commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
savevm: Fix memory leak of compat struct Forgot to check for and free these. Found-by: Zachary Amsden <[email protected]> Signed-off-by: Alex Williamson <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]>
69e58af92cf90a1a0551c73880928afa6753fa5f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/69e58af92cf90a1a0551c73880928afa6753fa5f
2010-07-30 23:00:56+02:00
cow: Use bdrv_(p)write_sync for metadata writes Use bdrv_(p)write_sync to ensure metadata integrity in case of a crash. While at it, correct the wrong usage of errno. Signed-off-by: Kevin Wolf <[email protected]>
b0ad5a455d7e5352d4c86ba945112011dbeadfb8
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b0ad5a455d7e5352d4c86ba945112011dbeadfb8
2010-06-22 14:38:02+02:00
tcg/arm: correctly save/restore registers in prologue/epilogue Since commit 6113d6d3169393c323ac4c82d756a850145a5e7a QEMU crashes on ARM hosts. This is not a bug of this commit, but a latent bug revealed by this commit. The TCG code is called through a procedure call using the prologue and epilogue code. This code does not save and restore enough registers. The "Procedure Call Standard for the ARM Architecture" says: A subroutine must preserve the contents of the registers r4-r8, r10,  r11 and SP (and r9 in PCS variants that designate r9 as v6). The current code only saves and restores r9 to r11, and misses r4 to r8. The patch fixes that by saving r4 to r12. Theoretically there is no need to save and restore r12, but an even number of registers have to be saved as per EABI. Signed-off-by: Aurelien Jarno <[email protected]>
4e17eae9f2ee49833698aae2753c5bb041510870
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/4e17eae9f2ee49833698aae2753c5bb041510870
2010-03-13 11:44:25+01:00
qcow2: Fix signedness bugs Checking for return codes < 0 isn't really going to work with unsigned types. Use signed types instead. Signed-off-by: Kevin Wolf <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
f4f0d391b26afcce86df85566788be7170127116
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f4f0d391b26afcce86df85566788be7170127116
2010-02-10 11:56:57-06:00
sparc32 fix np dereference in do_unassigned_access fix a potential null pointer dereference introduced in commit 576c2cdc767ab9e2dc038fa4c99f22e53287a3de Signed-off-by: Artyom Tarasenko <[email protected]> Signed-off-by: Blue Swirl <[email protected]>
15e7c45139c74552dccb10a82c7631a68c18170a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/15e7c45139c74552dccb10a82c7631a68c18170a
2010-01-23 08:11:06+00:00
Fix a make -j race Make libuser.a depend on $(GENERATED_HEADERS) too so make -j won't start building it before the headers exist. (There may be more bugs like this but at least this makes (g)make -j4 started from scratch on a quadcore now always complete here again.) Signed-off-by: Juergen Lock <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]>
c1bb0dcef2d3a62c89cef81a0f1a0e5e97ef325b
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c1bb0dcef2d3a62c89cef81a0f1a0e5e97ef325b
2009-12-17 18:27:07+01:00
mips: fix cpu_reset memory leak Remove cpu_mips_register() - move mmu_init(), fpu_init() and mvp_init() into cpu_mips_init() - move the other parts in cpu_mips_init() Reported-by: Blue Swirl <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]>
51cc2e783af5586b2e742ce9e5b2762dc50ad325
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/51cc2e783af5586b2e742ce9e5b2762dc50ad325
2009-11-14 02:25:52+01:00
Fix compiler warnings Starting with commit df7a86ed735eafefbd046c8cad7134652fe3f600, mingw32 builds result in a compiler warning for dns_addr: CC slirp/slirp.o /home/stefan/src/qemu/savannah/qemu/slirp/slirp.c:50: warning: missing braces around initializer /home/stefan/src/qemu/savannah/qemu/slirp/slirp.c:50: warning: (near initialization for ‘dns_addr.S_un’) Removing the assignment fixes the warning without the need of special code for mingw32 (and also saves some bytes in the resulting binary). To fix another potential compiler warning, the missing 'static' attribute was added. The same changes were applied to dns_addr_time. Signed-off-by: Stefan Weil <[email protected]> Signed-off-by: Blue Swirl <[email protected]>
9e3a95ef4752dc86bf30a578be4a579a7c6c04e6
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/9e3a95ef4752dc86bf30a578be4a579a7c6c04e6
2009-08-31 15:41:53+00:00
kvm: Work around borken MSR_GET_INDEX_LIST Allocate enough memory for KVM_GET_MSR_INDEX_LIST as older kernels shot far beyond their limits, corrupting user space memory. Signed-off-by: Jan Kiszka <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
d9db889faf1bea70d36e31231bf324ae009c6344
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/d9db889faf1bea70d36e31231bf324ae009c6344
2009-07-10 13:44:30-05:00
Change default PCI class of virtio-console to PCI_CLASS_SERIAL_OTHER We're using PCI_CLASS_DISPLAY_OTHER now, but qemu-kvm.git is using PCI_CLASS_OTHERS because: "As a PCI_CLASS_DISPLAY_OTHER, it reduces primary display somehow on Windows XP (possibly Windows disables acceleration since it fails to find a driver)." While this is valid, many versions of X will get confused by it. Class major number of 0 gets treated as a possibly prehistoric VGA device, and then the autoconfig logic gets confused trying to figure out whether the virtio console or the pv vga device are the real VGA. We should really set a proper class ID. 0x0780 (serial / other) seems most appropriate. This shouldn't require any kernel changes, the modalias for virtio looks like: alias: pci:v00001AF4d*sv*sd*bc*sc*i* so won't care what the base class or subclass are. It shows up in the guest as: 00:05.0 Communication controller: Qumranet, Inc. Virtio console A new qdev type is introduced to allow devices using the old class to be created for compatibility with qemu-0.10.x. Reported-by: Adam Jackson <[email protected]> Signed-off-by: Mark McLoughlin <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
21d58b575e79c5d0739b695b272ea89bb052a7bf
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/21d58b575e79c5d0739b695b272ea89bb052a7bf
2009-07-16 08:28:10-05:00
initialize struct sigevent before timer_create When qemu is run under valgrind, valgrind shows the following output on exit: ==3648== 1 errors in context 2 of 2: ==3648== Syscall param timer_create(evp) points to uninitialised byte(s) ==3648== at 0x54E936A: timer_create (in /lib/librt-2.9.so) ==3648== by 0x405DCF: dynticks_start_timer (vl.c:1549) ==3648== by 0x40A966: main (vl.c:1726) ==3648== Address 0x7fefffb34 is on thread 1's stack ==3648== Uninitialised value was created by a stack allocation ==3648== at 0x405D60: dynticks_start_timer (vl.c:1534) This patch is a simple fix to remove this potential problem. Signed-off-by: Jean-Christophe DUBOIS <[email protected]>
9ed415b28b0c808e8b0fc631902cb9ce277f0245
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/9ed415b28b0c808e8b0fc631902cb9ce277f0245
2009-05-20 09:12:58-05:00
target-alpha: bug fix: avoid nop to override next instruction While searching PC, always store the pc of a new instruction. Instructions that didn't generate tcg code (such as nop) prevented the next one to be referenced. Signed-off-by: Tristan Gingold <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6930 c046a42c-6fe2-441c-8c8c-71466251a162
ed1dda53d073acdb52889aa30f9d251061b053bd
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ed1dda53d073acdb52889aa30f9d251061b053bd
2009-03-29 01:04:39+00:00
qemu-io: Optionally verify only part of read data There are reasonable test cases where a read must span areas that are not uniformly filled with one pattern but contains several parts. This makes -P useless for them currently. Introducing additional options which determine the part of the read data that should be verified with the given pattern allows to check such reads. Signed-off-by: Kevin Wolf <[email protected]> Signed-off-by: Anthony Liguori <[email protected]>
d9654a58576dae982458bdb1eb565c9876c24c22
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/d9654a58576dae982458bdb1eb565c9876c24c22
2009-05-01 09:44:11-05:00
Fix cpu_physical_memory_rw() for 64-bit I/O accesses KVM uses cpu_physical_memory_rw() to access the I/O devices. When a read or write with a length of 8-byte is requested, it is split into 2 4-byte accesses. This has been broken in revision 5849. After this revision, only the first 4 bytes are actually read/write to the device, as the target address is changed, so on the next iteration of the loop the next 4 bytes are actually read/written elsewhere (in the RAM for the graphic card). This patch fixes screen corruption (and most probably data corruption) with FreeBSD/amd64. Bug #2556746 in KVM bugzilla. Signed-off-by: Aurelien Jarno <[email protected]> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6628 c046a42c-6fe2-441c-8c8c-71466251a162
6c2934db949aa259ed47b126b5c6838ac57a3f6f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/6c2934db949aa259ed47b126b5c6838ac57a3f6f
2009-02-18 21:37:17+00:00
linux-user: don't crash with null name From Thayne Harbaugh. path() may be called with null string, don't bother trying to remap in that case. Signed-off-by: Riku Voipio <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6480 c046a42c-6fe2-441c-8c8c-71466251a162
a516e72d60803cac3b81b3330db55983b080d8da
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a516e72d60803cac3b81b3330db55983b080d8da
2009-01-30 19:48:07+00:00
virtio-net migration fix (Mark McLoughlin) We are failing to save whether the guest will supply us rx buffers using the new mergeable format; this can cause a migrated guest to crash with: virtio-net header not in first element Bump the savevm version number and refuse to load v1 saves just to be on the safe side. Signed-off-by: Mark McLoughlin <[email protected]> Signed-off-by: Anthony Liguori <[email protected]> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6221 c046a42c-6fe2-441c-8c8c-71466251a162
e46cb38f13dda9b2b7754de521836c0c97bb09cd
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e46cb38f13dda9b2b7754de521836c0c97bb09cd
2009-01-07 17:50:45+00:00
SH4: Implement FD bit SH4 manual say that if a floating point instruction is executed while FD bit in the status register is 1, an exception should be raised. QEMU presently does not do that, so the kernel does not initialize FP state for any thread, nor does it save/restore FP state. The most apparent consequence is that while recent gcc/libc expect double-precision mode to be set by kernel, they run in single-precision mode, and all FP code produces wrong values. This patch fixes this. It also fixes a couple of places where PC was not updated before handling an exception, although both those places deal with invalid instruction and don't lead to any user-visible bugs. (Vladimir Prus) git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@5937 c046a42c-6fe2-441c-8c8c-71466251a162
d8299bccf265b72db967a064e8151660b78cdfae
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/d8299bccf265b72db967a064e8151660b78cdfae
2008-12-07 22:46:31+00:00
Keep usb host scanning from leaking file descriptors If the first case does not succeed, then the usb scanning code will leak file descriptors on every scan. git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@5509 c046a42c-6fe2-441c-8c8c-71466251a162
f16a0db323e1a8c0044696815cceeb98706f2243
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f16a0db323e1a8c0044696815cceeb98706f2243
2008-10-21 16:34:20+00:00
Fix warning about variables used uninitialized git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@5378 c046a42c-6fe2-441c-8c8c-71466251a162
66029f6a2f717873f2d170681f0250801a6d0d39
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/66029f6a2f717873f2d170681f0250801a6d0d39
2008-10-01 19:39:40+00:00
LSI SCSI: raise UDC on infinite loop (Marcelo Tosatti) Raise UDC (Unexpected Disconnect) when a large enough number of instructions has been executed by the SCRIPTS processor. This "solution" is much simpler than temporarily interrupting execution. This remedies the situation with Windows which downloads SCRIPTS code that busy loops on guest main memory. Their drivers _do_ handle UDC appropriately (at least XP and 2003). It would be nicer to actually detect infinite loops, but until then, this bandaid seems acceptable. Since the situation seems to be rare enough, raise the number of instructions to 10000 (previously 1000). Three people other than myself had success with this patch. Signed-off-by: Marcelo Tosatti <[email protected]> Signed-off-by: Anthony Liguori <[email protected]> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@5293 c046a42c-6fe2-441c-8c8c-71466251a162
ee4d919f30f1378cda697dd94d5a21b2a7f4d90d
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ee4d919f30f1378cda697dd94d5a21b2a7f4d90d
2008-09-22 16:04:16+00:00
Use signalfd() to work around signal/select race This patch introduces signalfd() to work around the signal/select race in checking for AIO completions. For platforms that don't support signalfd(), we emulate it with threads. There was a long discussion about this approach. I don't believe there are any fundamental problems with this approach and I believe eliminating the use of signals is a good thing. I've tested Windows and Linux using Windows and Linux guests. I've also checked for disk IO performance regressions. Signed-off-by: Anthony Liguori <[email protected]> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@5187 c046a42c-6fe2-441c-8c8c-71466251a162
baf35cb90204d75404892aa4e52628ae7a00669b
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/baf35cb90204d75404892aa4e52628ae7a00669b
2008-09-10 15:45:19+00:00
Introduce v3 of savevm protocol The current savevm/loadvm protocol has some draw backs. It does not support the ability to do progressive saving which means it cannot be used for live checkpointing or migration. The sections sizes are 32-bit integers which means that it will not function when using more than 4GB of memory for a guest. It attempts to seek within the output file which means it cannot be streamed. The current protocol also is pretty lax about how it supports forward compatibility. If a saved section version is greater than what the restore code support, the restore code generally treats the saved data as being in whatever version it supports. This means that restoring a saved VM on an older version of QEMU will likely result in silent guest failure. This patch introduces a new version of the savevm protocol. It has the following features: * Support for progressive save of sections (for live checkpoint/migration) * An asynchronous API for doing save * Support for interleaving multiple progressive save sections (for future support of memory hot-add/storage migration) * Fully streaming format * Strong section version checking Signed-off-by: Anthony Liguori <[email protected]> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@5434 c046a42c-6fe2-441c-8c8c-71466251a162
9366f4186025e1d8fc3bebd41fb714521c170b6f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/9366f4186025e1d8fc3bebd41fb714521c170b6f
2008-10-06 14:53:52+00:00
[PATCH] usb-serial: Fix data corruption with usb serial emulation * Remove the unused send_buf variable and its constant. * Fix a math error The variables recv_ptr and recv_used are not large enough to hold the constant 384, which causes data corruption when the pointer is reset with: s->recv_ptr = (s->recv_ptr + len) % RECV_BUF; Signed-off-by: Jason Wessel <[email protected]> Acked-by: Samuel Thibault <[email protected]> Signed-off-by: Aurelien Jarno <[email protected]> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@5242 c046a42c-6fe2-441c-8c8c-71466251a162
8109b9b6bf934a39e73c90fb804e2d5af02391d1
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8109b9b6bf934a39e73c90fb804e2d5af02391d1
2008-09-17 22:04:21+00:00
Fix bogus format, reading uninitialised memory (original patch by Julian Seward) git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@4793 c046a42c-6fe2-441c-8c8c-71466251a162
a37ee56cb7f2094a65fff14ed5d4ff325652b802
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a37ee56cb7f2094a65fff14ed5d4ff325652b802
2008-06-26 18:43:24+00:00
Convert from DOS to UNIX format, no code change. git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@4043 c046a42c-6fe2-441c-8c8c-71466251a162
30aa5c0d303c334c646e9db1ebadda0c0db8b13f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/30aa5c0d303c334c646e9db1ebadda0c0db8b13f
2008-03-13 01:19:15+00:00
Fix code generation buffer overflow reported by TeLeMan git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@3805 c046a42c-6fe2-441c-8c8c-71466251a162
d07bde88a52bf293c3f8846cfd162e0a57e1557c
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/d07bde88a52bf293c3f8846cfd162e0a57e1557c
2007-12-11 19:35:45+00:00
PowerPC bugfixes: - must clear carry bit when doing addic with a zero immediate value - fix missing RETURN in micro-operation that would lead to random failures and crashes - add USE_PRECISE_EMULATION compilation-time option to choose between getting exact floating point results and fast but less accurate computation. git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@2526 c046a42c-6fe2-441c-8c8c-71466251a162
e864cabdc0a38bb598ddcf88b264896dc6f3e3b2
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e864cabdc0a38bb598ddcf88b264896dc6f3e3b2
2007-03-22 22:17:08+00:00
x509 client certificate verification, by Daniel P. Berrange. git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@3138 c046a42c-6fe2-441c-8c8c-71466251a162
469b15c68d0b9b00f5d2ab2a16ef5bcf46ca368f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/469b15c68d0b9b00f5d2ab2a16ef5bcf46ca368f
2007-08-25 01:39:10+00:00
scripts: Remove fixed entries from the device-crash-test These are crashes / errors which have been fixed already in the past months. We can remove these from the device-crash-test script now. Signed-off-by: Thomas Huth <[email protected]> Message-Id: <[email protected]> Signed-off-by: Eduardo Habkost <[email protected]>
1e2bdd2e20844f6bc343232ea1bb6f64c54a95ce
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/1e2bdd2e20844f6bc343232ea1bb6f64c54a95ce
2018-01-19 11:18:51-02:00
vhost: remove assertion to prevent crash QEMU will assert on vhost-user backed virtio device hotplug if QEMU is using more RAM regions than VHOST_MEMORY_MAX_NREGIONS (for example if it were started with a lot of DIMM devices). Fix it by returning error instead of asserting and let callers of vhost_set_mem_table() handle error condition gracefully. Cc: [email protected] Signed-off-by: Igor Mammedov <[email protected]> Signed-off-by: Jay Zhou <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]>
f4bf56fb78ed0e9f60fa1ed656c14ff4c494da5a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f4bf56fb78ed0e9f60fa1ed656c14ff4c494da5a
2018-01-18 21:52:39+02:00
tpm-passthrough: don't save guessed cancel_path in options The value is later unneeded, and may leak if the free visitor doesn't consider it since has_cancel_path is false. And for consistency with "path" it shouldn't be returned in get_tpm_options(). Signed-off-by: Marc-André Lureau <[email protected]> Reviewed-by: Stefan Berger <[email protected]> Signed-off-by: Stefan Berger <[email protected]>
69c07db04625cb243db6e8a0ac0a8e3973dd961a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/69c07db04625cb243db6e8a0ac0a8e3973dd961a
2017-12-14 23:39:14-05:00
i386/cpu/kvm: look at PMU's CPUID before setting MSRs Certain PMU-related MSRs are not supported for CPUs with PMU architecture below version 2. KVM rejects any access to them (see intel_is_valid_msr_idx routine in KVM), and QEMU fails on the following assertion: kvm_put_msrs: Assertion `ret == cpu->kvm_msr_buf->nmsrs' failed. QEMU also could fail if KVM exposes less fixed counters then 3. It could happen if host system run inside another hypervisor, which is tweaking PMU-related CPUID. To prevent possible fail, number of fixed counters now is obtained in the same way as number of GP counters. Reviewed-by: Roman Kagan <[email protected]> Signed-off-by: Jan Dakinevich <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
0b368a10c71af96f6cf93b0ba5c2ee3bdbd50e96
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/0b368a10c71af96f6cf93b0ba5c2ee3bdbd50e96
2018-01-12 13:22:02+01:00
linux-user: Fix calculation of auxv length In commit 7c4ee5bcc82e643 we changed the order in which we construct the AUXV, but forgot to adjust the calculation of the length. The result is that we set info->auxv_len to a bogus and negative value, and then later on the code in open_self_auxv() gets confused and ends up presenting the guest with an empty file. Since we now have to calculate the auxv length up-front as part of figuring out how much we're going to put on the stack, set info->auxv_len then; this allows us to assert that we put the same number of entries into auxv as we pre-calculated, rather than merely having a comment saying we need to do that. Fixes: https://bugs.launchpad.net/qemu/+bug/1728116 Reviewed-by: Richard Henderson <[email protected]> Signed-off-by: Peter Maydell <[email protected]> Signed-off-by: Riku Voipio <[email protected]>
f516511ea84d8bb3395d6ea95a7c7b80dc2a05e9
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f516511ea84d8bb3395d6ea95a7c7b80dc2a05e9
2017-11-20 16:15:41+02:00
qcow2: Prevent allocating refcount blocks at offset 0 Each entry in the qcow2 cache contains an offset field indicating the location of the data in the qcow2 image. If the offset is 0 then it means that the entry contains no data and is available to be used when needed. Because of that it is not possible to store in the cache the first cluster of the qcow2 image (offset = 0). This is not a problem because that cluster always contains the qcow2 header and we're not using this cache for that. However, if the qcow2 image is corrupted it can happen that we try to allocate a new refcount block at offset 0, triggering this assertion and crashing QEMU: qcow2_cache_entry_mark_dirty: Assertion `c->entries[i].offset != 0' failed This patch adds an explicit check for this scenario and a new test case. This problem was originally reported here: https://bugs.launchpad.net/qemu/+bug/1728615 Reported-by: R.Nageswara Sastry <[email protected]> Signed-off-by: Alberto Garcia <[email protected]> Reviewed-by: Max Reitz <[email protected]> Message-id: 92a2fadd10d58b423f269c1d1a309af161cdc73f.1509718618.git.berto@igalia.com Signed-off-by: Max Reitz <[email protected]>
6bf45d59f98c898b7d7997a333765c8ee41236ea
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/6bf45d59f98c898b7d7997a333765c8ee41236ea
2017-11-14 18:06:25+01:00
nbd/server: Fix structured read of length 0 The NBD spec was recently clarified to state that a read of length 0 should not be attempted by a compliant client; but that a server must still handle it correctly in an unspecified manner (that is, either a successful no-op or an error reply, but not a crash) [1]. However, it also implies that NBD_REPLY_TYPE_OFFSET_DATA must have a non-zero payload length, but our existing code was replying with a chunk that a picky client could reject as invalid because it was missing a payload (our own client implementation was recently patched to be that picky, after first fixing it to not send 0-length requests). We are already doing successful no-ops for 0-length writes and for non-structured reads; so for consistency, we want structured reply reads to also be a no-op. The easiest way to do this is to return a NBD_REPLY_TYPE_NONE chunk; this is best done via a new helper function (especially since future patches for other structured replies may benefit from using the same helper). [1] https://github.com/NetworkBlockDevice/nbd/commit/ee926037 Signed-off-by: Eric Blake <[email protected]> Message-Id: <[email protected]> Reviewed-by: Vladimir Sementsov-Ogievskiy <[email protected]>
ef8c887ee01a4e4c8c5c28c86ea5b45162c51bcd
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ef8c887ee01a4e4c8c5c28c86ea5b45162c51bcd
2017-11-09 10:25:11-06:00
hw/arm: Mark the "fsl,imx25" device with user_creatable = false QEMU currently crashes when the user tries to instantiate the fsl,imx25 device manually: $ aarch64-softmmu/qemu-system-aarch64 -S -M imx25-pdk -device fsl,,imx25 ** ERROR:/home/thuth/devel/qemu/tcg/tcg.c:538:tcg_register_thread: assertion failed: (n < max_cpus) The imx25-pdk board (which is the one that uses this CPU type) only supports one CPU, and the realize function of the "fsl,imx25" device also uses serial_hds[] directly, so this device clearly can not be instantiated twice and thus we should mark it with user_creatable = 0. Signed-off-by: Thomas Huth <[email protected]> Message-id: [email protected] Reviewed-by: Peter Maydell <[email protected]> Signed-off-by: Peter Maydell <[email protected]>
5e0c7044b9149fb39f13494d4baaedbe7ae7bed9
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/5e0c7044b9149fb39f13494d4baaedbe7ae7bed9
2017-11-07 13:03:51+00:00
s390x/tcg: Implement STORE CHANNEL PATH STATUS Just like KVM does, we should suppress this instruction: When this instruction is not provided, it is checked for privileged operation exception and the instruction is suppressed by the machine Reviewed-by: Richard Henderson <[email protected]> Signed-off-by: David Hildenbrand <[email protected]> Message-Id: <[email protected]> Signed-off-by: Cornelia Huck <[email protected]>
b9b0a4dc13cc6180c79056a7d15e828e93a24a41
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b9b0a4dc13cc6180c79056a7d15e828e93a24a41
2017-12-14 17:56:54+01:00
migration: clean up xbzrle cache init/destroy Let's further simplify ram_init_all() and ram_save_cleanup() by abstract all the XBZRLE related codes into their own functions. When allocating xbzrle cache, we are always very careful on -ENOMEM; which makes sense. Replacing the last g_malloc0() with g_try_malloc0(), then refactor the logic a bit. This patch should be fixing some memory leaks when some memory allocation failed for XBZRLE in the past. Signed-off-by: Peter Xu <[email protected]> Reviewed-by: Juan Quintela <[email protected]> Signed-off-by: Juan Quintela <[email protected]>
84593a0807004d852132eaa56edf24d55793d480
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/84593a0807004d852132eaa56edf24d55793d480
2017-10-23 18:03:37+02:00
cirrus: fix oob access in mode4and5 write functions Move dst calculation into the loop, so we apply the mask on each interation and will not overflow vga memory. Cc: Prasad J Pandit <[email protected]> Reported-by: Niu Guoxiang <[email protected]> Signed-off-by: Gerd Hoffmann <[email protected]> Message-id: [email protected]
eb38e1bc3740725ca29a535351de94107ec58d51
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/eb38e1bc3740725ca29a535351de94107ec58d51
2017-10-17 09:59:00+02:00
cpu: don't allow negative core id With pseries machine type a negative core-id is not managed properly: -1 gives an inaccurate error message ("core -1 already populated"), -2 crashes QEMU (core dump) As it seems a negative value is invalid for any architecture, instead of checking this in spapr_core_pre_plug() I think it's better to check this in the generic part, core_prop_set_core_id() Signed-off-by: Laurent Vivier <[email protected]> Message-Id: <[email protected]> Reviewed-by: Greg Kurz <[email protected]> Reviewed-by: David Gibson <[email protected]> Reviewed-by: Eduardo Habkost <[email protected]> Signed-off-by: Eduardo Habkost <[email protected]>
be2960baae07e5257cde8c814cbd91647e235147
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/be2960baae07e5257cde8c814cbd91647e235147
2017-08-02 18:30:13-03:00
exec-all: introduce TB_PAGE_ADDR_FMT And fix the following warning when DEBUG_TB_INVALIDATE is enabled in translate-all.c: CC mipsn32-linux-user/accel/tcg/translate-all.o /data/src/qemu/accel/tcg/translate-all.c: In function ‘tb_alloc_page’: /data/src/qemu/accel/tcg/translate-all.c:1201:16: error: format ‘%lx’ expects argument of type ‘long unsigned int’, but argument 2 has type ‘tb_page_addr_t {aka unsigned int}’ [-Werror=format=] printf("protecting code page: 0x" TARGET_FMT_lx "\n", ^ cc1: all warnings being treated as errors /data/src/qemu/rules.mak:66: recipe for target 'accel/tcg/translate-all.o' failed make[1]: *** [accel/tcg/translate-all.o] Error 1 Makefile:328: recipe for target 'subdir-mipsn32-linux-user' failed make: *** [subdir-mipsn32-linux-user] Error 2 cota@flamenco:/data/src/qemu/build ((18f3fe1...) *$)$ Reviewed-by: Richard Henderson <[email protected]> Signed-off-by: Emilio G. Cota <[email protected]> Signed-off-by: Richard Henderson <[email protected]>
67a5b5d2f6eb6d3b980570223ba5c478487ddb6f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/67a5b5d2f6eb6d3b980570223ba5c478487ddb6f
2017-10-10 07:37:10-07:00
vl: exit if maxcpus is negative Signed-off-by: Eduardo Habkost <[email protected]> ---Steps to Reproduce--- When passed a negative number to 'maxcpus' parameter, Qemu aborts with a core dump. Run the following command with maxcpus argument as negative number ppc64-softmmu/qemu-system-ppc64 --nographic -vga none -machine pseries,accel=kvm,kvm-type=HV -m size=200g -device virtio-blk-pci, drive=rootdisk -drive file=/home/images/pegas-1.0-ppc64le.qcow2, if=none,cache=none,id=rootdisk,format=qcow2 -monitor telnet :127.0.0.1:1234,server,nowait -net nic,model=virtio -net user -redir tcp:2000::22 -device nec-usb-xhci -smp 8,cores=1, threads=1,maxcpus=-12 (process:12149): GLib-ERROR **: gmem.c:130: failed to allocate 18446744073709550568 bytes Trace/breakpoint trap Reported-by: R.Nageswara Sastry <[email protected]> Signed-off-by: Seeteena Thoufeek <[email protected]> Message-Id: <[email protected]> Reviewed-by: Philippe Mathieu-Daudé <[email protected]>
c0dd10991903c552811d8cbe9231055b1b3a7ebd
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c0dd10991903c552811d8cbe9231055b1b3a7ebd
2017-10-09 23:21:52-03:00
iotests: Add test 197 for covering copy-on-read Add a test for qcow2 copy-on-read behavior, including exposure for the just-fixed bugs. The copy-on-read behavior is always to a qcow2 image, but the test is careful to allow running with most image protocol/format combos as the backing file being copied from (luks being the exception, as it is harder to pass the right secret to all the right places). In fact, for './check nbd', this appears to be the first time we've had a qcow2 image wrapping NBD, requiring an additional line in _filter_img_create to match the similar line in _filter_img_info. Invoking blkdebug to prove we don't write too much took some effort to get working; and it requires that $TEST_WRAP (based on $TEST_DIR) not be subject to word splitting. We may decide later to have the entire iotests suite use relative rather than absolute names, to avoid problems inherited by the absolute name of $PWD or $TEST_DIR, at which point the sanity check in this commit could be simplified. This test requires at least 2G of consecutive memory to succeed; as such, it is prone to spurious failures, particularly on 32-bit machines under load. This situation is detected and triggers an early exit to skip the test, rather than a failure. To manually provoke this setup on a beefier machine, I used: $ (ulimit -S -v 1000000; ./check -qcow2 197) Signed-off-by: Eric Blake <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
461743390d3a1ceafa4503811adbc87c7d372741
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/461743390d3a1ceafa4503811adbc87c7d372741
2017-10-06 16:28:58+02:00
hw/usb/bus: Remove bad object_unparent() from usb_try_create_simple() Valgrind detects an invalid read operation when hot-plugging of an USB device fails: $ valgrind x86_64-softmmu/qemu-system-x86_64 -device usb-ehci -nographic -S ==30598== Memcheck, a memory error detector ==30598== Copyright (C) 2002-2015, and GNU GPL'd, by Julian Seward et al. ==30598== Using Valgrind-3.12.0 and LibVEX; rerun with -h for copyright info ==30598== Command: x86_64-softmmu/qemu-system-x86_64 -device usb-ehci -nographic -S ==30598== QEMU 2.10.50 monitor - type 'help' for more information (qemu) device_add usb-tablet (qemu) device_add usb-tablet (qemu) device_add usb-tablet (qemu) device_add usb-tablet (qemu) device_add usb-tablet (qemu) device_add usb-tablet ==30598== Invalid read of size 8 ==30598== at 0x60EF50: object_unparent (object.c:445) ==30598== by 0x580F0D: usb_try_create_simple (bus.c:346) ==30598== by 0x581BEB: usb_claim_port (bus.c:451) ==30598== by 0x582310: usb_qdev_realize (bus.c:257) ==30598== by 0x4CB399: device_set_realized (qdev.c:914) ==30598== by 0x60E26D: property_set_bool (object.c:1886) ==30598== by 0x61235E: object_property_set_qobject (qom-qobject.c:27) ==30598== by 0x61000F: object_property_set_bool (object.c:1162) ==30598== by 0x4567C3: qdev_device_add (qdev-monitor.c:630) ==30598== by 0x456D52: qmp_device_add (qdev-monitor.c:807) ==30598== by 0x470A99: hmp_device_add (hmp.c:1933) ==30598== by 0x3679C3: handle_hmp_command (monitor.c:3123) The object_unparent() here is not necessary anymore since commit 69382d8b3e8600b3 ("qdev: Fix object reference leak in case device.realize() fails"), so let's remove it now. Suggested-by: Paolo Bonzini <[email protected]> Signed-off-by: Thomas Huth <[email protected]> Message-id: [email protected] Signed-off-by: Gerd Hoffmann <[email protected]>
f3b2bea3c76ba9283b957f1373e7cebdbf863059
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f3b2bea3c76ba9283b957f1373e7cebdbf863059
2017-09-29 12:23:12+02:00
block/mirror: check backing in bdrv_mirror_top_flush Backing may be zero after failed bdrv_append in mirror_start_job, which leads to SIGSEGV. Signed-off-by: Vladimir Sementsov-Ogievskiy <[email protected]> Message-id: [email protected] Signed-off-by: Max Reitz <[email protected]>
ce960aa9062a407d0ca15aee3dcd3bd84a4e24f9
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ce960aa9062a407d0ca15aee3dcd3bd84a4e24f9
2017-10-06 16:30:48+02:00
qemu.py: include debug information on launch error When launching a VM, if an exception happens and the VM is not initiated, it might be useful to see the qemu command line and the qemu command output. This patch creates that message. Notice that self._iolog needs to be cleaned up in the beginning of the launch() to make sure we will not expose the qemu log from a previous launch if the current one fails. Signed-off-by: Amador Pahim <[email protected]> Message-Id: <[email protected]> Reviewed-by: Fam Zheng <[email protected]> Signed-off-by: Eduardo Habkost <[email protected]>
b92a0011b1220aff549ae82c6104014d25e339ef
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b92a0011b1220aff549ae82c6104014d25e339ef
2017-09-15 20:12:00-03:00
test-qga: add missing qemu-ga tool dependency this fixes running 'make check-unit' without running 'make all' beforehand: $ make check-unit ... GTESTER tests/test-qga ** ERROR:tests/test-qga.c:73:fixture_setup: assertion failed (error == NULL): Failed to execute child process "/build/qemu/qemu-ga" (No such file or directory) (g-exec-error-quark, 8) make: *** [check-tests/test-qga] Error 1 Signed-off-by: Philippe Mathieu-Daudé <[email protected]> Message-Id: <[email protected]> Reviewed-by: Marc-André Lureau <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
4be75077b9a5016903e5f8a7ecd2edb590a6d57c
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/4be75077b9a5016903e5f8a7ecd2edb590a6d57c
2017-09-19 14:09:34+02:00
qcow: Check failure of bdrv_getlength() and bdrv_truncate() Omitting the check for whether bdrv_getlength() and bdrv_truncate() failed meant that it was theoretically possible to return an incorrect offset to the caller. More likely, conditions for either of these functions to fail would also cause one of our other calls (such as bdrv_pread() or bdrv_pwrite_sync()) to also fail, but auditing that we are safe is difficult compared to just patching things to always forward on the error rather than ignoring it. Use osdep.h macros instead of open-coded rounding while in the area. Reported-by: Markus Armbruster <[email protected]> Signed-off-by: Eric Blake <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
d7a753a148d4738eef95a3b193b081a9c905399f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/d7a753a148d4738eef95a3b193b081a9c905399f
2017-09-04 18:33:00+02:00
hw/arm/aspeed_soc: Mark devices as user_creatable = false QEMU currently aborts if the user is accidentially trying to do something like this: $ aarch64-softmmu/qemu-system-aarch64 -S -M integratorcp -nographic QEMU 2.9.93 monitor - type 'help' for more information (qemu) device_add ast2400 Unexpected error in error_set_from_qdev_prop_error() at hw/core/qdev-properties.c:1032: Aborted (core dumped) The ast2400 SoC devices are clearly not creatable by the user since they are using the serial_hds and nd_table arrays directly in their realize function, so mark them with user_creatable = false. Signed-off-by: Thomas Huth <[email protected]> Reviewed-by: Peter Maydell <[email protected]> Reviewed-by: Cédric Le Goater <[email protected]> Signed-off-by: Peter Maydell <[email protected]>
469f3da42ef4af347fa7831e1cc0bd35d17f5b83
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/469f3da42ef4af347fa7831e1cc0bd35d17f5b83
2017-09-04 17:13:53+01:00
nvme: Fix get/set number of queues feature, again The number of queues that should be return by the admin command should: 1) Only mention the number of non-admin queues. 2) It is zero-based, meaning that '0 == one non-admin queue', '1 == two non-admin queues', and so forth. Because our `num_queues` means the number of queues _plus_ the admin queue, then the right calculation for the number returned from the admin command is `num_queues - 2`, combining the two requirements mentioned. The issue was discovered by reducing num_queues from 64 to 8 and running a Linux VM with an SMP parameter larger than that (e.g. 22). It tries to utilize all queues, and therefore fails with an invalid queue number when trying to queue I/Os on the last queue. Signed-off-by: Dan Aloni <[email protected]> CC: Alex Friedman <[email protected]> CC: Keith Busch <[email protected]> CC: Stefan Hajnoczi <[email protected]> Reviewed-by: Keith Busch <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
cdd346371e09709be8e46398bb097dc690a746f2
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/cdd346371e09709be8e46398bb097dc690a746f2
2017-08-29 16:54:40+01:00
vhost: fix a memory leak vhost exists a call for g_file_get_contents, but not call g_free. Signed-off-by: Peng Hao<[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]> Reviewed-by: Marc-André Lureau <[email protected]>
08b9e0ba623c4468fe94026a9bdd086526ef62f0
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/08b9e0ba623c4468fe94026a9bdd086526ef62f0
2017-08-02 00:13:25+03:00
qcow2: Check failure of bdrv_getlength() qcow2_co_pwritev_compressed() should not call bdrv_truncate() if determining the size failed. Reported-by: Markus Armbruster <[email protected]> Signed-off-by: Eric Blake <[email protected]> Reviewed-by: Philippe Mathieu-Daudé <[email protected]> Reviewed-by: Jeff Cody <[email protected]> Reviewed-by: Kevin Wolf <[email protected]> Reviewed-by: John Snow <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
d0d5d0e31a874d592741a088c2c5071bae164dbf
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/d0d5d0e31a874d592741a088c2c5071bae164dbf
2017-08-11 13:23:47+02:00
net/eth: fix incorrect check of iov_to_buf() return value So we have sizeof(struct in6_address) != sizeof(uintptr_t) and Clang > Coverity on this, see 4555ca6816c :) net/eth.c:426:30: warning: The code calls sizeof() on a pointer type. This can produce an unexpected result return bytes_read == sizeof(dst_addr); ^ ~~~~~~~~~~ net/eth.c:475:34: warning: The code calls sizeof() on a pointer type. This can produce an unexpected result return bytes_read == sizeof(src_addr); ^ ~~~~~~~~~~ Reported-by: Clang Static Analyzer Signed-off-by: Philippe Mathieu-Daudé <[email protected]> Reviewed-by: Dmitry Fleytman <[email protected]> Signed-off-by: Michael Tokarev <[email protected]>
b2caa3b82edca29ccb5e7d6311ffcf841b9b7786
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/b2caa3b82edca29ccb5e7d6311ffcf841b9b7786
2017-07-31 13:06:38+03:00
target/arm: Make Cortex-M3 and M4 default to 8 PMSA regions The Cortex-M3 and M4 CPUs always have 8 PMSA MPU regions (this isn't a configurable option for the hardware). Make the default value of the pmsav7-dregion property be set per-cpu, so we don't need to have every user of these CPUs set it manually. (The existing default of 16 is correct for the other PMSAv7 core, the Cortex-R5.) This fixes a bug where we were creating the M3 and M4 with too many regions; most guest software would not notice or care, though, since it would just not use the registers associated with the unexpected extra regions. Signed-off-by: Peter Maydell <[email protected]> Reviewed-by: Marc-André Lureau <[email protected]> Message-id: [email protected]
8d92e26b452f8961ec90df3f93cf5f3b7a9d158f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8d92e26b452f8961ec90df3f93cf5f3b7a9d158f
2017-07-17 13:36:07+01:00
spapr: Remove unnecessary instance_size specifications from DRC subtypes All the DRC subtypes explicitly list instance_size in TypeInfo (all as sizeof(sPAPRDRConnector). This isn't necessary, since if it's not listed it will be derived from the parent type. Worse, this is dangerous, because if a subtype is changed in future to have a larger structure, then subtypes of that subtype also need to have instance_size changed, or it will lead to hard to track memory corruption bugs. Signed-off-by: David Gibson <[email protected]>
3579d606a091eb698cd53cef64e48cfa08cd7805
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/3579d606a091eb698cd53cef64e48cfa08cd7805
2017-07-17 15:06:08+10:00
mttcg/i386: Patch instruction using async_safe_* framework In mttcg, calling pause_all_vcpus() during execution from the generated TBs causes a deadlock if some vCPU is waiting for exclusive execution in start_exclusive(). Fix this by using the aync_safe_* framework instead of pausing vcpus for patching instructions. CC: Paolo Bonzini <[email protected]> CC: Peter Maydell <[email protected]> Reviewed-by: Richard Henderson <[email protected]> Reviewed-by: Alex Bennée <[email protected]> Signed-off-by: Pranith Kumar <[email protected]> Message-Id: <[email protected]> [Get rid completely of the TCG-specific code. - Paolo] Signed-off-by: Paolo Bonzini <[email protected]>
cb58a6d3611b2d0ff4ed29bb6b659c95a23cb2d5
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/cb58a6d3611b2d0ff4ed29bb6b659c95a23cb2d5
2017-07-14 12:04:35+02:00
iotests: skip 042 with qcow which dosn't support zero sized images Test 042 is designed to verify operation with zero sized images. Such images are not supported with qcow (v1), so this test has always failed. Reviewed-by: Max Reitz <[email protected]> Reviewed-by: Alberto Garcia <[email protected]> Signed-off-by: Daniel P. Berrange <[email protected]> Message-id: [email protected] Signed-off-by: Max Reitz <[email protected]>
ebab5636f99eda7034984c27fc30d2c50912bf1c
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ebab5636f99eda7034984c27fc30d2c50912bf1c
2017-07-11 17:44:55+02:00
target/mips: Decode MIPS32 EVA load & store instructions Implement decoding of MIPS32 EVA loads and stores. These access the user address space from kernel mode when implemented, so for each instruction we need to check that EVA is available from Config5.EVA & check for sufficient COP0 privilege (with the new check_eva()), and then override the mem_idx used for the operation. Unfortunately some Loongson 2E instructions use overlapping encodings, so we must be careful not to prevent those from being decoded when EVA is absent. Signed-off-by: James Hogan <[email protected]> Cc: Yongbok Kim <[email protected]> Cc: Aurelien Jarno <[email protected]> Reviewed-by: Yongbok Kim <[email protected]> Signed-off-by: Yongbok Kim <[email protected]>
7696414729b2d0f870c80ad1dd637d854bc78847
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/7696414729b2d0f870c80ad1dd637d854bc78847
2017-07-20 22:42:26+01:00
vvfat: limit number of entries in root directory in FAT12/FAT16 FAT12/FAT16 root directory is two sectors in size, which allows only 512 directory entries. Prevent QEMU startup if too much files exist, instead of overflowing root directory. Also introduce variable root_entries, which will be required for FAT32. Fixes: https://bugs.launchpad.net/qemu/+bug/1599539/comments/4 Signed-off-by: Hervé Poussineau <[email protected]> Signed-off-by: Kevin Wolf <[email protected]>
6817efea3a0d1bf87be815970cdb014c5a64b628
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/6817efea3a0d1bf87be815970cdb014c5a64b628
2017-07-10 13:18:05+02:00
virtio-scsi-ccw: use ioeventfd even when KVM is disabled This patch is based on a similar patch from Stefan Hajnoczi - commit c324fd0a39c ("virtio-pci: use ioeventfd even when KVM is disabled") Do not check kvm_eventfds_enabled() when KVM is disabled since it always returns 0. Since commit 8c56c1a592b5092d91da8d8943c17777d6462a6f ("memory: emulate ioeventfd") it has been possible to use ioeventfds in qtest or TCG mode. This patch makes -device virtio-scsi-ccw,iothread=iothread0 work even when KVM is disabled. Currently we don't have an equivalent to "memory: emulate ioeventfd" for ccw yet, but that this doesn't hurt and qemu-iotests 068 can pass with skipping iothread arguments. I have tested that virtio-scsi-ccw works under tcg both with and without iothread. This patch fixes qemu-iotests 068, which was accidentally merged early despite the dependency on ioeventfd. Signed-off-by: QingFeng Hao <[email protected]> Reviewed-by: Cornelia Huck <[email protected]> Message-Id: <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Christian Borntraeger <[email protected]>
cda3c19ff56d1b567631ce17f7a3bdb47cfa9455
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/cda3c19ff56d1b567631ce17f7a3bdb47cfa9455
2017-07-05 19:45:02+02:00
target-arm: v7M: ignore writes to CONTROL.SPSEL from Thread mode For v7M, writes to the CONTROL register are only permitted for privileged code. However even if the code is privileged, the write must not affect the SPSEL bit in the CONTROL register if the CPU is in Thread mode (as documented in the pseudocode for the MSR instruction). Implement this, instead of permitting SPSEL to be written in all cases. This was causing mbed applications not to run, because the RTX RTOS they use relies on this behaviour. Signed-off-by: Peter Maydell <[email protected]> Reviewed-by: Philippe Mathieu-Daudé <[email protected]> Message-id: [email protected]
792dac309c8660306557ba058b8b5a6a75ab3c1f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/792dac309c8660306557ba058b8b5a6a75ab3c1f
2017-07-11 11:21:26+01:00
block: Exploit BDRV_BLOCK_EOF for larger zero blocks When we have a BDS with unallocated clusters, but asking the status of its underlying bs->file or backing layer encounters an end-of-file condition, we know that the rest of the unallocated area will read as zeroes. However, pre-patch, this required two separate calls to bdrv_get_block_status(), as the first call stops at the point where the underlying file ends. Thanks to BDRV_BLOCK_EOF, we can now widen the results of the primary status if the secondary status already includes BDRV_BLOCK_ZERO. In turn, this fixes a TODO mentioned in iotest 154, where we can now see that all sectors in a partial cluster at the end of a file read as zero when coupling the shorter backing file's status along with our knowledge that the remaining sectors came from an unallocated cluster. Also, note that the loop in bdrv_co_get_block_status_above() had an inefficent exit: in cases where the active layer sets BDRV_BLOCK_ZERO but does NOT set BDRV_BLOCK_ALLOCATED (namely, where we know we read zeroes merely because our unallocated clusters lie beyond the backing file's shorter length), we still ended up probing the backing layer even though we already had a good answer. Signed-off-by: Eric Blake <[email protected]> Message-Id: <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]> Signed-off-by: Fam Zheng <[email protected]>
c61e684e44272f2acb2bef34cf2aa234582a73a9
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c61e684e44272f2acb2bef34cf2aa234582a73a9
2017-06-30 21:48:06+08:00
shippable: do not initialize submodules automatically instead do it in the 'ci' target when needed. for mips64el-softmmu target: use dtc submodule if distrib packages are too old. example with outdated libfdt on mips64el-softmmu target (required is >= 1.4.2): # dpkg-query --showformat='${Version}\n' --show libfdt-dev 1.4.0+dfsg-1 shippable output: ---------------- LINK mips64el-softmmu/qemu-system-mips64el ../hw/core/loader-fit.o: In function `load_fit': /root/src/github.com/philmd/qemu/hw/core/loader-fit.c:278: undefined reference to `fdt_first_subnode' /root/src/github.com/philmd/qemu/hw/core/loader-fit.c:286: undefined reference to `fdt_next_subnode' /root/src/github.com/philmd/qemu/hw/core/loader-fit.c:277: undefined reference to `fdt_first_subnode' collect2: error: ld returned 1 exit status Makefile:201: recipe for target 'qemu-system-mips64el' failed make[1]: *** [qemu-system-mips64el] Error 1 Makefile:327: recipe for target 'subdir-mips64el-softmmu' failed make: *** [subdir-mips64el-softmmu] Error 2 Signed-off-by: Philippe Mathieu-Daudé <[email protected]> Reviewed-by: Alex Bennée <[email protected]> Signed-off-by: Alex Bennée <[email protected]>
a825ca06137f9a48d59fd2846d5f831f014f4f0f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a825ca06137f9a48d59fd2846d5f831f014f4f0f
2017-06-21 15:03:06+01:00
slirp: fix leak Spotted by ASAN: /x86_64/hmp/pc-0.12: ================================================================= ==22538==ERROR: LeakSanitizer: detected memory leaks Direct leak of 224 byte(s) in 1 object(s) allocated from: #0 0x7f0f63cdee60 in malloc (/lib64/libasan.so.3+0xc6e60) #1 0x556f11ff32d7 in tcp_newtcpcb /home/elmarco/src/qemu/slirp/tcp_subr.c:250 #2 0x556f11fdb1d1 in tcp_listen /home/elmarco/src/qemu/slirp/socket.c:688 #3 0x556f11fca9d5 in slirp_add_hostfwd /home/elmarco/src/qemu/slirp/slirp.c:1052 #4 0x556f11f8db41 in slirp_hostfwd /home/elmarco/src/qemu/net/slirp.c:506 #5 0x556f11f8dd83 in hmp_hostfwd_add /home/elmarco/src/qemu/net/slirp.c:535 There might be a better way to fix this, but calling slirp tcp_close() doesn't work. Signed-off-by: Marc-André Lureau <[email protected]> Signed-off-by: Samuel Thibault <[email protected]>
7d8246960e03dabf37726c01d231e89dfde9b229
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/7d8246960e03dabf37726c01d231e89dfde9b229
2017-05-27 23:34:47+02:00
input: Add trace event for empty keyboard queue When driving QEMU from the outside, we have basically no chance to determine how quickly the guest OS picks up key events, so we usually have to limit ourselves to very slow keyboard presses to make sure the guest always has enough chance to pick them up. This patch adds a trace events when the keyboarde queue is drained. An external driver can use that as hint that new keys can be pressed. Signed-off-by: Alexander Graf <[email protected]> Message-id: [email protected] Signed-off-by: Gerd Hoffmann <[email protected]>
2222e0a633070f7f3eafcc9d0e95e7f1a4e6fe36
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2222e0a633070f7f3eafcc9d0e95e7f1a4e6fe36
2017-05-03 14:20:12+02:00
util: Use g_malloc/g_free in envlist.c Change malloc/strdup/free to g_malloc/g_strdup/g_free in util/envlist.c. Remove NULL checks for pointers returned from g_malloc and g_strdup as they exit in case of failure. Also, update calls to envlist_create to reflect this. Free array and array contents returned by envlist_to_environ using g_free in bsd-user/main.c and linux-user/main.c. Update comments to reflect change in semantics. Signed-off-by: Saurav Sachidanand <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]> Reviewed-by: Philippe Mathieu-Daudé <[email protected]> Signed-off-by: Michael Tokarev <[email protected]>
ec45bbe5f1921c6553fbf9c0c76b358b0403c22d
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ec45bbe5f1921c6553fbf9c0c76b358b0403c22d
2017-05-07 09:57:51+03:00
block: Walk bs->children carefully in bdrv_drain_recurse The recursive bdrv_drain_recurse may run a block job completion BH that drops nodes. The coming changes will make that more likely and use-after-free would happen without this patch Stash the bs pointer and use bdrv_ref/bdrv_unref in addition to QLIST_FOREACH_SAFE to prevent such a case from happening. Since bdrv_unref accesses global state that is not protected by the AioContext lock, we cannot use bdrv_ref/bdrv_unref unconditionally. Fortunately the protection is not needed in IOThread because only main loop can modify a graph with the AioContext lock held. Signed-off-by: Fam Zheng <[email protected]> Message-Id: <[email protected]> Reviewed-by: Jeff Cody <[email protected]> Tested-by: Jeff Cody <[email protected]> Signed-off-by: Fam Zheng <[email protected]>
178bd438af5c95deef5073416c60396f88e97ec9
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/178bd438af5c95deef5073416c60396f88e97ec9
2017-04-18 22:56:28+08:00
rbd: Revert -blockdev and -drive parameter auth-supported This reverts half of commit 0a55679. We're having second thoughts on the QAPI schema (and thus the external interface), and haven't reached consensus, yet. Issues include: * The implementation uses deprecated rados_conf_set() key "auth_supported". No biggie. * The implementation makes -drive silently ignore invalid parameters "auth" and "auth-supported.*.X" where X isn't "auth". Fixable (in fact I'm going to fix similar bugs around parameter server), so again no biggie. * BlockdevOptionsRbd member @password-secret applies only to authentication method cephx. Should it be a variant member of RbdAuthMethod? * BlockdevOptionsRbd member @user could apply to both methods cephx and none, but I'm not sure it's actually used with none. If it isn't, should it be a variant member of RbdAuthMethod? * The client offers a *set* of authentication methods, not a list. Should the methods be optional members of BlockdevOptionsRbd instead of members of list @auth-supported? The latter begs the question what multiple entries for the same method mean. Trivial question now that RbdAuthMethod contains nothing but @type, but less so when RbdAuthMethod acquires other members, such the ones discussed above. * How BlockdevOptionsRbd member @auth-supported interacts with settings from a configuration file specified with @conf is undocumented. I suspect it's untested, too. Let's avoid painting ourselves into a corner now, and revert the feature for 2.9. Note that users can still configure authentication methods with a configuration file. They probably do that anyway if they use Ceph outside QEMU as well. Further note that this doesn't affect use of key "auth-supported" in -drive file=rbd:...:key=value. qemu_rbd_array_opts()'s parameter @type now must be RBD_MON_HOST, which is silly. This will be cleaned up shortly. Signed-off-by: Markus Armbruster <[email protected]> Reviewed-by: Max Reitz <[email protected]> Reviewed-by: Eric Blake <[email protected]> Reviewed-by: Jeff Cody <[email protected]> Message-id: [email protected] Signed-off-by: Jeff Cody <[email protected]>
464444fcc161284ac0e743b99251debc297d5236
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/464444fcc161284ac0e743b99251debc297d5236
2017-03-28 10:01:21-04:00
win32: replace custom mutex and condition variable with native primitives The multithreaded TCG implementation exposed deadlocks in the win32 condition variables: as implemented, qemu_cond_broadcast waited on receivers, whereas the pthreads API it was intended to emulate does not. This was causing a deadlock because broadcast was called while holding the IO lock, as well as all possible waiters blocked on the same lock. This patch replaces all the custom synchronisation code for mutexes and condition variables with native Windows primitives (SRWlocks and condition variables) with the same semantics as their POSIX equivalents. To enable that, it requires a Windows Vista or newer host OS. Signed-off-by: Andrey Shedel <[email protected]> [AB: edited commit message] Signed-off-by: Andrew Baumann <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
12f8def0e02232d7c6416ad9b66640f973c531d1
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/12f8def0e02232d7c6416ad9b66640f973c531d1
2017-03-27 14:41:01+02:00
ui/console: ensure graphic updates don't race with TCG vCPUs Commit 8d04fb55.. tcg: drop global lock during TCG code execution ..broke the assumption that updates to the GUI couldn't happen at the same time as TCG vCPUs where running. As a result the TCG vCPU could still be updating a directly mapped frame-buffer while the display side was updating. This would cause artefacts to appear when the update code assumed that memory block hadn't changed. The simplest solution is to ensure the two things can't happen at the same time like the old BQL locking scheme. Here we use the solution introduced for MTTCG and schedule the update as async_safe_work when we know no vCPUs can be running. Reported-by: Mark Cave-Ayland <[email protected]> Signed-off-by: Alex Bennée <[email protected]> Message-id: [email protected] Cc: BALATON Zoltan <[email protected]> Cc: Gerd Hoffmann <[email protected]> Cc: Paolo Bonzini <[email protected]> Signed-off-by: Alex Bennée <[email protected]> [ kraxel: updated comment clarifying the display adapters are buggy and this is a temporary workaround ] Signed-off-by: Gerd Hoffmann <[email protected]>
8bb93c6f99a42c2e0943bc904b283cd622d302c5
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/8bb93c6f99a42c2e0943bc904b283cd622d302c5
2017-03-17 10:17:21+01:00
target-mips: fix compiler warnings (clang 5) static code analyzer complain: target/mips/helper.c:453:5: warning: Function call argument is an uninitialized value qemu_log_mask(CPU_LOG_MMU, ^~~~~~~~~~~~~~~~~~~~~~~~~~ 'physical' and 'prot' are uninitialized if 'ret' is not TLBRET_MATCH. Reported-by: Clang Static Analyzer Signed-off-by: Philippe Mathieu-Daudé <[email protected]> Reviewed-by: Yongbok Kim <[email protected]> Signed-off-by: Yongbok Kim <[email protected]>
def74c0cf05722b2e502d4b4f1219966c5b0cbd3
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/def74c0cf05722b2e502d4b4f1219966c5b0cbd3
2017-03-20 11:06:32+00:00
block: quiesce AioContext when detaching from it While it is true that bdrv_set_aio_context only works on a single BlockDriverState subtree (see commit message for 53ec73e, "block: Use bdrv_drain to replace uncessary bdrv_drain_all", 2015-07-07), it works at the AioContext level rather than the BlockDriverState level. Therefore, it is also necessary to trigger pending bottom halves too, even if no requests are pending. For NBD this ensures that the aio_co_schedule of a previous call to nbd_attach_aio_context is completed before detaching from the old AioContext; it fixes qemu-iotest 094. Another similar bug happens when the VM is stopped and the virtio-blk dataplane irqfd is torn down. In this case it's possible that guest I/O gets stuck if notify_guest_bh was scheduled but doesn't run. Calling aio_poll from another AioContext is safe if non-blocking; races such as the one mentioned in the commit message for c9d1a56 ("block: only call aio_poll on the current thread's AioContext", 2016-10-28) are a concern for blocking calls. I considered other options, including: - moving the bs->wakeup mechanism to AioContext, and letting the caller check. This might work for virtio which has a clear place to wakeup (notify_place_bh) and check the condition (virtio_blk_data_plane_stop). For aio_co_schedule I couldn't find a clear place to check the condition. - adding a dummy oneshot bottom half and waiting for it to trigger. This has the complication that bottom half list is LIFO for historical reasons. There were performance issues caused by bottom half ordering in the past, so I decided against it for 2.9. Fixes: 99723548561978da8ef44cf804fb7912698f5d88 Reported-by: Max Reitz <[email protected]> Reported-by: Halil Pasic <[email protected]> Tested-by: Halil Pasic <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]> Message-id: [email protected] Reviewed-by: Eric Blake <[email protected]> Signed-off-by: Max Reitz <[email protected]>
c2b6428d388b3f03261be7b0be770919e4e3e5ec
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c2b6428d388b3f03261be7b0be770919e4e3e5ec
2017-03-17 12:58:42+01:00
cirrus/vnc: zap bitblit support from console code. There is a special code path (dpy_gfx_copy) to allow graphic emulation notify user interface code about bitblit operations carryed out by guests. It is supported by cirrus and vnc server. The intended purpose is to optimize display scrolls and just send over the scroll op instead of a full display update. This is rarely used these days though because modern guests simply don't use the cirrus blitter any more. Any linux guest using the cirrus drm driver doesn't. Any windows guest newer than winxp doesn't ship with a cirrus driver any more and thus uses the cirrus as simple framebuffer. So this code tends to bitrot and bugs can go unnoticed for a long time. See for example commit "3e10c3e vnc: fix qemu crash because of SIGSEGV" which fixes a bug lingering in the code for almost a year, added by commit "c7628bf vnc: only alloc server surface with clients connected". Also the vnc server will throttle the frame rate in case it figures the network can't keep up (send buffers are full). This doesn't work with dpy_gfx_copy, for any copy operation sent to the vnc client we have to send all outstanding updates beforehand, otherwise the vnc client might run the client side blit on outdated data and thereby corrupt the display. So this dpy_gfx_copy "optimization" might even make things worse on slow network links. Lets kill it once for all. Oh, and one more reason: Turns out (after writing the patch) we have a security bug in that code path ... Fixes: CVE-2016-9603 Signed-off-by: Gerd Hoffmann <[email protected]> Message-id: [email protected]
50628d3479e4f9aa97e323506856e394fe7ad7a6
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/50628d3479e4f9aa97e323506856e394fe7ad7a6
2017-03-16 08:58:15+01:00
virtio: destroy region cache during reset We don't destroy region cache during reset which can make the maps of previous driver leaked to a buggy or malicious driver that don't set vring address before starting to use the device. Fix this by destroy the region cache during reset and validate it before trying to see them. Cc: Cornelia Huck <[email protected]> Cc: Paolo Bonzini <[email protected]> Reviewed-by: Cornelia Huck <[email protected]> Signed-off-by: Jason Wang <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]>
e0e2d644096c79a71099b176d08f465f6803a8b1
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/e0e2d644096c79a71099b176d08f465f6803a8b1
2017-03-15 19:37:19+02:00
nbd/client: fix drop_sync [CVE-2017-2630] Comparison symbol is misused. It may lead to memory corruption. Introduced in commit 7d3123e. Signed-off-by: Vladimir Sementsov-Ogievskiy <[email protected]> Message-Id: <[email protected]> [eblake: add CVE details, update conditional] Signed-off-by: Eric Blake <[email protected]> Reviewed-by: Marc-André Lureau <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
2563c9c6b8670400c48e562034b321a7cf3d9a85
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2563c9c6b8670400c48e562034b321a7cf3d9a85
2017-03-14 14:41:19+01:00
hw/intc/arm_gic: modernise the DPRINTF While I was debugging the icount issues I realised a bunch of the messages look quite similar. I've fixed this by including __func__ in the debug print. At the same time I move the a modern if (GATE) style printf which ensures the compiler can check for format string errors even if the code gets optimised away in the non-DEBUG_GIC case. Signed-off-by: Alex Bennée <[email protected]> Reviewed-by: Peter Maydell <[email protected]> Reviewed-by: Philippe Mathieu-Daudé <[email protected]>
68bf93ce9dc5c84c45a827ce2bd6eab768524e79
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/68bf93ce9dc5c84c45a827ce2bd6eab768524e79
2017-03-09 10:41:49+00:00
target/ppc: add ov32 flag for multiply low insns For Multiply Word: SO, OV, and OV32 bits reflects overflow of the 32-bit result For Multiply DoubleWord: SO, OV, and OV32 bits reflects overflow of the 64-bit result Signed-off-by: Nikunj A Dadhania <[email protected]> Reviewed-by: Richard Henderson <[email protected]> Signed-off-by: David Gibson <[email protected]>
61aa9a697a1ec9b102e86cb7ea96876e6f20afe3
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/61aa9a697a1ec9b102e86cb7ea96876e6f20afe3
2017-03-01 11:23:39+11:00
migration/vmstate: fix array of ptr with nullptrs Make VMS_ARRAY_OF_POINTER cope with null pointers. Previously the reward for trying to migrate an array with some null pointers in it was an illegal memory access, that is a swift and painless death of the process. Let's make vmstate cope with this scenario. The general approach is, when we encounter a null pointer (element), instead of following the pointer to save/load the data behind it, we save/load a placeholder. This way we can detect if we expected a null pointer at the load side but not null data was saved instead. Signed-off-by: Halil Pasic <[email protected]> Reviewed-by: Guenther Hutzl <[email protected]> Reviewed-by: Dr. David Alan Gilbert <[email protected]> Message-Id: <[email protected]> Signed-off-by: Dr. David Alan Gilbert <[email protected]>
07d4e69147b4957e617812206a62a86f03294ad3
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/07d4e69147b4957e617812206a62a86f03294ad3
2017-02-28 11:29:00+00:00
9pfs: local: lremovexattr: don't follow symlinks The local_lremovexattr() callback is vulnerable to symlink attacks because it calls lremovexattr() which follows symbolic links in all path elements but the rightmost one. This patch introduces a helper to emulate the non-existing fremovexattrat() function: it is implemented with /proc/self/fd which provides a trusted path that can be safely passed to lremovexattr(). local_lremovexattr() is converted to use this helper and opendir_nofollow(). This partly fixes CVE-2016-9602. Signed-off-by: Greg Kurz <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]>
72f0d0bf51362011c4d841a89fb8f5cfb16e0bf3
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/72f0d0bf51362011c4d841a89fb8f5cfb16e0bf3
2017-02-28 11:21:15+01:00
block/mirror: fix broken sparseness detection int64_t is in all likelihood the actual scalar type we want. Yep, really. Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1219541 Signed-off-by: John Snow <[email protected]> Reviewed-by: Jeff Cody <[email protected]> Signed-off-by: Jeff Cody <[email protected]>
39c11580f3af8a96a7fba9b8b80a047a0b88b0ec
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/39c11580f3af8a96a7fba9b8b80a047a0b88b0ec
2017-02-27 14:02:31-05:00
cpu-exec: fix icount out-of-bounds access When icount is active, tb_add_jump is surprisingly called with an out of bounds basic block index. I have no idea how that can work, but it does not seem like a good idea. Clear *last_tb for all TB_EXIT_ICOUNT_EXPIRED cases, even when all you have to do is refill icount_extra. Signed-off-by: Paolo Bonzini <[email protected]>
43d70ddf9f96b3ad037abe4d5f9f2768196b8c92
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/43d70ddf9f96b3ad037abe4d5f9f2768196b8c92
2017-02-16 14:06:56+01:00
s390x/kvm: fix small race reboot vs. cmma Right now we reset all devices before we reset the cmma states. This can result in the host kernel discarding guest pages that were previously in the unused state but already contain a bios or a -kernel file before the cmma reset has finished. This race results in random guest crashes or hangs during very early reboot. Fixes: 1cd4e0f6f0a6 ("s390x/cmma: clean up cmma reset") Cc: [email protected] Signed-off-by: Christian Borntraeger <[email protected]>
1a0e4c8b02ea510508970c333ee610a90b921cbb
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/1a0e4c8b02ea510508970c333ee610a90b921cbb
2017-02-01 09:11:56+01:00
pci: Convert msix_init() to Error and fix callers msix_init() reports errors with error_report(), which is wrong when it's used in realize(). The same issue was fixed for msi_init() in commit 1108b2f. In order to make the API change as small as possible, leave the return value check to later patch. For some devices(like e1000e, vmxnet3, nvme) who won't fail because of msix_init's failure, suppress the error report by passing NULL error object. Bonus: add comment for msix_init. CC: Jiri Pirko <[email protected]> CC: Gerd Hoffmann <[email protected]> CC: Dmitry Fleytman <[email protected]> CC: Jason Wang <[email protected]> CC: Michael S. Tsirkin <[email protected]> CC: Hannes Reinecke <[email protected]> CC: Paolo Bonzini <[email protected]> CC: Alex Williamson <[email protected]> CC: Markus Armbruster <[email protected]> CC: Marcel Apfelbaum <[email protected]> Signed-off-by: Cao jin <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]>
ee640c625e190a0c0e6b8966adc0e4720fb75200
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/ee640c625e190a0c0e6b8966adc0e4720fb75200
2017-02-01 03:37:18+02:00
ppc/pnv: fix xscom address translation for POWER9 High addresses can overflow the uint32_t pcba variable after the 8byte shift. Signed-off-by: Cédric Le Goater <[email protected]> Signed-off-by: David Gibson <[email protected]>
f81e551229070f01bf747eda3f05960182db9d2a
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f81e551229070f01bf747eda3f05960182db9d2a
2016-11-15 10:08:43+11:00
audio: es1370: add exit function Currently the es1370 device emulation doesn't have a exit function, hot unplug this device will leak some memory. Add a exit function to avoid this. Signed-off-by: Li Qiang <[email protected]> Reviewed-by: Marc-André Lureau <[email protected]> Message-id: [email protected] Signed-off-by: Gerd Hoffmann <[email protected]>
069eb7b2b8fc47c7cb52e5a4af23ea98d939e3da
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/069eb7b2b8fc47c7cb52e5a4af23ea98d939e3da
2017-01-11 09:19:03+01:00
qxl: switch to constants within BUILD_BUG_ON We are switching BUILD_BUG_ON to verify that it's parameter is a compile-time constant, and it turns out that some gcc versions (specifically gcc (Ubuntu 5.4.0-6ubuntu1~16.04.4) 5.4.0 20160609) are not smart enough to figure it out for expressions involving local variables. This is harmless but means that the check is ineffective for these platforms. To fix, replace variables with macros. Reported-by: Peter Maydell <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]> Reviewed-by: Eric Blake <[email protected]>
df45892c1290c6c853010b83e5afebe8740cb9fa
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/df45892c1290c6c853010b83e5afebe8740cb9fa
2017-01-31 15:57:27+02:00
virtio-pci: Fix cross-version migration with older machines This patch fixes a cross-version migration regression introduced by commit d1b4259f ("virtio-bus: Plug devices after features are negotiated"). The problem is encountered when host's vhost backend does not support VIRTIO_F_VERSION_1, and migration is initiated from a v2.7 or prior machine with virtio-pci modern capabilities enabled to a v2.8 machine. In this case, modern capabilities get exposed to the guest by the source, whereas the target will detect version 1 is not supported so will only expose legacy capabilities. The problem is fixed by introducing a new "x-ignore-backend-features" property, which is set in v2.7 and prior compatibility modes. Doing this, v2.7 machine keeps its broken behaviour (enabling modern while version is not supported), and newer machines will behave correctly. Reported-by: Michael Roth <[email protected]> Reviewed-by: Marcel Apfelbaum <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Tested-by: Michael Roth <[email protected]> Signed-off-by: Maxime Coquelin <[email protected]> Message-id: [email protected] Suggested-by: Stefan Hajnoczi <[email protected]> Cc: Michael S. Tsirkin <[email protected]> Cc: Cornelia Huck <[email protected]> Cc: Dr. David Alan Gilbert <[email protected]> Reviewed-by: Marcel Apfelbaum <[email protected]> Reviewed-by: Stefan Hajnoczi <[email protected]> Tested-by: Michael Roth <[email protected]> Signed-off-by: Maxime Coquelin <[email protected]> Signed-off-by: Stefan Hajnoczi <[email protected]>
66d1c4c19faff83e36075c7b61053d060a8ffc50
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/66d1c4c19faff83e36075c7b61053d060a8ffc50
2016-12-15 07:35:19+00:00
xen_disk: split discard input to match internal representation The guest sends discard requests as u64 sector/count pairs, but the block layer operates internally with s64/s32 pairs. The conversion leads to IO errors in the guest, the discard request is not processed. domU.cfg: 'vdev=xvda, format=qcow2, backendtype=qdisk, target=/x.qcow2' domU: mkfs.ext4 -F /dev/xvda Discarding device blocks: failed - Input/output error Fix this by splitting the request into chunks of BDRV_REQUEST_MAX_SECTORS. Add input range checking to avoid overflow. Fixes f313520 ("xen_disk: add discard support") Signed-off-by: Olaf Hering <[email protected]> Reviewed-by: Eric Blake <[email protected]> Reviewed-by: Stefano Stabellini <[email protected]>
7875efb9f641ed0e79320bf258ee69cd0bf03716
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/7875efb9f641ed0e79320bf258ee69cd0bf03716
2016-11-23 10:47:48-08:00
iotests: add transactional failure race test Add a regression test for the case found by Vladimir. Reported-by: Vladimir Sementsov-Ogievskiy <[email protected]> Signed-off-by: John Snow <[email protected]> Reviewed-by: Kevin Wolf <[email protected]> Message-id: [email protected] Signed-off-by: Jeff Cody <[email protected]>
0aef09b9c916e8824cabc55a7fd2ca1609b94810
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/0aef09b9c916e8824cabc55a7fd2ca1609b94810
2016-11-14 22:47:34-05:00
qapi: Fix crash when 'any' or 'null' parameter is missing Unlike the other visit methods, visit_type_any() and visit_type_null() neglect to check whether qmp_input_get_object() succeeded. They crash when it fails. Reproducer: { "execute": "qom-set", "arguments": { "path": "/machine", "property": "rtc-time" } } Will crash with: qapi/qapi-visit-core.c:277: visit_type_any: Assertion `!err != !*obj' failed Broken in commit 5c678ee. Fix by adding the missing error checks. Signed-off-by: Marc-André Lureau <[email protected]> Reviewed-by: Eric Blake <[email protected]> Message-Id: <[email protected]> Reviewed-by: Markus Armbruster <[email protected]> [Commit message rephrased] Signed-off-by: Markus Armbruster <[email protected]>
c489780203f9b22aca5539ec7589b7140bdc951f
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c489780203f9b22aca5539ec7589b7140bdc951f
2016-10-06 14:47:41+02:00
nbd: Use CoQueue for free_sema instead of CoMutex NBD is using the CoMutex in a way that wasn't anticipated. For example, if there are N(N=26, MAX_NBD_REQUESTS=16) nbd write requests, so we will invoke nbd_client_co_pwritev N times. ---------------------------------------------------------------------------------------- time request Actions 1 1 in_flight=1, Coroutine=C1 2 2 in_flight=2, Coroutine=C2 ... 15 15 in_flight=15, Coroutine=C15 16 16 in_flight=16, Coroutine=C16, free_sema->holder=C16, mutex->locked=true 17 17 in_flight=16, Coroutine=C17, queue C17 into free_sema->queue 18 18 in_flight=16, Coroutine=C18, queue C18 into free_sema->queue ... 26 N in_flight=16, Coroutine=C26, queue C26 into free_sema->queue ---------------------------------------------------------------------------------------- Once nbd client recieves request No.16' reply, we will re-enter C16. It's ok, because it's equal to 'free_sema->holder'. ---------------------------------------------------------------------------------------- time request Actions 27 16 in_flight=15, Coroutine=C16, free_sema->holder=C16, mutex->locked=false ---------------------------------------------------------------------------------------- Then nbd_coroutine_end invokes qemu_co_mutex_unlock what will pop coroutines from free_sema->queue's head and enter C17. More free_sema->holder is C17 now. ---------------------------------------------------------------------------------------- time request Actions 28 17 in_flight=16, Coroutine=C17, free_sema->holder=C17, mutex->locked=true ---------------------------------------------------------------------------------------- In above scenario, we only recieves request No.16' reply. As time goes by, nbd client will almostly recieves replies from requests 1 to 15 rather than request 17 who owns C17. In this case, we will encounter assert "mutex->holder == self" failed since Kevin's commit 0e438cdc "coroutine: Let CoMutex remember who holds it". For example, if nbd client recieves request No.15' reply, qemu will stop unexpectedly: ---------------------------------------------------------------------------------------- time request Actions 29 15(most case) in_flight=15, Coroutine=C15, free_sema->holder=C17, mutex->locked=false ---------------------------------------------------------------------------------------- Per Paolo's suggestion "The simplest fix is to change it to CoQueue, which is like a condition variable", this patch replaces CoMutex with CoQueue. Cc: Wen Congyang <[email protected]> Reported-by: zhanghailiang <[email protected]> Suggested-by: Paolo Bonzini <[email protected]> Signed-off-by: Changlong Xie <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
9bc9732faeff09828fe38c0ebe2401ee131a6fca
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/9bc9732faeff09828fe38c0ebe2401ee131a6fca
2016-11-01 16:06:57+01:00
linux-user: Don't use alloca() for epoll_wait's epoll event array The epoll event array which epoll_wait() allocates has a size determined by the guest which could potentially be quite large. Use g_try_new() rather than alloca() so that we can fail more cleanly if the guest hands us an oversize value. (ENOMEM is not a documented return value for epoll_wait() but in practice some kernel configurations can return it -- see for instance sys_oabi_epoll_wait() on ARM.) This rearrangement includes fixing a bug where we were incorrectly passing a negative length to unlock_user() in the error-exit codepath. Signed-off-by: Peter Maydell <[email protected]> Signed-off-by: Riku Voipio <[email protected]>
04c95f4da7f657a0bef17d115d0a5ca2ac0e2d22
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/04c95f4da7f657a0bef17d115d0a5ca2ac0e2d22
2016-10-21 15:19:41+03:00
9pfs: fix memory leak in v9fs_link The v9fs_link() function keeps a reference on the source fid object. This causes a memory leak since the reference never goes down to 0. This patch fixes the issue. Signed-off-by: Li Qiang <[email protected]> Reviewed-by: Greg Kurz <[email protected]> [groug, rephrased the changelog] Signed-off-by: Greg Kurz <[email protected]>
4c1586787ff43c9acd18a56c12d720e3e6be9f7c
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/4c1586787ff43c9acd18a56c12d720e3e6be9f7c
2016-10-17 14:13:58+02:00
libqos: Correct error in PCI hole sizing for spapr In pci-spapr.c (as in pci-pc.c from which it was derived), the pci_hole_start/pci_hole_size and pci_iohole_start/pci_iohole_size pairs[1] essentially define the region of PCI (not CPU) addresses in which MMIO or PIO BARs respectively will be allocated. The size value is relative to the start value. But in pci-spapr.c it is set to the entire size of the window supported by the (emulated) hardware, but the start values are *not* at the beginning of the emulated windows. That means if you tried to map enough PCI BARs, we'd messily overrun the IO windows, instead of failing in iomap as we should. This patch corrects this by calculating the hole sizes from the location of the window in PCI space and the hole start. [1] Those are bad names, but that's a problem for another time. Signed-off-by: David Gibson <[email protected]> Reviewed-by: Laurent Vivier <[email protected]>
c711369087d5964ea77b0fd0e0ff1f268e1a67ee
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/c711369087d5964ea77b0fd0e0ff1f268e1a67ee
2016-10-16 12:03:09+11:00
hw/ppc/spapr: Use POWER8 by default for the pseries-2.8 machine A couple of distributors are compiling their distributions with "-mcpu=power8" for ppc64le these days, so the user sooner or later runs into a crash there when not explicitely specifying the "-cpu POWER8" option to QEMU (which is currently using POWER7 for the "pseries" machine by default). Due to this reason, the linux-user target already switched to POWER8 a while ago (see commit de3f1b98410e0d5b406a0df3a48547b559d18602). Since the softmmu target of course has the same problem, we should switch there to POWER8 for the newer machine types, too. Signed-off-by: Thomas Huth <[email protected]> Signed-off-by: David Gibson <[email protected]>
3daa4a9f9580ffda47df93c7c53371af226bf970
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/3daa4a9f9580ffda47df93c7c53371af226bf970
2016-10-06 16:15:53+11:00
util/qht: atomically set b->hashes ThreadSanitizer detects a possible race between reading/writing the hashes. The ordering semantics are already documented for QHT however for true C11 compliance we should use relaxed atomic primitives for accesses that are done across threads. On x86 this slightly changes to the code to not do a load/compare in a single instruction leading to a slight performance degradation. Running 'taskset -c 0 tests/qht-bench -n 1 -d 10' (i.e. all lookups) 10 times, we get: before the patch: $ ./mean.pl 34.04 34.24 34.38 34.25 34.18 34.51 34.46 34.44 34.29 34.08 34.287 +- 0.160072900059109 after: $ ./mean.pl 33.94 34.00 33.52 33.46 33.55 33.71 34.27 34.06 34.28 34.58 33.937 +- 0.374731014640279 Signed-off-by: Alex Bennée <[email protected]> Reviewed-by: Emilio G. Cota <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
a890643958f03aaa344290700093b280cb606c28
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/a890643958f03aaa344290700093b280cb606c28
2016-10-04 10:00:26+02:00
seqlock: use atomic writes for the sequence There is a data race if the sequence is written concurrently to the read. In C11 this has undefined behavior. Use atomic_set; the read side is already using atomic_read. Reported-by: Alex Bennée <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]> Signed-off-by: Alex Bennée <[email protected]> Message-Id: <[email protected]> Signed-off-by: Paolo Bonzini <[email protected]>
f96a8cc3c633b25d9269337408ae2417ebbbad8e
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f96a8cc3c633b25d9269337408ae2417ebbbad8e
2016-10-04 10:00:26+02:00
virtio: stop virtqueue processing if device is broken QEMU prints an error message and exits when the device enters an invalid state. Terminating the process is heavy-handed. The guest may still be able to function even if there is a bug in a virtio guest driver. Moreover, exiting is a bug in nested virtualization where a nested guest could DoS other nested guests by killing a pass-through virtio device. I don't think this configuration is possible today but it is likely in the future. If the broken flag is set, do not process virtqueues or write back used descriptors. The broken flag can be cleared again by resetting the device. Signed-off-by: Stefan Hajnoczi <[email protected]> Reviewed-by: Cornelia Huck <[email protected]> Reviewed-by: Michael S. Tsirkin <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]> Reviewed-by: Cornelia Huck <[email protected]>
f5ed36635d8fa73feb66fe12b3b9c2ed90a1adbe
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/f5ed36635d8fa73feb66fe12b3b9c2ed90a1adbe
2016-09-23 19:03:55+03:00
linux-user: Check for bad event numbers in epoll_wait The kernel checks that the maxevents parameter to epoll_wait is non-negative and not larger than EP_MAX_EVENTS. Add this check to our implementation, so that: * we fail these cases EINVAL rather than EFAULT * we don't pass negative or overflowing values to the lock_user() size calculation Signed-off-by: Peter Maydell <[email protected]> Signed-off-by: Riku Voipio <[email protected]>
2ba7fae3bd688f5bb6cb08defc731d77e6bd943c
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/2ba7fae3bd688f5bb6cb08defc731d77e6bd943c
2016-09-21 14:25:26+03:00
9pfs: drop duplicate line in proxy backend This double free did not cause harm because v9fs_string_free() sets str->data to NULL and g_free(NULL) is valid. Signed-off-by: Greg Kurz <[email protected]> Reviewed-by: Cédric Le Goater <[email protected]>
da4bc86c540991902e32e4e840c6ada573240254
qemu
devign
1
https://github.com/qemu/qemu
https://github.com/qemu/qemu/commit/da4bc86c540991902e32e4e840c6ada573240254
2016-09-16 08:56:14+02:00