commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
s390x: fix KVM target During Jan's rework of the generic KVM layer, he added some more error checks and actually aborted if something went wrong. Unfortunately, one of the s390 internal error codes slipped through, aborting the VM without needing to. This patch fixes booting of S390x virtual machines in KVM. Signed-off-by: Alexander Graf <[email protected]> CC: Jan Kiszka <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]>
359507eed1b6d8ae2392e0c8fe32d5f0de9d1d75
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/359507eed1b6d8ae2392e0c8fe32d5f0de9d1d75
2011-04-04 00:34:10+02:00
target-arm: Fix VLD of single element to all lanes Fix several bugs in VLD of single element to all lanes: The "single element to all lanes" form of VLD1 differs from those for VLD2, VLD3 and VLD4 in that bit 5 indicates whether the loaded element should be written to one or two Dregs (rather than being a register stride). Handle this by special-casing VLD1 rather than trying to have one loop which deals with both VLD1 and 2/3/4. Handle VLD4.32 with 16 byte alignment specified, rather than UNDEFfing. UNDEF for the invalid size and alignment combinations. Signed-off-by: Peter Maydell <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]>
8e18cde30b06d2e7411bf38091c4e30602f85cdd
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8e18cde30b06d2e7411bf38091c4e30602f85cdd
2011-04-01 22:33:47+02:00
target-arm: Fix UNDEF cases in Thumb load/store Decode of Thumb load/store was merging together the cases of 'bit 11==0' (reg+reg LSL imm) and 'bit 11==1' (reg+imm). This happens to work for valid instruction patterns but meant that we would not UNDEF for the cases the architecture mandates that we must. Make the decode actually look at bit 11 as well as [10..8] so that we UNDEF in the right places. This change also removes what was a spurious unreachable 'case 8', and correctly frees TCG temporaries on the illegal-insn codepaths. Signed-off-by: Peter Maydell <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]>
2a0308c54f8afb606d4185d59d502823be3c307b
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2a0308c54f8afb606d4185d59d502823be3c307b
2011-03-22 07:52:35+01:00
docs: Update stderr and simple backend, add systemtap backend The following additions to the tracing documentation are included: 1. Move "stderr" backend documentation to top-level and out of "simple" backend. Include hints on when this backend is useful. 2. Document the "simple" backend thread-safety limitation. 3. Document the "dtrace" backend for SystemTap. Signed-off-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]>
b48c20f723cba21ffe62fb99094d2fa36739b0cc
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b48c20f723cba21ffe62fb99094d2fa36739b0cc
2011-03-06 19:11:47+01:00
virtio-serial: Don't copy over guest buffer to host When the guest writes something to a host, we copied over the entire buffer first into the host and then processed it. Do away with that, it could result in a malicious guest causing a DoS on the host. Reported-by: Paul Brook <[email protected]> Signed-off-by: Amit Shah <[email protected]>
471344db88cc3e7adf7664aa34d54ce0cacc3419
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/471344db88cc3e7adf7664aa34d54ce0cacc3419
2011-01-20 14:38:21+05:30
kvm: Fix race between timer signals and vcpu entry under !IOTHREAD Found by Stefan Hajnoczi: There is a race in kvm_cpu_exec between checking for exit_request on vcpu entry and timer signals arriving before KVM starts to catch them. Plug it by blocking both timer related signals also on !CONFIG_IOTHREAD and process those via signalfd. As this fix depends on real signalfd support (otherwise the timer signals only kick the compat helper thread, and the main thread hangs), we need to detect the invalid constellation and abort configure. Signed-off-by: Jan Kiszka <[email protected]> CC: Stefan Hajnoczi <[email protected]> Signed-off-by: Marcelo Tosatti <[email protected]>
de758970b60f129ed9d024cc5c90c1f57fab2fd4
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/de758970b60f129ed9d024cc5c90c1f57fab2fd4
2011-02-14 12:39:45-02:00
blockdev: Plug memory leak in drive_init() error paths Should have spotted this when doing commit 319ae529. Signed-off-by: Markus Armbruster <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
a9ae2bffea62ce5158be7475fe41e5fba6d026c1
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a9ae2bffea62ce5158be7475fe41e5fba6d026c1
2011-02-10 13:24:28+01:00
pci: Automatically patch PCI vendor id and device id in PCI ROM PCI devices with different vendor or device ids sometimes share the same rom code. Only the ids and the checksum differs in a boot rom for such devices. The i825xx ethernet controller family is a typical example which is implemented in hw/eepro100.c. It uses at least 3 different device ids, so normally 3 boot roms would be needed. By automatically patching vendor id and device id (and the checksum) in qemu, all emulated family members can share the same boot rom. VGA bios roms are another example with different vendor and device ids. Only qemu's built-in default rom files will be patched. v2: * Patch also the vendor id (and remove the sanity check for vendor id). v3: * Don't patch a rom file when its name was set by the user. Thus we avoid modifications of unknown rom data. Cc: Gerd Hoffmann <[email protected]> Cc: Markus Armbruster <[email protected]> Cc: Michael S. Tsirkin <[email protected]> Signed-off-by: Stefan Weil <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]>
ab85ceb1ad8797af2fb4c06bdc70f0ce0cf9b34f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ab85ceb1ad8797af2fb4c06bdc70f0ce0cf9b34f
2010-11-22 10:00:07+02:00
scsi-disk: return CHECK CONDITION for unknown page codes in the MODE SENSE command SCSI-Spec: http://ldkelley.com/SCSI2/SCSI2/SCSI2-08.html#8.2.10 "An initiator may request any one or all of the supported mode pages from a target. If an initiator issues a MODE SENSE command with a page code value not implemented by the target, the target shall return CHECK CONDITION status and shall set the sense key to ILLEGAL REQUEST and the additional sense code to INVALID FIELD IN CDB." Signed-off-by: Bernhard Kohl <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
a9c17b2bf3639662fbdeb736289ebabfda9fa21a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a9c17b2bf3639662fbdeb736289ebabfda9fa21a
2010-09-08 12:39:10+02:00
Fix warning about uninitialized variable With gcc 4.2.1-sjlj (mingw32-2) I get this warning: /src/qemu/exec.c: In function 'qemu_ram_alloc': /src/qemu/exec.c:2777: warning: 'offset' may be used uninitialized in this function Fix by initializing the variable. Signed-off-by: Blue Swirl <[email protected]>
09d7ae9000fe27d1861cb0348cbf71563ded6148
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/09d7ae9000fe27d1861cb0348cbf71563ded6148
2010-07-07 19:37:53+00:00
qcow: Use bdrv_(p)write_sync for metadata writes Use bdrv_(p)write_sync to ensure metadata integrity in case of a crash. Signed-off-by: Kevin Wolf <[email protected]>
5e5557d97026d1d3325e0e7b0ba593366da2f3dc
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/5e5557d97026d1d3325e0e7b0ba593366da2f3dc
2010-06-22 14:38:02+02:00
qdev: Free opts on failed do_device_add If the device can't be created, don't leak the QemuOpts and release the id of the device that should have been added by the failed device_add. Signed-off-by: Kevin Wolf <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
0f853a386739b22e541e6e65ed60a0cb37713340
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/0f853a386739b22e541e6e65ed60a0cb37713340
2010-02-19 15:53:54-06:00
segfault due to buffer overrun in usb-serial This fixes a segfault due to buffer overrun in the usb-serial device. The memcpy was incrementing the start location by recv_used yet, the computation of first_size (how much to write at the end of the buffer before wrapping to the front) was not accounting for it. This causes the next element after the receive buffer (recv_ptr) to get overwritten with random data. Signed-off-by: David Ahern <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
4ab4183d766f10f9fc35cd9ef4acee39f241986f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/4ab4183d766f10f9fc35cd9ef4acee39f241986f
2010-02-10 12:45:11-06:00
win32: pair qemu_memalign() with qemu_vfree() Win32 suffers from a very big memory leak when dealing with SCSI devices. Each read/write request allocates memory with qemu_memalign (ie VirtualAlloc) but frees it with qemu_free (ie free). Pair all qemu_memalign() calls with qemu_vfree() to prevent such leaks. Signed-off-by: Herve Poussineau <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
f8a83245d9ec685bc6aa6173d6765fe03e20688f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f8a83245d9ec685bc6aa6173d6765fe03e20688f
2010-01-26 16:41:06-06:00
qemu-option: Make qemu_opts_foreach() accumulate return values Return the bitwise inclusive or of all return values instead of the last call's value. This lets you find out whether any of the calls returned a non-zero value. No functional change, as existing users either don't care for the value, or pass non-zero abort_on_failure, which breaks the loop on the first non-zero return value. Signed-off-by: Markus Armbruster <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
4a2594ddd35de7ae7c8cd9c6828cfe72245e6dc5
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/4a2594ddd35de7ae7c8cd9c6828cfe72245e6dc5
2010-02-03 12:39:01-06:00
qemu/virtio: fix reset with device removal virtio pci registers its own reset handler, but fails to unregister it, which will lead to crashes after device removal. Solve this problem by switching to qdev reset handler, which is automatically unregistered. Signed-off-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
e489030df2448d22b3cb92fd5dcb22c6fa0fc9e1
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e489030df2448d22b3cb92fd5dcb22c6fa0fc9e1
2009-10-05 09:32:50-05:00
Fix broken build The only caller of on_vcpu() is protected by ifdef KVM_CAP_SET_GUEST_DEBUG, so protect on_vcpu() too otherwise QEMU may not to build. Signed-off-by: Luiz Capitulino <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
fc5d642fcae392bbc9fed9ac6bc78ac29ed48372
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/fc5d642fcae392bbc9fed9ac6bc78ac29ed48372
2009-07-27 14:09:15-05:00
Don't leak VLANClientState on PCI hot remove destroy_nic() requires that NICInfo::private by a PCIDevice pointer, but then goes on to require that the same pointer matches VLANClientState::opaque. That is no longer the case for virtio-net since qdev and wasn't previously the case for rtl8139, ne2k_pci or eepro100. Make the situation a lot more clear by maintaining a VLANClientState pointer in NICInfo. Signed-off-by: Mark McLoughlin <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
ae50b2747f77944faa79eb914272b54eb30b63b3
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ae50b2747f77944faa79eb914272b54eb30b63b3
2009-07-09 16:58:07-05:00
microblaze: Trap on illegal load/store sizes. Signed-off-by: Edgar E. Iglesias <[email protected]>
0187688f3270433269fc7d4909ad36dc5c5db7aa
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/0187688f3270433269fc7d4909ad36dc5c5db7aa
2009-09-04 10:38:59+02:00
AIO deletion race fix When deleting an fd event there is a chance the object doesn't get deleted, but only ->deleted set positive and deleted somewhere later. Now, if we create a handler for the fd again before the actual deletion occurs, we end up writing data into an object that has ->deleted set, which is obviously wrong. I see two ways to fix this: 1. Don't return ->deleted objects in the search 2. Unset ->deleted in the search This patch implements 1. which feels safer to do. It fixes AIO issues I've seen with curl, as libcurl unsets fd event listeners pretty frequently. Signed-off-by: Alexander Graf <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
79d5ca5617cfc9be13a4f314ed800fca1267d903
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/79d5ca5617cfc9be13a4f314ed800fca1267d903
2009-05-08 15:24:10-05:00
target-alpha: overflow condition for sublv and subqv The conditions to detect overflow in sub operations was wrong. This patch is necessary to boot Tru64. Signed-off-by: Tristan Gingold <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@7073 c046a42c-6fe2-441c-8c8c-71466251a162
ecbb5ea1041d2894f5efb9317acd519c4fd81ad5
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ecbb5ea1041d2894f5efb9317acd519c4fd81ad5
2009-04-10 21:27:15+00:00
Fix off-by-one errors for Altivec and SPE registers Altivec and SPE both have 34 registers in their register sets, not 35 with a missing register 32. GDB would ask for register 32 of the Altivec (resp. SPE) registers and the code would claim it had zero width. The QEMU GDB stub code would then return an E14 to GDB, which would complain about not being sure whether p packets were supported or not. Signed-off-by: Nathan Froyd <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6769 c046a42c-6fe2-441c-8c8c-71466251a162
70976a7926b42d87e0c575412b85a8f5c1e48fad
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/70976a7926b42d87e0c575412b85a8f5c1e48fad
2009-03-07 22:00:49+00:00
Fix vga on PPC Fix crash introduced in revision 6336. (Stefano Stabellini) git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6349 c046a42c-6fe2-441c-8c8c-71466251a162
e3697092228770c3b23d0bf524e18b508b109932
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e3697092228770c3b23d0bf524e18b508b109932
2009-01-16 19:45:28+00:00
Add map client retry notification (Avi Kivity) The target memory mapping API may fail if the bounce buffer resources are exhausted. Add a notification mechanism to allow clients to retry the mapping operation when resources become available again. Signed-off-by: Avi Kivity <[email protected]> Signed-off-by: Anthony Liguori <[email protected]> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6395 c046a42c-6fe2-441c-8c8c-71466251a162
ba223c29da480b40b38678c66636ee9910973a47
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ba223c29da480b40b38678c66636ee9910973a47
2009-01-22 16:59:16+00:00
Properly handle the case of SetPixelEncodings with a length of zero. This commit addresses CORE-2008-1210/CVE-2008-2382. Signed-off-by: Anthony Liguori <[email protected]> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6121 c046a42c-6fe2-441c-8c8c-71466251a162
69dd5c9ffd5c0c6a01ad14b9c6a8d7135ccc2b9a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/69dd5c9ffd5c0c6a01ad14b9c6a8d7135ccc2b9a
2008-12-22 21:06:23+00:00
Fix off-by-one bug limiting VNC passwords to 7 chars (Chris Webb) monitor_readline expects buf_size to include the terminating \0, but do_change_vnc in monitor.c calls it as though it doesn't. The other site where monitor_readline reads a password (in vl.c) passes the buffer length correctly. Signed-off-by: Chris Webb <[email protected]> Signed-off-by: Anthony Liguori <[email protected]> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@5966 c046a42c-6fe2-441c-8c8c-71466251a162
2a7e8dda090af586f3d0b3d157054a9e18776a52
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2a7e8dda090af586f3d0b3d157054a9e18776a52
2008-12-10 15:12:57+00:00
target-ppc: fixes for gen_op_neg() - Rename to gen_op_arith_neg for consistency with other functions. - Correctly free TCG temp variable. - Fix the return value in 64-bit mode in case of overflow. Signed-off-by: Aurelien Jarno <[email protected]> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@5659 c046a42c-6fe2-441c-8c8c-71466251a162
ec6469a3b1da26247bdb3f5dd5276fabcc1b694a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ec6469a3b1da26247bdb3f5dd5276fabcc1b694a
2008-11-09 17:27:27+00:00
[sh4] MMU bug fix Some bugs on SH4 MMU are fixed. - When a TLB entry is overwritten or invalidated, tlb_flush_page() should be invoked to invalidate old entry. - When a ASID is changed, tlb_flush() should be invoke to invalidate entries which have old ASID. - The check for shared bit in TLB entry causes multiple TLB hit exception. As SH3's MMU, shared bit is ignored. - ASID is used when MMUCR's SV bit or SR's MD bit is zero. No need to check both bits are zero. (Shin-ichiro KAWASAKI) git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@5068 c046a42c-6fe2-441c-8c8c-71466251a162
06afe2c8840ec39c3b23db0eb830a5f49244b947
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/06afe2c8840ec39c3b23db0eb830a5f49244b947
2008-08-22 08:57:52+00:00
Add image format option in monitor for removable media (Chris Wright) CVE-2008-1945 git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@4747 c046a42c-6fe2-441c-8c8c-71466251a162
2ecea9b8de5cd74df314541b87f712ae77f862ec
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2ecea9b8de5cd74df314541b87f712ae77f862ec
2008-06-18 22:10:01+00:00
Fix build failure with old kernel headers (loop.h is incompatible with glibc headers). git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@4543 c046a42c-6fe2-441c-8c8c-71466251a162
d7e4036e317f75884513252acbf7eece54fc2ff5
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/d7e4036e317f75884513252acbf7eece54fc2ff5
2008-05-23 16:06:43+00:00
Fix CVE-2008-0928 - insufficient block device address range checking Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine. git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@4037 c046a42c-6fe2-441c-8c8c-71466251a162
902b27d0b8d5bfa840eaf389d7cbcc28b57e3fbe
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/902b27d0b8d5bfa840eaf389d7cbcc28b57e3fbe
2008-03-11 17:17:59+00:00
division by zero FPU exception support git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@795 c046a42c-6fe2-441c-8c8c-71466251a162
2ee73ac3a855fb0cfba3db91fdd1ecebdbc6f971
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2ee73ac3a855fb0cfba3db91fdd1ecebdbc6f971
2004-05-08 21:08:41+00:00
hw/arm/virt: Check that the CPU realize method succeeded We were passing a NULL error pointer to the object_property_set_bool() call that realizes the CPU object. This meant that we wouldn't detect failure, and would plough blindly on to crash later trying to use a NULL CPU object pointer. Detect errors and fail instead. In particular, this will be necessary to detect the user error of using "-cpu host" without "-enable-kvm" once we make the host CPU type be registered unconditionally rather than only in kvm_arch_init(). Signed-off-by: Peter Maydell <[email protected]>
c88bc3e0dbe7d460a0be723379fce63a9dc6a6f5
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c88bc3e0dbe7d460a0be723379fce63a9dc6a6f5
2018-01-25 11:45:30+00:00
scsi-disk: release AioContext in unaligned WRITE SAME case scsi_write_same_complete() can retry the write if the request was unaligned. Make sure to release the AioContext when that code path is taken! This patch fixes a hang when QEMU terminates after an unaligned WRITE SAME request has been processed with dataplane. The hang occurs because iothread_stop_all() cannot acquire the AioContext lock that was leaked by the IOThread in scsi_write_same_complete(). Fixes: b9e413dd37 ("block: explicitly acquire aiocontext in aio callbacks that need it"). Cc: Paolo Bonzini <[email protected]> Cc: [email protected] Reported-by: Cong Li <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
24355b79bdaf6ab12f7c610b032fc35ec045cd55
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/24355b79bdaf6ab12f7c610b032fc35ec045cd55
2018-01-16 14:54:50+01:00
scsi: fix scsi_convert_sense crash when in_buf == NULL && in_len == 0 scsi_disk_emulate_command passes in_buf == NULL when sent a REQUEST SENSE command. Check for in_len == 0 before dereferencing in_buf. Fixes: f68d98b21fa74155dc7c1fd212474379ac3c7531 Reported-by: Roman Kagan <[email protected]> Tested-by: Roman Kagan <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
2770c90d432b571cab718e28f838097f0b2201ec
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2770c90d432b571cab718e28f838097f0b2201ec
2018-01-12 09:54:13+01:00
pc: fail memory hot-plug/unplug with -no-acpi and Q35 machine type When -no-acpi option is used with Q35 machine type, no guest ACPI is built, but the ACPI device is still created, so only checking the presence of ACPI device before memory plug/unplug is not enough in such cases. Check whether ACPI is disabled globally in addition and fail memory plug/unplug if it's disabled. Signed-off-by: Haozhong Zhang <[email protected]> Message-Id: <[email protected]> Reviewed-by: Igor Mammedov <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
8cd91acec8dfea6065272ca828405333f564a612
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8cd91acec8dfea6065272ca828405333f564a612
2018-01-12 09:54:13+01:00
block: Make bdrv_drain_invoke() recursive This change separates bdrv_drain_invoke(), which calls the BlockDriver drain callbacks, from bdrv_drain_recurse(). Instead, the function performs its own recursion now. One reason for this is that bdrv_drain_recurse() can be called multiple times by bdrv_drain_all_begin(), but the callbacks may only be called once. The separation is necessary to fix this bug. The other reason is that we intend to go to a model where we call all driver callbacks first, and only then start polling. This is not fully achieved yet with this patch, as bdrv_drain_invoke() contains a BDRV_POLL_WHILE() loop for the block driver callbacks, which can still call callbacks for any unrelated event. It's a step in this direction anyway. Cc: [email protected] Signed-off-by: Kevin Wolf <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]>
db0289b9b26cb653d5662f5d6a2a52d70243cd56
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/db0289b9b26cb653d5662f5d6a2a52d70243cd56
2017-12-22 15:03:41+01:00
i386: hvf: inject General Protection Fault when vmexit through vmcall This patch injects a GP fault when the guest vmexit's by executing a vmcall instruction. Signed-off-by: Sergio Andres Gomez Del Real <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
3010460fb99776bdf0a8b170555f2ab076382f9c
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/3010460fb99776bdf0a8b170555f2ab076382f9c
2017-12-22 15:01:48+01:00
target/sh4: Use cmpxchg for movco when parallel_cpus As for other targets, cmpxchg isn't quite right for ll/sc, suffering from an ABA race, but is sufficient to implement portable atomic operations. Signed-off-by: Richard Henderson <[email protected]> Message-Id: <[email protected]> [aurel32: fix whitespace] Signed-off-by: Aurelien Jarno <[email protected]>
f85da3081d001909929a19e530e69cea0487f00e
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f85da3081d001909929a19e530e69cea0487f00e
2017-12-18 23:29:31+01:00
virtio: check VirtQueue Vring object is set A guest could attempt to use an uninitialised VirtQueue object or unset Vring.align leading to a arithmetic exception. Add check to avoid it. Reported-by: Zhangboxian <[email protected]> Signed-off-by: Prasad J Pandit <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]> Reviewed-by: Cornelia Huck <[email protected]>
758ead31c7e17bf17a9ef2e0ca1c3e86ab296b43
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/758ead31c7e17bf17a9ef2e0ca1c3e86ab296b43
2017-12-01 19:05:58+02:00
qcow2: Assert that the crypto header does not overlap other metadata The crypto header is initialized only when QEMU is creating a new image, so there's no chance of this happening on a corrupted image. If QEMU is really trying to allocate the header overlapping other existing metadata sections then this is a serious bug in QEMU itself so let's add an assertion. Signed-off-by: Alberto Garcia <[email protected]> Message-id: ae3d77f312fc0c5e0ac2bbd71676c0112eebe2e5.1509718618.git.berto@igalia.com Reviewed-by: Daniel P. Berrange <[email protected]> Signed-off-by: Max Reitz <[email protected]>
c9b83e9c23ecb094ddf987c7c37b8f454cb80615
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c9b83e9c23ecb094ddf987c7c37b8f454cb80615
2017-11-14 18:06:25+01:00
build: disable -Wmissing-braces on older compilers GCC 4.9 and newer stopped warning for missing braces around the "universal" C zero initializer {0}. One such initializer sneaked into scsi/qemu-pr-helper.c and is breaking the build with such older GCC versions. Detect the lack of support for the idiom, and disable the warning in that case. Signed-off-by: Paolo Bonzini <[email protected]>
20bc94a2b8449b7700b6bfa25a87ce2320a1c649
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/20bc94a2b8449b7700b6bfa25a87ce2320a1c649
2017-11-05 14:52:10+01:00
build: allow setting a custom GIT binary for transparent proxying Some users can't run a bare 'git' command, due to need for a transparent proxying solution such as 'tsocks'. This adds an argument to configure to let users specify such a thing: ./configure --with-git="tsocks git" The submodule script is also updated to give the user a hint about using this flag, if we fail to checkout modules. Tested-by: Philippe Mathieu-Daudé <[email protected]> Reviewed-by: Eric Blake <[email protected]> Signed-off-by: Daniel P. Berrange <[email protected]>
cc84d63a42e31c2afa884fc78610a65ab8ecc06a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/cc84d63a42e31c2afa884fc78610a65ab8ecc06a
2017-11-06 11:03:45+00:00
s390x/kvm: use cpu model for gscb on compat machines Starting a guest with <os> <type arch='s390x' machine='s390-ccw-virtio-2.9'>hvm</type> </os> <cpu mode='host-model'/> on an IBM z14 results in "qemu-system-s390x: Some features requested in the CPU model are not available in the configuration: gs" This is because guarded storage is fenced for compat machines that did not have guarded storage support. While this prevents future migration abort (by not starting the guest at all), not being able to start a "host-model" guest is very much unexpected. As it turns out, even if we would modify libvirt to not expand the cpu model to contain "gs" for compat machines, it cannot guarantee that a migration will succeed. For example if the kernel changes its features (or the user has nested=1 on one host but not on the other) the migration will fail nevertheless. So instead of fencing "gs" for machines <= 2.9 lets allow it for all machine types that support the CPU model. This will make "host-model" runnable all the time, while relying on the CPU model to reject invalid migration attempts. We also need to change the migration for guarded storage. Additional discussions about host-model are still pending but are out of scope of this patch. Suggested-by: David Hildenbrand <[email protected]> Signed-off-by: Christian Borntraeger <[email protected]> Acked-by: David Hildenbrand <[email protected]> Acked-by: Cornelia Huck <Cornelia Huck <[email protected]> Acked-by: Halil Pasic <[email protected]>
0280b3eb7c0519b43452c05cf51f8777d9e38975
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/0280b3eb7c0519b43452c05cf51f8777d9e38975
2017-10-30 09:03:45+01:00
io: cope with websock 'Connection' header having multiple values The noVNC server sends a header "Connection: keep-alive, Upgrade" which fails our simple equality test. Split the header on ',', trim whitespace and then check for 'upgrade' token. Reviewed-by: Eric Blake <[email protected]> Signed-off-by: Daniel P. Berrange <[email protected]>
6d5d23b00709510d55711661c7ca41408fd9934e
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/6d5d23b00709510d55711661c7ca41408fd9934e
2017-10-16 16:57:08+01:00
disas: Always initialize read_memory_inner_func properly I've recently seen this with valgrind while running the HMP tester: ==22373== Conditional jump or move depends on uninitialised value(s) ==22373== at 0x4A41FD: arm_disas_set_info (cpu.c:504) ==22373== by 0x3867A7: monitor_disas (disas.c:390) ==22373== by 0x38E80E: memory_dump (monitor.c:1339) ==22373== by 0x38FA43: handle_hmp_command (monitor.c:3123) ==22373== by 0x38FB9E: qmp_human_monitor_command (monitor.c:613) ==22373== by 0x4E3124: qmp_marshal_human_monitor_command (qmp-marshal.c:1736) ==22373== by 0x769678: do_qmp_dispatch (qmp-dispatch.c:104) ==22373== by 0x769678: qmp_dispatch (qmp-dispatch.c:131) ==22373== by 0x38B734: handle_qmp_command (monitor.c:3853) ==22373== by 0x76ED07: json_message_process_token (json-streamer.c:105) ==22373== by 0x78D40A: json_lexer_feed_char (json-lexer.c:323) ==22373== by 0x78D4CD: json_lexer_feed (json-lexer.c:373) ==22373== by 0x38A08D: monitor_qmp_read (monitor.c:3895) And indeed, in monitor_disas, the read_memory_inner_func variable was not initialized, but arm_disas_set_info() expects this to be NULL or a valid pointer. Let's properly set this to NULL in the INIT_DISASSEMBLE_INFO to fix it in all functions that use the disassemble_info struct. Fixes: f7478a92dd9ee2276bfaa5b7317140d3f9d6a53b ("Fix Thumb-1 BE32 execution") Signed-off-by: Thomas Huth <[email protected]> Message-Id: <[email protected]>
eb584b401fdc0866d2ff0c03ab8b09d2ba04a49b
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/eb584b401fdc0866d2ff0c03ab8b09d2ba04a49b
2017-10-12 12:10:38+02:00
ppc/kvm: check some capabilities with kvm_vm_check_extension() The following capabilities are VM specific: - KVM_CAP_PPC_SMT_POSSIBLE - KVM_CAP_PPC_HTAB_FD - KVM_CAP_PPC_ALLOC_HTAB If both KVM HV and KVM PR are present, checking them always return the HV value, even if we explicitely requested to use PR. This has no visible effect for KVM_CAP_PPC_ALLOC_HTAB, because we also try the KVM_PPC_ALLOCATE_HTAB ioctl which is only suppored by HV. As a consequence, the spapr code doesn't even check KVM_CAP_PPC_HTAB_FD. However, this will cause kvmppc_hint_smt_possible(), introduced by commit fa98fbfcdfcb9, to report several VSMT modes (eg, Available VSMT modes: 8 4 2 1) whereas PR only support mode 1. This patch fixes all three anyway to use kvm_vm_check_extension(). It is okay since the VM is already created at the time kvm_arch_init() or kvmppc_reset_htab() is called. Signed-off-by: Greg Kurz <[email protected]> Reviewed-by: Thomas Huth <[email protected]> Signed-off-by: David Gibson <[email protected]>
6977afda16c1e09dfbce4bdd877459a287269b72
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/6977afda16c1e09dfbce4bdd877459a287269b72
2017-09-27 13:05:41+10:00
docker: Don't mount ccache db if NOUSER=1 With NOUSER=1 the container runs code as root, which may create privileged files that will not be be accssible next time. Skip ccache dir mount in this case. Signed-off-by: Fam Zheng <[email protected]> Message-Id: <[email protected]> Acked-by: Philippe Mathieu-Daudé <[email protected]> Reviewed-by: Alex Bennée <[email protected]>
36ac78e65a0695f0e397865cceaf4ab5c4e52c64
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/36ac78e65a0695f0e397865cceaf4ab5c4e52c64
2017-09-29 11:14:15+08:00
spapr_pci: drop useless check in spapr_phb_vfio_get_loc_code() g_strdup_printf() either returns a non-null pointer, or aborts if it failed to allocate memory. Signed-off-by: Greg Kurz <[email protected]> [dwg: Grammatical fix to commit message] Acked-by: Philippe Mathieu-Daudé <[email protected]> Signed-off-by: David Gibson <[email protected]>
8f68760561abf90156456fec6ad55c3b2a066d46
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8f68760561abf90156456fec6ad55c3b2a066d46
2017-09-15 10:29:48+10:00
vmgenid: replace x-write-pointer-available hack This compat property sole function is to prevent the device from being instantiated. Instead of requiring an extra compat property, check if fw_cfg has DMA enabled. fw_cfg is a built-in device that is initialized very early by the machine init code. We have at least one other device that also assumes fw_cfg_find() can be safely used on realize: pvpanic. This has the additional benefit of handling other cases properly, like: $ qemu-system-x86_64 -device vmgenid -machine none qemu-system-x86_64: -device vmgenid: vmgenid requires DMA write support in fw_cfg, which this machine type does not provide $ qemu-system-x86_64 -device vmgenid -machine pc-i440fx-2.9 -global fw_cfg.dma_enabled=off qemu-system-x86_64: -device vmgenid: vmgenid requires DMA write support in fw_cfg, which this machine type does not provide $ qemu-system-x86_64 -device vmgenid -machine pc-i440fx-2.6 -global fw_cfg.dma_enabled=on [boots normally] Suggested-by: Eduardo Habkost <[email protected]> Signed-off-by: Marc-André Lureau <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Reviewed-by: Eduardo Habkost <[email protected]> Reviewed-by: Ben Warren <[email protected]> Reviewed-by: Laszlo Ersek <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]>
c8389550dedc65892fba9c3df29423efd802f544
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c8389550dedc65892fba9c3df29423efd802f544
2017-09-08 16:15:17+03:00
hw/nvram/spapr_nvram: Device can not be created by the users Trying to add a spapr-nvram device currently aborts QEMU like this: $ ppc64-softmmu/qemu-system-ppc64 -device spapr-nvram qemu-system-ppc64: hw/ppc/spapr_rtas.c:407: spapr_rtas_register: Assertion `!rtas_table[token].name' failed. Aborted (core dumped) This NVRAM device registers RTAS calls during its realize function and thus can only be used once - and that's internally from spapr.c. So let's mark the device with user_creatable = false to avoid that the users can crash their QEMU this way. Signed-off-by: Thomas Huth <[email protected]> Signed-off-by: David Gibson <[email protected]>
280503ee9d7833a793770d732dda5358659825e9
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/280503ee9d7833a793770d732dda5358659825e9
2017-09-08 09:30:55+10:00
9pfs: xattr: fix memory leak in v9fs_list_xattr Free 'orig_value' in error path. Signed-off-by: Li Qiang <[email protected]> Signed-off-by: Greg Kurz <[email protected]>
4ffcdef4277a91af15a3c09f7d16af072c29f3f2
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/4ffcdef4277a91af15a3c09f7d16af072c29f3f2
2017-04-10 09:38:05+02:00
file-posix: Do runtime check for ofd lock API It is reported that on Windows Subsystem for Linux, ofd operations fail with -EINVAL. In other words, QEMU binary built with system headers that exports F_OFD_SETLK doesn't necessarily run in an environment that actually supports it: $ qemu-system-aarch64 ... -drive file=test.vhdx,if=none,id=hd0 \ -device virtio-blk-pci,drive=hd0 qemu-system-aarch64: -drive file=test.vhdx,if=none,id=hd0: Failed to unlock byte 100 qemu-system-aarch64: -drive file=test.vhdx,if=none,id=hd0: Failed to unlock byte 100 qemu-system-aarch64: -drive file=test.vhdx,if=none,id=hd0: Failed to lock byte 100 As a matter of fact this is not WSL specific. It can happen when running a QEMU compiled against a newer glibc on an older kernel, such as in a containerized environment. Let's do a runtime check to cope with that. Reported-by: Andrew Baumann <[email protected]> Reviewed-by: Eric Blake <[email protected]> Signed-off-by: Fam Zheng <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
2b218f5dbcca5fe728b1852d161d7a21fd02b2f5
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2b218f5dbcca5fe728b1852d161d7a21fd02b2f5
2017-08-11 14:12:44+02:00
linux-user/sh4: fix incorrect memory write not hit since 2009! :) linux-user/elfload.c:1102:20: warning: Out of bound memory access (access exceeds upper limit of memory block) (*regs[i]) = tswap32(env->gregs[i]); ~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~ Reported-by: Clang Static Analyzer Signed-off-by: Philippe Mathieu-Daudé <[email protected]> Reviewed-by: Laurent Vivier <[email protected]> Signed-off-by: Michael Tokarev <[email protected]>
72cd500b725fd9a3bbefeb468d54c192fdc28318
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/72cd500b725fd9a3bbefeb468d54c192fdc28318
2017-07-31 13:06:39+03:00
vl.c/exit: pause cpus before closing block devices There's a rare exit seg if the guest is accessing IO during exit. It's always hitting the atomic_inc(&bs->in_flight) with a NULL bs. This was added recently in 99723548 but I don't see it as the cause. Flip vl.c around so we pause the cpus before closing the block devices, that way we shouldn't have anything trying to access them when they're gone. This was originally Red Hat bz https://bugzilla.redhat.com/show_bug.cgi?id=1451015 Signed-off-by: Dr. David Alan Gilbert <[email protected]> Reported-by: Cong Li <[email protected]> -- This is a very rare race, I'll leave it running in a loop to see if we hit anything else and to check this really fixes it. I do worry if there are other cases that can trigger this - e.g. hot-unplug or ejecting a CD. Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
452589b6b47e8dc6353df257fc803dfc1383bed8
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/452589b6b47e8dc6353df257fc803dfc1383bed8
2017-08-01 17:27:33+02:00
tests/multiboot: Fix whitespace failure Commit b43671f8 accidentally broke run_test.sh within tests/multiboot; due to a subtle change in whitespace. These two commands produce theh same output (at least, for sane $IFS of space-tab-newline): echo -e "...$@..." echo -e "...$*..." But that's only because echo inserts spaces between multiple arguments (the $@ case), while the $* form gives a single argument to echo with the spaces already present. But when converting to printf %b, there are no automatic spaces between multiple arguments, so we HAVE to use $*. It doesn't help that run_test.sh isn't part of 'make check'. Signed-off-by: Eric Blake <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
01a02ec4f6b6a12df7acfb6ad820b384b48cbf70
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/01a02ec4f6b6a12df7acfb6ad820b384b48cbf70
2017-08-11 13:23:19+02:00
qapi: update the qobject visitor to use QNUM_U64 Switch to use QNum/uint where appropriate to remove i64 limitation. The input visitor will cast i64 input to u64 for compatibility reasons (existing json QMP client already use negative i64 for large u64, and expect an implicit cast in qemu). Note: before the patch, uint64_t values above INT64_MAX are sent over json QMP as negative values, e.g. UINT64_MAX is sent as -1. After the patch, they are sent unmodified. Clearly a bug fix, but we have to consider compatibility issues anyway. libvirt should cope fine, because its parsing of unsigned integers accepts negative values modulo 2^64. There's hope that other clients will, too. Signed-off-by: Marc-André Lureau <[email protected]> Reviewed-by: Markus Armbruster <[email protected]> Message-Id: <[email protected]> [check_native_list() tweaked for consistency with signed case] Signed-off-by: Markus Armbruster <[email protected]>
5923f85fb82df7c8c60a89458a5ae856045e5ab1
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/5923f85fb82df7c8c60a89458a5ae856045e5ab1
2017-06-20 14:31:31+02:00
migration: Fix race of image locking between src and dst Previously, dst side will immediately try to lock the write byte upon receiving QEMU_VM_EOF, but at src side, bdrv_inactivate_all() is only done after sending it. If the src host is under load, dst may fail to acquire the lock due to racing with the src unlocking it. Fix this by hoisting the bdrv_inactivate_all() operation before QEMU_VM_EOF. N.B. A further improvement could possibly be done to cleanly handover locks between src and dst, so that there is no window where a third QEMU could steal the locks and prevent src and dst from running. N.B. This commit includes a minor improvement to the error handling by using qemu_file_set_error(). Reported-by: Peter Maydell <[email protected]> Signed-off-by: Fam Zheng <[email protected]> Message-id: [email protected] Reviewed-by: Daniel P. Berrange <[email protected]> Reviewed-by: Juan Quintela <[email protected]> [PMM: noted qemu_file_set_error() use in commit as suggested by Daniel] Signed-off-by: Peter Maydell <[email protected]>
a1fbe750fd90d29309fd037ab98f263367aaf770
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a1fbe750fd90d29309fd037ab98f263367aaf770
2017-06-19 17:53:33+01:00
nbd: make it thread-safe, fix qcow2 over nbd NBD is not thread safe, because it accesses s->in_flight without a CoMutex. Fixing this will be required for multiqueue. CoQueue doesn't have spurious wakeups but, when another coroutine can run between qemu_co_queue_next's wakeup and qemu_co_queue_wait's re-locking of the mutex, the wait condition can become false and a loop is necessary. In fact, it turns out that the loop is necessary even without this multi-threaded scenario. A particular sequence of coroutine wakeups is happening ~80% of the time when starting a guest with qcow2 image served over NBD (i.e. qemu-nbd --format=raw, and QEMU's -drive option has -format=qcow2). This patch fixes that issue too. Signed-off-by: Paolo Bonzini <[email protected]>
6bdcc018a6ed760b9dfe43539124e420aed83092
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/6bdcc018a6ed760b9dfe43539124e420aed83092
2017-06-07 18:22:02+02:00
commit: Fix use after free in completion The final bdrv_set_backing_hd() could be working on already freed nodes because the commit job drops its references (through BlockBackends) to both overlay_bs and top already a bit earlier. One way to trigger the bug is hot unplugging a disk for which blockdev_mark_auto_del() cancels the block job. Fix this by taking BDS-level references while we're still using the nodes. Cc: [email protected] Signed-off-by: Kevin Wolf <[email protected]> Reviewed-by: John Snow <[email protected]>
19ebd13ed45ad5d5f277f5914d55b83f13eb09eb
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/19ebd13ed45ad5d5f277f5914d55b83f13eb09eb
2017-06-09 13:46:13+02:00
qcow2: add support for LUKS encryption format This adds support for using LUKS as an encryption format with the qcow2 file, using the new encrypt.format parameter to request "luks" format. e.g. # qemu-img create --object secret,data=123456,id=sec0 \ -f qcow2 -o encrypt.format=luks,encrypt.key-secret=sec0 \ test.qcow2 10G The legacy "encryption=on" parameter still results in creation of the old qcow2 AES format (and is equivalent to the new 'encryption-format=aes'). e.g. the following are equivalent: # qemu-img create --object secret,data=123456,id=sec0 \ -f qcow2 -o encryption=on,encrypt.key-secret=sec0 \ test.qcow2 10G # qemu-img create --object secret,data=123456,id=sec0 \ -f qcow2 -o encryption-format=aes,encrypt.key-secret=sec0 \ test.qcow2 10G With the LUKS format it is necessary to store the LUKS partition header and key material in the QCow2 file. This data can be many MB in size, so cannot go into the QCow2 header region directly. Thus the spec defines a FDE (Full Disk Encryption) header extension that specifies the offset of a set of clusters to hold the FDE headers, as well as the length of that region. The LUKS header is thus stored in these extra allocated clusters before the main image payload. Aside from all the cryptographic differences implied by use of the LUKS format, there is one further key difference between the use of legacy AES and LUKS encryption in qcow2. For LUKS, the initialiazation vectors are generated using the host physical sector as the input, rather than the guest virtual sector. This guarantees unique initialization vectors for all sectors when qcow2 internal snapshots are used, thus giving stronger protection against watermarking attacks. Signed-off-by: Daniel P. Berrange <[email protected]> Message-id: [email protected] Reviewed-by: Alberto Garcia <[email protected]> Signed-off-by: Max Reitz <[email protected]>
4652b8f3e1ec91bb9d6f00e40df7f96d1f1aafee
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/4652b8f3e1ec91bb9d6f00e40df7f96d1f1aafee
2017-07-11 17:44:56+02:00
target/ppc: fix memory leak in kvmppc_is_mem_backend_page_size_ok() The string returned by object_property_get_str() is dynamically allocated. Signed-off-by: Greg Kurz <[email protected]> Reviewed-by: Thomas Huth <[email protected]> Signed-off-by: David Gibson <[email protected]>
2d3e302ec2246d703ffa8d8f8769a3fa448d8145
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2d3e302ec2246d703ffa8d8f8769a3fa448d8145
2017-06-08 11:05:31+10:00
dump: fix memory_mapping_filter leak Spotted by ASAN. Signed-off-by: Marc-André Lureau <[email protected]> Signed-off-by: Michael Tokarev <[email protected]>
22c3aea8dbaac8616db71b6adf18dee801a24fde
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/22c3aea8dbaac8616db71b6adf18dee801a24fde
2017-06-04 18:42:55+03:00
qapi: Reject alternates that can't work with keyval_parse() Alternates are sum types like unions, but use the JSON type on the wire / QType in QObject instead of an explicit tag. That's why we require alternate members to have distinct QTypes. The recently introduced keyval_parse() (commit d454dbe) can only produce string scalars. The qobject_input_visitor_new_keyval() input visitor mostly hides the difference, so code using a QObject input visitor doesn't have to care whether its input was parsed from JSON or KEY=VALUE,... The difference leaks for alternates, as noted in commit 0ee9ae7: a non-string, non-enum scalar alternate value can't currently be expressed. In part, this is just our insufficiently sophisticated implementation. Consider alternate type 'GuestFileWhence'. It has an integer member and a 'QGASeek' member. The latter is an enumeration with values 'set', 'cur', 'end'. The meaning of b=set, b=cur, b=end, b=0, b=1 and so forth is perfectly obvious. However, our current implementation falls apart at run time for b=0, b=1, and so forth. Fixable, but not today; add a test case and a TODO comment. Now consider an alternate type with a string and an integer member. What's the meaning of a=42? Is it the string "42" or the integer 42? Whichever meaning you pick makes the other inexpressible. This isn't just an implementation problem, it's fundamental. Our current implementation will pick string. So far, we haven't needed such alternates. To make sure we stop and think before we add one that cannot sanely work with keyval_parse(), let's require alternate members to have sufficiently distinct representation in KEY=VALUE,... syntax: * A string member clashes with any other scalar member * An enumeration member clashes with bool members when it has value 'on' or 'off'. * An enumeration member clashes with numeric members when it has a value that starts with '-', '+', or a decimal digit. This is a rather lazy approximation of the actual number syntax accepted by the visitor. Note that enumeration values starting with '-' and '+' are rejected elsewhere already, but better safe than sorry. Signed-off-by: Markus Armbruster <[email protected]> Message-Id: <[email protected]> Reviewed-by: Eric Blake <[email protected]> Reviewed-by: Marc-André Lureau <[email protected]>
c0644771ebedbd8f47f3c24816445e30111d226b
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c0644771ebedbd8f47f3c24816445e30111d226b
2017-05-31 16:04:09+02:00
qemu-img: Fix leakage of options on error Reported by Coverity. Signed-off-by: Fam Zheng <[email protected]> Message-id: [email protected] Reviewed-by: Eric Blake <[email protected]> Signed-off-by: Max Reitz <[email protected]>
adb998c12aa7aa22c78baaec5c1252721e89c3de
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/adb998c12aa7aa22c78baaec5c1252721e89c3de
2017-05-29 15:39:54+02:00
qga-win: Fix a bug where qemu-ga service is stuck during stop operation After triggering a freeze command without any following thaw command, qemu-ga will not respond to stop operation. This behaviour is wanted on Linux as there is no time limit for a freeze command and we want to prevent quitting in the middle of freeze, on the other hand on Windows the time limit for freeze is 10 seconds, so we should wait for the timeout, thaw the file system and quit. Signed-off-by: Sameeh Jubran <[email protected]> Signed-off-by: Michael Roth <[email protected]>
94d81ae896810beafa60c85b88e991daa986e1fc
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/94d81ae896810beafa60c85b88e991daa986e1fc
2017-04-26 23:56:47-05:00
block: Use bdrv_coroutine_enter to start I/O coroutines BDRV_POLL_WHILE waits for the started I/O by releasing bs's ctx then polling the main context, which relies on the yielded coroutine continuing on bs->ctx before notifying qemu_aio_context with bdrv_wakeup(). Thus, using qemu_coroutine_enter to start I/O is wrong because if the coroutine is entered from main loop, co->ctx will be qemu_aio_context, as a result of the "release, poll, acquire" loop of BDRV_POLL_WHILE, race conditions happen when both main thread and the iothread access the same BDS: main loop iothread ----------------------------------------------------------------------- blockdev_snapshot aio_context_acquire(bs->ctx) virtio_scsi_data_plane_handle_cmd bdrv_drained_begin(bs->ctx) bdrv_flush(bs) bdrv_co_flush(bs) aio_context_acquire(bs->ctx).enter ... qemu_coroutine_yield(co) BDRV_POLL_WHILE() aio_context_release(bs->ctx) aio_context_acquire(bs->ctx).return ... aio_co_wake(co) aio_poll(qemu_aio_context) ... co_schedule_bh_cb() ... qemu_coroutine_enter(co) ... /* (A) bdrv_co_flush(bs) /* (B) I/O on bs */ continues... */ aio_context_release(bs->ctx) aio_context_acquire(bs->ctx) Note that in above case, bdrv_drained_begin() doesn't do the "release, poll, acquire" in BDRV_POLL_WHILE, because bs->in_flight == 0. Fix this by using bdrv_coroutine_enter and enter coroutine in the right context. iotests 109 output is updated because the coroutine reenter flow during mirror job complete is different (now through co_queue_wakeup, instead of the unconditional qemu_coroutine_switch before), making the end job len different. Signed-off-by: Fam Zheng <[email protected]> Acked-by: Stefan Hajnoczi <[email protected]> Reviewed-by: Kevin Wolf <[email protected]>
e92f0e1910f0655a0edd8d87c5a7262d36517a89
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e92f0e1910f0655a0edd8d87c5a7262d36517a89
2017-04-11 20:07:15+08:00
9pfs: local: set the path of the export root to "." The local backend was recently converted to using "at*()" syscalls in order to ensure all accesses happen below the shared directory. This requires that we only pass relative paths, otherwise the dirfd argument to the "at*()" syscalls is ignored and the path is treated as an absolute path in the host. This is actually the case for paths in all fids, with the notable exception of the root fid, whose path is "/". This causes the following backend ops to act on the "/" directory of the host instead of the virtfs shared directory when the export root is involved: - lstat - chmod - chown - utimensat ie, chmod /9p_mount_point in the guest will be converted to chmod / in the host for example. This could cause security issues with a privileged QEMU. All "*at()" syscalls are being passed an open file descriptor. In the case of the export root, this file descriptor points to the path in the host that was passed to -fsdev. The fix is thus as simple as changing the path of the export root fid to be "." instead of "/". This is CVE-2017-7471. Cc: [email protected] Reported-by: Léo Gaspard <[email protected]> Signed-off-by: Greg Kurz <[email protected]> Reviewed-by: Eric Blake <[email protected]> Signed-off-by: Peter Maydell <[email protected]>
9c6b899f7a46893ab3b671e341a2234e9c0c060e
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/9c6b899f7a46893ab3b671e341a2234e9c0c060e
2017-04-18 14:01:43+01:00
iscsi: Fix iscsi_create Since d5895fcb (iscsi: Split URL into individual options), creating qcow2 image on an iscsi LUN fails: qemu-img create -f qcow2 iscsi://$SERVER/$IQN/0 1G qemu-img: iscsi://$SERVER/$IQN/0: Could not create image: Invalid argument The problem is iscsi_open now expects that transport_name, portal and target are already parsed into structured options by iscsi_parse_filename, but it is not called in iscsi_create. Signed-off-by: Fam Zheng <[email protected]> Message-id: [email protected] Reviewed-by: Eric Blake <[email protected]> [mreitz: Dropped now superfluous qdict_put(bs_options, "filename", ...)] Signed-off-by: Max Reitz <[email protected]>
2ec9a782d159e2bc6655fc0b783deda197bbe0b7
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2ec9a782d159e2bc6655fc0b783deda197bbe0b7
2017-04-11 15:33:00+02:00
parallels: wrong call to bdrv_truncate Parallels driver should not call bdrv_truncate if the image was opened in the read-only mode. Without the patch qemu-img check harddisk.hds asserts with bdrv_truncate: Assertion `child->perm & BLK_PERM_RESIZE' failed. Parameters used on the write path are not needed if the image is opened in the read-only mode. Signed-off-by: Denis V. Lunev <[email protected]> Reported-by: Edgar Kaziahmedov <[email protected]> Message-id: [email protected] CC: Stefan Hajnoczi <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
dc62da88b5d17477227a3563a6ad466129d416d6
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/dc62da88b5d17477227a3563a6ad466129d416d6
2017-03-28 11:06:00+01:00
file-posix: Don't leak fd in hdev_get_max_segments This fixes a leaked fd introduced in commit 9103f1ce. Signed-off-by: Fam Zheng <[email protected]> Reviewed-by: Eric Blake <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
fed414df9dc9abef040adfbd8c5956fb610edaa2
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/fed414df9dc9abef040adfbd8c5956fb610edaa2
2017-03-17 12:54:06+01:00
qapi: Make string input and opts visitor require non-null input The string input visitor tries to cope with null input. Null input isn't used anywhere, and isn't covered by tests. Unsurprisingly, it doesn't fully work: start_list() crashes because it passes the input via parse_str() to strtoll() unchecked. Make string_input_visitor_new() assert its argument isn't null, and drop the code trying to deal with null input. The opts visitor crashes when you try to actually visit something with null input. Make opts_visitor_new() assert its argument isn't null, mostly for clarity. qobject_input_visitor_new() already asserts its argument isn't null. Signed-off-by: Markus Armbruster <[email protected]> Reviewed-by: Eric Blake <[email protected]> Message-Id: <[email protected]>
f332e830e38b3ff3953ef02ac04e409ae53769c5
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f332e830e38b3ff3953ef02ac04e409ae53769c5
2017-03-05 09:14:19+01:00
tests: fix ide-test leaks Spotted by ASAN. Signed-off-by: Marc-André Lureau <[email protected]> Reviewed-by: John Snow <[email protected]>
f5aa4bdc766190b95d18be27d5cdf4d80c35b33c
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f5aa4bdc766190b95d18be27d5cdf4d80c35b33c
2017-03-01 11:51:04+04:00
target/ppc: add ov32 flag in divide operations Add helper_div_compute_ov() in the int_helper for updating the overflow flags. For Divide Word: SO, OV, and OV32 bits reflects overflow of the 32-bit result For Divide DoubleWord: SO, OV, and OV32 bits reflects overflow of the 64-bit result Signed-off-by: Nikunj A Dadhania <[email protected]> Reviewed-by: Richard Henderson <[email protected]> Signed-off-by: David Gibson <[email protected]>
c44027ffb91e7eb335f5a4d418906460044796b9
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c44027ffb91e7eb335f5a4d418906460044796b9
2017-03-01 11:23:39+11:00
tests: fix endianness-test leaks Spotted by ASAN. Signed-off-by: Marc-André Lureau <[email protected]> Reviewed-by: Philippe Mathieu-Daudé <[email protected]>
f3f8e81150953f2829d39eef9f91f02a38a0c340
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f3f8e81150953f2829d39eef9f91f02a38a0c340
2017-03-01 00:09:28+04:00
migration: fix id leak regression This leak was introduced in commit 581f08bac22bdd5e081ae07f68071a0fc3c5c2c7. (it stands out quickly with ASAN once the rest of the leaks are also removed from make check with this series) Cc: Dr. David Alan Gilbert <[email protected]> Cc: Juan Quintela <[email protected]> Signed-off-by: Marc-André Lureau <[email protected]> Message-Id: <[email protected]> Reviewed-by: Dr. David Alan Gilbert <[email protected]> Signed-off-by: Dr. David Alan Gilbert <[email protected]>
128e4e108949b35dbe351fe122a3e34b834e185a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/128e4e108949b35dbe351fe122a3e34b834e185a
2017-02-28 11:30:22+00:00
9pfs: local: utimensat: don't follow symlinks The local_utimensat() callback is vulnerable to symlink attacks because it calls qemu_utimens()->utimensat(AT_SYMLINK_NOFOLLOW) which follows symbolic links in all path elements but the rightmost one or qemu_utimens()->utimes() which follows symbolic links for all path elements. This patch converts local_utimensat() to rely on opendir_nofollow() and utimensat(AT_SYMLINK_NOFOLLOW) directly instead of using qemu_utimens(). It is hence assumed that the OS supports utimensat(), i.e. has glibc 2.6 or higher and linux 2.6.22 or higher, which seems reasonable nowadays. This partly fixes CVE-2016-9602. Signed-off-by: Greg Kurz <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]>
a33eda0dd99e00faa3bacae43d19490bb9500e07
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a33eda0dd99e00faa3bacae43d19490bb9500e07
2017-02-28 11:21:15+01:00
ide: remove undefined behavior in ide-test trivial: initialize the dirty buffer with a random-ish byte. Stops valgrind from whining about uninitialized buffers. Signed-off-by: John Snow <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Michael Tokarev <[email protected]>
6048018ef6112476b529807ad603015314151bb2
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/6048018ef6112476b529807ad603015314151bb2
2017-02-28 09:03:38+03:00
s390x/ipl: Load network boot image Load the network boot image into guest RAM when the boot device selected is a network device. Use some of the reserved space in IplBlockCcw to store the start address of the netboot image. A user could also use 'chreipl'(diag 308/5) to change the boot device. So every time we update the IPLB, we need to verify if the selected boot device is a network device so we can appropriately load the network boot image. Signed-off-by: Farhan Ali <[email protected]> Signed-off-by: Cornelia Huck <[email protected]>
f38b5b7fc4e27724afc72b91efa2bc82f84bb25e
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f38b5b7fc4e27724afc72b91efa2bc82f84bb25e
2017-02-28 12:04:48+01:00
monitor: Clean up handle_hmp_command() a bit Leave checking qobject_type(req) to qmp_check_input_obj(). Rework handling of json_parser_parse_err() failing without setting an error. Signed-off-by: Markus Armbruster <[email protected]> Message-Id: <[email protected]> Reviewed-by: Eric Blake <[email protected]>
bbf1028a0ade883cebae5faf984f0e78cb794b17
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/bbf1028a0ade883cebae5faf984f0e78cb794b17
2017-02-22 19:52:17+01:00
migration: Check for ID length The qdev id of a device can be huge if it's on the end of a chain of bridges; in reality such chains shouldn't occur but they can be made to by chaining PCIe bridges together. The migration format has a number of 256 character long format limits; check we don't hit them (we already use pstrcat/cpy but that just protects us from buffer overruns, we fairly quickly hit an assert). Signed-off-by: Dr. David Alan Gilbert <[email protected]> Reviewed-by: Juan Quintela <[email protected]> Message-Id: <[email protected]> Signed-off-by: Juan Quintela <[email protected]>
581f08bac22bdd5e081ae07f68071a0fc3c5c2c7
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/581f08bac22bdd5e081ae07f68071a0fc3c5c2c7
2017-02-06 13:36:49+01:00
vhost: assert the log was cleaned up Make sure the log was released on cleanup, or it will leak (the alternative is to call vhost_log_put() unconditionally, but it may hide some dev state issues). Signed-off-by: Marc-André Lureau <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]>
7b527247f09740920d8bc8aaa5ef4445256ca478
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/7b527247f09740920d8bc8aaa5ef4445256ca478
2016-07-29 00:33:46+03:00
scsi-block: fix direction of BYTCHK test for VERIFY commands The direction is wrong; scsi_block_is_passthrough returns false for commands that *can* use sglists. Reported-by: Zhang Qian <[email protected]> Fixes: 8fdc7839e40f43a426bc7e858cf1dbfe315a3804 Cc: [email protected] Signed-off-by: Paolo Bonzini <[email protected]>
1f8af0d186abf9ef775a74d41bf2852ed8d59b63
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/1f8af0d186abf9ef775a74d41bf2852ed8d59b63
2017-01-16 17:52:35+01:00
spapr: fix default DRC state for coldplugged LMBs Currently we set the initial isolation/allocation state for DRCs associated with coldplugged LMBs to ISOLATED/UNUSABLE, respectively, under the assumption that the guest will move this state to UNISOLATED/USABLE. In fact, this is only the case for LMBs added via hotplug. For coldplugged LMBs, the guest actually assumes the initial state to be UNISOLATED/USABLE. In practice, this only becomes an issue when we attempt to unplug one of these LMBs, where the guest kernel will issue an rtas-get-sensor-state call to check that the corresponding DRC is in an USABLE state before it will release the LMB back to QEMU. If the returned state is otherwise, the guest will assume no further action is needed, which bypasses the QEMU-side cleanup that occurs during the USABLE->UNUSABLE transition. This results in LMBs and their corresponding pc-dimm devices to stick around indefinitely. This patch fixes the issue by manually setting DRCs associated with cold-plugged LMBs to UNISOLATED/ALLOCATED, but leaving the hotplug state untouched. As it turns out, this is analogous to the handling for cold-plugged CPUs in spapr_core_plug(). Cc: [email protected] Cc: David Gibson <[email protected]> Cc: Bharata B Rao <[email protected]> Cc: Greg Kurz <[email protected]> Signed-off-by: Michael Roth <[email protected]> Signed-off-by: David Gibson <[email protected]>
5c0139a8c2f01e068c96d456ecf12b0eeb707660
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/5c0139a8c2f01e068c96d456ecf12b0eeb707660
2016-12-01 13:41:00+11:00
virtio-crypto: fix virtio_queue_set_notification() race We must check for new virtqueue buffers after re-enabling notifications. This prevents the race condition where the guest added buffers just after we stopped popping the virtqueue but before we re-enabled notifications. I think the virtio-crypto code was based on virtio-net but this crucial detail was missed. virtio-net does not have the race condition because it processes the virtqueue one more time after re-enabling notifications. Cc: Gonglei <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]> Tested-by: Alexey Kardashevskiy <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]> Reviewed-by: Gonglei <[email protected]>
600f5ce356b44d8fa5a611ff6b034eb95ecf04e7
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/600f5ce356b44d8fa5a611ff6b034eb95ecf04e7
2016-11-18 17:14:10+02:00
tcg: correct 32-bit tcg_gen_ld8s_i64 sign-extension The version of tcg_gen_ld8s_i64 for 32-bit systems does a load into the low part of the return value - then attempts a sign extension into the high part, but wrongly sets the high part to a sign extension of itself rather than of the low part. This results in TCG internal errors from the use of the uninitialized high part (in some GCC tests of AArch64 NEON shift intrinsics, in particular). This patch corrects the sign-extension logic, making it match other functions such as tcg_gen_ld16s_i64. Reviewed-by: Peter Maydell <[email protected]> Signed-off-by: Joseph Myers <[email protected]> Message-Id: <[email protected]> Signed-off-by: Richard Henderson <[email protected]>
3ff91d7e85176f8b4b131163d7fd801757a2c949
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/3ff91d7e85176f8b4b131163d7fd801757a2c949
2016-11-01 10:30:45-06:00
9pfs: don't BUG_ON() if fid is already opened A buggy or malicious guest could pass the id of an already opened fid and cause QEMU to abort. Let's return EINVAL to the guest instead. Signed-off-by: Greg Kurz <[email protected]> Reviewed-by: Eric Blake <[email protected]>
49dd946bb5419681c8668b09a6d10f42bc707b78
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/49dd946bb5419681c8668b09a6d10f42bc707b78
2016-11-01 12:03:02+01:00
COLO: Implement the process of failover for primary VM For primary side, if COLO gets failover request from users. To be exact, gets 'x_colo_lost_heartbeat' command. COLO thread will exit the loop while the failover BH does the cleanup work and resumes VM. Signed-off-by: zhanghailiang <[email protected]> Signed-off-by: Li Zhijian <[email protected]> Reviewed-by: Dr. David Alan Gilbert <[email protected]> Reviewed-by: Amit Shah <[email protected]> Signed-off-by: Amit Shah <[email protected]>
b3f7f0c5e6449be7275f1762bccbfa2177395a3b
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b3f7f0c5e6449be7275f1762bccbfa2177395a3b
2016-10-30 15:17:39+05:30
linux-user: Fix msgrcv() and msgsnd() syscalls support If syscalls msgrcv() and msgsnd() fail, they return E2BIG, EACCES, EAGAIN, EFAULT, EIDRM, EINTR, EINVAL, ENOMEM, or ENOMSG. By examining negative scenarios of these syscalls for Mips, it was established that ENOMSG does not have the same value accross all platforms, but it is nevertheless not included for conversion in the correspondant conversion table defined in linux-user/syscall.c. This is certainly a bug, since it leads to the incorrect emulation of msgrcv() and msgsnd() for scenarios involving ENOMSG. This patch fixes this by extending the conversion table to include ENOMSG. Also, LTP test msgrcv04 will be fixed for some platforms. Signed-off-by: Aleksandar Markovic <[email protected]> Reviewed-by: Laurent Vivier <[email protected]> Signed-off-by: Riku Voipio <[email protected]>
da39db63e4468e39bb56d04d191866c5276aa7fa
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/da39db63e4468e39bb56d04d191866c5276aa7fa
2016-10-21 15:19:40+03:00
tests/boot-sector: Use mkstemp() to create a unique file name The pxe-test is run for three different targets now (x86_64, i386 and ppc64), and the bios-tables-test is run for two targets (x86_64 and i386). But each of the tests is using an invariant name for the disk image with the boot sector code - so if the tests are running in parallel, there is a race condition that they destroy the disk image of a parallel test program. Let's use mkstemp() to create unique temporary files here instead - and since mkstemp() is returning an integer file descriptor instead of a FILE pointer, we also switch the fwrite() and fclose() to write() and close() instead. Reported-by: Sascha Silbe <[email protected]> Signed-off-by: Thomas Huth <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: David Gibson <[email protected]>
3e353773721596971db2d0abc7015e7ea3d3af07
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/3e353773721596971db2d0abc7015e7ea3d3af07
2016-10-14 10:06:47+11:00
char: fix missing return in error path for chardev TLS init If the qio_channel_tls_new_(server|client) methods fail, we disconnect the client. Unfortunately a missing return means we then go on to try and run the TLS handshake on a NULL I/O channel. This gives predictably segfaulty results. The main way to trigger this is to request a bogus TLS priority string for the TLS credentials. e.g. -object tls-creds-x509,id=tls0,priority=wibble,... Most other ways appear impossible to trigger except perhaps if OOM conditions cause gnutls initialization to fail. Signed-off-by: Daniel P. Berrange <[email protected]> Reviewed-by: Eric Blake <[email protected]> Signed-off-by: Michael Tokarev <[email protected]>
660a2d83e026496db6b3eaec2256a2cdd6c74de8
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/660a2d83e026496db6b3eaec2256a2cdd6c74de8
2016-10-08 11:25:29+03:00
net: limit allocation in nc_sendv_compat we only need to allocate enough memory to hold the packet. This might be less than NET_BUFSIZE. Additionally fail early if the packet is larger than NET_BUFSIZE. Signed-off-by: Peter Lieven <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Jason Wang <[email protected]>
47f9f15831faa549504ab9b035aaea44a02e5f95
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/47f9f15831faa549504ab9b035aaea44a02e5f95
2016-09-27 17:54:22+08:00
monitor: fix crash for platforms without a CPU 0 Now that we allow CPU hot unplug on a few platforms, we can end up in a situation where we don't have a CPU with index 0. Or at least we could, if we didn't have code to explicitly prohibit unplug of CPU 0. Longer term we want to allow CPU 0 unplug, this patch is an early step in allowing this, by removing an assumption in the monitor code that CPU 0 always exists. Signed-off-by: Cédric Le Goater <[email protected]> [dwg: Rewrote commit message to better explain background] Reviewed-by: Igor Mammedov <[email protected]> Reviewed-by: Eduardo Habkost <[email protected]> Reviewed-by: Luiz Capitulino <[email protected]> Signed-off-by: David Gibson <[email protected]>
27a83f8e7ed63ced7e36c47a42f46ab44ee02bd8
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/27a83f8e7ed63ced7e36c47a42f46ab44ee02bd8
2016-09-23 12:39:07+10:00
scripts: Add a script to check for bug URLs in the git log Basic idea of this script is to check the git log for URLs to the QEMU bugtracker at launchpad.net and to figure out whether the related bug has been marked there as "Fix released" (i.e. closed) already. So this script can e.g. be used after each public release of QEMU to check whether there are any bug tickets that could be moved from "Fix committed" (or another state if the author of the patch forgot to update the bug ticket) to "Fix released". Signed-off-by: Thomas Huth <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
6867783a804b5b7eb34a2e6f0d43d0eaf88ad2de
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/6867783a804b5b7eb34a2e6f0d43d0eaf88ad2de
2016-09-22 20:20:53+02:00
iscsi: Fix divide-by-zero regression on raw SG devices When qemu uses iscsi devices in sg mode, iscsilun->block_size is left at 0. Prior to commits cf081fca and similar, when block limits were tracked in sectors, this did not matter: various block limits were just left at 0. But when we started scaling by block size, this caused SIGFPE. Then, in a later patch, commit a5b8dd2c added an assertion to bdrv_open_common() that request_alignment is always non-zero; which was not true for SG mode. Rather than relax that assertion, we can just provide a sane value (we don't know of any SG device with a block size smaller than qemu's default sizing of 512 bytes). One possible solution for SG mode is to just blindly skip ALL of iscsi_refresh_limits(), since we already short circuit so many other things in sg mode. But this patch takes a slightly more conservative approach, and merely guarantees that scaling will succeed, while still using multiples of the original size where possible. Resulting limits may still be zero in SG mode (that is, we mostly only fix block_size used as a denominator or which affect assertions, not all uses). Reported-by: Holger Schranz <[email protected]> Signed-off-by: Eric Blake <[email protected]> CC: [email protected] Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
95eaa78537c734fa3cb3373d47ba8c0099a36ff0
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/95eaa78537c734fa3cb3373d47ba8c0099a36ff0
2016-09-22 20:20:51+02:00
linux-user: Sanity check clone flags We currently make no checks on the flags passed to the clone syscall, which means we will not fail clone attempts which ask for features that we can't implement. Add sanity checking of the flags to clone (which we were already doing in the "this is a fork" path, but not for the "this is a new thread" path), tidy up the checking in the fork path to match it, and check that the fork case isn't trying to specify a custom termination signal. This is helpful in causing some LTP test cases to fail cleanly rather than behaving bizarrely when we let the clone succeed but didn't provide the semantics requested by the flags. Signed-off-by: Peter Maydell <[email protected]> Signed-off-by: Riku Voipio <[email protected]>
5ea2fc84da1bffce749c9d0848f5336def2818bb
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/5ea2fc84da1bffce749c9d0848f5336def2818bb
2016-09-21 22:14:27+03:00
ui/curses.c: Ensure we don't read off the end of curses2qemu array Coverity spots that there is no bounds check before we access the curses2qemu[] array. Add one, bringing this code path into line with the one that looks up entries in curses2keysym[]. In theory getch() shouldn't return out of range keycodes, but it's better not to assume this. Signed-off-by: Peter Maydell <[email protected]> Message-id: [email protected] Signed-off-by: Gerd Hoffmann <[email protected]>
bba4e1b591531c087fce4ae501dc1ca299d8fb42
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/bba4e1b591531c087fce4ae501dc1ca299d8fb42
2016-09-13 08:01:39+02:00
tests: fix postcopy-test leaks A few strings are allocated and never freed. Signed-off-by: Marc-André Lureau <[email protected]> Reviewed-by: Eric Blake <[email protected]>
e2dd21e510ed66daeb4c5d58638450c1fb8c6fea
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e2dd21e510ed66daeb4c5d58638450c1fb8c6fea
2016-09-08 18:05:22+04:00
coroutine: Let CoMutex remember who holds it In cases of deadlocks, knowing who holds a given CoMutex is really helpful for debugging. Keeping the information around doesn't cost much and allows us to add another assertion to keep the code correct, so let's just add it. Signed-off-by: Kevin Wolf <[email protected]> Reviewed-by: Paolo Bonzini <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]>
0e438cdc932a785de72166af4641aafa103a6670
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/0e438cdc932a785de72166af4641aafa103a6670
2016-09-05 19:06:48+02:00
target-ppc: introduce opc4 for Expanded Opcode ISA 3.0 has introduced EO - Expanded Opcode. Introduce third level indirect opcode table and corresponding parsing routines. EO (11:12) Expanded opcode field Formats: XX1 EO (11:15) Expanded opcode field Formats: VX, X, XX2 Signed-off-by: Nikunj A Dadhania <[email protected]> [dwg: Trivial checkpatch fixup] Signed-off-by: David Gibson <[email protected]>
323ad19bcc601d3ec9cb6f0f5b4d67b602fc519e
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/323ad19bcc601d3ec9cb6f0f5b4d67b602fc519e
2016-09-07 12:33:33+10:00