Change the default on x86 hosts to building PIE (position independent
executables); instead of restricting the option to user-only targets,
apply it to all targets.
In addition, set the relocation sections to read-only (relro) when available;
this reduces the attack surface by disallowing changes
On 11/15/2011 12:41 AM, Anthony Liguori wrote:
Right now our specs are written in psuedo-wiki syntax. This series converts
them to markdown. markdown is a simple markup format that's gaining in
popularity.
The big advantage of using markdown is that there are tools that can convert
it
to
On 15 November 2011 08:00, Avi Kivity a...@redhat.com wrote:
@@ -1099,6 +1099,37 @@ for flag in $gcc_flags; do
fi
done
+if test $pie = yes -a $static = yes ; then
+ echo static and pie are mutually incompatible
+ exit 1
+fi
The -a operator to test has been marked obsolescent in
Adding qemu-devel ML to CC.
Your question should have been sent to qemu-devel ML because the logic
is implemented in QEMU, not KVM.
(2011/11/11 1:35), Oliver Hookins wrote:
Hi,
I am performing some benchmarks on KVM migration on two different types of VM.
One has 4GB RAM and the other 32GB.
Am 14.11.2011 22:08, schrieb Anthony Liguori:
On 11/14/2011 11:40 AM, Juan Quintela wrote:
Anthony Liguorialigu...@us.ibm.com wrote:
I think this is an accurate reflection of the state of migration today.
This
is the second release in a row where we're scrambling to fix a critical
issue
Change the default on x86 hosts to building PIE (position independent
executables); instead of restricting the option to user-only targets,
apply it to all targets.
In addition, set the relocation sections to read-only (relro) when available;
this reduces the attack surface by disallowing changes
On Mon, Nov 14, 2011 at 03:08:25PM -0600, Anthony Liguori wrote:
On 11/14/2011 11:40 AM, Juan Quintela wrote:
Anthony Liguorialigu...@us.ibm.com wrote:
I think this is an accurate reflection of the state of migration today.
This
is the second release in a row where we're scrambling to fix
Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp wrote:
Adding qemu-devel ML to CC.
Your question should have been sent to qemu-devel ML because the logic
is implemented in QEMU, not KVM.
(2011/11/11 1:35), Oliver Hookins wrote:
Hi,
I am performing some benchmarks on KVM migration on two
Hi,
I mean, change stable-0.15 so that if it is invoked with -M 0.14, you
get a rev 2 qxl device.
0.15 has qxl rev 2 too, 1.0 got rev 3. No need to do anything for
-stable. Also 0.15 didn't got its own machine type, so the pc-0.14
compat property (master branch) covers both 0.14 and 0.15.
On Tue, Nov 15, 2011 at 11:47:58AM +0100, ext Juan Quintela wrote:
Takuya Yoshikawa yoshikawa.tak...@oss.ntt.co.jp wrote:
Adding qemu-devel ML to CC.
Your question should have been sent to qemu-devel ML because the logic
is implemented in QEMU, not KVM.
(2011/11/11 1:35), Oliver
From: Matthias Brugger matthias@gmail.com
Signed-off-by: Matthias Brugger matthias@gmail.com
---
docs/libcacard.txt | 12 ++--
1 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/docs/libcacard.txt b/docs/libcacard.txt
index 5dee6fa..576af57 100644
---
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
hw/virtio-blk.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/hw/virtio-blk.c b/hw/virtio-blk.c
index 01aeb28..4a15f0c 100644
--- a/hw/virtio-blk.c
+++ b/hw/virtio-blk.c
@@ -481,14 +481,14 @@ static void
Signed-off-by: Benoit Canet benoit.ca...@gmail.com
---
hw/slavio_misc.c | 31 +++
1 files changed, 15 insertions(+), 16 deletions(-)
diff --git a/hw/slavio_misc.c b/hw/slavio_misc.c
index 7b98f11..60a115d 100644
--- a/hw/slavio_misc.c
+++ b/hw/slavio_misc.c
@@ -37,6
Signed-off-by: Benoit Canet benoit.ca...@gmail.com
---
hw/slavio_misc.c | 31 +++
1 files changed, 15 insertions(+), 16 deletions(-)
diff --git a/hw/slavio_misc.c b/hw/slavio_misc.c
index 29eca9b..7a51e1b 100644
--- a/hw/slavio_misc.c
+++ b/hw/slavio_misc.c
@@ -41,6
Signed-off-by: Benoit Canet benoit.ca...@gmail.com
---
hw/slavio_misc.c | 31 +++
1 files changed, 15 insertions(+), 16 deletions(-)
diff --git a/hw/slavio_misc.c b/hw/slavio_misc.c
index db266ba..29eca9b 100644
--- a/hw/slavio_misc.c
+++ b/hw/slavio_misc.c
@@ -40,6
Signed-off-by: Benoit Canet benoit.ca...@gmail.com
---
hw/sun4c_intctl.c | 32 +++-
1 files changed, 15 insertions(+), 17 deletions(-)
diff --git a/hw/sun4c_intctl.c b/hw/sun4c_intctl.c
index 5c7fdef..4d01d1c 100644
--- a/hw/sun4c_intctl.c
+++ b/hw/sun4c_intctl.c
@@
On Tue, Nov 15, 2011 at 11:57:14AM +, matthias@googlemail.com wrote:
From: Matthias Brugger matthias@gmail.com
Thanks!
Reviewed-by: Alon Levy al...@redhat.com
Signed-off-by: Matthias Brugger matthias@gmail.com
---
docs/libcacard.txt | 12 ++--
1 files
On 15 November 2011 09:34, Avi Kivity a...@redhat.com wrote:
Change the default on x86 hosts to building PIE (position independent
executables); instead of restricting the option to user-only targets,
apply it to all targets.
In addition, set the relocation sections to read-only (relro) when
Signed-off-by: Benoit Canet benoit.ca...@gmail.com
---
hw/sun4m_iommu.c | 31 +++
1 files changed, 15 insertions(+), 16 deletions(-)
diff --git a/hw/sun4m_iommu.c b/hw/sun4m_iommu.c
index 6eeadfa..86d135a 100644
--- a/hw/sun4m_iommu.c
+++ b/hw/sun4m_iommu.c
@@
.valid was used where the access size is specified like in
http://www.ibiblio.org/pub/historic-linux/early-ports/Sparc/NCR/NCR89C105.txt
.impl was used when the behavior is not known.
Benoît Canet (14):
slavio_misc: convert apc to memory API
slavio_misc: convert configuration to memory API
Pass-through security model in QEMU 9p server needs root privilege to do
few file operations (like chown, chmod to any mode/uid:gid). There are two
issues in pass-through security model
1) TOCTTOU vulnerability: Following symbolic links in the server could
provide access to files beyond 9p
Add file ownership interfaces like chmod/chown, utime update, rename,
remove and truncating files for proxy FS
Signed-off-by: M. Mohan Kumar mo...@in.ibm.com
---
Makefile|2 +-
fsdev/virtfs-proxy-helper.c | 66 +
hw/9pfs/virtio-9p-proxy.c | 134
Add interfaces to create filesystem objects like directory,
device nodes, symbolic links, links for proxy filesytem driver
Signed-off-by: M. Mohan Kumar mo...@in.ibm.com
---
fsdev/virtfs-proxy-helper.c | 105 --
hw/9pfs/virtio-9p-proxy.c | 173
Signed-off-by: M. Mohan Kumar mo...@in.ibm.com
---
fsdev/virtfs-proxy-helper.c | 165
hw/9pfs/virtio-9p-proxy.c | 174 +--
hw/9pfs/virtio-9p-proxy.h | 34 +
3 files changed, 367 insertions(+), 6
Add new proxy filesystem driver to add root privilege to qemu process.
It needs a helper process to be started by root user.
Following command line can be used to utilize proxy filesystem driver
-virtfs proxy,id=id,mount_tag=tag,socket_fd=socket-fd
Signed-off-by: M. Mohan Kumar mo...@in.ibm.com
Signed-off-by: Benoit Canet benoit.ca...@gmail.com
---
hw/slavio_misc.c | 32 +++-
1 files changed, 15 insertions(+), 17 deletions(-)
diff --git a/hw/slavio_misc.c b/hw/slavio_misc.c
index 7a51e1b..ccc1c53 100644
--- a/hw/slavio_misc.c
+++ b/hw/slavio_misc.c
@@
Move p9 marshaling/unmarshaling code to a separate file so that
proxy filesytem driver can use these calls. Also made marshaling
code generic to accept struct iovec instead of V9fsPDU.
Signed-off-by: M. Mohan Kumar mo...@in.ibm.com
---
Makefile.objs |2 +-
On Mon, Nov 14, 2011 at 06:55:18PM +0100, Kevin Wolf wrote:
Unlocking during COW allows for more parallelism. One change it requires is
that buffers are dynamically allocated instead of just using a per-image
buffer.
While touching the code, drop the synchronous qcow2_read() function and
Pass-through security model in QEMU 9p server needs root privilege to do
few file operations (like chown, chmod to any mode/uid:gid). There are two
issues in pass-through security model
1) TOCTTOU vulnerability: Following symbolic links in the server could
provide access to files beyond 9p
On Tue, Nov 15, 2011 at 12:07:53PM +0100, Paolo Bonzini wrote:
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
hw/virtio-blk.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
Works with existing x86 guests and does the right thing for big-endian
guests.
Reviewed-by:
Add xattr support for proxy FS
Signed-off-by: M. Mohan Kumar mo...@in.ibm.com
---
fsdev/virtfs-proxy-helper.c | 78 -
hw/9pfs/virtio-9p-proxy.c | 119 +++
hw/9pfs/virtio-9p-proxy.h |4 ++
3 files changed, 190
On 11/15/2011 01:13 PM, Benoît Canet wrote:
.valid was used where the access size is specified like in
http://www.ibiblio.org/pub/historic-linux/early-ports/Sparc/NCR/NCR89C105.txt
.impl was used when the behavior is not known.
Thanks, all applied except:
sun4c_intctl: convert to memory
Add proxy getversion to get generation number
Signed-off-by: M. Mohan Kumar mo...@in.ibm.com
---
fsdev/virtfs-proxy-helper.c | 74 +++
hw/9pfs/virtio-9p-proxy.c | 31 ++
hw/9pfs/virtio-9p-proxy.h |1 +
3 files changed, 106
Signed-off-by: Benoit Canet benoit.ca...@gmail.com
---
hw/slavio_intctl.c | 31 +++
1 files changed, 15 insertions(+), 16 deletions(-)
diff --git a/hw/slavio_intctl.c b/hw/slavio_intctl.c
index 329c251..0bc2a0b 100644
--- a/hw/slavio_intctl.c
+++
Signed-off-by: Benoit Canet benoit.ca...@gmail.com
---
hw/slavio_misc.c | 31 +++
1 files changed, 15 insertions(+), 16 deletions(-)
diff --git a/hw/slavio_misc.c b/hw/slavio_misc.c
index 60a115d..9110c64 100644
--- a/hw/slavio_misc.c
+++ b/hw/slavio_misc.c
@@ -38,6
Add interfaces to open and create files for proxy file system driver.
Signed-off-by: M. Mohan Kumar mo...@in.ibm.com
---
fsdev/virtfs-proxy-helper.c | 136 +++-
hw/9pfs/virtio-9p-proxy.c | 180 +--
hw/9pfs/virtio-9p-proxy.h
Provide root privilege access to QEMU 9p proxy filesystem using socket
communication.
Proxy helper is started by root user as:
~ # virtfs-proxy-helper -f|--fd socket descriptor -p|--path path-to-share
Signed-off-by: M. Mohan Kumar mo...@in.ibm.com
---
Makefile|3 +
Signed-off-by: Benoit Canet benoit.ca...@gmail.com
---
hw/slavio_timer.c | 41 -
1 files changed, 20 insertions(+), 21 deletions(-)
diff --git a/hw/slavio_timer.c b/hw/slavio_timer.c
index 84449ba..c23f990 100644
--- a/hw/slavio_timer.c
+++
From: Chen Wei-Ren che...@iis.sinica.edu.tw
Remove statement about libqemu.a from LICENSE.
Signed-off-by: Chen Wei-Ren che...@iis.sinica.edu.tw
---
LICENSE |4 +---
1 files changed, 1 insertions(+), 3 deletions(-)
diff --git a/LICENSE b/LICENSE
index cbd92c0..acae9a3 100644
--- a/LICENSE
From: Chen Wei-Ren che...@iis.sinica.edu.tw
Remove qruncom target from the Makefile file.
Signed-off-by: Chen Wei-Ren che...@iis.sinica.edu.tw
---
tests/Makefile |6 --
1 files changed, 0 insertions(+), 6 deletions(-)
diff --git a/tests/Makefile b/tests/Makefile
index
From: Chen Wei-Ren che...@iis.sinica.edu.tw
Remove libqemu example since libqemu.a is not available anymore.
Signed-off-by: Chen Wei-Ren che...@iis.sinica.edu.tw
---
tests/qruncom.c | 284 ---
1 files changed, 0 insertions(+), 284
From: Chen Wei-Ren che...@iis.sinica.edu.tw
According to [1], libqemu is not available anymore. Remove libqemu
related stuff from QEMU source tree.
[1] http://www.mail-archive.com/address@hidden/msg49809.html
v2:
- Remove entry qruncom.c from 3 Regression Tests in qemu-tech.texi.
- Undo the
On 11/15/2011 10:32 AM, Stefan Hajnoczi wrote:
It would help to have a migration wiki page or document that explains
the implications of migration on QEMU code - what to look out for in
device emulation code.
Although regular QEMU contributors may know the background on
migration/save/load,
On 11/14/2011 09:34 PM, Stefan Berger wrote:
On 11/14/2011 03:17 PM, Anthony Liguori wrote:
Hi,
This is a summary of the patches that I have queued in my next tree that were
identified as 1.1 candidates. These patches will not be applied until after
the 1.1 tree opens (December 1st).
These
On 11/15/2011 02:32 AM, Stefan Hajnoczi wrote:
On Mon, Nov 14, 2011 at 03:08:25PM -0600, Anthony Liguori wrote:
On 11/14/2011 11:40 AM, Juan Quintela wrote:
Anthony Liguorialigu...@us.ibm.com wrote:
I think this is an accurate reflection of the state of migration today. This
is the second
On 11/15/2011 07:20 AM, Juan Quintela wrote:
Again, I think defaulting DAS to cache=none|directsync is what makes
the most sense here.
I think it is the only sane solution. Otherwise, we need to write the
equivalent of a lock manager, to know _who_ has the storage, and
distributed lock
On 15 November 2011 13:51, Avi Kivity a...@redhat.com wrote:
Does markdown support rendering into man pages?
You can do this via pandoc:
http://johnmacfarlane.net/pandoc/
Alex
Hi all,
this small patch series prevents Qemu from waking up needlessly on Xen
several times a second in order to check some timers.
The first two patches stop Qemu from emulating the RTC and the PIT on
Xen, that are both already emulated in the hypervisor and consume
precious cpu cycles because
From: Stefano Stabellini stefano.stabell...@eu.citrix.com
There is no reason why the minimum timeout should be 1sec, it could
easily be 1h and we would safe lots of cpu cycles.
Signed-off-by: Stefano Stabellini stefano.stabell...@eu.citrix.com
---
qemu-timer.c |2 +-
1 files changed, 1
From: Stefano Stabellini stefano.stabell...@eu.citrix.com
Xen doesn't need full RTC emulation in Qemu because the RTC is already
emulated by the hypervisor. In particular we want to avoid the timers
initialization so that Qemu doesn't need to wake up needlessly.
Signed-off-by: Stefano Stabellini
On 11/15/2011 07:51 AM, Avi Kivity wrote:
On 11/15/2011 03:44 PM, Anthony Liguori wrote:
Nice. Suggest you enable rename detection, to make patches like these
easier to read (not that it truly matters in the particular case).
I haven't figured out yet how to make this sane to merge, but I've
From: Stefano Stabellini stefano.stabell...@eu.citrix.com
Use the newly introduced HVM_PARAM_BUFIOREQ_EVTCHN to receive
notifications for buffered io events.
After the first notification is received leave the event channel masked
and setup a timer to process the rest of the batch.
Once we have
On 11/15/2011 08:51 AM, stefano.stabell...@eu.citrix.com wrote:
From: Stefano Stabellinistefano.stabell...@eu.citrix.com
Xen doesn't need full RTC emulation in Qemu because the RTC is already
emulated by the hypervisor. In particular we want to avoid the timers
initialization so that Qemu
When converting lines like :
-cpu_register_physical_memory_offset(0x1f80, 0x1000,
-sh7750_io_memory, 0x1f80);
-cpu_register_physical_memory_offset(0xff80, 0x1000,
-sh7750_io_memory, 0x1f80);
The pre-1.0 firmware path for SCSI devices already included the LUN
using the suffix argument to add_boot_device_path. I missed that when
making channel and LUN customizable. Avoid that it is included twice, and
convert the colons to commas for consistency with other kinds of devices
Here is the first sneak peek of virtio-scsi. It's on top of my scsi-sg
branch at http://github.com/bonzini/qemu. I'm more interested
in getting early reviews in the virtio side, so I'm omitting the
scsi-specific patches that introduce support for scatter/gather I/O
in the SCSI layer.
What's
From: Stefan Hajnoczi stefa...@linux.vnet.ibm.com
Signed-off-by: Stefan Hajnoczi stefa...@linux.vnet.ibm.com
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
hw/virtio-scsi.c | 138 +-
1 files changed, 136 insertions(+), 2 deletions(-)
Hi,
One of the breakout sessions during the ovirt workshop [1] was about the guest
tools, and focused mainly on the ovirt-guest-agent [2].
One of the issues discussed there, was the various existing guest agents out
there, and the need to converge the efforts to a single agent that will serve
Signed-off-by: Paolo Bonzini pbonz...@redhat.com
---
hw/virtio-scsi.c | 111 ++---
1 files changed, 104 insertions(+), 7 deletions(-)
diff --git a/hw/virtio-scsi.c b/hw/virtio-scsi.c
index 5fc3c00..146ea6e 100644
--- a/hw/virtio-scsi.c
+++
On 11/15/2011 05:22 PM, Benoît Canet wrote:
When converting lines like :
-cpu_register_physical_memory_offset(0x1f80, 0x1000,
-sh7750_io_memory, 0x1f80);
-cpu_register_physical_memory_offset(0xff80, 0x1000,
-
On 11/15/2011 04:57 PM, Anthony Liguori wrote:
On 11/15/2011 05:25 AM, Peter Maydell wrote:
On 15 November 2011 09:34, Avi Kivitya...@redhat.com wrote:
Change the default on x86 hosts to building PIE (position independent
executables); instead of restricting the option to user-only targets,
On 11/15/2011 12:24 PM, Barak Azulay wrote:
Hi,
One of the breakout sessions during the ovirt workshop [1] was about the
guest
tools, and focused mainly on the ovirt-guest-agent [2].
One of the issues discussed there, was the various existing guest agents out
there, and the need to
On Tue, 2011-11-15 at 17:34 +1100, David Gibson wrote:
On Thu, Nov 03, 2011 at 02:12:24PM -0600, Alex Williamson wrote:
diff --git a/Documentation/vfio.txt b/Documentation/vfio.txt
new file mode 100644
index 000..5866896
--- /dev/null
+++ b/Documentation/vfio.txt
@@ -0,0 +1,304 @@
On 11/15/2011 01:01 PM, Perry Myers wrote:
On 11/15/2011 12:24 PM, Barak Azulay wrote:
Hi,
One of the breakout sessions during the ovirt workshop [1] was about the guest
tools, and focused mainly on the ovirt-guest-agent [2].
One of the issues discussed there, was the various existing guest
Change the default on x86 Linux hosts to building PIE (position
independent executables); instead of restricting the option to
user-only targets, apply it to all targets.
In addition, set the relocation sections to read-only (relro) when
available; this reduces the attack surface by disallowing
On Sun, Nov 13, 2011 at 8:56 PM, zanghongy...@huawei.com wrote:
From: Hongyong Zang zanghongy...@huawei.com
Ivshmem(nahanni) is a mechanism for sharing host memory with VMs running on
the same host. Currently, guest notifies qemu by reading or writing ivshmem
device's PCI MMIO
On 11/15/2011 12:06 PM, Stefan Weil wrote:
Am 15.11.2011 14:44, schrieb Anthony Liguori:
Markdown is nice for separated specs and README files,
but is it also possible to create a complete printed manual
from all markdown files?
I think high quality information beats pretty formatting any day.
On 11/15/2011 11:24 AM, Barak Azulay wrote:
Hi,
One of the breakout sessions during the ovirt workshop [1] was about the guest
tools, and focused mainly on the ovirt-guest-agent [2].
One of the issues discussed there, was the various existing guest agents out
there, and the need to converge
On 11/15/2011 11:24 AM, Barak Azulay wrote:
Hi,
One of the breakout sessions during the ovirt workshop [1] was about the guest
tools, and focused mainly on the ovirt-guest-agent [2].
One of the issues discussed there, was the various existing guest agents out
there, and the need to converge
On 11/15/2011 01:08 PM, Subhendu Ghosh wrote:
On 11/15/2011 01:01 PM, Perry Myers wrote:
On 11/15/2011 12:24 PM, Barak Azulay wrote:
Hi,
One of the breakout sessions during the ovirt workshop [1] was about
the guest
tools, and focused mainly on the ovirt-guest-agent [2].
One of the issues
On 11/15/2011 12:34 AM, David Gibson wrote:
I think we need to pin exactly what MAP_ANY means down better. Now,
VFIO is pretty much a lost cause if you can't map any normal process
memory page into the IOMMU, so I think the only thing that is really
covered is IOVAs. But saying can map any
On Tue, Nov 15, 2011 at 06:00:01PM +0100, Paolo Bonzini wrote:
Here is the first sneak peek of virtio-scsi. It's on top of my scsi-sg
branch at http://github.com/bonzini/qemu. I'm more interested
in getting early reviews in the virtio side, so I'm omitting the
scsi-specific patches that
On 11/15/11 12:10 PM, Scott Wood scottw...@freescale.com wrote:
On 11/15/2011 12:34 AM, David Gibson wrote:
snip
+static int allow_unsafe_intrs;
+module_param(allow_unsafe_intrs, int, 0);
+MODULE_PARM_DESC(allow_unsafe_intrs,
+Allow use of IOMMUs which do not support interrupt
On 11/15/2011 03:40 PM, Aaron Fabbri wrote:
On 11/15/11 12:10 PM, Scott Wood scottw...@freescale.com wrote:
On 11/15/2011 12:34 AM, David Gibson wrote:
snip
+static int allow_unsafe_intrs;
+module_param(allow_unsafe_intrs, int, 0);
+MODULE_PARM_DESC(allow_unsafe_intrs,
+
- Original Message -
On 11/15/2011 11:24 AM, Barak Azulay wrote:
Hi,
One of the breakout sessions during the ovirt workshop [1] was
about the guest
tools, and focused mainly on the ovirt-guest-agent [2].
One of the issues discussed there, was the various existing guest
On 11/15/2011 11:24 AM, Barak Azulay wrote:
Hi,
One of the breakout sessions during the ovirt workshop [1] was about the guest
tools, and focused mainly on the ovirt-guest-agent [2].
One of the issues discussed there, was the various existing guest agents out
there, and the need to converge
On 14.11.2011, at 04:18, David Gibson wrote:
This series contains a number of small bugfixes for the pseries
machine.
Which ones of these would you push for 1.0?
Alex
From: Michael Ellerman mich...@ellerman.id.au
When the user creates a device on the command line with -device, they
can specify the id, using id=foo. Currently the VIO bus code overwrites
this id with it's own value. We should only set qdev.id if it is not
already set by the user.
The device
On Wednesday 16 November 2011 02:42:30 Alexander Graf wrote:
On 16.11.2011, at 00:01, Michael Roth wrote:
But practically-speaking, it's unavoidable that qemu-specific management
tooling will need to communicate with qemu (via QMP/libqmp/HMP/etc, or
by proxy via libvirt). It's through those
it's compiled on windows 2003 and using mingw gcc version 4.6.1
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/891002
Title:
windows mingw compiled qemu-system-x86_64 crash on startup
Status in
On 11/15/2011 09:33 PM, Michael S. Tsirkin wrote:
What's missing is 1) support for writable config space, 2) testing TMF,
3) events; 4) migration. The last two do not need to be in at the
first commit, they can come later.
Tested lightly with a seabios driver (see the seabios ML). The
81 matches
Mail list logo