Cc:qemu-sta...@nongnu.org
Thanks,
Marcel
On 2/14/19 5:40 PM, Marcel Apfelbaum wrote:
Configuring QEMU with:
configure --target-list="x86_64-softmmu" --cc=clang --enable-pvrdma
Results in:
qemu/hw/rdma/rdma_rm_defs.h:108:3: error: redefinition of typedef
'RdmaDeviceResources' is a
Dear List!
I have a big problem and hope you can help me.
I built a new windows 2016 domain with virtual servers. 2 dc and 9 rds
hosts.
I was nearly finished with the setup and ready to migrate the users from
old to new domain.
Then i had to restart the physical servers. Unfortunately 1 dc and 2
Dear List!
I have a big problem and hope you can help me.
I built a new windows 2016 domain with virtual servers. 2 dc and 9 rds
hosts.
I was nearly finished with the setup and ready to migrate the users from
old to new domain.
Then i had to restart the physical servers. Unfortunately 1 dc and 2
Tested here with versions of pc-i440fx-XX and it didn't work here on
qemu-server 5.0-46, qemu 2.12.1-1
Didn't work.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1685242
Title:
ovmf hangs at efi
On Fri, Feb 15, 2019 at 12:14:32PM +0100, Igor Mammedov wrote:
>On Thu, 14 Feb 2019 20:53:31 +
>Wei Yang wrote:
>
>> On Thu, Feb 14, 2019 at 12:25:27PM +0100, Igor Mammedov wrote:
>> >On Thu, 14 Feb 2019 08:52:25 +0800
>> >Wei Yang wrote:
>> >
>> >> Currently we do device realization like
On Sat, Feb 16, 2019 at 10:11 PM David Kiarie
wrote:
>
>
> -- Forwarded message -
> From: Alexandro Sánchez Bach
> Date: Wed, Jan 31, 2018 at 2:29 AM
> Subject: QEMU: AMD IOMMU implementation bugs
> To:
>
>
> Hey David,
>
> hello Mr Alexandro Sanchez Bach,
>
> I'm working with
-- Forwarded message -
From: Alexandro Sánchez Bach
Date: Wed, Jan 31, 2018 at 2:29 AM
Subject: QEMU: AMD IOMMU implementation bugs
To:
Hey David,
hello Mr Alexandro Sanchez Bach,
I'm working with your AMD IOMMU implementation since I'm writing a
PlayStation 4 emulator. I
Hi Pavel,
On 2/11/19 6:34 AM, Pavel Dovgalyuk wrote:
> Ping.
You forgot to Cc Aleksandar, to get his MIPS maintainer Ack-by:
./scripts/get_maintainer.pl -f target/mips/helper.c
Aleksandar Markovic (maintainer:MIPS)
>
> Pavel Dovgalyuk
>
>> -Original Message-
>> From: Pavel Dovgalyuk
On Sat, 16 Feb 2019 17:51:11 +0100
Knut Omang wrote:
> Implementing an ACS capability on downstream ports and multifunction
> endpoints indicates isolation and IOMMU visibility to a finer
> granularity. This creates smaller IOMMU groups in the guest and thus
> more flexibility in assigning
Markus Armbruster writes:
> Markus Armbruster writes:
>
>> Laszlo Ersek writes:
>>
>>> On 02/15/19 13:28, Alex Bennée wrote:
It looks like there was going to be code to check we had some sort of
alignment so lets replace it with an actual check. This is a bit more
useful than
On 2/15/19 1:47 PM, Laurent Vivier wrote:
> It seems it crashes during futex syscall:
>
> ...
> [pid 4] getpid()= 4
> [pid 4] tgkill(4, 24, SIGRT_1) = 0
> [pid24] <... futex resumed> ) = ? ERESTARTSYS (To be restarted if
> SA_RESTART is set)
> [pid
These two patches together implements a PCIe capability
config space header for Access Control Services (ACS) for the
new Qemu specific generic root port. ACS support in the
associated root port is needed for passing
individual functions of a device populating the port through to
an L2 guest from
Implementing an ACS capability on downstream ports and multifunction
endpoints indicates isolation and IOMMU visibility to a finer
granularity. This creates smaller IOMMU groups in the guest and thus
more flexibility in assigning endpoints to guest userspace or an L2
guest.
Signed-off-by: Knut
Claim ACS support in the generic PCIe root port to allow
passthrough of individual functions of a device to different
guests (in a nested virt.setting) with VFIO.
Without this patch, all functions of a device, such as all VFs of
an SR/IOV device, will end up in the same IOMMU group.
A similar
Hi
On Fri, Feb 15, 2019 at 4:58 PM Daniel P. Berrangé wrote:
>
> Add a QAuthZListFile object type that implements the QAuthZ interface. This
> built-in implementation is a proxy around the QAuthZList object type,
> initializing it from an external file, and optionally, automatically
> reloading
Hi
On Fri, Feb 15, 2019 at 4:58 PM Daniel P. Berrangé wrote:
>
> From: "Daniel P. Berrange"
>
> Add a QAuthZList object type that implements the QAuthZ interface. This
> built-in implementation maintains a trivial access control list with a
> sequence of match rules and a final default policy.
Hi
On Fri, Feb 15, 2019 at 4:58 PM Daniel P. Berrangé wrote:
>
> In many cases a single VM will just need to whilelist a single identity
whitelist
> as the allowed user of network services. This is especially the case for
> TLS live migration (optionally with NBD storage) where we just need to
Hi
On Fri, Feb 15, 2019 at 6:13 PM Daniel P. Berrangé wrote:
>
> The inotify userspace API for reading events is quite horrible, so it is
> useful to wrap it in a more friendly API to avoid duplicating code
> across many users in QEMU. Wrapping it also allows introduction of a
> platform
Hi
On Fri, Feb 15, 2019 at 4:57 PM Daniel P. Berrangé wrote:
>
> The internal inotify APIs allow a lot of conditional statements to be
> cleared out, and provide a simpler callback for handling events.
>
> Signed-off-by: Daniel P. Berrangé
Reviewed-by: Marc-André Lureau
> ---
>
Laszlo Ersek writes:
> On 02/15/19 17:01, Markus Armbruster wrote:
>
>> Let's take a step back and consider sane requirements.
>>
>> The size of the flash chip is a property of the machine. It is *fixed*.
>
> I'll have to disagree on this one; in OVMF's case, you can build OVMF in
> 1MB, 2MB,
20 matches
Mail list logo