New commits:
- xen/pt: allow QEMU to request MSI unmasking at bind time
To fix a passthrough bug.
- ui/gtk: Fix deprecation of vte_terminal_copy_clipboard
A build fix.
Signed-off-by: Anthony PERARD
---
Should already be released-acked.
---
Config.mk | 2 +-
1 file changed, 1 insertion(+), 1
including tests which could not be run:
> build-armhf-pvopsbroken in
> 115713
> build-armhf-pvops 4 host-install(4) broken in 115713 REGR. vs.
> 114457
This test pass in this flight. Why the fact that it was broken in an
older flight is b
oblem is that QEMU 4.10 have a lock on the disk image. When
booting an HVM guest with a qdisk backend, the disk is open twice, but
can only be locked once, so when the pv disk is been initialized, the
initialisation kind of fail.
Unfortunatly, OVMF will wait indefinitly until the PV disk is
initialized.
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
risk-free but it only affects PCI Passthrough. Also
> > the commit has been in QEMU for 2 months now.
>
> Does anyone actually tested it with QEMU Xen tree?
Yes. I've tested qemu-xen with this patch and PCI passthrough still
works.
Can I get a release-ack?
Thanks,
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
ibxl__ao__destroy:
> ao 0xb3f01578: destroy
>
> Sadly AFAICT there's no log for the QEMU running this backend.
> Previous domain creating attempts worked.
That's happening with QEMU mainline as well, I don't know why.
On this test, qemu-system-i386 may have crashed, b
esn't exit the script, but only the loop ...
Reviewed-by: Anthony PERARD
FIY: One would write the loop like this:
while read num rev; do
:
done < <(git rev-list $BASE..$TIP | nl -ba | tac)
And then you could ret=$?;break; inside the loop, an
the build command, then start printing imformation about
what/where it went wrong, and how to go back.
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
move
> it to hw/xen.
>
> Cc: Stefano Stabellini
> Cc: Anthony Perard
> Cc: xen-de...@lists.xenproject.org
> Signed-off-by: Paolo Bonzini
> ---
> Xen parts only compile-tested.
>
> docs/qdev-device-use.txt | 12 +-
> hw/i386/M
quot;%s\" doesn't exist (and is not .)\n",
The error message have not been update, I think it should be :
> +optarg);
> exit(1);
> }
> break;
With the error message fix:
Reviewed-by: Anthony PERARD
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
rancis
> Cc: Gerd Hoffmann
> Cc: Andrzej Zaborowski
> Cc: Stefano Stabellini
> Cc: Anthony Perard
> Cc: John Snow
> Cc: Aurelien Jarno
> Cc: Yongbok Kim
> Cc: Peter Crosthwaite
> Cc: Stefan Hajnoczi
> Cc: Fam Zheng
> Cc: Juan Quintela
> Cc: "Dr. D
ck to the problem at hand. Whether
> it is a proper solution, I can't say without investing a lot more time.
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
ut I'm not sure if it is a good idea.
(I'm still trying to find out how a script can do a better job than a
plain `git rebase --interactive --exec 'blah'`, it is maybe just because
I know what to do if there is an issue.)
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
./mg-hosts showprops XXX description and implementation didn't match.
Fix description.
Signed-off-by: Anthony PERARD
---
mg-hosts | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/mg-hosts b/mg-hosts
index a000f2d..d91a965 100755
--- a/mg-hosts
+++ b/mg-hosts
@@
sk. It's a new feature (even if one only for developers).
> It's not *intended* to destroy anything, but a bug in it well could
> destroy data.
There is a `git clean -dxf` in the script, this is destructif! I'm sure
it's going to take some people b
On Mon, Oct 23, 2017 at 12:30:33PM +0100, Anthony PERARD wrote:
> On Fri, Oct 20, 2017 at 06:32:55PM +0100, Wei Liu wrote:
> > +CMD=${3:-git clean -fdx && ./configure && make -j4}
> > +
> > +echo "Running command \"$CMD\" on every
`seq 5 -1 1`; do
> +echo -n "$i ... "
> +sleep 1
> +done
> +
Instead of the count down, I would do:
echo -n 'Continue ? (^C to quit) '
read
OR something like:
echo -n 'Continue ? [Yn] '
read answer
[[ "$answer" =~ ^(|Y|y|yes)$ ]] || exit
I
Hi Ian,
The patches in this v5 appear to be the same the one from the patch
series v4.
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Thu, Oct 19, 2017 at 05:38:10PM +0100, Ian Jackson wrote:
> Anthony PERARD writes ("Re: [PATCH 1/8] xen: link against xentoolcore"):
> > I don't think it is necessary to do anything in qemu. The linker should
> > find on its own the new libxentoolcore as long as
MAKELEVEL would already be greater than 0 and
the git submodules would not be updated and QEMU would fail to build.
Fix this by removing MAKELEVEL from the environment before trying to
build QEMU.
Signed-off-by: Anthony PERARD
---
tools/Makefile | 1 +
1 file changed, 1 insertion(+)
diff --g
On Wed, Oct 11, 2017 at 01:19:25PM -0700, Stefano Stabellini wrote:
> On Wed, 11 Oct 2017, Anthony PERARD wrote:
> > The only observation I have is that on a Linux guest, when I have
> > usbdevice=tablet, with this series the pv mouse seems to become the
> > primary way of
On Tue, Oct 10, 2017 at 04:52:48PM -0700, Stefano Stabellini wrote:
> On Mon, 2 Oct 2017, Anthony PERARD wrote:
> > On Tue, Sep 26, 2017 at 02:43:39PM +, Owen Smith wrote:
> > > Writes "feature-raw-pointer" during init to indicate the backend
> > > can
s not seems to be related to QEMU.
Thanks,
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
provide a stub for earlier versions.
>
> Signed-off-by: Ian Jackson
Reviewed-by: Anthony PERARD
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
tional change.
>
> Signed-off-by: Ian Jackson
Acked-by: Anthony PERARD
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
han after os_setup_post, because
> xen_restrict may need to open /dev/null, and os_setup_post might have
> called chroot.
>
> Signed-off-by: Ian Jackson
Reviewed-by: Anthony PERARD
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
er, only. Provide a compatibility stub. And drop the
> compatibility stubs for the old functions.
>
> Signed-off-by: Ian Jackson
Reviewed-by: Anthony PERARD
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
tatic XENTOOLCORE_LIST_HEAD(, Xentoolcore__Active_Handle) handles;
> +
> +static void lock(void) {
> +int e = pthread_mutex_unlock(&handles_lock);
Shouldn't this call pthread_mutex_lock? Right now lock and unlock do
the same thing.
> +assert(!e);
> +}
> +
> +s
On Mon, Oct 09, 2017 at 05:58:17PM +0100, Ian Jackson wrote:
> (My resend has crossed with your review. Sorry about that.)
>
> Anthony PERARD writes ("Re: [PATCH 3/8] xen: defer call to xen_restrict until
> after os_setup_post"):
> > On Wed, Oct 04, 2017 at 05:18:0
On Mon, Oct 09, 2017 at 05:28:08PM +0100, Ian Jackson wrote:
> Ian Jackson writes ("[PATCH 1/8] xen: link against xentoolcore"):
> > From: Anthony PERARD
> >
> > Xen libraries 4.10 will include a new xentoolcore library, without
> > which xendevicemodel et a
xen_hvm_init(PCMachineState *pcms, MemoryRegion
> **ram_memory)
> void qmp_xen_set_global_dirty_log(bool enable, Error **errp)
> {
> }
> +
> +void xen_setup_post(void)
> +{
> +}
> diff --git a/vl.c b/vl.c
> index fb1f05b..9e7d541 100644
> --- a/vl.c
> +++ b/vl.c
> @@ -4793,6 +4793,7 @@ int main(int argc, char **argv, char **envp)
> }
>
> os_setup_post();
> +xen_setup_post();
>
> main_loop();
> replay_disable_events();
> --
> 2.1.4
>
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Tue, Oct 03, 2017 at 12:33:37PM +0100, Roger Pau Monné wrote:
> On Mon, Oct 02, 2017 at 04:30:58PM +0000, Anthony PERARD wrote:
> > When doing a live migration of a Xen guest with libxl, the images for
> > block devices are locked by the original QEMU process, and this prevent
otherwise, the patch does not apply. With that
fix, you can add my:
Acked-by: Anthony PERARD
Thanks,
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
the commit description?
> "feature-raw-pointer" and "request-raw-pointer" added to Xen
> header in commit 7868654ff7fe5e4a2eeae2b277644fa884a5031e
I think that with it, you could have kept stefano's reviewed-by tag.
Thanks,
--
Anthony PERARD
_
commands, "stop" then "xen-save-devices-state", at which point a
new QEMU is spawned at the destination.
Release locks in "xen-save-devices-state" so the destination can takes
them.
Signed-off-by: Anthony PERARD
---
CCing libxl maintainers:
CC: Ian Jackson
CC: Wei Liu
On Wed, Sep 27, 2017 at 05:10:09PM +0100, Wei Liu wrote:
> The error code is encoding in errno, not rc.
^ encoded
I think.
Otherwise,
Reviewed-by: Anthony PERARD
Thanks,
>
> Signed-off-by: Wei Liu
> ---
> Cc: Stefano Stabellini
> Cc: Anthony PERARD
&g
Update to allow to build OVMF with GCC 7.2.
Signed-off-by: Anthony PERARD
---
Config.mk | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Config.mk b/Config.mk
index bba81bee7d..57d3e2bc44 100644
--- a/Config.mk
+++ b/Config.mk
@@ -272,7 +272,7 @@ QEMU_TRADITIONAL_URL ?=
git
multiple times for a domain, e.g. in case grub-xen is being
> used to boot it.
>
> So instead of letting the generic backend code open the gnttab device
> do it in blk_connect() and close it again in blk_disconnect.
>
> Signed-off-by: Juergen Gross
Acked-by: Anthony PERARD
Tha
Signed-off-by: Anthony PERARD
---
Config.mk | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Config.mk b/Config.mk
index bba81bee7d..57d3e2bc44 100644
--- a/Config.mk
+++ b/Config.mk
@@ -272,7 +272,7 @@ QEMU_TRADITIONAL_URL ?=
git://xenbits.xen.org/qemu-xen-traditional.git
vice *xendev)
> @@ -1363,7 +1374,6 @@ static void blk_event(struct XenDevice *xendev)
>
> struct XenDevOps xen_blkdev_ops = {
> .size = sizeof(struct XenBlkDev),
> -.flags = DEVOPS_FLAG_NEED_GNTDEV,
> .alloc = blk_alloc,
> .init = blk_init,
&g
+ !xen_feature_grant_copy);
> xenstore_write_be_int(&blkdev->xendev, "info", info);
>
> xenstore_write_be_int(&blkdev->xendev, "max-ring-page-order",
> diff --git a/hw/xen/xen_backend.c b/hw/xen/xen_backend.c
> index c
> Signed-off-by: Jan Beulich
Acked-by: Anthony PERARD
> --- a/hw/block/xen_disk.c
> +++ b/hw/block/xen_disk.c
> @@ -1232,7 +1232,7 @@ static int blk_connect(struct XenDevice
> return -1;
> }
>
> -domids = g_malloc0_n(blkdev->nr_ring_ref, sizeo
On Wed, Aug 02, 2017 at 04:36:34PM +0100, Anthony PERARD wrote:
> Hi,
>
> I've just pushed QEMU v2.9.0 to our qemu-xen tree.
And now, v2.10 is in our tree.
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https:/
On Thu, Sep 14, 2017 at 11:04:26AM +0100, Julien Grall wrote:
> Hi,
>
> CC Anthony. It sounds like the latest ovmf build is broken.
Thanks,
This is probably fixed by 5afa5b815936e2b45a375b6521764195bed68680, not
yet tested. At least, it build on my machine.
Regards,
--
Antho
On Mon, Sep 11, 2017 at 04:07:08PM +0100, George Dunlap wrote:
> On 09/11/2017 04:02 PM, Anthony PERARD wrote:
> > On Mon, Sep 11, 2017 at 03:16:13PM +0100, George Dunlap wrote:
> >> On 09/07/2017 10:54 PM, Stefano Stabellini wrote:
> >>> On Thu, 31
FreeBSD (netback): Supported
> >> +Status, QEMU (xen_nic): Experimental
> >
> > I suggest to Deprecate xen_nic
>
> That's fine with me. Anthony?
Yes, that fine by me. xen_nic is only for PV guest, and I don't known
how it
6:0: note: this is the location of the previous
definition
#define KEY_F(n) (KEY_F0+(n)) /* Value of function key n */
[...]
And a lot more...
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
ch, the offset
sent via QMP seems to be between the previous value of the guest rtc and
the new one. Other calls to qapi_event_send_rtc_change send the offset
between the new guest RTC and qemu_time().
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
hotplug to root bus on legacy mode
hw/acpi: Move acpi_set_pci_info to pcihp
Signed-off-by: Anthony PERARD
---
CC: Stefano Stabellini
CC: Bruce Rogers
---
hw/acpi/piix4.c | 11 +++
1 file changed, 3 insertions(+), 8 deletions(-)
diff --git a/hw/acpi/piix4.c b/hw/acpi/piix4.c
index
BSEL twice"
(f0c9d64a68b776374ec4732424a3e27753ce37b6).
Adding find_i440fx into stubs so that mips-softmmu target can be built.
Reported-by: Sander Eikelenboom
Signed-off-by: Anthony PERARD
---
Changes in V4:
- call acpi_set_pci_info only once
- Add a stub of find_i440fx (for mips_softmmu targ
Adding PCI passthrough before the guest start works fine (broken in 2.9 but now
fixed), but hotplug does not work anymore.
Anthony PERARD (3):
hw/acpi: Limit hotplug to root bus on legacy mode
hw/acpi: Move acpi_set_pci_info to pcihp
Revert "ACPI: don't call acpi_pcihp_device_plug
Signed-off-by: Anthony PERARD
---
New patch in V3
---
hw/acpi/pcihp.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/hw/acpi/pcihp.c b/hw/acpi/pcihp.c
index c420a388ea..9db3c2eaf2 100644
--- a/hw/acpi/pcihp.c
+++ b/hw/acpi/pcihp.c
@@ -273,7 +273,7 @@ static void pci_write
On Fri, Aug 18, 2017 at 04:19:57PM +0200, Igor Mammedov wrote:
> On Fri, 18 Aug 2017 14:31:07 +0100
> Anthony PERARD wrote:
>
> > On Fri, Aug 18, 2017 at 11:37:34AM +0200, Igor Mammedov wrote:
> > > On Fri, 18 Aug 2017 04:40:02 +0300
> > > "Michael S. Ts
On Fri, Aug 18, 2017 at 11:37:34AM +0200, Igor Mammedov wrote:
> On Fri, 18 Aug 2017 04:40:02 +0300
> "Michael S. Tsirkin" wrote:
>
> > On Thu, Aug 17, 2017 at 05:23:46PM +0100, Anthony PERARD wrote:
> > > This means that the function will be call and the prop
state -- fallthrough */
+ /* fallthrough -- Missed the backend's Closing state */
FIY:
https://gcc.gnu.org/onlinedocs/gcc-7.2.0/gcc/Warning-Options.html#index-Wimplicit-fallthrough
A dash seems to be needed between "fall through" and a extra comment,
with fa
the property starts with commit
"pc: pcihp: avoid adding ACPI_PCIHP_PROP_BSEL twice"
(f0c9d64a68b776374ec4732424a3e27753ce37b6).
Reported-by: Sander Eikelenboom
Signed-off-by: Anthony PERARD
---
Changes in V3:
- move acpi_set_pci_info to pcihp instead
Changes in V2:
- check for ac
Signed-off-by: Anthony PERARD
---
New patch in V3
---
hw/acpi/pcihp.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/hw/acpi/pcihp.c b/hw/acpi/pcihp.c
index c420a388ea..9db3c2eaf2 100644
--- a/hw/acpi/pcihp.c
+++ b/hw/acpi/pcihp.c
@@ -273,7 +273,7 @@ static void pci_write
: Disallow change of hotplug_select on legacy_piix
hw/acpi: Move acpi_set_pci_info to pcihp
Signed-off-by: Anthony PERARD
---
CC: Stefano Stabellini
CC: Bruce Rogers
---
hw/acpi/piix4.c | 11 +++
1 file changed, 3 insertions(+), 8 deletions(-)
diff --git a/hw/acpi/piix4.c b/hw/acpi/piix4.c
Adding PCI passthrough before the guest start works fine (broken in 2.9 but now
fixed), but hotplug does not work anymore.
Anthony PERARD (3):
hw/acpi: Limit hotplug to root bus on legacy mode
hw/acpi: Move acpi_set_pci_info to pcihp
Revert "ACPI: don't call acpi_pcihp_device_plug
On Wed, Aug 16, 2017 at 11:10:46AM +0200, Igor Mammedov wrote:
> On Tue, 15 Aug 2017 22:24:08 +0300
> "Michael S. Tsirkin" wrote:
>
> > On Tue, Aug 15, 2017 at 02:07:51PM +0200, Igor Mammedov wrote:
> > > On Tue, 15 Aug 2017 12:15:48 +0100
> > > Anthon
D to
remove "--with-system-ovmf" configure option (if your compile Xen from
AUR)
OR
Recompile OVMF from https://xenbits.xen.org/git-http/ovmf.git (or the
upstream URL) with `OvmfPkg/build.sh -n $nb_of_cpu -b RELEASE` and use
the OVMF file from Build/OvmfX64/RELEASE_GCC*/FV/OVMF.fd
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Adding PCI passthrough before the guest start works fine (broken in 2.9 but now
fixed), but hotplug does not work anymore.
Anthony PERARD (2):
hw/acpi: Call acpi_set_pci_info when no ACPI tables needed
Revert "ACPI: don't call acpi_pcihp_device_plug_cb on xen"
hw/acpi/pi
twice"
(f0c9d64a68b776374ec4732424a3e27753ce37b6).
Set pci info before checking for the needs to build ACPI tables.
Assign bsel=0 property only to the root bus on Xen as there is no
support in the Xen ACPI tables for a different value.
Reported-by: Sander Eikelenboom
Signed-off-by: Anthony PERARD
---
Changes in V2:
-
acpi_set_pci_info when no ACPI tables needed).
Signed-off-by: Anthony PERARD
---
CC: Stefano Stabellini
CC: Bruce Rogers
---
hw/acpi/piix4.c | 11 +++
1 file changed, 3 insertions(+), 8 deletions(-)
diff --git a/hw/acpi/piix4.c b/hw/acpi/piix4.c
index f276967365..f4fd5907b8 100644
--- a/hw
On Mon, Aug 14, 2017 at 06:53:14PM +0300, Michael S. Tsirkin wrote:
> On Mon, Aug 14, 2017 at 03:55:50PM +0100, Anthony PERARD wrote:
> > On Fri, Aug 11, 2017 at 08:18:28PM +0300, Michael S. Tsirkin wrote:
> > > On Fri, Aug 11, 2017 at 04:11:37PM +0100, Anthony PERARD wrote:
On Fri, Aug 11, 2017 at 08:18:28PM +0300, Michael S. Tsirkin wrote:
> On Fri, Aug 11, 2017 at 04:11:37PM +0100, Anthony PERARD wrote:
> > To do PCI passthrough with Xen, the property acpi-pcihp-bsel needs to be
> > set, but this was done only when ACPI tables are built which is not
is usage. This patch recognizes
> this case and uses new interfaces to bind/unbind msi.
>
> Signed-off-by: Chao Gao
> Signed-off-by: Lan Tianyu
Reviewed-by: Anthony PERARD
That patch series can be applied once the Xen side patches are merg
Adding PCI passthrough before the guest start works fine (broken in 2.9 but now
fixed), but hotplug does not work anymore.
Anthony PERARD (2):
hw/acpi: Call acpi_set_pci_info when no ACPI tables needed
Revert "ACPI: don't call acpi_pcihp_device_plug_cb on xen"
hw/acpi/pi
acpi_set_pci_info when no ACPI tables needed).
Signed-off-by: Anthony PERARD
---
CC: Stefano Stabellini
CC: Bruce Rogers
---
hw/acpi/piix4.c | 11 +++
1 file changed, 3 insertions(+), 8 deletions(-)
diff --git a/hw/acpi/piix4.c b/hw/acpi/piix4.c
index f276967365..f4fd5907b8 100644
--- a/hw
twice"
(f0c9d64a68b776374ec4732424a3e27753ce37b6).
Set pci info before checking for the needs to build ACPI tables.
Reported-by: Sander Eikelenboom
Tested-by: Sander Eikelenboom
Signed-off-by: Anthony PERARD
---
In this patch rather than always calling acpi_set_pci_info() when
acpi_setup() is called, we could check
On Thu, Aug 10, 2017 at 03:00:56PM +0100, Anthony PERARD wrote:
> On Wed, Aug 09, 2017 at 06:34:43PM +0200, Sander Eikelenboom wrote:
> > L.S.,
> >
> > It seems the xen qemu-upstream tree got updated from qemu upstream last
> > week.
> > Unfortunately a change
I'll look into this.
Have you try with a more recent QEMU ? from git://git.qemu.org/qemu.git
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
nst the description
written in the Intel SDM.
Signed-off-by: Anthony PERARD
---
Changes in V3:
- new argument for vlapic_update_timer: tmict_updated.
To avoid setting timer_last_update twice when TMICT is been updated.
- use values of period and delta to calculate timer_last_update only
w
ect.org/archives/html/xen-devel/2017-03/msg02533.html
v2: look for "[XTF PATCH V2 0/3] Testing vlapic timer"
Anthony PERARD (3):
x86/vlapic: Introduce vlapic_update_timer
x86/vlapic: Keep timer running when switching between one-shot and
periodic mode
x86/vlapic: Apply cha
There should not be any functionality change with this patch.
This function is used when the APIC_TMICT register is updated.
vlapic_update_timer is introduce as it will be use also when the
registers APIC_LVTT and APIC_TDCR are updated.
Signed-off-by: Anthony PERARD
---
Changes in V3
ggered.
Signed-off-by: Anthony PERARD
---
Changes in V3:
- do the calculation when the divisor is change only if delta is !0.
---
xen/arch/x86/hvm/vlapic.c | 26 +-
1 file changed, 21 insertions(+), 5 deletions(-)
diff --git a/xen/arch/x86/hvm/vlapic.c b/xen/arch/x86/hvm
On Fri, Aug 04, 2017 at 09:48:59AM -0600, Jan Beulich wrote:
> >> Anthony PERARD 08/04/17 1:38 PM >>>
> >On Thu, Aug 03, 2017 at 09:21:57AM -0600, Jan Beulich wrote:
> >> >>> Anthony PERARD 07/18/17 7:12 PM >>>
> >> >@@ -818,6
On Fri, Aug 04, 2017 at 09:40:32AM -0600, Jan Beulich wrote:
> >>> Anthony PERARD 08/04/17 12:52 PM >>>
> >On Thu, Aug 03, 2017 at 08:59:10AM -0600, Jan Beulich wrote:
> >> >>> Anthony PERARD 07/18/17 7:10 PM >>>
> >> >+st
On Thu, Aug 03, 2017 at 09:29:02AM -0600, Jan Beulich wrote:
> >>> Anthony PERARD 07/18/17 7:10 PM >>>
> >@@ -701,6 +702,13 @@ static void vlapic_update_timer(struct vlapic *vlapic,
> >uint32_t lvtt);
> >delta = period - time_passed;
> >}
> >
&
On Thu, Aug 03, 2017 at 09:21:57AM -0600, Jan Beulich wrote:
> >>> Anthony PERARD 07/18/17 7:12 PM >>>
> >@@ -678,18 +679,29 @@ static void vlapic_tdt_pt_cb(struct vcpu *v, void
> >*data)
> >static void vlapic_update_timer(struct vlapic *vlapic,
On Thu, Aug 03, 2017 at 08:59:10AM -0600, Jan Beulich wrote:
> >>> Anthony PERARD 07/18/17 7:10 PM >>>
> >There should not be any functionality change with this patch.
> >
> >This function is used when the APIC_TMICT register is updated.
> >
> >
Hi,
I've just pushed QEMU v2.9.0 to our qemu-xen tree.
Regards,
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Signed-off-by: Anthony PERARD
Acked-by: Ian Jackson
---
make-flight | 1 +
1 file changed, 1 insertion(+)
diff --git a/make-flight b/make-flight
index cc95529..f615155 100755
--- a/make-flight
+++ b/make-flight
@@ -224,6 +224,7 @@ arch_branch_filter_callback () {
rumprun) return 1
Signed-off-by: Anthony PERARD
Acked-by: Ian Jackson
---
ts-openstack-deploy | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ts-openstack-deploy b/ts-openstack-deploy
index e7c94a5..875c4a7 100755
--- a/ts-openstack-deploy
+++ b/ts-openstack-deploy
@@ -169,7 +169,7 @@ sub
Signed-off-by: Anthony PERARD
Acked-by: Ian Jackson
---
ts-openstack-deploy | 7 +++
1 file changed, 7 insertions(+)
diff --git a/ts-openstack-deploy b/ts-openstack-deploy
index 2107760..f677513 100755
--- a/ts-openstack-deploy
+++ b/ts-openstack-deploy
@@ -130,6 +130,13 @@ END
osstest
This works like target_cmd, but takes a ref to a filename as argument
and stash the output of the command then return a path to the stashed
output.
Signed-off-by: Anthony PERARD
---
Notes:
Changes in V14:
- Use filename for error message instead of file handle.
Osstest/TestSupport.pm
Signed-off-by: Anthony PERARD
Acked-by: Ian Jackson
---
ts-openstack-tempest | 19 ---
1 file changed, 8 insertions(+), 11 deletions(-)
diff --git a/ts-openstack-tempest b/ts-openstack-tempest
index b95043a..ae3662f 100755
--- a/ts-openstack-tempest
+++ b/ts-openstack-tempest
Since Xen 4.7, /dev/xen/privcmd is used instead of /proc/xen/privcmd.
Add the device into the policy so `xenstored` can work.
Signed-off-by: Anthony PERARD
---
policy/modules/kernel/devices.fc | 1 +
1 file changed, 1 insertion(+)
diff --git a/policy/modules/kernel/devices.fc b/policy/modules
me to "origin/stable/ocata",
except Tempest does not have stable branch and is able to test any
OpenStack version.
Signed-off-by: Anthony PERARD
---
Notes:
Been able to track every necessary for OpenStack would require something
in osstest to push to multiple branches, but I'm
Signed-off-by: Anthony PERARD
Acked-by: Ian Jackson
---
ts-logs-capture | 6 ++
1 file changed, 6 insertions(+)
diff --git a/ts-logs-capture b/ts-logs-capture
index 061a118..0e3d267 100755
--- a/ts-logs-capture
+++ b/ts-logs-capture
@@ -171,6 +171,12 @@ sub fetch_logs_host
Signed-off-by: Anthony PERARD
Acked-by: Ian Jackson
---
ts-openstack-deploy | 9 +
1 file changed, 9 insertions(+)
diff --git a/ts-openstack-deploy b/ts-openstack-deploy
index f677513..befe3d3 100755
--- a/ts-openstack-deploy
+++ b/ts-openstack-deploy
@@ -137,6 +137,15 @@ END
T ::= PART_TYPE CR NAME CR PART_BYTES CR
PART_TYPE ::= Content-Type: type/sub-type(;parameter=value,parameter=value)
PART_BYTES ::= (DIGITS CR LF BYTE{DIGITS})* '0' CR LF
Signed-off-by: Anthony PERARD
---
Notes:
Changes in V14:
- prepend '/' to substep names
- prepen
Devstack is going to try to install a specific version of libvirt-python
(currently 2.5.0) but this fail with libvirt installed by osstest.
Remove the requirement and use the latest available instead.
Signed-off-by: Anthony PERARD
Acked-by: Ian Jackson
---
ts-openstack-deploy | 15
test-armhf-armhf-devstack-xsm
Signed-off-by: Anthony PERARD
---
Notes:
This patch will be altered by patch "openstack tests: Don't run them on
arm*"
to avoid testing on ARM for now, because there is not enough capacity.
Changes in V14:
- patch renamed from &
./run_tempest.sh is deprecated.
Signed-off-by: Anthony PERARD
Acked-by: Ian Jackson
---
ts-openstack-tempest | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/ts-openstack-tempest b/ts-openstack-tempest
index 82e9a71..b95043a 100755
--- a/ts-openstack-tempest
+++ b/ts
Signed-off-by: Anthony PERARD
Acked-by: Ian Jackson
---
ts-openstack-deploy | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ts-openstack-deploy b/ts-openstack-deploy
index 00f262f..e7c94a5 100755
--- a/ts-openstack-deploy
+++ b/ts-openstack-deploy
@@ -58,7 +58,7 @@ DEST
With 4G for dom0_mem, a host running devstack is using about 1.5G of
swap.
Signed-off-by: Anthony PERARD
Acked-by: Ian Jackson
---
make-flight | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/make-flight b/make-flight
index e03aacc..cc95529 100755
--- a/make-flight
+++ b
Signed-off-by: Anthony PERARD
Acked-by: Ian Jackson
---
ts-openstack-tempest | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/ts-openstack-tempest b/ts-openstack-tempest
index ae3662f..596142a 100755
--- a/ts-openstack-tempest
+++ b/ts-openstack-tempest
@@ -53,10 +53,10
nova-network is not supported anymore and Neutron is the default.
Signed-off-by: Anthony PERARD
Acked-by: Ian Jackson
---
ts-openstack-deploy | 8 +---
1 file changed, 1 insertion(+), 7 deletions(-)
diff --git a/ts-openstack-deploy b/ts-openstack-deploy
index 1349009..2107760 100755
--- a
This script runs the OpenStack integration test suite, Tempest.
Signed-off-by: Anthony PERARD
Acked-by: Ian Campbell
Acked-by: Ian Jackson
---
sg-run-job | 1 +
ts-openstack-tempest | 65
2 files changed, 66 insertions(+)
create
This script installs any necessary packages and clones all of the OpenStack
trees which are used by devstack to deploy OpenStack.
Signed-off-by: Anthony PERARD
Acked-by: Ian Jackson
---
sg-run-job | 5 ++
ts-openstack-deploy | 148
1 - 100 of 719 matches
Mail list logo