Am 08.01.2011 00:27, Anthony Liguori wrote:
> On 01/07/2011 03:03 AM, Jan Kiszka wrote:
>> Am 06.01.2011 20:24, Anthony Liguori wrote:
>>
>>> On 01/06/2011 11:56 AM, Marcelo Tosatti wrote:
>>>
From: Jan Kiszka
QEMU supports only one VM, so there is only one kvm_state per proc
From: Jan Kiszka
If some I/O operation ends up calling qemu_system_reset_request in VCPU
context, we record this and inform the io-thread, but we do not
terminate the VCPU loop. This can lead to fairly unexpected behavior if
the triggering reset operation is supposed to work synchronously.
Fix t
Am 07.01.2011 22:19, Gleb Natapov wrote:
> On Fri, Jan 07, 2011 at 08:33:20PM +0100, Jan Kiszka wrote:
>> Am 07.01.2011 20:10, Gleb Natapov wrote:
>> We are on a good track now. I predict that we will be left with only one
>> or two major additional features in qemu-kvm in a few months from
This patchset adds three new devices, usb-ccid, ccid-card-passthru and
ccid-card-emulated, providing a CCID bus, a simple passthru protocol
implementing card requiring a client, and a standalone emulated card.
It also introduces a new directory libcaccard with CAC card emulation,
CAC is a type of
The passthru ccid card is a device sitting on the usb-ccid bus and
using a chardevice to communicate with a remote device using the
VSCard protocol defined in libcacard/vscard_common.h
Usage docs available in following patch in docs/ccid.txt
Signed-off-by: Alon Levy
---
Makefile.objs
A CCID device is a smart card reader. It is a USB device, defined at [1].
This patch introduces the usb-ccid device that is a ccid bus. Next patches will
introduce two card types to use it, a passthru card and an emulated card.
[1] http://www.usb.org/developers/devclass_docs/DWG_Smart-Card_CCID_R
Add documentation for the usb-ccid device and accompanying two card
devices, ccid-card-emulated and ccid-card-passthru.
---
docs/ccid.txt | 135 +
1 files changed, 135 insertions(+), 0 deletions(-)
create mode 100644 docs/ccid.txt
diff --g
This devices uses libcacard (internal) to emulate a smartcard conforming
to the CAC standard. It attaches to the usb-ccid bus. Usage instructions
(example command lines) are in the following patch in docs/ccid.txt. It
uses libcacard which uses nss, so it can work with both hw cards and
certificates
Public bug reported:
Hello,
My host is Fedora 13. My QEMU version is 0.13.0, I use QEMU with GDB to debug
Linux kernel(Version 2.6.36.2).
I use QEMU like this:"qemu -s -S -kernel build/arch/i386/boot/bzImage -hda
/dev/zero"
When GDB connected with QEMU, and use gdb command print to look big siz
Am 06.01.2011 18:56, Marcelo Tosatti wrote:
> From: Jan Kiszka
>
> It is not used, it is not needed, so let's remove it.
>
Please do not apply this for now. Digging deeper into execution loop
issues, it turned out that we likely do need the return code to clean up
the kvm mess in cpu_exec.
Jan
On Fri, Jan 07, 2011 at 05:50:51PM +, Peter Maydell wrote:
> On 7 January 2011 16:01, Aurelien Jarno wrote:
> > My other concern is about the definition of the individual bits in the
> > flags. I have seen that you have tried to summarize the usage in the
> > patch 6, but the masks and shifts
Signed-off-by: Michael Walle
---
audio/ossaudio.c | 16 +++-
1 files changed, 11 insertions(+), 5 deletions(-)
diff --git a/audio/ossaudio.c b/audio/ossaudio.c
index 42bffae..5a56aa8 100644
--- a/audio/ossaudio.c
+++ b/audio/ossaudio.c
@@ -161,7 +161,7 @@ static int oss_write (SWVo
Signed-off-by: Michael Walle
---
audio/alsaaudio.c | 26 +++---
1 files changed, 19 insertions(+), 7 deletions(-)
diff --git a/audio/alsaaudio.c b/audio/alsaaudio.c
index 0741203..a86aa08 100644
--- a/audio/alsaaudio.c
+++ b/audio/alsaaudio.c
@@ -318,7 +318,7 @@ static int
On Fri, Jan 07, 2011 at 10:52:28PM +0200, Riku Voipio wrote:
> From: Riku Voipio
>
> The following changes since commit 2a704b137f1acfbd972aa6e9f031c5015c7e28cb:
>
> cris: Avoid useless tmp in t_gen_cc_jmp() (2011-01-07 12:50:38 +0100)
>
> are available in the git repository at:
> git://git
** Changed in: qemu
Status: New => Fix Committed
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/673613
Title:
ARM semihosting SYS_GET_CMDLINE does not return arguments
Status in QEMU:
Fix
From: Juha Riihimäki
Add neon helper functions to implement VQSHLU, which is a
signed-to-unsigned version of VQSHL available only as an
immediate form.
Signed-off-by: Juha Riihimäki
Reviewed-by: Aurelien Jarno
Signed-off-by: Peter Maydell
---
target-arm/helpers.h |4 +++
target-arm/n
Fix errors in the decoding of ARM VQSHL/VQSHLU immediate forms,
including using the new VQSHLU helper functions where appropriate.
Reviewed-by: Aurelien Jarno
Signed-off-by: Peter Maydell
---
target-arm/translate.c | 51 +--
1 files changed, 36 inse
This patchset fixes errors in the decoding and implementation of the
immediate forms of the VQSHL/VQSHLU ARM instructions.
Tested in the usual random-instruction-set way. This is the final part
of the maemo-qemu tree commit 03a2445a fixes (the first part being
the already-committed VQSHL-reg patchs
On Sat, 8 Jan 2011, Michael Walle wrote:
> Signed-off-by: Michael Walle
> ---
> audio/ossaudio.c | 16 +++-
> 1 files changed, 11 insertions(+), 5 deletions(-)
>
This misses braces around if statements. (Ditto for alsa)
[..snip..]
--
mailto:av1...@comtv.ru
Signed-off-by: Michael Walle
---
audio/alsaaudio.c | 30 +++---
1 files changed, 23 insertions(+), 7 deletions(-)
diff --git a/audio/alsaaudio.c b/audio/alsaaudio.c
index 0741203..8d77646 100644
--- a/audio/alsaaudio.c
+++ b/audio/alsaaudio.c
@@ -318,7 +318,7 @@ static
Signed-off-by: Michael Walle
---
audio/ossaudio.c | 18 +-
1 files changed, 13 insertions(+), 5 deletions(-)
diff --git a/audio/ossaudio.c b/audio/ossaudio.c
index 42bffae..cfa8f99 100644
--- a/audio/ossaudio.c
+++ b/audio/ossaudio.c
@@ -161,7 +161,7 @@ static int oss_write (SW
This patch set fixes bugs found by cppcheck.
http://sourceforge.net/apps/mediawiki/cppcheck/index.php?title=Main_Page
Blue Swirl (7):
vnc-auth-sasl: fix a memory leak
loader: fix a file descriptor leak
vvfat: fix a file descriptor leak
qemu-io: fix a memory leak
vpc: fix a file descript
Fix a file descriptor leak, reported by cppcheck:
[/src/qemu/hw/loader.c:311]: (error) Resource leak: fd
Signed-off-by: Blue Swirl
---
hw/loader.c |5 +++--
1 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/hw/loader.c b/hw/loader.c
index eb198f6..35d792e 100644
--- a/hw/loader.
Fix a file descriptor leak, reported by cppcheck:
[/src/qemu/block/vpc.c:524]: (error) Resource leak: fd
Signed-off-by: Blue Swirl
---
block/vpc.c | 47 ++-
1 files changed, 30 insertions(+), 17 deletions(-)
diff --git a/block/vpc.c b/block/vpc.c
in
Fix a memory leak reported by cppcheck:
[/src/qemu/ui/vnc-auth-sasl.c:448]: (error) Memory leak: mechname
Signed-off-by: Blue Swirl
---
ui/vnc-auth-sasl.c | 14 --
1 files changed, 8 insertions(+), 6 deletions(-)
diff --git a/ui/vnc-auth-sasl.c b/ui/vnc-auth-sasl.c
index a51ddc8..
Fix a memory leak, reported by cppcheck:
[/src/qemu/qemu-io.c:1135]: (error) Memory leak: ctx
Signed-off-by: Blue Swirl
---
qemu-io.c |4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diff --git a/qemu-io.c b/qemu-io.c
index 65dee13..5b24c5e 100644
--- a/qemu-io.c
+++ b/qemu-io.c
@@
Fix a file descriptor leak, reported by cppcheck:
[/src/qemu/block/vvfat.c:759]: (error) Resource leak: dir
Signed-off-by: Blue Swirl
---
block/vvfat.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/block/vvfat.c b/block/vvfat.c
index 26dd474..fe568fe 100644
--- a/block
Fix a buffer overflow, reported by cppcheck:
[/src/qemu/hw/lan9118.c:849]: (error) Buffer access out-of-bounds: s.eeprom
All eeprom handling code assumes that the size of eeprom is 128.
Signed-off-by: Blue Swirl
---
hw/lan9118.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff
Fix a buffer overflow, reported by cppcheck:
[/src/qemu/hw/ppc405_uc.c:72]: (error) Buffer access out-of-bounds:
bd.bi_s_version
The use of field bi_s_version seems to be a typo, it should be
bi_r_version.
Signed-off-by: Blue Swirl
---
hw/ppc405_uc.c |5 +++--
1 files changed, 3 insertions(
Update not only dbc but also dnad when skipping bytes during the MSGOUT
phase. Previously only dbc was updated which is probably wrong and
could lead to bogus message codes being read.
Signed-off-by: Stefan Hajnoczi
---
I don't know the LSI SCSI code well but it seems odd that only dbc is update
Hi,
I had fixed the loopmount ioctl for linux-user, working correctly for arm,
mips, ppc32 and sh4.
Martin
From: Martin Mohring
In case a chrooted build uses XEN or KVM, a looped mount needs to be done to setup the chroot.
The ioctl for loop mount works correctly for arm, mips, ppc32 and sh4,
On Sat, 8 Jan 2011, Michael Walle wrote:
> Signed-off-by: Michael Walle
> ---
> audio/ossaudio.c | 18 +-
> 1 files changed, 13 insertions(+), 5 deletions(-)
Thanks, applied with minor stylistic changes. (ditto alsaaudio.c)
[..snip..]
--
mailto:av1...@comtv.ru
Error still can be reproducible on patched 2.6.35-24-generic, amd64
architecture on Athlon 64 X2.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/688085
Title:
Guest kernel hang during boot when KVM
33 matches
Mail list logo