As a quick win, we ought to call setenv("G_SLICE", "always-malloc", 1)
during startup to avoid the specific scenario you hit.
A more general solution is likely to be non-trivial.
glib is such a fundamental part of QEMU that is is hard to avoid its
usage.
The async-signal safety issues only
If you need OS portability then the "usb-mtp" device is also an option
for adhoc file sharing.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/304636
Title:
-hda FAT:. limited to 504MBytes
Status
If QEMU receives an argument that isn't an option flag, then it
considers it to be the path to a disk. The block code treats the empty
string as indicating that no backing file should be opened for the
device. This only makes sense for devices that support removable media
(ie CDROM, floppy), hence
Look in the same directory as that .deb link above - the the files
ending in orig.tar.gz (upstream source) and files ending in
debian.tar.xz (downstream modifications)
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
** Changed in: qemu
Status: New => Incomplete
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1905979
Title:
Check if F_OFD_SETLK is supported may give wrong result
Status in QEMU:
In this thread, it is pointed out that support for OFD is provided by
the generic VFS layer in the kernel, so there should never be a
situation where one filesystem supports OFD and another does not support
OFD:
https://lists.gnu.org/archive/html/qemu-devel/2020-11/msg05264.html
Can you say
Can you confirm whether you are executing QEMU on your local
desktop/laptop machine, or remotely over SSH with X11-forwarding, or
over a remote VNC server, etc ? In the remote cases stuck keys is
somewhat of a known problem especially if latency is bad
--
You received this bug notification
** Changed in: qemu
Status: New => Incomplete
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1903712
Title:
when ../configure, cannot find Ninjia
Status in QEMU:
Incomplete
Bug
The memory region mapped by QEMU for -mem-path is configured such that
changes are private to the QEMU process.
If you need an external process to be able to view memory changes, you
need to use the modern "memory-backend-file" class with -object arg, and
specify share=on to make the data
Can you confirm whether you have installed the "ninja-build" package ?
It is a new build requirement for QEMU in 5.2.0
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1903712
Title:
when
This looks to me like a significant implementation flaw in the QEMU
code. Both src and dst QEMU appear to be running code from the main
event loop, and they appear to be doing blocking I/O operations. This is
very bad as we should never have anything running in the main event loop
thread that is
If VNC is enabled, then libvirt sets QEMU_AUDIO_DRV=none unless
/etc/libvirt/qemu.conf is set to allow output to host audio.
Clearly this doesn't do the right thing when SPICE is present at the
same time as VNC, but that's libvirt's fault rather than QEMU.
--
You received this bug notification
The VNC server doesn't get involved in key repeat functionality, it just
passes keys from the client onto the guest OS. The client can indicate
that it is doing key repeat by sending a series of "key down" events,
and only 1 "key up" event to indicate end of auto-repeat. The guest OS
can itself
FWIW, I reproduced the original failure using your LDFLAGS, and tested
that removing '-pie' made it work
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1896096
Title:
Git version: Build process is
Before the meson port, the "-pie" arg was on the CLI *before* the
"-shared" arg so the "-shared" wins and results in a shared library.
After the meson port, "-shared" appears first, and so "-pie" wins and
tries to create an executable.
IOW, this passing of -pie was always wrong, and it was only
FYI, QEMU automatically enables PIC/PIE as needed, so there's no need to
set it via these flags.
In fact everything in your $CFLAGS is already set by QEMU out of the box
too.
For LDFLAGS you can cull the -g and -pie
--
You received this bug notification because you are a member of qemu-
The problem is caused by the extra flags you're forcing on the compiler:
Using 'CFLAGS' from environment with value: '-O2 -g -fPIE -DPIE -std=gnu99
-Wall'
Using 'LDFLAGS' from environment with value: '-g -pie
-Wl,-O1,--sort-common,--as-needed,-z,relro,-z,now'
Using 'CPPFLAGS' from environment
Can you do the build using "make V=1" so that we actually see the
compiler command lines used in the log file.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1896096
Title:
Git version: Build
Added Paolo for his Meson expertize in case he can spot the flaw
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1896096
Title:
Git version: Build process is broken in block_curl.c.o
Status in
Nothing looks especially unusual there, but clear it is failing to link
the block-curl.so as a library and is instead linking it as an
executable and thus failing to find "main". I can't explain why that
would be the case.
--
You received this bug notification because you are a member of qemu-
Can you attach the full build log, including all the "configure" output,
and ideally pass "V=1" as an arg to 'make'
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1896096
Title:
Git version: Build
Please give more info on your host OS build environment, and most
importantly confirm that you have tried doing a build from a
*completely* clean git checkout. Recent build system changes introduced
risk of problems if you have not done a full clean. "git clean -f -x -d"
will delete every file in
https://lists.gnu.org/archive/html/qemu-devel/2020-09/msg04809.html
** Changed in: qemu
Status: New => Confirmed
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1893691
Title:
Chardev
This regression is specific to the "socket" chardev and was caused by
this commit:
commit 271094474b65de1ad7aaf729938de3d9b9d0d36f (refs/bisect/bad)
Author: Dima Stepanov
Date: Thu May 28 12:11:18 2020 +0300
char-socket: return -1 in case of disconnect during tcp_chr_write
During
Surprise...
https://lists.gnu.org/archive/html/qemu-devel/2020-09/msg03023.html
Discovering the firmware limits was tedious. SeaBIOS limits SMBIOS to
64KB total size due to support for SMBIOS 2.1 spec only, while EDK2
fails a little over 128 KB total size despite supporting SMBIOS 3.0
which
Note that there are many VMs running, so it is important to isolate logs
for just one of them, by matching on mon=0x.
For example considering this
$ grep 0x7f021c0b9c70 libvirtd.log | grep -E
'QEMU_MONITOR_(RECV_REPLY|RECV_EVENT|SEND_MSG)'
We can see the "device_del" request:
** Changed in: qemu
Status: Incomplete => Opinion
** Changed in: qemu
Status: Opinion => Invalid
** Changed in: qemu
Status: Invalid => New
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
Can you provide a *simple* way to demonstrate the problem. ie some
simple Go demo program, that doens't involve building kubernetes.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1893040
Title:
> We are observing issue while building go-runner image and we suspect it is
> due to QEMU version
> being used. As referred in below issue:
> https://github.com/golang/go/issues/40949
This issue says the problem was due to
https://bugs.launchpad.net/qemu/+bug/1847232/ which was fixed in QEMU
QEMU, like most open source projects, relies on contributors who have
motivation, skills and available time to work on implementing particular
features. They naturally tend to focus on features that result in the
greatest benefit to their own use cases. Thus simply declaring that an
open source
Note that you can start QEMU with the "-S" flag which means CPUS are
paused. This gives you ability to run the "set_link" monitor command
above, and then run "cont" to actually start the VM. Less convenient
that a CLI flag, but functionally it is eqivalent.
--
You received this bug notification
Has anyone raised an RFE with the mingw64 project to provide these
headers / APIs ? That's what provides the interfaces we usually rely on
for Windows builds, and they're likely familiar with what they can &
can't do from a legal POV. I don't see this as something QEMU needs to
solve itself.
--
Semi-officially, QEMU only aims to support static linking with usermode
emulators, not system mode emulators. I'm not sure we make that clear
anywhere in the docs, or configure script. We should probably print a
warning from configure if using --static in combination with system
emulators, that
GitLab has ability to host container images per project and also can
build them during CI runs. So I'd suggest that we create GitLab CI jobs
that build & publish each of the images under tests/docker on the master
branch.
--
You received this bug notification because you are a member of qemu-
> This issue is introduced in QEMU 4.2.0 (4.1.0 is working fine)
That's not neccessarily the case - with QEMU 4.2.0, libvirt switched
over to using the new -blockdev command line syntax. When you were
testing with 4.1.0, it would have been using the legacy -drive syntax.
So the change in
Can you provide the full guest XML for this -
"/etc/libvirt/qemu/$GUESTNAME.xml", and also the full QEMU command line
- "/var/log/libvirt/qemu/$GUESTNAME.xml". We need to see whether the
disk is considered read-only from libvirt's POV.
--
You received this bug notification because you are a
Note that QEMU sets the NoDisplay=true property to tell desktops not to
display this entry. I don't think KDE should be warning about missing
Exec entry in this case.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
Adding an exec field would not be right, because QEMU can't simply be
launched from the desktop without any arguments. There needs to be a
long string of arguments given that are different for every QEMU that is
launched. The only viable way to actually launch QEMU is interactively
from the
That commit you mention is confirmed to solve a bug reported against
Fedora with almost the same stack trace you see here.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1867519
Title:
qemu 4.2
Actually you explicitly do *NOT* want to select any keymap in virt-
manager in general. Picking a keymap disables the VNC protocol extension
for raw scancodes. This means that QEMU has to do keymap <-> scancode
conversion. In such a setup the host OS desktop keymap, the QEMU keymap
and the guest
Can you provide the QEMU command line (/var/log/libvirt/qemu/$GUEST.log)
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1863601
Title:
unable to type "|" character in french keyboard.
Status in
Can you provide more information here. What command line have you
launched QEMU with ? How are you interacting with QEMU (serial console,
GTK UI, VNC, SPICE ?) If VNC/SPICE, what client app are you using ?
--
You received this bug notification because you are a member of qemu-
devel-ml, which
** Changed in: qemu
Status: New => Fix Committed
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1849644
Title:
QEMU VNC websocket proxy requires non-standard 'binary' subprotocol
Status in
** Summary changed:
- Soloaris can't be poweroff
+ Solaris can't be powered off with ACPI shutdown/poweroff
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/823733
Title:
Solaris can't be powered
Your analysis of the problem with family makes sense & we do have
mechanism to fix this in QEMU while keeping back compat for existing
deployments.
I'm curious as to the actual errors LLVM reports ?
FWIW, even though qemu64 is the default CPU, practically everyone would
be better off choosing
It isn't mandatory to use a standardized subprotocol, all that's
required is that the client & server agree
https://developer.mozilla.org/en-
US/docs/Web/HTTP/Protocol_upgrade_mechanism
"The subprotocols may be selected from the IANA WebSocket Subprotocol
Name Registry or may be a custom
Doh, sorry for my comment earlier where I mistakenly used sparc instead
of sparc64.
I've now tested QEMU git master with that sparc64 ISO and qemu-system-
sparc64.
I still can't reproduce it though - it boots past the disk probing, and
into the installer, where it asks for the terminal type.
The test image that the netbsd bug points to no longer exists.
If I pick the image currently available:
http://nycdn.netbsd.org/pub/NetBSD-
daily/HEAD/latest/images/NetBSD-9.99.2-sparc.iso
And launch it in a QEMU built from today's GIT master, on Fedora 30 with
glib2 2.60.5, NetBSD
Fedora 30 has been shipping glib2 2.60.0 through to 2.60.5 and QEMU in
general has been working normally AFAICT.
>From the netbsd bug report it looks like the reproducer was demoed using
the sparc emulator - is that the only QEMU arch that is affected ?
--
You received this bug notification
** Also affects: virt-manager (Ubuntu)
Importance: Undecided
Status: New
** Changed in: qemu
Status: New => Invalid
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1838312
Title:
This is just about connecting the NIC backends for 2 QEMUs together
using a UNIX socket, instead of the current TCP/UDP socket. It should be
fairly trivial to support i would expect. Though ideally we'd port the
netdev socket backend to use QIOChannel too
--
You received this bug notification
If the problem only happens with a websockets channel enabled, it
possibly a bug in the QIOChannelWebsock impl rather than the chardev
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1828608
Title:
Adding Gerd to the CC, since this is possibly caused by recent work to
keyboard state tracking code.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1828272
Title:
4.0 breaks keyboard autorepeat in
The challenge is that this is the only auth scheme defined by the VNC protocol,
aside from no-auth.
If we removed it, we'd no longer be compatible with the standard VNC protocol.
We'd be making use of the TLS/SASL extensions mandatory if users want auth.
This could ultimately push people to
Note that any use of the built-in VNC-auth scheme is always considered a
security flaw. It should essentially never be used, especially not on
any public internet facing service, even if fail2ban were able to be
used.
A secure VNC server should use the VeNCrypt extension which enables TLS,
with
** Changed in: qemu
Status: New => Confirmed
** Changed in: qemu
Assignee: (unassigned) => Daniel Berrange (berrange)
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1826200
Title:
Re-opened, since although the fix needs to be done in capstone, QEMU
also needs a commit to actually update the submodule hash to pull in the
fix.
** Changed in: qemu
Status: Invalid => New
--
You received this bug notification because you are a member of qemu-
devel-ml, which is
NB that patch will break Linux based Mingw builds, as they don't include
"mys2" in their output from gcc, so it would need to match both.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1826175
Title:
Fixed in
https://lists.gnu.org/archive/html/qemu-devel/2019-04/msg02524.html
** Changed in: qemu
Status: New => In Progress
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1824528
Title:
This struct represents the MTP protocol wire format so *must* be marked
packed.
There unfortunately quite a few flaws in this MTP code area, so fixing
the gcc warning is not straightforward.
https://lists.gnu.org/archive/html/qemu-devel/2019-03/msg07763.html
--
You received this bug
Switched bug to the ubuntu qemu package, since qemu-system-x86_64-spice
is not an upstream provided binary
** Also affects: qemu (Ubuntu)
Importance: Undecided
Status: New
** Changed in: qemu
Status: New => Invalid
--
You received this bug notification because you are a member
FYI the QEMU change merged in the following pull request changed to
return an EPERM errno for the thread affinity syscalls:
commit 12f067cc14b90aef60b2b7d03e1df74cc50a0459
Merge: 84bdc58c06 035121d23a
Author: Peter Maydell
Date: Thu Mar 28 12:04:52 2019 +
Merge remote-tracking branch
I did wonder if we could set the action for some syscalls to be "errno"
instead of "kill process", but I worry that could then result in silent
mis-behaviour as processes fail to check return value as they blindly
assume the call cannot fail.
We should probably talk with mesa developers about
As & when libvirt & QEMU supports the external vhost processes for this
I expect it will still restrict the CPU affinity and apply seccomp
filters that likely to be as strict as they are today at minimum.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is
IMHO that mesa change is not valid. It is settings its affinity to run
on all threads which is definitely *NOT* something we want to be
allowed. Management applications want to control which CPUs QEMU runs
on, and as such Mesa should honour the CPU placement that the QEMU
process has.
This is a
Patch proposed
https://lists.gnu.org/archive/html/qemu-devel/2019-02/msg05556.html
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1816819
Title:
Chardev websocket stops listening after first
Public bug reported:
A plain build from git master at
81dbcfa9e1d8bab3f7c4cc923c0b40cd666f374f on Fedora 29 x86_64 host, with
no options passed to configure.
Trying to launch QEMU on a host with no audio card present:
# ls /dev/snd/
seq timer
It will fail to initialize alsa and abort
Fix merged to git master
https://git.qemu.org/?p=qemu.git;a=commit;h=feff02089113839d233e40a9bd7134241de12d1d
** Changed in: qemu
Status: New => Fix Committed
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
This bug was related to an IRC discussion on Jan 14th but this bug
description is not showing the problem that was raised on IRC. The IRC
discussion showed a source image with a 9GB Windows 10 installation,
turning into an image with only 8 MB of data present. The images in
this bug description
Patch proposed at
https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg02774.html
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1795100
Title:
VNC unix-domain socket unlink()ed prematurely
It only affects VNC, not chardevs because the chardevs fail to call
qio_channel_close() and just rely on finalize() cleaning up the open
socket. To fix this we just need to made the code conditional on it
being a listener socket
if (qio_channel_has_feature(ioc, QIO_CHANNEL_FEATURE_LISTEN)) {
The VNC password authentication scheme is not extensible. It is
unfixably broken by design.
QEMU provides the SASL authentication scheme for VNC which allows for
strong authentication, when combined with the VeNCrypt authentication
scheme that uses TLS.
These extensions are supported by the
Discussing the problem & likely solution here:
https://lists.gnu.org/archive/html/qemu-devel/2018-12/msg04631.html
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1738283
Title:
'Less than' (<),
This series gives the QEMU SDL2 & GTK frontends high quality icons
http://lists.nongnu.org/archive/html/qemu-devel/2018-12/msg04475.html
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1392468
Title:
On Tue, Dec 18, 2018 at 09:31:00AM -0500, Michael S. Tsirkin wrote:
> On Tue, Dec 18, 2018 at 12:03:30PM +0100, Philippe Mathieu-Daudé wrote:
> > GCC 8 new warning prevents builds to success since quite some time.
> > First report on the mailing list is in July 2018:
> >
IMHO, if achieving ease of use comparable to VirtualBox is your
benchmark target, then launching QEMU directly is really the wrong way
to approach things. QEMU is a very low level piece of infrastructure not
a complete end user desktop solution. For that it is better to look at
using an
There's no concept of versions for "raw" images as there's no metadata
at all - its just raw disk content.
For the qcow2 format, the version 2 vs version 3 distinction is not
something that is intended to be exposed externally. A version 3 format
file is still handled by the qcow2 format driver,
It is -o subformat=fixed which breaks the file format detection
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1790268
Title:
the vhd generated by qemu-img not align with MB again.
Status in
There is always a performance differential between bare metal & VMs. The
actual amount varies depending on alot of different factors and
meltdown/spectre have had an effect here - the actual perf hit depends
on the CPU models & virtual hardware and more besides - ranging anywhere
from 0% to 40%
> Whew, after some hurdles I managed to install a Linux Mint 19 guest (Ubuntu
> 18.04). After all updates, here the output:
>
> $ dmesg | grep microcode
> [ 0.036780] core: PEBS disabled due to CPU errata, please upgrade microcode
>
> So the microcode in the guest is not loaded! But see below:
I'm not convinced we can trust the output from cygwin wrt CPU flags. A
better test would be to install a modern Linux guest which has the
mitigations, and see if that reports the flags.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to
You're mis-understanding how microcode works a little. Microcode is
loaded into physical CPUs in the host. This affects everything that runs
on these CPUs thereafter. A KVM guest is merely a process running on the
host CPUs, so it is affected by the updated microcode. There is no
notion of the
QEMU is already capable of exposing the new CPU features to guests, so
possibly a mis-configuration. Please provide the full QEMU command line
args you are using for this guest too.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
** Changed in: qemu
Status: New => Invalid
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1787012
Title:
Solaris build error: Bad string
Status in QEMU:
Invalid
Bug description:
While
It sounds more like a bug / limited featureset in the Solaris 'tr'
binary.
What is your $PATH ? Make sure /usr/xpg4/bin directory appears
*before* /usr/bin in $PATH to get a more functional version of 'tr',
though I'm not sure if that'll fix it or not.
--
You received this bug notification
> I notice in the Makefile in dtc/ that it's calling python. My default
> python is 2.6.9. I found some discussion about qemu moving to python
> 3. Could this be the problem?
We require either Python 2.7.x, or Python 3.x versions. Support for
2.6.x was dropped I'm afraid.
--
You received this
Adding #include is definitely wrong. You
are instead missing the right -I include path. The libgcrypt-config
command should be in $PATH, and should print "-I/opt/csw/include" args
when running "libgcrypt-config --cflags". If that doesn't happen, then
the gcrypt installation is broken.
--
You
** Summary changed:
- QEMU (frontend) crashes upon warm reboot with vga=775 on Linux cmdline
+ QEMU (frontend) crashes upon warm reboot with virtio-gpu device and vga=775
on Linux cmdline
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to
This sounds like the same problem we're investigating in Fedora/RHEL
land affecting guests with EPYC CPU, or host-passthrough from an EPYC
family 17h host. Workaround should be to use "-cpu Opteron_G5" for now
https://bugzilla.redhat.com/show_bug.cgi?id=1592276
BTW, if you have any friendly contact with the your hosting provider,
please encourage them to contribute any enhancements they have back to
QEMU. It is highly desirable to *NOT* have hosting providers needing a
fork of qemu-ga, as that ruins ability to run standard disk images, as
you've found.
I don't have any suggestions wrt the actual bug cause, but just want to
suggest adding the XML config and corresponding CLI args used on both
the source and dest hosts (see /var/log/libvirt/qemu/$GUEST.log) to this
bug, for one of the VMs that sees the 100% CPU hang.
--
You received this bug
Hmm, if we know that QEMU guests will crash & burn when > 1 TB mem, when
host-phys-bits/phys-bits are unset, then perhaps libvirt should do the
right thing by default here. eg we can't use host-phys-bits=true due to
migration compat issues, but if we see > 1TB mem, libvirt could
reasonably set
@elmarco could you take a look at this possible regression since bisect
claims it was due to the mux refactor
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1654137
Title:
Ctrl-A b not working in
** Summary changed:
- qemu linux-user glib hash table crash in qom/object.c
+ qemu linux-user crash in QOM path canonicalization during do_fork() call to
cpu_create
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
We need to pull in a SeaBIOS update with this fix applied to resolve
this
commit 42812e062a77b27b0544c8e0d46d206afc3b2fae
Author: Kevin O'Connor
Date: Thu Feb 22 20:29:27 2018 -0500
shadow: Don't invoke a shutdown on reboot unless in a reboot loop
Old versions
I bisected seabios and found this seabios change to be the cause of the
problem
commit b837e68d5a6c1a5945513f1995875445a1594c8a (refs/bisect/bad)
Author: Kevin O'Connor
Date: Mon Nov 9 15:00:19 2015 -0500
resume: Make KVM soft reboot loop detection more flexible
Public bug reported:
I was installing MS-Dos 6.22 + Windows 3.11 in preparation for running
Microsoft Bob, and noticed that when they try to perform a reboot, they
just get stuck. The console cursor stays flashing on/off, but the DOS
prompt no longer responds to input.
It is fairly easy to
Can you file a separate bug for the SDL1 backspace problem - it was not
intended to cause problems like that.
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1703795
Title:
Unable to release mouse
The problem with this is that the behaviour is inherently ambiguous. We
have no way to distinguish whether a user specifying ":5804" wants port
11704 or port 5804, so it is not in fact easy to fix.
If we were writing this again from scratch I would avoid the offset
concept entirely and always
Two patches series posted in Aug last year:
https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg03642.html
https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg06528.html
An updated series covering both of those, and also turning on tests
1 - 100 of 171 matches
Mail list logo