Public bug reported:
qemu.git commit: 6cc7686696f73ae87cadef4450776a488b0e0c8b
kvm.git commit: 7f914d61cd2156e34a7852462bb4932621f33a34
It will costs about 180 seconds to booting up a rhel6 guest. But when I
use qemu-kvm.git with commit a040d28b, the rhel6 guest can boot up in
about 50 seconds.
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/855630
I decided to give it, its own bug.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/739785
Title:
qemu-i386 user mode on ARMv5 host fails (b
Signals the creation of a new vCPU (CPUState structure).
Signed-off-by: Lluís Vilanova
---
cpus-user.c |2 ++
cpus.c |2 ++
trace-events |7 +++
3 files changed, 11 insertions(+), 0 deletions(-)
diff --git a/cpus-user.c b/cpus-user.c
index c1e5e58..5db48d2 100644
--- a/cp
Implementation with 'CONFIG_USER_ONLY' is moved into new file 'cpus-user.c'.
Signed-off-by: Lluís Vilanova
---
Makefile.objs |1 +
cpus-user.c |8
qemu-common.h |4
3 files changed, 9 insertions(+), 4 deletions(-)
create mode 100644 cpus-user.c
diff --git a/Makefile
Signals the reset of the state a vCPU (CPUState structure).
Signed-off-by: Lluís Vilanova
---
target-arm/helper.c |3 +++
target-cris/translate.c |3 +++
target-i386/helper.c |3 +++
target-lm32/helper.c |3 +++
target-m68k/helper.c |
Public bug reported:
qemu.git commit: 6cc7686696f73ae87cadef4450776a488b0e0c8b
kvm.git commit: 7f914d61cd2156e34a7852462bb4932621f33a34
64-bit Windows guest cannot boot up, but 32-bit windows guest can boot
up successfully. For Win7, it will show blue scream of death when
booting up. For Windows
Spice client is required to connect to the migration target before/as migration
starts. Previously, it connected upon migration completion, however, the ticket
was set in the beginning, thus when migration time was >
ticket_expiration_time, spice failed to connect to the target.
Since the migratio
- call spice_server_migrate_(start|end|connect).
- register spice_migrate_connect completion callback
Signed-off-by: Yonit Halperin
---
ui/spice-core.c | 56 ++-
1 files changed, 55 insertions(+), 1 deletions(-)
diff --git a/ui/spice-core.c
Adds a 'trace_${name}_enabled' preprocessor define for each tracing event in
"trace.h".
This lets the user conditionally compile code with a relatively high execution
cost that is only necessary when producing the tracing information for an event
that is enabled.
Note that events using this defin
semi-seamless migration RHBZ 738262
Signed-off-by: Yonit Halperin
---
NEWS |4
configure.ac |2 +-
spice/enums.h|2 ++
spice/protocol.h |6 +-
4 files changed, 12 insertions(+), 2 deletions(-)
diff --git a/NEWS b/NEWS
index f238abc..bb11ed2 100644
--
sorry, the right command to reproduce is 'qemu-system-x86_64 -m 1024
-smp 2 -hda /root/rhel6.img'. I missed the '-hda' in the bug
description.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/855633
Tit
We will add a qemu call to spice_server_migrate_start when migration starts.
For now, it does nothing, but we may need this notification in the future.
Signed-off-by: Yonit Halperin
---
server/reds.c |8 +---
1 files changed, 1 insertions(+), 7 deletions(-)
diff --git a/server/reds.c b/
---
audio/audio.c | 12
audio/audio_int.h |1 +
2 files changed, 13 insertions(+), 0 deletions(-)
diff --git a/audio/audio.c b/audio/audio.c
index 5649075..c759c1f 100644
--- a/audio/audio.c
+++ b/audio/audio.c
@@ -2050,17 +2050,29 @@ void AUD_del_capture (CaptureVoiceOut *
Hi,
The qemu volume control experience could be improved. Without mixemu,
the volume control has no effect. A volume applet will just feel
broken (except in some cases where software volume is applied on guest
side, with HDA/Windows7 for example).
And a few other problems:
- the guest should h
Unfortunately, pa_simple is a very limited API which doesn't let
us retrieve the associated pa_stream. It is needed to control the
volume of the stream.
---
audio/paaudio.c | 356 +--
1 files changed, 318 insertions(+), 38 deletions(-)
diff --g
It doesn't compile. The interesting bits for volume control are going
to be rewritten.
---
hw/ac97.c | 121 -
1 files changed, 0 insertions(+), 121 deletions(-)
diff --git a/hw/ac97.c b/hw/ac97.c
index 541d9a4..4d4a658 100644
--- a/hw/a
- we need the QEMU_HDA_AMP_CAPS for Spice to handle the volume of HDA
- without MIXEMU, volume control on the guest just feels wrong because
it has no effect (when it is not applied by the guest)
- after all, it's the role of qemu to emulate devices, and volume
effect shouldn't be excluded
--
Signed-off-by: Yonit Halperin
---
NEWS |7 +++
configure.ac |2 +-
server/spice-server.syms |4
server/spice.h |2 +-
4 files changed, 13 insertions(+), 2 deletions(-)
diff --git a/NEWS b/NEWS
index ee6ceec..18168cb 100644
--- a
So we can easily fit it into smaller int.
We can just >>16 to fit it into a 16bits volume range for example.
---
audio/audio.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/audio/audio.c b/audio/audio.c
index f830bb2..33b6c23 100644
--- a/audio/audio.c
+++ b/audio/au
(1) send SPICE_MSG_MAIN_MIGRATE_BEGIN upon spice_server_migrate_connect
(2) wait for SPICE_MSGC_MAIN_MIGRATE_(CONNECTED|CONNECT_ERROR), or a timeout,
in order
to complete client_migrate_info monitor command
Signed-off-by: Yonit Halperin
---
common/messages.h |2 +
server/reds.c | 1
RHBZ 737921
Spice client is required to connect to the migration target before/as migration
starts. Since after migration starts, the target qemu is blocked and cannot
accept new spice client
we trigger the connection to the target upon client_migrate_info command.
client_migrate_info completion c
From: Jan Kiszka
Sent: Tue 9/20/2011 3:41 PM
To: Alan Amaral
Cc: Richard Henderson; qemu-devel@nongnu.org
Subject: Re: pci_change_irq_level is broken...
> On 2011-09-20 21:19, Alan Amaral wrote:
> > QEMU emulator version 0.14.50, Copyright (c) 2003-2008 Fabrice Bellard
>
> (That's an ambiti
same as the previous version with the following changes:
(1) I'm sending only the spice-server patches. I will send the client fixes
later.
(and then I will move the "Release 0.8.3" patch to the head).
(2) migration interface changes:
* spice_server_migrate_connect was added.
It is
On 2011-09-21 18:26, Alan Amaral wrote:
>
>
>
>
> From: Jan Kiszka
> Sent: Tue 9/20/2011 3:41 PM
> To: Alan Amaral
> Cc: Richard Henderson; qemu-devel@nongnu.org
> Subject: Re: pci_change_irq_level is broken...
>
>> On 2011-09-20 21:19, Alan Amaral wrote:
>>> QEMU emulator version 0.14.50, C
Ok. Cases to the contrary notwithstanding, what I'm seeing is the size of the
irq_count array
is 4 and the code is clearly accessing entry 4 and beyond. We are using Xen
(sorry if I didn't
mention that earlier).
#0 pci_change_irq_level (pci_dev=0x1c3a730, irq_num=4, change=0)
at
/home/aa
Signed-off-by: Yonit Halperin
---
server/reds.c | 56 +---
1 files changed, 33 insertions(+), 23 deletions(-)
diff --git a/server/reds.c b/server/reds.c
index e088b08..bea0eb0 100644
--- a/server/reds.c
+++ b/server/reds.c
@@ -2078,6 +2078,3
semi-seamless migration details:
migration source side
-
(1) spice_server_migrate_connect (*): tell client to link
to the target side - send SPICE_MSG_MAIN_MIGRATE_BEGIN.
This should be called upon client_migrate_info cmd.
client_migrate_info is asynchronous.
(2) Co
Excellent! Thanks...
Alan
From: Jan KiszkaSent: Wed 9/21/2011 12:33 PMTo: Alan AmaralCc: qemu-devel@nongnu.org; r...@twiddle.netSubject: Re: pci_change_irq_level is broken...
On 2011-09-21 18:26, Alan Amaral wrote:
>
>
>
>
> From: Jan Kiszka
> Sent: Tue 9/20/2011 3:41 PM
> To: Alan
(1) not sending anything to the client till we recieve SPICE_MSGC_MIGRATE_END
(2) start a new migration (handle client_migrate_info) only after
SPICE_MSGC_MIGRATE_END
from the previous migration has been received
(3) use the correct ticket
Signed-off-by: Yonit Halperin
---
server/reds.c |
It's a case by case, which will be added appropriately.
---
hw/ac97.c |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/hw/ac97.c b/hw/ac97.c
index 4d4a658..ba94835 100644
--- a/hw/ac97.c
+++ b/hw/ac97.c
@@ -114,7 +114,6 @@ enum {
#define EACS_VRA 1
#define EACS_VRM 8
-#
Signed-off-by: Yonit Halperin
---
server/reds.c | 68 +++-
1 files changed, 42 insertions(+), 26 deletions(-)
diff --git a/server/reds.c b/server/reds.c
index bea0eb0..e7388a0 100644
--- a/server/reds.c
+++ b/server/reds.c
@@ -2612,12 +2612,
Signed-off-by: Yonit Halperin
---
server/reds.c | 18 +-
1 files changed, 13 insertions(+), 5 deletions(-)
diff --git a/server/reds.c b/server/reds.c
index 76aa0ed..54c06d1 100644
--- a/server/reds.c
+++ b/server/reds.c
@@ -283,6 +283,7 @@ typedef struct RedsState {
int m
---
audio/audio.c |9 +++--
audio/audio_int.h |5 +
audio/audio_template.h |2 ++
3 files changed, 14 insertions(+), 2 deletions(-)
diff --git a/audio/audio.c b/audio/audio.c
index c759c1f..f830bb2 100644
--- a/audio/audio.c
+++ b/audio/audio.c
@@ -954,7 +954,9 @
---
audio/spiceaudio.c | 43 +++
1 files changed, 43 insertions(+), 0 deletions(-)
diff --git a/audio/spiceaudio.c b/audio/spiceaudio.c
index f972110..2df0957 100644
--- a/audio/spiceaudio.c
+++ b/audio/spiceaudio.c
@@ -202,7 +202,28 @@ static int line_ou
---
configure |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/configure b/configure
index c3044c7..4278eb1 100755
--- a/configure
+++ b/configure
@@ -1682,9 +1682,9 @@ for drv in $audio_drv_list; do
;;
pa)
-audio_drv_probe $drv pulse/simple.h "-lpulse-
Signed-off-by: Yonit Halperin
---
spice.proto |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/spice.proto b/spice.proto
index d5b954e..235ec95 100644
--- a/spice.proto
+++ b/spice.proto
@@ -219,6 +219,8 @@ channel MainChannel : BaseChannel {
uint8 *cert_subject
Signed-off-by: Yonit Halperin
---
server/reds.c | 86 +
1 files changed, 68 insertions(+), 18 deletions(-)
diff --git a/server/reds.c b/server/reds.c
index 845b0ee..e088b08 100644
--- a/server/reds.c
+++ b/server/reds.c
@@ -275,6 +275,7
---
hw/ac97.c | 79 +
1 files changed, 79 insertions(+), 0 deletions(-)
diff --git a/hw/ac97.c b/hw/ac97.c
index ba94835..4a7c4ed 100644
--- a/hw/ac97.c
+++ b/hw/ac97.c
@@ -431,6 +431,63 @@ static void reset_voices (AC97LinkState *s, u
Signed-off-by: Yonit Halperin
---
server/reds.c | 72 ++---
1 files changed, 43 insertions(+), 29 deletions(-)
diff --git a/server/reds.c b/server/reds.c
index ca4e1d1..6d2269c 100644
--- a/server/reds.c
+++ b/server/reds.c
@@ -761,6 +761,7
Signed-off-by: Yonit Halperin
---
server/reds.c | 29 +
server/reds.h |4
2 files changed, 33 insertions(+), 0 deletions(-)
diff --git a/server/reds.c b/server/reds.c
index 9a983f8..99d52f9 100644
--- a/server/reds.c
+++ b/server/reds.c
@@ -73,6 +73,7 @@ s
Signed-off-by: Yonit Halperin
---
configure.ac |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/configure.ac b/configure.ac
index 3a86515..e169f36 100644
--- a/configure.ac
+++ b/configure.ac
@@ -126,7 +126,7 @@ fi
dnl ===
---
audio/paaudio.c | 96 ---
1 files changed, 91 insertions(+), 5 deletions(-)
diff --git a/audio/paaudio.c b/audio/paaudio.c
index beed434..7ddc16d 100644
--- a/audio/paaudio.c
+++ b/audio/paaudio.c
@@ -664,15 +664,100 @@ static void qpa_fin
On 09/21/2011 08:50 AM, Lluís Vilanova wrote:
> +void *complex = NULL;
> +if (!size && !allow_zero_malloc()) {
> +abort();
> +}
> +ptr = oom_check(malloc(size ? size : 1));
> +#if trace_qemu_malloc_enabled
> +/* some complex computations to pr
Richard Henderson writes:
> On 09/21/2011 08:50 AM, Lluís Vilanova wrote:
>> +void *complex = NULL;
>> +if (!size && !allow_zero_malloc()) {
>> +abort();
>> +}
>> +ptr = oom_check(malloc(size ? size : 1));
>> +#if trace_qemu_malloc_enabled
>> +
Adds a 'trace_${name}_enabled' preprocessor define for each tracing event in
"trace.h".
This lets the user conditionally compile code with a relatively high execution
cost that is only necessary when producing the tracing information for an event
that is enabled.
Note that events using this defin
This plus [1] reanimates -M isapc for me again.
Jan Kiszka (4):
pc: Unbreak ROM mapping for ISA machine
pc: Disable HPET for ISA machine
vga: Unbreak ISA support
cirrus: Unbreak ISA support
hw/cirrus_vga.c |4 ++--
hw/pc.c |8
hw/pc.h |2 +-
hw/pc_pii
From: Jan Kiszka
Do not try to map against the PCI bar in the ISA version of the device.
Signed-off-by: Jan Kiszka
---
hw/cirrus_vga.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/hw/cirrus_vga.c b/hw/cirrus_vga.c
index ec7ea82..c7e365b 100644
--- a/hw/cirrus_vga
From: Jan Kiszka
We need to initialize legacy_address_space during ISA VGA setup so that
the chain-4 alias can be registered properly.
Signed-off-by: Jan Kiszka
---
hw/vga-isa.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/hw/vga-isa.c b/hw/vga-isa.c
index 0d19901..
From: Jan Kiszka
This is based on the original fix by Hervé Poussineau: pc_memory_init
actually takes a memory region for mapping BIOS and extension ROMs. That
equals the PCI memory region if PCI is available, but must be system
memory in the ISA case.
Signed-off-by: Jan Kiszka
---
hw/pc.c
From: Jan Kiszka
There was no HPET on ISA boxes.
Signed-off-by: Jan Kiszka
---
hw/pc_piix.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/hw/pc_piix.c b/hw/pc_piix.c
index 52939f5..ec7da6d 100644
--- a/hw/pc_piix.c
+++ b/hw/pc_piix.c
@@ -157,6 +157,7 @@ static void p
Need to check that guest slot/device number is not > 31 or walk off
the devfn table when checking if a devfn is available or not in a guest.
before this fix, passing in an addr=abc or addr=34,
can crash qemu, sometimes fail gracefully if data past end
of devfn table fails the availability test.
On Wed, 2011-09-21 at 15:02 +0200, erik.r...@rdsoftware.de wrote:
> Hi all,
>
> I'm searching for a switch to enable hyperthreading for my Windows XP
> Guest. Currently I only get 2 cores available in the taskmanager but listed
> 4 or 8 (depending on the smp-switch).
>
> After having read that XP
[Originally sent to qemu-kvm list, but I was redirected here]
The Capabilities Pointer is NULL, so this bit shouldn't be set. The state of
this bit doesn't appear to change any behavior on Linux/Windows versions we've
tested, but it does cause Windows' PCI/PCI Express Compliance Test to balk.
I h
I am studying QEMU, I would like to know that Is QEMU TB lookup based on
guest system virtual address or physical address ?
Thanks
Xin
I am new to QEMU, can anyone please tell me where the TB chaining code is in
QEMU ?
Thanks
Xin
Hi,
I wanted to get the source for this kernel which is provided with the ARM disk
image tar ball. I wanted to build this kernel with some more modules, can I get
information how this kernel was built exactly.
Thanks,
Regards,
Gauresh Rane
Consider this a friendly reminder that we're only three weeks away from the soft
feature freeze for 1.0. I've written a wiki page about my expectations for the
soft feature freeze. It's inlined here for easier commenting.
== What is the soft feature freeze? ==
The soft feature freeze is the
> I am studying QEMU, I would like to know that Is QEMU TB lookup based on
> guest system virtual address or physical address ?
QEMU lookups TB in two steps:
tb_find_fast (exec.c):
It'll try to use guest virtual address (pc) to index tb_jmp_cache.
tb = env->tb_jmp_cache[tb_jmp_cache
On 09/22/2011 07:05 AM, Xin Tong wrote:
I am new to QEMU, can anyone please tell me where the TB chaining code is in
QEMU ?
Actually, TB chaining was implemented via TB list. You might want to look at
Exec.c
In struct TranslationBlock, the following data are used to directly call
another TB
On 09/19/2011 03:04 PM, Michael S. Tsirkin wrote:
On Mon, Sep 19, 2011 at 12:22:02PM -0400, Stefan Berger wrote:
On 09/17/2011 03:28 PM, Michael S. Tsirkin wrote:
On Fri, Sep 16, 2011 at 12:46:40PM -0400, Stefan Berger wrote:
The checksuming I think makes sense if encryption is being added so
ubuntu.img is a disk image which has been installed OS.
(1) Create a raw image with the same size of ubuntu.img
qemu-img create -f raw test.raw 8G
(2) Create a add-cow image which will store dirty bitmap
qemu-img create -f add-cow test.add-cow -o
backing_file=ubuntu.img,image_file=test.raw
(3) Run
> /* list of TBs jumping to this one. This is a circular list using
> the two least significant bits of the pointers to tell what is
> the next pointer: 0 = jmp_next[0], 1 = jmp_next[1], 2 =
> jmp_first */
> struct TranslationBlock *jmp_next[2];
> struct Trans
This is not one bug, you didn't enable kvm accelerator when you start up VM.
On Wed, Sep 21, 2011 at 11:45 PM, Yongjie Ren <855...@bugs.launchpad.net> wrote:
> sorry, the right command to reproduce is 'qemu-system-x86_64 -m 1024
> -smp 2 -hda /root/rhel6.img'. I missed the '-hda' in the bug
> desc
> I am new to QEMU, can anyone please tell me where the TB chaining code is in
> QEMU ?
struct TranslationBlock has fields used to to block chaining. You also
need to look into it.
cpu_exec (cpu-exec.c)
It's the main execution loop where the interrupt/exception is handled
, and translared TB
On 09/22/2011 09:58 AM, 陳韋任 wrote:
/* list of TBs jumping to this one. This is a circular list using
the two least significant bits of the pointers to tell what is
the next pointer: 0 = jmp_next[0], 1 = jmp_next[1], 2 =
jmp_first */
struct TranslationBlock
> Well, the comment is from source code. I don't catch why you think "list
> of TBS jumping to this one" is wrong.
> My understand is that TB chain be used forreduce switch from the
> translation
> cache to the guest code. It will be a circular list if there is no interrupt
> or exceptional.
On Wed, Sep 7, 2011 at 21:02, Gerd Hoffmann wrote:
> Initialize glib threads unconditionally in main() instead
> of using g_thread_get_initialized in the 9p code.
>
> Fixes a build failure on RHEL-5, which ships glib 2.12.
> g_thread_get_initialized was added in 2.20.
>
> Signed-off-by: Gerd Hoffm
On Wed, Sep 21, 2011 at 09:53:22AM +0200, Alexander Graf wrote:
>
> On 21.09.2011, at 08:35, David Gibson wrote:
>
> > Sufficiently recent PAPR specifications define properties "ibm,vmx"
> > and "ibm,dfp" on the CPU node which advertise whether the VMX vector
> > extensions (or the later VSX vers
It looks like the critical difference in the working vs non-working case
is the host interrupts on the 82576. When working, both the host and
guest view of the device is using MSI-X interrupts. When not working,
the host is using MSI but the guest still thinks it's using MSI-X.
Those are not comp
The Buildbot has detected a new failure on builder xen_x86_64_debian_6_0 while
building qemu.
Full details are available at:
http://buildbot.b1-systems.de/qemu/builders/xen_x86_64_debian_6_0/builds/38
Buildbot URL: http://buildbot.b1-systems.de/qemu/
Buildslave for this Build: yuzuki
Build Rea
Tested, it is compatible with checkpatch.pl and can work well.
No need to use pthread directly, we have proper abstractions for
identity checking.
Signed-off-by: Jan Kiszka
---
ui/spice-core.c |8
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/ui/spice-core.c b/ui
Hi,
I need to share some file from the host OS to guest OS ..?
when ever Vm boots up it looks for the file in some directory , If I do some
modification to the file host OS the guest (VM) also should can access that
..?
how to make this ..?
regards
Bala
On Tue, Sep 13, 2011 at 11:57 AM, bala su
On Wed, Sep 21, 2011 at 09:44:37PM -0400, Stefan Berger wrote:
> On 09/19/2011 03:04 PM, Michael S. Tsirkin wrote:
> >On Mon, Sep 19, 2011 at 12:22:02PM -0400, Stefan Berger wrote:
> >>On 09/17/2011 03:28 PM, Michael S. Tsirkin wrote:
> >>>On Fri, Sep 16, 2011 at 12:46:40PM -0400, Stefan Berger wro
On Wednesday, September 21, 2011 10:50:04 AM Kevin Wolf wrote:
> > My build bot could build anything the project feels would benefit from
> > regular builds on OpenBSD.
>
> Sounds great. Who is the one to set this up? Daniel or yourself? This is
> the branch that I would like to see built on Open
101 - 174 of 174 matches
Mail list logo