> This patch breaks Xen booting. Check the latest git head. Does it still break? -Andi - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
- Follow-Ups:
- Re: [PATCH] [5/12] x86_64: Make patching more robust, fix paravirt issue
- From: Jeremy Fitzhardinge <jeremy@goop.org>
- Re: [PATCH] [5/12] x86_64: Make patching more robust, fix paravirt issue
- From: Chris Wright <chrisw@sous-sol.org>
- Re: [PATCH] [5/12] x86_64: Make patching more robust, fix paravirt issue
- References:
- [PATCH] [0/12] x86 Late merge bug fixes for 2.6.23
- From: Andi Kleen <ak@suse.de>
- [PATCH] [5/12] x86_64: Make patching more robust, fix paravirt issue
- From: Andi Kleen <ak@suse.de>
- Re: [PATCH] [5/12] x86_64: Make patching more robust, fix paravirt issue
- From: Jeremy Fitzhardinge <jeremy@goop.org>
- [PATCH] [0/12] x86 Late merge bug fixes for 2.6.23
- Prev by Date: Re: [PATCH] x86-64: memset optimization
- Next by Date: Re: kernel 2.6.19 porting
- Previous by thread: Re: [PATCH] [5/12] x86_64: Make patching more robust, fix paravirt issue
- Next by thread: Re: [PATCH] [5/12] x86_64: Make patching more robust, fix paravirt issue
- Index(es):
![]() |