Today Mini-OS will print all console output via the hypervisor, too.
Make this behavior configurable instead and default it to "off".
Signed-off-by: Juergen Gross
Acked-by: Samuel Thibault
---
V2: keep comment (Samuel Thibault)
---
Config.mk | 4
arch/x86/testbuild/all
flight 72479 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72479/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-i386-squeeze-netboot-pygrub 10 debian-di-install fail blocked
in 72449
test-amd64-amd
flight 116416 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116416/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt broken
test-amd64-amd64-xl
On Tue, Nov 21, 2017 at 12:13 PM, Juergen Gross wrote:
> On 21/11/17 11:42, Andrew Cooper wrote:
>> On 21/11/17 07:44, Jan Beulich wrote:
>> On 20.11.17 at 17:59, wrote:
On 11/20/2017 11:43 AM, Jan Beulich wrote:
On 20.11.17 at 17:28, wrote:
>> On 11/20/2017 11:26 AM, Jan B
flight 116439 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116439/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen d2f86bf604698806d311cc251c1b66fbb752673c
baseline version:
xen eb06
On 11/21/2017 07:21 PM, Andrew Cooper wrote:
> On 21/11/17 19:05, Ian Jackson wrote:
>> George Dunlap writes ("Re: [PATCH 10/16] SUPPORT.md: Add Debugging,
>> analysis, crash post-portem"):
>>> gdbsx security support: Someone may want to debug an untrusted guest,
>>> so I think we should say 'yes'
>>> On 23.10.17 at 11:05, wrote:
> --- a/xen/arch/x86/hvm/dm.c
> +++ b/xen/arch/x86/hvm/dm.c
> @@ -21,6 +21,7 @@
>
> #include
> #include
> +#include
> #include
With this addition moved up a line to result in a properly sorted set
Reviewed-by: Jan Beulich
However, the series should be e
Hi Manish,
On 11/21/2017 07:22 AM, Manish Jaggi wrote:
ACPI/IORT Support in Xen.
--
Draft 3
Revision History:
Changes since v2:
- Modified as per comments from Julien /Sameer/Andre
Changes since v1:
- Modified IORT Parsing data structures.
- Add
>>> On 21.11.17 at 18:20, wrote:
> On 11/21/2017 11:41 AM, Jan Beulich wrote:
> On 21.11.17 at 11:56, wrote:
>>> On 11/21/2017 08:29 AM, Jan Beulich wrote:
>>> On 13.11.17 at 16:41, wrote:
> +### PV USB support for xl
> +
> +Status: Supported
> +
> +### PV 9pfs su
>>> On 21.11.17 at 18:35, wrote:
> On 11/21/2017 08:29 AM, Jan Beulich wrote:
>>> +### QEMU backend hotplugging for xl
>>> +
>>> +Status: Supported
>>
>> Wouldn't this more appropriately be
>>
>> ### QEMU backend hotplugging
>>
>> Status, xl: Supported
>
> You mean, for this whole sect
>>> On 21.11.17 at 19:02, wrote:
> On 11/21/2017 08:39 AM, Jan Beulich wrote:
> On 13.11.17 at 16:41, wrote:
>>> +### x86/Nested PV
>>> +
>>> +Status, x86 HVM: Tech Preview
>>> +
>>> +This means running a Xen hypervisor inside an HVM domain,
>>> +with support for PV L2 guests only
>>> +(i
>>> On 21.11.17 at 19:19, wrote:
> xentrace I would argue for security support; I've asked customers to
> send me xentrace data as part of analysis before. I also know enough
> about it that I'm reasonably confident the risk of an attack vector is
> pretty low.
Knowing pretty little about xentra
On 11/22/2017 11:11 AM, Jan Beulich wrote:
On 21.11.17 at 19:02, wrote:
>> On 11/21/2017 08:39 AM, Jan Beulich wrote:
>> On 13.11.17 at 16:41, wrote:
+### x86/Nested PV
+
+Status, x86 HVM: Tech Preview
+
+This means running a Xen hypervisor inside an HVM doma
/linux/commits/Eduardo-Otubo/xen-netfront-remove-warning-when-unloading-module/20171122-163844
base: https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git linux-next
config: x86_64-allmodconfig (attached as .config)
compiler: gcc-6 (Debian 6.4.0-9) 6.4.0 20171026
reproduce:
# save the
On 11/22/2017 11:11 AM, Jan Beulich wrote:
+### x86/HVM EFI
+
+Status: Supported
+
+Booting a guest via guest EFI firmware
>>>
>>> Shouldn't this say OVMF, to avoid covering possible other
>>> implementations?
>>
>> I don't expect that we'll ever need more than one EFI
We are experiencing intermittent failures right now with the ARM
credit2 tests. I suspect the failure probability is low.
CC: Julien Grall
Signed-off-by: Ian Jackson
---
sg-run-job |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/sg-run-job b/sg-run-job
index aa97ee6..c66
flight 116421 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116421/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-pairbroken
test-amd64-i386-libv
See the code comment being added for why we need this.
This is being placed here to balance between the desire to prevent
future similar issues (the risk of which would grow if it was put
further down the call stack, e.g. in vmx_vcpu_destroy()) and the
intention to limit the performance impact (ot
On 22/11/17 05:46, Andy Lutomirski wrote:
> On Tue, Nov 21, 2017 at 8:11 PM, Andy Lutomirski wrote:
>> On Tue, Nov 21, 2017 at 7:33 PM, Andy Lutomirski wrote:
>>> I'm doing:
>>>
>>> /usr/bin/qemu-system-x86_64 -machine accel=kvm:tcg -cpu host -net none
>>> -nographic -kernel xen-4.8.2 -initrd './
On 22/11/17 06:31, Sinan Kaya wrote:
> pci_get_bus_and_slot() is restrictive such that it assumes domain=0 as
> where a PCI device is present. This restricts the device drivers to be
> reused for other domain numbers.
>
> Use pci_get_domain_bus_and_slot() with a domain number of 0 where we can't
>
On 22/11/17 12:39, Jan Beulich wrote:
> See the code comment being added for why we need this.
>
> This is being placed here to balance between the desire to prevent
> future similar issues (the risk of which would grow if it was put
> further down the call stack, e.g. in vmx_vcpu_destroy()) and th
>>> On 22.11.17 at 13:39, wrote:
> See the code comment being added for why we need this.
>
> This is being placed here to balance between the desire to prevent
> future similar issues (the risk of which would grow if it was put
> further down the call stack, e.g. in vmx_vcpu_destroy()) and the
>
Jürgen, Boris,
am I trying something that's not allowed, but selectable via Kconfig?
On system with multiple IO-APICs (I assume that's what triggers the
problem) I get
Kernel panic - not syncing: Max apic_id exceeded!
CPU: 0 PID: 0 Comm: swapper Not tainted 4.14.1-2017-11-21-xen0 #6
Hardware nam
On 22/11/17 15:05, Jan Beulich wrote:
> Jürgen, Boris,
>
> am I trying something that's not allowed, but selectable via Kconfig?
> On system with multiple IO-APICs (I assume that's what triggers the
> problem) I get
>
> Kernel panic - not syncing: Max apic_id exceeded!
Generally I don't think 32
>>> On 22.11.17 at 15:40, wrote:
> On 22/11/17 15:05, Jan Beulich wrote:
>> Jürgen, Boris,
>>
>> am I trying something that's not allowed, but selectable via Kconfig?
>> On system with multiple IO-APICs (I assume that's what triggers the
>> problem) I get
>>
>> Kernel panic - not syncing: Max ap
On 11/22/2017 09:40 AM, Juergen Gross wrote:
> On 22/11/17 15:05, Jan Beulich wrote:
>> Jürgen, Boris,
>>
>> am I trying something that's not allowed, but selectable via Kconfig?
>> On system with multiple IO-APICs (I assume that's what triggers the
>> problem) I get
>>
>> Kernel panic - not syncin
flight 116422 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116422/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-i386 broken
test-amd64-i386-pair
On Wed, Nov 22, 2017 at 4:50 AM, Juergen Gross wrote:
> On 22/11/17 05:46, Andy Lutomirski wrote:
>> On Tue, Nov 21, 2017 at 8:11 PM, Andy Lutomirski wrote:
>>> On Tue, Nov 21, 2017 at 7:33 PM, Andy Lutomirski wrote:
I'm doing:
/usr/bin/qemu-system-x86_64 -machine accel=kvm:tcg -c
Hi,
On 11/22/2017 01:00 PM, Jan Beulich wrote:
On 22.11.17 at 13:39, wrote:
See the code comment being added for why we need this.
This is being placed here to balance between the desire to prevent
future similar issues (the risk of which would grow if it was put
further down the call stack,
Hi,
On 11/21/2017 01:29 PM, Andrew Cooper wrote:
On 21/11/17 13:26, Jan Beulich wrote:
On 06.11.17 at 16:04, wrote:
On 11/06/2017 11:59 AM, Jan Beulich wrote:
On 16.10.17 at 14:42, wrote:
On 16.10.17 at 14:37, wrote:
On 16/10/17 13:32, Jan Beulich wrote:
Since the emulator acts on the l
On 11/22/2017 11:05 AM, Jan Beulich wrote:
On 21.11.17 at 18:20, wrote:
>> On 11/21/2017 11:41 AM, Jan Beulich wrote:
>> On 21.11.17 at 11:56, wrote:
On 11/21/2017 08:29 AM, Jan Beulich wrote:
On 13.11.17 at 16:41, wrote:
>> +### PV USB support for xl
>> +
>> +
On 11/22/2017 05:09 AM, Christian König wrote:
> Am 21.11.2017 um 23:26 schrieb Boris Ostrovsky:
>> On 11/21/2017 08:34 AM, Christian König wrote:
>>> Hi Boris,
>>>
>>> attached are two patches.
>>>
>>> The first one is a trivial fix for the infinite loop issue, it now
>>> correctly aborts the fixu
On 11/22/2017 11:11 AM, Jan Beulich wrote:
On 21.11.17 at 19:02, wrote:
>> On 11/21/2017 08:39 AM, Jan Beulich wrote:
>> On 13.11.17 at 16:41, wrote:
+### x86/Nested PV
+
+Status, x86 HVM: Tech Preview
+
+This means running a Xen hypervisor inside an HVM doma
On 11/16/2017 03:41 PM, Julien Grall wrote:
> Hi George,
>
> On 13/11/17 15:41, George Dunlap wrote:
>> Signed-off-by: George Dunlap
>> ---
>> Do we need to add anything more here?
>>
>> And do we need to include ARM ACPI for guests?
>>
>> CC: Ian Jackson
>> CC: Wei Liu
>> CC: Andrew Cooper
>>
On Wed, Oct 04, 2017 at 10:58:28AM -0500, Josh Poimboeuf wrote:
> Remove the inline asm duplication in PVOP_CALL().
>
> Also add 'IS_ENABLED(CONFIG_X86_32)' to the return variable logic,
> making the code clearer and rendering the comment unnecessary.
>
> Signed-off-by: Josh Poimboeuf
> ---
On 11/22/2017 11:15 AM, Jan Beulich wrote:
On 21.11.17 at 19:19, wrote:
>> xentrace I would argue for security support; I've asked customers to
>> send me xentrace data as part of analysis before. I also know enough
>> about it that I'm reasonably confident the risk of an attack vector is
>>
On 11/21/2017 08:52 AM, Jan Beulich wrote:
On 13.11.17 at 16:41, wrote:
>> With the exception of driver domains, which depend on PCI passthrough,
>> and will be introduced later.
>>
>> Signed-off-by: George Dunlap
>
> Shouldn't we also explicitly exclude tool stack disaggregation here,
> wi
On 11/21/2017 07:55 PM, Andrew Cooper wrote:
> On 13/11/17 15:41, George Dunlap wrote:
>> Signed-off-by: George Dunlap
>> ---
>> CC: Ian Jackson
>> CC: Wei Liu
>> CC: Andrew Cooper
>> CC: Jan Beulich
>> CC: Stefano Stabellini
>> CC: Konrad Wilk
>> CC: Tim Deegan
>> CC: Tamas K Lengyel
>> -
On 11/14/2017 01:25 PM, Marek Marczykowski-Górecki wrote:
> On Mon, Nov 13, 2017 at 03:41:24PM +, George Dunlap wrote:
>> Signed-off-by: George Dunlap
>> ---
>> CC: Ian Jackson
>> CC: Wei Liu
>> CC: Andrew Cooper
>> CC: Jan Beulich
>> CC: Stefano Stabellini
>> CC: Konrad Wilk
>> CC: Tim
On 11/21/2017 08:59 AM, Jan Beulich wrote:
On 13.11.17 at 16:41, wrote:
>> +### x86/PCI Device Passthrough
>> +
>> +Status: Supported, with caveats
>
> I think this wants to be
>
> ### PCI Device Passthrough
>
> Status, x86 HVM: Supported, with caveats
> Status, x86 PV: Support
Am 22.11.2017 um 17:24 schrieb Boris Ostrovsky:
On 11/22/2017 05:09 AM, Christian König wrote:
Am 21.11.2017 um 23:26 schrieb Boris Ostrovsky:
On 11/21/2017 08:34 AM, Christian König wrote:
Hi Boris,
attached are two patches.
The first one is a trivial fix for the infinite loop issue, it now
On 11/22/2017 11:54 AM, Christian König wrote:
> Am 22.11.2017 um 17:24 schrieb Boris Ostrovsky:
>> On 11/22/2017 05:09 AM, Christian König wrote:
>>> Am 21.11.2017 um 23:26 schrieb Boris Ostrovsky:
On 11/21/2017 08:34 AM, Christian König wrote:
> Hi Boris,
>
> attached are two pat
> On Nov 21, 2017, at 9:26 AM, Jan Beulich wrote:
>
On 13.11.17 at 16:41, wrote:
>> +### Virtual CPUs
>> +
>> + Limit, x86 PV: 8192
>> + Limit-security, x86 PV: 32
>> + Limit, x86 HVM: 128
>> + Limit-security, x86 HVM: 32
>
> Personally I consider the "Limit-security" numbers t
flight 116424 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116424/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 broken in 116396
test-amd64-amd64-xl-qemuu-ws16-amd6
On 11/16/2017 03:43 PM, Julien Grall wrote:
> Hi George,
>
> On 13/11/17 15:41, George Dunlap wrote:
>> Signed-off-by: George Dunlap
>> ---
>> CC: Ian Jackson
>> CC: Wei Liu
>> CC: Andrew Cooper
>> CC: Jan Beulich
>> CC: Stefano Stabellini
>> CC: Konrad Wilk
>> CC: Tim Deegan
>> CC: Rich P
flight 116426 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116426/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-amd broken
test-armhf-armhf-
flight 116430 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116430/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 116362
test-armhf-armhf-libvirt-xsm 14 saveresto
On Nov 22, 2017, at 13:58, George Dunlap wrote:
>
>> On 11/16/2017 03:43 PM, Julien Grall wrote:
>> Hi George,
>>
>>> On 13/11/17 15:41, George Dunlap wrote:
>>> Signed-off-by: George Dunlap
>>> ---
>>> CC: Ian Jackson
>>> CC: Wei Liu
>>> CC: Andrew Cooper
>>> CC: Jan Beulich
>>> CC: Stefan
Superpage support and PVHVM.
Signed-off-by: George Dunlap
---
Changes since v2:
- Reworked superpage section
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: Jan Beulich
CC: Stefano Stabellini
CC: Konrad Wilk
CC: Tim Deegan
CC: Julien Grall
---
SUPPORT.md | 27 +
Signed-off-by: George Dunlap
---
Changes since v2:
- gdbsx -> not security suported
- Added host serial, host debug keys, and host sync_console entries
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: Jan Beulich
CC: Stefano Stabellini
CC: Konrad Wilk
CC: Tim Deegan
---
SUPPORT.md | 58 +
Mostly PV protocols.
Signed-off-by: George Dunlap
---
Changes since v2:
- Define "having xl support" as a requirement for Tech Preview and Supported
- ...and remove backend from xl support section
- Add OpenBSD blkback
- Fix Linux backend names
- Remove non-existent implementation (PV USB Linux)
Add a machine-readable file to describe what features are in what
state of being 'supported', as well as information about how long this
release will be supported, and so on.
The document should be formatted using "semantic newlines" [1], to make
changes easier.
Begin with the basic framework.
S
For now only include xl-specific features, or interaction with the
system. Feature support matrix will be added when features are
mentioned.
Signed-off-by: George Dunlap
---
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: Jan Beulich
CC: Stefano Stabellini
CC: Konrad Wilk
CC: Tim Deegan
Hardware support and guest type.
Signed-off-by: George Dunlap
---
Changes since v2:
- Moved SMMUv* into generic IOMMU section
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: Jan Beulich
CC: Stefano Stabellini
CC: Konrad Wilk
CC: Tim Deegan
CC: Julien Grall
---
SUPPORT.md | 25
Including host architecture support and guest types.
Signed-off-by: George Dunlap
---
Changes since v2:
- No Host ACPI listing for PVH dom0
- Add IOMMU entries for AMD and Intel
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: Jan Beulich
CC: Stefano Stabellini
CC: Konrad Wilk
CC: Tim Dee
Signed-off-by: George Dunlap
---
Changes since v2:
- Update "non-pci passthrough" section
- Add DT / ACPI sections
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: Jan Beulich
CC: Stefano Stabellini
CC: Konrad Wilk
CC: Tim Deegan
CC: Julien Grall
---
SUPPORT.md | 21
Core memory management and scheduling.
Signed-off-by: George Dunlap
---
Changes since v2:
- s/Memory Ballooning/Dynamic memory control/;
- And add a description that mentions ballooning
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: Jan Beulich
CC: Tim Deegan
CC: Dario Faggioli
CC: Nath
x86-specific virtual hardware provided by the hypervisor, toolstack,
or QEMU.
Signed-off-by: George Dunlap
---
Changes since v2:
- Updated Nested PV / HVM sections
- Removed AVX section
- EFI -> OVMF
Changes since v1:
- Added emulated QEMU support, to replace docs/misc/qemu-xen-security.
Need t
With the exception of driver domains, which depend on PCI passthrough,
and will be introduced later.
Signed-off-by: George Dunlap
Reviewed-by: Konrad Rzeszutek Wilk
---
Changes since v2:
- Reference XSA-77 as well under the XSM & FLASK section
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC
Signed-off-by: George Dunlap
---
Would someone be willing to take over this one?
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: Jan Beulich
CC: Stefano Stabellini
CC: Konrad Wilk
CC: Tim Deegan
CC: Roger Pau Monne
CC: Anthony Perard
CC: Paul Durrant
CC: Julien Grall
---
SUPPORT.md
Signed-off-by: George Dunlap
---
Changes since v2:
- Update memory limits for PV guests
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: Jan Beulich
CC: Stefano Stabellini
CC: Konrad Wilk
CC: Tim Deegan
---
SUPPORT.md | 68 +-
1
Migration being one of the key 'non-easy' ones to be added later.
Signed-off-by: George Dunlap
Acked-by: Jan Beulich
---
Changes since v2:
- Capitalization error
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: Jan Beulich
CC: Stefano Stabellini
CC: Konrad Wilk
CC: Tim Deegan
---
SUPPO
Signed-off-by: George Dunlap
---
Changes since v2:
- Separate PV and HVM passthrough (excluding PVH by implication)
- + not compatible with PoD
- 'will be' -> 'are'
NB that we don't seem to have the referenced file yet; left as a reference.
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: Ja
Mostly as a placeholder for things not yet considered
Signed-off-by: George Dunlap
---
SUPPORT.md | 2 ++
1 file changed, 2 insertions(+)
diff --git a/SUPPORT.md b/SUPPORT.md
index 72be1414a1..08f3a808be 100644
--- a/SUPPORT.md
+++ b/SUPPORT.md
@@ -132,6 +132,8 @@ Fully virtualised guest using
Signed-off-by: George Dunlap
Acked-by: Jan Beulich
---
Changes since v2:
- Add PoD entry
- memsharing x86 -> experimental, ARM -> {}
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: Jan Beulich
CC: Stefano Stabellini
CC: Konrad Wilk
CC: Tim Deegan
CC: Tamas K Lengyel
---
SUPPORT.md | 3
flight 116432 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116432/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 broken
build-amd64
On Wed, Oct 04, 2017 at 10:58:29AM -0500, Josh Poimboeuf wrote:
> Make paravirt_types.h more understandable:
>
> - Use more consistent and logical naming
> - Simplify interfaces
> - Put related macros together
> - Improve whitespace
>
> Signed-off-by: Josh Poimboeuf
> ---
> arch/x86/include/asm
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-xl-pvhv2-amd
testid xen-boot
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.g
pci_get_bus_and_slot() is restrictive such that it assumes domain=0 as
where a PCI device is present. This restricts the device drivers to be
reused for other domain numbers.
Use pci_get_domain_bus_and_slot() with a domain number of 0 where we can't
extract the domain number. Other places, use the
flight 116433 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116433/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win10-i386 7 xen-boot fail REGR. vs. 115643
test-amd64-amd64-py
flight 116434 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116434/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-raw broken
test-amd64-amd64-
All,
I am pleased to announce the release of Xen 4.9.1. This is
available immediately from its git repository
http://xenbits.xen.org/gitweb/?p=xen.git;a=shortlog;h=refs/heads/stable-4.9
(tag RELEASE-4.9.1) or from the XenProject download page
http://www.xenproject.org/downloads/xen-archives/xen-pr
All,
I am pleased to announce the release of Xen 4.7.4. This is
available immediately from its git repository
http://xenbits.xen.org/gitweb/?p=xen.git;a=shortlog;h=refs/heads/stable-4.7
(tag RELEASE-4.7.4) or from the XenProject download page
https://xenproject.org/downloads/xen-archives/xen-proj
73 matches
Mail list logo