On Wednesday, September 21, 2011 10:50:04 AM Kevin Wolf wrote:
> > My build bot could build anything the project feels would benefit from
> > regular builds on OpenBSD.
>
> Sounds great. Who is the one to set this up? Daniel or yourself? This is
> the branch that I would like to see built on Open
On Wed, Sep 21, 2011 at 09:44:37PM -0400, Stefan Berger wrote:
> On 09/19/2011 03:04 PM, Michael S. Tsirkin wrote:
> >On Mon, Sep 19, 2011 at 12:22:02PM -0400, Stefan Berger wrote:
> >>On 09/17/2011 03:28 PM, Michael S. Tsirkin wrote:
> >>>On Fri, Sep 16, 2011 at 12:46:40PM -0400, Stefan Berger wro
Hi,
I need to share some file from the host OS to guest OS ..?
when ever Vm boots up it looks for the file in some directory , If I do some
modification to the file host OS the guest (VM) also should can access that
..?
how to make this ..?
regards
Bala
On Tue, Sep 13, 2011 at 11:57 AM, bala su
Tested, it is compatible with checkpatch.pl and can work well.
No need to use pthread directly, we have proper abstractions for
identity checking.
Signed-off-by: Jan Kiszka
---
ui/spice-core.c |8
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/ui/spice-core.c b/ui
The Buildbot has detected a new failure on builder xen_x86_64_debian_6_0 while
building qemu.
Full details are available at:
http://buildbot.b1-systems.de/qemu/builders/xen_x86_64_debian_6_0/builds/38
Buildbot URL: http://buildbot.b1-systems.de/qemu/
Buildslave for this Build: yuzuki
Build Rea
It looks like the critical difference in the working vs non-working case
is the host interrupts on the 82576. When working, both the host and
guest view of the device is using MSI-X interrupts. When not working,
the host is using MSI but the guest still thinks it's using MSI-X.
Those are not comp
On Wed, Sep 21, 2011 at 09:53:22AM +0200, Alexander Graf wrote:
>
> On 21.09.2011, at 08:35, David Gibson wrote:
>
> > Sufficiently recent PAPR specifications define properties "ibm,vmx"
> > and "ibm,dfp" on the CPU node which advertise whether the VMX vector
> > extensions (or the later VSX vers
On Wed, Sep 7, 2011 at 21:02, Gerd Hoffmann wrote:
> Initialize glib threads unconditionally in main() instead
> of using g_thread_get_initialized in the 9p code.
>
> Fixes a build failure on RHEL-5, which ships glib 2.12.
> g_thread_get_initialized was added in 2.20.
>
> Signed-off-by: Gerd Hoffm
> Well, the comment is from source code. I don't catch why you think "list
> of TBS jumping to this one" is wrong.
> My understand is that TB chain be used forreduce switch from the
> translation
> cache to the guest code. It will be a circular list if there is no interrupt
> or exceptional.
On 09/22/2011 09:58 AM, 陳韋任 wrote:
/* list of TBs jumping to this one. This is a circular list using
the two least significant bits of the pointers to tell what is
the next pointer: 0 = jmp_next[0], 1 = jmp_next[1], 2 =
jmp_first */
struct TranslationBlock
> I am new to QEMU, can anyone please tell me where the TB chaining code is in
> QEMU ?
struct TranslationBlock has fields used to to block chaining. You also
need to look into it.
cpu_exec (cpu-exec.c)
It's the main execution loop where the interrupt/exception is handled
, and translared TB
This is not one bug, you didn't enable kvm accelerator when you start up VM.
On Wed, Sep 21, 2011 at 11:45 PM, Yongjie Ren <855...@bugs.launchpad.net> wrote:
> sorry, the right command to reproduce is 'qemu-system-x86_64 -m 1024
> -smp 2 -hda /root/rhel6.img'. I missed the '-hda' in the bug
> desc
> /* list of TBs jumping to this one. This is a circular list using
> the two least significant bits of the pointers to tell what is
> the next pointer: 0 = jmp_next[0], 1 = jmp_next[1], 2 =
> jmp_first */
> struct TranslationBlock *jmp_next[2];
> struct Trans
ubuntu.img is a disk image which has been installed OS.
(1) Create a raw image with the same size of ubuntu.img
qemu-img create -f raw test.raw 8G
(2) Create a add-cow image which will store dirty bitmap
qemu-img create -f add-cow test.add-cow -o
backing_file=ubuntu.img,image_file=test.raw
(3) Run
On 09/19/2011 03:04 PM, Michael S. Tsirkin wrote:
On Mon, Sep 19, 2011 at 12:22:02PM -0400, Stefan Berger wrote:
On 09/17/2011 03:28 PM, Michael S. Tsirkin wrote:
On Fri, Sep 16, 2011 at 12:46:40PM -0400, Stefan Berger wrote:
The checksuming I think makes sense if encryption is being added so
On 09/22/2011 07:05 AM, Xin Tong wrote:
I am new to QEMU, can anyone please tell me where the TB chaining code is in
QEMU ?
Actually, TB chaining was implemented via TB list. You might want to look at
Exec.c
In struct TranslationBlock, the following data are used to directly call
another TB
> I am studying QEMU, I would like to know that Is QEMU TB lookup based on
> guest system virtual address or physical address ?
QEMU lookups TB in two steps:
tb_find_fast (exec.c):
It'll try to use guest virtual address (pc) to index tb_jmp_cache.
tb = env->tb_jmp_cache[tb_jmp_cache
Consider this a friendly reminder that we're only three weeks away from the soft
feature freeze for 1.0. I've written a wiki page about my expectations for the
soft feature freeze. It's inlined here for easier commenting.
== What is the soft feature freeze? ==
The soft feature freeze is the
Hi,
I wanted to get the source for this kernel which is provided with the ARM disk
image tar ball. I wanted to build this kernel with some more modules, can I get
information how this kernel was built exactly.
Thanks,
Regards,
Gauresh Rane
I am new to QEMU, can anyone please tell me where the TB chaining code is in
QEMU ?
Thanks
Xin
I am studying QEMU, I would like to know that Is QEMU TB lookup based on
guest system virtual address or physical address ?
Thanks
Xin
[Originally sent to qemu-kvm list, but I was redirected here]
The Capabilities Pointer is NULL, so this bit shouldn't be set. The state of
this bit doesn't appear to change any behavior on Linux/Windows versions we've
tested, but it does cause Windows' PCI/PCI Express Compliance Test to balk.
I h
On Wed, 2011-09-21 at 15:02 +0200, erik.r...@rdsoftware.de wrote:
> Hi all,
>
> I'm searching for a switch to enable hyperthreading for my Windows XP
> Guest. Currently I only get 2 cores available in the taskmanager but listed
> 4 or 8 (depending on the smp-switch).
>
> After having read that XP
Need to check that guest slot/device number is not > 31 or walk off
the devfn table when checking if a devfn is available or not in a guest.
before this fix, passing in an addr=abc or addr=34,
can crash qemu, sometimes fail gracefully if data past end
of devfn table fails the availability test.
From: Jan Kiszka
There was no HPET on ISA boxes.
Signed-off-by: Jan Kiszka
---
hw/pc_piix.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/hw/pc_piix.c b/hw/pc_piix.c
index 52939f5..ec7da6d 100644
--- a/hw/pc_piix.c
+++ b/hw/pc_piix.c
@@ -157,6 +157,7 @@ static void p
From: Jan Kiszka
This is based on the original fix by Hervé Poussineau: pc_memory_init
actually takes a memory region for mapping BIOS and extension ROMs. That
equals the PCI memory region if PCI is available, but must be system
memory in the ISA case.
Signed-off-by: Jan Kiszka
---
hw/pc.c
From: Jan Kiszka
We need to initialize legacy_address_space during ISA VGA setup so that
the chain-4 alias can be registered properly.
Signed-off-by: Jan Kiszka
---
hw/vga-isa.c |1 +
1 files changed, 1 insertions(+), 0 deletions(-)
diff --git a/hw/vga-isa.c b/hw/vga-isa.c
index 0d19901..
From: Jan Kiszka
Do not try to map against the PCI bar in the ISA version of the device.
Signed-off-by: Jan Kiszka
---
hw/cirrus_vga.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/hw/cirrus_vga.c b/hw/cirrus_vga.c
index ec7ea82..c7e365b 100644
--- a/hw/cirrus_vga
This plus [1] reanimates -M isapc for me again.
Jan Kiszka (4):
pc: Unbreak ROM mapping for ISA machine
pc: Disable HPET for ISA machine
vga: Unbreak ISA support
cirrus: Unbreak ISA support
hw/cirrus_vga.c |4 ++--
hw/pc.c |8
hw/pc.h |2 +-
hw/pc_pii
Adds a 'trace_${name}_enabled' preprocessor define for each tracing event in
"trace.h".
This lets the user conditionally compile code with a relatively high execution
cost that is only necessary when producing the tracing information for an event
that is enabled.
Note that events using this defin
Richard Henderson writes:
> On 09/21/2011 08:50 AM, Lluís Vilanova wrote:
>> +void *complex = NULL;
>> +if (!size && !allow_zero_malloc()) {
>> +abort();
>> +}
>> +ptr = oom_check(malloc(size ? size : 1));
>> +#if trace_qemu_malloc_enabled
>> +
On 09/21/2011 08:50 AM, Lluís Vilanova wrote:
> +void *complex = NULL;
> +if (!size && !allow_zero_malloc()) {
> +abort();
> +}
> +ptr = oom_check(malloc(size ? size : 1));
> +#if trace_qemu_malloc_enabled
> +/* some complex computations to pr
---
audio/paaudio.c | 96 ---
1 files changed, 91 insertions(+), 5 deletions(-)
diff --git a/audio/paaudio.c b/audio/paaudio.c
index beed434..7ddc16d 100644
--- a/audio/paaudio.c
+++ b/audio/paaudio.c
@@ -664,15 +664,100 @@ static void qpa_fin
Signed-off-by: Yonit Halperin
---
configure.ac |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/configure.ac b/configure.ac
index 3a86515..e169f36 100644
--- a/configure.ac
+++ b/configure.ac
@@ -126,7 +126,7 @@ fi
dnl ===
Signed-off-by: Yonit Halperin
---
server/reds.c | 29 +
server/reds.h |4
2 files changed, 33 insertions(+), 0 deletions(-)
diff --git a/server/reds.c b/server/reds.c
index 9a983f8..99d52f9 100644
--- a/server/reds.c
+++ b/server/reds.c
@@ -73,6 +73,7 @@ s
Signed-off-by: Yonit Halperin
---
server/reds.c | 72 ++---
1 files changed, 43 insertions(+), 29 deletions(-)
diff --git a/server/reds.c b/server/reds.c
index ca4e1d1..6d2269c 100644
--- a/server/reds.c
+++ b/server/reds.c
@@ -761,6 +761,7
---
hw/ac97.c | 79 +
1 files changed, 79 insertions(+), 0 deletions(-)
diff --git a/hw/ac97.c b/hw/ac97.c
index ba94835..4a7c4ed 100644
--- a/hw/ac97.c
+++ b/hw/ac97.c
@@ -431,6 +431,63 @@ static void reset_voices (AC97LinkState *s, u
Signed-off-by: Yonit Halperin
---
server/reds.c | 86 +
1 files changed, 68 insertions(+), 18 deletions(-)
diff --git a/server/reds.c b/server/reds.c
index 845b0ee..e088b08 100644
--- a/server/reds.c
+++ b/server/reds.c
@@ -275,6 +275,7
Signed-off-by: Yonit Halperin
---
spice.proto |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/spice.proto b/spice.proto
index d5b954e..235ec95 100644
--- a/spice.proto
+++ b/spice.proto
@@ -219,6 +219,8 @@ channel MainChannel : BaseChannel {
uint8 *cert_subject
---
configure |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/configure b/configure
index c3044c7..4278eb1 100755
--- a/configure
+++ b/configure
@@ -1682,9 +1682,9 @@ for drv in $audio_drv_list; do
;;
pa)
-audio_drv_probe $drv pulse/simple.h "-lpulse-
---
audio/spiceaudio.c | 43 +++
1 files changed, 43 insertions(+), 0 deletions(-)
diff --git a/audio/spiceaudio.c b/audio/spiceaudio.c
index f972110..2df0957 100644
--- a/audio/spiceaudio.c
+++ b/audio/spiceaudio.c
@@ -202,7 +202,28 @@ static int line_ou
---
audio/audio.c |9 +++--
audio/audio_int.h |5 +
audio/audio_template.h |2 ++
3 files changed, 14 insertions(+), 2 deletions(-)
diff --git a/audio/audio.c b/audio/audio.c
index c759c1f..f830bb2 100644
--- a/audio/audio.c
+++ b/audio/audio.c
@@ -954,7 +954,9 @
Signed-off-by: Yonit Halperin
---
server/reds.c | 18 +-
1 files changed, 13 insertions(+), 5 deletions(-)
diff --git a/server/reds.c b/server/reds.c
index 76aa0ed..54c06d1 100644
--- a/server/reds.c
+++ b/server/reds.c
@@ -283,6 +283,7 @@ typedef struct RedsState {
int m
Signed-off-by: Yonit Halperin
---
server/reds.c | 68 +++-
1 files changed, 42 insertions(+), 26 deletions(-)
diff --git a/server/reds.c b/server/reds.c
index bea0eb0..e7388a0 100644
--- a/server/reds.c
+++ b/server/reds.c
@@ -2612,12 +2612,
It's a case by case, which will be added appropriately.
---
hw/ac97.c |1 -
1 files changed, 0 insertions(+), 1 deletions(-)
diff --git a/hw/ac97.c b/hw/ac97.c
index 4d4a658..ba94835 100644
--- a/hw/ac97.c
+++ b/hw/ac97.c
@@ -114,7 +114,6 @@ enum {
#define EACS_VRA 1
#define EACS_VRM 8
-#
(1) not sending anything to the client till we recieve SPICE_MSGC_MIGRATE_END
(2) start a new migration (handle client_migrate_info) only after
SPICE_MSGC_MIGRATE_END
from the previous migration has been received
(3) use the correct ticket
Signed-off-by: Yonit Halperin
---
server/reds.c |
Excellent! Thanks...
Alan
From: Jan KiszkaSent: Wed 9/21/2011 12:33 PMTo: Alan AmaralCc: qemu-devel@nongnu.org; r...@twiddle.netSubject: Re: pci_change_irq_level is broken...
On 2011-09-21 18:26, Alan Amaral wrote:
>
>
>
>
> From: Jan Kiszka
> Sent: Tue 9/20/2011 3:41 PM
> To: Alan
semi-seamless migration details:
migration source side
-
(1) spice_server_migrate_connect (*): tell client to link
to the target side - send SPICE_MSG_MAIN_MIGRATE_BEGIN.
This should be called upon client_migrate_info cmd.
client_migrate_info is asynchronous.
(2) Co
Signed-off-by: Yonit Halperin
---
server/reds.c | 56 +---
1 files changed, 33 insertions(+), 23 deletions(-)
diff --git a/server/reds.c b/server/reds.c
index e088b08..bea0eb0 100644
--- a/server/reds.c
+++ b/server/reds.c
@@ -2078,6 +2078,3
Ok. Cases to the contrary notwithstanding, what I'm seeing is the size of the
irq_count array
is 4 and the code is clearly accessing entry 4 and beyond. We are using Xen
(sorry if I didn't
mention that earlier).
#0 pci_change_irq_level (pci_dev=0x1c3a730, irq_num=4, change=0)
at
/home/aa
On 2011-09-21 18:26, Alan Amaral wrote:
>
>
>
>
> From: Jan Kiszka
> Sent: Tue 9/20/2011 3:41 PM
> To: Alan Amaral
> Cc: Richard Henderson; qemu-devel@nongnu.org
> Subject: Re: pci_change_irq_level is broken...
>
>> On 2011-09-20 21:19, Alan Amaral wrote:
>>> QEMU emulator version 0.14.50, C
same as the previous version with the following changes:
(1) I'm sending only the spice-server patches. I will send the client fixes
later.
(and then I will move the "Release 0.8.3" patch to the head).
(2) migration interface changes:
* spice_server_migrate_connect was added.
It is
From: Jan Kiszka
Sent: Tue 9/20/2011 3:41 PM
To: Alan Amaral
Cc: Richard Henderson; qemu-devel@nongnu.org
Subject: Re: pci_change_irq_level is broken...
> On 2011-09-20 21:19, Alan Amaral wrote:
> > QEMU emulator version 0.14.50, Copyright (c) 2003-2008 Fabrice Bellard
>
> (That's an ambiti
RHBZ 737921
Spice client is required to connect to the migration target before/as migration
starts. Since after migration starts, the target qemu is blocked and cannot
accept new spice client
we trigger the connection to the target upon client_migrate_info command.
client_migrate_info completion c
(1) send SPICE_MSG_MAIN_MIGRATE_BEGIN upon spice_server_migrate_connect
(2) wait for SPICE_MSGC_MAIN_MIGRATE_(CONNECTED|CONNECT_ERROR), or a timeout,
in order
to complete client_migrate_info monitor command
Signed-off-by: Yonit Halperin
---
common/messages.h |2 +
server/reds.c | 1
So we can easily fit it into smaller int.
We can just >>16 to fit it into a 16bits volume range for example.
---
audio/audio.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/audio/audio.c b/audio/audio.c
index f830bb2..33b6c23 100644
--- a/audio/audio.c
+++ b/audio/au
Signed-off-by: Yonit Halperin
---
NEWS |7 +++
configure.ac |2 +-
server/spice-server.syms |4
server/spice.h |2 +-
4 files changed, 13 insertions(+), 2 deletions(-)
diff --git a/NEWS b/NEWS
index ee6ceec..18168cb 100644
--- a
- we need the QEMU_HDA_AMP_CAPS for Spice to handle the volume of HDA
- without MIXEMU, volume control on the guest just feels wrong because
it has no effect (when it is not applied by the guest)
- after all, it's the role of qemu to emulate devices, and volume
effect shouldn't be excluded
--
It doesn't compile. The interesting bits for volume control are going
to be rewritten.
---
hw/ac97.c | 121 -
1 files changed, 0 insertions(+), 121 deletions(-)
diff --git a/hw/ac97.c b/hw/ac97.c
index 541d9a4..4d4a658 100644
--- a/hw/a
Unfortunately, pa_simple is a very limited API which doesn't let
us retrieve the associated pa_stream. It is needed to control the
volume of the stream.
---
audio/paaudio.c | 356 +--
1 files changed, 318 insertions(+), 38 deletions(-)
diff --g
Hi,
The qemu volume control experience could be improved. Without mixemu,
the volume control has no effect. A volume applet will just feel
broken (except in some cases where software volume is applied on guest
side, with HDA/Windows7 for example).
And a few other problems:
- the guest should h
---
audio/audio.c | 12
audio/audio_int.h |1 +
2 files changed, 13 insertions(+), 0 deletions(-)
diff --git a/audio/audio.c b/audio/audio.c
index 5649075..c759c1f 100644
--- a/audio/audio.c
+++ b/audio/audio.c
@@ -2050,17 +2050,29 @@ void AUD_del_capture (CaptureVoiceOut *
We will add a qemu call to spice_server_migrate_start when migration starts.
For now, it does nothing, but we may need this notification in the future.
Signed-off-by: Yonit Halperin
---
server/reds.c |8 +---
1 files changed, 1 insertions(+), 7 deletions(-)
diff --git a/server/reds.c b/
sorry, the right command to reproduce is 'qemu-system-x86_64 -m 1024
-smp 2 -hda /root/rhel6.img'. I missed the '-hda' in the bug
description.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/855633
Tit
semi-seamless migration RHBZ 738262
Signed-off-by: Yonit Halperin
---
NEWS |4
configure.ac |2 +-
spice/enums.h|2 ++
spice/protocol.h |6 +-
4 files changed, 12 insertions(+), 2 deletions(-)
diff --git a/NEWS b/NEWS
index f238abc..bb11ed2 100644
--
Adds a 'trace_${name}_enabled' preprocessor define for each tracing event in
"trace.h".
This lets the user conditionally compile code with a relatively high execution
cost that is only necessary when producing the tracing information for an event
that is enabled.
Note that events using this defin
- call spice_server_migrate_(start|end|connect).
- register spice_migrate_connect completion callback
Signed-off-by: Yonit Halperin
---
ui/spice-core.c | 56 ++-
1 files changed, 55 insertions(+), 1 deletions(-)
diff --git a/ui/spice-core.c
Spice client is required to connect to the migration target before/as migration
starts. Previously, it connected upon migration completion, however, the ticket
was set in the beginning, thus when migration time was >
ticket_expiration_time, spice failed to connect to the target.
Since the migratio
Public bug reported:
qemu.git commit: 6cc7686696f73ae87cadef4450776a488b0e0c8b
kvm.git commit: 7f914d61cd2156e34a7852462bb4932621f33a34
64-bit Windows guest cannot boot up, but 32-bit windows guest can boot
up successfully. For Win7, it will show blue scream of death when
booting up. For Windows
Signals the reset of the state a vCPU (CPUState structure).
Signed-off-by: Lluís Vilanova
---
target-arm/helper.c |3 +++
target-cris/translate.c |3 +++
target-i386/helper.c |3 +++
target-lm32/helper.c |3 +++
target-m68k/helper.c |
Implementation with 'CONFIG_USER_ONLY' is moved into new file 'cpus-user.c'.
Signed-off-by: Lluís Vilanova
---
Makefile.objs |1 +
cpus-user.c |8
qemu-common.h |4
3 files changed, 9 insertions(+), 4 deletions(-)
create mode 100644 cpus-user.c
diff --git a/Makefile
Signals the creation of a new vCPU (CPUState structure).
Signed-off-by: Lluís Vilanova
---
cpus-user.c |2 ++
cpus.c |2 ++
trace-events |7 +++
3 files changed, 11 insertions(+), 0 deletions(-)
diff --git a/cpus-user.c b/cpus-user.c
index c1e5e58..5db48d2 100644
--- a/cp
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/855630
I decided to give it, its own bug.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/739785
Title:
qemu-i386 user mode on ARMv5 host fails (b
Public bug reported:
qemu.git commit: 6cc7686696f73ae87cadef4450776a488b0e0c8b
kvm.git commit: 7f914d61cd2156e34a7852462bb4932621f33a34
It will costs about 180 seconds to booting up a rhel6 guest. But when I
use qemu-kvm.git with commit a040d28b, the rhel6 guest can boot up in
about 50 seconds.
Odd.. If I do ./configure --static --enable-sdl --target-list=i386
-linux-user this will work fine with 12.5 but on say 15 it cant find
SDL. I am on 1.2.13 I think.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpa
Okay I found that 12.5 I can run posix wine and that is compiling on my
own. gonna try the patch on 12.5 to see if it can run dynamic nptl
binaries
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/739785
Am 21.09.2011 01:10, schrieb Christoph Hellwig:
> Allow to resize images that reside on host devices up to the available
> space. This allows to grow images after resizing the device manually or
> vice versa.
>
> Signed-off-by: Christoph Hellwig
Thanks, applied to the block branch.
Kevin
Am 21.09.2011 16:02, schrieb Jan Kiszka:
> On 2011-09-21 15:57, Kevin Wolf wrote:
>> Am 20.09.2011 18:53, schrieb Jan Kiszka:
>>> Although there is nothing to wrap for non-POSIX here, redirecting thread
>>> and synchronization services to our core simplifies managements jobs
>>> like scheduling par
On 2011-09-21 15:57, Kevin Wolf wrote:
> Am 20.09.2011 18:53, schrieb Jan Kiszka:
>> Although there is nothing to wrap for non-POSIX here, redirecting thread
>> and synchronization services to our core simplifies managements jobs
>> like scheduling parameter adjustment. It also frees compat AIO fro
Am 20.09.2011 18:53, schrieb Jan Kiszka:
> Although there is nothing to wrap for non-POSIX here, redirecting thread
> and synchronization services to our core simplifies managements jobs
> like scheduling parameter adjustment. It also frees compat AIO from some
> duplicate code (/wrt qemu-thread).
Please ignore these patches.
Implementation of 'qemu_init_vcpu' in CONFIG_USER_ONLY must be moved into a C
file to avoid an include loop between trace.h and qemu-common.h
Ideas on which file this is supposed to go?
Lluis
Lluís Vilanova writes:
> Signed-off-by: Lluís Vilanova
> ---
> qemu-co
From: Paolo Bonzini
Signed-off-by: Paolo Bonzini
Signed-off-by: Kevin Wolf
---
nbd.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/nbd.c b/nbd.c
index 595f4d8..fb5e424 100644
--- a/nbd.c
+++ b/nbd.c
@@ -439,7 +439,7 @@ int nbd_client(int fd)
return ret;
}
#el
On 09/21/2011 03:40 PM, Kevin Wolf wrote:
>
> I think these two should be joinable. Otherwise, you might be
> destroying the apdu_thread_quit_mutex while the handle_apdu_thread
> hasn't yet finished unlocking it (even though it already progressed
> enough in qemu_mutex_destroy to release the
Am 21.09.2011 09:16, schrieb Paolo Bonzini:
> On 09/20/2011 06:53 PM, Jan Kiszka wrote:
>> -qemu_thread_create(&thread_id, event_thread, card);
>> -qemu_thread_create(&thread_id, handle_apdu_thread, card);
>> +qemu_thread_create(&thread_id, event_thread, card,
>> QEMU_THREAD_DETACHED);
From: Daniel Verkamp
Implement an I/O space index-data register pair as defined by the AHCI
spec, including the corresponding SATA PCI capability and BAR.
This allows real-mode code to access the AHCI registers; real-mode
code cannot address the memory-mapped register space because it is
beyond
Am 21.09.2011 12:55, schrieb n...@bytemark.co.uk:
> In QEMU master, attempting to read a cached block from a HTTP (or otherwise)
> mounted ISO causes an assert to be triggered, killing the entire QEMU process.
> It looks like this:
>
> hw/ide/pci.c:314: bmdma_cmd_writeb: Assertion `bm->bus->dma->a
Signed-off-by: Lluís Vilanova
---
qemu-common.h |4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diff --git a/qemu-common.h b/qemu-common.h
index 404c421..fca101e 100644
--- a/qemu-common.h
+++ b/qemu-common.h
@@ -297,7 +297,9 @@ struct qemu_work_item {
};
#ifdef CONFIG_USER_ONL
Signals the reset of the state a vCPU (CPUState structure).
Signed-off-by: Lluís Vilanova
---
target-arm/helper.c |3 +++
target-cris/translate.c |3 +++
target-i386/helper.c |3 +++
target-lm32/helper.c |3 +++
target-m68k/helper.c |
Signals the creation of a new vCPU (CPUState structure).
Signed-off-by: Lluís Vilanova
---
cpus.c|1 +
qemu-common.h |3 +++
trace-events |7 +++
3 files changed, 11 insertions(+), 0 deletions(-)
diff --git a/cpus.c b/cpus.c
index 8978779..2b4f9b8 100644
--- a/cpus.c
++
From: Nick Thomas
Signed-off-by: Nick Thomas
Signed-off-by: Kevin Wolf
---
block/curl.c | 26 ++
1 files changed, 22 insertions(+), 4 deletions(-)
diff --git a/block/curl.c b/block/curl.c
index f3f61cc..21fed93 100644
--- a/block/curl.c
+++ b/block/curl.c
@@ -76,6 +7
From: Nick Thomas
The previous behaviour was to finish AIOCBs inside curl_aio_readv()
if the data was cached. This caused the following failed assertion
at hw/ide/pci.c:314: bmdma_cmd_writeb
"Assertion `bm->bus->dma->aiocb == ((void *)0)' failed."
By scheduling a QEMUBH and performing the compl
The following changes since commit 27cdad67a1bc23b38c765b677ed8064bfb8d3e44:
Revert "alpha-softmmu: Disable for the 0.15 release branch." (2011-09-21
00:50:32 +0200)
are available in the git repository at:
git://repo.or.cz/qemu/kevin.git for-anthony
Daniel Verkamp (1):
ahci: add port
Hi all,
I'm searching for a switch to enable hyperthreading for my Windows XP
Guest. Currently I only get 2 cores available in the taskmanager but listed
4 or 8 (depending on the smp-switch).
After having read that XP supports only up to 2 cores but also with HT this
should show me 4 cores.
What
Am 21.09.2011 14:45, schrieb Stefan Hajnoczi:
> On Mon, Sep 12, 2011 at 3:47 PM, Devin Nakamura wrote:
> /* See qed_find_cluster(), especially how request->l2_table reference
> count works */
>> +int qed_find_cluster_sync(BDRVQEDState *s, QEDRequest *request, uint64_t
>> pos,
>> +
Am 21.09.2011 14:34, schrieb Kevin Wolf:
> Am 27.08.2011 11:12, schrieb Daniel Verkamp:
>> Implement an I/O space index-data register pair as defined by the AHCI
>> spec, including the corresponding SATA PCI capability and BAR.
>>
>> This allows real-mode code to access the AHCI registers; real-mod
On Mon, Sep 12, 2011 at 3:47 PM, Devin Nakamura wrote:
/* See qed_find_cluster(), especially how request->l2_table reference
count works */
> +int qed_find_cluster_sync(BDRVQEDState *s, QEDRequest *request, uint64_t pos,
> + size_t len, uint64_t *offset,
> +
On Mon, Sep 12, 2011 at 3:47 PM, Devin Nakamura wrote:
> +static int bdrv_qed_open_conversion_target(BlockDriverState *bs,
> + BlockConversionOptions
> *drv_options,
> + QEMUOptionParameter *usr_options,
> +
Am 27.08.2011 11:12, schrieb Daniel Verkamp:
> Implement an I/O space index-data register pair as defined by the AHCI
> spec, including the corresponding SATA PCI capability and BAR.
>
> This allows real-mode code to access the AHCI registers; real-mode
> code cannot address the memory-mapped regi
See this can run the posix wine.. But I cant recreate it. Its running
qemu-0.12.2 which you can download and compile but I still cant get it
to play solitaire like I can with the one below.
wget http://a.trap.me.uk/qemu-i386
--
You received this bug notification because you are a member of qemu
Please pull from
git://github.com/avikivity/qemu.git memory/core
to receive the following fix:
Michael Walle (1):
memory: fix subregion collision warning
memory.c | 13 -
1 files changed, 8 insertions(+), 5 deletions(-)
diff --git a/memory.c b/memory.c
index 101b67c..ba
1 - 100 of 174 matches
Mail list logo