I got this morning a new FTBFS in a package that have been always built
successfully in the past, just FYI
https://launchpadlibrarian.net/181879742/buildlog_ubuntu-trusty-armhf.boinc_7.4.0~nightly1~~git20140809%2Br21874~r184~ubuntu14.04.1_FAILEDTOBUILD.txt.gz
--
You received this bug notificatio
Interesting enough the utopic build was successful!
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1350435
Title:
tcg.c:1693: tcg fatal error
Status in launchpad-buildd:
Triaged
Status in QEMU:
On 08/08/14 21:48, Artyom Tarasenko wrote:
Implement Short Floating-Point Store Instructions as described
in the chapter 13.5.2 of UltraSPARC-IIi User's Manual.
Particularly this instructions are used by NetBSD 4.0.1+ /sparc64
Signed-off-by: Artyom Tarasenko
---
With this patch applied on to
Got fixed before release v1.3.0 in this commit:
commit 5c61afec86e5b2597b19b4657edc404fd76e6eb9
Author: Jan Kiszka
Date: Sun Nov 4 09:16:55 2012 +0100
kvmvapic: Fix TB invalidation after instruction patching
Since 0b57e287, cpu_memory_rw_debug already triggers a TB invalidation.
On 9 August 2014 07:15, Erik de Castro Lopo <1042...@bugs.launchpad.net> wrote:
> Unfortunately the test case @pittit submitted is far harder to support
> than the original test case. In this case the timer_create() syscall
> gets passed pointers to functions and data in the target's address space
From: Jan Kiszka
IA-32 SDM, Figure 10-14: Bits 27:0 are reserved as 1.
Fixes Jailhouse hypervisor start with in-kernel irqchips off.
Signed-off-by: Jan Kiszka
---
hw/intc/apic.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/hw/intc/apic.c b/hw/intc/apic.c
index ef19e55..
This structure is going to be shared by VFIOPCIDevice and
VFIOPlatformDevice. VFIOBAR includes it.
vfio_eoi becomes an ops of VFIODevice specialized by parent device.
This makes possible to transform vfio_bar_write/read into generic
vfio_region_write/read that will be used by VFIOPlatformDevice to
This RFC series aims at enabling KVM platform device passthrough.
It implements a VFIO platform device, derived from VFIO PCI device.
The VFIO platform device uses the host VFIO platform driver which must
be bound to the assigned device prior to the QEMU system start.
- the guest can directly acc
This prepares for the introduction of VFIOPlatformDevice
Signed-off-by: Eric Auger
---
hw/vfio/pci.c | 209 +-
1 file changed, 105 insertions(+), 104 deletions(-)
diff --git a/hw/vfio/pci.c b/hw/vfio/pci.c
index 188fdd2..c2cdd73 100644
---
From: Kim Phillips
This is done in preparation for the addition of VFIO platform
device support.
Signed-off-by: Kim Phillips
---
LICENSE | 2 +-
MAINTAINERS | 2 +-
hw/Makefile.objs | 1 +
hw/misc/Makefile.objs| 1 -
hw/
Introduce the VFIODevice struct that is going to be shared by
VFIOPCIDevice and VFIOPlatformDevice.
Additional fields will be added there later on for review
convenience.
the group's device_list becomes a list of VFIODevice
This obliges to rework the reset_handler which becomes generic and
calls
vfio_get_device now takes a VFIODevice as argument. The function is split
into 4 functional parts: dev_info query, device check, region populate
and interrupt populate. the last 3 are specialized by parent device and
are added into DeviceOps.
3 new fields are introduced in VFIODevice to store dev_
A new common module is created. It implements all functions
that have no device specificity (PCI, Platform).
This patch only consists in move (no functional changes)
Signed-off-by: Kim Phillips
Signed-off-by: Eric Auger
---
v4 -> v5:
- integrate "sPAPR/IOMMU: Fix TCE entry permission"
- VFIOd
Generates the device node of VFIO devices, if any are invoked in
-device option. In case VFIO devices require more complex node
generation, they can be handled before.
Signed-off-by: Eric Auger
---
hw/arm/dyn_sysbus_devtree.c | 138
1 file changed, 13
Minimal VFIO platform implementation supporting
- register space user mapping,
- IRQ assignment based on eventfds handled on qemu side.
irqfd kernel acceleration comes in a subsequent patch.
Signed-off-by: Kim Phillips
Signed-off-by: Eric Auger
---
v4 -> v5:
- vfio-plaform.h included first
-
set kvm_irqfds_allowed
Signed-off-by: Eric Auger
---
hw/intc/arm_gic_kvm.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/hw/intc/arm_gic_kvm.c b/hw/intc/arm_gic_kvm.c
index 5038885..08b7bf9 100644
--- a/hw/intc/arm_gic_kvm.c
+++ b/hw/intc/arm_gic_kvm.c
@@ -576,6 +576,8 @@ static void kvm
This patch aims at optimizing IRQ handling using irqfd framework.
Instead of handling the eventfds on user-side they are handled on
kernel side using
- the KVM irqfd framework,
- the VFIO driver virqfd framework.
the virtual IRQ completion is trapped at interrupt controller
instead of on guest 1s
There were a number of bugs in the conversion of the sigevent
argument to timer_create from target to host format:
* signal number not converted from target to host
* thread ID not copied across
* sigev_value not copied across
* we never unlocked the struct when we were done
Between them, thes
Patch which seems to at least make the test case work (tested with
i386-on-i386 linux-user): http://patchwork.ozlabs.org/patch/378769/
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1042388
Title:
q
And when I retried the failed build it succeeded but a segmentation fault (core
dumped) is in the logs
https://code.launchpad.net/~costamagnagianfranco/+archive/ubuntu/firefox/+build/6254532
qemu: uncaught target signal 11 (Segmentation fault) - core dumped
Segmentation fault (core dumped)
Segment
On Aug 9, 2014 10:28 AM, wrote:
>
> Send Qemu-devel mailing list submissions to
> qemu-devel@nongnu.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.nongnu.org/mailman/listinfo/qemu-devel
> or, via email, send a message with subject or body 'help' t
On Aug 9, 2014 10:28 AM, wrote:
>
> Send Qemu-devel mailing list submissions to
> qemu-devel@nongnu.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.nongnu.orgl/mailman/listinfo/qemu-devel
> or, via email, send a message with subject or body 'help'
Hi,
Hope i'm doing this right.
There appears to be typo in OHCI with isochronous transfers
resulting in isoch. transfer descriptor state never being written back.
The'put_words' function is in a OR statement hence it is never called.
Signed-off-by: Jack Un
---
hw/usb/hcd-ohci.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/hw/usb/hcd-ohci.c b/hw/usb/hcd-ohci.c
index 13afdf5..cacf7b0 100644
--- a/hw/usb/hcd-ohci.c
+++ b/hw/usb/hcd-ohci.c
@@ -619,8 +619,8 @@ static inline int ohci_put_td(OHCIState *ohc
Public bug reported:
% gcc --version
gcc (GCC) 4.9.1
latest development version on git
xen-hvm.c: In function ‘xen_hvm_init’:
xen-hvm.c:1008:41: error: ‘HVM_PARAM_IOREQ_PFN’ undeclared (first use in this
function)
xc_get_hvm_param(xen_xc, xen_domid, HVM_PARAM_IOREQ_PFN, &ioreq_pfn);
** Af
Hi,
> Subject: [Qemu-devel] [PATCH] Fix OHCI ISO TD state never being written back.
>
> Signed-off-by: Jack Un
> ---
> hw/usb/hcd-ohci.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/hw/usb/hcd-ohci.c b/hw/usb/hcd-ohci.c
> index 13afdf5..cacf7b0 100644
> --- a/hw
Hi Kevin, Paolo, Stefan and all,
On Wed, 6 Aug 2014 10:48:55 +0200
Kevin Wolf wrote:
> Am 06.08.2014 um 07:33 hat Ming Lei geschrieben:
>
> Anyhow, the coroutine version of your benchmark is buggy, it leaks all
> coroutines instead of exiting them, so it can't make any use of the
> coroutine
Hi,
> Subject: [Qemu-devel] [PATCH v3 1/2] contrib: add ivshmem client and server
>
> When using ivshmem devices, notifications between guests can be sent as
> interrupts using a ivshmem-server (typical use described in documentation).
> The client is provided as a debug tool.
>
> Signed-off-by:
28 matches
Mail list logo