add MSA 2RF format instructions
Signed-off-by: Yongbok Kim
---
target-mips/helper.h | 17 ++
target-mips/msa_helper.c | 528 ++
target-mips/translate.c | 74 +++
3 files changed, 619 insertions(+), 0 deletions(-)
diff --git a/target-mips
add MSA VEC/2R format instructions
Signed-off-by: Yongbok Kim
---
target-mips/helper.h | 12
target-mips/msa_helper.c | 140 ++
target-mips/translate.c | 113 +
3 files changed, 265 insertions(+), 0 del
add MSA ELM format instructions
Signed-off-by: Yongbok Kim
---
target-mips/helper.h |9 +++
target-mips/msa_helper.c | 162 ++
target-mips/translate.c | 118 +
3 files changed, 289 insertions(+), 0 deletions(-
disassemble MIPS SIMD Architecture instructions
Signed-off-by: Yongbok Kim
---
disas/mips.c | 716 +-
1 files changed, 714 insertions(+), 2 deletions(-)
diff --git a/disas/mips.c b/disas/mips.c
index 4974bc0..2614c52 100644
--- a/disas/mi
add MSA 3R format instructions
Signed-off-by: Yongbok Kim
---
target-mips/helper.h | 64 +
target-mips/msa_helper.c | 656 ++
target-mips/translate.c | 242 +
3 files changed, 962 insertions(+), 0 deletions(-)
diff --git a
add MSA support to mips32r5-generic core definition
Signed-off-by: Yongbok Kim
---
target-mips/translate_init.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/target-mips/translate_init.c b/target-mips/translate_init.c
index 8fb8bf8..0b4b597 100644
--- a/target-mips/
add MSA BIT format instructions
Reviewed-by: Leon Alrae
Signed-off-by: Yongbok Kim
---
target-mips/helper.h | 13 +++
target-mips/msa_helper.c | 197 ++
target-mips/translate.c | 88
3 files changed, 298 insertions(+), 0
add MSA I8 format instructions
Reviewed-by: James Hogan
Signed-off-by: Yongbok Kim
---
target-mips/helper.h | 10 ++
target-mips/msa_helper.c | 67 +
target-mips/translate.c | 82 -
3 files changed, 1
add MSA MI10 format instructions
update LSA and DLSA for MSA
add 16, 64 bit load and store
Signed-off-by: Yongbok Kim
---
target-mips/helper.h|4 ++
target-mips/op_helper.c | 84 --
target-mips/translate.c | 49 +++-
add MSA 3RF format instructions
Signed-off-by: Yongbok Kim
---
target-mips/helper.h | 42 ++
target-mips/msa_helper.c | 1497 ++
target-mips/translate.c | 163 +
3 files changed, 1702 insertions(+), 0 deletions(-)
diff --git a/target-mips/
add MSA I5 format instructions
Signed-off-by: Yongbok Kim
---
target-mips/helper.h | 14 +
target-mips/msa_helper.c | 141 ++
target-mips/translate.c | 77 +
3 files changed, 232 insertions(+), 0 deletions(-)
diff
add MSA opcode enum
Reviewed-by: James Hogan
Reviewed-by: Leon Alrae
Signed-off-by: Yongbok Kim
---
target-mips/translate.c | 245 +++
1 files changed, 245 insertions(+), 0 deletions(-)
diff --git a/target-mips/translate.c b/target-mips/translate.c
add MSA branch instructions
Reviewed-by: James Hogan
Signed-off-by: Yongbok Kim
---
target-mips/translate.c | 334 +++
1 files changed, 220 insertions(+), 114 deletions(-)
diff --git a/target-mips/translate.c b/target-mips/translate.c
index baa1826.
stop translation as ctc1 instruction can change hflags
Reviewed-by: James Hogan
Signed-off-by: Yongbok Kim
---
target-mips/translate.c |6 ++
1 files changed, 6 insertions(+), 0 deletions(-)
diff --git a/target-mips/translate.c b/target-mips/translate.c
index 9a8f5c9..b388ba5 100644
--
add msa_reset() and global msa register (d type only)
Reviewed-by: James Hogan
Signed-off-by: Yongbok Kim
---
target-mips/translate.c | 56 ++
target-mips/translate_init.c | 35 ++
2 files changed, 91 insertions(+), 0 dele
add defines and data structure for MIPS SIMD Architecture
Reviewed-by: James Hogan
Signed-off-by: Yongbok Kim
---
target-mips/cpu.h | 52 +-
target-mips/mips-defs.h |1 +
target-mips/op_helper.c |1 +
3 files changed, 52 insertions(+),
add msa_helper.c
Reviewed-by: James Hogan
Reviewed-by: Leon Alrae
Signed-off-by: Yongbok Kim
---
target-mips/Makefile.objs |2 +-
target-mips/msa_helper.c | 49 +
2 files changed, 50 insertions(+), 1 deletions(-)
create mode 100644 target-mip
add MSA exceptions
Reviewed-by: James Hogan
Signed-off-by: Yongbok Kim
---
target-mips/helper.c | 10 ++
1 files changed, 10 insertions(+), 0 deletions(-)
diff --git a/target-mips/helper.c b/target-mips/helper.c
index c92b25c..3a93c20 100644
--- a/target-mips/helper.c
+++ b/target-mi
Remove the duplicated ieee_rm in gdbstub.c.
Make the other ieee_rm and ieee_ex_to_mips available to other files.
Reviewed-by: James Hogan
Reviewed-by: Leon Alrae
Signed-off-by: Yongbok Kim
---
target-mips/cpu.h |4
target-mips/gdbstub.c |7 ---
target-mips/op_helper.c
For 2.2 Release.
The following patchset implements MIPS SIMD Architecture module.
MSA adds new instructions to MIPS Architecture that allow efficient
parallel processing of vector operations.
For more information refer to:
MIPS Architecture Reference Manual
Volume IV-j: The MIPS32 SIMD Architectu
On 2014/10/16 5:28, Anshul Makkar wrote:
> Hi,
>
> Please can you share in what scenario this mapping fails. I am not seeing any
> such issue.
>
> Thanks
> Anshul Makkar
>
VM info:
memory:4G
hugepage size:2M
memory regions info:
gpa = 0xC
size = 3220439040
ua = 0
Convert several Character backend open functions to use the Error API.
Signed-off-by: zhanghailiang
---
qemu-char.c | 52 +++-
1 file changed, 27 insertions(+), 25 deletions(-)
diff --git a/qemu-char.c b/qemu-char.c
index 42b1d8f..52379cc 100644
-
The filename parameter never to be NULL, because in qemu_chr_parse_pipe
it is return value of g_strdup(device), where device will not be
NULL.
We should check its length.
After this patch, when run command:
qemu-system-x86_64 -chardev pipe,id=pipe1,path=
It will report error:
chardev: pipe: no f
Patch 1 and 2 fix wrong check about in-parameter.
The last two patches convert some open functions to use Error API.
zhanghailiang (4):
qemu-char: fix parameter check for qemu_chr_open_pipe
spice-qemu-char: fix check for in-parameter
qemu-char: convert some open functions to use Error API
Signed-off-by: zhanghailiang
---
include/ui/qemu-spice.h | 9 +
qemu-char.c | 4 ++--
spice-qemu-char.c | 10 +-
stubs/qemu-chr-open-spice.c | 4 ++--
4 files changed, 14 insertions(+), 13 deletions(-)
diff --git a/include/ui/qemu-spice.h b/includ
For qemu_chr_open_spice_vmc and qemu_chr_open_spice_port, the in-parameter
never to be NULL, because the checks in qemu_chr_parse_spice_vmc
and qemu_chr_parse_spice_port have ensured this.
So we should check the length of the in-parameter.
Signed-off-by: zhanghailiang
---
spice-qemu-char.c | 4
On 30 October 2014 12:37, Dr. David Alan Gilbert wrote:
> * Amit Shah (amit.s...@redhat.com) wrote:
>> On (Thu) 16 Oct 2014 [08:53:52], Dr. David Alan Gilbert (git) wrote:
>>
>> > rename migration-exec.c => migration/migration-exec.c (100%)
>> > rename migration-fd.c => migration/migration-fd.c
On 31 October 2014 21:51, Greg Bellows wrote:
> Not sure of the exact reasoning as I inherited the change. However, when I
> went through this code before I took it that the change was needed to filter
> out the case where SCTLR may be either of the ARMv8 variants (SCTLR_EL1 or
> SCTLR_EL3) as ne
On 10/30/2014 06:49 AM, Markus Armbruster wrote:
> You either have to prevent *any* writing of the first 2048 bytes (the
> part that can be examined by a bdrv_probe() method, or your have to
> prevent writing anything a probe recognizes, or the user has to specify
> the format explicitly.
>
> If
Not sure of the exact reasoning as I inherited the change. However, when I
went through this code before I took it that the change was needed to
filter out the case where SCTLR may be either of the ARMv8 variants
(SCTLR_EL1 or SCTLR_EL3) as neither of them have a SCTLR_V bits. In fact,
looking qu
+1 also having this issue
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/921208
Title:
win7/x64 installer hangs on startup with 0x005d.
Status in QEMU:
Confirmed
Status in “qemu” package in U
I just added qemu-kvm as a dependency for the openstack installer. It is
probably correct in assuming that virtinst shouldn't depend on qemu-kvm
since you can do paravirtualized.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https:/
So adding qemu-kvm fixed the issue with running nested KVM. I think
though the problem still exists on a non nested environment.
I'll get with the user who encountered this and see if I can get some
more logs.
Thanks
--
You received this bug notification because you are a member of qemu-
devel-
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1387881/+attachment/4250090/+files/UdevDb.txt
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1387881
Title:
q
David,
Could you attach the collection of:
apport-collect 1387881
Also the output of:
dpkg -l |grep qemu
On the affected NUCs if the problem still persists?
Thanks,
Adam
** Tags added: kernel-unable-to-test-upstream
--
You received this bug notification because you are a member of qemu-
de
dpkg -l |grep qemu:
ii qemu-utils 2.0.0+dfsg-2ubuntu1.6
amd64QEMU utilities
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1387881
Title:
qemu fails to recognize f
apport information
** Attachment added: "Card0.Codecs.codec.3.txt"
https://bugs.launchpad.net/bugs/1387881/+attachment/4250082/+files/Card0.Codecs.codec.3.txt
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1387881/+attachment/4250087/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1387881
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1387881/+attachment/4250083/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/138788
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1387881/+attachment/4250081/+files/CRDA.txt
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1387881
Title:
qemu
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1387881/+attachment/4250092/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1387881
T
Also happening when manually built from the 2.1.2 release codebase. In
my case it impacts the llvm-3.5.0 "make check" testsuite running an an
armhf-emulated chroot--it immediately gets SIGSEGV and SIGILL as soon as
it starts running tests.
--
You received this bug notification because you are a
apport information
** Attachment added: "PciMultimedia.txt"
https://bugs.launchpad.net/bugs/1387881/+attachment/4250086/+files/PciMultimedia.txt
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1387
apport information
** Attachment added: "UdevLog.txt"
https://bugs.launchpad.net/bugs/1387881/+attachment/4250091/+files/UdevLog.txt
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1387881
Title:
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1387881/+attachment/4250088/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/13
apt history.log for packages installed on top of base system. Note that
only the last entry was done by me, the others were done in preparation
of the image:
http://paste.ubuntu.com/8761810/
Basically, I booted a curtain installed maas node with an amd64 trusty
image from maas. Logged in, ran
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1387881/+attachment/4250089/+files/ProcModules.txt
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1387881
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1387881/+attachment/4250084/+files/Lspci.txt
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1387881
Title:
qem
Public bug reported:
System:
14.04
qemu - 2.0.0+dfsg-2ubuntu1.6
virtinst 0.600.4-3ubuntu2
Command:
virt-install --name juju-bootstrap --ram=2048 --vcpus=1 --hvm \
--virt-type=kvm --pxe --boot network,hd --os-variant=ubuntutrusty \
--graphics vnc --noautoconsole --os-type=linux --accelerate \
-
On Thu, Oct 30, 2014 at 9:38 PM, zhanghailiang
wrote:
> On 2014/10/31 11:29, zhanghailiang wrote:
>>
>> On 2014/10/31 10:23, Peter Feiner wrote:
>>>
>>> On Thu, Oct 30, 2014 at 07:31:48PM +0800, zhanghailiang wrote:
On 2014/10/30 1:46, Andrea Arcangeli wrote:
>
> On Mon, Oct 27,
apport information
** Attachment added: "AlsaDevices.txt"
https://bugs.launchpad.net/bugs/1387881/+attachment/4250079/+files/AlsaDevices.txt
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1387881
apport information
** Attachment added: "BootDmesg.txt"
https://bugs.launchpad.net/bugs/1387881/+attachment/4250080/+files/BootDmesg.txt
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1387881
Tit
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1387881/+attachment/4250085/+files/Lsusb.txt
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1387881
Title:
qem
AlsaVersion: Advanced Linux Sound Architecture Driver Version
k3.13.0-39-generic.
AplayDevices: Error: [Errno 2] No such file or directory
ApportVersion: 2.14.1-0ubuntu3.5
Architecture: amd64
ArecordDevices: Error: [Errno 2] No such file or directory
AudioDevicesInUse: Error: command ['fuser', '-v
Fixed in v9 as well as all other misordered instances added.
On 31 October 2014 08:35, Peter Maydell wrote:
> On 30 October 2014 21:28, Greg Bellows wrote:
> > From: Fabian Aggeler
> >
> > Use MVBAR register as exception vector base address for
> > exceptions taken to CPU monitor mode.
> >
> >
On 31 October 2014 08:30, Peter Maydell wrote:
> On 30 October 2014 21:28, Greg Bellows wrote:
> > From: Sergey Fedorov
> >
> > Added CP register defintions for SDER and SDER32_EL3 as well as
> cp15.sder for
> > register storage.
> >
> > Signed-off-by: Sergey Fedorov
> > Signed-off-by: Fabian
On 31 October 2014 08:24, Peter Maydell wrote:
> On 30 October 2014 21:28, Greg Bellows wrote:
> > From: Fabian Aggeler
> >
> > Implements NSACR register with corresponding read/write functions
> > for ARMv7 and ARMv8.
> >
> > Signed-off-by: Sergey Fedorov
> > Signed-off-by: Fabian Aggeler
>
On 10/30/14, 7:26 AM, "Amit Shah" wrote:
>On (Thu) 16 Oct 2014 [08:53:52], Dr. David Alan Gilbert (git) wrote:
>> From: "Dr. David Alan Gilbert"
>>
>> The migration code now occupies a fair chunk of the top level .c
>> files, it seems time to give it it's own directory.
>
>s/it's/its
6 out o
This impacts both BMDMA and AHCI HBA interfaces for IDE.
Currently, we confuse the difference between a PRDT having
"0 bytes" and a PRDT having "0 complete sectors."
When we receive an incomplete sector, inconsistent error checking
leads to an infinite loop wherein the call succeeds, but it
didn't
The intent of this patch is to further unify the creation and
deletion of the sglist used for all AHCI transfers, including
emulated PIO, ATAPI R/W, and native DMA R/W.
By replacing ahci_start_transfer's call to ahci_populate_sglist
with ahci_dma_prepare_buf, we reduce the number of direct calls
w
Am 29.05.2014 um 21:46 schrieb Paolo Bonzini:
This is v2 of the series to implement CPSR.E. I've now included support
for strex emulation and SCTLR.EE. I've now also tested system emulation
better using an Arch Linux image.
Using the Raspberry Pi optimized memcmp library and associated harness
* Peter Maydell (peter.mayd...@linaro.org) wrote:
> On 16 October 2014 08:53, Dr. David Alan Gilbert (git)
> wrote:
> > From: "Dr. David Alan Gilbert"
> >
> > The migration code now occupies a fair chunk of the top level .c
> > files, it seems time to give it it's own directory.
>
> Missed oppor
Hi,
On Thu, Oct 30, 2014 at 10:40:56AM +, Stefan Hajnoczi wrote:
> On Sat, Oct 25, 2014 at 12:43:35PM +0200, Wouter Verhelst wrote:
> > I haven't seen a reply to this anymore. Do people still have comments?
> > I'm planning on doing a release of nbd later this weekend, and would
> > like to in
On Fri, Oct 31, 2014 at 11:29:49AM +0800, zhanghailiang wrote:
> Agreed, but for doing live memory snapshot (VM is running when do snapsphot),
> we have to do this (block the write action), because we have to save the page
> before it
> is dirtied by writing action. This is the difference, compare
From: Sebastian Krahmer
Fix OOB access via malformed incoming_posn parameters
and check that requested memory is actually alloc'ed.
Signed-off-by: Sebastian Krahmer
[AF: Rebased, cleanups, avoid fd leak]
Cc: qemu-sta...@nongnu.org
Signed-off-by: Andreas Färber
Reviewed-by: Michael S. Tsirkin
On 30 October 2014 21:28, Greg Bellows wrote:
> This patch extends arm_excp_unmasked() to use lookup tables for determining
> whether IRQ and FIQ exceptions are masked. The lookup tables are based on the
> ARMv8 and ARMv7 specification physical interrupt masking tables.
>
> If EL3 is using AArch6
From: Michael Ellerman
Unfortunately ioctl numbers are platform specific, so abstract them out
of the code so they can be overridden. As it happens x86 and s390 share
the same values, so nothing needs to change yet.
Signed-off-by: Michael Ellerman
Signed-off-by: Paolo Bonzini
---
scripts/kvm/
From: Michael Ellerman
In kvm_stat we have a dictionary of exit reasons for s390. Firstly these
are not s390 specific, they are the generic exit reasons. So rename the
dictionary to reflect that, and add it separately to filters[].
Secondly, the values are defined using hex, but in the kernel he
From: "Dr. David Alan Gilbert"
This is a pc & q35 only machine opt.
VMWare apparently doesn't like running under QEMU due to our
incomplete emulation of it's special IO Port. This adds a
pc & q35 property to allow it to be turned off.
Signed-off-by: Dr. David Alan Gilbert
Signed-off-by: Don S
From: Hannes Reinecke
The windows driver is sending several init_firmware commands
when in MSI-X mode. It is, however, using only the first
queue. So disregard any additional init_firmware commands
until the HBA is reset.
Signed-off-by: Hannes Reinecke
Signed-off-by: Paolo Bonzini
---
hw/scsi
Am 31.10.2014 um 09:02 schrieb SeokYeon Hwang:
Wrapped uuid_unparse() in #ifdef to avoid "-Wunused-function" on clang 3.4 or
later.
Signed-off-by: SeokYeon Hwang
---
block/vdi.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/block/vdi.c b/block/vdi.c
index 19701ee..e1d211c 100644
---
From: Hannes Reinecke
The MFI_DCMD_LD_LIST_QUERY function is using a different format than
MFI_DCMD_LD_LIST, so we need to implement it differently.
Signed-off-by: Hannes Reinecke
Signed-off-by: Paolo Bonzini
---
hw/scsi/megasas.c | 37 ++---
hw/scsi/mfi.h
From: Fam Zheng
Signed-off-by: Fam Zheng
Signed-off-by: Paolo Bonzini
---
ui/Makefile.objs | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/ui/Makefile.objs b/ui/Makefile.objs
index 6afb52a..801cba2 100644
--- a/ui/Makefile.objs
+++ b/ui/Makefile.objs
@@ -10,12 +10,13 @
On 30 October 2014 21:28, Greg Bellows wrote:
> When EL3 is running in Aarch32 (or ARMv7 with Security Extensions)
> VBAR has a secure and a non-secure instance, which are mapped to
> VBAR_EL1 and VBAR_EL3.
>
> Signed-off-by: Greg Bellows
>
> ---
>
> v5 -> v6
> - Changed _el field variants to be
Hello Quan,
I guess you are referring to the host Linux kernel. Based on what
information does it change the page cache setting? Which settings are
supported? Can you explain a simple scenario that benefits from your
improvement on virtio-blk?
Cheers,
Stefano
On Thu, 30 Oct 2014, Xu, Quan wrote:
At present, I use telnet (without password), login to microblaze qemu
successfully! :-)
- I compile busy box with the glibc in orginal 'ramfs', so get telnetd:
use new busybox replace the old one, and add symbol link 'telnetd' to
busybox in "/bin".
- configure qemu with network support (
On 10/31/2014 06:08 PM, Paolo Bonzini wrote:
>
>
> On 29/10/2014 13:00, Hannes Reinecke wrote:
>> The 2108 chip supports MSI and MSI-X, so update the emulation
>> to support both chips.
>
> Is it expected that it doesn't work with latest SeaBIOS?
>
Not expected, but apparently this is the case.
On 30 October 2014 21:28, Greg Bellows wrote:
> From: Fabian Aggeler
>
> When EL3 is running in AArch32 (or ARMv7 with Security Extensions)
> FCSEIDR, CONTEXTIDR, TPIDRURW, TPIDRURO and TPIDRPRW have a secure
> and a non-secure instance.
>
> Signed-off-by: Fabian Aggeler
> Signed-off-by: Greg Be
Performance wise it's better to align GVA by the backend's
page size.
Also do not allow to create DIMM device with suboptimal
size (i.e. not aligned to backends page size) to aviod
memory loss.
Do above only for 2.2 and newer machine types to avoid
breaking working configs with 2.1 machine type.
From: Andreas Färber
Reported-by: Stefan Hajnoczi
Cc: qemu-sta...@nongnu.org
Signed-off-by: Andreas Färber
Reviewed-by: Michael S. Tsirkin
Signed-off-by: Paolo Bonzini
---
hw/misc/ivshmem.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/hw/misc/ivshmem.c b/hw/misc/ivshmem.c
index ecef82
introduce memory_region_get_alignment() that returns
underlying memory block alignment or 0 if it's not
relevant/implemented for backend.
Signed-off-by: Igor Mammedov
---
exec.c | 9 ++---
include/exec/exec-all.h | 2 +-
include/exec/memory.h | 2 ++
include/qemu/osdep.h
All implementations are the same.
Signed-off-by: Paolo Bonzini
---
hw/scsi/scsi-bus.c | 12 +++-
hw/scsi/scsi-disk.c| 12
hw/scsi/scsi-generic.c | 7 ---
include/hw/scsi/scsi.h | 1 -
4 files changed, 3 insertions(+), 29 deletions(-)
diff --git a/hw/scsi/scsi-
Series
* fixes [1/11] QEMU crash when non aligned DIMM is used in KVM mode.
* adds extra checks/enforcement to avoid non aligned DIMM address/sizes
and prevents guest failures when it tries to deal with such DIMMs
* prevents QEMU from starting with not baked by KVM amount of
memory s
From: Fam Zheng
Signed-off-by: Fam Zheng
Signed-off-by: Paolo Bonzini
---
hw/scsi/virtio-scsi.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/hw/scsi/virtio-scsi.c b/hw/scsi/virtio-scsi.c
index 7d40ecc..235c205 100644
--- a/hw/scsi/virtio-scsi.c
+++ b/hw/scsi/virtio-scsi.c
@@ -808,6 +808
From: Fam Zheng
Before, when a write protected iSCSI target is attached as scsi-disk
with BDRV_O_RDWR, we report it as writable, while in fact all writes
will fail.
One way to improve this is to report write protect flag as true to
guest, but a even better way is to refuse using a write protecte
On 30 October 2014 21:28, Greg Bellows wrote:
> From: Fabian Aggeler
>
> When EL3 is running in AArch32 (or ARMv7 with Security Extensions)
> IFSR has a secure and a non-secure instance.
>
> Signed-off-by: Fabian Aggeler
> Signed-off-by: Greg Bellows
> ---
> target-arm/cpu.h| 10 +-
From: Hannes Reinecke
Windows requires the frames to be unmapped, otherwise we run
into a race condition where the updated frame data is not
visible to the guest.
With that we can simplify the queue algorithm and use a bitmap
for tracking free frames.
Signed-off-by: Hannes Reinecke
Signed-off-b
This is a v2 patch series that collects patches 3, 4 and 5
from the v1 series that was only partially merged.
This series, as a subset, generally cleans up the usage and
handling of the scatter-gather list implementation in QEMU
that interacts with the PRDT (Physical Region Descriptor Table)
in AH
Currently, for emulated PIO transfers through the AHCI device,
any attempt made to request more than a single sector's worth
of data will result in the same sector being transferred over
and over.
For example, if we request 8 sectors via PIO READ SECTORS, the
AHCI device will give us the same sect
From: Hannes Reinecke
The check for a valid command buffer size was inverted.
Signed-off-by: Hannes Reinecke
Signed-off-by: Paolo Bonzini
---
hw/scsi/megasas.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/hw/scsi/megasas.c b/hw/scsi/megasas.c
index 7401b6b..acc9d30 1006
From: Hannes Reinecke
Logical drives can only be addressed with the 'target_id' number;
LUN numbers cannot be selected.
Physical drives can be selected with both, target and LUN id.
So we should disallow LUN numbers not equal to 0 when in
RAID mode.
Signed-off-by: Hannes Reinecke
Signed-off-by
So I'm not completely sure virtinst should depend on qemu-kvm, since we
assume one can use it without --virt-type=kvm, so my thoughts would be
you should install additional package as necessary to use qemu w/ KVM.
I'll let hallyn comment as well.
--
You received this bug notification because you
The following changes since commit 4239e2dc018c0defdbad35d387051ca2b208889d:
Merge remote-tracking branch
'remotes/kraxel/tags/pull-cve-2014-3689-20141029-1' into staging (2014-10-30
19:11:25 +)
are available in the git repository at:
git://github.com/bonzini/qemu.git tags/for-upstrea
On 10/30/2014 12:26 PM, Hannes Reinecke wrote:
> > Why would req->cmd.len be wrong though? Are you masking another bug?
>
> No. I'm _fixing_ a bug.
Sure, I just wasn't sure which/how. :)
> scsi_disk.c:scsi_new_request() is just calling scsi_req_alloc(),
> which does not set cmd.len.
> Yet lat
All implementations are the same.
Signed-off-by: Paolo Bonzini
---
hw/scsi/scsi-bus.c | 12 +++-
hw/scsi/scsi-disk.c| 12
hw/scsi/scsi-generic.c | 7 ---
include/hw/scsi/scsi.h | 1 -
4 files changed, 3 insertions(+), 29 deletions(-)
diff --git a/hw/scsi/scsi-
it will be used later to disable incompatible
machine changes in 2.2.
Signed-off-by: Igor Mammedov
---
hw/i386/pc_piix.c | 13 -
hw/i386/pc_q35.c | 13 -
2 files changed, 24 insertions(+), 2 deletions(-)
diff --git a/hw/i386/pc_piix.c b/hw/i386/pc_piix.c
index 91a20cb..
On 31 October 2014 07:44, Peter Maydell wrote:
> On 30 October 2014 21:28, Greg Bellows wrote:
> > From: Fabian Aggeler
> >
> > Prepare for cp register banking by inserting every cp register twice,
> > once for secure world and once for non-secure world.
> >
> > Signed-off-by: Fabian Aggeler
>
On 10/30/2014 12:43 PM, Peter Lieven wrote:
> On 30.10.2014 12:23, Fam Zheng wrote:
>> Before, when a write protected iSCSI target is attached as scsi-disk
>> with BDRV_O_RDWR, we report it as writable, while in fact all writes
>> will fail.
>>
>> One way to improve this is to report write protec
split addr initialization from declaration so that
later when new local vars are added property getter
wouldn't drift off of error check.
Signed-off-by: Igor Mammedov
---
hw/i386/pc.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/hw/i386/pc.c b/hw/i386/pc.c
index 41d91
On (Thu) 16 Oct 2014 [08:53:52], Dr. David Alan Gilbert (git) wrote:
> From: "Dr. David Alan Gilbert"
>
> The migration code now occupies a fair chunk of the top level .c
> files, it seems time to give it it's own directory.
s/it's/its
> I've not touched:
>arch_init.c - that's mostly RAM mi
1 - 100 of 419 matches
Mail list logo