Stefan Weil s...@weilnetz.de writes:
This is my configuration and the output from configure:
configure '--audio-card-list=ac97,es1370,sb16,cs4231a,adlib,gus,hda'
--audio-drv-list=alsa,sdl,oss,esd,pa' '--enable-mixemu'
--enable-check-utests' '--enable-vnc-thread'
ERROR
ERROR: User requested
Signed-off-by: Li Zhi Hui zhihu...@linux.vnet.ibm.com
---
net/socket.c |3 +++
1 files changed, 3 insertions(+), 0 deletions(-)
diff --git a/net/socket.c b/net/socket.c
index e9ef128..0f09164 100644
--- a/net/socket.c
+++ b/net/socket.c
@@ -409,6 +409,7 @@ static int
On 11/23/2011 11:22 PM, Peter Maydell wrote:
I just said this in the other thread, but to repeat it in the
right place: I think we should expand out the case statement
to explicitly list the --thingydir options it is supposed to
be matching, and drop the wildcard: as this bug demonstrates
it's
string is allocated by g_malloc, will not be used after putenv, should be
free before return.
Signed-off-by: Li Zhi Hui zhihu...@linux.vnet.ibm.com
---
os-win32.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/os-win32.c b/os-win32.c
index 8ad5fa1..e6e9143 100644
---
On 11/23/2011 01:03 AM, Peter Maydell wrote:
2011/11/22 Benoît Canet benoit.ca...@gmail.com:
static int bonito_initfn(PCIDevice *dev)
{
PCIBonitoState *s = DO_UPCAST(PCIBonitoState, dev, dev);
+SysBusDevice *sysbus = sysbus_from_qdev(dev-qdev);
This looks odd. The device here
Thanks
On Thu, Nov 24, 2011 at 9:40 AM, Avi Kivity a...@redhat.com wrote:
On 11/23/2011 01:03 AM, Peter Maydell wrote:
2011/11/22 Benoît Canet benoit.ca...@gmail.com:
static int bonito_initfn(PCIDevice *dev)
{
PCIBonitoState *s = DO_UPCAST(PCIBonitoState, dev, dev);
+
Is there any solution to this?
Traditional: it may be fixed in the mainline already, F15 has version
2.28.8, whereas mainline tip is 2.31.2.
However nothing in the git log suggests that.
FWIW Ubuntu Oneiric has glib2 2.30.0 and doesn't seem to have this problem.
Just compiled, built and
Hello,
Greetings for the day!
I am Kashish and I am contacting you after looking at your website- .
We are a Leading Indian Based SEO Web Development Company and one of the
very few company which offer organic SEO services with a full range of
supporting services such as one way
On Thu, Nov 24, 2011 at 3:38 AM, Chunyan Liu cy...@suse.com wrote:
2011/11/23 Stefan Hajnoczi stefa...@gmail.com
On Wed, Nov 23, 2011 at 10:14 AM, Chunyan Liu cy...@suse.com wrote:
V3:
Remove file lock in main().
Try to find new free nbd device and connect to it if connecting to the
On Wed, Nov 23, 2011 at 4:01 PM, Gerd Hoffmann kra...@redhat.com wrote:
On 11/19/11 20:40, Stefan Hajnoczi wrote:
I have a Windows 7 VM running a sound driver for a passthrough USB
host device. The driver submits iso in and out urbs to do audio
capture and playback at the same time.
On Thu, Nov 24, 2011 at 1:02 AM, Benjamin mlspira...@gmail.com wrote:
Signed-off-by: Benjamin MARSILI marsi...@epitech.eu
---
This is the '---' that people typically add comments after. Git will
not include anything from '---' to the next 'diff --git ...' line.
net.c | 6 -
On 23 November 2011 16:01, Gerd Hoffmann kra...@redhat.com wrote:
On 11/19/11 20:40, Stefan Hajnoczi wrote:
Audacity running inside the guest freezes and does not record audio
unless I move the mouse. Somehow it seems USB iso urbs aren't being
pumped unless I keep moving the mouse. The VM is
Hi all,
I have a question regarding MMU.
I've built a SPARC based small embedded system.
at this system addresses 0x-0x8000 (32KB) belong to ROM and
0x8000 - 0x8001 to RAM.
the problem is that when a code from first ROM page accesses a memory at
the address 0x8000 there
In fact, what cases is this supposed to be matching? All
the documented --thingydir options are handled explicitly
earlier in the case statement.
Paolo, you added this case in commit 6bde81cb0, but the
commit message doesn't give any rationale; what's it for?
There were some --*dir that
On 24 November 2011 09:57, Max Filippov jcmvb...@gmail.com wrote:
There were some --*dir that are supported by Autoconf and
not by QEMU configure. The aim was to let QEMU packagers
use the rpm (or similar) macro that overrides directories
for their distribution.
Ah. Can we list them
Hi,
Am 24.11.2011 10:53, schrieb Michael Rolnik:
I have a question regarding MMU.
I've built a SPARC based small embedded system.
You've already sent this two times. What you keep forgetting is to cc
the sparc maintainer and to tell us whether this is sparc32 or sparc64.
The latter was rather
On Thu, Nov 24, 2011 at 05:15:30PM +0800, Mark wrote:
If you free the string, it will cause the environment variable unavailable.
More details please see the following text extracted from manual of
putenv:
The libc4 and libc5 and glibc 2.1.2 versions conform to SUSv2:
the
after some debugging I confirmed that this is caused by a mingw gcc
4.6.1-2 optiomization bug, gcc generated optimized code that used ebp to
store some results , while later ebp is used in setjmp and longjmp, so
a beiju occurred. mingw gcc 4.5.2works well. the bug should be closed.
--
You
On Wed, Nov 23, 2011 at 05:26:42PM +, Peter Maydell wrote:
Two trivial patches which make it a little easier to look at config.log
and figure out what's going on.
The next step down this road would probably be something like
test_start() {
echo # Checking for $1... config.log
On Thu, Nov 24, 2011 at 04:23:00PM +0800, Zhi Hui Li wrote:
Signed-off-by: Li Zhi Hui zhihu...@linux.vnet.ibm.com
---
net/socket.c |3 +++
1 files changed, 3 insertions(+), 0 deletions(-)
Thanks, applied to the trivial patches -next tree:
Am 23.11.2011 22:59, schrieb Richard Henderson:
On 11/20/2011 12:51 PM, Andreas Färber wrote:
* Part of the problem is that common CPUState fields are not at the
start of the struct. I have therefore been playing with a
CPU_COMMON_PREFIX at the start of the struct and using a macro for
From: Hongyong Zang zanghongy...@huawei.com
When a guest boots with ioeventfd, an error (by gdb) occurs:
Program received signal SIGSEGV, Segmentation fault.
0x006009cc in setup_ioeventfds (s=0x171dc40)
at /home/louzhengwei/git_source/qemu-kvm/hw/ivshmem.c:363
363
On Thu, Nov 24, 2011 at 9:43 AM, Peter Maydell peter.mayd...@linaro.org wrote:
On 23 November 2011 16:01, Gerd Hoffmann kra...@redhat.com wrote:
On 11/19/11 20:40, Stefan Hajnoczi wrote:
Audacity running inside the guest freezes and does not record audio
unless I move the mouse. Somehow it
--*dir) option pattern precede --{en,dis}able-usb-redir) patterns in the
option analysis switch, making the latter options have no effect.
There were some --*dir that are supported by Autoconf and not by QEMU configure.
The aim was to let QEMU packagers use the rpm (or similar) macro that
--*dir) option pattern precede --{en,dis}able-usb-redir) patterns in the
option analysis switch, making the latter options have no effect.
There were some --*dir that are supported by Autoconf and not by QEMU configure.
The aim was to let QEMU packagers use the rpm (or similar) macro that
Since you're fixing net/socket.c: would you be interested in adopting my
untested drive-by fix [PATCH 0/2] net: socket backend uses
uninitialized variables?
http://lists.nongnu.org/archive/html/qemu-devel/2011-10/msg03888.html
On 24 November 2011 11:53, Max Filippov jcmvb...@gmail.com wrote:
+ --sbindir=*)
+ ;;
+ --libexecdir=*)
+ ;;
+ --sharedstatedir=*)
+ ;;
You can combine these all into one case, like this:
--sbindir=*|--libexecdir=*|--sharedstatedir=*|--localstatedir=*|\
--*dir) option pattern precede --{en,dis}able-usb-redir) patterns in the
option analysis switch, making the latter options have no effect.
There were some --*dir that are supported by Autoconf and not by QEMU configure.
The aim was to let QEMU packagers use the rpm (or similar) macro that
The bug report Max linked to previously suggests that bug is CLOSED FIXED.
How's that fixed then?
Debian glib2 package version 2.24.2-1 works for me too. Looks like
Fedora packaging issue.
So, what do I do? Is there any way I could find what is causing this?
detach - close session
size[4] Tdetach tag[2]
size[4] Rdetach tag[2]
The detach msg is used to close an already existing session.
This enable us to notify qemu that an unmount have happened in
the client. Such notification enable us to do specific task
like remove migration blocker in qemu.
On 11/24/2011 01:15 PM, Mr Dash Four wrote:
The bug report Max linked to previously suggests that bug is CLOSED
FIXED. How's that fixed then?
Debian glib2 package version 2.24.2-1 works for me too. Looks like
Fedora packaging issue.
So, what do I do? Is there any way I could find what is
On Wed, Nov 23, 2011 at 07:33:48PM +, Peter Maydell wrote:
On 23 November 2011 19:22, Mr Dash Four mr.dash.f...@googlemail.com wrote:
OK. We don't explicitly try to link with ssl3 ourselves, so this only
ever ends up in LDFLAGS because of some other library that has claimed
it needs
On 11/24/2011 01:11 PM, Max Filippov wrote:
--*dir) option pattern precede --{en,dis}able-usb-redir) patterns in the
option analysis switch, making the latter options have no effect.
There were some --*dir that are supported by Autoconf and not by QEMU configure.
The aim was to let QEMU
vdev-guest_features is not masking features that are not supported by
the guest. Fix this by introducing a common wrapper to be used by all
virtio bus implementations.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
hw/s390-virtio-bus.c |5 +
hw/syborg_virtio.c |4 +---
As per the 9p rfc, during TVERSION its necessary to clean all the active
fids, so that we start the session from a clean state. Its also needed in
scenarios where the guest is booting off 9p, and boot fails, and client
restarts, without any knowledge of the past, it will issue a TVERSION again
so
This series cleans up device configuration in virtio:
1) all properties (features and not) are moved to a single macro
DEFINE_VIRTIO_XYZ_PROPERTIES. This makes the definitions
uniform across all three virtio backends.
2) all configuration is moved to a single struct, which embeds
the
On 11/17/2011 09:58 PM, Michael Roth wrote:
On 11/17/2011 10:34 AM, Barak Azulay wrote:
On Thursday 17 November 2011 02:48:50 Michael Roth wrote:
I've tried to summarize the pros/cons, points, and proposals outlined in
this thread at the following wiki:
Likely Debian is not packaging systemtap scripts.
True, though I have no idea what the purpose of these files is.
Open a Fedora bug and link it to the upstream bug. Say in the Fedora
bug that the upstream bug is fixed but you couldn't find a commit that
relates to it.
Done -
On 24 November 2011 12:26, Alon Levy al...@redhat.com wrote:
On Wed, Nov 23, 2011 at 07:33:48PM +, Peter Maydell wrote:
On 23 November 2011 19:22, Mr Dash Four mr.dash.f...@googlemail.com wrote:
OK. We don't explicitly try to link with ssl3 ourselves, so this only
ever ends up in
This part pushes the NIC properties down into virtio_net_conf and
DEFINE_VIRTIO_NET_PROPERTIES. No semantic change.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
hw/s390-virtio-bus.c |3 +--
hw/s390-virtio-bus.h |1 -
hw/syborg_virtio.c |4 +---
hw/virtio-net.c | 13
It has only one field for now, but this will change soon...
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
hw/s390-virtio-bus.c |4 ++--
hw/s390-virtio-bus.h |3 ++-
hw/virtio-blk.c | 13 ++---
hw/virtio-blk.h |5 +
hw/virtio-pci.c |4 ++--
This part pushes the block device properties down into VirtIOBlkConf and
DEFINE_VIRTIO_BLK_PROPERTIES. No semantic change.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
hw/s390-virtio-bus.c |4 +---
hw/s390-virtio-bus.h |1 -
hw/virtio-blk.c | 17 +
Include also other properties than features. This adds the common virtio
features to s390.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
hw/s390-virtio-bus.c |2 +-
hw/virtio-blk.h |5 +
hw/virtio-pci.c |3 +--
3 files changed, 7 insertions(+), 3 deletions(-)
Include also other properties than features. NIC properties are
tackled in the next patch.
There is one semantic change: this adds the virtio-net and common feature
bits to s390.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
hw/s390-virtio-bus.c |6 +-
hw/syborg_virtio.c |
The devices should not need to share any space from the conf fields
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
hw/s390-virtio-bus.h |8 +---
hw/syborg_virtio.c |4 +++-
hw/virtio-pci.h | 10 ++
3 files changed, 14 insertions(+), 8 deletions(-)
diff --git
Also move the 9p.h file to 9pfs/virtio-9p-device.h, for consistency
with the corresponding .c file.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
hw/9pfs/virtio-9p-device.c | 35 +-
hw/{9p.h = 9pfs/virtio-9p-device.h} |4 +-
Include also other properties than features. This adds the common virtio
features to s390.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
hw/s390-virtio-bus.c |3 +--
hw/virtio-pci.c |4 +---
hw/virtio-serial.h |5 +
3 files changed, 7 insertions(+), 5 deletions(-)
Signed-off-by: Benoît Canet benoit.ca...@gmail.com
---
hw/an5206.c |2 +-
hw/mcf.h |5 -
hw/mcf5206.c | 37 +
3 files changed, 26 insertions(+), 18 deletions(-)
diff --git a/hw/an5206.c b/hw/an5206.c
index 3fe1f00..319a40e 100644
---
These patches convert some files to memory API
I am wondering if the bonito ones are corrects as
sysbus_mmio_map() use internally get_system_memory().
v2:
remove unneeded casts in mcf_uart
remove unneeded #include in lm32_uart and lm32_sys
v3:
use valid.accept in lm32_sys
v4:
bonito: use the
Signed-off-by: Benoît Canet benoit.ca...@gmail.com
---
hw/bonito.c | 39 ---
1 files changed, 16 insertions(+), 23 deletions(-)
diff --git a/hw/bonito.c b/hw/bonito.c
index ab5c00d..7980363 100644
--- a/hw/bonito.c
+++ b/hw/bonito.c
@@ -202,6 +202,7 @@
No s390 change here, since s390 does not (yet?) support virtio-9p.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
hw/9pfs/virtio-9p-device.h |5 +
hw/virtio-pci.c|4 +---
2 files changed, 6 insertions(+), 3 deletions(-)
diff --git a/hw/9pfs/virtio-9p-device.h
Signed-off-by: Benoît Canet benoit.ca...@gmail.com
---
hw/mcf.h | 11 +++
hw/mcf5206.c | 25 +
hw/mcf5208.c |6 +++---
hw/mcf_uart.c | 34 +++---
4 files changed, 38 insertions(+), 38 deletions(-)
diff --git a/hw/mcf.h
2011/11/24 Benoît Canet benoit.ca...@gmail.com:
@@ -690,17 +688,16 @@ static int bonito_pcihost_initfn(SysBusDevice *dev)
static int bonito_initfn(PCIDevice *dev)
{
PCIBonitoState *s = DO_UPCAST(PCIBonitoState, dev, dev);
+ SysBusDevice *sysbus = s-pcihost-busdev;
/* Bonito
On 11/24/2011 03:31 PM, Benoît Canet wrote:
These patches convert some files to memory API
I am wondering if the bonito ones are corrects as
sysbus_mmio_map() use internally get_system_memory().
From a will it work perspective, I think it's correct since it
system_memory is supposed to be
Signed-off-by: Benoît Canet benoit.ca...@gmail.com
---
hw/mcf.h |3 ++-
hw/mcf5208.c |3 ++-
hw/mcf_fec.c | 38 +++---
3 files changed, 23 insertions(+), 21 deletions(-)
diff --git a/hw/mcf.h b/hw/mcf.h
index e2f6727..2f88ff0 100644
--- a/hw/mcf.h
Signed-off-by: Benoît Canet benoit.ca...@gmail.com
---
hw/lm32_sys.c | 28 ++--
1 files changed, 14 insertions(+), 14 deletions(-)
diff --git a/hw/lm32_sys.c b/hw/lm32_sys.c
index e5ff962..0c8e971 100644
--- a/hw/lm32_sys.c
+++ b/hw/lm32_sys.c
@@ -47,6 +47,7 @@ enum {
Signed-off-by: Benoît Canet benoit.ca...@gmail.com
---
hw/bonito.c | 37 +++--
1 files changed, 15 insertions(+), 22 deletions(-)
diff --git a/hw/bonito.c b/hw/bonito.c
index ad4fc63..4972b94 100644
--- a/hw/bonito.c
+++ b/hw/bonito.c
@@ -203,10 +203,6 @@
On 11/24/2011 03:43 PM, Peter Maydell wrote:
2011/11/24 Benoît Canet benoit.ca...@gmail.com:
@@ -690,17 +688,16 @@ static int bonito_pcihost_initfn(SysBusDevice *dev)
static int bonito_initfn(PCIDevice *dev)
{
PCIBonitoState *s = DO_UPCAST(PCIBonitoState, dev, dev);
+
Signed-off-by: Benoît Canet benoit.ca...@gmail.com
---
hw/bonito.c | 39 ---
1 files changed, 16 insertions(+), 23 deletions(-)
diff --git a/hw/bonito.c b/hw/bonito.c
index 7980363..1e52f61 100644
--- a/hw/bonito.c
+++ b/hw/bonito.c
@@ -203,6 +203,7 @@
Signed-off-by: Benoît Canet benoit.ca...@gmail.com
---
hw/mcf.h |4 +++-
hw/mcf5208.c |2 +-
hw/mcf_intc.c | 33 +++--
3 files changed, 19 insertions(+), 20 deletions(-)
diff --git a/hw/mcf.h b/hw/mcf.h
index 2f88ff0..baa790b 100644
--- a/hw/mcf.h
+++
Signed-off-by: Benoît Canet benoit.ca...@gmail.com
---
hw/lm32_uart.c | 31 +++
1 files changed, 15 insertions(+), 16 deletions(-)
diff --git a/hw/lm32_uart.c b/hw/lm32_uart.c
index 3678545..46a5ae0 100644
--- a/hw/lm32_uart.c
+++ b/hw/lm32_uart.c
@@ -91,6 +91,7 @@
Signed-off-by: Benoît Canet benoit.ca...@gmail.com
---
hw/bonito.c | 43 +--
1 files changed, 21 insertions(+), 22 deletions(-)
diff --git a/hw/bonito.c b/hw/bonito.c
index fdb8198..ad4fc63 100644
--- a/hw/bonito.c
+++ b/hw/bonito.c
@@ -201,9 +201,7 @@
Signed-off-by: Benoît Canet benoit.ca...@gmail.com
---
hw/bonito.c | 39 ++-
1 files changed, 18 insertions(+), 21 deletions(-)
diff --git a/hw/bonito.c b/hw/bonito.c
index 4972b94..ab5c00d 100644
--- a/hw/bonito.c
+++ b/hw/bonito.c
@@ -203,10 +203,6 @@
We are left with :
hw/omap2.c
hw/omap_dma.c
hw/omap_dss.c
hw/omap_gpio.c
and
hw/omap_i2c.c
hw/omap_l4.c
hw/omap_lcdc.c
hw/omap_spi.c
hw/omap_sx1.c
I'll try to do the bottom stack.
2011/11/20 Avi Kivity a...@redhat.com
On 11/18/2011 04:38 PM, Peter Maydell wrote:
Incidentally, another
On 11/24/2011 04:29 PM, Benoît Canet wrote:
We are left with :
hw/omap2.c
hw/omap_dma.c
hw/omap_dss.c
hw/omap_gpio.c
and
hw/omap_i2c.c
hw/omap_l4.c
hw/omap_lcdc.c
hw/omap_spi.c
hw/omap_sx1.c
I'll try to do the bottom stack.
Thanks.
Peter, please have a look at 8ed014d2553bc
2011/11/24 Avi Kivity a...@redhat.com:
Peter, please have a look at 8ed014d2553bc (and a couple of following
patches). I don't think they'll be contentious, but they aren't the
standard stuff either.
Looks OK to me, but I haven't really looked very hard at the OMAP L4
code at all. Feel free
Signed-off-by: Kevin Wolf kw...@redhat.com
---
dma-helpers.c | 10 ++
trace-events |7 +++
2 files changed, 17 insertions(+), 0 deletions(-)
diff --git a/dma-helpers.c b/dma-helpers.c
index bdcd38c..9d6b6fa 100644
--- a/dma-helpers.c
+++ b/dma-helpers.c
@@ -9,6 +9,7 @@
The following three patches are part of the memory API conversion queue;
while I don't think there's anything contentious in there, it's not the usual
convert-to-memory-API fare.
The patches remove a bunch of dead code that has not been in use for more
than three years, so they should be quite
This was introduced apparently to overcome a limitation on the number of
cpu_register_io_memory() calls. 477b24ef91175 (July 2008) removed use
of the hack, but retained the code. This patch removes the code as well.
Signed-off-by: Avi Kivity a...@redhat.com
---
hw/omap.h|3 -
This is a trivial wrapper around cpu_register_io_memory(), adding
no value. Inline it into all callers.
Signed-off-by: Avi Kivity a...@redhat.com
---
hw/omap.h |2 --
hw/omap2.c | 12 ++--
hw/omap_dss.c | 16
hw/omap_gptimer.c |4
Also add omap_l4_region_size(), since memory API functions need
the size during initialization.
Signed-off-by: Avi Kivity a...@redhat.com
---
hw/omap.h|7 ++-
hw/omap2.c |2 +-
hw/omap_l4.c | 29 -
3 files changed, 35 insertions(+), 3 deletions(-)
When using a virtfs root filesystem, the mount_tag needs to be set to
/dev/root. This can be done long-hand as
-fsdev local,id=root,path=/path/to/rootfs,...
-device virtio-9p-pci,fsdev=root,mount_tag=/dev/root
but the -virtfs shortcut cannot be used as it hard-codes the device identifier
to
This new state will be used by Xen functions to know QEMU will wait for a
migration. This is important to know for memory related function because the
memory is already allocated and reallocated them will not works.
Signed-off-by: Anthony PERARD anthony.per...@citrix.com
---
qapi-schema.json |
Do not allocate RAM during pre-migration runstate.
Do not actually do set_memory during migration.
Signed-off-by: Anthony PERARD anthony.per...@citrix.com
---
xen-all.c | 13 +
1 files changed, 13 insertions(+), 0 deletions(-)
diff --git a/xen-all.c b/xen-all.c
index
In Xen case, the guest RAM is not handle by QEMU, and it is saved by Xen tools.
So, we just avoid to register the RAM save state handler.
Signed-off-by: Anthony PERARD anthony.per...@citrix.com
---
vl.c |6 --
1 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/vl.c b/vl.c
Also observed on Fedora 16:
https://bugzilla.redhat.com/show_bug.cgi?id=754149
** Bug watch added: Red Hat Bugzilla #754149
https://bugzilla.redhat.com/show_bug.cgi?id=754149
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
On Mon, Nov 21, 2011 at 07:58:48PM -0600, Anthony Liguori wrote:
On 11/21/2011 03:22 PM, Michael Tokarev wrote:
Current version of seabios is 1.6.3, released several
weeks ago. Compared with the version currently shipped
in qemu, it adds a few commits, most of which are fixes
for
Also observed on Fedora 16, qemu-kvm-0.15.1-3.fc16.x86_64
https://bugzilla.redhat.com/show_bug.cgi?id=754149
Also observed on Ubuntu, extra/qemu-kvm 0.15.0-2
https://bugs.launchpad.net/qemu/+bug/894037
** Bug watch added: Red Hat Bugzilla #754149
On 24 November 2011 15:56, Avi Kivity a...@redhat.com wrote:
The following three patches are part of the memory API conversion queue;
while I don't think there's anything contentious in there, it's not the usual
convert-to-memory-API fare.
The patches remove a bunch of dead code that has not
During the initialisation of the machine at restore time, the access to the
VRAM will fail because QEMU does not know yet the right guest address to map,
so the vram_ptr is NULL.
So this patch avoid using a NULL pointer during initialisation, and try to get
another vram_ptr if the call failed the
change_process_uid() checks that privileges have been successfully dropped by
verifying that setuid(0) fails. However, if qemu is explicitly -runas root,
the setuid(0) would correctly succeed, so we skip the test in that case.
Signed-off-by: Chris Webb ch...@arachsys.com
---
os-posix.c |2 +-
This allows qemu to drop privileges to a dynamically allocated, anonymous UID
and GID without needing a temporary /etc/passwd entry for that UID. The
UID:GID format is very standard, being (for example) the syntax used by
chown(1) for numeric IDs.
Signed-off-by: Chris Webb ch...@arachsys.com
---
This patch change the xen_map_cache behavior. Before trying to map a guest
addr, mapcache will look into the list of range of address that have been moved
(physmap/set_memory). There is currently one memory space like this, the vram,
moved from were it's allocated to were the guest will look into.
On Thu, Nov 24, 2011 at 3:22 PM, Kevin Wolf kw...@redhat.com wrote:
Signed-off-by: Kevin Wolf kw...@redhat.com
---
dma-helpers.c | 10 ++
trace-events | 7 +++
2 files changed, 17 insertions(+), 0 deletions(-)
Reviewed-by: Stefan Hajnoczi stefa...@linux.vnet.ibm.com
On Thu, Nov 24, 2011 at 01:28:52PM +0100, Paolo Bonzini wrote:
vdev-guest_features is not masking features that are not supported by
the guest. Fix this by introducing a common wrapper to be used by all
virtio bus implementations.
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
Yes, while
On 24 November 2011 16:04, Chris Webb ch...@arachsys.com wrote:
+ if (qemu_opts_id(opts)) {
+ fsdev = qemu_opts_create(qemu_find_opts(fsdev),
+ qemu_opts_id(opts), 1);
+ } else {
+ fsdev
On 11/24/2011 06:29 PM, Chris Webb wrote:
This allows qemu to drop privileges to a dynamically allocated, anonymous UID
and GID without needing a temporary /etc/passwd entry for that UID. The
UID:GID format is very standard, being (for example) the syntax used by
chown(1) for numeric IDs.
@@
On Thu, Nov 24, 2011 at 02:40:07PM +0200, Dor Laor wrote:
Using QMP is an advantage, I agree.
However it can be used by another option - move the QMP schema out
of qemu.git so all projects like libvirt, agents, vdsm, etc will be
able to consume it directly.
This way, adding a new (agent)
On 11/24/2011 06:46 PM, Avi Kivity wrote:
On 11/24/2011 06:29 PM, Chris Webb wrote:
This allows qemu to drop privileges to a dynamically allocated, anonymous
UID
and GID without needing a temporary /etc/passwd entry for that UID. The
UID:GID format is very standard, being (for example)
Avi Kivity a...@redhat.com writes:
On 11/24/2011 06:29 PM, Chris Webb wrote:
This allows qemu to drop privileges to a dynamically allocated, anonymous
UID
and GID without needing a temporary /etc/passwd entry for that UID. The
UID:GID format is very standard, being (for example) the
We have a common functions to refactor used in both half of the files.
omap_l4_attach
2011/11/24 Avi Kivity a...@redhat.com
On 11/24/2011 04:29 PM, Benoît Canet wrote:
We are left with :
hw/omap2.c
hw/omap_dma.c
hw/omap_dss.c
hw/omap_gpio.c
and
hw/omap_i2c.c
On 11/24/2011 05:42 PM, Michael S. Tsirkin wrote:
Most users ignore the return value anyway,
and virtio_load needs to look at supported features
mask for the diagnostic anyway. So let's use virtio_set_features
void.
Could some backend make it a hard failure? If I understand correctly,
this
On 11/24/2011 06:47 PM, Benoît Canet wrote:
We have a common functions to refactor used in both half of the files.
omap_l4_attach
Already done. See omap_l4_attach_region() and omap_l4_region_size().
--
error compiling committee.c: too many arguments to function
2011/11/24 Benoît Canet benoit.ca...@gmail.com:
We have a common functions to refactor used in both half of the files.
omap_l4_attach
I assume the idea is that omap_l4_attach() can eventually disappear
when all the l4 devices are converted to memory regions...
-- PMM
change_process_uid() checks that privileges have been successfully dropped by
verifying that setuid(0) fails. However, if qemu is explicitly -runas root,
the setuid(0) would correctly succeed, so we skip the test in that case.
Signed-off-by: Chris Webb ch...@arachsys.com
---
os-posix.c |2 +-
This allows qemu to drop privileges to a dynamically allocated, anonymous UID
and GID without needing a temporary /etc/passwd entry for that UID. The
UID:GID format is very standard, being (for example) the syntax used by
chown(1) for numeric IDs.
Signed-off-by: Chris Webb ch...@arachsys.com
---
When using a virtfs root filesystem, the mount_tag needs to be set to
/dev/root. This can be done long-hand as
-fsdev local,id=root,path=/path/to/rootfs,...
-device virtio-9p-pci,fsdev=root,mount_tag=/dev/root
but the -virtfs shortcut cannot be used as it hard-codes the device identifier
to
Peter Maydell peter.mayd...@linaro.org writes:
On 24 November 2011 16:04, Chris Webb ch...@arachsys.com wrote:
+ ?? ?? ?? ?? ?? ?? ?? ??if (qemu_opts_id(opts)) {
+ ?? ?? ?? ?? ?? ?? ?? ?? ??fsdev =
qemu_opts_create(qemu_find_opts(fsdev),
+ ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ??
On 22/08/2011 15:47, Paolo Bonzini wrote:
On 08/22/2011 03:45 PM, Anthony Liguori wrote:
Almost: in Win32 you need to use g_io_channel_win32_new_socket. But
indeed on Windows you can only use qemu_set_fd_handler for sockets too.
I think that's really only for read/write though. If you're
On Thu, 24 Nov 2011, Anthony PERARD wrote:
In Xen case, the guest RAM is not handle by QEMU, and it is saved by Xen
tools.
So, we just avoid to register the RAM save state handler.
Maybe we can unregister these handlers in the Xen specific
initialization code, before we start receiving
1 - 100 of 164 matches
Mail list logo