I don't understand this series very well. So could you help me answer the
following questions?
1. This patch aims to add 4k logical support for qemu running on a host
with 4k logical block size, right? For guest, we can use
logical_block_size=4096 to achieve that even on a host with the
logical_bl
Am 25.11.2011 00:21, schrieb Peter Maydell:
On 24 November 2011 22:07, Stefan Weil wrote:
Commit 5632ae46d5bda798e971dae48ebb318ac2c3686a passes the address
of i8259 to qemu_irq_proxy. i8259 was an auto variable with undefined
value outside of mips_malta_init. This made the proxy unusable.
Eth
On Fri, 2011-11-25 at 09:59 +0800, Cao,Bing Bu wrote:
> Hi,all
>
>
> Thanks,Frenkel.The test application of the balloon must be run as
> admin.
>
>
>
> But I found 2 problems(question) this week when testing windows guest
> drivers:
>
>
> *
> If only virtio serial driver installed
From: Benjamin MARSILI
Signed-off-by: Benjamin MARSILI
---
net.c |6 -
net/socket.c| 71 +-
qemu-options.hx |2 +
3 files changed, 76 insertions(+), 3 deletions(-)
diff --git a/net.c b/net.c
index cb52050..8e957b2
Submitted a very similar desciption of this problem here:
https://bugs.launchpad.net/ubuntu/+source/bridge-utils/+bug/894608
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/861141
Title:
Installing l
Who maintainss checkpatch.pl now?
checkpatch.pl says to look for CHECKPATCH in the MAINTAINERS file, but
that entry isn't there.
The issue I'm encountering is that sizeof is not a function, but an
operator, that takes as its operand either a variable or a cast. As
such there needn't be any pa
On Thu, Nov 24, 2011 at 08:54:36PM -0500, Xin Tong wrote:
> I came back to the block chaining code. This code is still not very
> clear to me. Here we are linking tb_next -> tb. jmp_next of the tb
> contains the next tbs it will jump to. why are we checking the
> !tb->jmp_next[n], but not !tb_next-
From: Liu Ping Fan
Currently, vcpu can be destructed only when kvm instance destroyed.
Change this to vcpu as a refer to kvm, and then vcpu MUST and CAN be
destroyed before kvm's destroy. Qemu will take advantage of this to
exit the vcpu thread if the thread is no longer in use by guest.
Signed-
A series of patches from kvm, qemu to guest. These patches will finally enable
vcpu destruction in kvm instance and let vcpu thread exit in qemu.
Currently, the vcpu online feature enables the dynamical creation of vcpu and
vcpu thread, while the offline feature can not destruct the vcpu and le
Hi,all
Thanks,Frenkel.The test application of the balloon must be run as admin.
But I found 2 problems(question) this week when testing windows guest
drivers:
*
If only virtio serial driver installed,the virtio serial test app
can not enumerate/find the virtio serial device,
Hi,
I wouldl like to be able to use a web browser to connect to my virtual machine
with tvnc.
It seems like the http server to run tvnc inside a webserver is not supported
on qemu-kvm.
Is there any plan to support it any time soon?
Thanks and best regards,
Stephen
I came back to the block chaining code. This code is still not very
clear to me. Here we are linking tb_next -> tb. jmp_next of the tb
contains the next tbs it will jump to. why are we checking the
!tb->jmp_next[n], but not !tb_next->jmp_next[n] ?
static inline void tb_add_jump(TranslationBlock *t
Still working on this. It turns out it is NOT a libvirt or qemu bug but
something to do with bridge-utils and having a bridge set up. This is
what happens when tryinf to install libvirt. I'm off to the ubuntu
forums now to start searching again...
--
You received this bug notification because you
When running a 32 bit guest on a 64 bit host, we can run into trouble while
calling the host's mmap() because it could potentially give us a 64 bit
return value which the guest can't interpret.
There are 2 ways of dealing with this:
1) Only do MAP_FIXED mmap calls and implement our own vm manag
When running a 32 bit guest on a 64 bit host, we can run into trouble while
calling the host's mmap() because it could potentially give us a 64 bit
return value which the guest can't interpret.
There are 2 ways of dealing with this:
1) Only do MAP_FIXED mmap calls and implement our own vm manag
[snip]
>> A remaining item is to test this setup
>> with the KVM stuff, but it should be a minor thing as long as the
>> kernel headers for KVM/ARM can be integrated with the build process
>> somehow. (Or is there an alternative?).
>
> Ah, kernel headers, good point. QEMU now carries the KVM kerne
On 24 November 2011 22:07, Stefan Weil wrote:
> Commit 5632ae46d5bda798e971dae48ebb318ac2c3686a passes the address
> of i8259 to qemu_irq_proxy. i8259 was an auto variable with undefined
> value outside of mips_malta_init. This made the proxy unusable.
>
> Ethernet for example no longer worked wit
On 25.11.2011, at 00:11, Peter Maydell wrote:
> On 24 November 2011 23:10, Alexander Graf wrote:
>> On 25.11.2011, at 00:06, Peter Maydell wrote:
>>> Well, once we've got real hardware it'll be more straightforward
>>> because building QEMU on the hardware won't be quite so slow...
>>> Most of t
On 24 November 2011 23:10, Alexander Graf wrote:
> On 25.11.2011, at 00:06, Peter Maydell wrote:
>> Well, once we've got real hardware it'll be more straightforward
>> because building QEMU on the hardware won't be quite so slow...
>> Most of this is just because crosscompiling is and remains pain
On 25.11.2011, at 00:06, Peter Maydell wrote:
> On 24 November 2011 22:02, Christoffer Dall wrote:
>> On Thu, Nov 24, 2011 at 4:27 PM, Peter Maydell
>> wrote:
>>> Pretty high up my todo list was rebasing your kvm patch on to
>>> master / qemu-linaro (the two are more or less the same for this
On 24.11.2011, at 23:02, Christoffer Dall wrote:
> On Thu, Nov 24, 2011 at 4:27 PM, Peter Maydell
> wrote:
>> On 24 November 2011 20:11, Christoffer Dall wrote:
>
[...]
>>> I would like some clarity (if possible) of which branch the KVM
>>> support for ARM should be based on. Is it the Lina
On 24 November 2011 22:02, Christoffer Dall wrote:
> On Thu, Nov 24, 2011 at 4:27 PM, Peter Maydell
> wrote:
>> Pretty high up my todo list was rebasing your kvm patch on to
>> master / qemu-linaro (the two are more or less the same for this
>> purpose).
>
> if you could take charge on that it w
This should have be part of my TCI patch series.
Signed-off-by: Stefan Weil
---
MAINTAINERS |5 +
1 files changed, 5 insertions(+), 0 deletions(-)
diff --git a/MAINTAINERS b/MAINTAINERS
index 7ee301e..3118016 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -554,3 +554,8 @@ SPARC target
M
Thanks Peter,
I've fixed the problems you noted, and have asked the OK-Labs
folks about Licencing. When I hear back from them I'll roll a
new patchset --- I don't expect `GPL v2 or later' to be a
problem.
-- Peter C
--
Dr Peter Chubb http://www.gelato.unsw.edu.
This is standard for other tcg targets and improves tci, too.
Signed-off-by: Stefan Weil
---
tcg/tci/tcg-target.c |4
tcg/tci/tcg-target.h |4
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/tcg/tci/tcg-target.c b/tcg/tci/tcg-target.c
index 5011c43..f26bec7 10064
Commit 5632ae46d5bda798e971dae48ebb318ac2c3686a passes the address
of i8259 to qemu_irq_proxy. i8259 was an auto variable with undefined
value outside of mips_malta_init. This made the proxy unusable.
Ethernet for example no longer worked with MIPS Malta.
There is only one Malta device with one i
On Thu, Nov 24, 2011 at 4:27 PM, Peter Maydell wrote:
> On 24 November 2011 20:11, Christoffer Dall wrote:
>>> This isn't strictly a requirement for KVM, but we're going to want
>>> KVM to be able to hand off cp15 accesses to QEMU, and I don't think
>>> that's going to be maintainable or reliable
On 24 November 2011 21:46, Andreas Färber wrote:
> Am 24.11.2011 22:31, schrieb Peter Maydell:
>> On 24 November 2011 20:19, Andreas Färber wrote:
>>> Am 24.11.2011 20:41, schrieb Peter Maydell:
On 22 November 2011 04:34, Peter Chubb wrote:
> +obj-arm-y += imx_serial.o imx_timer.o imx_a
Am 24.11.2011 22:31, schrieb Peter Maydell:
> On 24 November 2011 20:19, Andreas Färber wrote:
>> Am 24.11.2011 20:41, schrieb Peter Maydell:
>>> On 22 November 2011 04:34, Peter Chubb wrote:
+obj-arm-y += imx_serial.o imx_timer.o imx_avic.o
+obj-arm-y += kzm.o
>>>
>>> It would be bette
On 24 November 2011 20:19, Andreas Färber wrote:
> Am 24.11.2011 20:41, schrieb Peter Maydell:
>> On 22 November 2011 04:34, Peter Chubb wrote:
>>> +obj-arm-y += imx_serial.o imx_timer.o imx_avic.o
>>> +obj-arm-y += kzm.o
>>
>> It would be better to add the devices to the makefile in their
>> cor
On 24 November 2011 20:11, Christoffer Dall wrote:
>> This isn't strictly a requirement for KVM, but we're going to want
>> KVM to be able to hand off cp15 accesses to QEMU, and I don't think
>> that's going to be maintainable or reliable without this refactoring.
>
> Why do we need KVM to hand of
Am 24.11.2011 08:47, schrieb Peter Maydell:
> On 23 November 2011 23:59, Andreas Färber wrote:
>> Unlike PowerPC, an architecture that I'm trying to emulate does not
>> store branch instructions in the reset vector but a memory address. I'm
>> therefore trying to read physical address 0x0 and
Am 24.11.2011 20:28, schrieb Stefan Weil:
Am 24.11.2011 11:27, schrieb Stefan Hajnoczi:
On Thu, Nov 24, 2011 at 05:15:30PM +0800, Mark wrote:
If you free the string, it will cause the environment variable
unavailable.
More details please see the following text extracted from manual of
"puten
On Thu, Nov 24, 2011 at 3:05 AM, wrote:
> From: Hongyong Zang
>
> When a guest boots with ioeventfd, an error (by gdb) occurs:
> Program received signal SIGSEGV, Segmentation fault.
> 0x006009cc in setup_ioeventfds (s=0x171dc40)
> at /home/louzhengwei/git_source/qemu-kvm/hw/ivshme
Am 24.11.2011 20:41, schrieb Peter Maydell:
> On 22 November 2011 04:34, Peter Chubb wrote:
>> +obj-arm-y += imx_serial.o imx_timer.o imx_avic.o
>> +obj-arm-y += kzm.o
>
> It would be better to add the devices to the makefile in their
> corresponding patches, I think. (Don't feel too strongly abo
>
> This isn't strictly a requirement for KVM, but we're going to want
> KVM to be able to hand off cp15 accesses to QEMU, and I don't think
> that's going to be maintainable or reliable without this refactoring.
Why do we need KVM to hand off cp15 accesses to QEMU? As of now almost
all of this is
One of my standard tests (booting a MIPS Malta emulation with a
Debian NFS root) no longer works.
Git bisect shows that this commit caused the regression:
commit 5632ae46d5bda798e971dae48ebb318ac2c3686a
Author: Avi Kivity
Date: Mon Sep 12 13:00:05 2011 +0300
mips_malta: move i8259 initia
On 22 November 2011 04:34, Peter Chubb wrote:
> Board support for Kyoto Micro's KZM-ARM11-01, an evaluation board built
> around the FreeScale i.MX31.
This patch mostly looks OK to me.
> +obj-arm-y += imx_serial.o imx_timer.o imx_avic.o
> +obj-arm-y += kzm.o
It would be better to add the device
On 22 November 2011 04:34, Peter Chubb wrote:
> Implement the FreeSCALE i.MX31 advanced vectored interrupt controller, at
> least
> to the extent it is used by Linux 3.0.x
>
> Signed-off-by: Hans Jang
> Signed-off-by: Adam Clench
> Signed-off-by: Peter Chubb
> ---
> hw/imx_avic.c | 363
> ++
Am 24.11.2011 11:27, schrieb Stefan Hajnoczi:
On Thu, Nov 24, 2011 at 05:15:30PM +0800, Mark wrote:
If you free the string, it will cause the environment variable unavailable.
More details please see the following text extracted from manual of
"putenv":
The libc4 and libc5 and
Am 23.11.2011 01:51, schrieb Peter Chubb:
>> "Peter" == Peter Chubb writes:
>
>
> Peter> All comments received so far have been addressed --- I've added
> Peter> a macro, `scream' that gives at most 10 lines of output for OS
> Peter> error reporting.
>
> Except I noticed a thinko in the mac
On 22 November 2011 04:33, Peter Chubb wrote:
> Implement the timers on the FreeScale i.MX31 SoC.
> This is not a complete implementation, but gives enough for
> Linux to boot and run.
>
>
> Signed-off-by: Hans Jang
> Signed-off-by: Adam Clench
> Signed-off-by: Peter Chubb
> ---
> hw/imx_timer
On 22 November 2011 04:32, Peter Chubb wrote:
>
> Implement the FreeScale i.MX UART. This uart is used in a variety of
> SoCs, including some by Motorola, as well as in the FreeScale i.MX
> series.
>
> Signed-off-by: Hans Jang
> Signed-off-by: Adam Clench
> Signed-off-by: Peter Chubb
> ---
>
On Thu, Nov 24, 2011 at 18:30, Stefano Stabellini
wrote:
>
>> @@ -2784,9 +2796,11 @@ static void cirrus_reset(void *opaque)
>> }
>> s->vga.cr[0x27] = s->device_id;
>>
>> - /* Win2K seems to assume that the pattern buffer is at 0xff
>> - initially ! */
>> - memset(s->vga.vram_
Am 24.11.2011 09:00, schrieb Markus Armbruster:
Stefan Weil writes:
This is my configuration and the output from configure:
configure '--audio-card-list=ac97,es1370,sb16,cs4231a,adlib,gus,hda'
--audio-drv-list=alsa,sdl,oss,esd,pa' '--enable-mixemu'
--enable-check-utests' '--enable-vnc-thr
Signed-off-by: Anthony PERARD
---
Makefile.target |3 +
hw/host-pci-device.c | 278 ++
hw/host-pci-device.h | 75 ++
3 files changed, 356 insertions(+), 0 deletions(-)
create mode 100644 hw/host-pci-device.c
create mode 100
Clarify some slightly misleading comments in the Thumb decoder's
handling of the memory hint space -- in particular one code path
marked as 'UNPREDICTABLE or unallocated hint' also includes some
legitimate preload instructions.
Signed-off-by: Peter Maydell
---
target-arm/translate.c |8 +
From: Yuji Shimada
This function help Xen PCI Passthrough device to check for overlap.
Signed-off-by: Yuji Shimada
Signed-off-by: Anthony PERARD
---
hw/pci.c | 47 +++
hw/pci.h |3 +++
2 files changed, 50 insertions(+), 0 deletions(-)
diff --
On Thu, 24 Nov 2011, Anthony PERARD wrote:
> During the initialisation of the machine at restore time, the access to the
> VRAM will fail because QEMU does not know yet the right guest address to map,
> so the vram_ptr is NULL.
>
> So this patch avoid using a NULL pointer during initialisation, an
On Thu, Nov 24, 2011 at 17:23, Stefano Stabellini
wrote:
> On Thu, 24 Nov 2011, Anthony PERARD wrote:
>> In Xen case, the guest RAM is not handle by QEMU, and it is saved by Xen
>> tools.
>> So, we just avoid to register the RAM save state handler.
>
> Maybe we can unregister these handlers in th
Avi,
I'm getting the following panic very early on boot on a F16 VM (latest
qemu.git head 40897c9):
[0.068018] Kernel panic - not syncing: Boot APIC ID in local APIC
unexpected (-1 vs 0)
[0.070006] Pid: 1, comm: swapper Not tainted 3.1.0-7.fc16.x86_64 #1
[0.071004] Call Trace:
[0
On Thu, 24 Nov 2011, Anthony PERARD wrote:
> diff --git a/xen-mapcache.c b/xen-mapcache.c
> index 7bcb86e..73927ab 100644
> --- a/xen-mapcache.c
> +++ b/xen-mapcache.c
> @@ -191,10 +191,14 @@ uint8_t *xen_map_cache(target_phys_addr_t phys_addr,
> target_phys_addr_t size,
>
On Thu, Nov 24, 2011 at 05:49:23PM +0100, Paolo Bonzini wrote:
> On 11/24/2011 05:42 PM, Michael S. Tsirkin wrote:
> >Most users ignore the return value anyway,
> >and virtio_load needs to look at supported features
> >mask for the diagnostic anyway. So let's use virtio_set_features
> >void.
>
> C
From: Jiang Yunhong
A more complete history can be found here:
git://xenbits.xensource.com/qemu-xen-unstable.git
Signed-off-by: Jiang Yunhong
Signed-off-by: Shan Haitao
Signed-off-by: Anthony PERARD
---
Makefile.target |1 +
hw/apic-msidef.h |
On 22 November 2011 03:25, Peter Chubb wrote:
> Properly implement dual-timer read/write for the sp804 dual timer module.
> Based on ARM specs at
> http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0271d/index.html
>
> Signed-off-by: Hans Jang
> Signed-off-by: David Mirabito
> Signe
This patch move the msi definition from apic.c to apic-msidef.h. So it can be
used also by other .c files.
Signed-off-by: Anthony PERARD
Cc: Michael S. Tsirkin
---
hw/apic-msidef.h | 28
hw/apic.c| 11 +--
2 files changed, 29 insertions(+), 10 de
Signed-off-by: Anthony PERARD
---
configure | 25 +
1 files changed, 25 insertions(+), 0 deletions(-)
diff --git a/configure b/configure
index f033438..8ad6698 100755
--- a/configure
+++ b/configure
@@ -127,6 +127,7 @@ vnc_png=""
vnc_thread="no"
xen=""
xen_ctrl_versi
From: Allen Kay
A more complete history can be found here:
git://xenbits.xensource.com/qemu-xen-unstable.git
Signed-off-by: Allen Kay
Signed-off-by: Guy Zana
Signed-off-by: Anthony PERARD
---
Makefile.target |2 +
hw/xen_common.h |3 +
hw/xen
Value check in PCI Express Base Specification rev 1.1
Signed-off-by: Anthony PERARD
---
hw/pci_regs.h |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/hw/pci_regs.h b/hw/pci_regs.h
index e8357c3..6b42515 100644
--- a/hw/pci_regs.h
+++ b/hw/pci_regs.h
@@ -393,7 +393,7 @@
Signed-off-by: Anthony PERARD
---
hw/pci_regs.h |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/hw/pci_regs.h b/hw/pci_regs.h
index 6b42515..56a404b 100644
--- a/hw/pci_regs.h
+++ b/hw/pci_regs.h
@@ -392,6 +392,7 @@
#define PCI_EXP_TYPE_UPSTREAM 0x5 /* Upstream Port
Hi all,
This patch series introduces the PCI passthrough for Xen.
First, we have HostPCIDevice that help to access one PCI device of the host.
Then, there is an additions in the QEMU code, pci_check_bar_overlap.
There are also several change in pci_ids and pci_regs.
Last part, but not least, t
Signed-off-by: Anthony PERARD
---
hw/pci_ids.h |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/hw/pci_ids.h b/hw/pci_ids.h
index 83f3893..2ea5ec2 100644
--- a/hw/pci_ids.h
+++ b/hw/pci_ids.h
@@ -117,6 +117,7 @@
#define PCI_DEVICE_ID_INTEL_82801I_UHCI6 0x2939
#define PCI
On Thu, 24 Nov 2011, Anthony PERARD wrote:
> This patch change the xen_map_cache behavior. Before trying to map a guest
> addr, mapcache will look into the list of range of address that have been
> moved
> (physmap/set_memory). There is currently one memory space like this, the vram,
> "moved" fro
On 11/24/2011 06:38 PM, Kevin O'Connor wrote:
Jan Kiszka (2):
Probe HPET existence
Probe PCI existence
Jan,
does this mean that isapc will be unbroken in 1.0? Yay!
Paolo
There are a handful of bugfixes between QEmu's current SeaBIOS version
(8e301472e324b6d6496d8b4ffc66863e99d7a505) and the SeaBIOS v1.6.3.1
released version. The total diff is 12 patches - 5 bug fixes for
QEmu/KVM, 1 coreboot bug fix, 3 patches are version/doc changes, 2
minor comment changes, and
On 11/24/2011 06:11 PM, Fabien Chouteau wrote:
Hello,
I've run into some problems with this patch on Windows. The thing is
that select() should be used only with socket file descriptors.
If glib_select_fill() put a non-socket file descriptor in rfds or wfds,
select() will fail with this error (
On Thu, 24 Nov 2011, Anthony PERARD wrote:
> In Xen case, the guest RAM is not handle by QEMU, and it is saved by Xen
> tools.
> So, we just avoid to register the RAM save state handler.
Maybe we can unregister these handlers in the Xen specific
initialization code, before we start receiving save
On 22/08/2011 15:47, Paolo Bonzini wrote:
> On 08/22/2011 03:45 PM, Anthony Liguori wrote:
>>>
>>> Almost: in Win32 you need to use g_io_channel_win32_new_socket. But
>>> indeed on Windows you can only use qemu_set_fd_handler for sockets too.
>>
>> I think that's really only for read/write though.
Peter Maydell writes:
> On 24 November 2011 16:04, Chris Webb wrote:
> > + ?? ?? ?? ?? ?? ?? ?? ??if (qemu_opts_id(opts)) {
> > + ?? ?? ?? ?? ?? ?? ?? ?? ??fsdev =
> > qemu_opts_create(qemu_find_opts("fsdev"),
> > + ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ??
> > qemu_opts_i
When using a virtfs root filesystem, the mount_tag needs to be set to
/dev/root. This can be done long-hand as
-fsdev local,id=root,path=/path/to/rootfs,...
-device virtio-9p-pci,fsdev=root,mount_tag=/dev/root
but the -virtfs shortcut cannot be used as it hard-codes the device identifier
to m
On 22 November 2011 04:33, Peter Chubb wrote:
> +/*
> + * Print a message at most ten times.
> + */
> +#define scream(fmt, args...) \
> + do { \
> + static int printable = 10;\
> + if (printable--) { \
> + fprintf(stderr, fmt, ##args);\
> + } \
> + } while (0)
This allows qemu to drop privileges to a dynamically allocated, anonymous UID
and GID without needing a temporary /etc/passwd entry for that UID. The
UID:GID format is very standard, being (for example) the syntax used by
chown(1) for numeric IDs.
Signed-off-by: Chris Webb
---
os-posix.c | 16
change_process_uid() checks that privileges have been successfully dropped by
verifying that setuid(0) fails. However, if qemu is explicitly -runas root,
the setuid(0) would correctly succeed, so we skip the test in that case.
Signed-off-by: Chris Webb
---
os-posix.c |2 +-
1 files changed,
2011/11/24 Benoît Canet :
>
> We have a common functions to refactor used in both half of the files.
> omap_l4_attach
I assume the idea is that omap_l4_attach() can eventually disappear
when all the l4 devices are converted to memory regions...
-- PMM
On 11/24/2011 06:47 PM, Benoît Canet wrote:
>
> We have a common functions to refactor used in both half of the files.
> omap_l4_attach
Already done. See omap_l4_attach_region() and omap_l4_region_size().
--
error compiling committee.c: too many arguments to function
On 11/24/2011 05:42 PM, Michael S. Tsirkin wrote:
Most users ignore the return value anyway,
and virtio_load needs to look at supported features
mask for the diagnostic anyway. So let's use virtio_set_features
void.
Could some backend make it a hard failure? If I understand correctly,
this wo
We have a common functions to refactor used in both half of the files.
omap_l4_attach
2011/11/24 Avi Kivity
> On 11/24/2011 04:29 PM, Benoît Canet wrote:
> >
> > We are left with :
> >
> >
> > hw/omap2.c
> > hw/omap_dma.c
> > hw/omap_dss.c
> > hw/omap_gpio.c
> >
> > and
> >
> > hw/omap_i2c.c
> >
Avi Kivity writes:
> On 11/24/2011 06:29 PM, Chris Webb wrote:
> > This allows qemu to drop privileges to a dynamically allocated, anonymous
> > UID
> > and GID without needing a temporary /etc/passwd entry for that UID. The
> > UID:GID format is very standard, being (for example) the syntax use
On 11/24/2011 06:46 PM, Avi Kivity wrote:
> On 11/24/2011 06:29 PM, Chris Webb wrote:
> > This allows qemu to drop privileges to a dynamically allocated, anonymous
> > UID
> > and GID without needing a temporary /etc/passwd entry for that UID. The
> > UID:GID format is very standard, being (for ex
On Thu, Nov 24, 2011 at 02:40:07PM +0200, Dor Laor wrote:
> Using QMP is an advantage, I agree.
> However it can be used by another option - move the QMP schema out
> of qemu.git so all projects like libvirt, agents, vdsm, etc will be
> able to consume it directly.
>
> This way, adding a new (agen
On 11/24/2011 06:29 PM, Chris Webb wrote:
> This allows qemu to drop privileges to a dynamically allocated, anonymous UID
> and GID without needing a temporary /etc/passwd entry for that UID. The
> UID:GID format is very standard, being (for example) the syntax used by
> chown(1) for numeric IDs.
On 24 November 2011 16:04, Chris Webb wrote:
> + if (qemu_opts_id(opts)) {
> + fsdev = qemu_opts_create(qemu_find_opts("fsdev"),
> + qemu_opts_id(opts), 1);
> + } else {
> + fsdev = qemu_opts_
On Thu, Nov 24, 2011 at 01:28:52PM +0100, Paolo Bonzini wrote:
> vdev->guest_features is not masking features that are not supported by
> the guest. Fix this by introducing a common wrapper to be used by all
> virtio bus implementations.
>
> Signed-off-by: Paolo Bonzini
Yes, while I can't point
On Thu, Nov 24, 2011 at 3:22 PM, Kevin Wolf wrote:
> Signed-off-by: Kevin Wolf
> ---
> dma-helpers.c | 10 ++
> trace-events | 7 +++
> 2 files changed, 17 insertions(+), 0 deletions(-)
Reviewed-by: Stefan Hajnoczi
This patch change the xen_map_cache behavior. Before trying to map a guest
addr, mapcache will look into the list of range of address that have been moved
(physmap/set_memory). There is currently one memory space like this, the vram,
"moved" from were it's allocated to were the guest will look into
This allows qemu to drop privileges to a dynamically allocated, anonymous UID
and GID without needing a temporary /etc/passwd entry for that UID. The
UID:GID format is very standard, being (for example) the syntax used by
chown(1) for numeric IDs.
Signed-off-by: Chris Webb
---
os-posix.c | 16
change_process_uid() checks that privileges have been successfully dropped by
verifying that setuid(0) fails. However, if qemu is explicitly -runas root,
the setuid(0) would correctly succeed, so we skip the test in that case.
Signed-off-by: Chris Webb
---
os-posix.c |2 +-
1 files changed,
During the initialisation of the machine at restore time, the access to the
VRAM will fail because QEMU does not know yet the right guest address to map,
so the vram_ptr is NULL.
So this patch avoid using a NULL pointer during initialisation, and try to get
another vram_ptr if the call failed the
On 24 November 2011 15:56, Avi Kivity wrote:
> The following three patches are part of the memory API conversion queue;
> while I don't think there's anything contentious in there, it's not the usual
> convert-to-memory-API fare.
>
> The patches remove a bunch of dead code that has not been in use
Also observed on Fedora 16, qemu-kvm-0.15.1-3.fc16.x86_64
https://bugzilla.redhat.com/show_bug.cgi?id=754149
Also observed on Ubuntu, extra/qemu-kvm 0.15.0-2
https://bugs.launchpad.net/qemu/+bug/894037
** Bug watch added: Red Hat Bugzilla #754149
https://bugzilla.redhat.com/show_bug.cgi?id=7
On Mon, Nov 21, 2011 at 07:58:48PM -0600, Anthony Liguori wrote:
> On 11/21/2011 03:22 PM, Michael Tokarev wrote:
> >Current version of seabios is 1.6.3, released several
> >weeks ago. Compared with the version currently shipped
> >in qemu, it adds a few commits, most of which are fixes
> >for qe
Also observed on Fedora 16:
https://bugzilla.redhat.com/show_bug.cgi?id=754149
** Bug watch added: Red Hat Bugzilla #754149
https://bugzilla.redhat.com/show_bug.cgi?id=754149
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https:/
In Xen case, the guest RAM is not handle by QEMU, and it is saved by Xen tools.
So, we just avoid to register the RAM save state handler.
Signed-off-by: Anthony PERARD
---
vl.c |6 --
1 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/vl.c b/vl.c
index f5afed4..e7dced2 100644
Hi all,
This patch series provide some fix to have migration working with Xen. The main
issue with Xen is that the guest RAM is not handle by QEMU.
So, first of all, the RAM will not be saved in the QEMU state file.
Then, during the initialisation that append before the migration, QEMU should
no
Do not allocate RAM during pre-migration runstate.
Do not actually "do" set_memory during migration.
Signed-off-by: Anthony PERARD
---
xen-all.c | 13 +
1 files changed, 13 insertions(+), 0 deletions(-)
diff --git a/xen-all.c b/xen-all.c
index 40e8869..279651a 100644
--- a/xen-all
This new state will be used by Xen functions to know QEMU will wait for a
migration. This is important to know for memory related function because the
memory is already allocated and reallocated them will not works.
Signed-off-by: Anthony PERARD
---
qapi-schema.json |2 +-
vl.c |
When using a virtfs root filesystem, the mount_tag needs to be set to
/dev/root. This can be done long-hand as
-fsdev local,id=root,path=/path/to/rootfs,...
-device virtio-9p-pci,fsdev=root,mount_tag=/dev/root
but the -virtfs shortcut cannot be used as it hard-codes the device identifier
to m
Also add omap_l4_region_size(), since memory API functions need
the size during initialization.
Signed-off-by: Avi Kivity
---
hw/omap.h|7 ++-
hw/omap2.c |2 +-
hw/omap_l4.c | 29 -
3 files changed, 35 insertions(+), 3 deletions(-)
diff --git a/hw
This is a trivial wrapper around cpu_register_io_memory(), adding
no value. Inline it into all callers.
Signed-off-by: Avi Kivity
---
hw/omap.h |2 --
hw/omap2.c | 12 ++--
hw/omap_dss.c | 16
hw/omap_gptimer.c |4 ++--
hw/omap_i2c
This was introduced apparently to overcome a limitation on the number of
cpu_register_io_memory() calls. 477b24ef91175 (July 2008) removed use
of the hack, but retained the code. This patch removes the code as well.
Signed-off-by: Avi Kivity
---
hw/omap.h|3 -
hw/omap_l4.c | 118 -
1 - 100 of 171 matches
Mail list logo