xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: Fabio Fantoni <fabio.fantoni@m2r.biz>
To: Ian Campbell <ian.campbell@citrix.com>,
	Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Cc: Wei Liu <wei.liu2@citrix.com>,
	xen-devel <xen-devel@lists.xen.org>,
	Ian Jackson <Ian.Jackson@eu.citrix.com>,
	Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: Oldest supported Xen version in upstream QEMU (Was: Re: [Minios-devel] [PATCH v2 0/15+5+5] Begin to disentangle libxenctrl and provide some stable libraries)
Date: Thu, 24 Sep 2015 11:03:17 +0200	[thread overview]
Message-ID: <5603BC55.2090502@m2r.biz> (raw)
In-Reply-To: <1443078939.24382.155.camel@citrix.com>

Il 24/09/2015 09:15, Ian Campbell ha scritto:
> On Wed, 2015-09-23 at 18:36 +0100, Stefano Stabellini wrote:
>> On Wed, 23 Sep 2015, Ian Campbell wrote:
>>> On Tue, 2015-09-22 at 22:31 +0100, Stefano Stabellini wrote:
>>>> The oldest Xen version I build-test for every pull request is Xen 4.0.0,
> I setup a build trees for 4.0 thru 4.6 yesterday to test this, what a
> pain 4.1 and 4.0 are to build with a modern gcc! (Mostly newer compiler
> warnings and mostly, but not all, fixes which I could just backport
> from newer Xen, the exceptions were a couple of things which were
> removed before they needed to be fixed)
>
>>>> I think it is very reasonable to remove anything older than that.
>>>> I am OK with removing Xen 4.0.0 too, but I would like a warning to be
>>>> sent ahead of time to qemu-devel to see if anybody complains.
>>> There is not much point in removing <=3.4 support and keeping 4.0, since
>>> 4.0.0 was the last one which used a plain int as a handle, anything older
>>> than 4.0.0 is trivial if 4.0.0 is supported.
>>>
>>> One approach I am considering in order to keep 4.0.0 support and earlier
>>> was to turn the "int fd" for <=4.0 into a pointer by having the open
>>> wrapper do malloc(sizeof int) and the using wrappers do xc_foo(*handle).
>>>
>>> This way all the different variants take pointers and we have less hoops to
>>> jump through to typedef everything in the correct way for each variant.
>>>
>>> If you would rather avoid doing that then I think dropping 4.0.0 support
>>> would be the way to go and I'll send a mail to qemu-devel.
>>   
>> I would rather drop 4.0 support.
> Supporting 4.0 didn't turn out quite as ugly as I had feared.

Even if seems that major of distro use newer qemu version instead older 
with xen seems that keep updated also xen to latest stable version (or 
at least previous) and the cases where can uses next qemu version with 
very old xen I think is at least very rare.
Another thing is that upstream qemu on older xen not had good support 
(at least for hvm domUs) and when I started to use it some years ago 
seems that was with too very few users.
There are also some problem, for example this:
http://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=2e814a017155b885e4d4b5a88dc05e7367a9722a
without hvm domUs with emulated vga don't start with qemu>=1.4, applied 
to xen 4.3 and backported only in stable-4.2
Therefore excluded recent unexpected that I not know for a working 
support of hvm domUsat least xen 4.2 is needed.
In my cases I had saw good hvm domUs support with upstream qemu for 
production use only starting from xen 4.3.
I think is good know if older xen is really used with newer (more 
exactly next for these changes) qemu instead wasting time supporting and 
testing also many older xen versions.
In any cases thanks to all for any xen and qemu improvements.

Sorry for my bad english.

>
> So before I send an email to qemu-devel to propose dropping 4.0 what do
> you think of the following which handles the evtchn case, there is a
> similar patch for gnttab and a (yet to be written) patch for the
> foreign memory mapping case.
>
> The relevant bit for this discussion is the 4.0.0 definition of
> xenevtchn_open in xen_common.h, the rest is just adjusting it to use
> the API of the new library (for reasons explained in the commit
> message).
>
> commit d97f6bb5045685d766d85b8cd004ce007fe29120
> Author: Ian Campbell <ian.campbell@citrix.com>
> Date:   Wed Sep 23 17:30:15 2015 +0100
>
>      xen: Switch to libxenevtchn interface for compat shims.
>      
>      In Xen 4.7 we are refactoring parts libxenctrl into a number of
>      separate libraries which will provide backward and forward API and ABI
>      compatiblity.
>      
>      One such library will be libxenevtchn which provides access to event
>      channels.
>      
>      In preparation for this switch the compatibility layer in xen_common.h
>      (which support building with older versions of Xen) to use what will
>      be the new library API. This means that the evtchn shim will disappear
>      for versions of Xen which include libxenevtchn.
>      
>      To simplify things for the <= 4.0.0 support we wrap the int fd in a
>      malloc(sizeof int) such that the handle is always a pointer. This
>      leads to less typedef headaches and the need for
>      XC_HANDLER_INITIAL_VALUE etc for these interfaces.
>      
>      Build tested with 4.1 and 4.5.
>      
>      Note that this patch does not add any support for actually using
>      libxenevtchn, it just adjusts the existing shims.
>      
>      Note that xc_evtchn_alloc_unbound functionality remains in libxenctrl,
>      since that functionality is not exposed by /dev/xen/evtchn.
>      
>      Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
>
> diff --git a/hw/xen/xen_backend.c b/hw/xen/xen_backend.c
> index b2cb22b..1fd8e01 100644
> --- a/hw/xen/xen_backend.c
> +++ b/hw/xen/xen_backend.c
> @@ -243,19 +243,19 @@ static struct XenDevice *xen_be_get_xendev(const char *type, int dom, int dev,
>       xendev->debug      = debug;
>       xendev->local_port = -1;
>   
> -    xendev->evtchndev = xen_xc_evtchn_open(NULL, 0);
> -    if (xendev->evtchndev == XC_HANDLER_INITIAL_VALUE) {
> +    xendev->evtchndev = xenevtchn_open(NULL, 0);
> +    if (xendev->evtchndev == NULL) {
>           xen_be_printf(NULL, 0, "can't open evtchn device\n");
>           g_free(xendev);
>           return NULL;
>       }
> -    fcntl(xc_evtchn_fd(xendev->evtchndev), F_SETFD, FD_CLOEXEC);
> +    fcntl(xenevtchn_fd(xendev->evtchndev), F_SETFD, FD_CLOEXEC);
>   
>       if (ops->flags & DEVOPS_FLAG_NEED_GNTDEV) {
>           xendev->gnttabdev = xen_xc_gnttab_open(NULL, 0);
>           if (xendev->gnttabdev == XC_HANDLER_INITIAL_VALUE) {
>               xen_be_printf(NULL, 0, "can't open gnttab device\n");
> -            xc_evtchn_close(xendev->evtchndev);
> +            xenevtchn_close(xendev->evtchndev);
>               g_free(xendev);
>               return NULL;
>           }
> @@ -306,8 +306,8 @@ static struct XenDevice *xen_be_del_xendev(int dom, int dev)
>               g_free(xendev->fe);
>           }
>   
> -        if (xendev->evtchndev != XC_HANDLER_INITIAL_VALUE) {
> -            xc_evtchn_close(xendev->evtchndev);
> +        if (xendev->evtchndev != NULL) {
> +            xenevtchn_close(xendev->evtchndev);
>           }
>           if (xendev->gnttabdev != XC_HANDLER_INITIAL_VALUE) {
>               xc_gnttab_close(xendev->gnttabdev);
> @@ -691,13 +691,13 @@ static void xen_be_evtchn_event(void *opaque)
>       struct XenDevice *xendev = opaque;
>       evtchn_port_t port;
>   
> -    port = xc_evtchn_pending(xendev->evtchndev);
> +    port = xenevtchn_pending(xendev->evtchndev);
>       if (port != xendev->local_port) {
> -        xen_be_printf(xendev, 0, "xc_evtchn_pending returned %d (expected %d)\n",
> +        xen_be_printf(xendev, 0, "xenevtchn_pending returned %d (expected %d)\n",
>                         port, xendev->local_port);
>           return;
>       }
> -    xc_evtchn_unmask(xendev->evtchndev, port);
> +    xenevtchn_unmask(xendev->evtchndev, port);
>   
>       if (xendev->ops->event) {
>           xendev->ops->event(xendev);
> @@ -742,14 +742,14 @@ int xen_be_bind_evtchn(struct XenDevice *xendev)
>       if (xendev->local_port != -1) {
>           return 0;
>       }
> -    xendev->local_port = xc_evtchn_bind_interdomain
> +    xendev->local_port = xenevtchn_bind_interdomain
>           (xendev->evtchndev, xendev->dom, xendev->remote_port);
>       if (xendev->local_port == -1) {
> -        xen_be_printf(xendev, 0, "xc_evtchn_bind_interdomain failed\n");
> +        xen_be_printf(xendev, 0, "xenevtchn_bind_interdomain failed\n");
>           return -1;
>       }
>       xen_be_printf(xendev, 2, "bind evtchn port %d\n", xendev->local_port);
> -    qemu_set_fd_handler(xc_evtchn_fd(xendev->evtchndev),
> +    qemu_set_fd_handler(xenevtchn_fd(xendev->evtchndev),
>                           xen_be_evtchn_event, NULL, xendev);
>       return 0;
>   }
> @@ -759,15 +759,15 @@ void xen_be_unbind_evtchn(struct XenDevice *xendev)
>       if (xendev->local_port == -1) {
>           return;
>       }
> -    qemu_set_fd_handler(xc_evtchn_fd(xendev->evtchndev), NULL, NULL, NULL);
> -    xc_evtchn_unbind(xendev->evtchndev, xendev->local_port);
> +    qemu_set_fd_handler(xenevtchn_fd(xendev->evtchndev), NULL, NULL, NULL);
> +    xenevtchn_unbind(xendev->evtchndev, xendev->local_port);
>       xen_be_printf(xendev, 2, "unbind evtchn port %d\n", xendev->local_port);
>       xendev->local_port = -1;
>   }
>   
>   int xen_be_send_notify(struct XenDevice *xendev)
>   {
> -    return xc_evtchn_notify(xendev->evtchndev, xendev->local_port);
> +    return xenevtchn_notify(xendev->evtchndev, xendev->local_port);
>   }
>   
>   /*
> diff --git a/include/hw/xen/xen_backend.h b/include/hw/xen/xen_backend.h
> index 3b4125e..a90314f 100644
> --- a/include/hw/xen/xen_backend.h
> +++ b/include/hw/xen/xen_backend.h
> @@ -46,7 +46,7 @@ struct XenDevice {
>       int                remote_port;
>       int                local_port;
>   
> -    XenEvtchn          evtchndev;
> +    xenevtchn_handle   *evtchndev;
>       XenGnttab          gnttabdev;
>   
>       struct XenDevOps   *ops;
> diff --git a/include/hw/xen/xen_common.h b/include/hw/xen/xen_common.h
> index 5923290..5700c1b 100644
> --- a/include/hw/xen/xen_common.h
> +++ b/include/hw/xen/xen_common.h
> @@ -39,17 +39,37 @@ static inline void *xc_map_foreign_bulk(int xc_handle, uint32_t dom, int prot,
>   #if CONFIG_XEN_CTRL_INTERFACE_VERSION < 410
>   
>   typedef int XenXC;
> -typedef int XenEvtchn;
> +typedef int xenevtchn_handle;
>   typedef int XenGnttab;
>   
>   #  define XC_INTERFACE_FMT "%i"
>   #  define XC_HANDLER_INITIAL_VALUE    -1
>   
> -static inline XenEvtchn xen_xc_evtchn_open(void *logger,
> -                                           unsigned int open_flags)
> +static inline xenevtchn_handle *xenevtchn_open(void *logger,
> +					       unsigned int open_flags)
> +{
> +    int *h = malloc(sizeof h);
> +    if (!h)
> +	return NULL;
> +    *h = xc_evtchn_open();
> +    if (*h == -1) {
> +	 free(h);
> +         h = NULL;
> +    }
> +    return h;
> +}
> +static inline int xenevtchn_close(xenevtchn_handle *h)
>   {
> -    return xc_evtchn_open();
> +    int rc = xc_evtchn_close(*h);
> +    free(h);
> +    return rc;
>   }
> +#define xenevtchn_fd(h) xc_evtchn_fd(*h)
> +#define xenevtchn_pending(h) xc_evtchn_pending(*h)
> +#define xenevtchn_notify(h,p) xc_evtchn_notify(*h,p)
> +#define xenevtchn_bind_interdomain(h,d,p) xc_evtchn_bind_interdomain(*h,d,p)
> +#define xenevtchn_unmask(h,p) xc_evtchn_unmask(*h,p)
> +#define xenevtchn_unbind(h,p) xc_evtchn_unmask(*h,p)
>   
>   static inline XenGnttab xen_xc_gnttab_open(void *logger,
>                                              unsigned int open_flags)
> @@ -108,17 +128,20 @@ static inline void xs_close(struct xs_handle *xsh)
>   #else
>   
>   typedef xc_interface *XenXC;
> -typedef xc_evtchn *XenEvtchn;
> +typedef xc_evtchn xenevtchn_handle;
>   typedef xc_gnttab *XenGnttab;
>   
>   #  define XC_INTERFACE_FMT "%p"
>   #  define XC_HANDLER_INITIAL_VALUE    NULL
>   
> -static inline XenEvtchn xen_xc_evtchn_open(void *logger,
> -                                           unsigned int open_flags)
> -{
> -    return xc_evtchn_open(logger, open_flags);
> -}
> +#define xenevtchn_open(l,f) xc_evtchn_open(l,f);
> +#define xenevtchn_close(h) xc_evtchn_close(h)
> +#define xenevtchn_fd(h) xc_evtchn_fd(h)
> +#define xenevtchn_pending(h) xc_evtchn_pending(h)
> +#define xenevtchn_notify(h,p) xc_evtchn_notify(h,p)
> +#define xenevtchn_bind_interdomain(h,d,p) xc_evtchn_bind_interdomain(h,d,p)
> +#define xenevtchn_unmask(h,p) xc_evtchn_unmask(h,p)
> +#define xenevtchn_unbind(h,p) xc_evtchn_unbind(h,p)
>   
>   static inline XenGnttab xen_xc_gnttab_open(void *logger,
>                                              unsigned int open_flags)
> diff --git a/xen-hvm.c b/xen-hvm.c
> index 3a7fd58..54cbd72 100644
> --- a/xen-hvm.c
> +++ b/xen-hvm.c
> @@ -109,7 +109,7 @@ typedef struct XenIOState {
>       /* evtchn local port for buffered io */
>       evtchn_port_t bufioreq_local_port;
>       /* the evtchn fd for polling */
> -    XenEvtchn xce_handle;
> +    xenevtchn_handle *xce_handle;
>       /* which vcpu we are serving */
>       int send_vcpu;
>   
> @@ -709,7 +709,7 @@ static ioreq_t *cpu_get_ioreq(XenIOState *state)
>       int i;
>       evtchn_port_t port;
>   
> -    port = xc_evtchn_pending(state->xce_handle);
> +    port = xenevtchn_pending(state->xce_handle);
>       if (port == state->bufioreq_local_port) {
>           timer_mod(state->buffered_io_timer,
>                   BUFFER_IO_MAX_DELAY + qemu_clock_get_ms(QEMU_CLOCK_REALTIME));
> @@ -728,7 +728,7 @@ static ioreq_t *cpu_get_ioreq(XenIOState *state)
>           }
>   
>           /* unmask the wanted port again */
> -        xc_evtchn_unmask(state->xce_handle, port);
> +        xenevtchn_unmask(state->xce_handle, port);
>   
>           /* get the io packet from shared memory */
>           state->send_vcpu = i;
> @@ -1014,7 +1014,7 @@ static void handle_buffered_io(void *opaque)
>                   BUFFER_IO_MAX_DELAY + qemu_clock_get_ms(QEMU_CLOCK_REALTIME));
>       } else {
>           timer_del(state->buffered_io_timer);
> -        xc_evtchn_unmask(state->xce_handle, state->bufioreq_local_port);
> +        xenevtchn_unmask(state->xce_handle, state->bufioreq_local_port);
>       }
>   }
>   
> @@ -1058,7 +1058,7 @@ static void cpu_handle_ioreq(void *opaque)
>           }
>   
>           req->state = STATE_IORESP_READY;
> -        xc_evtchn_notify(state->xce_handle, state->ioreq_local_port[state->send_vcpu]);
> +        xenevtchn_notify(state->xce_handle, state->ioreq_local_port[state->send_vcpu]);
>       }
>   }
>   
> @@ -1066,8 +1066,8 @@ static void xen_main_loop_prepare(XenIOState *state)
>   {
>       int evtchn_fd = -1;
>   
> -    if (state->xce_handle != XC_HANDLER_INITIAL_VALUE) {
> -        evtchn_fd = xc_evtchn_fd(state->xce_handle);
> +    if (state->xce_handle != NULL) {
> +        evtchn_fd = xenevtchn_fd(state->xce_handle);
>       }
>   
>       state->buffered_io_timer = timer_new_ms(QEMU_CLOCK_REALTIME, handle_buffered_io,
> @@ -1105,7 +1105,7 @@ static void xen_exit_notifier(Notifier *n, void *data)
>   {
>       XenIOState *state = container_of(n, XenIOState, exit);
>   
> -    xc_evtchn_close(state->xce_handle);
> +    xenevtchn_close(state->xce_handle);
>       xs_daemon_close(state->xenstore);
>   }
>   
> @@ -1174,8 +1174,8 @@ int xen_hvm_init(ram_addr_t *below_4g_mem_size, ram_addr_t *above_4g_mem_size,
>   
>       state = g_malloc0(sizeof (XenIOState));
>   
> -    state->xce_handle = xen_xc_evtchn_open(NULL, 0);
> -    if (state->xce_handle == XC_HANDLER_INITIAL_VALUE) {
> +    state->xce_handle = xenevtchn_open(NULL, 0);
> +    if (state->xce_handle == NULL) {
>           perror("xen: event channel open");
>           return -1;
>       }
> @@ -1255,7 +1255,7 @@ int xen_hvm_init(ram_addr_t *below_4g_mem_size, ram_addr_t *above_4g_mem_size,
>   
>       /* FIXME: how about if we overflow the page here? */
>       for (i = 0; i < max_cpus; i++) {
> -        rc = xc_evtchn_bind_interdomain(state->xce_handle, xen_domid,
> +        rc = xenevtchn_bind_interdomain(state->xce_handle, xen_domid,
>                                           xen_vcpu_eport(state->shared_page, i));
>           if (rc == -1) {
>               fprintf(stderr, "shared evtchn %d bind error %d\n", i, errno);
> @@ -1264,7 +1264,7 @@ int xen_hvm_init(ram_addr_t *below_4g_mem_size, ram_addr_t *above_4g_mem_size,
>           state->ioreq_local_port[i] = rc;
>       }
>   
> -    rc = xc_evtchn_bind_interdomain(state->xce_handle, xen_domid,
> +    rc = xenevtchn_bind_interdomain(state->xce_handle, xen_domid,
>                                       bufioreq_evtchn);
>       if (rc == -1) {
>           fprintf(stderr, "buffered evtchn bind error %d\n", errno);
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@lists.xen.org
> http://lists.xen.org/xen-devel

  reply	other threads:[~2015-09-24  9:03 UTC|newest]

Thread overview: 55+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-07-15 15:46 [PATCH v2 0/15+5+5] Begin to disentangle libxenctrl and provide some stable libraries Ian Campbell
2015-07-15 15:46 ` [PATCH XEN v2 01/15] docs: Partial toolstack library API/ABI stabilisation Ian Campbell
2015-07-15 15:46 ` [PATCH XEN v2 02/15] tools/Rules.mk: Properly handle libraries with recursive dependcies Ian Campbell
2015-07-15 15:46 ` [PATCH XEN v2 03/15] tools: Refactor "xentoollog" into its own library Ian Campbell
2015-07-15 15:46 ` [PATCH XEN v2 04/15] tools/libxc: Remove osdep indirection for xc_evtchn Ian Campbell
2015-07-15 15:46 ` [PATCH XEN v2 05/15] tools: Refactor /dev/xen/evtchn wrappers into libxenevtchn Ian Campbell
2015-09-21 15:53   ` Ian Campbell
2015-07-15 15:46 ` [PATCH XEN v2 06/15] tools: Arrange to check public headers for ANSI compatiblity Ian Campbell
2015-07-15 15:46 ` [PATCH XEN v2 07/15] tools/libxc: Remove osdep indirection for xc_gnt{shr, tab} Ian Campbell
2015-07-15 15:46 ` [PATCH XEN v2 08/15] tools: Refactor /dev/xen/gnt{dev, shr} wrappers into libxengnttab Ian Campbell
2015-09-22 11:25   ` Ian Campbell
2015-09-22 11:36     ` Andrew Cooper
2015-09-22 12:41       ` Ian Jackson
2015-09-22 12:51         ` Ian Campbell
2015-07-15 15:46 ` [PATCH XEN v2 09/15] tools/libxc: Remove osdep indirection for privcmd Ian Campbell
     [not found]   ` <01C96D24-A13F-46A6-A8A9-5C04E2E199AF@citrix.com>
2015-07-16  7:59     ` Dave Scott
2015-07-16  8:35       ` Ian Campbell
2015-07-15 15:46 ` [PATCH XEN v2 10/15] tools: Refactor hypercall calling wrappers into libxencall Ian Campbell
2015-07-15 15:46 ` [PATCH XEN v2 11/15] tools/libxc: drop xc_map_foreign_bulk_compat wrappers Ian Campbell
2015-07-15 15:47 ` [PATCH XEN v2 12/15] tools: Remove xc_map_foreign_batch Ian Campbell
2015-07-15 16:08   ` George Dunlap
2015-07-15 15:47 ` [PATCH XEN v2 13/15] tools: Implement xc_map_foreign_range(s) in terms of common helper Ian Campbell
2015-07-15 15:47 ` [PATCH XEN v2 14/15] tools: Refactor foreign memory mapping into libxenforeignmemory Ian Campbell
2015-07-15 15:47 ` [PATCH XEN v2 15/15] HACK: Add a .config to pull all the right bits Ian Campbell
2015-07-15 15:47 ` [PATCH QEMUT v2 1/5] qemu-xen-traditional: Use xentoollog as a separate library Ian Campbell
2015-07-15 15:47 ` [PATCH QEMUT v2 2/5] qemu-xen-traditional: Use libxenevtchn Ian Campbell
2015-07-15 15:47 ` [PATCH QEMUT v2 3/5] qemu-xen-traditional: Use libxengnttab Ian Campbell
2015-07-15 15:47 ` [PATCH QEMUT v2 4/5] qemu-xen-traditional: Add libxencall to rpath-link Ian Campbell
2015-07-15 15:47 ` [PATCH QEMUT v2 5/5] qemu-xen-traditional: Add libxenforeignmemory " Ian Campbell
2015-07-15 15:48 ` [PATCH MINI-OS v2 1/5] mini-os: Include libxentoollog with libxc Ian Campbell
2015-07-15 15:48 ` [PATCH MINI-OS v2 2/5] mini-os: Include libxenevtchn " Ian Campbell
2015-07-15 15:48 ` [PATCH MINI-OS v2 3/5] mini-os: Include libxengnttab " Ian Campbell
2015-07-15 15:48 ` [PATCH MINI-OS v2 4/5] mini-os: Include libxencall " Ian Campbell
2015-07-15 15:48 ` [PATCH MINI-OS v2 5/5] mini-os: Include libxenforeignmemory " Ian Campbell
2015-07-15 15:53 ` [PATCH v2 0/15+5+5] Begin to disentangle libxenctrl and provide some stable libraries Andrew Cooper
2015-07-22 11:12   ` Ian Campbell
2015-07-22 12:58     ` Andrew Cooper
2015-07-22 13:05       ` Ian Campbell
2015-07-27  8:57     ` Ian Campbell
2015-09-22 15:03 ` Oldest supported Xen version in upstream QEMU (Was: Re: [Minios-devel] [PATCH v2 0/15+5+5] Begin to disentangle libxenctrl and provide some stable libraries) Ian Campbell
2015-09-22 21:31   ` Stefano Stabellini
2015-09-23  8:29     ` Ian Campbell
2015-09-23 14:09       ` Konrad Rzeszutek Wilk
2015-09-23 14:17         ` Juergen Gross
2015-09-23 14:21           ` Konrad Rzeszutek Wilk
2015-09-23 14:26             ` Ian Campbell
2015-09-23 17:36       ` Stefano Stabellini
2015-09-24  7:15         ` Ian Campbell
2015-09-24  9:03           ` Fabio Fantoni [this message]
2015-09-24 19:33           ` Stefano Stabellini
2015-09-24 21:11             ` Ian Campbell
2015-09-24 22:19               ` Stefano Stabellini
2015-09-25  8:27                 ` Ian Campbell
2015-09-25 20:31                   ` Stefano Stabellini
2015-09-24 16:47 ` [Minios-devel] [PATCH v2 0/15+5+5] Begin to disentangle libxenctrl and provide some stable libraries Ian Campbell

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=5603BC55.2090502@m2r.biz \
    --to=fabio.fantoni@m2r.biz \
    --cc=Ian.Jackson@eu.citrix.com \
    --cc=ian.campbell@citrix.com \
    --cc=roger.pau@citrix.com \
    --cc=stefano.stabellini@eu.citrix.com \
    --cc=wei.liu2@citrix.com \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).