On Tue, Apr 14, 2020 at 03:30:40PM +0200, Philippe Mathieu-Daudé wrote:
> Collection of bugfixes for 5.0.
>
> Only vhost-user-gpu/grlib_ahb_apb_pnp patches are reviewed.
>
> As 5.0-rc3 is tomorrow, I thought it could help to gather
> them and resend altogether.
So who's applying all this stuff?
On Tue, Apr 14, 2020 at 03:30:45PM +0200, Philippe Mathieu-Daudé wrote:
> vu_queue_pop() returns memory that must be freed with free().
>
> Cc: qemu-sta...@nongnu.org
> Reported-by: Coverity (CID 1421887 ALLOC_FREE_MISMATCH)
> Suggested-by: Peter Maydell
> Reviewed-by: Marc-André Lureau
> Signed
From: Nicholas Piggin
If mtmsr L=1 sets MSR[EE] while there is a maskable exception pending,
it does not cause an interrupt. This causes the test case to hang:
https://lists.gnu.org/archive/html/qemu-ppc/2019-10/msg00826.html
More recently, Linux reduced the occurance of operations (e.g., rfi)
From: Richard Henderson
The padding that was added in 95cda4c44ee was added to a union,
and so it had no effect. This fixes misalignment errors detected
by clang sanitizers for ppc64 and ppc64le.
In addition, only ppc64 allocates space for VSX registers, so do
not save them for ppc32. The kern
From: Ganesh Goudar
Bitwise AND with kvm_run->flags to evaluate if we recovered from
MCE or not is not correct, As disposition in kvm_run->flags is a
two-bit integer value and not a bit map, So check for equality
instead of bitwise AND.
Without the fix qemu treats any unrecoverable mce error as
The following changes since commit 20038cd7a8412feeb49c01f6ede89e36c8995472:
Update version for v5.0.0-rc3 release (2020-04-15 20:51:54 +0100)
are available in the Git repository at:
git://github.com/dgibson/qemu.git tags/ppc-for-5.0-20200417
for you to fetch changes up to 5ed195065cc6895f6
At the moment the VCPU init sequence includes setting PVR which in case of
KVM-HV only checks if it matches the hardware PVR mask as PVR cannot be
virtualized by the hardware. In order to cope with various CPU revisions
only top 16bit of PVR are checked which works for minor revision updates.
Howe
Mostly looks good - just a few superficial notes.
On Wed, Apr 15, 2020 at 11:28:26AM +0800, Li Feng wrote:
> 1. set s->connected to true after vhost_dev_init;
> 2. call vhost_dev_get_config when s->connected is true, otherwise the
> hdev->host_ops will be nullptr.
You mean hdev->vhost_ops, ri
On Wed, Apr 15, 2020 at 11:28:24AM +0800, Li Feng wrote:
>
> when s->inflight is freed, vhost_dev_free_inflight may try to access
> s->inflight->addr, it will retrigger the following issue.
>
> ==7309==ERROR: AddressSanitizer: heap-use-after-free on address
> 0x604001020d18 at pc 0x55ce948a
On Wed, Apr 15, 2020 at 11:28:23AM +0800, Li Feng wrote:
>
> switch (event) {
> case CHR_EVENT_OPENED:
> @@ -363,7 +376,16 @@ static void vhost_user_blk_event(void *opaque,
> QEMUChrEvent event)
> }
> break;
> case CHR_EVENT_CLOSED:
> -vhost_user_blk_disco
Patchew URL:
https://patchew.org/QEMU/20200417023440.70514-1-far...@linux.ibm.com/
Hi,
This series failed the asan build test. Please find the testing commands and
their output below. If you have Docker installed, you can probably reproduce it
locally.
=== TEST SCRIPT BEGIN ===
#!/bin/bash
ex
I'm glad we can reach a consensus that ramfb needs sanity checks. And well,
I'm probably at fault with the hijacking.
Your QEMU/TCG in QEMU/TCG example also made me realize a deeper problem,
though: your setting still can't escape the host display / physical GPU
issue. The middle display layers be
Here is a new pass at the channel-path handling code for vfio-ccw,
to take advantage of the corresponding kernel patches posted here:
https://lore.kernel.org/kvm/20200417023001.65006-1-far...@linux.ibm.com/
Per the discussion in v2, I dropped the EIO-to-CC3 patch from the
head of the series.
I a
From: Farhan Ali
Signed-off-by: Farhan Ali
Signed-off-by: Eric Farman
---
Notes:
v2->v3: [EF]
- Re-ran 16 April 2020 (based on kernel tag v5.6, and limited to
bits interesting to this series)
v1->v2: [EF]
- Re-ran 3 February 2020 (based on kernel tag v5.5)
From: Farhan Ali
The schib region can be used to obtain the latest SCHIB from the host
passthrough subchannel. Since the guest SCHIB is virtualized,
we currently only update the path related information so that the
guest is aware of any path related changes when it issues the
'stsch' instruction.
We have a use case (vfio-ccw) where a CRW is already built and
ready to use. Rather than teasing out the components just to
reassemble it later, let's rework this code so we can queue a
fully-qualified CRW directly.
Signed-off-by: Eric Farman
---
hw/s390x/css.c | 44
From: Farhan Ali
The crw region can be used to obtain information about
Channel Report Words (CRW) from vfio-ccw driver.
Currently only channel path related CRWs are passed to
QEMU from vfio-ccw driver.
Signed-off-by: Farhan Ali
Signed-off-by: Eric Farman
---
Notes:
v0->v1: [EF]
- F
Make it easier to add new ones in the future.
Signed-off-by: Eric Farman
Reviewed-by: Cornelia Huck
---
Notes:
v2->v3:
- Added Conny's r-b
v1->v2:
- Make irq parameter unsigned [CH]
- Remove extraneous %m from error_report calls [CH]
hw/vfio/ccw.c | 58
From: Farhan Ali
The CRW irq will be used by vfio-ccw to notify the userspace
about any CRWs the userspace needs to handle. Let's add support
for it.
Signed-off-by: Farhan Ali
Signed-off-by: Eric Farman
---
Notes:
v2->v3:
- Remove "size==0" check in CRW notifier [CH]
- Remove in
While we're at it, add a g_free() for the async_cmd_region that
is the last thing currently created. g_free() knows how to handle
NULL pointers, so this makes it easier to remember what cleanups
need to be performed when new regions are added.
Signed-off-by: Eric Farman
Reviewed-by: Cornelia Huc
On Tue, Apr 14, 2020 at 09:11:31PM +1000, Nicholas Piggin wrote:
65;5803;1c> If mtmsr L=1 sets MSR[EE] while there is a maskable exception
pending,
> it does not cause an interrupt. This causes the test case to hang:
>
> https://lists.gnu.org/archive/html/qemu-ppc/2019-10/msg00826.html
>
> More
On 4/16/20 5:49 PM, no-re...@patchew.org wrote:
Patchew URL: https://patchew.org/QEMU/20200416212349.731404-1-ebl...@redhat.com/
Hi,
This series failed the docker-quick@centos7 build test. Please find the testing
commands and
their output below. If you have Docker installed, you can probably
along side setting host page table to be read-only, the memory regions
are also required to be read-only, so that when guest writes to the
read-only & mmap'd regions, vmexits would happen and region write handlers
are called.
Reviewed-by: Philippe Mathieu-Daudé
Signed-off-by: Yan Zhao
Signed-off
for vfio regions that are without write permission,
drop guest writes to those regions.
Cc: Philippe Mathieu-Daudé
Signed-off-by: Yan Zhao
Signed-off-by: Xin Zeng
---
hw/vfio/common.c | 12 ++--
1 file changed, 10 insertions(+), 2 deletions(-)
diff --git a/hw/vfio/common.c b/hw/vfio/c
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
patch 1 modifies handler of ram device memory regions to drop guest writes
to read-only ram device memory regions
patch 2 modifies handler of non-mmap'd read-only vfio regions to drop guest
writes to those r
for ram device regions, drop guest writes if the regions is read-only.
Cc: Philippe Mathieu-Daudé
Signed-off-by: Yan Zhao
Signed-off-by: Xin Zeng
---
memory.c | 7 +++
1 file changed, 7 insertions(+)
diff --git a/memory.c b/memory.c
index 601b749906..9576dd6807 100644
--- a/memory.c
+++ b
Patchew URL: https://patchew.org/QEMU/20200416212349.731404-1-ebl...@redhat.com/
Hi,
This series failed the docker-quick@centos7 build test. Please find the testing
commands and
their output below. If you have Docker installed, you can probably reproduce it
locally.
=== TEST SCRIPT BEGIN ===
Patchew URL:
https://patchew.org/QEMU/20200416203624.32366-1-mlevi...@redhat.com/
Hi,
This series failed the docker-quick@centos7 build test. Please find the testing
commands and
their output below. If you have Docker installed, you can probably reproduce it
locally.
=== TEST SCRIPT BEGIN ==
On 4/16/20 4:23 PM, Eric Blake wrote:
It's useful to know how much space can be occupied by qcow2 persistent
bitmaps, even though such metadata is unrelated to the guest-visible
data. Report this value as an additional field.
Reported-by: Nir Soffer
Signed-off-by: Eric Blake
---
Per https:
Patchew URL:
https://patchew.org/QEMU/20200416203624.32366-1-mlevi...@redhat.com/
Hi,
This series failed the asan build test. Please find the testing commands and
their output below. If you have Docker installed, you can probably reproduce it
locally.
=== TEST SCRIPT BEGIN ===
#!/bin/bash
exp
Patchew URL:
https://patchew.org/QEMU/20200416203624.32366-1-mlevi...@redhat.com/
Hi,
This series seems to have some coding style problems. See output below for
more information:
Subject: [PATCH 0/4] RFC/WIP: Fix scsi devices plug/unplug races w.r.t
virtio-scsi iothread
Message-id: 202004162
It's useful to know how much space can be occupied by qcow2 persistent
bitmaps, even though such metadata is unrelated to the guest-visible
data. Report this value as an additional field.
Reported-by: Nir Soffer
Signed-off-by: Eric Blake
---
This is independent from my 'qemu-img convert --bitm
Hi Peter,
On 4/16/20 8:29 AM, Peter Maydell wrote:
> On Sun, 22 Mar 2020 at 21:19, Guenter Roeck wrote:
>>
>> i.MX7 supports watchdog pretimeout interupts. With this commit,
>> the watchdog in mcimx7d-sabre is fully operational, including
>> pretimeout support.
>>
>> Signed-off-by: Guenter Roeck
Patchew URL:
https://patchew.org/QEMU/20200416195641.13144.16955.stgit@localhost.localdomain/
Hi,
This series seems to have some coding style problems. See output below for
more information:
Subject: [PATCH v20 QEMU 0/5] virtio-balloon: add support for free page
reporting
Message-id: 2020041
Le 16/04/2020 à 22:09, Laurent Vivier a écrit :
> Le 16/04/2020 à 22:03, Pierre Muller a écrit :
>> Le 16/04/2020 à 13:18, Laurent Vivier a écrit :
>>> Le 14/04/2020 à 18:56, Alex Bennée a écrit :
Philippe Mathieu-Daudé writes:
> gdbstub/m68k seems broken with floats, previou
Some code might race with placement of new devices on a bus.
We currently first place a (unrealized) device on the bus
and then realize it.
As a workaround, users that scan the child device list, can
check the realized property to see if it is safe to access such a device.
Use an atomic write here
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1812399
Suggested-by: Paolo Bonzini
Signed-off-by: Maxim Levitsky
---
hw/scsi/virtio-scsi.c | 18 +-
1 file changed, 17 insertions(+), 1 deletion(-)
diff --git a/hw/scsi/virtio-scsi.c b/hw/scsi/virtio-scsi.c
index b0f4a35f81
This change will allow us to convert the bus children list to RCU,
while not changing the logic of this function
Signed-off-by: Maxim Levitsky
---
hw/scsi/scsi-bus.c | 12 ++--
1 file changed, 10 insertions(+), 2 deletions(-)
diff --git a/hw/scsi/scsi-bus.c b/hw/scsi/scsi-bus.c
index 1c
Hi!
This is a patch series that is a result of my discussion with Paulo on
how to correctly fix the root cause of the BZ #1812399.
The root cause of this bug is the fact that IO thread is running mostly
unlocked versus main thread on which device hotplug is done.
qdev_device_add first creates th
This fixes the race between device emulation code that tries to find
a child device to dispatch the request to (e.g a scsi disk),
and hotplug of a new device to that bus.
Note that this doesn't convert all the readers of the list
but only these that might go over that list without BQL held.
This
On Thu, Apr 16, 2020 at 05:49:05PM +0100, Stefan Hajnoczi wrote:
> virtiofsd doesn't need of all Linux capabilities(7) available to root. Keep a
> whitelisted set of capabilities that we require. This improves security in
> case virtiofsd is compromised by making it hard for an attacker to gain
Le 16/04/2020 à 22:03, Pierre Muller a écrit :
> Le 16/04/2020 à 13:18, Laurent Vivier a écrit :
>> Le 14/04/2020 à 18:56, Alex Bennée a écrit :
>>>
>>> Philippe Mathieu-Daudé writes:
>>>
gdbstub/m68k seems broken with floats, previous to refactor commit
a010bdbe719 ("extend GByteArray t
Le 16/04/2020 à 13:18, Laurent Vivier a écrit :
> Le 14/04/2020 à 18:56, Alex Bennée a écrit :
>>
>> Philippe Mathieu-Daudé writes:
>>
>>> gdbstub/m68k seems broken with floats, previous to refactor commit
>>> a010bdbe719 ("extend GByteArray to read register helpers").
>>>
>>> HEAD at 6fb1603aa2:
On Wed 15 Apr 2020 10:39:26 AM CEST, Vladimir Sementsov-Ogievskiy wrote:
>> + * Returns 1 on success, -errno on failure (in order to match the
>> + * return value of handle_copied() and handle_alloc()).
>
> Hmm, honestly, I don't like this idea. handle_copied and handle_alloc
> has special return c
From: Alexander Duyck
Add support for free page reporting. The idea is to function very similar
to how the balloon works in that we basically end up madvising the page as
not being used. However we don't really need to bother with any deflate
type logic since the page will be faulted back into th
Public bug reported:
Hello,
im trying to passthrough PCI soundcards into Qemu Windows 98 machine - i tried
Yamaha 724/744 and Aunreal Vortex 1, for Windows 98 its working fine, but for
Windows 98 dosbox mode its at the best half - working - FM (music) only or
nothing with detected by games soun
From: Alexander Duyck
Sync the latest upstream changes for free page reporting. To be
replaced by a full linux header sync.
Signed-off-by: Alexander Duyck
---
include/standard-headers/linux/virtio_balloon.h |1 +
1 file changed, 1 insertion(+)
diff --git a/include/standard-headers/linux/v
From: Alexander Duyck
In an upcoming patch a feature named Free Page Reporting is about to be
added. In order to avoid any confusion we should drop the use of the word
'report' when referring to Free Page Hinting. So what this patch does is go
through and replace all instances of 'report' with 'h
This series provides an asynchronous means of reporting free guest pages
to QEMU through virtio-balloon so that the memory associated with those
pages can be dropped and reused by other processes and/or guests on the
host. Using this it is possible to avoid unnecessary I/O to disk and
greatly impro
From: Alexander Duyck
We need to make certain to advertise support for page poison tracking if
we want to actually get data on if the guest will be poisoning pages. So
if free page hinting is active we should add page poisoning support and
let the guest disable it if it isn't using it.
Page pois
From: Alexander Duyck
Sync to the latest upstream changes for free page hinting. To be
replaced by a full linux header sync.
Signed-off-by: Alexander Duyck
---
include/standard-headers/linux/virtio_balloon.h | 11 +--
1 file changed, 9 insertions(+), 2 deletions(-)
diff --git a/incl
Public bug reported:
Hello,
im using Win98 machine with KVM videocards passthrough which is working fine,
but when i try Windows 98 - Dosbox mode, there is something work with all
videocards which i tried PCI-E/PCI - Nvidia, 3Dfx, Matrox.
Often is framerate is very slow, as slideshow:
Doom 2,
Public bug reported:
Hello,
tried to passthroug old ATI pre AMD PCI / PCI-E cards, on machine where
anything else is working - Nvidia /Matrox / 3dfx cards..
Here are results:
ATI Mach 64 PCI - videocard - machine start segfault
ATI Rage XL PCI - videocard - machine start segfault
ATI Radeon 7000
On 4/16/20 9:30 AM, Philippe Mathieu-Daudé wrote:
On 4/16/20 5:47 PM, Peter Maydell wrote:
On Thu, 16 Apr 2020 at 16:45, Peter Maydell wrote:
On Sun, 29 Mar 2020 at 00:18, Paul Zimmerman wrote:
+ s->as = &address_space_memory;
Ideally this should be a device property. (hw/dma/pl080.c
Public bug reported:
Im not able to exchange CD image on the fly (needed for some games). I
messed with command like - in console(ATL+CRTL+2) eject ide1-cd0 and
change ide-cd0 D:/Games/!Emulators/Dos-QEMU/ISOs/TestChangeISO.iso , but
system so never able to find new CD data.. simply drive so empty
Public bug reported:
Hello,
im trying to use Qemu for Dos machines.
But there is problem with some programs that arrow key press is double
in some problems. As advanced Filemanagers - Dos Navigator or File
Wizard, same Scandisk.
There is gif:
https://www.vogons.org/download/file.php?id=77141&mo
Public bug reported:
I have problem make Quake Demo working with 640x480+, with 320x200 working fine.
I tried 3 virtual videocards settings: -vga cirrus 640x480 is not available,
probably emulated GPU has not enough VRAM or some Vesa2 utility is needed. For
-vga std and -vga vmware // 640x480 is
Public bug reported:
Hello,
i tried to use Qemu 4.2 for Dos, but there is problem what in Dos is not
possible turn on Numlock for input numbers, so games need it.. Numlock only
working as arrow keys.
I tested bough Windows and Linux builds.
With same setting, when i use Windows 98 or later os
From: "Edgar E. Iglesias"
This is to re-enable machine-none MicroBlaze testing.
Cheers,
Edgar
Edgar E. Iglesias (1):
tests: machine-none-test: Enable MicroBlaze testing
tests/qtest/machine-none-test.c | 10 --
1 file changed, 4 insertions(+), 6 deletions(-)
--
2.20.1
From: "Edgar E. Iglesias"
Enable MicroBlaze testing.
Signed-off-by: Edgar E. Iglesias
---
tests/qtest/machine-none-test.c | 10 --
1 file changed, 4 insertions(+), 6 deletions(-)
diff --git a/tests/qtest/machine-none-test.c b/tests/qtest/machine-none-test.c
index 8bb54a6360..209d86eb5
(adding Markus for a CLI question, look for [*])
On 4/16/20 1:20 PM, Nir Soffer wrote:
On Thu, Apr 16, 2020 at 5:51 PM Eric Blake wrote:
Without this series, the process for copying one qcow2 image to
another including all of its bitmaps involves running qemu and doing
the copying by hand wit
On Thu, 16 Apr 2020 at 19:22, John Snow wrote:
> My goal is to make virtual environments work out of the box.
>
> I.e., if you run ./configure from inside a VENV, it should "just work."
Yeah, this seems reasonable to me. If I understand your
patch correctly it ought to work without breaking
the s
Le 16/04/2020 à 21:08, Peter Maydell a écrit :
> On Thu, 16 Apr 2020 at 18:16, Laurent Vivier wrote:
>>
>> Le 16/04/2020 à 18:03, Peter Maydell a écrit :
>>> On Thu, 16 Apr 2020 at 16:29, Laurent Vivier wrote:
The following changes since commit
20038cd7a8412feeb49c01f6ede89e36c899
On Thu, 16 Apr 2020 at 18:16, Laurent Vivier wrote:
>
> Le 16/04/2020 à 18:03, Peter Maydell a écrit :
> > On Thu, 16 Apr 2020 at 16:29, Laurent Vivier wrote:
> >>
> >> The following changes since commit
> >> 20038cd7a8412feeb49c01f6ede89e36c8995472:
> >>
> >> Update version for v5.0.0-rc3 rel
On Thu, Apr 16, 2020 at 04:58:31PM +0200, Christian Schoenebeck wrote:
> On Donnerstag, 16. April 2020 02:44:33 CEST Omar Sandoval wrote:
> > From: Omar Sandoval
> >
> > QEMU's local 9pfs server passes through O_NOATIME from the client. If
> > the QEMU process doesn't have permissions to use O_NO
> The other thing to keep in mind is that the poison value only really
> comes into play with hinting/reporting. In the case of the standard
> balloon the pages are considered allocated from the guest's
Currently just as free page hinting IMHO. They are temporarily
considered allocated.
> perspec
On Thu, Apr 16, 2020 at 5:51 PM Eric Blake wrote:
>
> Without this series, the process for copying one qcow2 image to
> another including all of its bitmaps involves running qemu and doing
> the copying by hand with a series of QMP commands. This makes the
> process a bit more convenient.
This s
On 4/16/20 8:31 AM, Alex Bennée wrote:
>
> John Snow writes:
>
>> On 4/15/20 1:55 PM, Peter Maydell wrote:
>>> On Wed, 15 Apr 2020 at 18:33, John Snow wrote:
sphinx-build is the name of the script entry point from the sphinx
package itself. sphinx-build-3 is a pacakging conven
On Thu, Apr 16, 2020 at 7:55 AM David Hildenbrand wrote:
>
> >> We should document our result of page poisoning, free page hinting, and
> >> free page reporting there as well. I hope you'll have time for the latter.
> >>
> >>
Fix syscall name and parameters priinter.
Before the change:
```
$ alpha-linux-user/qemu-alpha -strace -L /usr/alpha-unknown-linux-gnu/ /tmp/a
...
1274697
%s(%d)(2097152,274903156744,274903156760,274905840712,274877908880,274903235616)
= 3
1274697 exit_group(0)
```
After the change:
```
$ alp
On 4/16/20 6:49 PM, Stefan Hajnoczi wrote:
All this process does is wait for its child. No capabilities are
needed.
Signed-off-by: Stefan Hajnoczi
---
tools/virtiofsd/passthrough_ll.c | 13 +
1 file changed, 13 insertions(+)
diff --git a/tools/virtiofsd/passthrough_ll.c b/tools
Signed-off-by: Stephen Long
---
Made the fixes Richard noted.
target/arm/helper-sve.h| 7 +++
target/arm/sve.decode | 6 +++
target/arm/sve_helper.c| 104 +
target/arm/translate-sve.c | 29 +++
4 files changed, 146 insertions(+)
diff
Le 16/04/2020 à 18:03, Peter Maydell a écrit :
> On Thu, 16 Apr 2020 at 16:29, Laurent Vivier wrote:
>>
>> The following changes since commit 20038cd7a8412feeb49c01f6ede89e36c8995472:
>>
>> Update version for v5.0.0-rc3 release (2020-04-15 20:51:54 +0100)
>>
>> are available in the Git repositor
On Wed, 15 Apr 2020 at 05:37, Cameron Esfahani wrote:
>
> NRF51_GPIO_REG_CNF_END doesn't actually refer to the start of the last
> valid CNF register: it's referring to the last byte of the last valid
> CNF register.
>
> This hasn't been a problem up to now, as current implementation in
> memory.c
All this process does is wait for its child. No capabilities are
needed.
Signed-off-by: Stefan Hajnoczi
---
tools/virtiofsd/passthrough_ll.c | 13 +
1 file changed, 13 insertions(+)
diff --git a/tools/virtiofsd/passthrough_ll.c b/tools/virtiofsd/passthrough_ll.c
index af97ba1c41..0
virtiofsd runs as root but only needs a subset of root's Linux
capabilities(7). As a file server its purpose is to create and access
files on behalf of a client. It needs to be able to access files with
arbitrary uid/gid owners. It also needs to be create device nodes.
Introduce a Linux capabil
virtiofsd doesn't need of all Linux capabilities(7) available to root. Keep a
whitelisted set of capabilities that we require. This improves security in
case virtiofsd is compromised by making it hard for an attacker to gain further
access to the system.
Stefan Hajnoczi (2):
virtiofsd: only re
On Thu, 9 Apr 2020 at 07:31, Joel Stanley wrote:
>
> This is a boot stub that is similar to the code u-boot runs, allowing
> the kernel to boot the secondary CPU.
> +static void aspeed_write_smpboot(ARMCPU *cpu,
> + const struct arm_boot_info *info)
> +{
> +sta
On Sat, 4 Apr 2020 at 13:26, Edgar E. Iglesias wrote:
>
> From: "Edgar E. Iglesias"
>
> Hi,
>
> This fixes the endinannes related bugs with descriptor loading
> that Peter pointed out.
>
> Cheers,
> Edgar
>
> Edgar E. Iglesias (2):
> dma/xlnx-zdma: Fix descriptor loading (MEM) wrt endianness
>
On 4/16/20 5:47 PM, Peter Maydell wrote:
On Thu, 16 Apr 2020 at 16:45, Peter Maydell wrote:
On Sun, 29 Mar 2020 at 00:18, Paul Zimmerman wrote:
+s->as = &address_space_memory;
Ideally this should be a device property. (hw/dma/pl080.c
has an example of how to declare a TYPE_MEMORY_REG
On 4/16/20 7:42 AM, Stephen Long wrote:
> +static inline uint8_t do_histseg_cnt(uint8_t n, uint64_t m0, uint64_t m1)
> +{
> +int esz = 0;
Clearer to use MO_8.
> +int bits = 8 << esz;
> +uint64_t ones = dup_const(esz, 1);
> +uint64_t signs = ones << (bits - 1);
> +uint64_t cmp0
On Thu, 16 Apr 2020 at 16:29, Laurent Vivier wrote:
>
> The following changes since commit 20038cd7a8412feeb49c01f6ede89e36c8995472:
>
> Update version for v5.0.0-rc3 release (2020-04-15 20:51:54 +0100)
>
> are available in the Git repository at:
>
> git://github.com/vivier/qemu.git tags/linux
On Thu, 16 Apr 2020 at 16:45, Peter Maydell wrote:
>
> On Sun, 29 Mar 2020 at 00:18, Paul Zimmerman wrote:
> > +s->as = &address_space_memory;
>
> Ideally this should be a device property. (hw/dma/pl080.c
> has an example of how to declare a TYPE_MEMORY_REGION
> property and then create an A
On Sun, 29 Mar 2020 at 00:18, Paul Zimmerman wrote:
>
> Add the dwc-hsotg (dwc2) USB host controller emulation code.
> Based on hw/usb/hcd-ehci.c and hw/usb/hcd-ohci.c.
>
> Note that to use this with the dwc-otg driver in the Raspbian
> kernel, you must pass the option "dwc_otg.fiq_fsm_enable=0" o
The QMP handler qmp_object_add() and the implementation of --object in
qemu-storage-daemon can share most of the code. Currently,
qemu-storage-daemon calls qmp_object_add(), but this is not correct
because different visitors need to be used.
As a first step towards a fix, make qmp_object_add() a w
After processing the option string with the keyval parser, we get a
QDict that contains only strings. This QDict must be fed to a keyval
visitor which converts the strings into the right data types.
qmp_object_add(), however, uses the normal QObject input visitor, which
expects a QDict where all p
Kevin Wolf (2):
qom: Factor out user_creatable_add_dict()
qemu-storage-daemon: Fix non-string --object properties
include/qom/object_interfaces.h | 16
qemu-storage-daemon.c | 4 +---
qom/object_interfaces.c | 31 +++
qom/qom-qmp
On Sun, 22 Mar 2020 at 21:19, Guenter Roeck wrote:
>
> i.MX7 supports watchdog pretimeout interupts. With this commit,
> the watchdog in mcimx7d-sabre is fully operational, including
> pretimeout support.
>
> Signed-off-by: Guenter Roeck
> diff --git a/include/hw/arm/fsl-imx7.h b/include/hw/arm/
From: Sergei Trofimovich
Noticed by Barnabás Virágh as a python-3.7 failue on qemu-alpha.
The bug shows up on alpha as it's one of the targets where
EPOLL_CLOEXEC differs from other targets:
sysdeps/unix/sysv/linux/alpha/bits/epoll.h: EPOLL_CLOEXEC = 0100
sysdeps/unix/sysv/linux/bit
The following changes since commit 20038cd7a8412feeb49c01f6ede89e36c8995472:
Update version for v5.0.0-rc3 release (2020-04-15 20:51:54 +0100)
are available in the Git repository at:
git://github.com/vivier/qemu.git tags/linux-user-for-5.0-pull-request
for you to fetch changes up to 386d386
On Sun, 22 Mar 2020 at 21:19, Guenter Roeck wrote:
>
> Instantiating PWM, CAN, CAAM, and OCOTP devices is necessary to avoid
> crashes when booting mainline Linux.
>
> Signed-off-by: Guenter Roeck
Reviewed-by: Peter Maydell
thanks
-- PMM
On Sun, 22 Mar 2020 at 21:19, Guenter Roeck wrote:
>
> Implement full support for the watchdog in i.MX systems.
> Pretimeout support is optional because the watchdog hardware on i.MX31
> does not support pretimeouts.
>
> Signed-off-by: Guenter Roeck
> ---
> v2: Fixup of CONFIG_WDT_IMX -> CONFIG_W
On Donnerstag, 16. April 2020 02:44:33 CEST Omar Sandoval wrote:
> From: Omar Sandoval
>
> QEMU's local 9pfs server passes through O_NOATIME from the client. If
> the QEMU process doesn't have permissions to use O_NOATIME (namely, it
> does not own the file nor have the CAP_FOWNER capability), th
>> We should document our result of page poisoning, free page hinting, and
>> free page reporting there as well. I hope you'll have time for the latter.
>>
>> -
>> Semantics of VIRTIO_BALLOON_F_PAGE_POISON
>> --
From: Subbaraya Sundeep
Modelled Ethernet MAC of Smartfusion2 SoC.
Micrel KSZ8051 PHY is present on Emcraft's
SOM kit hence same PHY is emulated.
Signed-off-by: Subbaraya Sundeep
Reviewed-by: Philippe Mathieu-Daudé
Tested-by: Philippe Mathieu-Daudé
---
MAINTAINERS| 2 +
hw/
From: Subbaraya Sundeep
This patch set emulates Ethernet MAC block
present in Microsemi SmartFusion2 SoC.
v6:
Fixed destination address matching logic
Added missing break in emac_write
v5:
As per Philippe comments:
Returned size in receive function
Added link property to pass
From: Subbaraya Sundeep
In addition to simple serial test this patch uses ping
to test the ethernet block modelled in SmartFusion2 SoC.
Signed-off-by: Subbaraya Sundeep
Reviewed-by: Philippe Mathieu-Daudé
Tested-by: Philippe Mathieu-Daudé
---
tests/acceptance/boot_linux_console.py | 15 +
From: Subbaraya Sundeep
With SmartFusion2 Ethernet MAC model in
place this patch adds the same to SoC.
Signed-off-by: Subbaraya Sundeep
Reviewed-by: Philippe Mathieu-Daudé
Tested-by: Philippe Mathieu-Daudé
---
hw/arm/msf2-soc.c | 26 --
include/hw/arm/msf2-soc
Make it easier to copy all the persistent bitmaps of a source image
along with the contents, by adding a boolean flag for use with
qemu-img convert.
See also https://bugzilla.redhat.com/show_bug.cgi?id=1779893
Signed-off-by: Eric Blake
---
docs/tools/qemu-img.rst | 6 ++-
qemu-img.c
Add a new test covering the feature added in the previous patch.
Signed-off-by: Eric Blake
---
tests/qemu-iotests/291 | 143 +
tests/qemu-iotests/291.out | 56 +++
tests/qemu-iotests/group | 1 +
3 files changed, 200 insertions(+)
create
1 - 100 of 150 matches
Mail list logo