On Sat, Aug 28, 2010 at 03:58:23PM +, Blue Swirl wrote:
> On Sat, Aug 28, 2010 at 2:54 PM, Eduard - Gabriel Munteanu
> wrote:
> > This introduces emulation for the AMD IOMMU, described in "AMD I/O
> > Virtualization Technology (IOMMU) Specification".
> >
> > Signed-off-by: Eduard - Gabriel Mun
Signed-off-by: Serge Ziryukin
---
ui/vnc-enc-tight.c |2 --
1 files changed, 0 insertions(+), 2 deletions(-)
diff --git a/ui/vnc-enc-tight.c b/ui/vnc-enc-tight.c
index c4c9c3b..6ee10f9 100644
--- a/ui/vnc-enc-tight.c
+++ b/ui/vnc-enc-tight.c
@@ -1351,7 +1351,6 @@ static int send_png_rect(Vnc
Where to find some images?
I found a page a long time before but can't find it now
The page have images of
Reactos
Ubuntu
Bsd
etc
On Sat, Aug 28, 2010 at 2:54 PM, Eduard - Gabriel Munteanu
wrote:
> Hi,
>
> I rebased my work on mst's PCI tree and, hopefully, fixed issues raised by
> others. Here's a summary of the changes:
> - made it apply to mst/pci
> - moved some AMD IOMMU stuff in a reset handler
> - dropped range_covers_
On Sat, Aug 28, 2010 at 2:54 PM, Eduard - Gabriel Munteanu
wrote:
> This introduces emulation for the AMD IOMMU, described in "AMD I/O
> Virtualization Technology (IOMMU) Specification".
>
> Signed-off-by: Eduard - Gabriel Munteanu
> ---
> Makefile.target | 2 +-
> hw/amd_iommu.c | 663
> +
The OS needs an ACPI IVRS table to discover and use the IOMMU.
Signed-off-by: Eduard - Gabriel Munteanu
---
src/acpi.c | 79
1 files changed, 79 insertions(+), 0 deletions(-)
diff --git a/src/acpi.c b/src/acpi.c
index 18830dc..c267c
This iterates over capabilities exposed by PCI devices. It's needed by
IOMMU initialization code to discover the Secure Device capability.
Signed-off-by: Eduard - Gabriel Munteanu
---
src/pci.h |5 +
1 files changed, 5 insertions(+), 0 deletions(-)
diff --git a/src/pci.h b/src/pci.h
ind
The AMD IOMMU must be discovered and initialized by the BIOS if present.
Signed-off-by: Eduard - Gabriel Munteanu
---
Makefile |2 +-
src/iommu.c| 63
src/iommu.h| 12 ++
src/pci_ids.h |1 +
src/pci_regs.
This allows the device to work properly with an emulated IOMMU.
Signed-off-by: Eduard - Gabriel Munteanu
---
hw/rtl8139.c | 99 -
1 files changed, 56 insertions(+), 43 deletions(-)
diff --git a/hw/rtl8139.c b/hw/rtl8139.c
index d92981d..
Emulated PCI IDE controllers now use the memory access interface. This
also allows an emulated IOMMU to translate and check accesses.
Map invalidation results in cancelling DMA transfers. Since the guest OS
can't properly recover the DMA results in case the mapping is changed,
this is a fairly goo
This introduces emulation for the AMD IOMMU, described in "AMD I/O
Virtualization Technology (IOMMU) Specification".
Signed-off-by: Eduard - Gabriel Munteanu
---
Makefile.target |2 +-
hw/amd_iommu.c | 663 +++
hw/pc.c |2 +
h
This allows the device to work properly with an emulated IOMMU.
Signed-off-by: Eduard - Gabriel Munteanu
Acked-by: malc
---
hw/ac97.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/hw/ac97.c b/hw/ac97.c
index d71072d..bad38fb 100644
--- a/hw/ac97.c
+++ b/hw/ac97.c
This allows the device to work properly with an emulated IOMMU.
Signed-off-by: Eduard - Gabriel Munteanu
---
hw/eepro100.c | 86 ++--
1 files changed, 46 insertions(+), 40 deletions(-)
diff --git a/hw/eepro100.c b/hw/eepro100.c
index 2b75c8f
PCI devices should access memory through pci_memory_*() instead of
cpu_physical_memory_*(). This also provides support for translation and
access checking in case an IOMMU is emulated.
Memory maps are treated as remote IOTLBs (that is, translation caches
belonging to the IOMMU-aware device itself)
Hi,
I rebased my work on mst's PCI tree and, hopefully, fixed issues raised by
others. Here's a summary of the changes:
- made it apply to mst/pci
- moved some AMD IOMMU stuff in a reset handler
- dropped range_covers_range() (wasn't the same as ranges_overlap(), but the
latter was better anyway
Hello.
I have similar troubles when I trying to pass through usbdevice real
USB stick from Ubuntu 9.10 host (qemu 0.11) to FreeBSD 7.3 or FreeBSD
8.1 guest.
FreeBSD 7.3 guest:
--- cut --
umass0: Invalid CSW: sig 0x should be 0x53425355
umass0: BBB reset failed, STALLED
umass0: BBB
Thanks, applied.
On Tue, Aug 24, 2010 at 5:06 AM, Isaku Yamahata wrote:
> Ping.
>
> On Wed, Aug 04, 2010 at 05:43:20PM +0900, Isaku Yamahata wrote:
>> https://bugs.launchpad.net/bugs/611646
>> reports that ./i386-softmmu/qemu -M isapc segfaults.
>> This patch fixes the segfault introduced by
>> f
Thanks, applied.
On Thu, Jul 29, 2010 at 9:16 PM, Marcelo Tosatti wrote:
> On Thu, Jul 29, 2010 at 01:41:45PM +0300, Gleb Natapov wrote:
>> Use this one instead.
>>
>> On Wed, Jul 28, 2010 at 06:13:22PM +0300, Gleb Natapov wrote:
>> > It is possible that subpage mmio is registered over existing m
Attached is the patch for fixing the issue reported in bug 618533.
The patch applies clean against 0.12.5 as well as git version.
-devsk
PS: I am not on the list. Please CC me.
qemu-kvm-ide-ata.patch
Description: Binary data
19 matches
Mail list logo