Signed-off-by: Igor Mammedov
---
hw/acpi/cpu_hotplug_acpi_table.c | 23 +++
hw/i386/acpi-build.c | 5 +++--
hw/i386/acpi-dsdt-cpu-hotplug.dsl | 13 -
include/hw/acpi/cpu_hotplug.h | 2 ++
4 files changed, 28 insertions(+), 15 deletions(-)
diff
Signed-off-by: Igor Mammedov
---
hw/acpi/memory_hotplug_acpi_table.c | 15 +++
hw/i386/acpi-dsdt-mem-hotplug.dsl | 10 --
2 files changed, 15 insertions(+), 10 deletions(-)
diff --git a/hw/acpi/memory_hotplug_acpi_table.c
b/hw/acpi/memory_hotplug_acpi_table.c
index 5289014
Signed-off-by: Igor Mammedov
---
hw/acpi/Makefile.objs | 2 +-
hw/acpi/memory_hotplug_acpi_table.c | 30 ++
hw/i386/acpi-build.c| 3 +++
include/hw/acpi/memory_hotplug.h| 4
4 files changed, 38 insertions(+), 1 deletion(-)
cre
Signed-off-by: Igor Mammedov
---
hw/acpi/Makefile.objs | 2 +-
hw/acpi/cpu_hotplug_acpi_table.c | 28
hw/i386/acpi-build.c | 3 ++-
hw/i386/acpi-dsdt-cpu-hotplug.dsl | 4
include/hw/acpi/cpu_hotplug.h | 5 +
5 files changed,
Signed-off-by: Igor Mammedov
---
hw/acpi/memory_hotplug_acpi_table.c | 60 +
hw/i386/acpi-dsdt-mem-hotplug.dsl | 27 +
2 files changed, 61 insertions(+), 26 deletions(-)
diff --git a/hw/acpi/memory_hotplug_acpi_table.c
b/hw/acpi/memory_hotpl
Signed-off-by: Igor Mammedov
---
hw/acpi/memory_hotplug_acpi_table.c | 13 +
hw/i386/acpi-dsdt-mem-hotplug.dsl | 8
2 files changed, 13 insertions(+), 8 deletions(-)
diff --git a/hw/acpi/memory_hotplug_acpi_table.c
b/hw/acpi/memory_hotplug_acpi_table.c
index 4edf680..c2b
Signed-off-by: Igor Mammedov
---
hw/acpi/memory_hotplug_acpi_table.c | 2 ++
hw/i386/acpi-dsdt-mem-hotplug.dsl | 3 +--
2 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/hw/acpi/memory_hotplug_acpi_table.c
b/hw/acpi/memory_hotplug_acpi_table.c
index a21ef6f..c2bd928 100644
--- a/h
Signed-off-by: Igor Mammedov
---
hw/acpi/memory_hotplug_acpi_table.c | 92 +
hw/i386/acpi-dsdt-mem-hotplug.dsl | 72 -
2 files changed, 92 insertions(+), 72 deletions(-)
diff --git a/hw/acpi/memory_hotplug_acpi_table.c
b/hw/acpi/
Signed-off-by: Igor Mammedov
---
hw/acpi/memory_hotplug_acpi_table.c | 14 ++
hw/i386/acpi-dsdt-mem-hotplug.dsl | 9 -
2 files changed, 14 insertions(+), 9 deletions(-)
diff --git a/hw/acpi/memory_hotplug_acpi_table.c
b/hw/acpi/memory_hotplug_acpi_table.c
index 07d78f0..5
print ASL difference if there is any when
executing 'make V=1 check'.
Use 'DIFF' environment variable to determine
which diff utility to use and if it's not set
notify user by printing warning that DIFF is
not set if run in verbose mode and there is
difference in ASL.
Signed-off-by: Igor Mammedov
Signed-off-by: Igor Mammedov
---
v3:
- drop ASL comment
- s/ctrl_dev/mem_ctrl_dev/
- move locals 'zero', 'slots_nr' inside if block
v2:
- add parentheses around ifctx block
Suggested-by: Marcel Apfelbaum
---
hw/acpi/memory_hotplug_acpi_table.c | 14 ++
hw/i386/acpi-dsdt-mem-ho
Changelog:
v1->v2:
- rebase on top of PCI tree skipping AML API patches
as they are already applied there
- drop a_ prefix for AML variables
- use DIFF env. var. to specify diff utility to show ASL difference
- build ISA device with a function pre device type
at expenc
qemu-img version is 1.5.3. I also use newer version to do the
conversion, it has the same result.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1399191
Title:
Large VHDX image size
Status in QEMU:
We have encountered the same problem.
We have a 1.4 GB size vmdk image and after converting it to vhdx, its size is
62GB. But qemu-img info show the size is 2.9 G.
===
$ qemu-img info dd_test.vmdk
image: dd_test.vmdk
file format: vmdk
virtual size: 250G (268435456000 bytes)
disk size: 1.4
This will be used in future to start Hyper-V SynIC timer
in several places by one logic in one function.
Changes v2:
* drop stimer->count == 0 check inside stimer_start()
* comment stimer_start() assumptions
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
CC: Gleb Natapov
CC: Paolo Bon
During testing of Windows 2012R2 guest migration with
Hyper-V SynIC timers enabled we found several bugs
which lead to restoring guest in a hung state.
This patch series provides several fixes to make the
migration of guest with Hyper-V SynIC timers enabled
succeed.
The series applies on top of
'
Split stimer_expiration() into two parts - timer expiration message
sending and timer restart/cleanup based on timer state(config).
This also fixes a bug where a one-shot timer message whose delivery
failed once would get lost for good.
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
CC
QEMU zero-inits Hyper-V SynIC vectors. We should allow that,
and don't reject zero values if set by the host.
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
CC: Gleb Natapov
CC: Paolo Bonzini
CC: Roman Kagan
CC: Denis V. Lunev
CC: qemu-devel@nongnu.org
---
arch/x86/kvm/hyperv.c | 7
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
CC: Gleb Natapov
CC: Paolo Bonzini
CC: Roman Kagan
CC: Denis V. Lunev
CC: qemu-devel@nongnu.org
---
arch/x86/kvm/hyperv.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/kvm/hyperv.c b/arch/x86/kvm/hyperv.c
The function stimer_stop() is called in one place
so remove the function and replace it's call by function
content.
Signed-off-by: Andrey Smetanin
Reviewed-by: Roman Kagan
CC: Gleb Natapov
CC: Paolo Bonzini
CC: Roman Kagan
CC: Denis V. Lunev
CC: qemu-devel@nongnu.org
---
arch/x86/kvm/hyperv
Consolidate updating the Hyper-V SynIC timers in a
single place: on guest entry in processing KVM_REQ_HV_STIMER
request. This simplifies the overall logic, and makes sure
the most current state of msrs and guest clock is used for
arming the timers (to achieve that, KVM_REQ_HV_STIMER
has to be proc
Hypervisor Function Specification(HFS) doesn't require
to disable SynIC timer at timer config write if timer->count = 0.
So drop this check, this allow to load timers MSR's
during migration restore, because config are set before count
in QEMU side.
Also fix condition according to HFS doc(15.3.1):
On Mon, Dec 28, 2015 at 10:39:04AM +0800, Xiao Guangrong wrote:
>
> Hi Michael, Paolo,
>
> Now it is the time to return to the challenge that how to reserve guest
> physical region internally used by ACPI.
>
> Igor suggested that:
> | An alternative place to allocate reserve from could be high m
BTW, I send the v2 version of this patch, the changelog of v2 is:
ensure the value writen into register of pci config space is always
little endian, using cpu_to_le32().
So, the actual change by v2 is following:
-pci_default_write_config(pci_dev, pos, val, len);
+pci_default_w
On 12/28/2015 07:50 PM, Michael S. Tsirkin wrote:
On Mon, Dec 28, 2015 at 10:54:23AM +0800, Cao jin wrote:
Fix the bug introduced by 595a4f07. Function host_pci_config_read() should be
passed by a reference, not a value, for the later pci_default_write_config().
What's the effect of the bug?
On Mon, Dec 28, 2015 at 11:52:43AM +0300, Pavel Fedin wrote:
> Hello!
>
> > A dedicated IRQ per device for something that is a system wide event
> > sounds like a waste. I don't understand why a spec change is strictly
> > required, we only need to support this with the specific virtual bridge
>
On Mon, Dec 28, 2015 at 03:20:10AM +, Dong, Eddie wrote:
> > >
> > > Even if the device driver doesn't support migration, you still want to
> > > migrate VM? That maybe risk and we should add the "bad path" for the
> > > driver at least.
> >
> > At a minimum we should have support for hot-plug
On Mon, Dec 28, 2015 at 10:54:23AM +0800, Cao jin wrote:
> Fix the bug introduced by 595a4f07. Function host_pci_config_read() should be
> passed by a reference, not a value, for the later pci_default_write_config().
What's the effect of the bug? Does it break igd assignment?
How come it worked fo
Hello Jason, all
+-- On Mon, 28 Dec 2015, Jason Wang wrote --+
| On 12/23/2015 01:14 PM, P J P wrote:
| > +-- On Tue, 22 Dec 2015, Peter Maydell wrote --+
| > | Could you submit patches in the usual git send-email format,
| > | please?
| >
| > Yes, surely will do. I did read about it here[*],
From: Prasad J Pandit
While processing transmit(tx) descriptors in 'tx_consume' routine
the switch emulator suffers from an off-by-one error, if a
descriptor was to have more than allowed(ROCKER_TX_FRAGS_MAX=16)
fragments. Fix an incorrect bounds check to avoid it.
Reported-by: Qinghao Tang
Sig
Hello!
> A dedicated IRQ per device for something that is a system wide event
> sounds like a waste. I don't understand why a spec change is strictly
> required, we only need to support this with the specific virtual bridge
> used by QEMU, so I think that a vendor specific capability will do.
>
On Sun, Dec 27, 2015 at 01:45:15PM -0800, Alexander Duyck wrote:
> On Sun, Dec 27, 2015 at 1:21 AM, Michael S. Tsirkin wrote:
> > On Fri, Dec 25, 2015 at 02:31:14PM -0800, Alexander Duyck wrote:
> >> The PCI hot-plug specification calls out that the OS can optionally
> >> implement a "pause" mecha
101 - 132 of 132 matches
Mail list logo