commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
usbredir: free vm_change_state_handler in usbredir destroy dispatch In usbredir destroy dispatch function, it doesn't free the vm change state handler once registered in usbredir_realize function. This will lead a memory leak issue. This patch avoid this. Signed-off-by: Li Qiang <[email protected]> Reviewed-by: Marc-André Lureau <[email protected]> Message-id: [email protected] Signed-off-by: Gerd Hoffmann <[email protected]>
07b026fd82d6cf11baf7d7c603c4f5f6070b35bf
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/07b026fd82d6cf11baf7d7c603c4f5f6070b35bf
2016-11-10 15:29:58+00:00
usb: ehci: fix memory leak in ehci_init_transfer In ehci_init_transfer function, if the 'cpage' is bigger than 4, it doesn't free the 'p->sgl' once allocated previously thus leading a memory leak issue. This patch avoid this. Signed-off-by: Li Qiang <[email protected]> Message-id: [email protected] Signed-off-by: Gerd Hoffmann <[email protected]>
791f97758e223de3290592d169f8e6339c281714
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/791f97758e223de3290592d169f8e6339c281714
2016-11-10 15:29:58+00:00
vhost: migration blocker only if shared log is used Commit 31190ed7 added a migration blocker in vhost_dev_init() to check if memfd would succeed. It is better if this blocker first checks if vhost backend requires shared log. This will avoid a situation where a blocker is added inappropriately (e.g. shared log allocation fails when vhost backend doesn't support it). Signed-off-by: Rafael David Tinoco <[email protected]> Reviewed-by: Marc-André Lureau <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]>
0d34fbabc13891da41582b0823867dc5733fffef
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/0d34fbabc13891da41582b0823867dc5733fffef
2016-11-15 17:20:37+02:00
ppc/pnv: add skeleton PowerNV platform The goal is to emulate a PowerNV system at the level of the skiboot firmware, which loads the OS and provides some runtime services. Power Systems have a lower firmware (HostBoot) that does low level system initialization, like DRAM training. This is beyond the scope of what qemu will address in a PowerNV guest. No devices yet, not even an interrupt controller. Just to get started, some RAM to load the skiboot firmware, the kernel and initrd. The device tree is fully created in the machine reset op. Signed-off-by: Benjamin Herrenschmidt <[email protected]> [clg: - updated for qemu-2.7 - replaced fprintf by error_report - used a common definition of _FDT macro - removed VMStateDescription as migration is not yet supported - added IBM Copyright statements - reworked kernel_filename handling - merged PnvSystem and sPowerNVMachineState - removed PHANDLE_XICP - added ppc_create_page_sizes_prop helper - removed nmi support - removed kvm support - updated powernv machine to version 2.8 - removed chips and cpus, They will be provided in another patches - added a machine reset routine to initialize the device tree (also) - french has a squelette and english a skeleton. - improved commit log. - reworked prototypes parameters - added a check on the ram size (thanks to Michael Ellerman) - fixed chip-id cell - changed MAX_CPUS to 2048 - simplified memory node creation to one node only - removed machine version - rewrote the device tree creation with the fdt "rw" routines - s/sPowerNVMachineState/PnvMachineState/ - etc.] Signed-off-by: Cédric Le Goater <[email protected]> Reviewed-by: David Gibson <[email protected]> Signed-off-by: David Gibson <[email protected]>
9e933f4a620ca485356205f5cac8a6c3db0b861d
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/9e933f4a620ca485356205f5cac8a6c3db0b861d
2016-10-28 09:38:24+11:00
usb: ehci: fix memory leak in ehci_process_itd While processing isochronous transfer descriptors(iTD), if the page select(PG) field value is out of bands it will return. In this situation the ehci's sg list is not freed thus leading to a memory leak issue. This patch avoid this. Signed-off-by: Li Qiang <[email protected]> Reviewed-by: Thomas Huth <[email protected]> Signed-off-by: Michael Tokarev <[email protected]>
b16c129daf0fed91febbb88de23dae8271c8898a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b16c129daf0fed91febbb88de23dae8271c8898a
2016-10-08 11:25:29+03:00
spapr: fix check of cpu alias name in spapr_get_cpu_core_type() If the user passes an alias name and a property to -cpu, QEMU fails to find the CPU definition and exits. $ qemu-system-ppc64 -cpu POWER8E,compat=power7 qemu-system-ppc64: Unable to find sPAPR CPU Core definition This happens because spapr_get_cpu_core_type() passes the full string from the command line (i.e. "POWER8E,compat=power7") to ppc_cpu_lookup_alias(), instead of the alias name piece only (i.e. "POWER8E"). The fix is to pass model_pieces[0] to ppc_cpu_lookup_alias(). Signed-off-by: Greg Kurz <[email protected]> Reviewed-by: Bharata B Rao <[email protected]> Signed-off-by: David Gibson <[email protected]>
e17a87792d4886d2a508672c1639df3c1d40f1d1
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e17a87792d4886d2a508672c1639df3c1d40f1d1
2016-10-06 16:15:53+11:00
s390x/kvm: Fix potential deadlock in sigp handling If two VCPUs exit at the same time and target each other with a sigp, both could run into a deadlock as run_on_cpu on CPU0 will free the BQL when starting the CPU1 target routine. CPU1 will run its sigp initiater for CPU0 before handling the run_on_cpu requests, thus resulting in a dead lock. As all qemu SIGPs are slow path anway we can use a big sigp lock and allow only one SIGP for the guest at a time. We will return condition code 2 (BUSY) on contention to the guest. Reported-by: Paolo Bonzini <[email protected]> Reviewed-by: Cornelia Huck <[email protected]> Signed-off-by: Christian Borntraeger <[email protected]>
f9530c32420fff941b7bc8bb5d90310eecab5a96
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f9530c32420fff941b7bc8bb5d90310eecab5a96
2016-09-28 13:24:51+02:00
tests: pc-cpu-test leaks fixes The path is allocated and should be freed. The qmp response should be unref, but then 'machine' must be duplicated. Use a destroy function for the PCTestData. Signed-off-by: Marc-André Lureau <[email protected]> Reviewed-by: Eric Blake <[email protected]>
34e46f604d3cf26144b4e02989f2f096e3dc2a41
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/34e46f604d3cf26144b4e02989f2f096e3dc2a41
2016-09-08 18:05:22+04:00
pc: keep gsi reference Further cleanup would need to call qemu_free_irq() at the appropriate time, but for now this silences ASAN about direct leaks. Signed-off-by: Marc-André Lureau <[email protected]> Reviewed-by: Markus Armbruster <[email protected]>
3e6c0c4c2cc4d5ee77f6f2746c4608f077e10f62
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/3e6c0c4c2cc4d5ee77f6f2746c4608f077e10f62
2016-09-08 18:05:21+04:00
vl: Delay initialization of memory backends Initialization of memory backends may take a while when prealloc=yes is used, depending on their size. Initializing memory backends before chardevs may delay the creation of monitor sockets, and trigger timeouts on management software that waits until the monitor socket is created by QEMU. See, for example, the bug report at: https://bugzilla.redhat.com/show_bug.cgi?id=1371211 In addition to that, allocating memory before calling configure_accelerator() breaks the tcg_enabled() checks at memory_region_init_*(). This patch fixes those problems by adding "memory-backend-*" classes to the delayed-initialization list. Signed-off-by: Eduardo Habkost <[email protected]>
6546d0dba6c211c1a3eac1252a4f50a0c151a08a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/6546d0dba6c211c1a3eac1252a4f50a0c151a08a
2016-09-05 16:03:47-03:00
win32: don't run subprocess tests on Mingw32 platform On Tue, Jun 14, 2016 at 04:44:57PM +0100, Daniel P. Berrange wrote: > The g_test_trap_subprocess() method does not work on the > Mingw32 platform, causing the test-qdev-global-props > test case to abort > > (test-logging.exe:230): GLib-ERROR **: g_test_trap_subprocess() > failed: Failed to execute helper program (No such file or directory) > > This failure was introduced a while ago in > > commit 2177801a4899bf29108b3d471417a5b4d701ec29 > Author: Eduardo Habkost <[email protected]> > Date: Fri Aug 8 16:03:27 2014 -0300 > > test-qdev-global-props: Run tests on subprocess > > Modify the configure time check to avoid enabling this feature > on Mingw, rather than trying to rewrite the test to avoid this > feature. I would do the following instead, just in case we have extra code looking at $glib_subprocess one day. Signed-off-by: Eduardo Habkost <[email protected]> Signed-off-by: Michael Tokarev <[email protected]>
7ad9339e372fcd12d584684d7f52ac259604a4f4
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/7ad9339e372fcd12d584684d7f52ac259604a4f4
2016-09-15 15:32:22+03:00
9pfs: forbid . and .. in file names According to the 9P spec http://man.cat-v.org/plan_9/5/open about the create request: The names . and .. are special; it is illegal to create files with these names. This patch causes the create and lcreate requests to fail with EINVAL if the file name is either "." or "..". Even if it isn't explicitly written in the spec, this patch extends the checking to all requests that may cause a directory entry to be created: - mknod - rename - renameat - mkdir - link - symlink The unlinkat request also gets patched for consistency (even if rmdir("foo/..") is expected to fail according to POSIX.1-2001). The various error values come from the linux manual pages. Suggested-by: Peter Maydell <[email protected]> Signed-off-by: Greg Kurz <[email protected]> Reviewed-by: Eric Blake <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Peter Maydell <[email protected]>
805b5d98c649d26fc44d2d7755a97f18e62b438a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/805b5d98c649d26fc44d2d7755a97f18e62b438a
2016-08-30 19:21:56+01:00
block: fix deadlock in bdrv_co_flush The following commit commit 3ff2f67a7c24183fcbcfe1332e5223ac6f96438c Author: Evgeny Yakovlev <[email protected]> Date: Mon Jul 18 22:39:52 2016 +0300 block: ignore flush requests when storage is clean has introduced a regression. There is a problem that it is still possible for 2 requests to execute in non sequential fashion and sometimes this results in a deadlock when bdrv_drain_one/all are called for BDS with such stalled requests. 1. Current flushed_gen and flush_started_gen is 1. 2. Request 1 enters bdrv_co_flush to with write_gen 1 (i.e. the same as flushed_gen). It gets past flushed_gen != flush_started_gen and sets flush_started_gen to 1 (again, the same it was before). 3. Request 1 yields somewhere before exiting bdrv_co_flush 4. Request 2 enters bdrv_co_flush with write_gen 2. It gets past flushed_gen != flush_started_gen and sets flush_started_gen to 2. 5. Request 2 runs to completion and sets flushed_gen to 2 6. Request 1 is resumed, runs to completion and sets flushed_gen to 1. However flush_started_gen is now 2. From here on out flushed_gen is always != to flush_started_gen and all further requests will wait on flush_queue. This change replaces flush_started_gen with an explicitly tracked active flush request. Signed-off-by: Evgeny Yakovlev <[email protected]> Signed-off-by: Denis V. Lunev <[email protected]> Message-id: [email protected] CC: Stefan Hajnoczi <[email protected]> CC: Fam Zheng <[email protected]> CC: Kevin Wolf <[email protected]> CC: Max Reitz <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
ce83ee57f6fa69280a0330f1b49ef75b0ef0742a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ce83ee57f6fa69280a0330f1b49ef75b0ef0742a
2016-08-18 14:36:49+01:00
qdist: fix memory leak during binning In qdist_bin__internal(), to->entries is initialized to a 1-element array, which we then leak when n == from->n. Fix it. Signed-off-by: Emilio G. Cota <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
f9dbc19e8bf58d0cbc830083352475bb16f315c4
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f9dbc19e8bf58d0cbc830083352475bb16f315c4
2016-08-02 12:03:58+02:00
qdev: Fix object reference leak in case device.realize() fails If device doesn't have parent assined before its realize is called, device_set_realized() will implicitly set parent to '/machine/unattached'. However device_set_realized() may fail after that point at several other points leaving not realized object dangling in '/machine/unattached' and as result caller of obj = object_new() obj->ref == 1 object_property_set_bool(obj,..., true, "realized",...) obj->ref == 2 if (fail) object_unref(obj); obj->ref == 1 will get object leak instead of expected object destruction. Fix it by making device_set_realized() to cleanup after itself in case of failure. Signed-off-by: Igor Mammedov <[email protected]> Reviewed-by: David Gibson <[email protected]> Signed-off-by: Eduardo Habkost <[email protected]>
69382d8b3e8600b349c191394d761dcb480502cf
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/69382d8b3e8600b349c191394d761dcb480502cf
2016-07-26 15:32:04-03:00
util: Fix assertion in iov_copy() upon zero 'bytes' and non-zero 'offset' In cases where iov_copy() is passed with zero 'bytes' argument and a non-zero 'offset' argument, nothing gets copied - as expected. However no copy iterations are performed, so 'offset' is left unaltered, leading to the final assert(offset == 0) to fail. Instead, change the loop condition to continue as long as 'offset || bytes', similar to other iov_* functions. This ensures 'offset' gets zeroed (even if no actual copy is made), unless it is beyond end of source iov - which is asserted. Signed-off-by: Shmulik Ladkani <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
e911765cbb9e9ddf5d952c88bb52180a62c6cea0
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e911765cbb9e9ddf5d952c88bb52180a62c6cea0
2016-08-03 18:44:57+02:00
kvm-irqchip: x86: add msi route notify fn One more IEC notifier is added to let msi routes know about the IEC changes. When interrupt invalidation happens, all registered msi routes will be updated for all PCI devices. Since both vfio and vhost are possible gsi route consumers, this patch will go one step further to keep them safe in split irqchip mode and when irqfd is enabled. Reviewed-by: Paolo Bonzini <[email protected]> [move trace-events lines into target-i386/trace-events] Signed-off-by: Peter Xu <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]>
e1d4fb2de594ab0cbe78846bc79617b9bd50c867
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e1d4fb2de594ab0cbe78846bc79617b9bd50c867
2016-07-21 20:44:19+03:00
apic: kvm-apic: Fix crash due to access to freed memory region kvm-apic.io_memory memory region had its parent set to NULL at memory_region_init_io() time, so it ended up as a child in /unattached contaner. As result when kvm-apic instance was deleted, the child property /unattached/kvm-apic-msi[XXX] contained a reference to kvm-apic.io_memory address which was freed as part of kvm-apic. Do the same as 'apic' and make kvm-apic instance the owner of the memory region so that it won't end up in /unattached and gets cleanly released along with related kvm-apic instance. Signed-off-by: Igor Mammedov <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Eduardo Habkost <[email protected]>
365aa1131fa61815eb1d672df6ba451bfe7f2cea
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/365aa1131fa61815eb1d672df6ba451bfe7f2cea
2016-07-20 12:02:19-03:00
block: Fragment reads to max transfer length Drivers should be able to rely on the block layer honoring the max transfer length, rather than needing to return -EINVAL (iscsi) or manually fragment things (nbd). This patch adds the fragmentation in the block layer, after requests have been aligned (fragmenting before alignment would lead to multiple unaligned requests, rather than just the head and tail). The return value was previously nebulous on success on whether it was zero or the length read; and fragmenting may introduce yet other non-zero values if we use the last length read. But as at least some callers are sloppy and expect only zero on success, it is easiest to just guarantee 0. [Fix uninitialized ret local variable in bdrv_aligned_preadv(). --Stefan] Signed-off-by: Eric Blake <[email protected]> Message-id: [email protected] Signed-off-by: Stefan Hajnoczi <[email protected]>
1a62d0accdf85fbeac149018ee8d1728e754de73
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/1a62d0accdf85fbeac149018ee8d1728e754de73
2016-07-20 14:11:54+01:00
migration: set state to post-migrate on failure If a migration fails/is cancelled during the postcopy stage we currently end up with the runstate as finish-migrate, where it should be post-migrate. There's a small window in precopy where I think the same thing can happen, but I've never seen it. It rarely matters; the only postcopy case is if you restart a migration, which again is a case that rarely matters in postcopy because it's only safe to restart the migration if you know the destination hasn't been running (which you might if you started the destination with -S and hadn't got around to 'c' ing it before the postcopy failed). Even then it's a small window but potentially you could hit if there's a problem loading the devices on the destination. This corresponds to: https://bugzilla.redhat.com/show_bug.cgi?id=1355683 Signed-off-by: Dr. David Alan Gilbert <[email protected]> Reviewed-by: Amit Shah <[email protected]> Message-Id: <[email protected]> Signed-off-by: Amit Shah <[email protected]>
42da5550d6d44ea0a5e36925deba1e1b13041f42
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/42da5550d6d44ea0a5e36925deba1e1b13041f42
2016-07-22 13:23:09+05:30
hostmem: fix QEMU crash by 'info memdev' 'info memdev' crashes QEMU: (qemu) info memdev Unexpected error in parse_str() at qapi/string-input-visitor.c:111: Parameter 'null' expects an int64 value or range It is caused by null uint16List is returned if 'host-nodes' is the default value Return MAX_NODES under this case to fix this bug Signed-off-by: Xiao Guangrong <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
1454d33f0507cb54d62ed80f494884157c9e7130
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/1454d33f0507cb54d62ed80f494884157c9e7130
2016-07-13 13:30:04+02:00
char: do not use atexit cleanup handler It turns out qemu is calling exit() in various places from various threads without taking much care of resources state. The atexit() cleanup handlers cannot easily destroy resources that are in use (by the same thread or other). Since c1111a24a3, TCG arm guests run into the following abort() when running tests, the chardev mutex is locked during the write, so qemu_mutex_destroy() returns an error: #0 0x00007fffdbb806f5 in raise () at /lib64/libc.so.6 #1 0x00007fffdbb822fa in abort () at /lib64/libc.so.6 #2 0x00005555557616fe in error_exit (err=<optimized out>, msg=msg@entry=0x555555c38c30 <__func__.14622> "qemu_mutex_destroy") at /home/drjones/code/qemu/util/qemu-thread-posix.c:39 #3 0x0000555555b0be20 in qemu_mutex_destroy (mutex=mutex@entry=0x5555566aa0e0) at /home/drjones/code/qemu/util/qemu-thread-posix.c:57 #4 0x00005555558aab00 in qemu_chr_free_common (chr=0x5555566aa0e0) at /home/drjones/code/qemu/qemu-char.c:4029 #5 0x00005555558b05f9 in qemu_chr_delete (chr=<optimized out>) at /home/drjones/code/qemu/qemu-char.c:4038 #6 0x00005555558b05f9 in qemu_chr_delete (chr=<optimized out>) at /home/drjones/code/qemu/qemu-char.c:4044 #7 0x00005555558b062c in qemu_chr_cleanup () at /home/drjones/code/qemu/qemu-char.c:4557 #8 0x00007fffdbb851e8 in __run_exit_handlers () at /lib64/libc.so.6 #9 0x00007fffdbb85235 in () at /lib64/libc.so.6 #10 0x00005555558d1b39 in testdev_write (testdev=0x5555566aa0a0) at /home/drjones/code/qemu/backends/testdev.c:71 #11 0x00005555558d1b39 in testdev_write (chr=<optimized out>, buf=0x7fffc343fd9a "", len=0) at /home/drjones/code/qemu/backends/testdev.c:95 #12 0x00005555558adced in qemu_chr_fe_write (s=0x5555566aa0e0, buf=buf@entry=0x7fffc343fd98 "0q", len=len@entry=2) at /home/drjones/code/qemu/qemu-char.c:282 Instead of using a atexit() handler, only run the chardev cleanup as initially proposed at the end of main(), where there are less chances (hic) of conflicts or other races. Signed-off-by: Marc-André Lureau <[email protected]> Reported-by: Andrew Jones <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
aa5cb7f5e8bf2e6737d0cb36c118332ca26e7797
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/aa5cb7f5e8bf2e6737d0cb36c118332ca26e7797
2016-07-13 13:30:00+02:00
spapr: fix write-past-end-of-array error in cpu core device init code This fixes a potential QEMU crash introduced by commit 3b542549661. Signed-off-by: Greg Kurz <[email protected]> Signed-off-by: David Gibson <[email protected]>
dde35bc966ef8c1afb4f4e0f3c0e99fc0f27ca04
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/dde35bc966ef8c1afb4f4e0f3c0e99fc0f27ca04
2016-07-01 09:57:01+10:00
qapi: Simplify use of range.h Calling our function g_list_insert_sorted_merged is a misnomer, since we are NOT writing a glib function. Furthermore, we are making every caller pass the same comparator function of range_merge(): any caller that would try otherwise would break in weird ways since our internal call to ranges_can_merge() is hard-coded to operate only on ranges, rather than paying attention to the caller's comparator. Better is to fix things so that callers don't have to care about our internal comparator, by picking a function name and updating the parameter type away from a gratuitous use of void*, to make it obvious that we are operating specifically on a list of ranges and not a generic list. Plus, refactoring the code here will make it easier to plug a memory leak in the next patch. range_compare() is now internal only, and moves to the .c file. Signed-off-by: Eric Blake <[email protected]> Message-Id: <[email protected]> Signed-off-by: Markus Armbruster <[email protected]>
7c47959d0cb05db43014141a156ada0b6d53a750
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/7c47959d0cb05db43014141a156ada0b6d53a750
2016-06-30 15:28:51+02:00
json-streamer: Don't leak tokens on incomplete parse Valgrind complained about a number of leaks in tests/check-qobject-json: ==12657== definitely lost: 17,247 bytes in 1,234 blocks All of which had the same root cause: on an incomplete parse, we were abandoning the token queue without cleaning up the allocated data within each queue element. Introduced in commit 95385fe, when we switched from QList (which recursively frees contents) to g_queue (which does not). We don't yet require glib 2.32 with its g_queue_free_full(), so open-code it instead. CC: [email protected] Signed-off-by: Eric Blake <[email protected]> Message-Id: <[email protected]> Reviewed-by: Markus Armbruster <[email protected]> Signed-off-by: Markus Armbruster <[email protected]>
ba4dba54347d5062436a8553f527dbbed6dcf069
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ba4dba54347d5062436a8553f527dbbed6dcf069
2016-06-30 15:24:36+02:00
linux-user: Don't use sigfillset() on uc->uc_sigmask The kernel and libc have different ideas about what a sigset_t is -- for the kernel it is only _NSIG / 8 bytes in size (usually 8 bytes), but for libc it is much larger, 128 bytes. In most situations the difference doesn't matter, because if you pass a pointer to a libc sigset_t to the kernel it just acts on the first 8 bytes of it, but for the ucontext_t* argument to a signal handler it trips us up. The kernel allocates this ucontext_t on the stack according to its idea of the sigset_t type, but the type of the ucontext_t defined by the libc headers uses the libc type, and so do the manipulator functions like sigfillset(). This means that (1) sizeof(uc->uc_sigmask) is much larger than the actual space used on the stack (2) sigfillset(&uc->uc_sigmask) will write garbage 0xff bytes off the end of the structure, which can trash data that was on the stack before the signal handler was invoked, and may result in a crash after the handler returns To avoid this, we use a memset() of the correct size to fill the signal mask rather than using the libc function. This fixes a problem where we would crash at least some of the time on an i386 host when a signal was taken. Signed-off-by: Peter Maydell <[email protected]> Reviewed-by: Laurent Vivier <[email protected]> Signed-off-by: Riku Voipio <[email protected]>
1d48fdd9d84aab1bd32c1f70947932f5d90f92aa
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/1d48fdd9d84aab1bd32c1f70947932f5d90f92aa
2016-06-26 13:17:20+03:00
qemu-img: fix failed autotests There are 9 iotests failed on Ubuntu 15.10 at the moment. The problem is that options parsing in qemu-img is broken by the following commit: commit 10985131e337a0c52c5bd1e191fd7867a6ff8d02 Author: Denis V. Lunev <[email protected]> Date: Fri Jun 17 17:44:13 2016 +0300 qemu-img: move common options parsing before commands processing This strange command line reports error ./qemu-img create -f qcow2 TEST_DIR/t.qcow2 -- 1024 qemu-img: Invalid image size specified! while original code parses it successfully. The problem is that getopt_long state should be reset. This could be done using this assignment according to the manual: optind = 0 Signed-off-by: Denis V. Lunev <[email protected]> CC: Eric Blake <[email protected]> CC: Kevin Wolf <[email protected]> CC: Max Reitz <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
cfef6a45c7201c8219d819d792e5d99bbff32308
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/cfef6a45c7201c8219d819d792e5d99bbff32308
2016-07-05 16:46:24+02:00
log: Plug memory leak on multiple -dfilter -dfilter overwrites any previous filter. The overwritten filter is leaked. Leaks since the beginning (commit 3514552, v2.6.0). Free it properly. Signed-off-by: Markus Armbruster <[email protected]> Message-Id: <[email protected]> Reviewed-by: Eric Blake <[email protected]>
2ec62faea274aabb2feaad2b8f85961161b5e1e4
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2ec62faea274aabb2feaad2b8f85961161b5e1e4
2016-06-20 16:38:14+02:00
libqos: add qvirtqueue_cleanup() qvirtqueue_setup() allocates the vring and virtqueue state. So far there has been no function to free it. Callers have been using guest_free() for the vring but forgot to free the QVirtQueue state. This patch solves the memory leak by introducing qvirtqueue_cleanup(). Signed-off-by: Stefan Hajnoczi <[email protected]>
f1d3b99154138741161fc52f5a8c373bf71613c6
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f1d3b99154138741161fc52f5a8c373bf71613c6
2016-06-20 11:44:12+01:00
vhost-net: do not crash if backend is not present Do not crash when backend is not present while enabling the ring. A following patch will save the enabled state so it can be restored once the backend is started. Signed-off-by: Marc-André Lureau <[email protected]> Tested-by: Yuanhan Liu <[email protected]> Reviewed-by: Yuanhan Liu <[email protected]> Reviewed-by: Victor Kaplansky <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]>
72b65f922b7b925ed67847017dcd0539e49d925f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/72b65f922b7b925ed67847017dcd0539e49d925f
2016-06-17 03:28:03+03:00
avx2 configure: Use primitives in test Use the avx2 primitives during the test, thus making sure that the compiler and assembler could actually use avx2. This also detects the failure case on gcc 4.8.x with -save-temps and avoids the need for the gcc version check in cutils. Signed-off-by: Dr. David Alan Gilbert <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
4fb8320a2efb2216c7ddcc929ad0362f4e285681
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/4fb8320a2efb2216c7ddcc929ad0362f4e285681
2016-06-16 18:39:04+02:00
block: Assert that flags are in range Add a new BDRV_REQ_MASK constant, and use it to make sure that caller flags are always valid. Tested with 'make check' and with qemu-iotests on both '-raw' and '-qcow2'; the only failure turned up was fixed in the previous commit. Signed-off-by: Eric Blake <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
fa166538743d4e28de7374c41332c3e448826f4b
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/fa166538743d4e28de7374c41332c3e448826f4b
2016-06-16 15:19:55+02:00
e1000e: Fix build with ust trace backend ust trace backend has limitation of maximum 10 arguments per event. Traces with more arguments cannot be compiled for this backend. Trace e1000e_rx_rss_ip6 introduced by previous commits has 11 arguments and fails to compile with ust trace backend. This patch fixes the problem by splitting this tracepoint into two successive tracepoints with smaller number of arguments. For more information see comment regarding TP_ARGS in lttng/tracepoint.h: /* * TP_ARGS takes tuples of type, argument separated by a comma. * It can take up to 10 tuples (which means that less than 10 tuples is * fine too). * Each tuple is also separated by a comma. */ Build log generated by this problem: In file included from ./trace/generated-tracers.h:9:0, from /home/travis/build/qemu/qemu/include/trace.h:4, from util/oslib-posix.c:36: ./trace/generated-ust-provider.h:16556:3: error: unknown type name ‘_TP_EXPROTO_Bool’ In file included from /home/travis/build/qemu/qemu/include/trace.h:4:0, from util/oslib-posix.c:36: ./trace/generated-tracers.h: In function ‘trace_e1000e_rx_rss_ip6’: ./trace/generated-tracers.h:8379:431: error: expected string literal before ‘_SDT_ASM_OPERANDS_ipv6_enabled’ ./trace/generated-tracers.h:8379:431: error: implicit declaration of function ‘__tracepoint_cb_qemu___e1000e_rx_rss_ip6’ [-Werror=implicit-function-declaration] ./trace/generated-tracers.h:8379:431: error: nested extern declaration of ‘__tracepoint_cb_qemu___e1000e_rx_rss_ip6’ [-Werror=nested-externs] cc1: all warnings being treated as errors make: *** [util/oslib-posix.o] Error 1 make: *** Waiting for unfinished jobs.... In file included from ./trace/generated-tracers.h:9:0, from /home/travis/build/qemu/qemu/include/trace.h:4, from util/hbitmap.c:16: ./trace/generated-ust-provider.h:16556:3: error: unknown type name ‘_TP_EXPROTO_Bool’ In file included from /home/travis/build/qemu/qemu/include/trace.h:4:0, from util/hbitmap.c:16: ./trace/generated-tracers.h: In function ‘trace_e1000e_rx_rss_ip6’: ./trace/generated-tracers.h:8379:431: error: expected string literal before ‘_SDT_ASM_OPERANDS_ipv6_enabled’ ./trace/generated-tracers.h:8379:431: error: implicit declaration of function ‘__tracepoint_cb_qemu___e1000e_rx_rss_ip6’ [-Werror=implicit-function-declaration] ./trace/generated-tracers.h:8379:431: error: nested extern declaration of ‘__tracepoint_cb_qemu___e1000e_rx_rss_ip6’ [-Werror=nested-externs] cc1: all warnings being treated as errors make: *** [util/hbitmap.o] Error 1 Signed-off-by: Dmitry Fleytman <[email protected]> Message-id: [email protected] Signed-off-by: Peter Maydell <[email protected]>
defbaec16007bdf26e44c5add27e686f74dc94e5
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/defbaec16007bdf26e44c5add27e686f74dc94e5
2016-06-03 11:06:09+01:00
ppc: Get out of emulation on SMT "OR" ops Otherwise tight loops at smt_low for example, which OPAL does, eat so much CPU that we can't boot a kernel anymore. With that, I can boot 8 CPUs just fine with powernv. Signed-off-by: Benjamin Herrenschmidt <[email protected]> Reviewed-by: David Gibson <[email protected]> Signed-off-by: David Gibson <[email protected]>
b68e60e6f0d2865e961a800fb8db96a7fc6494c4
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b68e60e6f0d2865e961a800fb8db96a7fc6494c4
2016-05-30 13:20:04+10:00
qemu-io: Fix recent UI updates Commit 770e0e0e [*] tried to add 'writev -f', but didn't tweak the getopt() call to actually let it work. Likewise, commit c2e001c missed implementing 'aio_write -u -z'. The latter commit also introduced a leak of ctx. [*] does it sound "ech0e" in here? :) Signed-off-by: Eric Blake <[email protected]> Message-id: [email protected] Signed-off-by: Max Reitz <[email protected]>
4ca1d3401b834662efddd12bd62ad80f5ef1ef05
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/4ca1d3401b834662efddd12bd62ad80f5ef1ef05
2016-05-19 16:56:58+02:00
qemu-io: Fix memory leak in 'aio_write -z' Signed-off-by: Kevin Wolf <[email protected]> Reviewed-by: Eric Blake <[email protected]>
0e01b76e7cc43068f6b8cc05297f61539ccd5279
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/0e01b76e7cc43068f6b8cc05297f61539ccd5279
2016-05-12 15:22:08+02:00
migration: add reporting of errors for outgoing migration Currently if an application initiates an outgoing migration, it may or may not, get an error reported back on failure. If the error occurs synchronously to the 'migrate' command execution, the client app will see the error message. This is the case for DNS lookup failures. If the error occurs asynchronously to the monitor command though, the error will be thrown away and the client left guessing about what went wrong. This is the case for failure to connect to the TCP server (eg due to wrong port, or firewall rules, or other similar errors). In the future we'll be adding more scope for errors to happen asynchronously with the TLS protocol handshake. TLS errors are hard to diagnose even when they are well reported, so discarding errors entirely will make it impossible to debug TLS connection problems. Management apps which do migration are already using 'query-migrate' / 'info migrate' to check up on progress of background migration operations and to see their end status. This is a fine place to also include the error message when things go wrong. This patch thus adds an 'error-desc' field to the MigrationInfo struct, which will be populated when the 'status' is set to 'failed': (qemu) migrate -d tcp:localhost:9001 (qemu) info migrate capabilities: xbzrle: off rdma-pin-all: off auto-converge: off zero-blocks: off compress: off events: off x-postcopy-ram: off Migration status: failed (Error connecting to socket: Connection refused) total time: 0 milliseconds In the HMP, when doing non-detached migration, it is also possible to display this error message directly to the app. (qemu) migrate tcp:localhost:9001 Error connecting to socket: Connection refused Or with QMP { "execute": "query-migrate", "arguments": {} } { "return": { "status": "failed", "error-desc": "address resolution failed for myhost:9000: No address associated with hostname" } } Reviewed-by: Dr. David Alan Gilbert <[email protected]> Signed-off-by: Daniel P. Berrange <[email protected]> Reviewed-by: Juan Quintela <[email protected]> Message-Id: <[email protected]> Signed-off-by: Amit Shah <[email protected]>
d59ce6f34434bf47a9b26138c908650bf9a24be1
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/d59ce6f34434bf47a9b26138c908650bf9a24be1
2016-05-26 11:31:30+05:30
target-ppc/fpu_helper: Fix efscmp* instructions handling With specification at hand from the reference manual from Freescale http://cache.nxp.com/files/32bit/doc/ref_manual/SPEPEM.pdf , I have found a fix to efscmp* instructions handling in QEMU. efscmp* instructions in QEMU set crD (Condition Register nibble) values as (0b0100 << 2) = 0b10000 (consider the HELPER_SINGLE_SPE_CMP macro which left shifts the value returned by efscmp* handler by 2 bits). A value of 0b10000 is not correct according the to the reference manual. The reference manual expects efscmp* instructions to return a value of 0bx1xx. Please find attached a patch which disables left shifting in HELPER_SINGLE_SPE_CMP macro. This macro is used by efscmp* and efstst* instructions only. efstst* instruction handlers, in turn, call efscmp* handlers too. *Explanation:* Traditionally, each crD (condition register nibble) consist of 4 bits, which is set by comparisons as follows: crD = W X Y Z where W = Less than X = Greater than Y = Equal to However, efscmp* instructions being a special case return a binary result. (efscmpeq will set the crD = 0bx1xx iff when op1 == op2 and 0bx0xx otherwise; i.e. there is no notion of different crD values based on Less than, Greater than and Equal to). This effectively means that crD will store a "Greater than" comparison result iff efscmp* instruction comparison is TRUE. Compiler exploits this feature by checking for "Branch if Less than or Equal to" (ble instruction) OR "Branch if Greater than" (bgt instruction) for Branch if FALSE OR Branch if TRUE respectively after an efscmp* instruction. This can be seen in a assembly code snippet below: 27 if (__real__ x != 3.0f || __imag__ x != 4.0f) 10000498: lwz r10,8(r31) 1000049c: lis r9,16448 100004a0: efscmpeq cr7,r10,r9 100004a4: ble- cr7,0x100004b8 <bar+60> //jump to abort() call 100004a8: lwz r10,12(r31) 100004ac: lis r9,16512 100004b0: efscmpeq cr7,r10,r9 100004b4: bgt- cr7,0x100004bc <bar+64> //skip abort() call 28 abort (); 100004b8: bl 0x10000808 <abort> Signed-off-by: Talha Imran <[email protected]> Signed-off-by: David Gibson <[email protected]>
a575d9ab2e1cdfe61bc5cc8d94bd96e2adda5b44
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a575d9ab2e1cdfe61bc5cc8d94bd96e2adda5b44
2016-06-07 10:17:44+10:00
usb:xhci: no DMA on HC reset This patch is a rough fix to a memory corruption we are observing when running VMs with xhci USB controller and OVMF firmware. Specifically, on the following call chain xhci_reset xhci_disable_slot xhci_disable_ep xhci_set_ep_state QEMU overwrites guest memory using stale guest addresses. This doesn't happen when the guest (firmware) driver sets up xhci for the first time as there are no slots configured yet. However when the firmware hands over the control to the OS some slots and endpoints are already set up with their context in the guest RAM. Now the OS' driver resets the controller again and xhci_set_ep_state then reads and writes that memory which is now owned by the OS. As a quick fix, skip calling xhci_set_ep_state in xhci_disable_ep if the device context base address array pointer is zero (indicating we're in the HC reset and no DMA is possible). Cc: [email protected] Signed-off-by: Roman Kagan <[email protected]> Message-id: [email protected] Signed-off-by: Gerd Hoffmann <[email protected]>
491d68d9382dbb588f2ff5132ee3d87ce2f1b230
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/491d68d9382dbb588f2ff5132ee3d87ce2f1b230
2016-05-11 10:29:28+02:00
ui: gtk: fix crash when terminal inner-border is NULL VTE terminal inner-border can be NULL. The vte-0.36 (API 2.90) code checks for the condition too so I assume it's not just a bug Fixes a crash on Fedora 24 with gtk 3.20 Signed-off-by: Cole Robinson <[email protected]> Message-id: 2b2e85d403e8760ea53afd735a170500d5c17716.1462557436.git.crobinso@redhat.com Signed-off-by: Gerd Hoffmann <[email protected]>
4fd811a6bd0b8f24f4761fc281454494c336d310
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/4fd811a6bd0b8f24f4761fc281454494c336d310
2016-05-11 08:02:40+02:00
target-arm: Stage 2 permission fault was fixed in AArch32 state As described in AArch32.CheckS2Permission an instruction fetch fails if XN bit is set or there is no read permission for the address. Signed-off-by: Sergey Sorokin <[email protected]> Message-id: [email protected] Reviewed-by: Peter Maydell <[email protected]> Signed-off-by: Peter Maydell <[email protected]>
dfda68377e20943f474505e75238cb96bc6874bf
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/dfda68377e20943f474505e75238cb96bc6874bf
2016-05-12 13:22:26+01:00
block: Fix bdrv_drain in coroutine Using the nested aio_poll() in coroutine is a bad idea. This patch replaces the aio_poll loop in bdrv_drain with a BH, if called in coroutine. For example, the bdrv_drain() in mirror.c can hang when a guest issued request is pending on it in qemu_co_mutex_lock(). Mirror coroutine in this case has just finished a request, and the block job is about to complete. It calls bdrv_drain() which waits for the other coroutine to complete. The other coroutine is a scsi-disk request. The deadlock happens when the latter is in turn pending on the former to yield/terminate, in qemu_co_mutex_lock(). The state flow is as below (assuming a qcow2 image): mirror coroutine scsi-disk coroutine ------------------------------------------------------------- do last write qcow2:qemu_co_mutex_lock() ... scsi disk read tracked request begin qcow2:qemu_co_mutex_lock.enter qcow2:qemu_co_mutex_unlock() bdrv_drain while (has tracked request) aio_poll() In the scsi-disk coroutine, the qemu_co_mutex_lock() will never return because the mirror coroutine is blocked in the aio_poll(blocking=true). With this patch, the added qemu_coroutine_yield() allows the scsi-disk coroutine to make progress as expected: mirror coroutine scsi-disk coroutine ------------------------------------------------------------- do last write qcow2:qemu_co_mutex_lock() ... scsi disk read tracked request begin qcow2:qemu_co_mutex_lock.enter qcow2:qemu_co_mutex_unlock() bdrv_drain.enter > schedule BH > qemu_coroutine_yield() > qcow2:qemu_co_mutex_lock.return > ... tracked request end ... (resumed from BH callback) bdrv_drain.return ... Reported-by: Laurent Vivier <[email protected]> Signed-off-by: Fam Zheng <[email protected]> Message-id: [email protected] Suggested-by: Paolo Bonzini <[email protected]> Signed-off-by: Fam Zheng <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
a77fd4bb2988c05953fdc9f1524085870ec1c939
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a77fd4bb2988c05953fdc9f1524085870ec1c939
2016-04-11 16:59:09+01:00
virtio-scsi: use aio handler for data plane In addition to handling IO in vcpu thread and in io thread, dataplane introduces yet another mode: handling it by AioContext. This reuses the same handler as previous modes, which triggers races as these were not designed to be reentrant. Use a separate handler just for aio, and disable regular handlers when dataplane is active. Reviewed-by: Cornelia Huck <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]>
a8f2e5c8fffbaf7fbd4f0efc8efbeebade78008f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a8f2e5c8fffbaf7fbd4f0efc8efbeebade78008f
2016-04-07 19:57:33+03:00
vpc: fix return value check for blk_pwrite bdrv_pwrite_sync used to return zero or negative error, while blk_pwrite returns the number of written bytes when successful. This caused VPC image creation to fail spectacularly: it wrote the first 512 bytes, and then exited immediately because of the non-zero answer from blk_pwrite. But the truly spectacular part is that it returns a positive value (the 512 that blk_pwrite returned) causing everyone to believe that it succeeded. This fixes qemu-iotests with vpc format. Fixes: b8f45cdf7827e39f9a1e6cc446f5972cc6144237 Signed-off-by: Paolo Bonzini <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
40a99aace3f9ffd65af07a89c381db3550b22316
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/40a99aace3f9ffd65af07a89c381db3550b22316
2016-04-12 18:06:51+02:00
net: fix missing include of qapi/error.h in netmap.c The netmap.c file fails to build on FreeBSD with net/netmap.c:95:9: warning: implicit declaration of function 'error_setg_errno' is invalid in C99 [-Wimplicit-function-declaration] error_setg_errno(errp, errno, "Failed to nm_open() %s", ^ net/netmap.c:432:9: warning: implicit declaration of function 'error_propagate' is invalid in C99 [-Wimplicit-function-declaration] error_propagate(errp, err); ^ Signed-off-by: Daniel P. Berrange <[email protected]> Reviewed-by: Eric Blake <[email protected]> Message-id: [email protected] Signed-off-by: Peter Maydell <[email protected]>
e31f0451876aa7ada74d60304aa241506a383797
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e31f0451876aa7ada74d60304aa241506a383797
2016-04-04 15:01:14+01:00
spapr_rng: fix race with main loop Since commit "60253ed1e6ec rng: add request queue support to rng-random", the use of a spapr_rng device may hang vCPU threads. The following path is taken without holding the lock to the main loop mutex: h_random() rng_backend_request_entropy() rng_random_request_entropy() qemu_set_fd_handler() The consequence is that entropy_available() may be called before the vCPU thread could even queue the request: depending on the scheduling, it may happen that entropy_available() does not call random_recv()->qemu_sem_post(). The vCPU thread will then sleep forever in h_random()->qemu_sem_wait(). This could not happen before 60253ed1e6ec because entropy_available() used to call random_recv() unconditionally. This patch ensures the lock is held to avoid the race. Signed-off-by: Greg Kurz <[email protected]> Reviewed-by: Cédric Le Goater <[email protected]> Reviewed-by: Thomas Huth <[email protected]> Signed-off-by: David Gibson <[email protected]>
f1a6cf3ef734aab142d5f7ce52e219474ababf6b
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f1a6cf3ef734aab142d5f7ce52e219474ababf6b
2016-03-16 09:55:06+11:00
hw/usb/dev-mtp: Guard inotify usage with CONFIG_INOTIFY1 inotify_init1 usage was guarded by a check for linux but does not exist on older distributions like CentOS 5 resulting in build failures. Signed-off-by: Matthew Fortune <[email protected]> Message-id: [email protected] Signed-off-by: Gerd Hoffmann <[email protected]>
983bff3530782d51c46c8d7c0e17e2a9dfe5fb77
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/983bff3530782d51c46c8d7c0e17e2a9dfe5fb77
2016-03-18 13:58:15+01:00
qga: check utf8-to-utf16 conversion UTF8 to UTF16 conversion can fail for genuine reasons, let's check errors. Reported-by: Laszlo Ersek <[email protected]> Signed-off-by: Marc-André Lureau <[email protected]> Reviewed-by: Laszlo Ersek <[email protected]> Reviewed-by: Michael Roth <[email protected]> Signed-off-by: Michael Roth <[email protected]>
8021de10131868a8857e64b91cf0a868b76a61d8
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8021de10131868a8857e64b91cf0a868b76a61d8
2016-02-25 09:48:52-06:00
net: rocker: fix an incorrect array bounds check While processing transmit(tx) descriptors in 'tx_consume' routine the switch emulator suffers from an off-by-one error, if a descriptor was to have more than allowed(ROCKER_TX_FRAGS_MAX=16) fragments. Fix an incorrect bounds check to avoid it. Reported-by: Qinghao Tang <[email protected]> Cc: [email protected] Signed-off-by: Prasad J Pandit <[email protected]> Signed-off-by: Jason Wang <[email protected]>
007cd223de527b5f41278f2d886c1a4beb3e67aa
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/007cd223de527b5f41278f2d886c1a4beb3e67aa
2016-01-11 11:01:35+08:00
nvdimm: fix header pointer in nvdimm_build_nfit() In the current nvdimm_build_nfit(), the pointer 'header' initially equals to table_data->data + table_data->len. However, the following g_array_append_vals(table_data, structures->data, structures->len) may resize and relocate table_data->data[]. Therefore, the usage of 'header' afterwards may be illegal. This patch fixes this issue by storing an offset within table_data->data[] (rather than an address) in 'header'. Signed-off-by: Haozhong Zhang <[email protected]> Reviewed-by: Xiao Guangrong <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]>
c8e6c93857885a19e959ec622d92a256d1cd98eb
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c8e6c93857885a19e959ec622d92a256d1cd98eb
2016-01-08 16:01:37+02:00
qemu-iotests: s390x: fix test 068 Now, s390-virtio-ccw is default machine and s390-ccw.img is default boot loader. If the s390-virtio-ccw machine finds no device to load from and errors out, then emits a panic and exits the vm. This breaks test cases 068 for s390x. Adding the parameter of "-no-shutdown" for s390-ccw-virtio will pause VM before shutdown. Acked-by: Max Reitz <[email protected]> Reviewed-by: Sascha Silbe <[email protected]> Signed-off-by: Bo Tu <[email protected]> Message-id: [email protected] Signed-off-by: Max Reitz <[email protected]>
a41aa71c15fc8e8289acebd3330257bee0b8e11c
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a41aa71c15fc8e8289acebd3330257bee0b8e11c
2015-12-18 14:36:17+01:00
char: introduce support for TLS encrypted TCP chardev backend This integrates support for QIOChannelTLS object in the TCP chardev backend. If the 'tls-creds=NAME' option is passed with the '-chardev tcp' argument, then it will setup the chardev such that the client is required to establish a TLS handshake when connecting. There is no support for checking the client certificate against ACLs in this initial patch. This is pending work to QOM-ify the ACL object code. A complete invocation to run QEMU as the server for a TLS encrypted serial dev might be $ qemu-system-x86_64 \ -nodefconfig -nodefaults -device sga -display none \ -chardev socket,id=s0,host=127.0.0.1,port=9000,tls-creds=tls0,server \ -device isa-serial,chardev=s0 \ -object tls-creds-x509,id=tls0,endpoint=server,verify-peer=off,\ dir=/home/berrange/security/qemutls To test with the gnutls-cli tool as the client: $ gnutls-cli --priority=NORMAL -p 9000 \ --x509cafile=/home/berrange/security/qemutls/ca-cert.pem \ 127.0.0.1 If QEMU was told to use 'anon' credential type, then use the priority string 'NORMAL:+ANON-DH' with gnutls-cli Alternatively, if setting up a chardev to operate as a client, then the TLS credentials registered must be for the client endpoint. First a TLS server must be setup, which can be done with the gnutls-serv tool $ gnutls-serv --priority=NORMAL -p 9000 --echo \ --x509cafile=/home/berrange/security/qemutls/ca-cert.pem \ --x509certfile=/home/berrange/security/qemutls/server-cert.pem \ --x509keyfile=/home/berrange/security/qemutls/server-key.pem Then QEMU can connect with $ qemu-system-x86_64 \ -nodefconfig -nodefaults -device sga -display none \ -chardev socket,id=s0,host=127.0.0.1,port=9000,tls-creds=tls0 \ -device isa-serial,chardev=s0 \ -object tls-creds-x509,id=tls0,endpoint=client,\ dir=/home/berrange/security/qemutls Signed-off-by: Daniel P. Berrange <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
a8fb542705ac7e0dcf00908bc47bf49cdd058abe
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a8fb542705ac7e0dcf00908bc47bf49cdd058abe
2016-01-26 15:58:11+01:00
fw_cfg: add generic non-DMA read method Introduce fw_cfg_data_read(), a generic read method which works on all access widths (1 through 8 bytes, inclusive), and can be used during both IOPort and MMIO read accesses. To maintain legibility, only fw_cfg_data_mem_read() (the MMIO data read method) is replaced by this patch. The new method essentially unwinds the fw_cfg_data_mem_read() + fw_cfg_read() combo, but without unnecessarily repeating all the validity checks performed by the latter on each byte being read. This patch also modifies the trace_fw_cfg_read prototype to accept a 64-bit value argument, allowing it to work properly with the new read method, but also remain backward compatible with existing call sites. Cc: Laszlo Ersek <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Marc Marí <[email protected]> Signed-off-by: Gabriel Somlo <[email protected]> Reviewed-by: Laszlo Ersek <[email protected]> Message-id: [email protected] Signed-off-by: Gerd Hoffmann <[email protected]>
38bf20931afe761fccda6e1eb91d64c7498ed9c9
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/38bf20931afe761fccda6e1eb91d64c7498ed9c9
2015-12-15 11:45:59+01:00
iotests: Add regresion test case for write notifier assertion failure The idea is to let the top level bs have a big request alignment with blkdebug, so that the aio_write request issued from monitor will be serialised. This tests that QEMU doesn't crash upon the read request from the backup job's write notifier, which is a very special case of "reentrant" request. Signed-off-by: Fam Zheng <[email protected]> Message-id: [email protected] Signed-off-by: Stefan Hajnoczi <[email protected]>
9cc0f19de213fcb7098f0ea8f42448728f2cfcde
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/9cc0f19de213fcb7098f0ea8f42448728f2cfcde
2015-12-03 11:08:07+08:00
vnc: fix segfault Commit "c7628bf vnc: only alloc server surface with clients connected" missed one rarely used codepath (cirrus with guest drivers using 2d accel) where we have to check for the server surface being present, to avoid qemu crashing with a NULL pointer dereference. Add the check. Reported-by: Anthony PERARD <[email protected]> Tested-by: Anthony PERARD <[email protected]> Signed-off-by: Gerd Hoffmann <[email protected]>
7fe4a41c262e2529dc79f77f6fe63c5309fa2fd9
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/7fe4a41c262e2529dc79f77f6fe63c5309fa2fd9
2015-11-26 08:32:11+01:00
test-aio: Fix event notifier cleanup One test case closed an event notifier (event_notifier_cleanup()) without first disabling it (set_event_notifier(..., NULL)). This resulted in a leftover handle 0 that was added to each subsequent WaitForMultipleObjects() call, causing the function to fail (invalid handle). Signed-off-by: Kevin Wolf <[email protected]> Reviewed-by: Paolo Bonzini <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]>
7595ed743914b9de1d146213dedc1e007283f723
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/7595ed743914b9de1d146213dedc1e007283f723
2015-11-25 14:27:43+01:00
ide: add support for IDEBufferedRequest this patch adds a new aio readv compatible function which copies all data through a bounce buffer. These buffered requests can be flagged as orphaned which means that their original callback has already been invoked and the request has just not been completed by the backend storage. The bounce buffer guarantees that guest memory corruption is avoided when such a orphaned request is completed by the backend at a later stage. This trick only works for read requests as a write request completed at a later stage might corrupt data as there is no way to control if and what data has already been written to the storage. Signed-off-by: Peter Lieven <[email protected]> Reviewed-by: Fam Zheng <[email protected]> Message-id: [email protected] Signed-off-by: John Snow <[email protected]>
1d8c11d631545ee43aff16b0763aff7181b61f20
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/1d8c11d631545ee43aff16b0763aff7181b61f20
2015-11-17 15:06:25-05:00
pseries: Update SLOF firmware image to qemu-slof-20151103 The changes are: 1. supports recent binutils; 2. 64bit BARs behind PCI bridges supported; 3. Many fixes for USB keyboard support - keys, XHCI; 4. virtio-vga support. This image was built with: gcc version 4.8.3 20140911 (Red Hat 4.8.3-7) (GCC) GNU ld version 2.23.2 The full changelog is: > version: update to 20151103 > documentation: Add a clause about signing off > qemu/js2x/client: Support binutils >= 2.25.1 > Fix special keys on USB > Fix function keys on USB > pci-scan: program 64-bit mem bar range in pci-bridge bar > Allow to build SLOF on Little Endian host > usb-xhci: add keyboard support > usb-xhci: ready the link trb early > usb-xhci: scan usb high speed ports > usb-xhci: bulk improve event handling loop > usb-xhci: return on allocation failure > usb-xhci: add delay in shutdown path > usb-xhci: event trbs does not need link trb > usb-hid: refactor usb key reading > takeover: Fix header includes > board-js2x: Add missing file dma-function.fs > vga: Add support for virtio-vga > qemu-vga: Use MMIO BAR instead of legacy IO ports > slof: Change call_c() function to a proper assembler function Signed-off-by: Alexey Kardashevskiy <[email protected]> Signed-off-by: David Gibson <[email protected]>
121048195860f0320a7e1cd5a4b86356082eb9c7
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/121048195860f0320a7e1cd5a4b86356082eb9c7
2015-11-11 13:28:45+11:00
replay: introduce mutex to protect the replay log This mutex will protect read/write operations for replay log. Using mutex is necessary because most of the events consist of several fields stored in the log. The mutex will help to avoid races. Reviewed-by: Paolo Bonzini <[email protected]> Signed-off-by: Pavel Dovgalyuk <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
c16861ef1b7b27803b4c068ef778ba0f80fba1c2
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c16861ef1b7b27803b4c068ef778ba0f80fba1c2
2015-11-05 12:19:09+01:00
vhost-user-test: fix up rhel6 build Build on RHEL6 fails: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=42875 Apparently unnamed unions couldn't use C99 named field initializers. Let's just name the payload union field. Signed-off-by: Michael S. Tsirkin <[email protected]>
12ebf6908333a86775ef18f12ea283601fd1d2df
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/12ebf6908333a86775ef18f12ea283601fd1d2df
2015-10-29 11:05:24+02:00
ivshmem: do not keep shm_fd open Remove shm_fd from device state, closing it as early as possible to avoid leaks. Signed-off-by: Marc-André Lureau <[email protected]> Reviewed-by: Claudio Fontana <[email protected]>
f689d2811a36894618087e1e2cc3ade78e758e94
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f689d2811a36894618087e1e2cc3ade78e758e94
2015-10-26 10:19:53+01:00
msix: implement pba write (but read-only) qpci_msix_pending() writes on pba region, causing qemu to SEGV: Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 0x7ffff7fba8c0 (LWP 25882)] 0x0000000000000000 in ?? () (gdb) bt #0 0x0000000000000000 in () #1 0x00005555556556c5 in memory_region_oldmmio_write_accessor (mr=0x5555579f3f80, addr=0, value=0x7fffffffbf68, size=4, shift=0, mask=4294967295, attrs=...) at /home/elmarco/src/qemu/memory.c:434 #2 0x00005555556558e1 in access_with_adjusted_size (addr=0, value=0x7fffffffbf68, size=4, access_size_min=1, access_size_max=4, access=0x55555565563e <memory_region_oldmmio_write_accessor>, mr=0x5555579f3f80, attrs=...) at /home/elmarco/src/qemu/memory.c:506 #3 0x00005555556581eb in memory_region_dispatch_write (mr=0x5555579f3f80, addr=0, data=0, size=4, attrs=...) at /home/elmarco/src/qemu/memory.c:1176 #4 0x000055555560b6f9 in address_space_rw (as=0x555555eff4e0 <address_space_memory>, addr=3759147008, attrs=..., buf=0x7fffffffc1b0 "", len=4, is_write=true) at /home/elmarco/src/qemu/exec.c:2439 #5 0x000055555560baa2 in cpu_physical_memory_rw (addr=3759147008, buf=0x7fffffffc1b0 "", len=4, is_write=1) at /home/elmarco/src/qemu/exec.c:2534 #6 0x000055555564c005 in cpu_physical_memory_write (addr=3759147008, buf=0x7fffffffc1b0, len=4) at /home/elmarco/src/qemu/include/exec/cpu-common.h:80 #7 0x000055555564cd9c in qtest_process_command (chr=0x55555642b890, words=0x5555578de4b0) at /home/elmarco/src/qemu/qtest.c:378 #8 0x000055555564db77 in qtest_process_inbuf (chr=0x55555642b890, inbuf=0x55555641b340) at /home/elmarco/src/qemu/qtest.c:569 #9 0x000055555564dc07 in qtest_read (opaque=0x55555642b890, buf=0x7fffffffc2e0 "writel 0xe0100800 0x0\n", size=22) at /home/elmarco/src/qemu/qtest.c:581 #10 0x000055555574ce3e in qemu_chr_be_write (s=0x55555642b890, buf=0x7fffffffc2e0 "writel 0xe0100800 0x0\n", len=22) at qemu-char.c:306 #11 0x0000555555751263 in tcp_chr_read (chan=0x55555642bcf0, cond=G_IO_IN, opaque=0x55555642b890) at qemu-char.c:2876 #12 0x00007ffff64c9a8a in g_main_context_dispatch (context=0x55555641c400) at gmain.c:3122 (without this patch, this can be reproduced with the ivshmem qtest) Implement an empty mmio write to avoid the crash. Signed-off-by: Marc-André Lureau <[email protected]> Reviewed-by: Paolo Bonzini <[email protected]>
43b11a91dd861a946b231b89b7542856ade23d1b
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/43b11a91dd861a946b231b89b7542856ade23d1b
2015-10-24 18:03:18+02:00
vhost: add vhost_has_free_slot() interface it will allow for other parts of QEMU check if it's safe to map memory region during hotplug/runtime. That way hotplug path will have a chance to cancel hotplug operation instead of crashing in vhost_commit(). Signed-off-by: Igor Mammedov <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]>
2ce68e4cf5be9b5176a3c3c372948d6340724d2d
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2ce68e4cf5be9b5176a3c3c372948d6340724d2d
2015-10-22 14:34:48+03:00
pc: Require xen when initializing xenfv machine Without this check, the xen-platform device will crash on reset if using the accel option with anything other than xen (e.g. "-machine xenfv,accel=kvm"). Signed-off-by: Eduardo Habkost <[email protected]> Reviewed-by: Stefano Stabellini <[email protected]> Signed-off-by: Stefano Stabellini <[email protected]>
a88ae0d44b6b5830b752641b2198735272f13eaf
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a88ae0d44b6b5830b752641b2198735272f13eaf
2015-10-19 10:16:01+00:00
checkpatch: allow open braces on typedef lines The style here seems to be split according to the maintainer, but traditionally open braces were placed on typedef lines. Suggested-by: Peter Maydell <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
5b906129524d564d61760d04586d6c2301457ead
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/5b906129524d564d61760d04586d6c2301457ead
2015-10-12 18:29:26+02:00
tcg: Check for overflow via highwater mark We currently pre-compute an worst case code size for any TB, which works out to be 122kB. Since the average TB size is near 1kB, this wastes quite a lot of storage. Instead, check for overflow in between generating code for each opcode. The overhead of the check isn't measurable and wastage is minimized. Reviewed-by: Peter Maydell <[email protected]> Signed-off-by: Richard Henderson <[email protected]>
b125f9dc7bd68cd4c57189db4da83b0620b28a72
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b125f9dc7bd68cd4c57189db4da83b0620b28a72
2015-10-07 20:36:53+11:00
vhost-user-test: fix predictable filename on tmpfs vhost-user-test uses getpid to create a unique filename. This name is predictable, and a security problem. Instead, use a tmp directory created by mkdtemp, which is a suggested best practice. Signed-off-by: Michael S. Tsirkin <[email protected]> Reviewed-by: Marc-André Lureau <[email protected]>
6fdac09370530be0cc6fe9e8d425c0670ba994b1
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/6fdac09370530be0cc6fe9e8d425c0670ba994b1
2015-10-02 17:04:32+03:00
e1000: Avoid infinite loop in processing transmit descriptor (CVE-2015-6815) While processing transmit descriptors, it could lead to an infinite loop if 'bytes' was to become zero; Add a check to avoid it. [The guest can force 'bytes' to 0 by setting the hdr_len and mss descriptor fields to 0. --Stefan] Signed-off-by: P J P <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]> Reviewed-by: Thomas Huth <[email protected]> Message-id: [email protected]
b947ac2bf26479e710489739c465c8af336599e7
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b947ac2bf26479e710489739c465c8af336599e7
2015-09-15 12:51:02+01:00
net: avoid infinite loop when receiving packets(CVE-2015-5278) Ne2000 NIC uses ring buffer of NE2000_MEM_SIZE(49152) bytes to process network packets. While receiving packets via ne2000_receive() routine, a local 'index' variable could exceed the ring buffer size, leading to an infinite loop situation. Reported-by: Qinghao Tang <[email protected]> Signed-off-by: P J P <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
737d2b3c41d59eb8f94ab7eb419b957938f24943
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/737d2b3c41d59eb8f94ab7eb419b957938f24943
2015-09-15 12:51:14+01:00
configure: qemu-ga: explicitly enable qemu-ga MSI support when probed Currently, if we don't explicitly disable support for MSI installer via --disable-guest-agent-msi, the configure variable that tracks the flag, 'guest_agent_msi', never gets set unless one of the probes fails. Subsequent code then treats this unset value the same as if it were a "yes" value (via != "no" style checks). Instead, set the default "yes" value explicitly after the probes, then make subsequent code expect the values to be set. This makes it easier to report on whether or not MSI support was enabled via probe by looking at the ./configure summary. Signed-off-by: Michael Roth <[email protected]>
1a34904e5b59fd42f238dc50992af1c3a11a458b
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/1a34904e5b59fd42f238dc50992af1c3a11a458b
2015-09-01 13:16:26-05:00
arm: Use g_new() & friends where that makes obvious sense g_new(T, n) is neater than g_malloc(sizeof(T) * n). It's also safer, for two reasons. One, it catches multiplication overflowing size_t. Two, it returns T * rather than void *, which lets the compiler catch more type errors. This commit only touches allocations with size arguments of the form sizeof(T). Coccinelle semantic patch: @@ type T; @@ -g_malloc(sizeof(T)) +g_new(T, 1) @@ type T; @@ -g_try_malloc(sizeof(T)) +g_try_new(T, 1) @@ type T; @@ -g_malloc0(sizeof(T)) +g_new0(T, 1) @@ type T; @@ -g_try_malloc0(sizeof(T)) +g_try_new0(T, 1) @@ type T; expression n; @@ -g_malloc(sizeof(T) * (n)) +g_new(T, n) @@ type T; expression n; @@ -g_try_malloc(sizeof(T) * (n)) +g_try_new(T, n) @@ type T; expression n; @@ -g_malloc0(sizeof(T) * (n)) +g_new0(T, n) @@ type T; expression n; @@ -g_try_malloc0(sizeof(T) * (n)) +g_try_new0(T, n) @@ type T; expression p, n; @@ -g_realloc(p, sizeof(T) * (n)) +g_renew(T, p, n) @@ type T; expression p, n; @@ -g_try_realloc(p, sizeof(T) * (n)) +g_try_renew(T, p, n) @@ type T; expression n; @@ -(T *)g_new(T, n) +g_new(T, n) @@ type T; expression n; @@ -(T *)g_new0(T, n) +g_new0(T, n) @@ type T; expression p, n; @@ -(T *)g_renew(T, p, n) +g_renew(T, p, n) Signed-off-by: Markus Armbruster <[email protected]> Reviewed-by: Eric Blake <[email protected]> Message-id: [email protected] Signed-off-by: Peter Maydell <[email protected]>
b45c03f585ea9bb1af76c73e82195418c294919d
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b45c03f585ea9bb1af76c73e82195418c294919d
2015-09-07 10:39:27+01:00
rtl8139: skip offload on short Ethernet/IP header (CVE-2015-5165) Transmit offload features access Ethernet and IP headers the packet. If the packet is too short we must not attempt to access header fields: int proto = be16_to_cpu(*(uint16_t *)(saved_buffer + 12)); ... eth_payload_data = saved_buffer + ETH_HLEN; ... ip = (ip_header*)eth_payload_data; if (IP_HEADER_VERSION(ip) != IP_HEADER_VERSION_4) { Reported-by: 朱东海(启路) <[email protected]> Reviewed-by: Jason Wang <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
e1c120a9c54872f8a538ff9129d928de4e865cbd
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e1c120a9c54872f8a538ff9129d928de4e865cbd
2015-08-03 13:08:00+01:00
memory: do not add a reference to the owner of aliased regions Very often the owner of the aliased region is the same as the owner of the alias region itself. When this happens, the reference count can never go back to 0 and the owner is leaked. This is for example breaking hot-unplug of virtio-pci devices (the device cannot be plugged back again with the same id). Another common use for alias is to transform the system I/O address space into an MMIO regions; in this case the aliased region never dies, so there is no problem. Otherwise the owner is always the same for aliasing and aliased region. I checked all calls to memory_region_init_alias introduced after commit dfde4e6 (memory: add ref/unref calls, 2013-05-06) and they do not need the reference in order to keep the owner of the aliased region alive. Reported-by: Michael S. Tsirkin <[email protected]> Tested-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
52c91dac6bd891656f297dab76da51fc8bc61309
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/52c91dac6bd891656f297dab76da51fc8bc61309
2015-07-27 23:05:49+02:00
acpi: fix pvpanic device is not shown in ui Commit 2332333c added a _STA method that hides the device. The fact that the device is not shown in the gui make it harder to install its Windows' device. https://bugzilla.redhat.com/show_bug.cgi?id=1238141 Signed-off-by: Gal Hammer <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]> Reviewed-by: Igor Mammedov <[email protected]>
8ef3ea253b5aaaa00f3b9999f3ff19e74cfa26f8
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8ef3ea253b5aaaa00f3b9999f3ff19e74cfa26f8
2015-07-27 23:55:27+03:00
virtio-net: Flush incoming queues when DRIVER_OK is being set This patch fixes network hang after "stop" then "cont", while network packets keep arriving. Tested both manually (tap, host pinging guest) and with Jason's qtest series (plus his "[PATCH 2.4] socket: pass correct size in net_socket_send()" fix). As virtio_net_set_status is called when guest driver is setting status byte and when vm state is changing, it is a good opportunity to flush queued packets. This is necessary because during vm stop the backend (e.g. tap) would stop rx processing after .can_receive returns false, until the queue is explicitly flushed or purged. The other interesting condition in .can_receive, virtio_queue_ready(), is handled by virtio_net_handle_rx() when guest kicks; the 3rd condition is invalid queue index which doesn't need flushing. Signed-off-by: Fam Zheng <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]>
38705bb57bf1cd9e3f837cf11bcdee3876786c07
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/38705bb57bf1cd9e3f837cf11bcdee3876786c07
2015-07-20 14:19:41+03:00
hw/pci: Use pow2ceil() rather than hand-calculation A couple of places in hw/pci use an inline calculation to round a size up to the next largest power of 2. We have a utility routine for this, so use it. (The behaviour of the old code is different if the size value is 0 -- it would leave it as 0 rather than rounding up to 1, but in both cases we know the size can't be 0. In the case where the size value had bit 31 set, the old code would invoke undefined behaviour; the new code will give a result of 0. Presumably that could never happen either.) Signed-off-by: Peter Maydell <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Message-id: [email protected]
9bff5d8135fc3f37932d4177727d293aa93ce79b
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/9bff5d8135fc3f37932d4177727d293aa93ce79b
2015-09-07 14:19:00+01:00
rocker: fix memory leak Meanwhile, using g_new0 instead of g_malloc0, refer to commit 5839e53. Signed-off-by: Gonglei <[email protected]> Message-id: [email protected] Signed-off-by: Stefan Hajnoczi <[email protected]>
ec50dd4634ae06091e61f42b7ba975f9ed510ad0
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ec50dd4634ae06091e61f42b7ba975f9ed510ad0
2015-07-07 13:10:26+01:00
qemu-iotests: fix 051.out after qdev error message change Commit f006cf7fa9a63ba8e4ccf57d46231ce594301727 ("qdev-monitor: Propagate errors through qdev_device_add()") dropped a meaningless error message. This change in output caused qemu-iotests 051 to fail: QEMU_PROG: -device ide-drive,drive=disk: Device initialization failed. -QEMU_PROG: -device ide-drive,drive=disk: Device 'ide-drive' could not be initialized Update 051.out so the test passes again. Cc: Markus Armbruster <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]> Reviewed-by: Fam Zheng <[email protected]> Message-id: [email protected]
a30c4eb2ce7b2c15ab556be3cfe2340c17271ddd
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a30c4eb2ce7b2c15ab556be3cfe2340c17271ddd
2015-06-24 15:23:20+01:00
s390/bios: build with -fdelete-null-pointer-checks Starting with version 4.9, GCC assumes it can't safely dereference null pointers, and uses this for some optimizations. On s390, the lowcore memory is located at address 0, so this assumption is wrong and breaks the s390-ccw firmware. Pass -fdelete-null-pointer-checks to avoid that. Cc: Cornelia Huck <[email protected]> Cc: Christian Borntraeger <[email protected]> Cc: Alexander Graf <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]> Message-Id: <[email protected]> Signed-off-by: Christian Borntraeger <[email protected]>
8369e339d24f365750da456588e742674c153437
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8369e339d24f365750da456588e742674c153437
2015-06-15 13:31:33+02:00
paaudio: fix possible resource leak qpa_audio_init did not clean up resources properly if the initialization failed. This hopefully fixes it. Signed-off-by: Kővágó, Zoltán <[email protected]> Signed-off-by: Gerd Hoffmann <[email protected]>
49dd6d0d33e1a59b4055713079e64062bc5092b5
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/49dd6d0d33e1a59b4055713079e64062bc5092b5
2015-06-15 12:42:48+02:00
vhost: enable vhost without without MSI-X We use vhostforce to enable vhost even if Guests don't have MSI-X support and we fall back to QEMU virtio-net. This gives a very small performance gain, but the disadvantage is that guest now controls which virtio code is running (qemu or vhost) so our attack surface is doubled. This patch will enable vhost unconditionally whenever it's requested. For compatibility, enable vhost when vhostforce is set, as well. Signed-off-by: Pankaj Gupta <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]> Reviewed-by: Jason Wang <[email protected]>
1e7398a140f7a6bd9f5a438e7ad0f1ef50990e25
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/1e7398a140f7a6bd9f5a438e7ad0f1ef50990e25
2015-06-19 12:17:49+02:00
pcnet: force the buffer access to be in bounds during tx 4096 is the maximum length per TMD and it is also currently the size of the relay buffer pcnet driver uses for sending the packet data to QEMU for further processing. With packet spanning multiple TMDs it can happen that the overall packet size will be bigger than sizeof(buffer), which results in memory corruption. Fix this by only allowing to queue maximum sizeof(buffer) bytes. This is CVE-2015-3209. [Fixed 3-space indentation to QEMU's 4-space coding standard. --Stefan] Signed-off-by: Petr Matousek <[email protected]> Reported-by: Matt Tait <[email protected]> Reviewed-by: Peter Maydell <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
9f7c594c006289ad41169b854d70f5da6e400a2a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/9f7c594c006289ad41169b854d70f5da6e400a2a
2015-06-10 15:03:02+01:00
target-arm: Avoid buffer overrun on UNPREDICTABLE ldrd/strd A LDRD or STRD where rd is not an even number is UNPREDICTABLE. We were letting this fall through, which is OK unless rd is 15, in which case we would attempt to do a load_reg or store_reg to a nonexistent r16 for the second half of the double-word. Catch the odd-numbered-rd cases and UNDEF them instead. To do this we rearrange the structure of the code a little so we can put the UNDEF catches at the top before we've allocated TCG temporaries. Cc: [email protected] Signed-off-by: Peter Maydell <[email protected]> Message-id: [email protected]
3960c336ad96c2183549c8bf32bbff93ecda7ea4
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/3960c336ad96c2183549c8bf32bbff93ecda7ea4
2015-05-29 11:29:00+01:00
target-alpha: Suppress underflow from CVTTQ if DNZ I.e. respect flush_inputs_to_zero. Reported-by: Al Viro <[email protected]> Signed-off-by: Richard Henderson <[email protected]>
4ed069ab5334a495b49d0704795524fa34e8dbfc
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/4ed069ab5334a495b49d0704795524fa34e8dbfc
2015-05-18 13:03:47-07:00
target-alpha: Fix cvttq vs large integers The range +- 2**63 - 2**64 was returning the wrong truncated result. We also incorrectly signaled overflow for -2**63. Reported-by: Al Viro <[email protected]> Signed-off-by: Richard Henderson <[email protected]>
7f2e40020cfc827f7e59670f8c400b0b9a704481
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/7f2e40020cfc827f7e59670f8c400b0b9a704481
2015-05-18 13:03:46-07:00
qemu-iotests: Make debugging python tests easier Adding "-d" option. The output goes to "tee" so it appears in your console. Also, raise the verbosity of unnitest runner. When testing a topic branch, it's possible that a bug introduced by a code change makes the python test case hang, with debug output, it is much easier to locate the problem. This can also be helpful if you want to watch the progress of a python test, it offers you a way to sense the speed of each test case method you're writing. Note: because there is no easy way to get *both* the verbose output and the output expected by ./check comparison, the case would always fail with an "output mismatch". The sole purpose of using this option is giving developers a quick way to debug when things go wrong. Signed-off-by: Fam Zheng <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
aa4f592a1dd9aea5f5c36f6ff4b22b5bd208162a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/aa4f592a1dd9aea5f5c36f6ff4b22b5bd208162a
2015-05-22 17:08:01+02:00
qapi: Tighten checking of unions Previous commits demonstrated that the generator had several flaws with less-than-perfect unions: - a simple union that listed the same branch twice (or two variant names that map to the same C enumerator, including the implicit MAX sentinel) ended up generating invalid C code - an anonymous union that listed two branches with the same qtype ended up generating invalid C code - the generator crashed on anonymous union attempts to use an array type - the generator was silently ignoring a base type for anonymous unions - the generator allowed unknown types or nested anonymous unions as a branch in an anonymous union Signed-off-by: Eric Blake <[email protected]> Reviewed-by: Markus Armbruster <[email protected]> Signed-off-by: Markus Armbruster <[email protected]>
44bd1276a7dea747c41f250cb71ab65965343a7f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/44bd1276a7dea747c41f250cb71ab65965343a7f
2015-05-05 18:39:00+02:00
json-parser: Accept 'null' in QMP We document that in QMP, the client may send any json-value for the optional "id" key, and then return that same value on reply (both success and failures, insofar as the failure happened after parsing the id). [Note that the output may not be identical to the input, as whitespace may change and since we may reorder keys within a json-object, but that this still constitutes the same json-value]. However, we were not handling the JSON literal null, which counts as a json-value per RFC 7159. Also, down the road, given the QAPI schema of {'*foo':'str'} or {'*foo':'ComplexType'}, we could decide to allow the QMP client to pass { "foo":null } instead of the current representation of { } where omitting the key is the only way to get at the default NULL value. Such a change might be useful for argument introspection (if a type in older qemu lacks 'foo' altogether, then an explicit "foo":null probe will force an easily distinguished error message for whether the optional "foo" key is even understood in newer qemu). And if we add default values to optional arguments, allowing an explicit null would be required for getting a NULL value associated with an optional string that has a non-null default. But all that can come at a later day. The 'check-unit' testsuite is enhanced to test that parsing produces the same object as explicitly requesting a reference to the special qnull object. In addition, I tested with: $ ./x86_64-softmmu/qemu-system-x86_64 -qmp stdio -nodefaults {"QMP": {"version": {"qemu": {"micro": 91, "minor": 2, "major": 2}, "package": ""}, "capabilities": []}} {"execute":"qmp_capabilities","id":null} {"return": {}, "id": null} {"id":{"a":null,"b":[1,null]},"execute":"quit"} {"return": {}, "id": {"a": null, "b": [1, null]}} {"timestamp": {"seconds": 1427742379, "microseconds": 423128}, "event": "SHUTDOWN"} Signed-off-by: Eric Blake <[email protected]> Signed-off-by: Markus Armbruster <[email protected]> Signed-off-by: Luiz Capitulino <[email protected]>
e549e7161f37416ff66971d77d021d30057045ca
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e549e7161f37416ff66971d77d021d30057045ca
2015-05-11 08:59:07-04:00
qemu-img convert: Rewrite copying logic The implementation of qemu-img convert is (a) messy, (b) buggy, and (c) less efficient than possible. The changes required to beat some sense into it are massive enough that incremental changes would only make my and the reviewers' life harder. So throw it away and reimplement it from scratch. Let me give some examples what I mean by messy, buggy and inefficient: (a) The copying logic of qemu-img convert has two separate branches for compressed and normal target images, which roughly do the same - except for a little code that handles actual differences between compressed and uncompressed images, and much more code that implements just a different set of optimisations and bugs. This is unnecessary code duplication, and makes the code for compressed output (unsurprisingly) suffer from bitrot. The code for uncompressed ouput is run twice to count the the total length for the progress bar. In the first run it just takes a shortcut and runs only half the loop, and when it's done, it toggles a boolean, jumps out of the loop with a backwards goto and starts over. Works, but pretty is something different. (b) Converting while keeping a backing file (-B option) is broken in several ways. This includes not writing to the image file if the input has zero clusters or data filled with zeros (ignoring that the backing file will be visible instead). It also doesn't correctly limit every iteration of the copy loop to sectors of the same status so that too many sectors may be copied to in the target image. For -B this gives an unexpected result, for other images it just does more work than necessary. Conversion with a compressed target completely ignores any target backing file. (c) qemu-img convert skips reading and writing an area if it knows from metadata that copying isn't needed (except for the bug mentioned above that ignores a status change in some cases). It does, however, read from the source even if it knows that it will read zeros, and then search for non-zero bytes in the read buffer, if it's possible that a write might be needed. This reimplementation of the copying core reorganises the code to remove the duplication and have a much more obvious code flow, by essentially splitting the copy iteration loop into three parts: 1. Find the number of contiguous sectors of the same status at the current offset (This can also be called in a separate loop before the copying loop in order to determine the total sectors for the progress bar.) 2. Read sectors. If the status implies that there is no data there to read (zero or unallocated cluster), don't do anything. 3. Write sectors depending on the status. If it's data, write it. If we want the backing file to be visible (with -B), don't write it. If it's zeroed, skip it if you can, otherwise use bdrv_write_zeroes() to optimise the write at least where possible. Signed-off-by: Kevin Wolf <[email protected]> Reviewed-by: Max Reitz <[email protected]>
690c7301600162421b928c7f26fd488fd8fa464e
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/690c7301600162421b928c7f26fd488fd8fa464e
2015-04-28 15:36:09+02:00
hw/arm/virt: Fix corruption due to double free As 4de9a88(hw/arm/virt: Fix memory leak reported by Coverity) and 6e05a12(arm: fix memory leak) both handle the memory leak reported by Coverity, this cause qemu corruption due to double free. Signed-off-by: Shannon Zhao <[email protected]> Signed-off-by: Shannon Zhao <[email protected]> Reviewed-by: Stefan Weil <[email protected]> Message-id: [email protected] Signed-off-by: Peter Maydell <[email protected]>
c408d27a42318227092128b04cca555f78cf703d
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c408d27a42318227092128b04cca555f78cf703d
2015-04-02 12:10:36+01:00
seabios: update to 1.8.1 stable release Carries two bugfixes and support for multiple pci root buses. git shortlog rel-1.8.0..rel-1.8.1 ================================= Ameya Palande (1): x86: add barrier to read{b,w,l} and write{b,w,l} functions Kevin O'Connor (1): smp: Fix smp race introduced in 0673b787 Marcel Apfelbaum (2): fw/pci: scan all buses if extraroots romfile is present fw/pci: map memory and IO regions for multiple pci root buses Signed-off-by: Gerd Hoffmann <[email protected]>
93f7c4f09f6957244d5af0a35309b8ad4ffb64ed
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/93f7c4f09f6957244d5af0a35309b8ad4ffb64ed
2015-03-16 09:07:15+01:00
machine: query mem-merge machine property Running qemu-bin ... -machine pc,mem-merge=on leads to crash: x86_64-softmmu/qemu-system-x86_64 -machine pc,dump-guest-core=on qemu-system-x86_64: qemu/util/qemu-option.c:387: qemu_opt_get_bool_helper: Assertion `opt->desc && opt->desc->type == QEMU_OPT_BOOL' failed. Aborted (core dumped) This happens because the commit e79d5a6 ("machine: remove qemu_machine_opts global list") removed the global option descriptions and moved them to MachineState's QOM properties. Fix this by querying machine properties through designated wrappers. Signed-off-by: Marcel Apfelbaum <[email protected]> Acked-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]> Reviewed-by: Paolo Bonzini <[email protected]>
75cc7f018328e708d94cca23c3a77e85363f25dc
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/75cc7f018328e708d94cca23c3a77e85363f25dc
2015-03-11 18:19:22+01:00
milkymist-pfpu: fix GCC 5.0.0 aggressive-loop-optimizations warning man gcc: Warn if in a loop with constant number of iterations the compiler detects undefined behavior in some statement during one or more of the iterations. Milkymist pfpu has no jump instructions, so checking for MICROCODE_WORDS instructions should have kept us in bounds of s->microcode, but i++ allowed one loop too many, hw/misc/milkymist-pfpu.c: In function ‘pfpu_write’: hw/misc/milkymist-pfpu.c:365:20: error: loop exit may only be reached after undefined behavior [-Werror=aggressive-loop-optimizations] if (i++ >= MICROCODE_WORDS) { ^ hw/misc/milkymist-pfpu.c:167:14: note: possible undefined statement is here uint32_t insn = s->microcode[pc]; ^ The code can still access out of bounds, because it presumes that PC register always begins at 0, and we allow writing to it. Signed-off-by: Radim Krčmář <[email protected]> Acked-by: Michael Walle <[email protected]> Signed-off-by: Michael Tokarev <[email protected]>
c6dc3dd72b747a057770087998a1f9ef0b3f1882
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c6dc3dd72b747a057770087998a1f9ef0b3f1882
2015-03-10 08:15:34+03:00
macio: fix possible memory leak If ret = macio_initfn_ide() is less than 0, the timer_memory will leak the memory it points to. Signed-off-by: Gonglei <[email protected]> Signed-off-by: Michael Tokarev <[email protected]>
6c5819c4d685bf5f3c81edb462f4d17fb99ca2b5
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/6c5819c4d685bf5f3c81edb462f4d17fb99ca2b5
2015-03-10 08:15:34+03:00
target-tricore: Add instructions of RRR1 opcode format, which have 0x43 as first opcode Add helpers: * madd64_q_ssov: multiply two 32 bit q-format number, add them with a 64 bit q-format number and saturate. * madd32_q_add_ssov: add two 64 bit q-format numbers and return a 32 bit result. * maddr_q_ssov: multiplay two 32 bit q-format numbers, add a 32 bit q-format number and saturate. * maddr_q: multiplay two 32 bit q-format numbers and add a 32 bit q-format number. Note: madd instructions in the q format can behave strange, e.g. 0x1 + (0x80000000 * 0x80000000) << 1 for 32 bit signed values does not cause an overflow on the guest, because all intermediate results should be handled as if they are indefinitely precise. We handle this by inverting the overflow bit for all cases: a + (0x80000000 * 0x80000000) << 1. Signed-off-by: Bastian Koppelmann <[email protected]> Reviewed-by: Richard Henderson <[email protected]>
b00aa8ecbc6fd7468178a0dabc7dfd0b7e1b8cd6
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b00aa8ecbc6fd7468178a0dabc7dfd0b7e1b8cd6
2015-03-03 01:05:44+00:00
pcnet: pcnet_common_init() always returns 0, change to void The next commit will exploit the fact it never fails. This one makes it obvious. Signed-off-by: Markus Armbruster <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]> Reviewed-by: Gonglei <[email protected]>
4c3b22459d3589cf84d1ccadc6b09e586497820d
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/4c3b22459d3589cf84d1ccadc6b09e586497820d
2015-02-26 12:42:16+01:00
linux-user: Fix broken m68k signal handling on 64 bit hosts The m68k signal frame setup code which writes the signal return trampoline code to the stack was assuming that a 'long' was 32 bits; on 64 bit systems this meant we would end up writing the 32 bit (2 insn) trampoline sequence to retaddr+4,retaddr+6 instead of the intended retaddr+0,retaddr+2, resulting in a guest crash when it tried to execute the invalid zero-bytes at retaddr+0. Fix by using uint32_t instead; also use uint16_t rather than short for consistency. This fixes bug LP:1404690. Reported-by: Michel Boaventura Signed-off-by: Peter Maydell <[email protected]> Signed-off-by: Riku Voipio <[email protected]>
1669add752d9f29283f8ebf6a863d7b1e2d0f146
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/1669add752d9f29283f8ebf6a863d7b1e2d0f146
2015-01-27 22:33:57+02:00
qemu-timer: introduce timer_deinit In some cases, a timer was set to NULL so that we could check if it is initialized. Use the timer_list field instead, and add a timer_deinit function that NULLs it. It then makes sense that timer_del be a no-op (instead of a crasher) on such a de-initialized timer. It avoids the need to poke at the timerlist field to check if the timers are initialized. Signed-off-by: Paolo Bonzini <[email protected]>
cd1bd53a669c88f219ca47b538889cd918605fea
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/cd1bd53a669c88f219ca47b538889cd918605fea
2015-01-26 12:22:44+01:00
test-coroutine: avoid overflow on 32-bit systems unsigned long is not large enough to represent 1000000000 * duration there. Just use floating point. Signed-off-by: Paolo Bonzini <[email protected]> Reviewed-by: Fam Zheng <[email protected]> Message-id: [email protected] Signed-off-by: Stefan Hajnoczi <[email protected]>
6d86ae0824bdd6175dd3874688a871e981093888
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/6d86ae0824bdd6175dd3874688a871e981093888
2015-01-13 13:43:29+00:00
vfio-pci: Fix interrupt disabling When disabling MSI/X interrupts the disable functions will leave the device in INTx mode (when available). This matches how hardware operates, INTx is enabled unless MSI/X is enabled (DisINTx is handled separately). Therefore when we really want to disable all interrupts, such as when removing the device, and we start with the device in MSI/X mode, we need to pass through INTx on our way to being completely quiesced. In well behaved situations, the guest driver will have shutdown the device and it will start vfio_exitfn() in INTx mode, producing the desired result. If hot-unplug causes the guest to crash, we may get the device in MSI/X state, which will leave QEMU with a bogus handler installed. Fix this by re-ordering our disable routine so that it should always finish in VFIO_INT_NONE state, which is what all callers expect. Signed-off-by: Alex Williamson <[email protected]>
b3e27c3aee8f5a96debfe0346e9c0e3a641a8516
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b3e27c3aee8f5a96debfe0346e9c0e3a641a8516
2015-01-09 08:50:53-07:00