kernel-hacking-2024-linux-s.../arch/x86/xen
Jeremy Fitzhardinge db053b86f4 xen: clean up x86-64 warnings
There are a couple of Xen features which rely on directly accessing
per-cpu data via a segment register, which is not yet available on
x86-64.  In the meantime, just disable direct access to the vcpu info
structure; this leaves some of the code as dead, but it will come to
life in time, and the warnings are suppressed.

Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
2008-10-03 10:04:10 +02:00
..
debugfs.c
debugfs.h
enlighten.c xen: clean up x86-64 warnings 2008-10-03 10:04:10 +02:00
grant-table.c
irq.c
Kconfig xen: make CONFIG_XEN_SAVE_RESTORE depend on CONFIG_XEN 2008-09-30 09:58:05 +02:00
Makefile
mmu.c Merge branch 'core/xen' into x86/xen 2008-09-10 14:05:45 +02:00
mmu.h
multicalls.c
multicalls.h
setup.c xen: fix for xen guest with mem > 3.7G 2008-09-14 16:46:34 +02:00
smp.c xen: make CPU hotplug functions static 2008-09-08 19:12:24 +02:00
spinlock.c xen: implement CPU hotplugging 2008-08-25 11:25:14 +02:00
suspend.c
time.c xen: implement CPU hotplugging 2008-08-25 11:25:14 +02:00
vdso.h
xen-asm_32.S
xen-asm_64.S xen: clean up x86-64 warnings 2008-10-03 10:04:10 +02:00
xen-head.S
xen-ops.h xen: make CPU hotplug functions static 2008-09-08 19:12:24 +02:00