevant maintainers and me 280 bug fixes at will. 424 if (bug != "") 425 print " Link: https://bugs.xenproject.org/xen/bug/"bug 438 bug="" 463 if (bug != "") 464 print " Link: https://bug.xenproject.org/xen/bug/"bug 479 bug="" [all …]
|
/xen-4.10.0-shim-comet/m4/ |
A D | ptyfuncs.m4 | 2 dnl This is a workaround for a bug in Debian package
|
/xen-4.10.0-shim-comet/docs/man/ |
A D | xenstore.pod.1 | 52 http://wiki.xen.org/xenwiki/ReportingBugs on how to send bug reports.
|
A D | xenstore-chmod.pod.1 | 62 http://wiki.xen.org/xenwiki/ReportingBugs on how to send bug reports.
|
A D | xenstore-ls.pod.1 | 62 http://wiki.xen.org/xenwiki/ReportingBugs on how to send bug reports.
|
A D | xl-disk-configuration.pod.5 | 287 There is a memory lifetime bug in some driver domain (dom0) kernels 288 which can cause crashes when using O_DIRECT. The bug occurs due to a 314 If in the future the bug is fixed properly this option will then be
|
A D | xl.pod.1.in | 850 reporting a Xen bug, please provide this information as part of the 851 bug report. See I<http://wiki.xen.org/xenwiki/ReportingBugs> on how to 1896 http://wiki.xen.org/xenwiki/ReportingBugs on how to send bug reports.
|
/xen-4.10.0-shim-comet/xen/arch/x86/ |
A D | traps.c | 952 const struct bug_frame *bug = NULL; in do_invalid_op() local 987 bug = b; in do_invalid_op() 995 if ( !bug ) in do_invalid_op() 1000 void (*fn)(struct cpu_user_regs *) = bug_ptr(bug); in do_invalid_op() 1008 filename = bug_ptr(bug); in do_invalid_op() 1017 lineno = bug_line(bug); in do_invalid_op() 1038 predicate = bug_msg(bug); in do_invalid_op()
|
/xen-4.10.0-shim-comet/xen/tools/kconfig/ |
A D | zconf.hash.c_shipped | 28 …d tables don't work with this execution character set. Please report a bug to <bug-gnu-gperf@gnu.o…
|
/xen-4.10.0-shim-comet/xen/arch/arm/ |
A D | traps.c | 1260 const struct bug_frame *bug = NULL; in do_bug_frame() local 1279 bug = b; in do_bug_frame() 1286 if ( !bug ) in do_bug_frame() 1290 filename = bug_file(bug); in do_bug_frame() 1299 lineno = bug_line(bug); in do_bug_frame() 1319 predicate = bug_msg(bug); in do_bug_frame()
|
/xen-4.10.0-shim-comet/tools/firmware/vgabios/ |
A D | README | 180 . Fixed bug in function ah=13 194 . Fixed bug in function ah=13
|
A D | ChangeLog | 393 - VBE functions 0x06 and 0x07: get functions now supported, 15 bpp bug fixed 898 - fix bug found by ams : a 8bits index value was compared to 914 before setting up the controller's registers (bug found with
|
/xen-4.10.0-shim-comet/tools/ |
A D | config.h.in | 102 /* Define to the address where bug reports for this package should be sent. */
|
/xen-4.10.0-shim-comet/docs/features/ |
A D | sched_credit.pandoc | 84 * [long standing BOOST vs. migration bug](https://lists.xen.org/archives/html/xen-devel/2015-10/msg…
|
A D | migration.pandoc | 78 While not a bug in migration specifically, VMs are very sensitive to
|
/xen-4.10.0-shim-comet/docs/misc/ |
A D | hvm-emulated-unplug.markdown | 8 intended as a backwards-compatibility thing: if we discover a bug
|
A D | xenmon.txt | 94 This is a bug that is due to xenbaked's treatment of domain id's vs. domain
|
A D | xsm-flask.txt | 33 exploitation of a bug in the management domain.
|
A D | livepatch.markdown | 867 additional entries in the exception table and/or the bug frames. 1030 For BUG(), WARN(), etc., the line number is embedded into the bug frame, not
|
/xen-4.10.0-shim-comet/tools/ocaml/libs/xs/ |
A D | xs.ml | 76 (* Should never be thrown, indicates a bug in the read_watchevent_timetout function *)
|
/xen-4.10.0-shim-comet/ |
A D | config.sub | 1685 *-*bug)
|
A D | SUPPORT.md | 805 anyone who finds a security-related bug in the feature
|
/xen-4.10.0-shim-comet/stubdom/ |
A D | lwip.patch-cvs | 16 + * mem.c, opt.h, stats.h: fixed bug #21433: Calling mem_free/pbuf_free from 44 + * api_msg.c: fixed bug #23847: do_close_internal references freed memory (when 52 + * tcp_in.c: Fix for bug #23693 as suggested by Art R. Ensure cseg is unused 69 + * err.h, err.c, sockets.c: Fix bug #23119: Reorder timeout error code to 73 + * dhcp.c: fixed bug #22804: dhcp_stop doesn't clear NETIF_FLAG_DHCP 77 + * mem.c, tcpip.c, tcpip.h, opt.h: fixed bug #21433 (Calling mem_free/pbuf_free 83 + * tcp_in.c, tcp.c: fixed bug #22249: division by zero could occur if a remote
|
/xen-4.10.0-shim-comet/stubdom/grub.patches/ |
A D | 00cvs | 131 + * docs/multiboot.texi: Fix a bug in the byte order of 475 * Reporting bugs:: Where you should send a bug report 658 @email{bug-grub@@gnu.org}, from Bryan Ford and Erich Stefan Boleyn.
|