Skip to content
Snippets Groups Projects
  1. Jun 30, 2021
  2. Jun 15, 2021
  3. Jun 02, 2021
  4. May 13, 2021
  5. May 02, 2021
  6. Apr 01, 2021
    • Priyankar Jain's avatar
      dbus-vmstate: Increase the size of input stream buffer used during load · 1d9fa7a8
      Priyankar Jain authored
      
      This commit fixes an issue where migration is failing in the load phase
      because of a false alarm about data unavailability.
      
      Following is the error received when the amount of data to be transferred
      exceeds the default buffer size setup by G_BUFFERED_INPUT_STREAM(4KiB),
      even when the maximum data size supported by this backend is 1MiB
      (DBUS_VMSTATE_SIZE_LIMIT):
      
        dbus_vmstate_post_load: Invalid vmstate size: 4364
        qemu-kvm: error while loading state for instance 0x0 of device 'dbus-vmstate/dbus-vmstate'
      
      This commit sets the size of the input stream buffer used during load to
      DBUS_VMSTATE_SIZE_LIMIT which is the maximum amount of data a helper can
      send during save phase.
      Secondly, this commit makes sure that the input stream buffer is loaded before
      checking the size of the data available in it, rectifying the false alarm about
      data unavailability.
      
      Fixes: 5010cec2 ("Add dbus-vmstate object")
      Signed-off-by: default avatarPriyankar Jain <priyankar.jain@nutanix.com>
      Message-Id: <cdaad4718e62bf22fd5e93ef3e252de20da5c17c.1612273156.git.priyankar.jain@nutanix.com>
      [ Modified printf format for gsize ]
      Reviewed-by: default avatarMarc-André Lureau <marcandre.lureau@redhat.com>
      1d9fa7a8
  7. Mar 09, 2021
  8. Feb 18, 2021
  9. Feb 09, 2021
  10. Feb 08, 2021
    • Pavel Dovgalyuk's avatar
      replay: rng-builtin support · 54550d88
      Pavel Dovgalyuk authored
      
      This patch enables using rng-builtin with record/replay
      by making the callbacks deterministic.
      
      Signed-off-by: default avatarPavel Dovgalyuk <Pavel.Dovgalyuk@ispras.ru>
      Message-Id: <161233201286.170686.7858208964037376305.stgit@pasha-ThinkPad-X280>
      Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>
      54550d88
    • Igor Mammedov's avatar
      machine: add missing doc for memory-backend option · 8db0b204
      Igor Mammedov authored
      
      Add documentation for '-machine memory-backend' CLI option and
      how to use it.
      
      And document that x-use-canonical-path-for-ramblock-id,
      is considered to be stable to make sure it won't go away by accident.
      
      x- was intended for unstable/iternal properties, and not supposed to
      be stable option. However it's too late to rename (drop x-)
      it as it would mean that users will have to mantain both
      x-use-canonical-path-for-ramblock-id (for QEMU 5.0-5.2) versions
      and prefix-less for later versions.
      
      Signed-off-by: default avatarIgor Mammedov <imammedo@redhat.com>
      Message-Id: <20210121161504.1007247-1-imammedo@redhat.com>
      Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>
      8db0b204
    • David Gibson's avatar
      confidential guest support: Introduce new confidential guest support class · f91f9f25
      David Gibson authored
      
      Several architectures have mechanisms which are designed to protect
      guest memory from interference or eavesdropping by a compromised
      hypervisor.  AMD SEV does this with in-chip memory encryption and
      Intel's TDX can do similar things.  POWER's Protected Execution
      Framework (PEF) accomplishes a similar goal using an ultravisor and
      new memory protection features, instead of encryption.
      
      To (partially) unify handling for these, this introduces a new
      ConfidentialGuestSupport QOM base class.  "Confidential" is kind of vague,
      but "confidential computing" seems to be the buzzword about these schemes,
      and "secure" or "protected" are often used in connection to unrelated
      things (such as hypervisor-from-guest or guest-from-guest security).
      
      The "support" in the name is significant because in at least some of the
      cases it requires the guest to take specific actions in order to protect
      itself from hypervisor eavesdropping.
      
      Signed-off-by: default avatarDavid Gibson <david@gibson.dropbear.id.au>
      f91f9f25
  11. Feb 01, 2021
  12. Jan 28, 2021
  13. Dec 18, 2020
  14. Dec 15, 2020
  15. Nov 17, 2020
  16. Nov 15, 2020
  17. Oct 27, 2020
  18. Oct 13, 2020
  19. Sep 22, 2020
  20. Sep 18, 2020
  21. Sep 16, 2020
  22. Sep 09, 2020
  23. Aug 21, 2020
Loading