[Bug 1766841] Re: QEMU 2.12 Running Problem in Windows 7 Installation

2019-10-05 Thread André Chalella
I discovered that the following directory is not installed when the "Desktop icons" component is unchecked during installation: qemu\share\icons Such directory contains two subdirectories: "Adwaita" and "hicolor". When they're present, the bug does not occur. -- You received this bug

Re: bitmap migration bug with -drive while block mirror runs

2019-10-05 Thread John Snow
On 10/4/19 9:07 AM, Eric Blake wrote: > On 10/4/19 4:24 AM, Vladimir Sementsov-Ogievskiy wrote: > >>> The way I see it, we know an auto-generated node name will never be >>> correct, but an explicitly specified one represents an explicit user >>> configuration. >>> >>> It's wrong to use

Re: bitmap migration bug with -drive while block mirror runs

2019-10-05 Thread John Snow
On 10/4/19 4:33 AM, Peter Krempa wrote: > On Thu, Oct 03, 2019 at 19:34:56 -0400, John Snow wrote: >> On 10/3/19 6:14 AM, Vladimir Sementsov-Ogievskiy wrote: >>> 03.10.2019 0:35, John Snow wrote: On 10/2/19 6:46 AM, Peter Krempa wrote: >>> > > [...] > > (I'm sorry if I ignored

Re: [PATCH v2] target/ppc: Fix for optimized vsl/vsr instructions

2019-10-05 Thread David Gibson
On Fri, Oct 04, 2019 at 01:52:41PM -0500, Paul Clarke wrote: > On 10/4/19 8:43 AM, Stefan Brankovic wrote: > > In previous implementation, invocation of TCG shift function could request > > shift of TCG variable by 64 bits when variable 'sh' is 0, which is not > > supported in TCG (values can be

Re: [PATCH 2/7] spapr, xive: Turn "nr-ends" property into "nr-servers" property

2019-10-05 Thread David Gibson
On Fri, Oct 04, 2019 at 08:51:19AM +0200, Greg Kurz wrote: > On Fri, 4 Oct 2019 14:07:25 +1000 > David Gibson wrote: > > > On Thu, Oct 03, 2019 at 02:01:13PM +0200, Greg Kurz wrote: > > > The sPAPR XIVE object has an nr_ends field which happens to be a > > > multiple of

Re: [PATCH] xics: Make some device types not user creatable

2019-10-05 Thread David Gibson
On Fri, Oct 04, 2019 at 10:37:47AM +0200, Greg Kurz wrote: > Some device types of the XICS model are exposed to the QEMU command > line: > > $ ppc64-softmmu/qemu-system-ppc64 -device help | grep ic[sp] > name "icp" > name "ics" > name "ics-spapr" > name "pnv-icp", desc "PowerNV ICP" > > These

Re: [PATCH] xive: Make some device types not user creatable

2019-10-05 Thread David Gibson
On Fri, Oct 04, 2019 at 09:38:50AM +0200, Greg Kurz wrote: 65;5603;1c> Some device types of the XIVE model are exposed to the QEMU command > line: > > $ ppc64-softmmu/qemu-system-ppc64 -device help | grep xive > name "xive-end-source", desc "XIVE END Source" > name "xive-source", desc "XIVE

[PATCH 2/3] migration/postcopy: postpone setting PostcopyState to END

2019-10-05 Thread Wei Yang
There are two places to call function postcopy_ram_incoming_cleanup() postcopy_ram_listen_thread on migration success loadvm_postcopy_handle_listen one setup failure On success, the vm will never accept another migration. On failure, PostcopyState is transited from LISTENING to END and

[PATCH 3/3] migration/postcopy: replace have_listen_thread check with PostcopyState check

2019-10-05 Thread Wei Yang
After previous cleanup, postcopy thread is running only when PostcopyState is LISTENNING or RUNNING. This means it is not necessary to spare a variable have_listen_thread to represent the state. Replace the check on have_listen_thread with PostcopyState and remove the variable. Signed-off-by:

[PATCH 1/3] migration/postcopy: mis->have_listen_thread check will never be touched

2019-10-05 Thread Wei Yang
If mis->have_listen_thread is true, this means current PostcopyState must be LISTENING or RUNNING. While the check at the beginning of the function makes sure the state transaction happens when its previous PostcopyState is ADVISE or DISCARD. This means we would never touch this check.

[PATCH 0/3] migration/postcopy: replace have_listen_thread check with PostcopyState check

2019-10-05 Thread Wei Yang
have_listen_thread is used to be a indication of whether postcopy thread is running. Since we use PostcopyState to record state and the postcopy thread only runs when postcopy_is_running(), we can leverage the PostcopyState to replace the meaning of have_listen_thread. To do so, two preparation

[PATCH 0/4] migration: trivial cleanup and refine

2019-10-05 Thread Wei Yang
This patch set contains several cleanup and refine for migration. simplify some calculation reuse the result fix typo in comment provide error message when failed Wei Yang (4): migration/ram: only possible bit set in invalid_flags is RAM_SAVE_FLAG_COMPRESS_PAGE

Re: [PATCH v6 00/10] Introduce the microvm machine type

2019-10-05 Thread Michael S. Tsirkin
On Fri, Oct 04, 2019 at 11:37:42AM +0200, Sergio Lopez wrote: > Microvm is a machine type inspired by Firecracker and constructed > after the its machine model. > > It's a minimalist machine type without PCI nor ACPI support, designed > for short-lived guests. Microvm also establishes a baseline

[PATCH 4/4] migration: report SaveStateEntry id and name on failure

2019-10-05 Thread Wei Yang
This provides helpful information on which entry failed. Signed-off-by: Wei Yang --- migration/savevm.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/migration/savevm.c b/migration/savevm.c index 9f0122583d..feb757de79 100644 --- a/migration/savevm.c +++ b/migration/savevm.c @@ -1215,6

[PULL 16/19] tests/acpi: add expected tables for arm/virt

2019-10-05 Thread Michael S. Tsirkin
Signed-off-by: Michael S. Tsirkin --- tests/bios-tables-test-allowed-diff.h | 16 tests/data/acpi/virt/APIC.memhp | Bin 0 -> 168 bytes tests/data/acpi/virt/APIC.numamem | Bin 0 -> 168 bytes tests/data/acpi/virt/DSDT | Bin 18476 -> 18470 bytes

[PATCH 3/4] migration: pass in_postcopy instead of check state again

2019-10-05 Thread Wei Yang
Not necessary to do the check again. Signed-off-by: Wei Yang --- migration/migration.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/migration/migration.c b/migration/migration.c index c8eaa85867..56031305e3 100644 --- a/migration/migration.c +++ b/migration/migration.c

[PULL 13/19] tests: allow empty expected files

2019-10-05 Thread Michael S. Tsirkin
An empty expected file is a handy way to seed the files without creating merge conflicts. Signed-off-by: Michael S. Tsirkin --- tests/bios-tables-test.c | 5 - 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/tests/bios-tables-test.c b/tests/bios-tables-test.c index

[PULL 15/19] tests: document how to update acpi tables

2019-10-05 Thread Michael S. Tsirkin
Looks like no one understands how to do it. Document the process. Signed-off-by: Michael S. Tsirkin --- tests/bios-tables-test.c | 27 +++ 1 file changed, 27 insertions(+) diff --git a/tests/bios-tables-test.c b/tests/bios-tables-test.c index 652a78773f..0b33fb265f

[PULL 11/19] tests: Update ACPI tables list for upcoming arm/virt tests

2019-10-05 Thread Michael S. Tsirkin
From: Shameer Kolothum This is in preparation to add numamem and memhp tests to arm/virt platform. The bios-tables-test-allowed-diff.h is updated with a list of expected ACPI tables that needs to be present in tests/data/acpi/virt folder. Signed-off-by: Shameer Kolothum Message-Id:

[PATCH 2/4] migration/postcopy: fix typo in mark_postcopy_blocktime_begin's comment

2019-10-05 Thread Wei Yang
Signed-off-by: Wei Yang --- migration/postcopy-ram.c | 8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/migration/postcopy-ram.c b/migration/postcopy-ram.c index d2bdd21ae3..a394c7c3a6 100644 --- a/migration/postcopy-ram.c +++ b/migration/postcopy-ram.c @@ -768,9 +768,11

[PULL 14/19] tests: Add bios tests to arm/virt

2019-10-05 Thread Michael S. Tsirkin
From: Shameer Kolothum This adds numamem and memhp tests for arm/virt platform. Signed-off-by: Shameer Kolothum Reviewed-by: Igor Mammedov Message-Id: <20190918130633.4872-12-shameerali.kolothum.th...@huawei.com> Acked-by: Peter Maydell Reviewed-by: Michael S. Tsirkin Signed-off-by: Michael

[PULL 12/19] tests/acpi: add empty files

2019-10-05 Thread Michael S. Tsirkin
Needed to make tests pass. Will replace with actual files. Signed-off-by: Michael S. Tsirkin --- tests/data/acpi/virt/APIC.memhp | 0 tests/data/acpi/virt/APIC.numamem | 0 tests/data/acpi/virt/DSDT.memhp | 0 tests/data/acpi/virt/DSDT.numamem | 0 tests/data/acpi/virt/FACP.memhp | 0

[PULL 09/19] hw/arm: Use GED for system_powerdown event

2019-10-05 Thread Michael S. Tsirkin
From: Shameer Kolothum For machines 4.2 or higher with ACPI boot use GED for system_powerdown event instead of GPIO. Guest boot with DT still uses GPIO. Signed-off-by: Shameer Kolothum Reviewed-by: Eric Auger Reviewed-by: Igor Mammedov Message-Id:

[PATCH 1/4] migration/ram: only possible bit set in invalid_flags is RAM_SAVE_FLAG_COMPRESS_PAGE

2019-10-05 Thread Wei Yang
The only possible bit set in invalid_flags is RAM_SAVE_FLAG_COMPRESS_PAGE at the beginning of function ram_load_precopy(), which means it is not necessary to do another check for RAM_SAVE_FLAG_COMPRESS_PAGE bit. Signed-off-by: Wei Yang --- migration/ram.c | 5 + 1 file changed, 1

[PULL 10/19] docs/specs: Add ACPI GED documentation

2019-10-05 Thread Michael S. Tsirkin
From: Shameer Kolothum Documents basic concepts of ACPI Generic Event device(GED) and interface between QEMU and the ACPI BIOS. Signed-off-by: Shameer Kolothum Reviewed-by: Eric Auger Message-Id: <20190918130633.4872-10-shameerali.kolothum.th...@huawei.com> Acked-by: Peter Maydell

[PULL 07/19] hw/arm/virt-acpi-build: Add PC-DIMM in SRAT

2019-10-05 Thread Michael S. Tsirkin
From: Shameer Kolothum Generate Memory Affinity Structures for PC-DIMM ranges. Also, Linux and Windows need ACPI SRAT table to make memory hotplug work properly, however currently QEMU doesn't create SRAT table if numa options aren't present on CLI. Hence add support(>=4.2) to create numa node

[PULL 05/19] hw/arm/virt: Add memory hotplug framework

2019-10-05 Thread Michael S. Tsirkin
From: Eric Auger This patch adds the memory hot-plug/hot-unplug infrastructure in machvirt. The device memory is not yet exposed to the Guest either through DT or ACPI and hence both cold/hot plug of memory is explicitly disabled for now. Signed-off-by: Eric Auger Signed-off-by: Kwangwoo Lee

[PULL 08/19] hw/arm: Factor out powerdown notifier from GPIO

2019-10-05 Thread Michael S. Tsirkin
From: Shameer Kolothum This is in preparation of using GED device for system_powerdown event. Make the powerdown notifier registration independent of create_gpio() fn. Signed-off-by: Shameer Kolothum Reviewed-by: Eric Auger Reviewed-by: Igor Mammedov Message-Id:

[PULL 06/19] hw/arm/virt: Enable device memory cold/hot plug with ACPI boot

2019-10-05 Thread Michael S. Tsirkin
From: Shameer Kolothum This initializes the GED device with base memory and irq, configures ged memory hotplug event and builds the corresponding aml code. With this, both hot and cold plug of device memory is enabled now for Guest with ACPI boot. Memory cold plug support with Guest DT boot is

[PULL 04/19] hw/acpi: Add ACPI Generic Event Device Support

2019-10-05 Thread Michael S. Tsirkin
From: Samuel Ortiz The ACPI Generic Event Device (GED) is a hardware-reduced specific device[ACPI v6.1 Section 5.6.9] that handles all platform events, including the hotplug ones. This patch generates the AML code that defines GEDs. Platforms need to specify their own GED Event bitmap to

[PULL 00/19] virtio, vhost, acpi: features, fixes, tests

2019-10-05 Thread Michael S. Tsirkin
A couple of tweaks to the bios table test weren't reviewed yet but as they are really helpful to the arm tests I'm pushing, and affecting only the test so fairly benign (dropped assert + a comment), I cut a corner and pushed them straight away. Will be easy to tweak with a patch on top or revert.

[PULL 02/19] hw/acpi: Make ACPI IO address space configurable

2019-10-05 Thread Michael S. Tsirkin
From: Shameer Kolothum This is in preparation for adding support for ARM64 platforms where it doesn't use port mapped IO for ACPI IO space. We are making changes so that MMIO region can be accommodated and board can pass the base address into the aml build function. Also move few MEMORY_*

[PULL 03/19] hw/acpi: Do not create memory hotplug method when handler is not defined

2019-10-05 Thread Michael S. Tsirkin
From: Samuel Ortiz With Hardware-reduced ACPI, the GED device will manage ACPI hotplug entirely. As a consequence, make the memory specific events AML generation optional. The code will only be added when the method name is not NULL. Signed-off-by: Samuel Ortiz Signed-off-by: Shameer Kolothum

Re: [PATCH v4] intel_iommu: TM field should not be in reserved bits

2019-10-05 Thread Michael S. Tsirkin
On Mon, Sep 30, 2019 at 01:04:51PM +0800, qi1.zh...@intel.com wrote: > From: "Zhang, Qi" > > When dt is supported, TM field should not be Reserved(0). > > Refer to VT-d Spec 9.8 > > Signed-off-by: Zhang, Qi > Signed-off-by: Qi, Yadong I am guessing this is really a 2 patch series right? So

Re: [PATCH 00/11] hw: Convert various reset() handler to DeviceReset

2019-10-05 Thread Michael S. Tsirkin
On Thu, Sep 26, 2019 at 05:17:22PM +0200, Philippe Mathieu-Daudé wrote: > Hi. > > Following the thread discussion between Peter/Markus/Damien about > reset handlers: > https://www.mail-archive.com/qemu-devel@nongnu.org/msg617103.html > I started to remove qemu_register_reset() calls from few

[PATCH] tests: document how to update acpi tables

2019-10-05 Thread Michael S. Tsirkin
Looks like no one understands how to do it. Document the process. Signed-off-by: Michael S. Tsirkin --- tests/bios-tables-test.c | 27 +++ 1 file changed, 27 insertions(+) diff --git a/tests/bios-tables-test.c b/tests/bios-tables-test.c index 652a78773f..0b33fb265f

[PATCH 1/1] MAINTAINERS: Add Vladimir as a reviewer for bitmaps

2019-10-05 Thread John Snow
I already try to make sure all bitmaps patches have been reviewed by both Red Hat and Virtuozzo anyway, so this formalizes the arrangement. Fam meanwhile is no longer as active, so I am removing him as a co-maintainer simply to reflect the current practice. Signed-off-by: John Snow ---

[PATCH 0/1] MAINTAINERS: Add Vladimir as a reviewer for bitmaps

2019-10-05 Thread John Snow
Hi; I'll be going away on an extended trip this November and have made arrangements for reviews to be handled in my absence. I've asked Vladimir to take point on any reviews for patches he didn't author, and have asked Eric to take point on reviewing any of Vladimir's patches for this tree.

Re: Peculiar reply from mail list handler???

2019-10-05 Thread Peter Maydell
On Sat, 5 Oct 2019 at 18:13, John Snow wrote: > I'm not clear on the particulars of mail delivery protocols or what > lists.sr.ht is, but we indeed do not like HTML mail sent to this list. I suspect the lists.sr.ht address is just some subscriber to the QEMU mailing list -- the list server sent

Re: Peculiar reply from mail list handler???

2019-10-05 Thread Lucien Murray-Pitts
Hi John, On Sun, Oct 6, 2019 at 2:12 AM John Snow wrote: > On 10/5/19 7:55 AM, Lucien Murray-Pitts wrote: > > The last message I sent came back with a weird reply from [snip] > > I'm not clear on the particulars of mail delivery protocols or what > lists.sr.ht is, but we indeed do not like HTML

Re: Peculiar reply from mail list handler???

2019-10-05 Thread John Snow
On 10/5/19 7:55 AM, Lucien Murray-Pitts wrote: > Hey folks, > > The last message I sent came back with a weird reply from > *mai...@lists.sr.ht*, claiming the list didnt support "HTML" formatted > mail (which is the default) for gmail, and then saying it couldnt be > delivered. > > Thats a

[PATCH 5/5] tests/boot_linux_console: Add sdcard test for the Exynos4210

2019-10-05 Thread Philippe Mathieu-Daudé
This test boots a Linux kernel on a smdkc210 board and verify the serial output is working. The cpio image used comes from the linux-build-test project: https://github.com/groeck/linux-build-test Since this test is not reliable due to clock timing issues, it is disabled with the 'skip' property.

[PATCH 1/5] tests/boot_linux_console: Add initrd test for the Exynos4210

2019-10-05 Thread Philippe Mathieu-Daudé
This test boots a Linux kernel on a smdkc210 board and verify the serial output is working. The cpio image used comes from the linux-build-test project: https://github.com/groeck/linux-build-test If ARM is a target being built, "make check-acceptance" will automatically include this test by the

[PATCH 4/5] hw/arm/exynos4210: Use the Samsung s3c SDHCI controller

2019-10-05 Thread Philippe Mathieu-Daudé
The Exynos SoC has specific SDHCI registers. Use the s3c SDHCI model which handle these specific registers. This silents the following "SDHC ... not implemented" warnings so we can focus on the important registers missing: $ qemu-system-arm ... -d unimp \ -append "... root=/dev/mmcblk0

[PATCH 0/5] hw/arm/exynos4210: Add acceptance tests to the SMDKC210 board

2019-10-05 Thread Philippe Mathieu-Daudé
Hi all, Yesterday Peter Maydell asked on IRC if I had any working Exynos4 image. I looked at some old backuped notes and could boot Guenter initrd with BusyBox. I'll use this cover letter to share my notes, they might help to have this board fully usable again. This board is listed as "Odd

[PATCH 3/5] hw/sd/sdhci: Add dummy Samsung SDHCI controller

2019-10-05 Thread Philippe Mathieu-Daudé
The Linux kernel access few S3C-specific registers [1] to set some clock. We don't care about this part for device emulation [2]. Add a dummy device to properly ignore these accesses, so we can focus on the important registers missing. [1]

[PATCH 2/5] hw/sd/sdhci: Add a comment to distinct the i.MX eSDHC functions

2019-10-05 Thread Philippe Mathieu-Daudé
This file keeps the various QDev blocks separated by comments. Signed-off-by: Philippe Mathieu-Daudé --- hw/sd/sdhci.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/hw/sd/sdhci.c b/hw/sd/sdhci.c index e08ec3e398..82ec5c1b4a 100644 --- a/hw/sd/sdhci.c +++ b/hw/sd/sdhci.c

Re: [PATCH] hw/dma/etraxfs_dma: Simplify using MemoryRegionOps::impl access_size

2019-10-05 Thread Peter Maydell
On Sat, 5 Oct 2019 at 16:04, Philippe Mathieu-Daudé wrote: > > This device implementation is clearly restricted to 32-bit > accesses. Set the MemoryRegionOps::impl min/max access_size > fields to simplify the code, and remove the hw_error() call. > > Signed-off-by: Philippe Mathieu-Daudé > --- >

[PATCH] hw/dma/etraxfs_dma: Simplify using MemoryRegionOps::impl access_size

2019-10-05 Thread Philippe Mathieu-Daudé
This device implementation is clearly restricted to 32-bit accesses. Set the MemoryRegionOps::impl min/max access_size fields to simplify the code, and remove the hw_error() call. Signed-off-by: Philippe Mathieu-Daudé --- hw/dma/etraxfs_dma.c | 25 - 1 file changed, 4

[PATCH 2/2] migration/postcopy: map large zero page in postcopy_ram_incoming_setup()

2019-10-05 Thread Wei Yang
postcopy_ram_incoming_setup() and postcopy_ram_incoming_cleanup() are counterpart. It is reasonable to map/unmap large zero page in these two functions respectively. Signed-off-by: Wei Yang --- migration/postcopy-ram.c | 34 +- 1 file changed, 17 insertions(+),

[PATCH 1/2] migration/postcopy: allocate tmp_page in setup stage

2019-10-05 Thread Wei Yang
During migration, a tmp page is allocated so that we could place a whole host page during postcopy. Currently the page is allocated during load stage, this is a little bit late. And more important, if we failed to allocate it, the error is not checked properly. Even it is NULL, we would still use

[PATCH 0/2] migration/postcopy: map tmp and large zero page in setup stage

2019-10-05 Thread Wei Yang
Currently we map these page when we want to use it, while this may be a little late. To make the code consistency, these two patches move the map into postcopy_ram_incoming_setup. Wei Yang (2): migration/postcopy: allocate tmp_page in setup stage migration/postcopy: map large zero page in

Re: RFC: Why dont we move to newer capstone?

2019-10-05 Thread Peter Maydell
On Sat, 5 Oct 2019 at 11:21, Lucien Murray-Pitts wrote: > Whilst working on a m68k patch I noticed that the capstone in use > today (3.0) doesnt support the M68K and thus a hand turned disasm > function is used. > > The newer capstone (5.0) appears to support a few more CPU, inc. m68k. > > Why we

[PATCH v6 4/4] colo: Update Documentation for continuous replication

2019-10-05 Thread Lukas Straub
Document the qemu command-line and qmp commands for continuous replication Signed-off-by: Lukas Straub --- docs/COLO-FT.txt | 213 +++-- docs/block-replication.txt | 28 +++-- 2 files changed, 174 insertions(+), 67 deletions(-) diff --git

[PATCH v6 0/4] colo: Add support for continuous replication

2019-10-05 Thread Lukas Straub
Hello Everyone, These Patches add support for continuous replication to colo. This means that after the Primary fails and the Secondary did a failover, the Secondary can then become Primary and resume replication to a new Secondary. Regards, Lukas Straub v6: - properly documented the position=

[PATCH v6 3/4] net/filter.c: Add Options to insert filters anywhere in the filter list

2019-10-05 Thread Lukas Straub
To switch the Secondary to Primary, we need to insert new filters before the filter-rewriter. Add the options insert= and position= to be able to insert filters anywhere in the filter list. position should be "head" or "tail" to insert at the head or tail of the filter list or it should be "id="

[PATCH v6 1/4] block/replication.c: Ignore requests after failover

2019-10-05 Thread Lukas Straub
After failover the Secondary side of replication shouldn't change state, because it now functions as our primary disk. In replication_start, replication_do_checkpoint, replication_stop, ignore the request if current state is BLOCK_REPLICATION_DONE (sucessful failover) or

[PATCH v6 2/4] tests/test-replication.c: Add test for for secondary node continuing replication

2019-10-05 Thread Lukas Straub
This simulates the case that happens when we resume COLO after failover. Signed-off-by: Lukas Straub --- tests/test-replication.c | 52 1 file changed, 52 insertions(+) diff --git a/tests/test-replication.c b/tests/test-replication.c index

Re: [PATCH v2] target/riscv: Expose "priv" register for GDB

2019-10-05 Thread Bin Meng
On Fri, Oct 4, 2019 at 11:18 PM Jonathan Behrens wrote: > > This patch enables a debugger to read and write the current privilege level > via > a special "priv" register. When compiled with CONFIG_USER_ONLY the register is > still visible but is hardwired to zero. > > Signed-off-by: Jonathan

Peculiar reply from mail list handler???

2019-10-05 Thread Lucien Murray-Pitts
Hey folks, The last message I sent came back with a weird reply from *mai...@lists.sr.ht*, claiming the list didnt support "HTML" formatted mail (which is the default) for gmail, and then saying it couldnt be delivered. Thats a confusing mail as it would imply failure in delivery.Was I

RFC: Why dont we move to newer capstone?

2019-10-05 Thread Lucien Murray-Pitts
Hi folks, Whilst working on a m68k patch I noticed that the capstone in use today (3.0) doesnt support the M68K and thus a hand turned disasm function is used. The newer capstone (5.0) appears to support a few more CPU, inc. m68k. Why we move to this newer capstone? Furthermore, if making a

RFC: Why dont we move to newer capstone?

2019-10-05 Thread Lucien Murray-Pitts
Hi folks, Whilst working on a m68k patch I noticed that the capstone in use today (3.0) doesnt support the M68K and thus a hand turned disasm function is used. The newer capstone (5.0) appears to support a few more CPU, inc. m68k. Why we move to this newer capstone? Furthermore, if making a