commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
block: Allow wait_serialising_requests() at any point We can only have a single wait_serialising_requests() call per request because otherwise we can run into deadlocks where requests are waiting for each other. The same is true when wait_serialising_requests() is not at the very beginning of a request, so that other requests can be issued between the start of the tracking and wait_serialising_requests(). Fix this by changing wait_serialising_requests() to ignore requests that are already (directly or indirectly) waiting for the calling request. Signed-off-by: Kevin Wolf <[email protected]> Reviewed-by: Max Reitz <[email protected]> Reviewed-by: Benoit Canet <[email protected]>
6460440f34c709461b84375cfd8a86b27d433225
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/6460440f34c709461b84375cfd8a86b27d433225
2014-01-24 17:40:02+01:00
raw-posix: add support for write_zeroes on XFS and block devices The code is similar to the implementation of discard and write_zeroes with UNMAP. However, failure must be propagated up to block.c. The stale page cache problem can be reproduced as follows: # modprobe scsi-debug lbpws=1 lbprz=1 # ./qemu-io /dev/sdXX qemu-io> write -P 0xcc 0 2M qemu-io> write -z 0 1M qemu-io> read -P 0x00 0 512 Pattern verification failed at offset 0, 512 bytes qemu-io> read -v 0 512 00000000: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................ ... # ./qemu-io --cache=none /dev/sdXX qemu-io> write -P 0xcc 0 2M qemu-io> write -z 0 1M qemu-io> read -P 0x00 0 512 qemu-io> read -v 0 512 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ ... And similarly with discard instead of "write -z". Signed-off-by: Paolo Bonzini <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
97a2ae34537882df34810d538ab1f51085499d2c
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/97a2ae34537882df34810d538ab1f51085499d2c
2013-12-03 15:26:49+01:00
ahci: fix win7 hang on boot When AHCI executes an asynchronous IDE command, it checked DRDY without checking either DRQ or BSY. This sometimes caused interrupt to be sent before command is actually completed. This resulted in a race condition: if guest then managed to access the device before command has completed, it would hang waiting for an interrupt. This was observed with windows 7 guests. To fix, check for DRQ or BSY in additiona to DRDY, if set, the command is asynchronous so delay the interrupt until asynchronous done callback is invoked. Reported-by: Michael S. Tsirkin <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Tested-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
8464b273d69c61e33c55347e5b6bc0659687bae2
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8464b273d69c61e33c55347e5b6bc0659687bae2
2013-10-29 13:06:39+01:00
block: qemu-iotests for vhdx, add write test support This removes the IMGFMT_GENERIC blocker for read-only, so existing iotests run read/write tests for vhdx images created by qemu-img (e.g. tests 001, 002, 003). In addition, this updates the sample image test for the Hyper-V created image, to verify we can write it as well. Signed-off-by: Jeff Cody <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
751aec24cdcd4359b5927df5cebfe6b8d3e74515
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/751aec24cdcd4359b5927df5cebfe6b8d3e74515
2013-11-07 13:58:59+01:00
block: Improve driver whitelist checks The main intent of this patch is to consolidate the whitelist checks to a single point in the code instead of spreading it everywhere. This adds a nicer error message for read-only whitelisting, too, in places where it was still missing. The patch also contains a bonus bug fix: By finding the format first in bdrv_open() and then independently checking against the whitelist only later, we avoid the case that use of a non-whitelisted format results in probing rather than an error message. Previously, this could happen when using the driver=... option. Signed-off-by: Kevin Wolf <[email protected]> Reviewed-by: Fam Zheng <[email protected]>
8f94a6e40e46cbc8e8014da825d25824b1803b34
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8f94a6e40e46cbc8e8014da825d25824b1803b34
2013-10-11 16:50:00+02:00
sd: Avoid access to NULL BlockDriverState Commit 4f8a066b5fc254eeaabbbde56ba4f5b29cc68fdf (blockdev: Remove IF_* check for read-only blockdev_init) added a usage of bdrv_is_read_only() to sd_init(), which is called for versatilepb, versatileab and xilinx-zynq-a9 machines among others with NULL argument by default, causing the new qom-test to fail. Add a check to prevent this. Suggested-by: Kevin Wolf <[email protected]> Signed-off-by: Andreas Färber <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
794cbc26eb94ce13c75d105eea9ff0afff56e2c2
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/794cbc26eb94ce13c75d105eea9ff0afff56e2c2
2013-10-17 10:15:18+02:00
cpu-exec: Also reload CPUClass *cc after longjmp return in cpu_exec() Local variable CPUClass *cc needs to be reloaded after return from longjmp, too. (This fixes a mips-softmmu crash observed on FreeBSD when QEMU is built with clang.) Reported-by: Dimitry Andric <[email protected]> Signed-off-by: Juergen Lock <[email protected]> Signed-off-by: Andreas Färber <[email protected]>
6c78f29a2424622bfc9c30dfbbc13404481eacb6
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/6c78f29a2424622bfc9c30dfbbc13404481eacb6
2013-10-07 11:46:58+02:00
qcow2: Always use error path in l2_allocate Just returning -errno in some cases prevents trace_qcow2_l2_allocate_done from being executed (and, in one case, also the unused allocated L2 table from being freed). Always going down the error path fixes this. Signed-off-by: Max Reitz <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
be0b742ee320d1139d57062fa18490e7aa485f2a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/be0b742ee320d1139d57062fa18490e7aa485f2a
2013-09-27 17:22:43+02:00
qcow2: Assert against currently impossible overflow If qcow2_alloc_cluster_link_l2 is called with a QCowL2Meta describing a request crossing L2 boundaries, a buffer overflow will occur. This is impossible right now since such requests are never generated (every request is shortened to L2 boundaries before) and probably also completely unintended (considering the name "QCowL2Meta"), however, it is still worth an assertion. Signed-off-by: Max Reitz <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
c01dbccbad647be5784be39eb8fa0144732295db
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c01dbccbad647be5784be39eb8fa0144732295db
2013-09-25 21:57:44+02:00
usb-host-libusb: Fix reset handling The guest will issue an initial device reset when the device is attached, but since the current usb-host-libusb code only actually does the reset when udev->configuration != 0, and on attach the device is not yet configured, the reset gets ignored. This means that the device gets passed to the guest in an unknown state, which is not good. The udev->configuration check is there because of the release / claim interfaces done around the libusb_device_reset call, but these are not necessary. If interfaces are claimed when libusb_device_reset gets called libusb will release + reclaim them itself. The usb_host_ep_update call also is not necessary. If the reset succeeds the original config and interface alt settings will be restored. Last if the reset fails, that means the device has either disconnected or morphed into an another device and has been completely re-enumerated, so it is treated by the host as a new device and our handle is invalid, so on reset failure we need to call usb_host_nodev(). Signed-off-by: Hans de Goede <[email protected]> Signed-off-by: Gerd Hoffmann <[email protected]>
5af35d7feccaa7d26b72c6c3d14116421d736b36
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/5af35d7feccaa7d26b72c6c3d14116421d736b36
2013-10-22 16:28:48+02:00
usb: sanity check setup_index+setup_len in post_load Signed-off-by: Gerd Hoffmann <[email protected]>
c60174e847082ab9f70720f86509a3353f816fad
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c60174e847082ab9f70720f86509a3353f816fad
2013-09-10 11:14:41+02:00
block: Add support for throttling burst max in QMP and the command line. The max parameter of the leaky bucket throttling algorithm can be used to allow the guest to do bursts. The max value is a pool of I/O that the guest can use without being throttled at all. Throttling is triggered once this pool is empty. Signed-off-by: Benoit Canet <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
3e9fab690d59ac15956c3733fe0794ce1ae4c4af
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/3e9fab690d59ac15956c3733fe0794ce1ae4c4af
2013-09-06 15:25:07+02:00
tcg-i386: Remove abort from GETPC_LDST Indeed, remove it entirely and remove the is_tcg_gen_code check from GETPC_EXT. Fixes https://bugs.launchpad.net/qemu/+bug/1218098 wherein a call to a "normal" helper function performed a sequence of tail calls all the way into the memory helper functions, leading to a stack frame in which the memory helper function appeared to be called directly from tcg. Signed-off-by: Richard Henderson <[email protected]>
584950fd4e4d6ca580800e46f1b41cf1b0b4236c
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/584950fd4e4d6ca580800e46f1b41cf1b0b4236c
2013-08-29 20:20:39+02:00
slirp/arp_table.c: Avoid shifting into sign bit of signed integers "0xf << 28" shifts right into the sign bit, since 0xf is a signed integer. Use the 'U' suffix to force an unsigned shift to avoid this undefined behaviour and a clang sanitizer warning. Signed-off-by: Peter Maydell <[email protected]> Reviewed-by: Eric Blake <[email protected]> Acked-by: Jan Kiszka <[email protected]> Signed-off-by: Michael Tokarev <[email protected]>
ed6bc28e8a448b9005af50eed12893c5f7711c6e
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ed6bc28e8a448b9005af50eed12893c5f7711c6e
2013-09-01 19:09:09+04:00
tests: adjust test-aio to new aio_poll() semantics aio_poll(ctx, true) will soon block if any fd handlers have been set. Previously it would only block when .io_flush() returned true. This means that callers must check their wait condition *before* aio_poll() to avoid deadlock. Reviewed-by: Paolo Bonzini <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
24d1a6d9d5f5b3da868724dd3c6f56893e0693da
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/24d1a6d9d5f5b3da868724dd3c6f56893e0693da
2013-08-19 15:45:34+02:00
linux-user/signal.c: PPC: Silence clang uninitialized-use warning Silence a clang warning in a PPC signal return function: /home/petmay01/linaro/qemu-from-laptop/qemu/linux-user/signal.c:4611:9: error: variable 'sr_addr' is used uninitialized whenever 'if' condition is true [-Werror,-Wsometimes-uninitialized] if (!lock_user_struct(VERIFY_READ, sc, sc_addr, 1)) ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ /home/petmay01/linaro/qemu-from-laptop/qemu/linux-user/signal.c:4636:28: note: uninitialized use occurs here unlock_user_struct(sr, sr_addr, 1); ^~~~~~~ /home/petmay01/linaro/qemu-from-laptop/qemu/linux-user/qemu.h:442:27: note: expanded from macro 'unlock_user_struct' unlock_user(host_ptr, guest_addr, (copy) ? sizeof(*host_ptr) : 0) ^ This happens when we unlock a user struct which we never attempted to lock. Strictly, clang is actually wrong here -- it hasn't been able to spot that unlock_user_struct() doesn't use its second argument if the first is NULL. However it doesn't seem too unreasonable to demand that we pass in initialized values to it. Signed-off-by: Peter Maydell <[email protected]> Message-id: [email protected] Signed-off-by: Anthony Liguori <[email protected]>
b04636f8665a9492143529340eab4450d492d2ee
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b04636f8665a9492143529340eab4450d492d2ee
2013-07-29 19:56:52-05:00
qtest: Add IDE test case This adds a simple IDE test case and starts by verifying that IDENTIFY can be successfully used and return the correct serial number, version and the WCE flag is set for cache=writeback. Signed-off-by: Kevin Wolf <[email protected]>
acbe48013bf1eb9c9a435e76959f409584b35509
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/acbe48013bf1eb9c9a435e76959f409584b35509
2013-05-08 15:28:49+02:00
kvm: zero-initialize KVM_SET_GSI_ROUTING input kvm_add_routing_entry makes an attempt to zero-initialize any new routing entry. However, it fails to initialize padding within the u field of the structure kvm_irq_routing_entry. Other functions like kvm_irqchip_update_msi_route also fail to initialize the padding field in kvm_irq_routing_entry. It's better to just make sure all input is initialized. Once it is, we can also drop complex field by field assignment and just do the simple *a = *b to update a route entry. Signed-off-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Gleb Natapov <[email protected]>
0fbc20740342713f282b118b4a446c4c43df3f4a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/0fbc20740342713f282b118b4a446c4c43df3f4a
2013-07-03 10:38:19+02:00
hw/xen: Use g_free instead of free and fix potential memory leaks The wrong functions and the missing calls of g_free were reported by cppcheck. Signed-off-by: Stefan Weil <[email protected]> Acked-by: Stefano Stabellini <[email protected]> Signed-off-by: Michael Tokarev <[email protected]>
c5633d998a27502ad8cc10c2d46f91b02555ae7a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c5633d998a27502ad8cc10c2d46f91b02555ae7a
2013-06-11 23:45:44+04:00
pc: Fix crash when attempting to hotplug CPU with negative ID QMP command "{ 'execute': 'cpu-add', 'arguments': { 'id': -1 }}" may cause QEMU SIGSEGV at: piix4_cpu_hotplug_req () ... g->sts[cpu_id / 8] |= (1 << (cpu_id % 8)); ... Since for PC in current implementation id should be in range [0...maxcpus) and maxcpus is already checked, add check for lower bound and error out on incorrect value. Signed-off-by: Igor Mammedov <[email protected]> Signed-off-by: Andreas Färber <[email protected]>
8de433cb0820dc1f387a2d580d255744aacd60cc
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8de433cb0820dc1f387a2d580d255744aacd60cc
2013-06-10 23:33:18+02:00
cpu: Partially revert "cpu: Change qemu_init_vcpu() argument to CPUState" Commit c643bed99 moved qemu_init_vcpu() calls to common CPUState code. This causes x86 cpu-add to fail with "KVM: setting VAPIC address failed". The reason for the failure is that CPUClass::kvm_fd is not yet initialized in the following call graph: ->x86_cpu_realizefn ->x86_cpu_apic_realize ->qdev_init ->device_set_realized ->device_reset (hotplugged == 1) ->apic_reset_common ->vapic_base_update ->kvm_apic_vapic_base_update This causes attempted KVM vCPU ioctls to fail. By contrast, in the non-hotplug case the APIC is reset much later, when the vCPU is already initialized. As a quick and safe solution, move the qemu_init_vcpu() call back into the targets' realize functions. Reported-by: Chen Fan <[email protected]> Acked-by: Igor Mammedov <[email protected]> (for i386) Tested-by: Jia Liu <[email protected]> (for openrisc) Signed-off-by: Andreas Färber <[email protected]>
14a10fc39923b3af07c8c46d22cb20843bee3a72
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/14a10fc39923b3af07c8c46d22cb20843bee3a72
2013-07-29 15:29:15+02:00
qga: remove undefined behavior in ga_install_service() We shouldn't snprintf() from a buffer to the same buffer. Signed-off-by: Laszlo Ersek <[email protected]> Signed-off-by: Michael Roth <[email protected]>
a880845f3d92e508e43fcc38f0631b91c203e5d5
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a880845f3d92e508e43fcc38f0631b91c203e5d5
2013-05-30 11:37:37-05:00
block: Add driver-specific options for backing files Options starting in "backing." are passed to the backing file now. If you don't need to specify the filename for the backing file, you can add it on the command line instead of in the image file: $ qemu-nbd -t /tmp/test.img $ qemu-img create -f qcow2 empty.qcow2 1G $ qemu-system-x86_64 -drive file=empty.qcow2,backing.file.driver=nbd,\ backing.file.host=localhost Note that this doesn't override the backing filename from the image. If the image has one, this will fail because NBD doesn't want the options and a filename at the same time. Signed-off-by: Kevin Wolf <[email protected]> Reviewed-by: Eric Blake <[email protected]>
31ca6d077c24b7aaa322d8930e3e5debbdb4a047
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/31ca6d077c24b7aaa322d8930e3e5debbdb4a047
2013-04-22 10:27:59+02:00
test-visitor-serialization: Fix some memory leaks This patch fixes some of the memory leaks in test-visitor-serialization but not all of them. Signed-off-by: Stefan Berger <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
2bd01ac1e238c76e201ba21f314cec46437d2c5a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2bd01ac1e238c76e201ba21f314cec46437d2c5a
2013-04-05 14:38:45+02:00
lm32-dis: fix NULL pointer dereference Signed-off-by: Michael Walle <[email protected]>
ab2b9f174db088633922eaa82c2bcffd84e6bb94
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ab2b9f174db088633922eaa82c2bcffd84e6bb94
2013-03-18 19:40:34+01:00
vhost: Add vhost_commit callback for SeaBIOS ROM region re-mapping This patch follows MST's recommendation to move checks for vhost_verify_ring_mappings() -> cpu_physical_memory_map() operations from MemoryListener->region_[add,del]() -> vhost_set_memory() into final MemoryListener->commit() -> vhost_commit() callback. It addresses the case where virtio-scsi vq ioport RAM re-mapping to read-only SeaBIOS ROM triggers a cpu_physical_memory_map() NIL MemoryRegionSection pointer failure. Also save vhost_dev->mem_changed_[start,end]_addr values in vhost_set_memory() for final ranges_overlap checks. (Thanks Paolo!) Cc: Michael S. Tsirkin <[email protected]> Cc: Paolo Bonzini <[email protected]> Cc: Asias He <[email protected]> Signed-off-by: Nicholas Bellinger <[email protected]> Acked-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
af60314291af3cabda18d27f928b0e0ff899cc76
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/af60314291af3cabda18d27f928b0e0ff899cc76
2013-04-19 10:44:17+02:00
disas/i386.c: Add explicit braces round empty for-loop body Add explicit braces round an empty for-loop body; this fits QEMU style and is easier to read than an inconspicuous semicolon at the end of the line. It also silences a clang warning: disas/i386.c:4723:49: warning: for loop has empty body [-Wempty-body] for (i = 0; tmp[i] == '0' && tmp[i + 1]; i++); ^ disas/i386.c:4723:49: note: put the semicolon on a separate line to silence this warning [-Wempty-body] Signed-off-by: Peter Maydell <[email protected]> Signed-off-by: Blue Swirl <[email protected]>
af18078d8057203b1ed26ac5534d233aabb36886
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/af18078d8057203b1ed26ac5534d233aabb36886
2013-02-23 09:50:03+00:00
qcow2: flush refcount cache correctly in qcow2_write_snapshots() Since qcow2 metadata is cached we need to flush the caches, not just the underlying file. Use bdrv_flush(bs) instead of bdrv_flush(bs->file). Also add the error return path when bdrv_flush() fails and move the flush after checking for qcow2_alloc_clusters() failure so that the qcow2_alloc_clusters() error return value takes precedence. Signed-off-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
f6977f15561973d4a67b6aa46da88aa678c505dd
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f6977f15561973d4a67b6aa46da88aa678c505dd
2013-03-15 16:07:50+01:00
migration: restrict scope of incoming fd read handler The incoming migration is processed in a coroutine and uses an fd read handler to enter the yielded coroutine when data becomes available. The read handler was set too broadly, so that spurious coroutine entries were be triggered if other coroutine users yielded (like the block layer's bdrv_write() function). Install the fd read only only when yielding for more data to become available. This prevents spurious coroutine entries which break code that assumes only a specific set of places can re-enter the coroutine. This patch fixes crashes in block/raw-posix.c that are triggered with "migrate -b" when qiov becomes a dangling pointer due to a spurious coroutine entry that frees qiov early. Signed-off-by: Stefan Hajnoczi <[email protected]> Message-id: [email protected] Signed-off-by: Anthony Liguori <[email protected]>
d7cd369402191814a1bb339a730f3af411e9682f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/d7cd369402191814a1bb339a730f3af411e9682f
2013-02-11 13:22:52-06:00
block/curl: disable extra protocols to prevent CVE-2013-0249 There is a buffer overflow in libcurl POP3/SMTP/IMAP. The workaround is simple: disable extra protocols so that they cannot be exploited. Full details here: http://curl.haxx.se/docs/adv_20130206.html QEMU only cares about HTTP, HTTPS, FTP, FTPS, and TFTP. I have tested that this fix prevents the exploit on my host with libcurl-7.27.0-5.fc18. Signed-off-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
fb6d1bbd246c7a57ef53d3847ef225cd1349d602
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/fb6d1bbd246c7a57ef53d3847ef225cd1349d602
2013-02-08 11:14:20-06:00
qmp: Plug memory leaks in memchar-write, memchar-read Signed-off-by: Markus Armbruster <[email protected]> Reviewed-by: Eric Blake <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
13289fb5a716e06fb06febb880e5e116d485f82b
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/13289fb5a716e06fb06febb880e5e116d485f82b
2013-02-06 16:35:18-06:00
qemu-ga: Plug leaks on qmp_guest_network_get_interfaces() error paths Spotted by Coverity. Signed-off-by: Markus Armbruster <[email protected]> Reviewed-by: Eric Blake <[email protected]> Reviewed-by: Luiz Capitulino <[email protected]> Signed-off-by: Michael Roth <[email protected]>
10a2158f52796e5b2b7ce7991bde09a3c985a37b
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/10a2158f52796e5b2b7ce7991bde09a3c985a37b
2013-01-28 13:46:54-06:00
m25p80.c: Return state to IDLE after COLLECTING Default to moving back to the IDLE state after the COLLECTING_DATA state. For a well behaved guest this patch has no consequence, but A bad guest could crash QEMU by using one of the erase commands followed by a longer than 5 byte argument (undefined behaviour). Signed-off-by: Peter Crosthwaite <[email protected]> Signed-off-by: Edgar E. Iglesias <[email protected]>
a56d305a6d706cd75cfe0fa473f45772694f2a4a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a56d305a6d706cd75cfe0fa473f45772694f2a4a
2013-01-27 01:00:19+01:00
fw_cfg: Dumb down fw_cfg_add_*() not to return success / failure No caller is checking the value, so all errors get ignored, usually silently. assert() instead. Signed-off-by: Markus Armbruster <[email protected]> Signed-off-by: Blue Swirl <[email protected]>
4cad3867b6df2c0826ae508a9fe15dd0b9d8936a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/4cad3867b6df2c0826ae508a9fe15dd0b9d8936a
2013-01-19 10:22:40+00:00
win32-aio: Fix memory leak The buffer is allocated for both reads and writes, and obviously it should be freed even if an error occurs. Cc: [email protected] Signed-off-by: Kevin Wolf <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
e8bccad5ac6095b5af7946cd72d9aacb57f7c0a3
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e8bccad5ac6095b5af7946cd72d9aacb57f7c0a3
2013-01-17 10:58:09+01:00
qemu-ga: add ga_open_logfile() This function sets O_CLOEXEC on the log file fd so that it isn't leaked to executed processes. Signed-off-by: Luiz Capitulino <[email protected]> Reviewed-by: Eric Blake <[email protected]> Acked-by: Amos Kong <[email protected]> Tested-by: Amos Kong <[email protected]> Signed-off-by: Michael Roth <[email protected]>
9e92f6d46233171898fc7d0487a04e5b78e44234
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/9e92f6d46233171898fc7d0487a04e5b78e44234
2013-01-14 12:00:35-06:00
qemu-option: qemu_opt_set_bool(): fix code duplication It will set opt->str in qemu_opt_set_bool, without opt->str, there will be some potential bugs. These are uses of opt->str, and what happens when it isn't set: * qemu_opt_get(): returns NULL, which means "not set". Bug can bite when value isn't the default value. * qemu_opt_parse(): passes NULL to parse_option_bool(), which treats it like "on". Wrong if the value is actually false. Bug can bite when qemu_opts_validate() runs after qemu_opt_set_bool(). * qemu_opt_del(): passes NULL to g_free(), which is just fine. * qemu_opt_foreach(): passes NULL to the callback, which is unlikely to be prepared for it. * qemu_opts_print(): prints NULL, which crashes on some systems. * qemu_opts_to_qdict(): passes NULL to qstring_from_str(), which crashes. It also makes qemu_opt_set_bool more readable by using find_desc_by_name and opts_accepts_any. It is based on Luiz's patch and uses Markus's comments. Discussions can be found at: http://lists.nongnu.org/archive/html/qemu-devel/2012-07/msg02716.html Signed-off-by: Dong Xu Wang <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
ad718d01ba0af531d10b0a8685cf5047edfd1891
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ad718d01ba0af531d10b0a8685cf5047edfd1891
2012-12-11 16:33:27+01:00
cpu_ioreq_pio, cpu_ioreq_move: introduce read_phys_req_item, write_phys_req_item Replace a lot of formulaic multiplications (containing casts, no less) with calls to a pair of functions. This encapsulates in a single place the operations which require care relating to integer overflow. Cc: Dongxiao Xu <[email protected]> Signed-off-by: Ian Jackson <[email protected]> Acked-by: Stefano Stabellini <[email protected]>
a38648290ee277c7cb8a53eabdcdb08bb7a9f23f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a38648290ee277c7cb8a53eabdcdb08bb7a9f23f
2012-12-17 11:43:19+00:00
ehci: Verify a queue's ep direction does not change ehci_fill_queue assumes that there is a one on one relationship between an ep and a qh, this patch adds a check to ensure this. Note I don't expect this to ever trigger, this is just something I noticed the guest might do while working on other stuff. The only way this check can trigger is if a guest mixes in and out qtd-s in a single qh for a non control ep. Signed-off-by: Hans de Goede <[email protected]> Signed-off-by: Gerd Hoffmann <[email protected]>
bbbc39ccacf66ef58261c155f9eed503947c3023
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/bbbc39ccacf66ef58261c155f9eed503947c3023
2013-01-07 12:57:23+01:00
target-xtensa: restrict available SRs by enabled options Beginning with the RA-2004.1 release, SR access instructions (rsr, wsr, xsr) are associated with their corresponding SR and raise illegal opcode exception in case the register is not configured for the core. Signed-off-by: Max Filippov <[email protected]> Signed-off-by: Blue Swirl <[email protected]>
fe0bd475aa31e60674f7f53b85dc293108026202
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/fe0bd475aa31e60674f7f53b85dc293108026202
2012-12-08 18:48:26+00:00
mirror: introduce mirror job This patch adds the implementation of a new job that mirrors a disk to a new image while letting the guest continue using the old image. The target is treated as a "black box" and data is copied from the source to the target in the background. This can be used for several purposes, including storage migration, continuous replication, and observation of the guest I/O in an external program. It is also a first step in replacing the inefficient block migration code that is part of QEMU. The job is possibly never-ending, but it is logically structured into two phases: 1) copy all data as fast as possible until the target first gets in sync with the source; 2) keep target in sync and ensure that reopening to the target gets a correct (full) copy of the source data. The second phase is indicated by the progress in "info block-jobs" reporting the current offset to be equal to the length of the file. When the job is cancelled in the second phase, QEMU will run the job until the source is clean and quiescent, then it will report successful completion of the job. In other words, the BLOCK_JOB_CANCELLED event means that the target may _not_ be consistent with a past state of the source; the BLOCK_JOB_COMPLETED event means that the target is consistent with a past state of the source. (Note that it could already happen that management lost the race against QEMU and got a completion event instead of cancellation). It is not yet possible to complete the job and switch over to the target disk. The next patches will fix this and add many refinements to the basic idea introduced here. These include improved error management, some tunable knobs and performance optimizations. Signed-off-by: Paolo Bonzini <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
893f7ebafe4e8afc0ce4dbd9e64b3752f3036bbb
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/893f7ebafe4e8afc0ce4dbd9e64b3752f3036bbb
2012-10-24 10:26:19+02:00
fdc-test: insert media before fuzzing registers A media will be required for future fdc tests. Signed-off-by: Hervé Poussineau <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
44212dcc467cfe20f0ffe89c35c1fbd7849ea924
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/44212dcc467cfe20f0ffe89c35c1fbd7849ea924
2012-11-14 18:19:22+01:00
memory: prepare AddressSpace for exporting AddressSpace contains a member, current_map, of type FlatView. Since we want to limit the leakage of internal types to public headers, switch to a pointer to a FlatView. There is no performance impact as this isn't used during lookups, only address space reconfigurations. Reviewed-by: Anthony Liguori <[email protected]> Signed-off-by: Avi Kivity <[email protected]>
8786db7cb96f8ce5c75c6e1e074319c9dca8d356
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8786db7cb96f8ce5c75c6e1e074319c9dca8d356
2012-10-15 11:43:06+02:00
pseries: Don't test for MSR_PR for hypercalls under KVM PAPR hypercalls should only be invoked from the guest kernel, not guest user programs, that is, with MSR[PR]=0. Currently we check this in spapr_hypercall, returning H_PRIVILEGE if MSR[PR]=1. However, under KVM the state of MSR[PR] is already checked by the host kernel before passing the hypercall to qemu, making this check redundant. Worse, however, we don't generally synchronize KVM and qemu state on the hypercall path, meaning that qemu could incorrectly reject a hypercall because it has a stale MSR value. This patch fixes the problem by moving the privilege test exclusively to the TCG hypercall path. Signed-off-by: David Gibson <[email protected]> CC: [email protected] Signed-off-by: Alexander Graf <[email protected]>
efcb9383b974114e5f682e531346006f8f2466c0
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/efcb9383b974114e5f682e531346006f8f2466c0
2012-10-05 02:35:11+02:00
qemu-sockets: Fix potential memory leak The old code leaks variable 'peer'. Signed-off-by: Stefan Weil <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
39b384591fda27d6e1213cea0b11b1ebe0ed4b74
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/39b384591fda27d6e1213cea0b11b1ebe0ed4b74
2012-09-23 07:11:28+01:00
ehci: Fix NULL ptr deref when unplugging an USB dev with an iso stream active Signed-off-by: Hans de Goede <[email protected]>
7ce86aa1aafaa65e7d3e572873bdf37bdb896f49
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/7ce86aa1aafaa65e7d3e572873bdf37bdb896f49
2012-08-31 11:57:41+02:00
qemu-options.hx: mention retrace= VGA option The feature was added in commit cb5a7aa8c32141bb Sep 2008. My description is based on "Better VGA retrace emulation (needed for some DOS games/demos)" from http://www.boblycat.org/~malc/code/patches/qemu/index.html Signed-off-by: Matthew Ogilvie <[email protected]> Signed-off-by: malc <[email protected]>
39dda260628e5f2a3fd2ce2ec8a71f3d5ca309a9
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/39dda260628e5f2a3fd2ce2ec8a71f3d5ca309a9
2012-08-24 07:44:38+04:00
Revert "iscsi: Fix NULL dereferences / races between task completion and abort" This reverts commit 64e69e80920d82df3fa679bc41b13770d2f99360. The commit returned immediately from iscsi_aio_cancel, risking corruption in case the following happens: guest qemu target ========================================================================= send write 1 --------> send write 1 --------> cancel write 1 ------> cancel write 1 ------> <------------------ cancellation processed send write 2 --------> send write 2 --------> <---------------- completed write 2 <------------------ completed write 2 <---------------- completed write 1 <---------------- cancellation not done Here, the guest would see write 2 superseding write 1, when in fact the outcome could have been the opposite. The right behavior is to return only after the target says whether the cancellation was done or not, and it will be implemented by the next three patches. Signed-off-by: Paolo Bonzini <[email protected]>
b20909195745c34a819aed14ae996b60ab0f591f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b20909195745c34a819aed14ae996b60ab0f591f
2012-08-20 15:50:45+02:00
spice: abort on invalid streaming cmdline params When parsing its command line parameters, spice aborts when it finds unexpected values, except for the 'streaming-video' option. This happens because the parsing of the parameters for this option is done using the 'name2enum' helper, which does not error out on unknown values. Using the 'parse_name' helper makes sure we error out in this case. Looking at git history, the use of 'name2enum' instead of 'parse_name' seems to have been an oversight, so let's change to that now. Fixes rhbz#831708 Signed-off-by: Gerd Hoffmann <[email protected]>
835cab85ad83ed8dfe1c13243aeda5959b153e3e
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/835cab85ad83ed8dfe1c13243aeda5959b153e3e
2012-09-05 17:11:55+02:00
ahci: Fix ahci cdrom read corruptions for reads > 128k While testing q35, which has its cdrom attached to the ahci controller, I found that the Fedora 17 install would panic on boot. The panic occurs while squashfs is trying to read from the cdrom. The errors are: [ 8.622711] SQUASHFS error: xz_dec_run error, data probably corrupt [ 8.625180] SQUASHFS error: squashfs_read_data failed to read block 0x20be48a I was also able to produce corrupt data reads using an installed piix based qemu machine, using 'dd'. I found that the corruptions were only occuring when then read size was greater than 128k. For example, the following command results in corrupted reads: dd if=/dev/sr0 of=/tmp/blah bs=256k iflag=direct The > 128k size reads exercise a different code path than 128k and below. In ide_atapi_cmd_read_dma_cb() s->io_buffer_size is capped at 128k. Thus, ide_atapi_cmd_read_dma_cb() is called a second time when the read is > 128k. However, ahci_dma_rw_buf() restart the read from offset 0, instead of at 128k. Thus, resulting in a corrupted read. To fix this, I've introduced 'io_buffer_offset' field in IDEState to keep track of the offset. I've also modified ahci_populate_sglist() to take a new 3rd offset argument, so that the sglist is property initialized. I've tested this patch using 'dd' testing, and Fedora 17 now correctly boots and installs on q35 with the cdrom ahci controller. Signed-off-by: Jason Baron <[email protected]> Tested-by: Andreas Färber <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
61f52e06f0a21bab782f98ef3ea789aa6d0aa046
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/61f52e06f0a21bab782f98ef3ea789aa6d0aa046
2012-08-10 10:25:12+02:00
qemu-io: add "abort" command to simulate program crash Avoiding data loss and corruption is the top requirement for image file formats. The qemu-io "abort" command makes it possible to simulate program crashes and does not give the image format a chance to cleanly shut down. This command is useful for data integrity test cases. Signed-off-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
e01c30d3e20eb8cf068b08af46c532f99975527a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e01c30d3e20eb8cf068b08af46c532f99975527a
2012-08-06 22:39:14+02:00
monitor: remove unused do_info_trace Going forward with simpletrace v2 variable size trace records, we cannot have a generic function to print trace event info and therefore this interface becomes invalid. As per Stefan Hajnoczi: "This command is only available from the human monitor. It's not very useful because it historically hasn't been able to pretty-print events or show them in the right order (we use a ringbuffer but it prints them out from index 0). Therefore, I don't think we're under any obligation to keep this command around. No one has complained about it's limitations - I think this is a sign that no one has used it. I'd be okay with a patch that removes it." Ref: http://lists.gnu.org/archive/html/qemu-devel/2012-01/msg01268.html Signed-off-by: Harsh Prateek Bora <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
88affa1c77c9019f3450f851495997897bd14e40
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/88affa1c77c9019f3450f851495997897bd14e40
2012-07-19 11:34:32+01:00
vvfat: Fix partition table Unless parameter ":floppy:" is given, vvfat creates a virtual image with DOS MBR defining a single partition which holds the FAT file system. The size of the virtual image depends on the width of the FAT: 32 MiB (CHS 64, 16, 63) for 12 bit FAT, 504 MiB (CHS 1024, 16, 63) for 16 and 32 bit FAT, leaving (64*16-1)*63 = 64449 and (1024*16-1)*64 = 1032129 sectors for the partition. However, it screws up the end of the partition in the MBR: FAT width param. start CHS end CHS start LBA size :32: 0,1,1 1023,14,63 63 1032065 :16: 0,1,1 1023,14,55 63 1032057 :12: 0,1,1 63,14,55 63 64377 The actual FAT file system nevertheless assumes the partition has 1032129 or 64449 sectors. Oops. Signed-off-by: Markus Armbruster <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
f91cbefe2d0eb3f7b5071bcb1fd3a02970f1a776
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f91cbefe2d0eb3f7b5071bcb1fd3a02970f1a776
2012-07-17 16:48:30+02:00
qcow2: fix #ifdef'd qcow2_check_refcounts() callers The DEBUG_ALLOC qcow2.h macro enables additional consistency checks throughout the code. This makes it easier to spot corruptions that are introduced during development. Since consistency check is an expensive operation the DEBUG_ALLOC macro is used to compile checks out in normal builds and qcow2_check_refcounts() calls missed the addition of a new function argument. Signed-off-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
b35278f75450e57c134a153e6da9744c1db8382f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b35278f75450e57c134a153e6da9744c1db8382f
2012-07-09 15:53:01+02:00
iommu: Add universal DMA helper functions Not that long ago, every device implementation using DMA directly accessed guest memory using cpu_physical_memory_*(). This meant that adding support for a guest visible IOMMU would require changing every one of these devices to go through IOMMU translation. Shortly before qemu 1.0, I made a start on fixing this by providing helper functions for PCI DMA. These are currently just stubs which call the direct access functions, but mean that an IOMMU can be implemented in one place, rather than for every PCI device. Clearly, this doesn't help for non PCI devices, which could also be IOMMU translated on some platforms. It is also problematic for the devices which have both PCI and non-PCI version (e.g. OHCI, AHCI) - we cannot use the the pci_dma_*() functions, because they assume the presence of a PCIDevice, but we don't want to have to check between pci_dma_*() and cpu_physical_memory_*() every time we do a DMA in the device code. This patch makes the first step on addressing both these problems, by introducing new (stub) dma helper functions which can be used for any DMA capable device. These dma functions take a DMAContext *, a new (currently empty) variable describing the DMA address space in which the operation is to take place. NULL indicates untranslated DMA directly into guest physical address space. The intention is that in future non-NULL values will given information about any necessary IOMMU translation. DMA using devices must obtain a DMAContext (or, potentially, contexts) from their bus or platform. For now this patch just converts the PCI wrappers to be implemented in terms of the universal wrappers, converting other drivers can take place over time. Cc: Michael S. Tsirkin <[email protected]> Cc: Eduard - Gabriel Munteanu <[email protected]> Cc: Richard Henderson <[email protected]> Signed-off-by: David Gibson <[email protected]> Signed-off-by: Benjamin Herrenschmidt <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
d86a77f8abb9ed4b598f86f6476ccb2dc0a433e6
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/d86a77f8abb9ed4b598f86f6476ccb2dc0a433e6
2012-06-27 16:33:25-05:00
qtest: add a fuzz test to fdc-test Add a simple register fuzzing test to floppy controller tests. Signed-off-by: Blue Swirl <[email protected]>
3359847e9dbdf4531ed17e86ef55be8b8676e329
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/3359847e9dbdf4531ed17e86ef55be8b8676e329
2012-06-21 18:45:26+00:00
qcow2: don't leak buffer for unexpected qcow_version in header Signed-off-by: Jim Meyering <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
b6c147622d31272f9728da9ec16d146bf8c45a74
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b6c147622d31272f9728da9ec16d146bf8c45a74
2012-05-25 18:12:54+02:00
qemu-ga: become_daemon(): reopen standard fds to /dev/null This fixes a bug where qemu-ga doesn't suspend the guest because it fails to detect suspend support even when the guest does support suspend. This happens because of the way qemu-ga fds are managed in daemon mode. When starting qemu-ga with --daemon, become_daemon() will close all standard fds. This will cause qemu-ga to end up with the following fds (if started with 'qemu-ga --daemon'): 0 -> /dev/vport0p1 3 -> /run/qemu-ga.pid Then a guest-suspend-* function is issued. They call bios_supports_mode(), which will call pipe(), and qemu-ga's fd will be: 0 -> /dev/vport0p1 1 -> pipe:[16247] 2 -> pipe:[16247] 3 -> /run/qemu-ga.pid bios_supports_mode() forks off a child and blocks waiting for the child to write something to the pipe. The child, however, closes its reading end of the pipe _and_ reopen all standard fds to /dev/null. This will cause the child's fds to be: 0 -> /dev/null 1 -> /dev/null 2 -> /dev/null 3 -> /run/qemu-ga.pid In other words, the child's writing end of the pipe is now /dev/null. It writes there and exits. The parent process (blocked on read()) will get an EOF and interpret this as "something unexpected happened in the child, let's assume the guest doesn't support suspend". And suspend will fail. To solve this problem we have to reopen standard fds to /dev/null in become_daemon(), instead of closing them. Signed-off-by: Luiz Capitulino <[email protected]> Reviewed-by: Eric Blake <[email protected]> Signed-off-by: Michael Roth <[email protected]>
226a48949cf74006a94b5931e50352b2af801ac7
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/226a48949cf74006a94b5931e50352b2af801ac7
2012-05-15 09:15:16-05:00
qemu-option: qemu_opts_create(): use error_set() This commit converts qemu_opts_create() from qerror_report() to error_set(). Currently, most calls to qemu_opts_create() can't fail, so most callers don't need any changes. The two cases where code checks for qemu_opts_create() erros are: 1. Initialization code in vl.c. All of them print their own error messages directly to stderr, no need to pass the Error object 2. The functions opts_parse(), qemu_opts_from_qdict() and qemu_chr_parse_compat() make use of the error information and they can be called from HMP or QMP. In this case, to allow for incremental conversion, we propagate the error up using qerror_report_err(), which keeps the QError semantics Signed-off-by: Luiz Capitulino <[email protected]> Reviewed-By: Laszlo Ersek <[email protected]>
8be7e7e4c72c048b90e3482557954a24bba43ba7
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8be7e7e4c72c048b90e3482557954a24bba43ba7
2012-06-04 13:49:34-03:00
scsi: prevent data transfer overflow Avoid sending more than 2GB of data, as that can cause overflows in int32_t variables. Signed-off-by: Paolo Bonzini <[email protected]>
12a08998fe4f749af3622385521829a5143e6ff1
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/12a08998fe4f749af3622385521829a5143e6ff1
2012-05-04 10:39:51+02:00
qom: Fix memory leak in function container_get Valgrind reported this memory leak which occured very often. Test scenario: qemu-system-i386 (no arguments), only BIOS started, terminate with monitor command (quit). Signed-off-by: Stefan Weil <[email protected]> Reviewed-by: Andreas Färber <[email protected]>
f156f2385ff72e05e35edea6bea270033bf2756a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f156f2385ff72e05e35edea6bea270033bf2756a
2012-05-03 07:04:48+02:00
virtio: add missing mb() on enable notification This fixes an issue dual to the one fixed by patch 'virtio: add missing mb() on notification' and applies on top. In this case, to enable vq kick to exit to host, qemu writes out used flag then reads the avail index. if these are reordered we get a race: host avail index read: ring is empty guest avail index write guest flag read: exit disabled host used flag write: enable exit which results in a lost exit: host will never be notified about the avail index update. Again, happens in the field but only seems to trigger on some specific hardware. Insert an smp_mb barrier operation to ensure the correct ordering. Signed-off-by: Michael S. Tsirkin <[email protected]>
92045d80badc43c9f95897aad675dc7ef17a3b3f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/92045d80badc43c9f95897aad675dc7ef17a3b3f
2012-04-25 10:53:47+03:00
nbd: do not block in nbd_wr_sync if no data at all is available Right now, nbd_wr_sync will hang if no data at all is available on the socket and the other side is not going to provide any. Relax this by making it loop only for writes or partial reads. This fixes a race where one thread is executing qemu_aio_wait() and another is executing main_loop_wait(). Then, the select() call in main_loop_wait() can return stale data and call the "readable" callback with no data in the socket. Reported-by: Laurent Vivier <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
7fe7b68b32ba609faeeee03556aac0eb1b187c91
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/7fe7b68b32ba609faeeee03556aac0eb1b187c91
2012-04-19 16:36:43+02:00
rtl8139: limit transmission buffer size in c+ mode The tx buffer would be re-allocated for tx descriptor with big size and without LS bit set, this would make guest driver could easily let qemu to allocate unlimited. In linux host, a glib failure were easy to be triggered: GLib-ERROR **: gmem.c:176: failed to allocate 18446744071562067968 bytes This patch fix this by adding a limit. As the spec didn't tell the maximum size of buffer allowed, stick it to current CP_TX_BUFFER_SIZE (65536). Changes from V1: Drop the while statement and s->cplus_txbuffer check. Signed-off-by: Jason Wang <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]>
cde31a0e3dc0e4ac83e454d6096350cec584adf1
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/cde31a0e3dc0e4ac83e454d6096350cec584adf1
2012-03-16 01:04:50+02:00
qemu-img: add dirty flag status Some block drivers can verify their image files are clean or not. So we can show it while using "qemu-img info". Signed-off-by: Dong Xu Wang <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
64c79160b456c2d6aabc63e40b32e392a9ea3c90
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/64c79160b456c2d6aabc63e40b32e392a9ea3c90
2012-04-05 14:54:41+02:00
qemu-char: qemu_chr_open_fd() can't fail, don't check Cleaned up silently in commit aad04cd0, but that just got reverted. Re-apply this part. Reviewed-by: Anthony Liguori <[email protected]> Signed-off-by: Markus Armbruster <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
d7378ee1c159ee0bf6deffa9e87020cb820af45c
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/d7378ee1c159ee0bf6deffa9e87020cb820af45c
2012-02-24 09:06:57-06:00
acpi: don't pass overflow_time to acpi_pm1_evt_get_sts Pretty pointless, can easily be reached via ACPIREGS now. Signed-off-by: Gerd Hoffmann <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
2886be1b01c274570fa139748a402207482405bd
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2886be1b01c274570fa139748a402207482405bd
2012-02-24 13:36:02-06:00
scsi: fix searching for an empty id The conditions for detecting no free target or LUN were wrong. The LUN loop was followed by an "if" condition that is never true, because the loop is exited as soon as lun becomes equal to bus->info->max_lun, and never becomes greater than it. The target loop had a wrong condition (<= instead of <). Once this is fixed, the loop would fail in the same way as the LUN loop. The fix is to see whether scsi_device_find returned the device with the last (channel, target, LUN) pair, and fail if so. Signed-off-by: Paolo Bonzini <[email protected]>
d3d250bddb3f6aa6c26e9dadf10e82d9fd8bfce3
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/d3d250bddb3f6aa6c26e9dadf10e82d9fd8bfce3
2012-02-24 14:54:51+01:00
usb-desc: fix user trigerrable segfaults (!config) Check for dev->config being NULL in two places: USB_REQ_GET_CONFIGURATION and USB_REQ_GET_STATUS. The behavior of USB_REQ_GET_STATUS is unspecified in the Default state, that corresponds to dev->config being NULL (it defaults to NULL and is reset whenever a SET_CONFIGURATION with value 0, or attachment). I implemented it to correspond with the state before ed5a83ddd8c1d8ec7b1015315530cf29949e7c48, the commit moving SET_STATUS to usb-desc; if dev->config is not set we return whatever is in the first configuration. The behavior of USB_REQ_GET_CONFIGURATION is also undefined before any SET_CONFIGURATION, but here we just return 0 (same as specified for the Address state). A win7 guest failed to initialize the device before this patch, segfaulting when GET_STATUS was called with dev->config == NULL. With this patch the passthrough device still doesn't work but the failure is unrelated. Signed-off-by: Alon Levy <[email protected]> Signed-off-by: Gerd Hoffmann <[email protected]>
8db36e9dddb1b6fab3554a8c00d92268b33a487b
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8db36e9dddb1b6fab3554a8c00d92268b33a487b
2012-02-27 13:37:36+01:00
PPC: booke206: Check for TLB overrun Our internal helpers to fetch TLB entries were not able to tell us that an entry doesn't even exist. Pass an error out if we hit such a case to not accidently pass beyond the TLB array. Signed-off-by: Alexander Graf <[email protected]>
3f162d119ef52fda714ebb498fcb4f4b7c354d38
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/3f162d119ef52fda714ebb498fcb4f4b7c354d38
2012-02-02 02:47:46+01:00
PPC: booke206: Check for min/max TLB entry size When setting a TLB entry, we need to check if the TLB we're putting it in actually supports the given size. According to the 2.06 PowerPC ISA, a value that's out of range can either be redefined to something implementation dependent or we can raise an illegal opcode exception. We do the latter. Signed-off-by: Alexander Graf <[email protected]>
5935ee072d6fbcdf28ff6132ba6d8c3a1356bb0a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/5935ee072d6fbcdf28ff6132ba6d8c3a1356bb0a
2012-02-02 02:47:46+01:00
vvfat: avoid leaking file descriptor in commit_one_file() Reported-by: Dr David Alan Gilbert <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
8d98734651a8a601980b6e57788f2ed6a4ea620a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8d98734651a8a601980b6e57788f2ed6a4ea620a
2012-01-13 10:36:59+00:00
block: avoid useless checks on acb->bh Coverity is confused by this "if" and reports leaks on acb->bh. The bottom half is always deleted before releasing the AIOCB, in either bdrv_aio_cancel_em or bdrv_aio_bh_cb. Signed-off-by: Paolo Bonzini <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
3f3aace83046a6740d4e6f92811d333c6741db00
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/3f3aace83046a6740d4e6f92811d333c6741db00
2011-12-15 12:40:08+01:00
hw/arm_gic.c: Ignore attempts to complete nonexistent IRQs Ignore attempts to complete non-existent IRQs; this fixes a buffer overrun if the guest writes a bad value to the GICC_EOIR register. (This case is UNPREDICTABLE so ignoring it is a valid choice.) Note that doing nothing if the guest writes 1023 to this register is not in fact a change in behaviour: the old code would also always do nothing in this case but in a non-obvious way. (The buffer overrun was noted by Coverity, see bug 887883.) Signed-off-by: Peter Maydell <[email protected]> Signed-off-by: Andrzej Zaborowski <[email protected]>
217bfb445b54db618a30f3a39170bebd9fd9dbf2
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/217bfb445b54db618a30f3a39170bebd9fd9dbf2
2011-12-05 21:38:56+01:00
hw/9pfs: File system helper process for qemu 9p proxy FS Provide root privilege access to QEMU 9p proxy filesystem using socket communication. Proxy helper is started by root user as: ~ # virtfs-proxy-helper -f|--fd <socket descriptor> -p|--path <path-to-share> Signed-off-by: M. Mohan Kumar <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
17bff52b6225419931703aa04cc454c16cf5adad
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/17bff52b6225419931703aa04cc454c16cf5adad
2012-01-04 20:14:02+05:30
hw/omap_intc.c: Avoid crash on access to nonexistent banked registers Avoid a crash due to null pointer dereference if a guest attempts to access banked registers for a nonexistent bank. Spotted by Coverity (see bug 887883). Signed-off-by: Peter Maydell <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
096685fc2a955ea17d5363ab452e301be2b43873
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/096685fc2a955ea17d5363ab452e301be2b43873
2011-11-11 12:49:52-06:00
x86/cpuid: Fix crash on -cpu "" Spotted by Coverity. Signed-off-by: Markus Armbruster <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
04c5b17a74c9d6c309181079f8949665b43b0164
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/04c5b17a74c9d6c309181079f8949665b43b0164
2011-11-10 12:29:50+00:00
cmd: Fix potential NULL pointer dereference Signed-off-by: Pavel Borzenkov <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
ba7806ad92a2f6b1625cfa67d44dc1b71e3be44e
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ba7806ad92a2f6b1625cfa67d44dc1b71e3be44e
2011-11-07 08:01:15+00:00
scsi-disk: fail READ CAPACITY if LBA != 0 but PMI == 0 Tested by the Windows Logo Kit SCSI Compliance test. From SBC-3, paragraph 5.25: "The LOGICAL BLOCK ADDRESS field shall be set to zero if the PMI bit is set to zero. If the PMI bit is set to zero and the LOGICAL BLOCK ADDRESS field is not set to zero, then the device server shall terminate the command with CHECK CONDITION status with the sense key set to ILLEGAL REQUEST and the additional sense code set to INVALID FIELD IN CDB". Signed-off-by: Paolo Bonzini <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
7cec78b6f0e9a3b33732afd14a811849d219ffbc
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/7cec78b6f0e9a3b33732afd14a811849d219ffbc
2011-10-28 19:25:51+02:00
hw/9pfs: Introduce tracing for 9p pdu handlers Plan is to replace the existing debug infrastructure with Qemu tracing infrastructure so that user can dynamically enable/disable trace events and therefore a meaningful trace log can be generated which can be further filtered using an analysis script. Note: Because of current simpletrace limitations, the trace events are logging at max 6 args, however, once the more args are supported, we can change trace events to log more info as well. Also, This initial patch only provides a replacement for existing debug infra. More trace events to be added later for newly added handlers and sub-routines. Reviewed-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Harsh Prateek Bora <[email protected]> Signed-off-by: Aneesh Kumar K.V <[email protected]>
c572f23a3e7180dbeab5e86583e43ea2afed6271
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c572f23a3e7180dbeab5e86583e43ea2afed6271
2011-10-15 15:30:27+05:30
device tree: dont fail operations When we screw up and issue an FDT command that doesn't work, we really need to know immediately and usually can't continue to create the machine. To make sure we don't need to add error checking in all device tree modification code users, we can just add the fail checks to the qemu abstract functions. Signed-off-by: Alexander Graf <[email protected]>
ccbcfedd17fd2d13521fcee66810d0df464ec1cc
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ccbcfedd17fd2d13521fcee66810d0df464ec1cc
2011-10-06 09:48:00+02:00
rbd: fix leak in qemu_rbd_open failure paths Fix leak of s->snap in failure path. Simplify error paths for the whole function. Reported-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Sage Weil <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
eb93d5d9906cfa9fb6c3039a310d796dddfddeea
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/eb93d5d9906cfa9fb6c3039a310d796dddfddeea
2011-09-12 15:17:21+02:00
xen-mapcache: Fix rlimit set size. Previously, the address space soft limit was set mcache_max_size. So, before the mcache_max_size was reached by the mapcache, QEMU was killed for overuse of the virtual address space. This patch fix that by setting the soft limit the maximum than can have QEMU. So the soft and hard limit are always set to RLIM_INFINITY if QEMU is privileged. In case QEMU is not run as root and the limit is too low, the maximum mapcache size will be set the rlim_max - 80MB because observed that QEMU use 75MB more than the maximum mapcache size after several empirical tests. Signed-off-by: Anthony PERARD <[email protected]> Signed-off-by: Stefano Stabellini <[email protected]>
56c119e52ca229869912b22a5bec283487b0cf9b
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/56c119e52ca229869912b22a5bec283487b0cf9b
2011-09-09 13:13:16+00:00
linux-user: Verify MIPS syscall arguments On MIPS, some syscall arguments are taken from the stack. This patch adds verification such that do_syscall() is only invoked if all arguments have been successfully taken from the stack. Signed-off-by: Riku Voipio <[email protected]> Reviewed-by: Peter Maydell <[email protected]> Signed-off-by: An-Cheng Huang <[email protected]>
94c19610a6973ad917d9c154eabfc2ee27bc4f59
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/94c19610a6973ad917d9c154eabfc2ee27bc4f59
2011-09-09 10:47:54+03:00
main: force enabling of I/O thread Enabling the I/O thread by default seems like an important part of declaring 1.0. Besides allowing true SMP support with KVM, the I/O thread means that the TCG VCPU doesn't have to multiplex itself with the I/O dispatch routines which currently requires a (racey) signal based alarm system. I know there have been concerns about performance. I think so far the ones that have come up (virtio-net) are most likely due to secondary reasons like decreased batching. I think we ought to force enabling I/O thread early in 1.0 development and commit to resolving any lingering issues. Signed-off-by: Anthony Liguori <[email protected]>
12d4536f7d911b6d87a766ad7300482ea663cea2
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/12d4536f7d911b6d87a766ad7300482ea663cea2
2011-09-02 10:34:55-05:00
hw/qdev: Don't crash if qdev_create(NULL, ...) fails If an attempt to create a qdev device on the default sysbus (by passing NULL as the bus to qdev_create) fails, print a useful error message rather than crashing trying to dereference a NULL pointer. Signed-off-by: Peter Maydell <[email protected]> Reviewed-by: Markus Armbruster <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
e92714c71a2f50b8420126e952cadb653fa0ef93
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e92714c71a2f50b8420126e952cadb653fa0ef93
2011-08-11 14:37:03+01:00
hw/9pfs: Don't crash when we get a request with not supported 9p operation Return EOPNOTSUPP as error Signed-off-by: Aneesh Kumar K.V <[email protected]> Signed-off-by: Venkateswararao Jujjuri (JV) <[email protected]>
5c3234c6c037943bd4c2d643a1b8cc35f563dbdb
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/5c3234c6c037943bd4c2d643a1b8cc35f563dbdb
2011-06-01 10:25:27-07:00
QMP: add server mode to QEMUMonitorProtocol QEMU supports socket chardevs that establish connections like a server or a client. The QEMUMonitorProtocol class only supports connecting as a client. It is not possible to connect race-free when launching QEMU since trying to connect before QEMU has bound and is listening on the socket results in failure. Add the QEMUMonitorProtocol(server=True) argument to bind and listen on the socket. The QEMU process can then be launched and connects to the already existing QMP socket without a race condition: qmp = qmp.QEMUMonitorProtocol(monitor_path, server=True) popen = subprocess.Popen(args) qmp.accept() Signed-off-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Luiz Capitulino <[email protected]>
37628f11c6b190ebb3082938868aadb23942ee3a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/37628f11c6b190ebb3082938868aadb23942ee3a
2011-06-01 11:43:18-03:00
usb-ccid: Plug memory leak on qdev exit() ccid_initfn() allocates CCIDBus dynamically, but there is no exit callback to free it. Fix by getting rid of the allocation. Signed-off-by: Markus Armbruster <[email protected]>
e13e973eedba0a52b4b8b079c4b85cdc68b7b4f0
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e13e973eedba0a52b4b8b079c4b85cdc68b7b4f0
2011-05-31 19:36:21+03:00
trace: Remove %s in grlib trace events Trace events cannot use %s in their format strings because trace backends vary in how they can deference pointers (if at all). Recording const char * values is not meaningful if their contents are not recorded too. Change grlib trace events that rely on strings so that they communicate similar information without using strings. A follow-up patch explains this limitation and updates docs/tracing.txt. Signed-off-by: Stefan Hajnoczi <[email protected]>
b4548fcc0314f5e118ed45b5774e9cd99f9a97d3
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b4548fcc0314f5e118ed45b5774e9cd99f9a97d3
2011-04-26 13:14:49+01:00
vnc: tight: Fix crash after 2GB of output fix 2Gb integer overflow in in VNC tight and zlib encodings As found by Roland Dreier <[email protected]> (excellent catch!), when amount of VNC compressed data produced by zlib and sent to client exceeds 2Gb, integer overflow occurs because currently, we calculate amount of data produced at each step by comparing saved total_out with new total_out, and total_out is something which grows without bounds. Compare it with previous avail_out instead of total_out, and leave total_out alone. The same code is used in vnc-enc-tight.c and vnc-enc-zlib.c, so fix both cases. There, there's no actual need to save previous_out value, since capacity-offset (which is how that value is calculated) stays the same so it can be recalculated again after call to deflate(), but whole thing becomes less readable this way. Reported-by: Roland Dreier <[email protected]> Signed-off-by: Michael Tokarev <[email protected]> Signed-off-by: Corentin Chary <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]>
2caa9e9d2e0f356cc244bc41ce1d3e81663f6782
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2caa9e9d2e0f356cc244bc41ce1d3e81663f6782
2011-04-10 00:14:51+02:00
Do not delete BlockDriverState when deleting the drive When removing a drive from the host-side via drive_del we currently have the following path: drive_del qemu_aio_flush() bdrv_close() // zaps bs->drv, which makes any subsequent I/O get // dropped. Works as designed drive_uninit() bdrv_delete() // frees the bs. Since the device is still connected to // bs, any subsequent I/O is a use-after-free. The value of bs->drv becomes unpredictable on free. As long as it remains null, I/O still gets dropped, however it could become non-null at any point after the free resulting SEGVs or other QEMU state corruption. To resolve this issue as simply as possible, we can chose to not actually delete the BlockDriverState pointer. Since bdrv_close() handles setting the drv pointer to NULL, we just need to remove the BlockDriverState from the QLIST that is used to enumerate the block devices. This is currently handled within bdrv_delete, so move this into its own function, bdrv_make_anon(). The result is that we can now invoke drive_del, this closes the file descriptors and sets BlockDriverState->drv to NULL which prevents futher IO to the device, and since we do not free BlockDriverState, we don't have to worry about the copy retained in the block devices. We also don't attempt to remove the qdev property since we are no longer deleting the BlockDriverState on drives with associated drives. This also allows for removing Drives with no devices associated either. Reported-by: Markus Armbruster <[email protected]> Signed-off-by: Ryan Harper <[email protected]> Acked-by: Markus Armbruster <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
d22b2f41c470067758b3636a01b452dfeda7069f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/d22b2f41c470067758b3636a01b452dfeda7069f
2011-04-07 13:51:47+02:00
usb-ccid: add CCID bus A CCID device is a smart card reader. It is a USB device, defined at [1]. This patch introduces the usb-ccid device that is a ccid bus. Next patches will introduce two card types to use it, a passthru card and an emulated card. [1] http://www.usb.org/developers/devclass_docs/DWG_Smart-Card_CCID_Rev110. Signed-off-by: Alon Levy <[email protected]> --- changes from v20->v21: (Jes Sorenson review) * cosmetic changes - fix multi line comments. * reorder fields in USBCCIDState * add reference to COPYING * add --enable-smartcard and --disable-smartcard here (moved from last patch) changes from v19->v20: * checkpatch.pl changes from v18->v19: * merged: ccid.h: add copyright, fix define and remove non C89 comments * add qdev.desc changes from v15->v16: Behavioral changes: * fix abort on client answer after card remove * enable migration * remove side affect code from asserts * return consistent self-powered state * mask out reserved bits in ccid_set_parameters * add missing abRFU in SetParameters (no affect on linux guest) whitefixes / comments / consts defines: * remove stale comment * remove ccid_print_pending_answers if no DEBUG_CCID * replace printf's with DPRINTF, remove DEBUG_CCID, add verbosity defines * use error_report * update copyright (most of the code is not original) * reword known bug comment * add missing closing quote in comment * add missing whitespace on one line * s/CCID_SetParameter/CCID_SetParameters/ * add comments * use define for max packet size Comment for "return consistent self-powered state": the Configuration Descriptor bmAttributes claims we are self powered, but we were returning not self powered to USB_REQ_GET_STATUS control message. In practice, this message is not sent by a linux 2.6.35.10-74.fc14.x86_64 guest (not tested on other guests), unless you issue lsusb -v as root (for example).
367071447ec5b0dabc5452384bbeb62371838112
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/367071447ec5b0dabc5452384bbeb62371838112
2011-04-01 19:07:48-05:00
Improve error handling in do_snapshot_blkdev() In case we cannot open the newly created snapshot image, try to fall back to the original image file and continue running on that, which should prevent the guest from aborting. This is a corner case which can happen if the admin by mistake specifies the snapshot file on a virtual file system which does not support O_DIRECT. bdrv_create() does not use O_DIRECT, but the following open in bdrv_open() does and will then fail. Signed-off-by: Jes Sorensen <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
52f9a172b6db89ba1f4389883be805d65dd3ca8c
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/52f9a172b6db89ba1f4389883be805d65dd3ca8c
2011-03-15 13:21:14+01:00
Trigger exit from cpu_exec_all on pending IO events Except for timer events, we currently do not leave the loop over all VCPUs if an IO event was filed. That may cause unexpected IO latencies under !CONFIG_IOTHREAD in SMP scenarios. Fix it by setting the global exit_request which breaks the loop. Signed-off-by: Jan Kiszka <[email protected]> Signed-off-by: Marcelo Tosatti <[email protected]>
38145df24c55bffe8ba63cfa28173c9ddd5a2c2d
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/38145df24c55bffe8ba63cfa28173c9ddd5a2c2d
2011-02-14 12:39:44-02:00
target-arm: wire up the softfloat flush_input_to_zero flag Wire up the new softfloat support for flushing input denormals to zero on ARM. The FPSCR FZ bit enables flush-to-zero for both inputs and outputs, but the reporting of when inputs are flushed to zero is via a separate IDC bit rather than the UFC (underflow) bit used when output denormals are flushed to zero. Signed-off-by: Peter Maydell <[email protected]> Acked-by: Aurelien Jarno <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]>
cecd8504b80148b66cdc1ce32046429bc3549090
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/cecd8504b80148b66cdc1ce32046429bc3549090
2011-01-06 22:16:59+01:00
softfloat: Fix compilation failures with USE_SOFTFLOAT_STRUCT_TYPES Make softfloat compile with USE_SOFTFLOAT_STRUCT_TYPES defined, by adding and using new macros const_float16(), const_float32() and const_float64() so you can use array initializers in an array of float16/float32/float64 whether the types are bare or wrapped in the structs. [[email protected]: do the same for float16] Signed-off-by: Peter Maydell <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]>
d5138cf4a8f2415d2d568adfd3f65d3cc5a0b736
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/d5138cf4a8f2415d2d568adfd3f65d3cc5a0b736
2011-02-10 20:16:43+01:00
virtio-net: Introduce a new bottom half packet TX Based on a patch from Mark McLoughlin, this patch introduces a new bottom half packet transmitter that avoids the latency imposed by the tx_timer approach. Rather than scheduling a timer when a TX packet comes in, schedule a bottom half to be run from the iothread. The bottom half handler first attempts to flush the queue with notification disabled (this is where we could race with a guest without txburst). If we flush a full burst, reschedule immediately. If we send short of a full burst, try to re-enable notification. To avoid a race with TXs that may have occurred, we must then flush again. If we find some packets to send, the guest it probably active, so we can reschedule again. tx_timer and tx_bh are mutually exclusive, so we can re-use the tx_waiting flag to indicate one or the other needs to be setup. This allows us to seamlessly migrate between timer and bh TX handling. The bottom half handler becomes the new default and we add a new tx= option to virtio-net-pci. Usage: -device virtio-net-pci,tx=timer # select timer mitigation vs "bh" Signed-off-by: Alex Williamson <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]>
a697a334b3c4d3250e6420f5d38550ea10eb5319
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a697a334b3c4d3250e6420f5d38550ea10eb5319
2010-09-07 20:29:29+03:00
Revert "Make default invocation of block drivers safer (v3)" This reverts commit 79368c81bf8cf93864d7afc88b81b05d8f0a2c90. Conflicts: block.c I haven't been able to come up with a solution yet for the corruption caused by unaligned requests from the IDE disk so revert until a solution can be written. Signed-off-by: Anthony Liguori <[email protected]>
8b33d9eeba91422ee2d73b6936ad57262d18cf5a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8b33d9eeba91422ee2d73b6936ad57262d18cf5a
2010-09-08 17:09:15-05:00
fdc: Reject unimplemented error actions drive_init() doesn't permit them for if=floppy, but that's worthless: we get them via if=none and -global. This can make device initialization fail. Since all callers of fdctrl_init_isa() ignore its value, change it to die instead of returning failure. Without this, some callers would ignore the failure, and others would crash. Wart: unlike drive_init(), we don't reject the default action when it's explicitly specified. That's because we can't distinguish "no rerror option" from "rerror=report", or "no werror" from "rerror=enospc". Left for another day. Signed-off-by: Markus Armbruster <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
b47b35250fbfa062aedf6ab6e5faab84c4a76f4f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b47b35250fbfa062aedf6ab6e5faab84c4a76f4f
2010-07-06 17:05:49+02:00