From: Wanpeng Li
Add -kernel_irqchip=split
./x86-run x86/eventinj.flat
qemu-system-x86_64 -enable-kvm -machine kernel_irqchip=split -cpu host
-device pc-testdev -device isa-debug-exit,iobase=0xf4,iosize=0x4 -vnc
none -serial stdio -device pci-testdev -kernel
PowerPC failed to handle broadcast TLB flush operations. Executing
instructions that are defined architecturally as synchronizing global TLB
should have a global effect.
* tlbie on BookS
* tlbivax on BookE
* H_CALLs (H_REMOVE, H_BULK_REMOVE and H_PROTECT) in case of pseries,
since they
We flush the qemu TLB lazily. check_tlb_flush is called whenever we hit
a context synchronizing event or instruction that requires a pending
flush to be performed.
However, we fail to handle broadcast TLB flush operations. In order to
fix that efficiently, we want to differenciate whether
Applied to -trivial, thanks!
/mjt
Applied to -trivial, thanks!
/mjt
Applied to -trivial, thanks!
/mjt
On Wed, Sep 14, 2016 at 02:00:29PM +1000, David Gibson wrote:
[...]
> > > > >
> > > > > > So
> > > > > > IIUC this is a question about "naming" but not the
> > > > > > implementations...
> > > > > > I suppose it is really a matter of taste, and both work for me
> > > > > > (either
> > > > > >
Aplied to -trivial, thanks!
/mjt
Applied to -trivial, thanks!
/mjt
Applied to -trivial, thanks!
/mjt
Applied to -trivial, thanks!
/mjt
Applied to -trivial, thanks!
/mjt
Applied to -trivial, thank you!
/mjt
Applied to -trivial, thank you!
/mjt
Applied to -trivial, thank you!
/mjt
On Wed, Sep 14, 2016 at 02:37:03PM +1000, Benjamin Herrenschmidt wrote:
> On Wed, 2016-09-14 at 09:23 +0530, Nikunj A Dadhania wrote:
>
> Hr... this is confusing, let me rephrase ;-)
>
> > Due to lazy tlb flushes, propagation of the tlb flush is delayed.
> Moreover, certain operations need to do
On Tue, Sep 13, 2016 at 02:52:45PM +0200, Laurent Vivier wrote:
> Add a first test to validate the protocol:
>
> - rtas/get-time-of-day compares the time
> from the guest with the time from the host.
>
> Signed-off-by: Laurent Vivier
> Reviewed-by: Greg Kurz
On Tue, Sep 13, 2016 at 02:52:42PM +0200, Laurent Vivier wrote:
> This series allows to call RTAS commands from the qtest framework,
> and defines a first test to call RTAS command "get-time-of-day"
> to validate the protocol and test RTAS.
>
> RTAS command parameters are passed to the guest via
On Mon, Sep 12, 2016 at 01:13:41PM +0800, Peter Xu wrote:
> On Mon, Sep 12, 2016 at 11:26:04AM +1000, David Gibson wrote:
> > On Thu, Sep 08, 2016 at 05:07:32PM +0800, Peter Xu wrote:
> > > On Wed, Sep 07, 2016 at 04:41:54PM +1000, David Gibson wrote:
> > > > On Wed, Sep 07, 2016 at 02:34:19PM
On Tue, Sep 13, 2016 at 06:43:47PM +0200, Paolo Bonzini wrote:
> Just include the file that is supposed to bring it in.
Applied to ppc-for-2.8, thanks.
> Cc: David Gibson
> Signed-off-by: Paolo Bonzini
> ---
> I'm including this in my
Benjamin Herrenschmidt writes:
> On Wed, 2016-09-14 at 09:23 +0530, Nikunj A Dadhania wrote:
>
> Hr... this is confusing, let me rephrase ;-)
>
>> Due to lazy tlb flushes, propagation of the tlb flush is delayed.
> Moreover, certain operations need to do broadcast
On 2016/9/14 6:55, Alex Williamson wrote:
[cc +Paolo]
On Thu, 11 Aug 2016 19:05:57 +0800
Yongji Xie wrote:
Now the kernel commit 05f0c03fbac1 ("vfio-pci: Allow to mmap
sub-page MMIO BARs if the mmio page is exclusive") allows VFIO
to mmap sub-page BARs. This is
On Wed, 2016-09-14 at 09:23 +0530, Nikunj A Dadhania wrote:
Hr... this is confusing, let me rephrase ;-)
> Due to lazy tlb flushes, propagation of the tlb flush is delayed.
Moreover, certain operations need to do broadcast flush, this too can
be
> delayed until we hit the operation that warrant
On Tue, Sep 13, 2016 at 11:09:27PM +0200, Laszlo Ersek wrote:
> Hi,
>
> (CC Michael and Cornelia,)
>
> On 09/13/16 21:10, Brian Rak wrote:
> > I have some KVM hosts that I just upgraded to qemu 2.7.0. When the host
> > is running a kernel newer then 3.19, everything works fine.
> >
> > If the
On 14/09/16 01:39, Greg Kurz wrote:
> On Tue, 13 Sep 2016 09:49:09 -0500
> Eric Blake wrote:
>
>> On 09/13/2016 02:11 AM, Alexey Kardashevskiy wrote:
>>> The tap backend is already using qemu-bridge-helper to attach tap
>>> interface to a bridge but (unlike the bridge backend)
David Gibson writes:
> [ Unknown signature status ]
> On Mon, Sep 12, 2016 at 11:18:33AM +0530, Nikunj A Dadhania wrote:
>> The flag will be used to indicate whether broadcast tlb flush is needed
>> or not.
>>
>> Moreover, BookS does both ptesync and tlbsync, so
On Wed, 2016-09-14 at 13:09 +1000, David Gibson wrote:
> On Mon, Sep 12, 2016 at 11:18:33AM +0530, Nikunj A Dadhania wrote:
> >
> > The flag will be used to indicate whether broadcast tlb flush is
> > needed
> > or not.
> >
> > Moreover, BookS does both ptesync and tlbsync, so make that a nop
>
2016-09-14 11:40 GMT+08:00 Fam Zheng :
> On Tue, 09/13 20:21, no-re...@ec2-52-6-146-230.compute-1.amazonaws.com wrote:
>> Hi,
>>
>> Your series seems to have some coding style problems. See output below for
>> more information:
>>
>> Type: series
>> Message-id:
On Tue, 09/13 20:21, no-re...@ec2-52-6-146-230.compute-1.amazonaws.com wrote:
> Hi,
>
> Your series seems to have some coding style problems. See output below for
> more information:
>
> Type: series
> Message-id: 1473822299-6302-1-git-send-email-wanpeng...@hotmail.com
> Subject: [Qemu-devel]
Hi,
Your series seems to have some coding style problems. See output below for
more information:
Type: series
Message-id: 1473822299-6302-1-git-send-email-wanpeng...@hotmail.com
Subject: [Qemu-devel] [PATCH] pc: apic: fix touch LAPIC when irqchip is split
=== TEST SCRIPT BEGIN ===
#!/bin/bash
On Mon, Sep 12, 2016 at 11:18:33AM +0530, Nikunj A Dadhania wrote:
> The flag will be used to indicate whether broadcast tlb flush is needed
> or not.
>
> Moreover, BookS does both ptesync and tlbsync, so make that a nop for
> the server and tlbsync would generate a check flush for BookE
This
From: Wanpeng Li
Add -kernel_irqchip=split
./x86-run x86/eventinj.flat
qemu-system-x86_64 -enable-kvm -machine kernel_irqchip=split -cpu host
-device pc-testdev -device isa-debug-exit,iobase=0xf4,iosize=0x4 -vnc
none -serial stdio -device pci-testdev -kernel
On Tue, Sep 13, 2016 at 10:46:46AM -0400, Brijesh Singh wrote:
> This RFC series provides support for AMD's new Secure Encrypted
> Virtualization (SEV) feature. This RFC is based KVM RFC [1].
>
> SEV is an extension to the AMD-V architecture which supports running
> multiple VMs under the
On Wed, Sep 14, 2016 at 12:59:32AM +0200, Paolo Bonzini wrote:
>
>
> On 13/09/2016 16:50, Brijesh Singh wrote:
> > In SEV-enabled mode we need to reload the BIOS image on loader reset, this
> > will ensure that BIOS image gets encrypted and included as part of launch
> > meausrement on guest
On Wed, Sep 14, 2016 at 12:53:36AM +0200, Paolo Bonzini wrote:
>
>
> On 13/09/2016 16:50, Brijesh Singh wrote:
> > In SEV-enabled guest dma should be performed on shared pages. Since
> > the SeaBIOS executes in non PAE mode and does not have access to C-bit
> > to create a shared page hence
On Tue, Sep 13, 2016 at 10:48:27AM -0400, Brijesh Singh wrote:
> The SEV DEBUG_DECRYPT command is used for decrypting a guest memory
> for the debugging purposes. Note that debugging is permitting only
> when guest policy allows it.
When wouldn't you want to allow it?
I don't see value in a
Hi Paolo,
patch 1 seems conflicts with upstream when I rebase(conflicts with
616018352, but very tiny). and patch 2 isn't in your pull request. Do
you want me to resend these two?
On 08/01/2016 06:08 PM, Paolo Bonzini wrote:
On 28/07/2016 11:03, Cao jin wrote:
forget to cc maintainers in
On Tue, Sep 13, 2016 at 11:32:32PM +0300, Michael S. Tsirkin wrote:
> The following changes since commit 507e4ddc3abf67391bcbc9624fd60b969c159b78:
>
> Merge remote-tracking branch 'remotes/mjt/tags/trivial-patches-fetch' into
> staging (2016-09-13 17:55:35 +0100)
>
> are available in the git
On Tue, Sep 13, 2016 at 02:27:59PM -0700,
no-re...@ec2-52-6-146-230.compute-1.amazonaws.com wrote:
> Hi,
>
> Your series seems to have some coding style problems. See output below for
> more information:
>
> Type: series
> Message-id: 1473798735-6290-1-git-send-email-...@redhat.com
> Subject:
On Tue, Sep 13, 2016 at 02:31:39PM -0700,
no-re...@ec2-52-6-146-230.compute-1.amazonaws.com wrote:
> Hi,
>
> Your series failed automatic build test. Please find the testing commands and
> their output below. If you have docker installed, you can probably reproduce
> it
> locally.
Oops. I
On 09/13/2016 04:21 PM, Paolo Bonzini wrote:
On 13/09/2016 22:57, Richard Henderson wrote:
-#if defined(CONFIG_AVX2_OPT) || (defined(CONFIG_CPUID_H) && defined(__SSE2__))
-#include
-
+#if (defined(CONFIG_AVX2_OPT) && defined(CONFIG_CPUID_H)) || defined(__SSE2__)
Your __SSE2__ version is
Hi Ola,
> -Original Message-
> From: Ola Liljedahl [mailto:ola.liljed...@arm.com]
> Sent: Tuesday, September 13, 2016 7:53 PM
> To: Paolo Bonzini; Daniel P. Berrange; Gonglei (Arei)
> Cc: qemu-devel@nongnu.org; virtio-...@lists.oasis-open.org; Huangpeng
> (Peter); Luonengjun;
Hi Paolo,
> -Original Message-
> From: virtio-...@lists.oasis-open.org [mailto:virtio-...@lists.oasis-open.org]
> On Behalf Of Paolo Bonzini
> Sent: Tuesday, September 13, 2016 6:58 PM
> To: Daniel P. Berrange; Gonglei (Arei)
> Cc: qemu-devel@nongnu.org; virtio-...@lists.oasis-open.org;
Quoting Alexey Kardashevskiy (2016-07-27 03:03:38)
> This adds a numa id property to a PHB to allow linking passed PCI device
> to CPU/memory. It is up to the management stack to do CPU/memory pinning
> to the node with the actual PCI device.
It looks like x86 relies on PCIBus->numa_node() method
On 13/09/2016 22:57, Richard Henderson wrote:
> -#if defined(CONFIG_AVX2_OPT) || (defined(CONFIG_CPUID_H) &&
> defined(__SSE2__))
> -#include
> -
> +#if (defined(CONFIG_AVX2_OPT) && defined(CONFIG_CPUID_H)) ||
> defined(__SSE2__)
Your __SSE2__ version is better than mine which required
On 13/09/2016 16:49, Brijesh Singh wrote:
> Fn8000_001f cpuid provides the memory encryption (aka C-bit)
>
> Signed-off-by: Brijesh Singh
> ---
> target-i386/cpu.c |3 +++
> 1 file changed, 3 insertions(+)
>
> diff --git a/target-i386/cpu.c b/target-i386/cpu.c
>
On 13/09/2016 16:49, Brijesh Singh wrote:
> When debug version of physical memory read APIs are called on SEV guest
> then set the MemTxAttrs.sev_debug attribute to indicate that memory
> read/write is requested for debug purposes.
>
> On SEV guest, the memory region read/write callback will
On 13/09/2016 16:49, Brijesh Singh wrote:
>
> +/* Register SEV read/write ops for the guest RAM */
> +if (kvm_sev_enabled())
> +memory_region_set_ram_ops(ram, kvm_sev_get_ram_ops());
If you don't actually need this one except for -kernel it would be very
nice, because then the
On 13/09/2016 16:48, Brijesh Singh wrote:
> #
> +# @sev: true if SEV is active
You should add "(Since 2.8.0)" here.
Paolo
> # Since: 0.14.0
> ##
> -{ 'struct': 'KvmInfo', 'data': {'enabled': 'bool', 'present': 'bool'} }
> +{ 'struct': 'KvmInfo', 'data': {'enabled': 'bool', 'present':
On 13/09/2016 16:47, Brijesh Singh wrote:
> The patch adds sev_debug_mode attribute in MemTxAttrs. This attribute
> will be set when debug version of memory read/write API's are used in
> SEV-enabled guest.
>
> Signed-off-by: Brijesh Singh
> ---
>
On 13/09/2016 16:50, Brijesh Singh wrote:
> In SEV-enabled mode we need to reload the BIOS image on loader reset, this
> will ensure that BIOS image gets encrypted and included as part of launch
> meausrement on guest reset.
Just to check if I understand correctly, the secure processor cannot
[cc +Paolo]
On Thu, 11 Aug 2016 19:05:57 +0800
Yongji Xie wrote:
> Now the kernel commit 05f0c03fbac1 ("vfio-pci: Allow to mmap
> sub-page MMIO BARs if the mmio page is exclusive") allows VFIO
> to mmap sub-page BARs. This is the corresponding QEMU patch.
> With those
On 13/09/2016 16:50, Brijesh Singh wrote:
> In SEV-enabled guest dma should be performed on shared pages. Since
> the SeaBIOS executes in non PAE mode and does not have access to C-bit
> to create a shared page hence disable the dma operation when reading
> from fw_cfg interface.
>
>
On 13/09/2016 16:50, Brijesh Singh wrote:
> This patch adds methods to register a callback in qemu_system_reset().
>
> - qemu_register_pre_reset() : function will be called just after
> entering into qemu_system_reset().
> - qemu_register_post_reset(): function will be called just before
>
On 13/09/2016 16:47, Brijesh Singh wrote:
> The patch adds '-sev' option to enable the Secure Encrypted
> Virtualization (SEV) guest. If this option is specified, Qemu
> assumes that user wants to launch this guest into SEV mode.
>
> Here are example on how to launch a guest into SEV mode.
>
>
On Tue, Sep 13, 2016 at 10:48:18AM -0400, Brijesh Singh wrote:
> The SEV LAUNCH_FINISH command is used for finalizing the guest launch
> process. The commad returned a measurement value that can be handed to
> the guest owner to validate the guest before vmrun.
>
> For more information see [1],
(CCing Daniel Berrange in case he has feedback on the
nonce/dh_pub_qx/dh_pub_qy loading/parsing at the end of this
message)
On Tue, Sep 13, 2016 at 02:54:40PM -0500, Brijesh Singh wrote:
> Hi Eduardo,
>
> On 09/13/2016 10:58 AM, Eduardo Habkost wrote:
> > >
> > > A typical SEV config file looks
Hi,
Your series failed automatic build test. Please find the testing commands and
their output below. If you have docker installed, you can probably reproduce it
locally.
Type: series
Message-id: 1473798735-6290-1-git-send-email-...@redhat.com
Subject: [Qemu-devel] [PULL 0/5] virtio,pci: fixes
Hi,
Your series seems to have some coding style problems. See output below for
more information:
Type: series
Message-id: 1473798735-6290-1-git-send-email-...@redhat.com
Subject: [Qemu-devel] [PULL 0/5] virtio,pci: fixes and updates
=== TEST SCRIPT BEGIN ===
#!/bin/bash
BASE=base
n=1
Hi,
(CC Michael and Cornelia,)
On 09/13/16 21:10, Brian Rak wrote:
> I have some KVM hosts that I just upgraded to qemu 2.7.0. When the host
> is running a kernel newer then 3.19, everything works fine.
>
> If the host is running on something lower then 3.19, some guests fail to
> start. I
On Thu, Sep 01, 2016 at 10:57:48AM -0700, Ed Swierk wrote:
> Windows 8, 10 and Server 2012 guests hang intermittently while booting
> on Xen 4.5.3 with 1 vCPU and 4 e1000 vNICs, shortly after the Windows
> logo appears and the little dots start spinning.
>
> Running strace on qemu shows its main
Handle alignment of buffers, so that the vector paths
can be used more often.
Signed-off-by: Richard Henderson
Signed-off-by: Paolo Bonzini
---
util/bufferiszero.c | 236
1 file changed, 162
On Tue, Sep 13, 2016 at 03:46:15PM -0500, Brijesh Singh wrote:
> Hi Michael,
>
> On 09/13/2016 01:39 PM, Michael S. Tsirkin wrote:
> > On Tue, Sep 13, 2016 at 10:50:06AM -0400, Brijesh Singh wrote:
> > > In SEV-enabled guest dma should be performed on shared pages. Since
> > > the SeaBIOS
Hi Michael,
On 09/13/2016 01:39 PM, Michael S. Tsirkin wrote:
On Tue, Sep 13, 2016 at 10:50:06AM -0400, Brijesh Singh wrote:
In SEV-enabled guest dma should be performed on shared pages. Since
the SeaBIOS executes in non PAE mode and does not have access to C-bit
to create a shared page hence
From: David Kiarie
Add IVRS table for AMD IOMMU. Generate IVRS or DMAR
depending on emulated IOMMU.
Signed-off-by: David Kiarie
---
include/hw/acpi/aml-build.h | 1 +
include/hw/i386/x86-iommu.h | 12 +++
hw/acpi/aml-build.c | 2 +-
From: David Kiarie
Add AMD IOMMU emulaton to Qemu in addition to Intel IOMMU.
The IOMMU does basic translation, error checking and has a
minimal IOTLB implementation. This IOMMU bypassed the need
for target aborts by responding with IOMMU_NONE access rights
and exempts
From: Maxime Coquelin
Currently, devices are plugged before features are negotiated.
If the backend doesn't support VIRTIO_F_VERSION_1, the transport
needs to rewind some settings.
This is the case for CCW, for which a post_plugged callback had
been introduced, where
The following changes since commit 507e4ddc3abf67391bcbc9624fd60b969c159b78:
Merge remote-tracking branch 'remotes/mjt/tags/trivial-patches-fetch' into
staging (2016-09-13 17:55:35 +0100)
are available in the git repository at:
git://git.kernel.org/pub/scm/virt/kvm/mst/qemu.git
From: David Kiarie
Signed-off-by: David Kiarie
---
hw/i386/trace-events | 29 +
1 file changed, 29 insertions(+)
diff --git a/hw/i386/trace-events b/hw/i386/trace-events
index 5b99eba..d9646d1 100644
---
From: David Kiarie
Introduce PCI macros from for use by AMD IOMMU
Signed-off-by: David Kiarie
---
include/hw/pci/pci.h | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/include/hw/pci/pci.h b/include/hw/pci/pci.h
index
> Am 13.09.2016 um 20:04 schrieb Michael Roth :
>
> Quoting Peter Lieven (2016-09-13 10:52:04)
>>
>>
Am 13.09.2016 um 17:42 schrieb Stefan Hajnoczi :
On Thu, Sep 08, 2016 at 03:58:26PM -0500, Michael Roth wrote:
Quoting
On Tue, Sep 13, 2016 at 02:54:40PM -0500, Brijesh Singh wrote:
> Hi Eduardo,
>
> On 09/13/2016 10:58 AM, Eduardo Habkost wrote:
> > >
> > > A typical SEV config file looks like this:
> > >
> >
> > Are those config options documented somewhere?
> >
>
> Various commands and parameters are
Hi Eduardo,
On 09/13/2016 10:58 AM, Eduardo Habkost wrote:
A typical SEV config file looks like this:
Are those config options documented somewhere?
Various commands and parameters are documented [1]
[1] http://support.amd.com/TechDocs/55766_SEV-KM%20API_Spec.pdf
[sev-launch]
On 09/09/2016 02:02 PM, Ashijeet Acharya wrote:
> Mark old-commands for speed and downtime as deprecated.
Maybe s/old-commands for speed and downtime/the old commands
'migrate_set_speed' and 'migrate_set_downtime'/
> Move max-bandwidth and downtime-limit into migrate-set-parameters for
> setting
getrusage is used in a number of places throughout the qemu codebase
(notably, in crypto/pbkdf.c).
Without this syscall being whitelisted, qemu ends up getting killed by
the kernel whenever you
try to connect to a VNC console.
---
qemu-seccomp.c | 1 +
1 file changed, 1 insertion(+)
diff
The patch mentioned in comment #5 has been included here:
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=a4d1f142542935b90d2e
** Changed in: qemu
Status: New => Fix Released
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
I have some KVM hosts that I just upgraded to qemu 2.7.0. When the host
is running a kernel newer then 3.19, everything works fine.
If the host is running on something lower then 3.19, some guests fail to
start. I noticed this on a Ubuntu 16.04 guest, it fails to find the
virtio NIC, and
On 13/09/2016 19:49, Peter Maydell wrote:
> On 13 September 2016 at 18:15, Paolo Bonzini <pbonz...@redhat.com> wrote:
>> The following changes since commit fa9701240951093907076db0943f96972a396ef5:
>>
>> Merge remote-tracking branch 'remotes/kraxel/tags/pull-vga-2
Richard Henderson writes:
> On 09/13/2016 10:06 AM, Alex Bennée wrote:
>> I get a failure when building on centos6, x86:
>>
>> CCaarch64-softmmu/tcg/tcg-op.o
>> /home/alex/lsrc/qemu.git/tcg/tcg-op.c:2280: error:
>> ‘gen_helper_atomic_fetch_addb’ undeclared here (not in
Daniel P Berrange writes:
> On Thu, Sep 08, 2016 at 03:23:26PM +0200, Lluís Vilanova wrote:
>> Daniel P Berrange writes:
>>
>> > I previously split the global trace-events file up into one file
>> > per-subdirectory to avoid merge conflict hell.
>> [...]
>>
>> Sorry, I could not find the
On Tue, Sep 13, 2016 at 10:50:24AM -0400, Brijesh Singh wrote:
> In SEV-enabled mode we need to reload the BIOS image on loader reset, this
> will ensure that BIOS image gets encrypted and included as part of launch
> meausrement on guest reset.
>
> Signed-off-by: Brijesh Singh
The following changes since commit fa9701240951093907076db0943f96972a396ef5:
Merge remote-tracking branch 'remotes/kraxel/tags/pull-vga-20160913-1' into
staging (2016-09-13 13:56:35 +0100)
are available in the git repository at:
git://github.com/bonzini/qemu.git tags/for-upstream
for you
From: Richard Henderson
For ppc64le, gcc6 does extremely poorly with the Altivec code.
Moreover, on POWER7 and POWER8, a hand-optimized Altivec version
turns out to be no faster than the revised integer version, and
therefore not worth the effort.
Signed-off-by: Richard
Quoting Peter Lieven (2016-09-13 10:52:04)
>
>
> > Am 13.09.2016 um 17:42 schrieb Stefan Hajnoczi :
> >
> >> On Thu, Sep 08, 2016 at 03:58:26PM -0500, Michael Roth wrote:
> >> Quoting Stefan Hajnoczi (2016-09-05 12:54:35)
> On Fri, Aug 26, 2016 at 01:45:56PM +0200,
From: Richard Henderson
Since the two users don't make use of the returned offset,
beyond ensuring that the entire buffer is zero, consider the
can_use_buffer_find_nonzero_offset and buffer_find_nonzero_offset
functions internal.
Reviewed-by: Dr. David Alan Gilbert
On Tue, Sep 13, 2016 at 10:50:06AM -0400, Brijesh Singh wrote:
> In SEV-enabled guest dma should be performed on shared pages. Since
> the SeaBIOS executes in non PAE mode and does not have access to C-bit
> to create a shared page hence disable the dma operation when reading
> from fw_cfg
From: "Daniel P. Berrange"
The CONFIG_PIIX_PCI=y setting was added in
commit 70615c38ded2a20ad8282b7dcde95482fc0a7744
Author: Blue Swirl
Date: Mon Mar 22 20:18:40 2010 +
Compile sound devices only once
but nothing in that commit, nor
On Fri, Sep 09, 2016 at 03:16:50PM +0200, Lluís Vilanova wrote:
> > The various _DSTATE variables are still arbitrarily scattered in
> > memory, as opposed to in a contiguous cache friendly array, which
> > is one of the goals of Paolo's original change.
>
> > That said, I'm unclear on how much
On Tue, Sep 13, 2016 at 10:49:29AM -0400, Brijesh Singh wrote:
> Typically linux kernel, initrd and cmdline are build and loaded
> into guest memory through linux optionrom. The linux optionrom is
> probed and executed by SeaBIOS. This method will not work for
> SEV-enabled guest.
>
> In
From: "Daniel P. Berrange"
The use of the CONFIG_ISA_MMIO setting was removed in
commit 61fcb628627ea464dc1954f615ae13edfefd284f
Author: Paolo Bonzini
Date: Mon Jul 22 15:54:24 2013 +0200
isa_mmio: delete
but this commit only removed it
On 13 September 2016 at 18:15, Paolo Bonzini <pbonz...@redhat.com> wrote:
> The following changes since commit fa9701240951093907076db0943f96972a396ef5:
>
> Merge remote-tracking branch 'remotes/kraxel/tags/pull-vga-20160913-1' into
> staging (2016-09-13 13:56:35 +0100)
From: Thomas Huth
These header files obviously belong to the PC chipset (since
their names match the other .c files in this section).
Signed-off-by: Thomas Huth
Message-Id: <1473111075-25311-1-git-send-email-th...@redhat.com>
Signed-off-by: Paolo Bonzini
From: Richard Henderson
There's no real knowledge of the cacheline size,
just prefetching one loop ahead.
Signed-off-by: Richard Henderson
Message-Id: <1472496380-19706-7-git-send-email-...@twiddle.net>
Signed-off-by: Paolo Bonzini
---
From: Richard Henderson
Signed-off-by: Richard Henderson
Message-Id: <1472496380-19706-6-git-send-email-...@twiddle.net>
Signed-off-by: Paolo Bonzini
---
include/qemu/cutils.h | 1 +
tests/Makefile.include| 3 ++
On 09/12/2016 06:47 AM, Alex Bennée wrote:
>> > +/* Notice an IO access, or a notdirty page. */
>> > +if (unlikely(tlb_addr & ~TARGET_PAGE_MASK)) {
>> > +/* There's really nothing that can be done to
>> > + support this apart from stop-the-world. */
>> > +goto
t; request with its own date-based tag.
>
> Thanks,
>
> /mjt
>
> The following changes since commit fa9701240951093907076db0943f96972a396ef5:
>
> Merge remote-tracking branch 'remotes/kraxel/tags/pull-vga-20160913-1' into
> staging (2016-09-13 13:56:35 +0100)
>
> are avai
From: Eduardo Habkost
Signed-off-by: Eduardo Habkost
Message-Id: <1472181025-10889-3-git-send-email-ehabk...@redhat.com>
Signed-off-by: Paolo Bonzini
---
scripts/kvm/vmxcap | 1 +
1 file changed, 1 insertion(+)
diff --git
Hi, I hope this list is active, and I can find some pointers here.
I am running Arch linux
vanilla 4.7.2 kernel
qemu 2.7
libvirt 2.2.0
virt-manager 1.4.0
Since the upgrade from qemu 2.6.1 to 2.7 a few days ago. I'm no longer
able to PXE boot at all. Everything else appears to function
From: Hervé Poussineau
53C895A datasheet says:
"This bit (DFE) is a pure status bit and will not cause an interrupt"
This bit is already auto-generated in lsi_read_reg when reading the DSTAT
register.
This fixes IBM RS/6000 7020 firmware, which is:
- resetting the
From: Richard Henderson
Allow selection of several acceleration functions
based on the size and alignment of the buffer.
Do not require ifunc support for AVX2 acceleration.
Signed-off-by: Richard Henderson
Message-Id:
1 - 100 of 436 matches
Mail list logo