From patchwork Thu Sep 3 20:58:18 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Michael Roth X-Patchwork-Id: 11755187 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id CAF1B91F for ; Thu, 3 Sep 2020 21:22:50 +0000 (UTC) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 8C144206CA for ; Thu, 3 Sep 2020 21:22:50 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="FoaRK2s2" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 8C144206CA Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.vnet.ibm.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=qemu-devel-bounces+patchwork-qemu-devel=patchwork.kernel.org@nongnu.org Received: from localhost ([::1]:38372 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1kDwgz-0006B4-NI for patchwork-qemu-devel@patchwork.kernel.org; Thu, 03 Sep 2020 17:22:49 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:58104) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1kDwKr-00037B-3m; Thu, 03 Sep 2020 16:59:57 -0400 Received: from mail-oi1-x234.google.com ([2607:f8b0:4864:20::234]:36323) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1kDwKo-0007Ks-Uh; Thu, 03 Sep 2020 16:59:56 -0400 Received: by mail-oi1-x234.google.com with SMTP id x19so4532277oix.3; Thu, 03 Sep 2020 13:59:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=V/t05viFYVaWK/NddZJs/GLGe3UHgBl4Twmpwr+TQYo=; b=FoaRK2s2np2rKsM1vv+N4e+jTqEItK8FAOWHrrTPOKaXIAYduOs8zFAqBO2OkTiCTi iJR1DZTDDa9Nv6R7T1pKKazbFigCw34MCTUgehRMI+sEJCtQHC0OrvaHQp0s4xisGODq quptusmL6DipBZYC5l5jzIdZx0F7oJELyC89q9kBZUVSzRQCAg2UgUgNbrUd0e7YxDrc ddNQaIZ9XPonAzc8HY3qjCTgLCXUWOKQYSz7+ZN4X7YuJE4CllTcuKVZ/YsqxufzfNsg i1q6iTLiavltbsT6F+EJjzsBHsjhxZjvl7LjH5xUSHdVmQycgQ50rRxONuuCujWhBWFG 2g+w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id :mime-version:content-transfer-encoding; bh=V/t05viFYVaWK/NddZJs/GLGe3UHgBl4Twmpwr+TQYo=; b=BSqQGGlvtTiNSlDJYPjdgF9hqgfw59t/Eidj80CSwrj7Ytn46GEmaPgYcbMf2ycHWc 080nXfsFUFv+Pj31H0w63E/mTL6hDA3ilpOQVzNPkbfqb8e2AUxzUKkOW+ftTRiwgDrk li+TjcVLyKK/gVZp8X6UIyRdhJ1mT7Y00/aRYmXT+dmZwaB0Ds/wT0fGU45hwt2jI5g5 N3VEMzPSg0T631EYUfCKPYM6Mm3DSJGVmxdLeT0jYJv59W10cQjlRE9ILa5fhKvz+AzZ hdBcSveWXc+l9/wD65za2Up2JsKS4E6aHqAs4A0jtCmQKSybiMqV/mJ2ivtqO9RaYqnN v4LQ== X-Gm-Message-State: AOAM530kM7rkhlVEsASCpGDrd0IyRdcwed9Gfi7qGryuy+EBLJ0FSw08 Gb8/ZKhFYZO/in5zN1GRQpRFmpSvh5Q= X-Google-Smtp-Source: ABdhPJzXqaP7cfnILLR7hz6RoMk3MT8Eo8JgnA90v1jyKztq9KILNKzG01vIl+TRK9AlQZKkGG+ABw== X-Received: by 2002:aca:bf54:: with SMTP id p81mr3202936oif.8.1599166792962; Thu, 03 Sep 2020 13:59:52 -0700 (PDT) Received: from localhost (76-251-165-188.lightspeed.austtx.sbcglobal.net. [76.251.165.188]) by smtp.gmail.com with ESMTPSA id p9sm759111oti.22.2020.09.03.13.59.52 (version=TLS1_2 cipher=ECDHE-ECDSA-CHACHA20-POLY1305 bits=256/256); Thu, 03 Sep 2020 13:59:52 -0700 (PDT) From: Michael Roth To: qemu-devel@nongnu.org Subject: [PATCH 00/77] Patch Round-up for stable 5.0.1, freeze on 2020-09-10 Date: Thu, 3 Sep 2020 15:58:18 -0500 Message-Id: <20200903205935.27832-1-mdroth@linux.vnet.ibm.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Received-SPF: pass client-ip=2607:f8b0:4864:20::234; envelope-from=flukshun@gmail.com; helo=mail-oi1-x234.google.com X-detected-operating-system: by eggs.gnu.org: No matching host in p0f cache. That's all we know. X-Spam_score_int: -16 X-Spam_score: -1.7 X-Spam_bar: - X-Spam_report: (-1.7 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.249, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: qemu-stable@nongnu.org Errors-To: qemu-devel-bounces+patchwork-qemu-devel=patchwork.kernel.org@nongnu.org Sender: "Qemu-devel" Hi everyone, The following new patches are queued for QEMU stable v5.0.1: https://github.com/mdroth/qemu/commits/stable-5.0-staging Patch freeze is 2020-09-10, and the release is planned for 2020-09-15: https://wiki.qemu.org/Planning/5.0 Please respond here or CC qemu-stable@nongnu.org on any additional patches you think should be included in the release. Thanks! ---------------------------------------------------------------- Alexander Duyck (3): virtio-balloon: Prevent guest from starting a report when we didn't request one virtio-balloon: Add locking to prevent possible race when starting hinting virtio-balloon: Replace free page hinting references to 'report' with 'hint' Alistair Francis (1): hw/riscv: Allow 64 bit access to SiFive CLINT Allan Peramaki (1): hw/audio/gus: Fix registers 32-bit access Andrew Melnychenko (1): virtio-pci: Changed vdev to proxy for VirtIO PCI BAR callbacks. Christian Schoenebeck (1): xen-9pfs: Fix log messages of reply errors Cornelia Huck (3): linux-headers: update against Linux 5.7-rc3 virtio: list legacy-capable devices virtio: verify that legacy support is not accidentally on Dan Robertson (1): 9pfs: include linux/limits.h for XATTR_SIZE_MAX David Hildenbrand (4): virtio-balloon: fix free page hinting without an iothread virtio-balloon: fix free page hinting check on unrealize virtio-balloon: unref the iothread when unrealizing virtio-balloon: always indicate S_DONE when migration fails Eric Blake (4): nbd/server: Avoid long error message assertions CVE-2020-10761 block: Call attention to truncation of long NBD exports nbd: Avoid off-by-one in long export name truncation nbd: Fix large trim/zero requests Gerd Hoffmann (1): usb: fix setup_len init (CVE-2020-14364) Graeme Gregory (1): hw/arm/sbsa-ref: fix typo breaking PCIe IRQs Greg Kurz (1): 9p: Lock directory streams with a CoMutex Helge Deller (2): Fix tulip breakage hw/display/artist: Unbreak size mismatch memory accesses Igor Mammedov (1): hostmem: don't use mbind() if host-nodes is empty Jason Wang (1): net: use peer when purging queue in qemu_flush_or_purge_queue_packets() Kevin Wolf (1): iotests/283: Use consistent size for source and target Laurent Vivier (1): xhci: fix valid.max_access_size to access address registers Liu Yi L (1): intel_iommu: Use correct shift for 256 bits qi descriptor Marc-André Lureau (1): qga: fix assert regression on guest-shutdown Mark Cave-Ayland (1): Update OpenBIOS images to 7f28286f built from submodule. Markus Armbruster (4): net/virtio: Fix failover_replug_primary() return value regression error: Use error_reportf_err() where appropriate usb/dev-mtp: Fix Error double free after inotify failure qdev: Fix device_add DRIVER,help to print to monitor Max Reitz (3): virtiofsd: Whitelist fchmod block: Fix bdrv_aligned_p*v() for qiov_offset != 0 iotests/028: Add test for cross-base-EOF reads Michael S. Tsirkin (1): memory: Revert "memory: accept mismatching sizes in memory_region_access_valid" Michael Tokarev (1): acpi: accept byte and word access to core ACPI registers Michal Privoznik (2): util: Introduce qemu_get_host_name() qga: Use qemu_get_host_name() instead of g_get_host_name() Niek Linnenbank (1): docs/orangepi: Add instructions for resizing SD image to power of two Omar Sandoval (1): 9pfs: local: ignore O_NOATIME if we don't have permissions Paolo Bonzini (3): KVM: x86: believe what KVM says about WAITPKG libqos: usb-hcd-ehci: use 32-bit write for config register libqos: pci-pc: use 32-bit write for EJ register Pavel Dovgaluk (3): tests/acceptance: allow console interaction with specific VMs tests/acceptance: refactor boot_linux to allow code reuse tests/acceptance: refactor boot_linux_console test to allow code reuse Philippe Mathieu-Daudé (9): hw/net/e1000e: Do not abort() on invalid PSRCTL register value tests/acceptance/boot_linux: Tag tests using a SD card with 'device:sd' tests/acceptance/boot_linux: Expand SD card image to power of 2 hw/sd/sdcard: Restrict Class 6 commands to SCSD cards hw/sd/sdcard: Simplify realize() a bit hw/sd/sdcard: Do not allow invalid SD card sizes hw/sd/sdcard: Update coding style to make checkpatch.pl happy hw/sd/sdcard: Do not switch to ReceivingData if address is invalid libvhost-user: Report descriptor index on panic Prasad J Pandit (2): ati-vga: check mm_index before recursive call (CVE-2020-13800) es1370: check total frame count against current frame Raphael Pour (1): qemu-nbd: Close inherited stderr Richard Henderson (2): target/arm: Clear tail in gvec_fmul_idx_*, gvec_fmla_idx_* target/hppa: Free some temps in do_sub Sergei Trofimovich (1): linux-user/strace.list: fix epoll_create{,1} -strace output Stefan Berger (2): tpm: tpm_spapr: Exit on TPM backend failures tests: tpm: Skip over pcrUpdateCounter byte in result comparison Stefan Hajnoczi (4): virtiofsd: add --rlimit-nofile=NUM option virtiofsd: stay below fs.file-max sysctl value (CVE-2020-10717) aio-posix: don't duplicate fd handler deletion in fdmon_io_uring_destroy() aio-posix: disable fdmon-io_uring when GSource is used Stefano Stabellini (2): Revert "9p: init_in_iov_from_pdu can truncate the size" xen/9pfs: yield when there isn't enough room on the ring Thomas Huth (1): net: Do not include a newline in the id of -nic devices Vladimir Sementsov-Ogievskiy (1): migration/block-dirty-bitmap: fix dirty_bitmap_mig_before_vm_start Yuri Benditovich (1): virtio-net: align RSC fields with updated virtio-net header lichun (1): chardev/tcp: Fix error message double free error backends/hostmem.c | 6 +- block.c | 7 +- block/io.c | 10 +- block/nbd.c | 21 ++-- chardev/char-socket.c | 8 +- contrib/libvhost-user/libvhost-user.c | 4 +- docs/system/arm/orangepi.rst | 16 ++- hw/9pfs/9p-util.h | 13 ++ hw/9pfs/9p.c | 34 ++---- hw/9pfs/9p.h | 10 +- hw/9pfs/virtio-9p-device.c | 11 +- hw/9pfs/xen-9p-backend.c | 41 +++++-- hw/acpi/core.c | 9 +- hw/arm/sbsa-ref.c | 2 +- hw/audio/es1370.c | 7 +- hw/audio/gusemu_hal.c | 2 +- hw/audio/gusemu_mixer.c | 2 +- hw/display/artist.c | 12 +- hw/display/ati.c | 10 +- hw/i386/intel_iommu.c | 7 +- hw/i386/intel_iommu_internal.h | 3 +- hw/net/e1000e_core.c | 10 +- hw/net/tulip.c | 6 - hw/net/virtio-net.c | 29 +---- hw/riscv/sifive_clint.c | 2 +- hw/s390x/virtio-ccw.c | 6 + hw/sd/pxa2xx_mmci.c | 4 +- hw/sd/sd.c | 90 ++++++++++---- hw/tpm/tpm_spapr.c | 5 +- hw/usb/core.c | 16 ++- hw/usb/dev-mtp.c | 11 +- hw/usb/hcd-xhci.c | 4 +- hw/virtio/virtio-balloon.c | 133 ++++++++++++--------- hw/virtio/virtio-pci.c | 38 ++++-- hw/virtio/virtio.c | 25 ++++ include/block/aio.h | 3 + include/hw/virtio/virtio-balloon.h | 20 ++-- include/hw/virtio/virtio.h | 2 + include/qemu/osdep.h | 10 ++ include/standard-headers/linux/ethtool.h | 10 +- include/standard-headers/linux/input-event-codes.h | 5 +- include/standard-headers/linux/pci_regs.h | 2 + include/standard-headers/linux/vhost_types.h | 8 ++ include/standard-headers/linux/virtio_balloon.h | 12 +- include/standard-headers/linux/virtio_ids.h | 1 + include/standard-headers/linux/virtio_net.h | 102 +++++++++++++++- linux-headers/COPYING | 2 + linux-headers/asm-x86/kvm.h | 1 + linux-headers/asm-x86/unistd_32.h | 1 + linux-headers/asm-x86/unistd_64.h | 1 + linux-headers/asm-x86/unistd_x32.h | 1 + linux-headers/linux/kvm.h | 47 +++++++- linux-headers/linux/mman.h | 5 +- linux-headers/linux/userfaultfd.h | 40 +++++-- linux-headers/linux/vfio.h | 37 ++++++ linux-headers/linux/vhost.h | 24 ++++ linux-user/strace.list | 4 +- memory.c | 29 ++--- migration/block-dirty-bitmap.c | 2 +- nbd/server.c | 51 ++++++-- net/net.c | 4 +- pc-bios/openbios-ppc | Bin 696912 -> 696912 bytes pc-bios/openbios-sparc32 | Bin 382048 -> 382048 bytes pc-bios/openbios-sparc64 | Bin 1593408 -> 1593408 bytes qdev-monitor.c | 2 +- qemu-nbd.c | 13 +- qga/commands.c | 17 ++- qga/main.c | 6 +- roms/openbios | 2 +- scsi/qemu-pr-helper.c | 4 +- target/arm/vec_helper.c | 2 + target/hppa/translate.c | 2 + target/i386/cpu.c | 3 + target/i386/kvm.c | 11 +- target/i386/kvm_i386.h | 1 + tests/acceptance/avocado_qemu/__init__.py | 13 +- tests/acceptance/boot_linux.py | 49 ++++---- tests/acceptance/boot_linux_console.py | 55 ++++++--- tests/qemu-iotests/028 | 19 +++ tests/qemu-iotests/028.out | 11 ++ tests/qemu-iotests/143 | 4 + tests/qemu-iotests/143.out | 2 + tests/qemu-iotests/283 | 6 +- tests/qemu-iotests/283.out | 2 +- tests/qtest/libqos/pci-pc.c | 2 +- tests/qtest/tpm-util.c | 6 +- tests/qtest/usb-hcd-ehci-test.c | 2 +- tools/virtiofsd/fuse_lowlevel.h | 1 + tools/virtiofsd/helper.c | 47 ++++++++ tools/virtiofsd/passthrough_ll.c | 22 ++-- tools/virtiofsd/seccomp.c | 1 + util/aio-posix.c | 13 ++ util/aio-win32.c | 4 + util/async.c | 1 + util/fdmon-io_uring.c | 13 +- util/oslib-posix.c | 35 ++++++ util/oslib-win32.c | 13 ++ 97 files changed, 1045 insertions(+), 377 deletions(-)