On 10/12/2023 18:53, Philippe Mathieu-Daudé wrote:
> Hi Martin, Paolo, Markus, Marc-André,
>
> With the following changes:
>
> -- >8 --
> diff --git a/hw/ppc/prep.c b/hw/ppc/prep.c
> index 137276bcb9..291495f798 100644
> --- a/hw/ppc/prep.c
> +++ b/hw/ppc/prep.c
> @@ -245,6 +245,7 @@ static vo
I'm not sure whether the error has already been fixed by others or not.
If so, please just ignore this patch.
On 07/06/2023 23:08, Peng Liang wrote:
virt-acpi-build.c uses warn_report. However, it doesn't include
qemu/error-report.h directly, it include qemu/error-report.h via tra
error-report.h any more and it will lead to build errors.
Include qemu/error-report.h directly in virt-acpi-build.c to avoid the
errors.
Signed-off-by: Peng Liang
---
hw/arm/virt-acpi-build.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/hw/arm/virt-acpi-build.c b/hw/arm/virt-acpi-build.c
On 7/6/2022 2:29 AM, Steven Sistare wrote:
> On 7/3/2022 4:15 AM, Peng Liang wrote:
>> On 6/15/2022 10:52 PM, Steve Sistare wrote:
>>> Provide the cpr-save restart mode, which preserves the guest VM across a
>>> restart of the qemu process. After cpr-save, the cal
On 6/15/2022 10:52 PM, Steve Sistare wrote:
> Enable vfio-pci devices to be saved and restored across an exec restart
> of qemu.
>
> At vfio creation time, save the value of vfio container, group, and device
> descriptors in cpr state.
>
> In the container pre_save handler, suspend the use of
On 6/15/2022 10:52 PM, Steve Sistare wrote:
> Save accepted socket fds before cpr-save, and look for them after cpr-load.
> Block cpr-exec if a socket enables the TLS or websocket option. Allow a
> monitor socket by closing it on exec.
>
> Signed-off-by: Mark Kanda
> Signed-off-by: Steve Sist
On 6/15/2022 10:52 PM, Steve Sistare wrote:
> Provide the cpr-save restart mode, which preserves the guest VM across a
> restart of the qemu process. After cpr-save, the caller passes qemu
> command-line arguments to cpr-exec, which directly exec's the new qemu
> binary. The arguments must inc
On 6/15/2022 10:51 PM, Steve Sistare wrote:
> Add an iterator over the sections of a flattened address space.
>
> Signed-off-by: Steve Sistare
> Reviewed-by: Marc-André Lureau
> ---
> include/exec/memory.h | 31 +++
> softmmu/memory.c | 20 +++
On 11/25/2021 9:53 PM, Hanna Reitz wrote:
> Hi,
>
> Peng Liang has reported an issue regarding migration of raw images here:
> https://lists.nongnu.org/archive/html/qemu-block/2021-11/msg00673.html
>
> It turns out that after migrating, all permissions are shared when they
>
5f7772c4d0cf32f4e779fcd5a69ae4dae24aeebf
>("block-backend: Defer shared_perm tightening migration
>completion")
> Reported-by: Peng Liang
> Signed-off-by: Hanna Reitz
> ---
> block/block-backend.c | 11 +++
> 1 file changed, 11 insertions(+)
>
Thanks for your patch!
Tested-by: Peng Liang
Hi folks,
When we test migration with raw-format disk, we found that the QEMU
process in the dst will lose the write lock after migration. However,
the QEMU process in the dst will still hold the write lock for
qcow2-format disk.
After reading some block layer's code, I found that the first
blk_
indow dynamically (SPAPR IOMMU v2)")
CC: qemu-sta...@nongnu.org
Signed-off-by: Peng Liang
---
v1 -> v2:
- Don't change to _SAFE variant in vfio_host_win_del. [Alex]
---
hw/vfio/common.c | 8
1 file changed, 8 insertions(+)
diff --git a/hw/vfio/common.c b/hw/vfio/common.c
On 11/17/2021 3:01 AM, Alex Williamson wrote:
> On Tue, 16 Nov 2021 19:56:26 +0800
> Peng Liang wrote:
>
>> hostwin is allocated and added to hostwin_list in vfio_host_win_add, but
>> it is only deleted from hostwin_list in vfio_host_win_del, which causes
>> a memo
indow dynamically (SPAPR IOMMU v2)")
CC: qemu-sta...@nongnu.org
Signed-off-by: Peng Liang
---
hw/vfio/common.c | 12 ++--
1 file changed, 10 insertions(+), 2 deletions(-)
diff --git a/hw/vfio/common.c b/hw/vfio/common.c
index dd387b0d3959..2cce60c5fac3 100644
--- a/hw/vfio/common.c
+++
On 6/10/2021 3:32 PM, Markus Armbruster wrote:
> Peng Liang writes:
>
>> On 6/9/2021 8:15 PM, Daniel P. Berrangé wrote:
>>> On Wed, Jun 09, 2021 at 02:09:47PM +0200, Markus Armbruster wrote:
>>>> Paolo Bonzini writes:
>>>>
>>>>>
Based on the description of error_setg(), the local variable err in
qemu_init_subsystems() should be initialized to NULL.
Fix: efd7ab22fb "vl: extract qemu_init_subsystems"
Signed-off-by: Peng Liang
---
The patch is generated by the following coccinelle script (thanks to
Ma
On 6/9/2021 8:15 PM, Daniel P. Berrangé wrote:
> On Wed, Jun 09, 2021 at 02:09:47PM +0200, Markus Armbruster wrote:
>> Paolo Bonzini writes:
>>
>>> On 10/06/21 10:47, Zhenzhong Duan wrote:
Based on the description of error_setg(), the local variable err in
qemu_maybe_daemonize() should b
Move
instructions")
Cc: qemu-sta...@nongnu.org
Signed-off-by: Peng Liang
---
hw/scsi/lsi53c895a.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/hw/scsi/lsi53c895a.c b/hw/scsi/lsi53c895a.c
index 7d13c7dc1c46..af46c62f0d78 100644
--- a/hw/scsi/lsi53c895a.c
+++ b/hw/s
On 9/23/2020 10:50 PM, John Snow wrote:
> On 8/26/20 9:19 AM, Peng Liang wrote:
>> We found an issue when doing block-commit with iothreads, which tries to
>> dereference a NULL pointer.
>>
>
> I'm clearing out my patch backlog. I am a bit out of the loop on block
Hi,
I encountered the problem months ago too. Could we move the creation of
the block job (block_job_create) before appending the new bs to
mirror_top_bs (bdrv_append) as I wrote in [*]? I found that after
bdrv_append, qemu will use mirror_top_bs to do write. And when writing,
qemu will use bs-
1e8,
envp=0x7ffe4cf8f4e0) at ../softmmu/main.c:50
Reported-by: Euler Robot
Signed-off-by: Peng Liang
---
block/nbd.c | 8 +---
1 file changed, 5 insertions(+), 3 deletions(-)
diff --git a/block/nbd.c b/block/nbd.c
index 42536702b6f9..b22a9ecbbcd0 100644
--- a/block/nbd.c
+++ b/block/nb
Hi,
Recently, I tried to use ivshmem-plain devices to share some information
between guests. I found that if the file of the shmem doesn't exist,
then QEMU will create one and the mode of it is 0644. Maybe it is risky
because everyone can read the content of the file? Do we need to change
it to
Kindly ping.
On 11/16/2020 10:13 PM, Peng Liang wrote:
> vnc_write() should be locked after the RFB protocol is initialized.
>
> Fixes: 0c426e4534b4 ("vnc: Add support for color map")
> Cc: qemu-sta...@nongnu.org
> Reported-by: Euler Robot
> Signed-off-by: Peng
vnc_write() should be locked after the RFB protocol is initialized.
Fixes: 0c426e4534b4 ("vnc: Add support for color map")
Cc: qemu-sta...@nongnu.org
Reported-by: Euler Robot
Signed-off-by: Peng Liang
---
ui/vnc.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/ui/vnc.c b/ui/v
There is a field with vmstate_ghes_state as vmsd in vmstate_ghes_state,
which will lead to infinite recursion in dump_vmstate_vmsd.
Fixes: a08a64627b ("ACPI: Record the Generic Error Status Block address")
Reported-by: Euler Robot
Signed-off-by: Peng Liang
Acked-by: Igor Mammedov
--
On 11/12/2020 1:26 AM, Dr. David Alan Gilbert wrote:
> * Igor Mammedov (imamm...@redhat.com) wrote:
>> On Wed, 11 Nov 2020 14:01:12 +
>> "Dr. David Alan Gilbert" wrote:
>>
>>> Is someone taking a fix for this in 5.2 - it's breaking vmstate
>>> comparison.
>> can you merge it via migration tree
CPU features are in relationship a->b, which means
b is dependent on a. If b is enabled by user, then a is enabled
automatically. And if a is disabled by user, then b is disabled
automatically.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/cpu.c
To add CPU feature dependencies, we need to known whether a CPU feature
is set explicitly or automatically by dependencies mechanism. Introduce
user_mask to do that.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/cpu.c | 2 ++
target/arm/cpu.h | 1 +
2 files changed, 3
gisters in AArch32, it's harmless to change the ID registers in
AArch32 to 64-bits.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
hw/intc/armv7m_nvic.c | 32 ++---
target/arm/cpu.c | 251
target/arm/cp
linux-headers/linux/kvm.h
Peng Liang (10):
linux-header: Introduce KVM_CAP_ARM_CPU_FEATURE
target/arm: Update ID fields
target/arm: only set ID_PFR1_EL1.GIC for AArch32 guest
target/arm: convert isar regs to array
target/arm: Introduce kvm_arm_cpu_feature_supported
target/arm: regist
Introduce KVM_CAP_ARM_CPU_FEATURE.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
linux-headers/linux/kvm.h | 1 +
1 file changed, 1 insertion(+)
diff --git a/linux-headers/linux/kvm.h b/linux-headers/linux/kvm.h
index 43580c767c33..146eaec35d49 100644
--- a/linux-headers/linux
in
DDI.0487
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/cpu.c | 188 +++
1 file changed, 188 insertions(+)
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
index 13179e13e358..c5530550ece0 100644
--- a/target/arm/cpu.c
Introduce kvm_arm_cpu_feature_supported to check whether KVM supports to
set CPU features in ARM.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/kvm64.c | 14 ++
target/arm/kvm_arm.h | 7 +++
2 files changed, 21 insertions(+)
diff --git a/target/arm
because GIC has been
initialized. Hence, let's give all ID registers a chance to write to
KVM. If the write is successful, then write to (index,value) list.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/helper.c | 46 +---
t
Add CPU features to the result of query-cpu-model-expansion so that
other applications (such as libvirt) can know the supported CPU
features.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/monitor.c | 4
1 file changed, 4 insertions(+)
diff --git a/target/arm
Some AArch64 CPU doesn't support AArch32 mode, AArch32 registers should
be 0.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/helper.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/target/arm/helper.c b/target/arm/helper.c
index 97bb6b8
Update definitions for ID fields, up to ARMv8.6.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/cpu.h | 17 +
1 file changed, 17 insertions(+)
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
index c18a91676656..4c76fff1985f 100644
--- a/target/arm/cpu.h
On 10/24/2020 2:54 AM, Dr. David Alan Gilbert wrote:
> * Igor Mammedov (imamm...@redhat.com) wrote:
>> On Mon, 19 Oct 2020 17:31:56 +0800
>> Peng Liang wrote:
>>
>>> There is a field with vmstate_ghes_state as vmsd in vmstate_ghes_state,
>>> w
On 10/20/2020 7:27 PM, Peter Maydell wrote:
> On Tue, 20 Oct 2020 at 12:17, Peng Liang wrote:
>>
>> On 10/19/2020 6:35 PM, Philippe Mathieu-Daudé wrote:
>>> On 10/19/20 11:34 AM, Peng Liang wrote:
>>>> VMStateDescription.fields should be end with
On 10/20/2020 7:27 PM, Philippe Mathieu-Daudé wrote:
> On 10/20/20 1:17 PM, Peng Liang wrote:
>> On 10/19/2020 6:35 PM, Philippe Mathieu-Daudé wrote:
>>> On 10/19/20 11:34 AM, Peng Liang wrote:
>>>> VMStateDescription.fields should be end with VMSTA
On 10/19/2020 6:35 PM, Philippe Mathieu-Daudé wrote:
> On 10/19/20 11:34 AM, Peng Liang wrote:
>> VMStateDescription.fields should be end with VMSTATE_END_OF_LIST().
>> However, microbit_i2c_vmstate doesn't follow it. Let's change it.
>
> It might be easy to a
On 10/19/2020 6:35 PM, Philippe Mathieu-Daudé wrote:
> On 10/19/20 11:34 AM, Peng Liang wrote:
>> VMStateDescription.fields should be end with VMSTATE_END_OF_LIST().
>> However, microbit_i2c_vmstate doesn't follow it. Let's change it.
>
> It might be easy to a
VMStateDescription.fields should be end with VMSTATE_END_OF_LIST().
However, microbit_i2c_vmstate doesn't follow it. Let's change it.
Fixes: 9d68bf564e ("arm: Stub out NRF51 TWI magnetometer/accelerometer
detection")
Reported-by: Euler Robot
Signed-off-by: Pen
There is a field with vmstate_ghes_state as vmsd in vmstate_ghes_state,
which will lead to infinite recursion in dump_vmstate_vmsd.
Fixes: a08a64627b ("ACPI: Record the Generic Error Status Block address")
Reported-by: Euler Robot
Signed-off-by: Peng Liang
---
hw/acpi/generic_even
in
DDI.0487
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/cpu.c | 188 +++
1 file changed, 188 insertions(+)
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
index 1dd7228875db..10a52518dd14 100644
--- a/target/arm/cpu.c
To add CPU feature dependencies, we need to known whether a CPU feature
is set explicitly or automatically by dependencies mechanism. Introduce
user_mask to do that.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/cpu.h | 1 +
target/arm/cpu.c | 2 ++
2 files changed, 3
Introduce kvm_arm_cpu_feature_supported to check whether KVM supports to
set CPU features in ARM.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/kvm_arm.h | 7 +++
target/arm/kvm64.c | 14 ++
2 files changed, 21 insertions(+)
diff --git a/target/arm
gisters in AArch32, it's harmless to change the ID registers in
AArch32 to 64-bits.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/cpu.h | 225 +++--
target/arm/internals.h | 15 +--
hw/intc/armv7m_nvic.c | 28 ++---
t
CPU features are in relationship a->b, which means
b is dependent on a. If b is enabled by user, then a is enabled
automatically. And if a is disabled by user, then b is disabled
automatically.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/cpu.c
Add CPU features to the result of query-cpu-model-expansion so that
other applications (such as libvirt) can know the supported CPU
features.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/monitor.c | 4
1 file changed, 4 insertions(+)
diff --git a/target/arm
Update definitions for ID fields, up to ARMv8.6.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/cpu.h | 17 +
1 file changed, 17 insertions(+)
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
index 6036f61d60b3..d89043448923 100644
--- a/target/arm/cpu.h
Introduce KVM_CAP_ARM_CPU_FEATURE.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
linux-headers/linux/kvm.h | 1 +
1 file changed, 1 insertion(+)
diff --git a/linux-headers/linux/kvm.h b/linux-headers/linux/kvm.h
index a28c3667370b..169eb0bb31c8 100644
--- a/linux-headers/linux
because GIC has been
initialized. Hence, let's give all ID registers a chance to write to
KVM. If the write is successful, then write to (index,value) list.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/kvm_arm.h | 3 +++
target/arm/helper.c
Some AArch64 CPU doesn't support AArch32 mode, AArch32 registers should
be 0.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/helper.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/target/arm/helper.c b/target/arm/helper.c
index 88bd9dd
/patch/11782361/
v1 -> v2:
- adjust the order of patches
- only expose AArch64 features which are exposed by kernel via /proc/cpuinfo
- add check for conflict CPU features set by user
- split the change in linux-headers/linux/kvm.h
Peng Liang (10):
linux-header: Introduce KVM_CAP_ARM_CPU_FEAT
| (s->job is not NULL until 3!)
3. bs_opaque->job = s;|
Just moving step 2 & 3 before 1 can avoid this.
Reported-by: Euler Robot
Signed-off-by: Peng Liang
---
block/mirror.c | 21 ++---
1 file changed, 10 insertions(+), 11 deletions
On 8/13/2020 8:48 PM, Andrew Jones wrote:
> On Thu, Aug 13, 2020 at 06:26:53PM +0800, Peng Liang wrote:
>> Some CPU features are dependent on other CPU features. For example,
>> ID_AA64PFR0_EL1.FP field and ID_AA64PFR0_EL1.AdvSIMD must have the same
>> value, which mea
On 8/13/2020 8:21 PM, Andrew Jones wrote:
> On Thu, Aug 13, 2020 at 06:26:50PM +0800, Peng Liang wrote:
>> The implementation of CPUClass::parse_features only supports CPU
>> features in "feature=value" format. However, libvirt maybe send us a
>> CPU feature strin
On 8/13/2020 8:56 PM, Andrew Jones wrote:
> On Thu, Aug 13, 2020 at 06:26:55PM +0800, Peng Liang wrote:
>> Add CPU features to the result of query-cpu-model-expansion so that
>> other applications (such as libvirt) can know the supported CPU
>> features.
>>
>
On 8/13/2020 7:00 PM, Cornelia Huck wrote:
> On Thu, 13 Aug 2020 18:26:54 +0800
> Peng Liang wrote:
>
>> Introduce KVM_CAP_ARM_CPU_FEATURE to check whether KVM supports to set
>> CPU features in ARM.
>>
>> Signed-off-by: zhanghailiang
>> Signed-off-by: Pen
Add i8mm, bf16, and dgh CPU features for AArch64.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/cpu.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
index 0f620e8afe..9e2ddbc3ed 100644
--- a/target/arm/cpu.c
+++ b/target/arm
Update definitions for ID fields, up to ARMv8.6.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/cpu.h | 17 +
1 file changed, 17 insertions(+)
diff --git a/target/arm/cpu.h b/target/arm/cpu.h
index da68b7f8f4..7a46d223bc 100644
--- a/target/arm/cpu.h
in
DDI.0487
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/cpu.c | 343 +++
1 file changed, 343 insertions(+)
diff --git a/target/arm/cpu.c b/target/arm/cpu.c
index 79d7a6b45c..113cf4a9e7 100644
--- a/target/arm/cpu.c
+++ b
Introduce KVM_CAP_ARM_CPU_FEATURE to check whether KVM supports to set
CPU features in ARM.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
linux-headers/linux/kvm.h | 1 +
target/arm/cpu.c | 5 +
target/arm/kvm64.c| 14 ++
target/arm/kvm_arm.h
gisters in AArch32, it's harmless to change the ID registers in
AArch32 to 64-bits.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
hw/intc/armv7m_nvic.c | 48
target/arm/cpu.c | 232 +++---
target/arm/cp
Add CPU features to the result of query-cpu-model-expansion so that
other applications (such as libvirt) can know the supported CPU
features.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/cpu.c | 41 +
target/arm/cpu.h
ures is upper for convenience.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/cpu64.c | 101 +
1 file changed, 101 insertions(+)
diff --git a/target/arm/cpu64.c b/target/arm/cpu64.c
index 4b52505b6e..981011b3da 100644
--- a/target/arm/cp
because GIC has been
initialized. Hence, let's give all ID registers a chance to write to
KVM. If the write is successful, then write to (index,value) list.
Signed-off-by: zhanghailiang
Signed-off-by: Peng Liang
---
target/arm/helper.c | 31 ---
target/arm/
d c CPU features are in relationship a->b->c, which
means c is dependent on b and b is dependent on a. If c is enabled by
user, then a and b is enabled automatically. And if a is disabled by
user, then b and c is disabled automatically.
Signed-off-by: zhanghailiang
Signed-off-by: P
/cover/11711693/
Peng Liang (9):
target/arm: convert isar regs to array
target/arm: parse cpu feature related options
target/arm: register CPU features for property
target/arm: Allow ID registers to synchronize to KVM
target/arm: introduce CPU feature dependency mechanism
target/arm
Add logs during qemu start.
Signed-off-by: Peng Liang
---
blockdev.c | 2 ++
softmmu/vl.c | 2 ++
util/oslib-posix.c | 3 +--
3 files changed, 5 insertions(+), 2 deletions(-)
diff --git a/blockdev.c b/blockdev.c
index 3848a9c8ab..8e3ab8a9b2 100644
--- a/blockdev.c
+++ b
Add log for each modules.
Signed-off-by: Peng Liang
---
accel/kvm/kvm-all.c | 5 -
hw/pci/pci.c| 1 +
hw/usb/host-libusb.c| 5 +
hw/virtio/virtio-pci.c | 2 ++
hw/virtio/virtio-scsi-pci.c | 3 +++
hw/virtio/virtio.c | 13
This path serial add some logs for some modeuls to make it easier to debug.
Peng Liang (5):
log: Add logs for vm start and destroy
log: Add log for each modules
log: Add more details to virtio_report in virtqueue_pop
log: Add log at boot & cpu init for aarch64
log: Add logs during
Add log at boot & cpu init for aarch64.
Signed-off-by: Peng Liang
---
hw/arm/boot.c | 2 ++
hw/arm/virt.c | 2 ++
2 files changed, 4 insertions(+)
diff --git a/hw/arm/boot.c b/hw/arm/boot.c
index 3e9816af80..a2d5787807 100644
--- a/hw/arm/boot.c
+++ b/hw/arm/boot.c
@@ -1292,6 +1292,8 @@
Add logs for vm start and destroy.
Signed-off-by: Peng Liang
---
hw/acpi/core.c | 3 +++
hw/core/reset.c | 2 ++
softmmu/vl.c| 8
3 files changed, 13 insertions(+)
diff --git a/hw/acpi/core.c b/hw/acpi/core.c
index ac06db3450..0a24f018cf 100644
--- a/hw/acpi/core.c
+++ b/hw/acpi
Add virtio device name and virtqueue info to virtio_report in
virtqueue_pop so that we can find out which device's virtqueue is
broken.
Signed-off-by: Peng Liang
---
hw/virtio/virtio.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/hw/virtio/virtio.c b/hw/virtio/vir
76 matches
Mail list logo