New commits:
- xen/pt: allow QEMU to request MSI unmasking at bind time
To fix a passthrough bug.
- ui/gtk: Fix deprecation of vte_terminal_copy_clipboard
A build fix.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
Should already be released-acked.
---
Config.mk | 2 +-
including tests which could not be run:
> build-armhf-pvopsbroken in
> 115713
> build-armhf-pvops 4 host-install(4) broken in 115713 REGR. vs.
> 114457
This test pass in this flight. Why the fact that it was broken in an
older flight is b
et.
The problem is that QEMU 4.10 have a lock on the disk image. When
booting an HVM guest with a qdisk backend, the disk is open twice, but
can only be locked once, so when the pv disk is been initialized, the
initialisation kind of fail.
Unfortunatly, OVMF will wait indefinitly until the PV disk is
initialized.
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
> The backport is not risk-free but it only affects PCI Passthrough. Also
> > the commit has been in QEMU for 2 months now.
>
> Does anyone actually tested it with QEMU Xen tree?
Yes. I've tested qemu-xen with this patch and PCI passthrough still
works.
Can I get a release-ack?
Thanks,
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
ibxl__ao__destroy:
> ao 0xb3f01578: destroy
>
> Sadly AFAICT there's no log for the QEMU running this backend.
> Previous domain creating attempts worked.
That's happening with QEMU mainline as well, I don't know why.
On this test, qemu-system-i386 may have crashed, but I don't know
the script, but only the loop ...
Reviewed-by: Anthony PERARD <anthony.per...@citrix.com>
FIY: One would write the loop like this:
while read num rev; do
:
done < <(git rev-list $BASE..$TIP | nl -ba | tac)
And then you could ret=$?;break; inside the loop, and have th
nd, then start printing imformation about
what/where it went wrong, and how to go back.
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
move
> it to hw/xen.
>
> Cc: Stefano Stabellini <sstabell...@kernel.org>
> Cc: Anthony Perard <anthony.per...@citrix.com>
> Cc: xen-de...@lists.xenproject.org
> Signed-off-by: Paolo Bonzini <pbonz...@redhat.com>
> ---
> Xen
ot .)\n",
The error message have not been update, I think it should be :
> + optarg);
> exit(1);
> }
> break;
With the error message fix:
Reviewed-by: Anthony PERARD <anthony.per...@citrix.com>
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
cis <alistair.fran...@xilinx.com>
> Cc: Gerd Hoffmann <kra...@redhat.com>
> Cc: Andrzej Zaborowski <balr...@gmail.com>
> Cc: Stefano Stabellini <sstabell...@kernel.org>
> Cc: Anthony Perard <anthony.per...@citrix.com>
> Cc: John Snow <js...@redhat.
a proper solution, I can't say without investing a lot more time.
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
I'm still trying to find out how a script can do a better job than a
plain `git rebase --interactive --exec 'blah'`, it is maybe just because
I know what to do if there is an issue.)
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
./mg-hosts showprops XXX description and implementation didn't match.
Fix description.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
mg-hosts | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/mg-hosts b/mg-hosts
index a000f2d..d91a965 100755
--- a/mg
e (even if one only for developers).
> It's not *intended* to destroy anything, but a bug in it well could
> destroy data.
There is a `git clean -dxf` in the script, this is destructif! I'm sure
it's going to take some people by surprise.
FIY, I do like to put script and other files in my ch
On Mon, Oct 23, 2017 at 12:30:33PM +0100, Anthony PERARD wrote:
> On Fri, Oct 20, 2017 at 06:32:55PM +0100, Wei Liu wrote:
> > +CMD=${3:-git clean -fdx && ./configure && make -j4}
> > +
> > +echo "Running command \"$CMD\" on eve
`seq 5 -1 1`; do
> +echo -n "$i ... "
> +sleep 1
> +done
> +
Instead of the count down, I would do:
echo -n 'Continue ? (^C to quit) '
read
OR something like:
echo -n 'Continue ? [Yn] '
read answer
[[ "$answer" =~ ^(|Y|y|yes)$ ]] || exit
I don't like to wait.
Hi Ian,
The patches in this v5 appear to be the same the one from the patch
series v4.
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Thu, Oct 19, 2017 at 05:38:10PM +0100, Ian Jackson wrote:
> Anthony PERARD writes ("Re: [PATCH 1/8] xen: link against xentoolcore"):
> > I don't think it is necessary to do anything in qemu. The linker should
> > find on its own the new libxentoolcore as long as an o
MAKELEVEL would already be greater than 0 and
the git submodules would not be updated and QEMU would fail to build.
Fix this by removing MAKELEVEL from the environment before trying to
build QEMU.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
tools/Makefile | 1 +
1
On Wed, Oct 11, 2017 at 01:19:25PM -0700, Stefano Stabellini wrote:
> On Wed, 11 Oct 2017, Anthony PERARD wrote:
> > The only observation I have is that on a Linux guest, when I have
> > usbdevice=tablet, with this series the pv mouse seems to become the
> > primary way of
On Tue, Oct 10, 2017 at 04:52:48PM -0700, Stefano Stabellini wrote:
> On Mon, 2 Oct 2017, Anthony PERARD wrote:
> > On Tue, Sep 26, 2017 at 02:43:39PM +, Owen Smith wrote:
> > > Writes "feature-raw-pointer" during init to indicate the backend
> > > can
s not seems to be related to QEMU.
Thanks,
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
gt; provide a stub for earlier versions.
>
> Signed-off-by: Ian Jackson <ian.jack...@eu.citrix.com>
Reviewed-by: Anthony PERARD <anthony.per...@citrix.com>
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
l change.
>
> Signed-off-by: Ian Jackson <ian.jack...@eu.citrix.com>
Acked-by: Anthony PERARD <anthony.per...@citrix.com>
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
fter os_setup_post, because
> xen_restrict may need to open /dev/null, and os_setup_post might have
> called chroot.
>
> Signed-off-by: Ian Jackson <ian.jack...@eu.citrix.com>
Reviewed-by: Anthony PERARD <anthony.per...@citrix.com>
--
Anthony PERARD
___
er, only. Provide a compatibility stub. And drop the
> compatibility stubs for the old functions.
>
> Signed-off-by: Ian Jackson <ian.jack...@eu.citrix.com>
Reviewed-by: Anthony PERARD <anthony.per...@citrix.com>
--
Anthony PERARD
+assert(!e);
> +}
> +
> +static void unlock(void) {
> +int e = pthread_mutex_unlock(_lock);
> +assert(!e);
> +}
> +
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Mon, Oct 09, 2017 at 05:58:17PM +0100, Ian Jackson wrote:
> (My resend has crossed with your review. Sorry about that.)
>
> Anthony PERARD writes ("Re: [PATCH 3/8] xen: defer call to xen_restrict until
> after os_setup_post"):
> > On Wed, Oct 04, 2017 at 05:18:0
On Mon, Oct 09, 2017 at 05:28:08PM +0100, Ian Jackson wrote:
> Ian Jackson writes ("[PATCH 1/8] xen: link against xentoolcore"):
> > From: Anthony PERARD <anthony.per...@citrix.com>
> >
> > Xen libraries 4.10 will include a new xentoolcore library, w
{
> @@ -61,3 +62,7 @@ void xen_hvm_init(PCMachineState *pcms, MemoryRegion
> **ram_memory)
> void qmp_xen_set_global_dirty_log(bool enable, Error **errp)
> {
> }
> +
> +void xen_setup_post(void)
> +{
> +}
> diff --git a/vl.c b/vl.c
> index fb1f05b..9e7d541 100644
> --- a/vl.c
> +++ b/vl.c
> @@ -4793,6 +4793,7 @@ int main(int argc, char **argv, char **envp)
> }
>
> os_setup_post();
> +xen_setup_post();
>
> main_loop();
> replay_disable_events();
> --
> 2.1.4
>
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Tue, Oct 03, 2017 at 12:33:37PM +0100, Roger Pau Monné wrote:
> On Mon, Oct 02, 2017 at 04:30:58PM +0000, Anthony PERARD wrote:
> > When doing a live migration of a Xen guest with libxl, the images for
> > block devices are locked by the original QEMU process, and this preve
at should probably
be added to this patch, otherwise, the patch does not apply. With that
fix, you can add my:
Acked-by: Anthony PERARD <anthony.per...@citrix.com>
Thanks,
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
d you remove the following from the commit description?
> "feature-raw-pointer" and "request-raw-pointer" added to Xen
> header in commit 7868654ff7fe5e4a2eeae2b277644fa884a5031e
I think that with it, you could have kept stefano's reviewed-by tag.
Thanks,
--
Anthony PERARD
commands, "stop" then "xen-save-devices-state", at which point a
new QEMU is spawned at the destination.
Release locks in "xen-save-devices-state" so the destination can takes
them.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
CCing libxl ma
On Wed, Sep 27, 2017 at 05:10:09PM +0100, Wei Liu wrote:
> The error code is encoding in errno, not rc.
^ encoded
I think.
Otherwise,
Reviewed-by: Anthony PERARD <anthony.per...@citrix.com>
Thanks,
>
> Signed-off-by: Wei Liu <wei.l...@citrix.com>
Update to allow to build OVMF with GCC 7.2.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
Config.mk | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Config.mk b/Config.mk
index bba81bee7d..57d3e2bc44 100644
--- a/Config.mk
+++ b/Config.mk
@@ -272,7
multiple times for a domain, e.g. in case grub-xen is being
> used to boot it.
>
> So instead of letting the generic backend code open the gnttab device
> do it in blk_connect() and close it again in blk_disconnect.
>
> Signed-off-by: Juergen Gross <jgr...@suse.com>
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
Config.mk | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Config.mk b/Config.mk
index bba81bee7d..57d3e2bc44 100644
--- a/Config.mk
+++ b/Config.mk
@@ -272,7 +272,7 @@ QEMU_TRADITIONAL_URL ?=
git://xenbits.x
ree(struct XenDevice *xendev)
> @@ -1363,7 +1374,6 @@ static void blk_event(struct XenDevice *xendev)
>
> struct XenDevOps xen_blkdev_ops = {
> .size = sizeof(struct XenBlkDev),
> -.flags = DEVOPS_FLAG_NEED_GNTDEV,
> .alloc = blk_alloc,
>
!xen_feature_grant_copy);
> xenstore_write_be_int(>xendev, "info", info);
>
> xenstore_write_be_int(>xendev, "max-ring-page-order",
> diff --git a/hw/xen/xen_backend.c b/hw/xen/xen_backend.c
> index c46cbb0759..00210627a9 100644
> --- a/hw/xen
> Signed-off-by: Jan Beulich <jbeul...@suse.com>
Acked-by: Anthony PERARD <anthony.per...@citrix.com>
> --- a/hw/block/xen_disk.c
> +++ b/hw/block/xen_disk.c
> @@ -1232,7 +1232,7 @@ static int blk_connect(struct XenDevice
> return -1;
> }
>
> -
On Wed, Aug 02, 2017 at 04:36:34PM +0100, Anthony PERARD wrote:
> Hi,
>
> I've just pushed QEMU v2.9.0 to our qemu-xen tree.
And now, v2.10 is in our tree.
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://list
On Thu, Sep 14, 2017 at 11:04:26AM +0100, Julien Grall wrote:
> Hi,
>
> CC Anthony. It sounds like the latest ovmf build is broken.
Thanks,
This is probably fixed by 5afa5b815936e2b45a375b6521764195bed68680, not
yet tested. At least, it build on my machine.
Regards,
--
Antho
On Mon, Sep 11, 2017 at 04:07:08PM +0100, George Dunlap wrote:
> On 09/11/2017 04:02 PM, Anthony PERARD wrote:
> > On Mon, Sep 11, 2017 at 03:16:13PM +0100, George Dunlap wrote:
> >> On 09/07/2017 10:54 PM, Stefano Stabellini wrote:
> >>> On Thu, 31
FreeBSD (netback): Supported
> >> +Status, QEMU (xen_nic): Experimental
> >
> > I suggest to Deprecate xen_nic
>
> That's fine with me. Anthony?
Yes, that fine by me. xen_nic is only for PV guest, and I don't known
how it can be us
note: this is the location of the previous
definition
#define KEY_F(n) (KEY_F0+(n)) /* Value of function key n */
[...]
And a lot more...
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
h this patch, the offset
sent via QMP seems to be between the previous value of the guest rtc and
the new one. Other calls to qapi_event_send_rtc_change send the offset
between the new guest RTC and qemu_time().
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
hotplug to root bus on legacy mode
hw/acpi: Move acpi_set_pci_info to pcihp
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
CC: Stefano Stabellini <sstabell...@kernel.org>
CC: Bruce Rogers <brog...@suse.com>
---
hw/acpi/piix4.c | 11 +++
1 file changed,
twice"
(f0c9d64a68b776374ec4732424a3e27753ce37b6).
Adding find_i440fx into stubs so that mips-softmmu target can be built.
Reported-by: Sander Eikelenboom <li...@eikelenboom.it>
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
Changes in V4:
- call acpi_set_pci_info on
Adding PCI passthrough before the guest start works fine (broken in 2.9 but now
fixed), but hotplug does not work anymore.
Anthony PERARD (3):
hw/acpi: Limit hotplug to root bus on legacy mode
hw/acpi: Move acpi_set_pci_info to pcihp
Revert "ACPI: don't call acpi_pcihp_device_plug_cb o
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
New patch in V3
---
hw/acpi/pcihp.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/hw/acpi/pcihp.c b/hw/acpi/pcihp.c
index c420a388ea..9db3c2eaf2 100644
--- a/hw/acpi/pcihp.c
+++ b/hw/acpi/pcihp.c
@@ -273,7
On Fri, Aug 18, 2017 at 04:19:57PM +0200, Igor Mammedov wrote:
> On Fri, 18 Aug 2017 14:31:07 +0100
> Anthony PERARD <anthony.per...@citrix.com> wrote:
>
> > On Fri, Aug 18, 2017 at 11:37:34AM +0200, Igor Mammedov wrote:
> > > On Fri, 18 Aug 2017 04:40:02 +0300
On Fri, Aug 18, 2017 at 11:37:34AM +0200, Igor Mammedov wrote:
> On Fri, 18 Aug 2017 04:40:02 +0300
> "Michael S. Tsirkin" <m...@redhat.com> wrote:
>
> > On Thu, Aug 17, 2017 at 05:23:46PM +0100, Anthony PERARD wrote:
> > > This means that the function
ake gcc happy?
What about:
- /* Missed the backend's Closing state -- fallthrough */
+ /* fallthrough -- Missed the backend's Closing state */
FIY:
https://gcc.gnu.org/onlinedocs/gcc-7.2.0/gcc/Warning-Options.html#index-Wimpl
for the property starts with commit
"pc: pcihp: avoid adding ACPI_PCIHP_PROP_BSEL twice"
(f0c9d64a68b776374ec4732424a3e27753ce37b6).
Reported-by: Sander Eikelenboom <li...@eikelenboom.it>
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
Changes in V3:
- move acpi
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
New patch in V3
---
hw/acpi/pcihp.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/hw/acpi/pcihp.c b/hw/acpi/pcihp.c
index c420a388ea..9db3c2eaf2 100644
--- a/hw/acpi/pcihp.c
+++ b/hw/acpi/pcihp.c
@@ -273,7
: Disallow change of hotplug_select on legacy_piix
hw/acpi: Move acpi_set_pci_info to pcihp
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
CC: Stefano Stabellini <sstabell...@kernel.org>
CC: Bruce Rogers <brog...@suse.com>
---
hw/acpi/piix4.c | 11 +++
Adding PCI passthrough before the guest start works fine (broken in 2.9 but now
fixed), but hotplug does not work anymore.
Anthony PERARD (3):
hw/acpi: Limit hotplug to root bus on legacy mode
hw/acpi: Move acpi_set_pci_info to pcihp
Revert "ACPI: don't call acpi_pcihp_device_plug_cb o
On Wed, Aug 16, 2017 at 11:10:46AM +0200, Igor Mammedov wrote:
> On Tue, 15 Aug 2017 22:24:08 +0300
> "Michael S. Tsirkin" <m...@redhat.com> wrote:
>
> > On Tue, Aug 15, 2017 at 02:07:51PM +0200, Igor Mammedov wrote:
> > > On Tue, 15 Aug 2017 12:15:48
ot;--with-system-ovmf" configure option (if your compile Xen from
AUR)
OR
Recompile OVMF from https://xenbits.xen.org/git-http/ovmf.git (or the
upstream URL) with `OvmfPkg/build.sh -n $nb_of_cpu -b RELEASE` and use
the OVMF file from Build/OvmfX64/RELEASE_GCC*/FV/OVMF.fd
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Adding PCI passthrough before the guest start works fine (broken in 2.9 but now
fixed), but hotplug does not work anymore.
Anthony PERARD (2):
hw/acpi: Call acpi_set_pci_info when no ACPI tables needed
Revert "ACPI: don't call acpi_pcihp_device_plug_cb on xen"
hw/acpi/piix4.c
twice"
(f0c9d64a68b776374ec4732424a3e27753ce37b6).
Set pci info before checking for the needs to build ACPI tables.
Assign bsel=0 property only to the root bus on Xen as there is no
support in the Xen ACPI tables for a different value.
Reported-by: Sander Eikelenboom <li...@eikelenboom.it>
Signed-off-by: Anthony PER
acpi_set_pci_info when no ACPI tables needed).
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
CC: Stefano Stabellini <sstabell...@kernel.org>
CC: Bruce Rogers <brog...@suse.com>
---
hw/acpi/piix4.c | 11 +++
1 file changed, 3 insertions(+), 8 deletions(-)
di
On Mon, Aug 14, 2017 at 06:53:14PM +0300, Michael S. Tsirkin wrote:
> On Mon, Aug 14, 2017 at 03:55:50PM +0100, Anthony PERARD wrote:
> > On Fri, Aug 11, 2017 at 08:18:28PM +0300, Michael S. Tsirkin wrote:
> > > On Fri, Aug 11, 2017 at 04:11:37PM +0100, Anthony PERARD wrote:
On Fri, Aug 11, 2017 at 08:18:28PM +0300, Michael S. Tsirkin wrote:
> On Fri, Aug 11, 2017 at 04:11:37PM +0100, Anthony PERARD wrote:
> > To do PCI passthrough with Xen, the property acpi-pcihp-bsel needs to be
> > set, but this was done only when ACPI tables are built which is
interfaces are added for this usage. This patch recognizes
> this case and uses new interfaces to bind/unbind msi.
>
> Signed-off-by: Chao Gao <chao@intel.com>
> Signed-off-by: Lan Tianyu <tianyu....@intel.com>
Reviewed-by: Anthony PERARD <anthony.per...@citrix.com>
That pa
Adding PCI passthrough before the guest start works fine (broken in 2.9 but now
fixed), but hotplug does not work anymore.
Anthony PERARD (2):
hw/acpi: Call acpi_set_pci_info when no ACPI tables needed
Revert "ACPI: don't call acpi_pcihp_device_plug_cb on xen"
hw/acpi/piix4.c
acpi_set_pci_info when no ACPI tables needed).
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
CC: Stefano Stabellini <sstabell...@kernel.org>
CC: Bruce Rogers <brog...@suse.com>
---
hw/acpi/piix4.c | 11 +++
1 file changed, 3 insertions(+), 8 deletions(-)
di
twice"
(f0c9d64a68b776374ec4732424a3e27753ce37b6).
Set pci info before checking for the needs to build ACPI tables.
Reported-by: Sander Eikelenboom <li...@eikelenboom.it>
Tested-by: Sander Eikelenboom <li...@eikelenboom.it>
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
In this patc
On Thu, Aug 10, 2017 at 03:00:56PM +0100, Anthony PERARD wrote:
> On Wed, Aug 09, 2017 at 06:34:43PM +0200, Sander Eikelenboom wrote:
> > L.S.,
> >
> > It seems the xen qemu-upstream tree got updated from qemu upstream last
> > week.
> > Unfortunately a change
Have you try with a more recent QEMU ? from git://git.qemu.org/qemu.git
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
nst the description
written in the Intel SDM.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
Changes in V3:
- new argument for vlapic_update_timer: tmict_updated.
To avoid setting timer_last_update twice when TMICT is been updated.
- use values of period and delta to
rg/archives/html/xen-devel/2017-03/msg02533.html
v2: look for "[XTF PATCH V2 0/3] Testing vlapic timer"
Anthony PERARD (3):
x86/vlapic: Introduce vlapic_update_timer
x86/vlapic: Keep timer running when switching between one-shot and
periodic mode
x86/vlapic: Apply change t
There should not be any functionality change with this patch.
This function is used when the APIC_TMICT register is updated.
vlapic_update_timer is introduce as it will be use also when the
registers APIC_LVTT and APIC_TDCR are updated.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.
d.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
Changes in V3:
- do the calculation when the divisor is change only if delta is !0.
---
xen/arch/x86/hvm/vlapic.c | 26 +-
1 file changed, 21 insertions(+), 5 deletions(-)
diff --git a/xen/arch/x86/hv
On Fri, Aug 04, 2017 at 09:48:59AM -0600, Jan Beulich wrote:
> >> Anthony PERARD <anthony.per...@citrix.com> 08/04/17 1:38 PM >>>
> >On Thu, Aug 03, 2017 at 09:21:57AM -0600, Jan Beulich wrote:
> >> >>> Anthony PERARD <anthony.per...@citr
On Fri, Aug 04, 2017 at 09:40:32AM -0600, Jan Beulich wrote:
> >>> Anthony PERARD <anthony.per...@citrix.com> 08/04/17 12:52 PM >>>
> >On Thu, Aug 03, 2017 at 08:59:10AM -0600, Jan Beulich wrote:
> >> >>> Anthony PERARD <anthony.per.
On Thu, Aug 03, 2017 at 09:29:02AM -0600, Jan Beulich wrote:
> >>> Anthony PERARD <anthony.per...@citrix.com> 07/18/17 7:10 PM >>>
> >@@ -701,6 +702,13 @@ static void vlapic_update_timer(struct vlapic *vlapic,
> >uint32_t lvtt);
> >delta = period
On Thu, Aug 03, 2017 at 09:21:57AM -0600, Jan Beulich wrote:
> >>> Anthony PERARD <anthony.per...@citrix.com> 07/18/17 7:12 PM >>>
> >@@ -678,18 +679,29 @@ static void vlapic_tdt_pt_cb(struct vcpu *v, void
> >*data)
> >static void vlapic_upda
On Thu, Aug 03, 2017 at 08:59:10AM -0600, Jan Beulich wrote:
> >>> Anthony PERARD <anthony.per...@citrix.com> 07/18/17 7:10 PM >>>
> >There should not be any functionality change with this patch.
> >
> >This function is used when the APIC_TMICT re
Hi,
I've just pushed QEMU v2.9.0 to our qemu-xen tree.
Regards,
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
---
make-flight | 1 +
1 file changed, 1 insertion(+)
diff --git a/make-flight b/make-flight
index cc95529..f615155 100755
--- a/make-flight
+++ b/make-flight
@@ -
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
---
ts-openstack-deploy | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ts-openstack-deploy b/ts-openstack-deploy
index e7c94a5..875c4a7 100755
--- a/ts-open
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
---
ts-openstack-deploy | 7 +++
1 file changed, 7 insertions(+)
diff --git a/ts-openstack-deploy b/ts-openstack-deploy
index 2107760..f677513 100755
--- a/ts-openstack-dep
This works like target_cmd, but takes a ref to a filename as argument
and stash the output of the command then return a path to the stashed
output.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
Notes:
Changes in V14:
- Use filename for error message instead of file
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
---
ts-openstack-tempest | 19 ---
1 file changed, 8 insertions(+), 11 deletions(-)
diff --git a/ts-openstack-tempest b/ts-openstack-tempest
index b95043a..ae
Since Xen 4.7, /dev/xen/privcmd is used instead of /proc/xen/privcmd.
Add the device into the policy so `xenstored` can work.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
policy/modules/kernel/devices.fc | 1 +
1 file changed, 1 insertion(+)
diff --git a/policy/modules/
to "origin/stable/ocata",
except Tempest does not have stable branch and is able to test any
OpenStack version.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
Notes:
Been able to track every necessary for OpenStack would require something
in osstest to push to m
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
---
ts-logs-capture | 6 ++
1 file changed, 6 insertions(+)
diff --git a/ts-logs-capture b/ts-logs-capture
index 061a118..0e3d267 100755
--- a/ts-logs-capture
+++ b/ts-
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
---
ts-openstack-deploy | 9 +
1 file changed, 9 insertions(+)
diff --git a/ts-openstack-deploy b/ts-openstack-deploy
index f677513..befe3d3 100755
--- a/ts-openstack-
PART_TYPE ::= Content-Type: type/sub-type(;parameter=value,parameter=value)
PART_BYTES ::= (DIGITS CR LF BYTE{DIGITS})* '0' CR LF
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
Notes:
Changes in V14:
- prepend '/' to substep names
- prepend 'subunit-' to test log fi
Devstack is going to try to install a specific version of libvirt-python
(currently 2.5.0) but this fail with libvirt installed by osstest.
Remove the requirement and use the latest available instead.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
Acked-by: Ian Jackson <
test-armhf-armhf-devstack-xsm
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
---
Notes:
This patch will be altered by patch "openstack tests: Don't run them on
arm*"
to avoid testing on ARM for now, because there is not enough capacity.
Changes in
./run_tempest.sh is deprecated.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
---
ts-openstack-tempest | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/ts-openstack-tempest b/ts-openstack-tempest
i
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
---
ts-openstack-deploy | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ts-openstack-deploy b/ts-openstack-deploy
index 00f262f..e7c94a5 100755
--- a/ts-open
With 4G for dom0_mem, a host running devstack is using about 1.5G of
swap.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
---
make-flight | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/make-flight b
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
---
ts-openstack-tempest | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/ts-openstack-tempest b/ts-openstack-tempest
index ae3662f..596142a 100755
--- a/
nova-network is not supported anymore and Neutron is the default.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
---
ts-openstack-deploy | 8 +---
1 file changed, 1 insertion(+), 7 deletions(-)
diff --git a/ts-openst
This script runs the OpenStack integration test suite, Tempest.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
Acked-by: Ian Campbell <ian.campb...@citrix.com>
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
---
sg-run-job | 1 +
ts-open
This script installs any necessary packages and clones all of the OpenStack
trees which are used by devstack to deploy OpenStack.
Signed-off-by: Anthony PERARD <anthony.per...@citrix.com>
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
---
sg-run-job | 5 ++
ts-open
1 - 100 of 704 matches
Mail list logo