[Xen-devel] [ovmf baseline-only test] 67912: all pass

2016-10-20 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 67912 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67912/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf f17c0ab617c86210d1b3de4ec493ee2f2ed3e1e6 baseline

[Xen-devel] [qemu-mainline test] 101548: regressions - FAIL

2016-10-20 Thread osstest service owner
flight 101548 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/101548/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-xsm 13 saverestore-support-check fail REGR. vs. 101443

Re: [Xen-devel] Xen virtual IOMMU high level design doc V2

2016-10-20 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Wednesday, October 19, 2016 3:18 AM > > > > > 1.2 Support VFIO-based user space driver (e.g. DPDK) in the guest > > It relies on the l2 translation capability (IOVA->GPA) on > > vIOMMU. pIOMMU l2 becomes a shadowing structure of > >

Re: [Xen-devel] Xen virtual IOMMU high level design doc V2

2016-10-20 Thread Tian, Kevin
> From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] > Sent: Wednesday, October 19, 2016 4:27 AM > > > > 2) For physical PCI device > > DMA operations go though physical IOMMU directly and IO page table for > > IOVA->HPA should be loaded into physical IOMMU. When guest updates > > l2

Re: [Xen-devel] [PATCH v2 1/2] x86/vmx: Print the problematic MSR if a vmentry fails

2016-10-20 Thread Andrew Cooper
On 20/10/16 10:40, Tian, Kevin wrote: >> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] >> Sent: Friday, October 14, 2016 5:29 PM >> >> On 14/10/16 07:39, Jan Beulich wrote: >> On 13.10.16 at 15:46, wrote: Sample error looks like: (XEN)

Re: [Xen-devel] [RFC KERNEL PATCH 0/2] Add Dom0 NVDIMM support for Xen

2016-10-20 Thread Haozhong Zhang
On 10/14/16 13:18 +0100, Andrew Cooper wrote: On 14/10/16 08:08, Haozhong Zhang wrote: On 10/13/16 20:33 +0100, Andrew Cooper wrote: On 13/10/16 19:59, Dan Williams wrote: On Thu, Oct 13, 2016 at 9:01 AM, Andrew Cooper wrote: On 13/10/16 16:40, Dan Williams wrote:

Re: [Xen-devel] [RFC KERNEL PATCH 0/2] Add Dom0 NVDIMM support for Xen

2016-10-20 Thread Haozhong Zhang
On 10/14/16 04:16 -0600, Jan Beulich wrote: On 13.10.16 at 17:46, wrote: On 10/13/16 03:08 -0600, Jan Beulich wrote: On 13.10.16 at 10:53, wrote: On 10/13/16 02:34 -0600, Jan Beulich wrote: On 12.10.16 at 18:19,

Re: [Xen-devel] [PATCH v3 2/2] x86/Intel: virtualize support for cpuid faulting

2016-10-20 Thread Andrew Cooper
On 20/10/2016 06:10, Kyle Huey wrote: > On Mon, Oct 17, 2016 at 5:32 AM, Wei Liu wrote: >> On Fri, Oct 14, 2016 at 12:47:36PM -0700, Kyle Huey wrote: >>> On HVM guests, the cpuid triggers a vm exit, so we can check the emulated >>> faulting state in vmx_do_cpuid and inject a

[Xen-devel] [distros-debian-wheezy test] 67913: all pass

2016-10-20 Thread Platform Team regression test user
flight 67913 distros-debian-wheezy real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67913/ Perfect :-) All tests in this flight passed as required baseline version: flight 67871 jobs: build-amd64 pass

Re: [Xen-devel] [PATCH v2 1/2] x86/vmx: Print the problematic MSR if a vmentry fails

2016-10-20 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Friday, October 14, 2016 5:29 PM > > On 14/10/16 07:39, Jan Beulich wrote: > On 13.10.16 at 15:46, wrote: > >> Sample error looks like: > >> > >> (XEN) Failed vm entry (exit reason 0x8022)

Re: [Xen-devel] [PATCH v2 2/2] x86/vmx: Reduce the verbosity of the vmentry failure error reporting

2016-10-20 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Thursday, October 13, 2016 9:46 PM > > Identify the affected vcpu at the start of the message. While tweaking this > area, add extra newlines between cases. > > Signed-off-by: Andrew Cooper >

[Xen-devel] [xen-unstable-smoke test] 101560: tolerable all pass - PUSHED

2016-10-20 Thread osstest service owner
flight 101560 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/101560/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl

Re: [Xen-devel] Xen virtual IOMMU high level design doc V2

2016-10-20 Thread Lan Tianyu
Hi Andrew: Thanks for your review. On 2016年10月19日 03:17, Andrew Cooper wrote: On 18/10/16 15:14, Lan Tianyu wrote: Change since V1: 1) Update motivation for Xen vIOMMU - 288 vcpus support part 2) Change definition of struct xen_sysctl_viommu_op 3) Update "3.5 Implementation

[Xen-devel] [xen-unstable test] 101555: tolerable FAIL

2016-10-20 Thread osstest service owner
flight 101555 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/101555/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl-arndale 15 guest-start/debian.repeat fail pass in 101546 test-armhf-armhf-xl-credit2 15

Re: [Xen-devel] [PATCH v3 2/2] x86/Intel: virtualize support for cpuid faulting

2016-10-20 Thread Kyle Huey
On Thu, Oct 20, 2016 at 12:56 AM, Andrew Cooper wrote: > On 20/10/2016 06:10, Kyle Huey wrote: >> On Mon, Oct 17, 2016 at 5:32 AM, Wei Liu wrote: >>> On Fri, Oct 14, 2016 at 12:47:36PM -0700, Kyle Huey wrote: On HVM guests, the cpuid triggers

Re: [Xen-devel] [PATCH v5 2/2] x86/Intel: virtualize support for cpuid faulting

2016-10-20 Thread Andrew Cooper
On 20/10/16 14:44, Kyle Huey wrote: > On HVM guests, the cpuid triggers a vm exit, so we can check the emulated > faulting state in vmx_do_cpuid and hvmemul_cpuid. A new function, > hvm_check_cpuid_fault will check if cpuid faulting is enabled and the CPL > 0. > When it returns true, the cpuid

Re: [Xen-devel] [PATCH v3 2/2] x86/Intel: virtualize support for cpuid faulting

2016-10-20 Thread Andrew Cooper
On 20/10/16 14:55, Kyle Huey wrote: > >>> That said, rr currently does not work in Xen guests due to some PMU >>> issues that we haven't tracked down yet. >> Is this RR trying to use vPMU and it not functioning, or not >> specifically trying to use PMU facilities and getting stuck anyway? > The

Re: [Xen-devel] [PATCH v5] x86/Intel: virtualize support for cpuid faulting

2016-10-20 Thread Wei Liu
On Thu, Oct 20, 2016 at 06:44:26AM -0700, Kyle Huey wrote: > rr (http://rr-project.org/), a Linux userspace record-and-replay reverse- > execution debugger, would like to trap and emulate the CPUID instruction. > This would allow us to a) mask away certain hardware features that rr does > not

Re: [Xen-devel] [PATCH for-4.8] altp2m: don't attempt to unshare pages during change_altp2m_gfn op

2016-10-20 Thread Wei Liu
On Thu, Oct 20, 2016 at 05:18:36PM +0100, George Dunlap wrote: > On 14/10/16 01:00, Tamas K Lengyel wrote: > > Attempting to change gfn mappings with altp2m on a memory shared page > > results > > in a lock-order violation (mm locking order violation: 282 > 254), which > > crashes the hypervisor.

Re: [Xen-devel] [PATCH for-4.8] altp2m: don't attempt to unshare pages during change_altp2m_gfn op

2016-10-20 Thread George Dunlap
On 14/10/16 01:00, Tamas K Lengyel wrote: > Attempting to change gfn mappings with altp2m on a memory shared page results > in a lock-order violation (mm locking order violation: 282 > 254), which > crashes the hypervisor. Don't attempt to automatically unshare such pages and > just fall back to

Re: [Xen-devel] [PATCH v2 2/2] xen_platform: SUSE xenlinux unplug for emulated PCI

2016-10-20 Thread Olaf Hering
On Thu, Oct 13, Stefano Stabellini wrote: > On Fri, 2 Sep 2016, Olaf Hering wrote: > > Implement SUSE specific unplug protocol for emulated PCI devices > > in PVonHVM guests. Its a simple 'outl(1, (ioaddr + 4));'. > > This protocol was implemented and used since Xen 3.0.4. > > It is used in all

Re: [Xen-devel] [PATCH v5] x86/Intel: virtualize support for cpuid faulting

2016-10-20 Thread Andrew Cooper
On 20/10/16 15:15, Wei Liu wrote: > On Thu, Oct 20, 2016 at 06:44:26AM -0700, Kyle Huey wrote: >> rr (http://rr-project.org/), a Linux userspace record-and-replay reverse- >> execution debugger, would like to trap and emulate the CPUID instruction. >> This would allow us to a) mask away certain

Re: [Xen-devel] [PATCH for-4.8] altp2m: don't attempt to unshare pages during change_altp2m_gfn op

2016-10-20 Thread George Dunlap
On 20/10/16 17:29, Tamas K Lengyel wrote: > On Oct 20, 2016 18:18, "George Dunlap" wrote: >> >> On 14/10/16 01:00, Tamas K Lengyel wrote: >>> Attempting to change gfn mappings with altp2m on a memory shared page > results >>> in a lock-order violation (mm locking order

Re: [Xen-devel] [PATCH 2/3] x86/mm: Use IS_ALIGNED() rather than open coding it

2016-10-20 Thread George Dunlap
On 14/10/16 17:02, Andrew Cooper wrote: > Drop repeated identical BUILD_BUG_ON()'s > > Signed-off-by: Andrew Cooper > --- > CC: Jan Beulich > CC: George Dunlap > --- > xen/arch/x86/x86_64/mm.c | 12 +--- > 1

[Xen-devel] [ovmf baseline-only test] 67914: all pass

2016-10-20 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 67914 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67914/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 99e55970ff0778ad46177a9c0fafb0766d4e6837 baseline

Re: [Xen-devel] [PATCH for-4.8] altp2m: don't attempt to unshare pages during change_altp2m_gfn op

2016-10-20 Thread Tamas K Lengyel
On Oct 20, 2016 18:18, "George Dunlap" wrote: > > On 14/10/16 01:00, Tamas K Lengyel wrote: > > Attempting to change gfn mappings with altp2m on a memory shared page results > > in a lock-order violation (mm locking order violation: 282 > 254), which > > crashes the

Re: [Xen-devel] [PATCH for-4.8] altp2m: don't attempt to unshare pages during change_altp2m_gfn op

2016-10-20 Thread Tamas K Lengyel
On Oct 20, 2016 18:40, "George Dunlap" wrote: > > On 20/10/16 17:29, Tamas K Lengyel wrote: > > On Oct 20, 2016 18:18, "George Dunlap" wrote: > >> > >> On 14/10/16 01:00, Tamas K Lengyel wrote: > >>> Attempting to change gfn mappings with

Re: [Xen-devel] [PATCH 2/3] x86/mm: Use IS_ALIGNED() rather than open coding it

2016-10-20 Thread Andrew Cooper
On 20/10/16 17:37, George Dunlap wrote: > On 14/10/16 17:02, Andrew Cooper wrote: >> Drop repeated identical BUILD_BUG_ON()'s >> >> Signed-off-by: Andrew Cooper >> --- >> CC: Jan Beulich >> CC: George Dunlap >> --- >>

[Xen-devel] [xen-unstable-smoke test] 101564: tolerable all pass - PUSHED

2016-10-20 Thread osstest service owner
flight 101564 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/101564/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl

Re: [Xen-devel] QEMU XenServer/XenProject Working group meeting 29th September 2016

2016-10-20 Thread Lars Kurth
> On 18 Oct 2016, at 20:54, Stefano Stabellini wrote: > > I think this kind of calls should be announced on xen-devel before they > happen, to give a chance to other people to participate (I cannot > promise I would have participated but it is the principle that counts).

Re: [Xen-devel] [PATCH v2 0/2] Remove PAGE_SIZE from public headers

2016-10-20 Thread Stefano Stabellini
On Thu, 20 Oct 2016, Juergen Gross wrote: > On 19/10/16 21:21, stef...@aporeto.com wrote: > > Reference to PAGE_SIZE slipped in to two public header files. QEMU build on > > ARM64 is broken by this. PAGE_SIZE should not be used because it could > > be undefined or it could be defined differently

Re: [Xen-devel] [PATCH v2 0/2] Remove PAGE_SIZE from public headers

2016-10-20 Thread Andrew Cooper
On 20/10/16 20:09, Stefano Stabellini wrote: > On Thu, 20 Oct 2016, Juergen Gross wrote: >> On 19/10/16 21:21, stef...@aporeto.com wrote: >>> Reference to PAGE_SIZE slipped in to two public header files. QEMU build on >>> ARM64 is broken by this. PAGE_SIZE should not be used because it could >>>

[Xen-devel] [xen-unstable-smoke test] 101567: tolerable all pass - PUSHED

2016-10-20 Thread osstest service owner
flight 101567 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/101567/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl

Re: [Xen-devel] Xen virtual IOMMU high level design doc V2

2016-10-20 Thread Andrew Cooper
On 20/10/16 10:53, Tian, Kevin wrote: >> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] >> Sent: Wednesday, October 19, 2016 3:18 AM >> >>> 1.2 Support VFIO-based user space driver (e.g. DPDK) in the guest >>> It relies on the l2 translation capability (IOVA->GPA) on >>> vIOMMU. pIOMMU l2

[Xen-devel] [qemu-mainline test] 101559: regressions - FAIL

2016-10-20 Thread osstest service owner
flight 101559 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/101559/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-xsm 13 saverestore-support-check fail REGR. vs. 101443

[Xen-devel] [ovmf test] 101562: all pass - PUSHED

2016-10-20 Thread osstest service owner
flight 101562 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/101562/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf b752e8a3fb685ae04155bf6a34a9aac83810613f baseline version: ovmf

Re: [Xen-devel] [PATCH v2 0/2] Remove PAGE_SIZE from public headers

2016-10-20 Thread Stefano Stabellini
On Thu, 20 Oct 2016, Andrew Cooper wrote: > On 20/10/16 20:09, Stefano Stabellini wrote: > > On Thu, 20 Oct 2016, Juergen Gross wrote: > >> On 19/10/16 21:21, stef...@aporeto.com wrote: > >>> Reference to PAGE_SIZE slipped in to two public header files. QEMU build > >>> on > >>> ARM64 is broken

Re: [Xen-devel] [RFC KERNEL PATCH 0/2] Add Dom0 NVDIMM support for Xen

2016-10-20 Thread Andrew Cooper
On 20/10/2016 10:14, Haozhong Zhang wrote: > > >> Once dom0 has a mapping of the nvdimm, the nvdimm driver can go to >> work >> and figure out what is on the DIMM, and which areas are safe to use. > I don't understand this ordering of events. Dom0 needs to have a > mapping

Re: [Xen-devel] [PATCH v2 0/2] Remove PAGE_SIZE from public headers

2016-10-20 Thread Stefano Stabellini
On Thu, 20 Oct 2016, Andrew Cooper wrote: > On 20/10/16 21:04, Stefano Stabellini wrote: > > On Thu, 20 Oct 2016, Andrew Cooper wrote: > >> On 20/10/16 20:09, Stefano Stabellini wrote: > >>> On Thu, 20 Oct 2016, Juergen Gross wrote: > On 19/10/16 21:21, stef...@aporeto.com wrote: > >

Re: [Xen-devel] [PATCH v2 0/2] Remove PAGE_SIZE from public headers

2016-10-20 Thread Andrew Cooper
On 20/10/16 21:04, Stefano Stabellini wrote: > On Thu, 20 Oct 2016, Andrew Cooper wrote: >> On 20/10/16 20:09, Stefano Stabellini wrote: >>> On Thu, 20 Oct 2016, Juergen Gross wrote: On 19/10/16 21:21, stef...@aporeto.com wrote: > Reference to PAGE_SIZE slipped in to two public header

Re: [Xen-devel] Xen virtual IOMMU high level design doc V2

2016-10-20 Thread Andrew Cooper
> >> >>> 255 vcpus support requires X2APIC and Linux disables X2APIC mode if >>> there is no interrupt remapping function which is present by vIOMMU. >>> Interrupt remapping function helps to deliver interrupt to #vcpu >255. >> >> This is only a requirement for xapic interrupt sources. x2apic >>

[Xen-devel] [ovmf baseline-only test] 67916: all pass

2016-10-20 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 67916 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67916/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf b752e8a3fb685ae04155bf6a34a9aac83810613f baseline

[Xen-devel] [ovmf test] 101569: all pass - PUSHED

2016-10-20 Thread osstest service owner
flight 101569 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/101569/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf c3926cdbbd9c4c884b8f87089e877187ccc63eb2 baseline version: ovmf

[Xen-devel] [xen-unstable test] 101563: tolerable FAIL - PUSHED

2016-10-20 Thread osstest service owner
flight 101563 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/101563/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt-qcow2 12 saverestore-support-check fail like 101546

[Xen-devel] [xtf test] 101566: all pass - PUSHED

2016-10-20 Thread osstest service owner
flight 101566 xtf real [real] http://logs.test-lab.xenproject.org/osstest/logs/101566/ Perfect :-) All tests in this flight passed as required version targeted for testing: xtf a78dbe70cd6ea14a02a524fbe0cb8f6e11b1080e baseline version: xtf

[Xen-devel] [linux-3.18 test] 101561: regressions - FAIL

2016-10-20 Thread osstest service owner
flight 101561 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/101561/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 6 xen-boot fail REGR. vs. 101000

Re: [Xen-devel] [PATCH v5 7/9] x86, xen: support vcpu preempted check

2016-10-20 Thread Juergen Gross
Corrected xen-devel mailing list address, added other Xen maintainers On 20/10/16 23:27, Pan Xinhui wrote: > From: Juergen Gross > > Support the vcpu_is_preempted() functionality under Xen. This will > enhance lock performance on overcommitted hosts (more runnable vcpus > than

Re: [Xen-devel] QEMU XenServer/XenProject Working group meeting 29th September 2016

2016-10-20 Thread Stefano Stabellini
On Thu, 20 Oct 2016, Lars Kurth wrote: > > On 18 Oct 2016, at 20:54, Stefano Stabellini wrote: > > > > I think this kind of calls should be announced on xen-devel before they > > happen, to give a chance to other people to participate (I cannot > > promise I would have

[Xen-devel] [libvirt test] 101557: regressions - all pass

2016-10-20 Thread osstest service owner
flight 101557 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/101557/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-qcow2 12 saverestore-support-check fail REGR. vs. 101477

[Xen-devel] [PATCH v5 1/2] x86/Intel: Expose cpuid_faulting_enabled so it can be used elsewhere

2016-10-20 Thread Kyle Huey
While we're here, use bool instead of bool_t. Signed-off-by: Kyle Huey Reviewed-by: Andrew Cooper Reviewed-by: Wei Liu --- xen/arch/x86/cpu/intel.c| 9 + xen/include/asm-x86/cpuid.h | 3 +++ 2 files changed, 8

[Xen-devel] [PATCH v5] x86/Intel: virtualize support for cpuid faulting

2016-10-20 Thread Kyle Huey
rr (http://rr-project.org/), a Linux userspace record-and-replay reverse- execution debugger, would like to trap and emulate the CPUID instruction. This would allow us to a) mask away certain hardware features that rr does not support (e.g. RDRAND) and b) enable trace portability across machines

[Xen-devel] [ovmf test] 101558: all pass - PUSHED

2016-10-20 Thread osstest service owner
flight 101558 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/101558/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 99e55970ff0778ad46177a9c0fafb0766d4e6837 baseline version: ovmf

[Xen-devel] [PATCH v5 2/2] x86/Intel: virtualize support for cpuid faulting

2016-10-20 Thread Kyle Huey
On HVM guests, the cpuid triggers a vm exit, so we can check the emulated faulting state in vmx_do_cpuid and hvmemul_cpuid. A new function, hvm_check_cpuid_fault will check if cpuid faulting is enabled and the CPL > 0. When it returns true, the cpuid handling functions will inject a GP(0). Notably

[Xen-devel] [linux-3.18 test] 101552: regressions - FAIL

2016-10-20 Thread osstest service owner
flight 101552 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/101552/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 6 xen-boot fail REGR. vs. 101000

Re: [Xen-devel] Xen virtual IOMMU high level design doc V2

2016-10-20 Thread Lan, Tianyu
On 10/19/2016 4:26 AM, Konrad Rzeszutek Wilk wrote: On Tue, Oct 18, 2016 at 10:14:16PM +0800, Lan Tianyu wrote: 1 Motivation for Xen vIOMMU === 1.1 Enable more than 255 vcpu support HPC cloud service requires VM

Re: [Xen-devel] [PATCH v3 2/2] x86/Intel: virtualize support for cpuid faulting

2016-10-20 Thread Boris Ostrovsky
On 10/20/2016 10:11 AM, Andrew Cooper wrote: > On 20/10/16 14:55, Kyle Huey wrote: That said, rr currently does not work in Xen guests due to some PMU issues that we haven't tracked down yet. >>> Is this RR trying to use vPMU and it not functioning, or not >>> specifically trying to use