* [PATCHv2] qemu: Upgrade to 2.8.0
@ 2017-01-12 16:19 Aníbal Limón
2017-01-16 16:36 ` Burton, Ross
0 siblings, 1 reply; 9+ messages in thread
From: Aníbal Limón @ 2017-01-12 16:19 UTC (permalink / raw)
To: openembedded-core
Rebased patches:
- exclude-some-arm-EABI-obsolete-syscalls.patc
Removed patches (already in upstream):
- 0001-pci-assign-sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch
- 0002-fix-CVE-2016-7423.patch
- 0003-fix-CVE-2016-7908.patch
- 0004-fix-CVE-2016-7909.patch
- Qemu-Arm-versatilepb-Add-memory-size-checking.patch
- 0001-target-mips-add-24KEc-CPU-definition.patch
Changelog,
http://wiki.qemu.org/ChangeLog/2.8
Signed-off-by: Aníbal Limón <anibal.limon@linux.intel.com>
---
meta/conf/auto.conf | 6 ++
meta/recipes-devtools/qemu/qemu.inc | 3 -
...sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch | 71 ----------------------
...0001-target-mips-add-24KEc-CPU-definition.patch | 54 ----------------
...0001-virtio-zero-vq-inuse-in-virtio_reset.patch | 57 -----------------
.../qemu/qemu/0002-fix-CVE-2016-7423.patch | 45 --------------
.../qemu/qemu/0003-fix-CVE-2016-7908.patch | 62 -------------------
.../qemu/qemu/0004-fix-CVE-2016-7909.patch | 42 -------------
...-Arm-versatilepb-Add-memory-size-checking.patch | 46 --------------
.../exclude-some-arm-EABI-obsolete-syscalls.patch | 28 ++++-----
.../qemu/{qemu_2.7.0.bb => qemu_2.8.0.bb} | 10 +--
11 files changed, 21 insertions(+), 403 deletions(-)
create mode 100644 meta/conf/auto.conf
delete mode 100644 meta/recipes-devtools/qemu/qemu/0001-pci-assign-sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch
delete mode 100644 meta/recipes-devtools/qemu/qemu/0001-target-mips-add-24KEc-CPU-definition.patch
delete mode 100644 meta/recipes-devtools/qemu/qemu/0001-virtio-zero-vq-inuse-in-virtio_reset.patch
delete mode 100644 meta/recipes-devtools/qemu/qemu/0002-fix-CVE-2016-7423.patch
delete mode 100644 meta/recipes-devtools/qemu/qemu/0003-fix-CVE-2016-7908.patch
delete mode 100644 meta/recipes-devtools/qemu/qemu/0004-fix-CVE-2016-7909.patch
delete mode 100644 meta/recipes-devtools/qemu/qemu/Qemu-Arm-versatilepb-Add-memory-size-checking.patch
rename meta/recipes-devtools/qemu/{qemu_2.7.0.bb => qemu_2.8.0.bb} (58%)
diff --git a/meta/conf/auto.conf b/meta/conf/auto.conf
new file mode 100644
index 0000000..492ac82
--- /dev/null
+++ b/meta/conf/auto.conf
@@ -0,0 +1,6 @@
+SSTATE_MIRRORS = "file://.* http://yctb01.zpn.intel.com/data/sstates/PATH \n"
+PREMIRRORS_prepend = "\
+ git://.*/.* http://yctb01.zpn.intel.com/data/sources/ \n \
+ ftp://.*/.* http://yctb01.zpn.intel.com/data/sources/ \n \
+ http://.*/.* http://yctb01.zpn.intel.com/data/sources/ \n \
+ https://.*/.* http://yctb01.zpn.intel.com/data/sources/ \n"
diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc
index b46e7f7..e3af5c2 100644
--- a/meta/recipes-devtools/qemu/qemu.inc
+++ b/meta/recipes-devtools/qemu/qemu.inc
@@ -9,8 +9,6 @@ require qemu-targets.inc
inherit autotools ptest
BBCLASSEXTEND = "native nativesdk"
-PR = "r1"
-
# QEMU_TARGETS is overridable variable
QEMU_TARGETS ?= "arm aarch64 i386 mips mipsel mips64 mips64el ppc sh4 x86_64"
@@ -21,7 +19,6 @@ SRC_URI = "\
file://wacom.patch \
file://add-ptest-in-makefile.patch \
file://run-ptest \
- file://0001-target-mips-add-24KEc-CPU-definition.patch \
"
SRC_URI_append_class-native = "\
diff --git a/meta/recipes-devtools/qemu/qemu/0001-pci-assign-sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch b/meta/recipes-devtools/qemu/qemu/0001-pci-assign-sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch
deleted file mode 100644
index 03472dd..0000000
--- a/meta/recipes-devtools/qemu/qemu/0001-pci-assign-sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch
+++ /dev/null
@@ -1,71 +0,0 @@
-From 6baa545df93253fced4fc0d52b14b98447e00473 Mon Sep 17 00:00:00 2001
-From: Peter Xu <peterx@redhat.com>
-Date: Mon, 28 Nov 2016 15:02:44 +0800
-Subject: [PATCH] pci-assign: sync MSI/MSI-X cap and table with PCIDevice
-
-Since commit e1d4fb2d ("kvm-irqchip: x86: add msi route notify fn"),
-kvm_irqchip_add_msi_route() starts to use pci_get_msi_message() to fetch
-MSI info. This requires that we setup MSI related fields in PCIDevice.
-For most devices, that won't be a problem, as long as we are using
-general interfaces like msi_init()/msix_init().
-
-However, for pci-assign devices, MSI/MSI-X is treated differently - PCI
-assign devices are maintaining its own MSI table and cap information in
-AssignedDevice struct. however that's not synced up with PCIDevice's
-fields. That will leads to pci_get_msi_message() failed to find correct
-MSI capability, even with an NULL msix_table.
-
-A quick fix is to sync up the two places: both the capability bits and
-table address for MSI/MSI-X.
-
-Upstream-Status: Backport [https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg04649.html]
-
-Reported-by: Changlimin <address@hidden>
-Tested-by: Changlimin <address@hidden>
-Cc: address@hidden
-Fixes: e1d4fb2d ("kvm-irqchip: x86: add msi route notify fn")
-Signed-off-by: Peter Xu <address@hidden>
-Signed-off-by: He Zhe <zhe.he@windriver.com>
----
- hw/i386/kvm/pci-assign.c | 4 ++++
- 1 file changed, 4 insertions(+)
-
-diff --git a/hw/i386/kvm/pci-assign.c b/hw/i386/kvm/pci-assign.c
-index 8238fbc..87dcbdd 100644
---- a/hw/i386/kvm/pci-assign.c
-+++ b/hw/i386/kvm/pci-assign.c
-@@ -1251,6 +1251,7 @@ static int assigned_device_pci_cap_init(PCIDevice *pci_dev, Error **errp)
- error_propagate(errp, local_err);
- return -ENOTSUP;
- }
-+ dev->dev.cap_present |= QEMU_PCI_CAP_MSI;
- dev->cap.available |= ASSIGNED_DEVICE_CAP_MSI;
- /* Only 32-bit/no-mask currently supported */
- ret = pci_add_capability2(pci_dev, PCI_CAP_ID_MSI, pos, 10,
-@@ -1285,6 +1286,7 @@ static int assigned_device_pci_cap_init(PCIDevice *pci_dev, Error **errp)
- error_propagate(errp, local_err);
- return -ENOTSUP;
- }
-+ dev->dev.cap_present |= QEMU_PCI_CAP_MSIX;
- dev->cap.available |= ASSIGNED_DEVICE_CAP_MSIX;
- ret = pci_add_capability2(pci_dev, PCI_CAP_ID_MSIX, pos, 12,
- &local_err);
-@@ -1648,6 +1650,7 @@ static void assigned_dev_register_msix_mmio(AssignedDevice *dev, Error **errp)
- dev->msix_table = NULL;
- return;
- }
-+ dev->dev.msix_table = (uint8_t *)dev->msix_table;
-
- assigned_dev_msix_reset(dev);
-
-@@ -1665,6 +1668,7 @@ static void assigned_dev_unregister_msix_mmio(AssignedDevice *dev)
- error_report("error unmapping msix_table! %s", strerror(errno));
- }
- dev->msix_table = NULL;
-+ dev->dev.msix_table = NULL;
- }
-
- static const VMStateDescription vmstate_assigned_device = {
---
-2.8.3
-
diff --git a/meta/recipes-devtools/qemu/qemu/0001-target-mips-add-24KEc-CPU-definition.patch b/meta/recipes-devtools/qemu/qemu/0001-target-mips-add-24KEc-CPU-definition.patch
deleted file mode 100644
index c4dbee7..0000000
--- a/meta/recipes-devtools/qemu/qemu/0001-target-mips-add-24KEc-CPU-definition.patch
+++ /dev/null
@@ -1,54 +0,0 @@
-From 926bc194f918d46bd93557b15da8153b6a94a1d5 Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Andr=C3=A9=20Draszik?= <git@andred.net>
-Date: Mon, 25 Jul 2016 23:58:22 +0100
-Subject: [PATCH] target-mips: add 24KEc CPU definition
-MIME-Version: 1.0
-Content-Type: text/plain; charset=UTF-8
-Content-Transfer-Encoding: 8bit
-
-Define a new CPU definition supporting 24KEc cores, similar to
-the existing 24Kc, but with added support for DSP instructions
-and MIPS16e (and without FPU).
-
-Signed-off-by: André Draszik <git@andred.net>
----
-Upstream-Status: Submitted [http://lists.nongnu.org/archive/html/qemu-devel/2016-07/msg05778.html]
- target-mips/translate_init.c | 22 ++++++++++++++++++++++
- 1 file changed, 22 insertions(+)
-
-diff --git a/target-mips/translate_init.c b/target-mips/translate_init.c
-index 39ed5c4..6ae23e4 100644
---- a/target-mips/translate_init.c
-+++ b/target-mips/translate_init.c
-@@ -256,6 +256,28 @@ static const mips_def_t mips_defs[] =
- .mmu_type = MMU_TYPE_R4000,
- },
- {
-+ .name = "24KEc",
-+ .CP0_PRid = 0x00019600,
-+ .CP0_Config0 = MIPS_CONFIG0 | (0x1 << CP0C0_AR) |
-+ (MMU_TYPE_R4000 << CP0C0_MT),
-+ .CP0_Config1 = MIPS_CONFIG1 | (15 << CP0C1_MMU) |
-+ (0 << CP0C1_IS) | (3 << CP0C1_IL) | (1 << CP0C1_IA) |
-+ (0 << CP0C1_DS) | (3 << CP0C1_DL) | (1 << CP0C1_DA) |
-+ (1 << CP0C1_CA),
-+ .CP0_Config2 = MIPS_CONFIG2,
-+ .CP0_Config3 = MIPS_CONFIG3 | (1 << CP0C3_DSPP) | (0 << CP0C3_VInt),
-+ .CP0_LLAddr_rw_bitmask = 0,
-+ .CP0_LLAddr_shift = 4,
-+ .SYNCI_Step = 32,
-+ .CCRes = 2,
-+ /* we have a DSP, but no FPU */
-+ .CP0_Status_rw_bitmask = 0x1378FF1F,
-+ .SEGBITS = 32,
-+ .PABITS = 32,
-+ .insn_flags = CPU_MIPS32R2 | ASE_MIPS16 | ASE_DSP,
-+ .mmu_type = MMU_TYPE_R4000,
-+ },
-+ {
- .name = "24Kf",
- .CP0_PRid = 0x00019300,
- .CP0_Config0 = MIPS_CONFIG0 | (0x1 << CP0C0_AR) |
---
-2.8.1
-
diff --git a/meta/recipes-devtools/qemu/qemu/0001-virtio-zero-vq-inuse-in-virtio_reset.patch b/meta/recipes-devtools/qemu/qemu/0001-virtio-zero-vq-inuse-in-virtio_reset.patch
deleted file mode 100644
index 86955d0..0000000
--- a/meta/recipes-devtools/qemu/qemu/0001-virtio-zero-vq-inuse-in-virtio_reset.patch
+++ /dev/null
@@ -1,57 +0,0 @@
-Upstream-Status: Backport
-
-Supplementary fix of CVE-2016-5403 which is backported from:
-
-http://git.qemu.org/?p=qemu.git;a=commit;h=4b7f91e
-
-Signed-off-by: Kai Kang <kai.kang@windriver.com>
----
-From 4b7f91ed0270a371e1933efa21ba600b6da23ab9 Mon Sep 17 00:00:00 2001
-From: Stefan Hajnoczi <stefanha@redhat.com>
-Date: Wed, 7 Sep 2016 11:51:25 -0400
-Subject: [PATCH] virtio: zero vq->inuse in virtio_reset()
-
-vq->inuse must be zeroed upon device reset like most other virtqueue
-fields.
-
-In theory, virtio_reset() just needs assert(vq->inuse == 0) since
-devices must clean up in-flight requests during reset (requests cannot
-not be leaked!).
-
-In practice, it is difficult to achieve vq->inuse == 0 across reset
-because balloon, blk, 9p, etc implement various different strategies for
-cleaning up requests. Most devices call g_free(elem) directly without
-telling virtio.c that the VirtQueueElement is cleaned up. Therefore
-vq->inuse is not decremented during reset.
-
-This patch zeroes vq->inuse and trusts that devices are not leaking
-VirtQueueElements across reset.
-
-I will send a follow-up series that refactors request life-cycle across
-all devices and converts vq->inuse = 0 into assert(vq->inuse == 0) but
-this more invasive approach is not appropriate for stable trees.
-
-Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
-Cc: qemu-stable <qemu-stable@nongnu.org>
-Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
-Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
-Reviewed-by: Ladi Prosek <lprosek@redhat.com>
----
- hw/virtio/virtio.c | 1 +
- 1 file changed, 1 insertion(+)
-
-diff --git a/hw/virtio/virtio.c b/hw/virtio/virtio.c
-index 74c085c..e8a13a5 100644
---- a/hw/virtio/virtio.c
-+++ b/hw/virtio/virtio.c
-@@ -822,6 +822,7 @@ void virtio_reset(void *opaque)
- vdev->vq[i].signalled_used_valid = false;
- vdev->vq[i].notification = true;
- vdev->vq[i].vring.num = vdev->vq[i].vring.num_default;
-+ vdev->vq[i].inuse = 0;
- }
- }
-
---
-2.9.3
-
diff --git a/meta/recipes-devtools/qemu/qemu/0002-fix-CVE-2016-7423.patch b/meta/recipes-devtools/qemu/qemu/0002-fix-CVE-2016-7423.patch
deleted file mode 100644
index fdf58a3..0000000
--- a/meta/recipes-devtools/qemu/qemu/0002-fix-CVE-2016-7423.patch
+++ /dev/null
@@ -1,45 +0,0 @@
-Upstream-Status: Backport
-
-Backport patch to fix CVE-2016-7423 from:
-
-http://git.qemu.org/?p=qemu.git;a=commit;h=670e56d3ed
-
-CVE: CVE-2016-7423
-
-Signed-off-by: Kai Kang <kai.kang@windriver.com>
----
-From 670e56d3ed2918b3861d9216f2c0540d9e9ae0d5 Mon Sep 17 00:00:00 2001
-From: Li Qiang <liqiang6-s@360.cn>
-Date: Mon, 12 Sep 2016 18:14:11 +0530
-Subject: [PATCH] scsi: mptsas: use g_new0 to allocate MPTSASRequest object
-
-When processing IO request in mptsas, it uses g_new to allocate
-a 'req' object. If an error occurs before 'req->sreq' is
-allocated, It could lead to an OOB write in mptsas_free_request
-function. Use g_new0 to avoid it.
-
-Reported-by: Li Qiang <liqiang6-s@360.cn>
-Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
-Message-Id: <1473684251-17476-1-git-send-email-ppandit@redhat.com>
-Cc: qemu-stable@nongnu.org
-Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
----
- hw/scsi/mptsas.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/hw/scsi/mptsas.c b/hw/scsi/mptsas.c
-index 0e0a22f..eaae1bb 100644
---- a/hw/scsi/mptsas.c
-+++ b/hw/scsi/mptsas.c
-@@ -304,7 +304,7 @@ static int mptsas_process_scsi_io_request(MPTSASState *s,
- goto bad;
- }
-
-- req = g_new(MPTSASRequest, 1);
-+ req = g_new0(MPTSASRequest, 1);
- QTAILQ_INSERT_TAIL(&s->pending, req, next);
- req->scsi_io = *scsi_io;
- req->dev = s;
---
-2.9.3
-
diff --git a/meta/recipes-devtools/qemu/qemu/0003-fix-CVE-2016-7908.patch b/meta/recipes-devtools/qemu/qemu/0003-fix-CVE-2016-7908.patch
deleted file mode 100644
index 05cc3d9..0000000
--- a/meta/recipes-devtools/qemu/qemu/0003-fix-CVE-2016-7908.patch
+++ /dev/null
@@ -1,62 +0,0 @@
-Upstream-Status: Backport
-
-Backport patch to fix CVE-2016-7908 from:
-
-http://git.qemu.org/?p=qemu.git;a=commit;h=070c4b92b8c
-
-CVE: CVE-2016-7908
-
-Signed-off-by: Kai Kang <kai.kang@windriver.com>
----
-From 070c4b92b8cd5390889716677a0b92444d6e087a Mon Sep 17 00:00:00 2001
-From: Prasad J Pandit <pjp@fedoraproject.org>
-Date: Thu, 22 Sep 2016 16:02:37 +0530
-Subject: [PATCH] net: mcf: limit buffer descriptor count
-
-ColdFire Fast Ethernet Controller uses buffer descriptors to manage
-data flow to/fro receive & transmit queues. While transmitting
-packets, it could continue to read buffer descriptors if a buffer
-descriptor has length of zero and has crafted values in bd.flags.
-Set upper limit to number of buffer descriptors.
-
-Reported-by: Li Qiang <liqiang6-s@360.cn>
-Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
-Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
-Signed-off-by: Jason Wang <jasowang@redhat.com>
----
- hw/net/mcf_fec.c | 5 +++--
- 1 file changed, 3 insertions(+), 2 deletions(-)
-
-diff --git a/hw/net/mcf_fec.c b/hw/net/mcf_fec.c
-index 0ee8ad9..d31fea1 100644
---- a/hw/net/mcf_fec.c
-+++ b/hw/net/mcf_fec.c
-@@ -23,6 +23,7 @@ do { printf("mcf_fec: " fmt , ## __VA_ARGS__); } while (0)
- #define DPRINTF(fmt, ...) do {} while(0)
- #endif
-
-+#define FEC_MAX_DESC 1024
- #define FEC_MAX_FRAME_SIZE 2032
-
- typedef struct {
-@@ -149,7 +150,7 @@ static void mcf_fec_do_tx(mcf_fec_state *s)
- uint32_t addr;
- mcf_fec_bd bd;
- int frame_size;
-- int len;
-+ int len, descnt = 0;
- uint8_t frame[FEC_MAX_FRAME_SIZE];
- uint8_t *ptr;
-
-@@ -157,7 +158,7 @@ static void mcf_fec_do_tx(mcf_fec_state *s)
- ptr = frame;
- frame_size = 0;
- addr = s->tx_descriptor;
-- while (1) {
-+ while (descnt++ < FEC_MAX_DESC) {
- mcf_fec_read_bd(&bd, addr);
- DPRINTF("tx_bd %x flags %04x len %d data %08x\n",
- addr, bd.flags, bd.length, bd.data);
---
-2.9.3
-
diff --git a/meta/recipes-devtools/qemu/qemu/0004-fix-CVE-2016-7909.patch b/meta/recipes-devtools/qemu/qemu/0004-fix-CVE-2016-7909.patch
deleted file mode 100644
index e71bbf6..0000000
--- a/meta/recipes-devtools/qemu/qemu/0004-fix-CVE-2016-7909.patch
+++ /dev/null
@@ -1,42 +0,0 @@
-Upstream-Status: Backport [http://git.qemu.org/?p=qemu.git;a=commit;h=34e29ce]
-CVE: CVE-2016-7909
-
-Signed-off-by: Kai Kang <kai.kang@windriver.com>
----
-From 34e29ce754c02bb6b3bdd244fbb85033460feaff Mon Sep 17 00:00:00 2001
-From: Prasad J Pandit <pjp@fedoraproject.org>
-Date: Fri, 30 Sep 2016 00:27:33 +0530
-Subject: [PATCH] net: pcnet: check rx/tx descriptor ring length
-
-The AMD PC-Net II emulator has set of control and status(CSR)
-registers. Of these, CSR76 and CSR78 hold receive and transmit
-descriptor ring length respectively. This ring length could range
-from 1 to 65535. Setting ring length to zero leads to an infinite
-loop in pcnet_rdra_addr() or pcnet_transmit(). Add check to avoid it.
-
-Reported-by: Li Qiang <liqiang6-s@360.cn>
-Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
-Signed-off-by: Jason Wang <jasowang@redhat.com>
----
- hw/net/pcnet.c | 3 +++
- 1 file changed, 3 insertions(+)
-
-diff --git a/hw/net/pcnet.c b/hw/net/pcnet.c
-index 198a01f..3078de8 100644
---- a/hw/net/pcnet.c
-+++ b/hw/net/pcnet.c
-@@ -1429,8 +1429,11 @@ static void pcnet_csr_writew(PCNetState *s, uint32_t rap, uint32_t new_value)
- case 47: /* POLLINT */
- case 72:
- case 74:
-+ break;
- case 76: /* RCVRL */
- case 78: /* XMTRL */
-+ val = (val > 0) ? val : 512;
-+ break;
- case 112:
- if (CSR_STOP(s) || CSR_SPND(s))
- break;
---
-2.10.1
-
diff --git a/meta/recipes-devtools/qemu/qemu/Qemu-Arm-versatilepb-Add-memory-size-checking.patch b/meta/recipes-devtools/qemu/qemu/Qemu-Arm-versatilepb-Add-memory-size-checking.patch
deleted file mode 100644
index 1a6cf51..0000000
--- a/meta/recipes-devtools/qemu/qemu/Qemu-Arm-versatilepb-Add-memory-size-checking.patch
+++ /dev/null
@@ -1,46 +0,0 @@
-From 896fa02c24347e6e9259812cfda187b1d6ca6199 Mon Sep 17 00:00:00 2001
-From: Jiang Lu <lu.jiang@windriver.com>
-Date: Wed, 13 Nov 2013 10:38:08 +0800
-Subject: [PATCH] Qemu:Arm:versatilepb: Add memory size checking
-
-The machine can not work with memory over 256M, so add a checking
-at startup. If the memory size exceed 256M, just stop emulation then
-throw out warning about memory limitation.
-
-Upstream-Status: Pending
-
-Signed-off-by: Jiang Lu <lu.jiang@windriver.com>
-
-Updated it on 2014-01-15 for rebasing
-
-Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
-
-Update it when upgrade qemu to 2.2.0
-
-Signed-off-by: Kai Kang <kai.kang@windriver.com>
-Signed-off-by: Cristian Iorga <cristian.iorga@intel.com>
----
- hw/arm/versatilepb.c | 7 +++++++
- 1 file changed, 7 insertions(+)
-
-diff --git a/hw/arm/versatilepb.c b/hw/arm/versatilepb.c
-index 6c69f4e..9278d90 100644
---- a/hw/arm/versatilepb.c
-+++ b/hw/arm/versatilepb.c
-@@ -204,6 +204,13 @@ static void versatile_init(MachineState *machine, int board_id)
- exit(1);
- }
-
-+ if (machine->ram_size > (256 << 20)) {
-+ fprintf(stderr,
-+ "qemu: Too much memory for this machine: %d MB, maximum 256 MB\n",
-+ ((unsigned int)ram_size / (1 << 20)));
-+ exit(1);
-+ }
-+
- cpuobj = object_new(object_class_get_name(cpu_oc));
-
- /* By default ARM1176 CPUs have EL3 enabled. This board does not
---
-2.1.0
-
diff --git a/meta/recipes-devtools/qemu/qemu/exclude-some-arm-EABI-obsolete-syscalls.patch b/meta/recipes-devtools/qemu/qemu/exclude-some-arm-EABI-obsolete-syscalls.patch
index 171bda7..60253bd 100644
--- a/meta/recipes-devtools/qemu/qemu/exclude-some-arm-EABI-obsolete-syscalls.patch
+++ b/meta/recipes-devtools/qemu/qemu/exclude-some-arm-EABI-obsolete-syscalls.patch
@@ -1,4 +1,7 @@
-[PATCH] exclude some arm EABI obsolete syscalls
+From 51910343594b3f655a205a096e092ecdacc253da Mon Sep 17 00:00:00 2001
+From: "Roy.Li" <rongqing.li@windriver.com>
+Date: Mon, 23 Jun 2014 14:28:30 +0800
+Subject: [PATCH 02/11] [PATCH] exclude some arm EABI obsolete syscalls
Upstream-Status: Pending
@@ -26,15 +29,16 @@ or kernel header:
/usr/include/asm/unistd.h
Signed-off-by: Roy.Li <rongqing.li@windriver.com>
+
---
- qemu-seccomp.c | 14 ++++++++------
- 1 file changed, 8 insertions(+), 6 deletions(-)
+ qemu-seccomp.c | 13 ++++++++-----
+ 1 file changed, 8 insertions(+), 5 deletions(-)
diff --git a/qemu-seccomp.c b/qemu-seccomp.c
-index caa926e..5a78502 100644
+index df75d9c..0e577f8 100644
--- a/qemu-seccomp.c
+++ b/qemu-seccomp.c
-@@ -25,15 +25,21 @@ static const struct QemuSeccompSyscall seccomp_whitelist[] = {
+@@ -35,15 +35,21 @@ static const struct QemuSeccompSyscall seccomp_whitelist[] = {
{ SCMP_SYS(timer_settime), 255 },
{ SCMP_SYS(timer_gettime), 254 },
{ SCMP_SYS(futex), 253 },
@@ -58,7 +62,7 @@ index caa926e..5a78502 100644
{ SCMP_SYS(mprotect), 246 },
{ SCMP_SYS(execve), 245 },
{ SCMP_SYS(open), 245 },
-@@ -48,13 +54,11 @@ static const struct QemuSeccompSyscall seccomp_whitelist[] = {
+@@ -58,7 +64,6 @@ static const struct QemuSeccompSyscall seccomp_whitelist[] = {
{ SCMP_SYS(bind), 245 },
{ SCMP_SYS(listen), 245 },
{ SCMP_SYS(semget), 245 },
@@ -66,13 +70,7 @@ index caa926e..5a78502 100644
{ SCMP_SYS(gettimeofday), 245 },
{ SCMP_SYS(readlink), 245 },
{ SCMP_SYS(access), 245 },
- { SCMP_SYS(prctl), 245 },
- { SCMP_SYS(signalfd), 245 },
-- { SCMP_SYS(getrlimit), 245 },
- { SCMP_SYS(set_tid_address), 245 },
- { SCMP_SYS(statfs), 245 },
- { SCMP_SYS(unlink), 245 },
-@@ -93,7 +97,6 @@ static const struct QemuSeccompSyscall seccomp_whitelist[] = {
+@@ -104,7 +109,6 @@ static const struct QemuSeccompSyscall seccomp_whitelist[] = {
{ SCMP_SYS(times), 245 },
{ SCMP_SYS(exit), 245 },
{ SCMP_SYS(clock_gettime), 245 },
@@ -80,7 +78,7 @@ index caa926e..5a78502 100644
{ SCMP_SYS(restart_syscall), 245 },
{ SCMP_SYS(pwrite64), 245 },
{ SCMP_SYS(nanosleep), 245 },
-@@ -182,7 +185,6 @@ static const struct QemuSeccompSyscall seccomp_whitelist[] = {
+@@ -194,7 +198,6 @@ static const struct QemuSeccompSyscall seccomp_whitelist[] = {
{ SCMP_SYS(lstat64), 241 },
{ SCMP_SYS(sendfile64), 241 },
{ SCMP_SYS(ugetrlimit), 241 },
@@ -89,5 +87,5 @@ index caa926e..5a78502 100644
{ SCMP_SYS(rt_sigqueueinfo), 241 },
{ SCMP_SYS(rt_tgsigqueueinfo), 241 },
--
-1.9.1
+2.1.4
diff --git a/meta/recipes-devtools/qemu/qemu_2.7.0.bb b/meta/recipes-devtools/qemu/qemu_2.8.0.bb
similarity index 58%
rename from meta/recipes-devtools/qemu/qemu_2.7.0.bb
rename to meta/recipes-devtools/qemu/qemu_2.8.0.bb
index 0d680a7..efb1fb0 100644
--- a/meta/recipes-devtools/qemu/qemu_2.7.0.bb
+++ b/meta/recipes-devtools/qemu/qemu_2.8.0.bb
@@ -5,20 +5,14 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=441c28d2cf86e15a37fa47e15a72fbac \
SRC_URI += "file://configure-fix-Darwin-target-detection.patch \
file://qemu-enlarge-env-entry-size.patch \
- file://Qemu-Arm-versatilepb-Add-memory-size-checking.patch \
file://no-valgrind.patch \
file://pathlimit.patch \
file://qemu-2.5.0-cflags.patch \
- file://0001-virtio-zero-vq-inuse-in-virtio_reset.patch \
- file://0002-fix-CVE-2016-7423.patch \
- file://0003-fix-CVE-2016-7908.patch \
- file://0004-fix-CVE-2016-7909.patch \
- file://0001-pci-assign-sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch \
"
SRC_URI_prepend = "http://wiki.qemu-project.org/download/${BP}.tar.bz2"
-SRC_URI[md5sum] = "08d4d06d1cb598efecd796137f4844ab"
-SRC_URI[sha256sum] = "326e739506ba690daf69fc17bd3913a6c313d9928d743bd8eddb82f403f81e53"
+SRC_URI[md5sum] = "17940dce063b6ce450a12e719a6c9c43"
+SRC_URI[sha256sum] = "dafd5d7f649907b6b617b822692f4c82e60cf29bc0fc58bc2036219b591e5e62"
COMPATIBLE_HOST_mipsarchn32 = "null"
COMPATIBLE_HOST_mipsarchn64 = "null"
--
2.1.4
^ permalink raw reply related [flat|nested] 9+ messages in thread* Re: [PATCHv2] qemu: Upgrade to 2.8.0 2017-01-12 16:19 [PATCHv2] qemu: Upgrade to 2.8.0 Aníbal Limón @ 2017-01-16 16:36 ` Burton, Ross 2017-01-16 16:43 ` Aníbal Limón 0 siblings, 1 reply; 9+ messages in thread From: Burton, Ross @ 2017-01-16 16:36 UTC (permalink / raw) To: Aníbal Limón; +Cc: OE-core [-- Attachment #1: Type: text/plain, Size: 25819 bytes --] Looks like this is broken for ppc when building gobject-introspection: http://errors.yoctoproject.org/Errors/Latest/Autobuilder/?filter=%20gobject-introspection:%20do_compile&type=failure&page=1 (top seven results in ross/mut2) Ross On 12 January 2017 at 16:19, Aníbal Limón <anibal.limon@linux.intel.com> wrote: > Rebased patches: > > - exclude-some-arm-EABI-obsolete-syscalls.patc > > Removed patches (already in upstream): > > - 0001-pci-assign-sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch > - 0002-fix-CVE-2016-7423.patch > - 0003-fix-CVE-2016-7908.patch > - 0004-fix-CVE-2016-7909.patch > - Qemu-Arm-versatilepb-Add-memory-size-checking.patch > - 0001-target-mips-add-24KEc-CPU-definition.patch > > Changelog, > > http://wiki.qemu.org/ChangeLog/2.8 > > Signed-off-by: Aníbal Limón <anibal.limon@linux.intel.com> > --- > meta/conf/auto.conf | 6 ++ > meta/recipes-devtools/qemu/qemu.inc | 3 - > ...sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch | 71 > ---------------------- > ...0001-target-mips-add-24KEc-CPU-definition.patch | 54 ---------------- > ...0001-virtio-zero-vq-inuse-in-virtio_reset.patch | 57 ----------------- > .../qemu/qemu/0002-fix-CVE-2016-7423.patch | 45 -------------- > .../qemu/qemu/0003-fix-CVE-2016-7908.patch | 62 > ------------------- > .../qemu/qemu/0004-fix-CVE-2016-7909.patch | 42 ------------- > ...-Arm-versatilepb-Add-memory-size-checking.patch | 46 -------------- > .../exclude-some-arm-EABI-obsolete-syscalls.patch | 28 ++++----- > .../qemu/{qemu_2.7.0.bb => qemu_2.8.0.bb} | 10 +-- > 11 files changed, 21 insertions(+), 403 deletions(-) > create mode 100644 meta/conf/auto.conf > delete mode 100644 meta/recipes-devtools/qemu/ > qemu/0001-pci-assign-sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch > delete mode 100644 meta/recipes-devtools/qemu/qemu/0001-target-mips-add- > 24KEc-CPU-definition.patch > delete mode 100644 meta/recipes-devtools/qemu/qemu/0001-virtio-zero-vq- > inuse-in-virtio_reset.patch > delete mode 100644 meta/recipes-devtools/qemu/ > qemu/0002-fix-CVE-2016-7423.patch > delete mode 100644 meta/recipes-devtools/qemu/ > qemu/0003-fix-CVE-2016-7908.patch > delete mode 100644 meta/recipes-devtools/qemu/ > qemu/0004-fix-CVE-2016-7909.patch > delete mode 100644 meta/recipes-devtools/qemu/ > qemu/Qemu-Arm-versatilepb-Add-memory-size-checking.patch > rename meta/recipes-devtools/qemu/{qemu_2.7.0.bb => qemu_2.8.0.bb} (58%) > > diff --git a/meta/conf/auto.conf b/meta/conf/auto.conf > new file mode 100644 > index 0000000..492ac82 > --- /dev/null > +++ b/meta/conf/auto.conf > @@ -0,0 +1,6 @@ > +SSTATE_MIRRORS = "file://.* http://yctb01.zpn.intel.com/data/sstates/PATH > \n" > +PREMIRRORS_prepend = "\ > + git://.*/.* http://yctb01.zpn.intel.com/data/sources/ \n \ > + ftp://.*/.* http://yctb01.zpn.intel.com/data/sources/ \n \ > + http://.*/.* http://yctb01.zpn.intel.com/data/sources/ \n \ > + https://.*/.* http://yctb01.zpn.intel.com/data/sources/ \n" > diff --git a/meta/recipes-devtools/qemu/qemu.inc > b/meta/recipes-devtools/qemu/qemu.inc > index b46e7f7..e3af5c2 100644 > --- a/meta/recipes-devtools/qemu/qemu.inc > +++ b/meta/recipes-devtools/qemu/qemu.inc > @@ -9,8 +9,6 @@ require qemu-targets.inc > inherit autotools ptest > BBCLASSEXTEND = "native nativesdk" > > -PR = "r1" > - > # QEMU_TARGETS is overridable variable > QEMU_TARGETS ?= "arm aarch64 i386 mips mipsel mips64 mips64el ppc sh4 > x86_64" > > @@ -21,7 +19,6 @@ SRC_URI = "\ > file://wacom.patch \ > file://add-ptest-in-makefile.patch \ > file://run-ptest \ > - file://0001-target-mips-add-24KEc-CPU-definition.patch \ > " > > SRC_URI_append_class-native = "\ > diff --git a/meta/recipes-devtools/qemu/qemu/0001-pci-assign-sync-MSI- > MSI-X-cap-and-table-with-PCIDevi.patch b/meta/recipes-devtools/qemu/ > qemu/0001-pci-assign-sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch > deleted file mode 100644 > index 03472dd..0000000 > --- a/meta/recipes-devtools/qemu/qemu/0001-pci-assign-sync-MSI- > MSI-X-cap-and-table-with-PCIDevi.patch > +++ /dev/null > @@ -1,71 +0,0 @@ > -From 6baa545df93253fced4fc0d52b14b98447e00473 Mon Sep 17 00:00:00 2001 > -From: Peter Xu <peterx@redhat.com> > -Date: Mon, 28 Nov 2016 15:02:44 +0800 > -Subject: [PATCH] pci-assign: sync MSI/MSI-X cap and table with PCIDevice > - > -Since commit e1d4fb2d ("kvm-irqchip: x86: add msi route notify fn"), > -kvm_irqchip_add_msi_route() starts to use pci_get_msi_message() to fetch > -MSI info. This requires that we setup MSI related fields in PCIDevice. > -For most devices, that won't be a problem, as long as we are using > -general interfaces like msi_init()/msix_init(). > - > -However, for pci-assign devices, MSI/MSI-X is treated differently - PCI > -assign devices are maintaining its own MSI table and cap information in > -AssignedDevice struct. however that's not synced up with PCIDevice's > -fields. That will leads to pci_get_msi_message() failed to find correct > -MSI capability, even with an NULL msix_table. > - > -A quick fix is to sync up the two places: both the capability bits and > -table address for MSI/MSI-X. > - > -Upstream-Status: Backport [https://lists.gnu.org/ > archive/html/qemu-devel/2016-11/msg04649.html] > - > -Reported-by: Changlimin <address@hidden> > -Tested-by: Changlimin <address@hidden> > -Cc: address@hidden > -Fixes: e1d4fb2d ("kvm-irqchip: x86: add msi route notify fn") > -Signed-off-by: Peter Xu <address@hidden> > -Signed-off-by: He Zhe <zhe.he@windriver.com> > ---- > - hw/i386/kvm/pci-assign.c | 4 ++++ > - 1 file changed, 4 insertions(+) > - > -diff --git a/hw/i386/kvm/pci-assign.c b/hw/i386/kvm/pci-assign.c > -index 8238fbc..87dcbdd 100644 > ---- a/hw/i386/kvm/pci-assign.c > -+++ b/hw/i386/kvm/pci-assign.c > -@@ -1251,6 +1251,7 @@ static int assigned_device_pci_cap_init(PCIDevice > *pci_dev, Error **errp) > - error_propagate(errp, local_err); > - return -ENOTSUP; > - } > -+ dev->dev.cap_present |= QEMU_PCI_CAP_MSI; > - dev->cap.available |= ASSIGNED_DEVICE_CAP_MSI; > - /* Only 32-bit/no-mask currently supported */ > - ret = pci_add_capability2(pci_dev, PCI_CAP_ID_MSI, pos, 10, > -@@ -1285,6 +1286,7 @@ static int assigned_device_pci_cap_init(PCIDevice > *pci_dev, Error **errp) > - error_propagate(errp, local_err); > - return -ENOTSUP; > - } > -+ dev->dev.cap_present |= QEMU_PCI_CAP_MSIX; > - dev->cap.available |= ASSIGNED_DEVICE_CAP_MSIX; > - ret = pci_add_capability2(pci_dev, PCI_CAP_ID_MSIX, pos, 12, > - &local_err); > -@@ -1648,6 +1650,7 @@ static void assigned_dev_register_msix_mmio(AssignedDevice > *dev, Error **errp) > - dev->msix_table = NULL; > - return; > - } > -+ dev->dev.msix_table = (uint8_t *)dev->msix_table; > - > - assigned_dev_msix_reset(dev); > - > -@@ -1665,6 +1668,7 @@ static void assigned_dev_unregister_msix_mmio(AssignedDevice > *dev) > - error_report("error unmapping msix_table! %s", strerror(errno)); > - } > - dev->msix_table = NULL; > -+ dev->dev.msix_table = NULL; > - } > - > - static const VMStateDescription vmstate_assigned_device = { > --- > -2.8.3 > - > diff --git a/meta/recipes-devtools/qemu/qemu/0001-target-mips-add-24KEc-CPU-definition.patch > b/meta/recipes-devtools/qemu/qemu/0001-target-mips-add- > 24KEc-CPU-definition.patch > deleted file mode 100644 > index c4dbee7..0000000 > --- a/meta/recipes-devtools/qemu/qemu/0001-target-mips-add- > 24KEc-CPU-definition.patch > +++ /dev/null > @@ -1,54 +0,0 @@ > -From 926bc194f918d46bd93557b15da8153b6a94a1d5 Mon Sep 17 00:00:00 2001 > -From: =?UTF-8?q?Andr=C3=A9=20Draszik?= <git@andred.net> > -Date: Mon, 25 Jul 2016 23:58:22 +0100 > -Subject: [PATCH] target-mips: add 24KEc CPU definition > -MIME-Version: 1.0 > -Content-Type: text/plain; charset=UTF-8 > -Content-Transfer-Encoding: 8bit > - > -Define a new CPU definition supporting 24KEc cores, similar to > -the existing 24Kc, but with added support for DSP instructions > -and MIPS16e (and without FPU). > - > -Signed-off-by: André Draszik <git@andred.net> > ---- > -Upstream-Status: Submitted [http://lists.nongnu.org/ > archive/html/qemu-devel/2016-07/msg05778.html] > - target-mips/translate_init.c | 22 ++++++++++++++++++++++ > - 1 file changed, 22 insertions(+) > - > -diff --git a/target-mips/translate_init.c b/target-mips/translate_init.c > -index 39ed5c4..6ae23e4 100644 > ---- a/target-mips/translate_init.c > -+++ b/target-mips/translate_init.c > -@@ -256,6 +256,28 @@ static const mips_def_t mips_defs[] = > - .mmu_type = MMU_TYPE_R4000, > - }, > - { > -+ .name = "24KEc", > -+ .CP0_PRid = 0x00019600, > -+ .CP0_Config0 = MIPS_CONFIG0 | (0x1 << CP0C0_AR) | > -+ (MMU_TYPE_R4000 << CP0C0_MT), > -+ .CP0_Config1 = MIPS_CONFIG1 | (15 << CP0C1_MMU) | > -+ (0 << CP0C1_IS) | (3 << CP0C1_IL) | (1 << > CP0C1_IA) | > -+ (0 << CP0C1_DS) | (3 << CP0C1_DL) | (1 << > CP0C1_DA) | > -+ (1 << CP0C1_CA), > -+ .CP0_Config2 = MIPS_CONFIG2, > -+ .CP0_Config3 = MIPS_CONFIG3 | (1 << CP0C3_DSPP) | (0 << > CP0C3_VInt), > -+ .CP0_LLAddr_rw_bitmask = 0, > -+ .CP0_LLAddr_shift = 4, > -+ .SYNCI_Step = 32, > -+ .CCRes = 2, > -+ /* we have a DSP, but no FPU */ > -+ .CP0_Status_rw_bitmask = 0x1378FF1F, > -+ .SEGBITS = 32, > -+ .PABITS = 32, > -+ .insn_flags = CPU_MIPS32R2 | ASE_MIPS16 | ASE_DSP, > -+ .mmu_type = MMU_TYPE_R4000, > -+ }, > -+ { > - .name = "24Kf", > - .CP0_PRid = 0x00019300, > - .CP0_Config0 = MIPS_CONFIG0 | (0x1 << CP0C0_AR) | > --- > -2.8.1 > - > diff --git a/meta/recipes-devtools/qemu/qemu/0001-virtio-zero-vq-inuse-in-virtio_reset.patch > b/meta/recipes-devtools/qemu/qemu/0001-virtio-zero-vq- > inuse-in-virtio_reset.patch > deleted file mode 100644 > index 86955d0..0000000 > --- a/meta/recipes-devtools/qemu/qemu/0001-virtio-zero-vq- > inuse-in-virtio_reset.patch > +++ /dev/null > @@ -1,57 +0,0 @@ > -Upstream-Status: Backport > - > -Supplementary fix of CVE-2016-5403 which is backported from: > - > -http://git.qemu.org/?p=qemu.git;a=commit;h=4b7f91e > - > -Signed-off-by: Kai Kang <kai.kang@windriver.com> > ---- > -From 4b7f91ed0270a371e1933efa21ba600b6da23ab9 Mon Sep 17 00:00:00 2001 > -From: Stefan Hajnoczi <stefanha@redhat.com> > -Date: Wed, 7 Sep 2016 11:51:25 -0400 > -Subject: [PATCH] virtio: zero vq->inuse in virtio_reset() > - > -vq->inuse must be zeroed upon device reset like most other virtqueue > -fields. > - > -In theory, virtio_reset() just needs assert(vq->inuse == 0) since > -devices must clean up in-flight requests during reset (requests cannot > -not be leaked!). > - > -In practice, it is difficult to achieve vq->inuse == 0 across reset > -because balloon, blk, 9p, etc implement various different strategies for > -cleaning up requests. Most devices call g_free(elem) directly without > -telling virtio.c that the VirtQueueElement is cleaned up. Therefore > -vq->inuse is not decremented during reset. > - > -This patch zeroes vq->inuse and trusts that devices are not leaking > -VirtQueueElements across reset. > - > -I will send a follow-up series that refactors request life-cycle across > -all devices and converts vq->inuse = 0 into assert(vq->inuse == 0) but > -this more invasive approach is not appropriate for stable trees. > - > -Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> > -Cc: qemu-stable <qemu-stable@nongnu.org> > -Reviewed-by: Michael S. Tsirkin <mst@redhat.com> > -Signed-off-by: Michael S. Tsirkin <mst@redhat.com> > -Reviewed-by: Ladi Prosek <lprosek@redhat.com> > ---- > - hw/virtio/virtio.c | 1 + > - 1 file changed, 1 insertion(+) > - > -diff --git a/hw/virtio/virtio.c b/hw/virtio/virtio.c > -index 74c085c..e8a13a5 100644 > ---- a/hw/virtio/virtio.c > -+++ b/hw/virtio/virtio.c > -@@ -822,6 +822,7 @@ void virtio_reset(void *opaque) > - vdev->vq[i].signalled_used_valid = false; > - vdev->vq[i].notification = true; > - vdev->vq[i].vring.num = vdev->vq[i].vring.num_default; > -+ vdev->vq[i].inuse = 0; > - } > - } > - > --- > -2.9.3 > - > diff --git a/meta/recipes-devtools/qemu/qemu/0002-fix-CVE-2016-7423.patch > b/meta/recipes-devtools/qemu/qemu/0002-fix-CVE-2016-7423.patch > deleted file mode 100644 > index fdf58a3..0000000 > --- a/meta/recipes-devtools/qemu/qemu/0002-fix-CVE-2016-7423.patch > +++ /dev/null > @@ -1,45 +0,0 @@ > -Upstream-Status: Backport > - > -Backport patch to fix CVE-2016-7423 from: > - > -http://git.qemu.org/?p=qemu.git;a=commit;h=670e56d3ed > - > -CVE: CVE-2016-7423 > - > -Signed-off-by: Kai Kang <kai.kang@windriver.com> > ---- > -From 670e56d3ed2918b3861d9216f2c0540d9e9ae0d5 Mon Sep 17 00:00:00 2001 > -From: Li Qiang <liqiang6-s@360.cn> > -Date: Mon, 12 Sep 2016 18:14:11 +0530 > -Subject: [PATCH] scsi: mptsas: use g_new0 to allocate MPTSASRequest object > - > -When processing IO request in mptsas, it uses g_new to allocate > -a 'req' object. If an error occurs before 'req->sreq' is > -allocated, It could lead to an OOB write in mptsas_free_request > -function. Use g_new0 to avoid it. > - > -Reported-by: Li Qiang <liqiang6-s@360.cn> > -Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> > -Message-Id: <1473684251-17476-1-git-send-email-ppandit@redhat.com> > -Cc: qemu-stable@nongnu.org > -Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> > ---- > - hw/scsi/mptsas.c | 2 +- > - 1 file changed, 1 insertion(+), 1 deletion(-) > - > -diff --git a/hw/scsi/mptsas.c b/hw/scsi/mptsas.c > -index 0e0a22f..eaae1bb 100644 > ---- a/hw/scsi/mptsas.c > -+++ b/hw/scsi/mptsas.c > -@@ -304,7 +304,7 @@ static int mptsas_process_scsi_io_request(MPTSASState > *s, > - goto bad; > - } > - > -- req = g_new(MPTSASRequest, 1); > -+ req = g_new0(MPTSASRequest, 1); > - QTAILQ_INSERT_TAIL(&s->pending, req, next); > - req->scsi_io = *scsi_io; > - req->dev = s; > --- > -2.9.3 > - > diff --git a/meta/recipes-devtools/qemu/qemu/0003-fix-CVE-2016-7908.patch > b/meta/recipes-devtools/qemu/qemu/0003-fix-CVE-2016-7908.patch > deleted file mode 100644 > index 05cc3d9..0000000 > --- a/meta/recipes-devtools/qemu/qemu/0003-fix-CVE-2016-7908.patch > +++ /dev/null > @@ -1,62 +0,0 @@ > -Upstream-Status: Backport > - > -Backport patch to fix CVE-2016-7908 from: > - > -http://git.qemu.org/?p=qemu.git;a=commit;h=070c4b92b8c > - > -CVE: CVE-2016-7908 > - > -Signed-off-by: Kai Kang <kai.kang@windriver.com> > ---- > -From 070c4b92b8cd5390889716677a0b92444d6e087a Mon Sep 17 00:00:00 2001 > -From: Prasad J Pandit <pjp@fedoraproject.org> > -Date: Thu, 22 Sep 2016 16:02:37 +0530 > -Subject: [PATCH] net: mcf: limit buffer descriptor count > - > -ColdFire Fast Ethernet Controller uses buffer descriptors to manage > -data flow to/fro receive & transmit queues. While transmitting > -packets, it could continue to read buffer descriptors if a buffer > -descriptor has length of zero and has crafted values in bd.flags. > -Set upper limit to number of buffer descriptors. > - > -Reported-by: Li Qiang <liqiang6-s@360.cn> > -Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> > -Reviewed-by: Paolo Bonzini <pbonzini@redhat.com> > -Signed-off-by: Jason Wang <jasowang@redhat.com> > ---- > - hw/net/mcf_fec.c | 5 +++-- > - 1 file changed, 3 insertions(+), 2 deletions(-) > - > -diff --git a/hw/net/mcf_fec.c b/hw/net/mcf_fec.c > -index 0ee8ad9..d31fea1 100644 > ---- a/hw/net/mcf_fec.c > -+++ b/hw/net/mcf_fec.c > -@@ -23,6 +23,7 @@ do { printf("mcf_fec: " fmt , ## __VA_ARGS__); } while > (0) > - #define DPRINTF(fmt, ...) do {} while(0) > - #endif > - > -+#define FEC_MAX_DESC 1024 > - #define FEC_MAX_FRAME_SIZE 2032 > - > - typedef struct { > -@@ -149,7 +150,7 @@ static void mcf_fec_do_tx(mcf_fec_state *s) > - uint32_t addr; > - mcf_fec_bd bd; > - int frame_size; > -- int len; > -+ int len, descnt = 0; > - uint8_t frame[FEC_MAX_FRAME_SIZE]; > - uint8_t *ptr; > - > -@@ -157,7 +158,7 @@ static void mcf_fec_do_tx(mcf_fec_state *s) > - ptr = frame; > - frame_size = 0; > - addr = s->tx_descriptor; > -- while (1) { > -+ while (descnt++ < FEC_MAX_DESC) { > - mcf_fec_read_bd(&bd, addr); > - DPRINTF("tx_bd %x flags %04x len %d data %08x\n", > - addr, bd.flags, bd.length, bd.data); > --- > -2.9.3 > - > diff --git a/meta/recipes-devtools/qemu/qemu/0004-fix-CVE-2016-7909.patch > b/meta/recipes-devtools/qemu/qemu/0004-fix-CVE-2016-7909.patch > deleted file mode 100644 > index e71bbf6..0000000 > --- a/meta/recipes-devtools/qemu/qemu/0004-fix-CVE-2016-7909.patch > +++ /dev/null > @@ -1,42 +0,0 @@ > -Upstream-Status: Backport [http://git.qemu.org/?p=qemu. > git;a=commit;h=34e29ce] > -CVE: CVE-2016-7909 > - > -Signed-off-by: Kai Kang <kai.kang@windriver.com> > ---- > -From 34e29ce754c02bb6b3bdd244fbb85033460feaff Mon Sep 17 00:00:00 2001 > -From: Prasad J Pandit <pjp@fedoraproject.org> > -Date: Fri, 30 Sep 2016 00:27:33 +0530 > -Subject: [PATCH] net: pcnet: check rx/tx descriptor ring length > - > -The AMD PC-Net II emulator has set of control and status(CSR) > -registers. Of these, CSR76 and CSR78 hold receive and transmit > -descriptor ring length respectively. This ring length could range > -from 1 to 65535. Setting ring length to zero leads to an infinite > -loop in pcnet_rdra_addr() or pcnet_transmit(). Add check to avoid it. > - > -Reported-by: Li Qiang <liqiang6-s@360.cn> > -Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> > -Signed-off-by: Jason Wang <jasowang@redhat.com> > ---- > - hw/net/pcnet.c | 3 +++ > - 1 file changed, 3 insertions(+) > - > -diff --git a/hw/net/pcnet.c b/hw/net/pcnet.c > -index 198a01f..3078de8 100644 > ---- a/hw/net/pcnet.c > -+++ b/hw/net/pcnet.c > -@@ -1429,8 +1429,11 @@ static void pcnet_csr_writew(PCNetState *s, > uint32_t rap, uint32_t new_value) > - case 47: /* POLLINT */ > - case 72: > - case 74: > -+ break; > - case 76: /* RCVRL */ > - case 78: /* XMTRL */ > -+ val = (val > 0) ? val : 512; > -+ break; > - case 112: > - if (CSR_STOP(s) || CSR_SPND(s)) > - break; > --- > -2.10.1 > - > diff --git a/meta/recipes-devtools/qemu/qemu/Qemu-Arm-versatilepb-Add-memory-size-checking.patch > b/meta/recipes-devtools/qemu/qemu/Qemu-Arm-versatilepb-Add- > memory-size-checking.patch > deleted file mode 100644 > index 1a6cf51..0000000 > --- a/meta/recipes-devtools/qemu/qemu/Qemu-Arm-versatilepb-Add- > memory-size-checking.patch > +++ /dev/null > @@ -1,46 +0,0 @@ > -From 896fa02c24347e6e9259812cfda187b1d6ca6199 Mon Sep 17 00:00:00 2001 > -From: Jiang Lu <lu.jiang@windriver.com> > -Date: Wed, 13 Nov 2013 10:38:08 +0800 > -Subject: [PATCH] Qemu:Arm:versatilepb: Add memory size checking > - > -The machine can not work with memory over 256M, so add a checking > -at startup. If the memory size exceed 256M, just stop emulation then > -throw out warning about memory limitation. > - > -Upstream-Status: Pending > - > -Signed-off-by: Jiang Lu <lu.jiang@windriver.com> > - > -Updated it on 2014-01-15 for rebasing > - > -Signed-off-by: Robert Yang <liezhi.yang@windriver.com> > - > -Update it when upgrade qemu to 2.2.0 > - > -Signed-off-by: Kai Kang <kai.kang@windriver.com> > -Signed-off-by: Cristian Iorga <cristian.iorga@intel.com> > ---- > - hw/arm/versatilepb.c | 7 +++++++ > - 1 file changed, 7 insertions(+) > - > -diff --git a/hw/arm/versatilepb.c b/hw/arm/versatilepb.c > -index 6c69f4e..9278d90 100644 > ---- a/hw/arm/versatilepb.c > -+++ b/hw/arm/versatilepb.c > -@@ -204,6 +204,13 @@ static void versatile_init(MachineState *machine, > int board_id) > - exit(1); > - } > - > -+ if (machine->ram_size > (256 << 20)) { > -+ fprintf(stderr, > -+ "qemu: Too much memory for this machine: %d MB, maximum > 256 MB\n", > -+ ((unsigned int)ram_size / (1 << 20))); > -+ exit(1); > -+ } > -+ > - cpuobj = object_new(object_class_get_name(cpu_oc)); > - > - /* By default ARM1176 CPUs have EL3 enabled. This board does not > --- > -2.1.0 > - > diff --git a/meta/recipes-devtools/qemu/qemu/exclude-some-arm-EABI-obsolete-syscalls.patch > b/meta/recipes-devtools/qemu/qemu/exclude-some-arm-EABI- > obsolete-syscalls.patch > index 171bda7..60253bd 100644 > --- a/meta/recipes-devtools/qemu/qemu/exclude-some-arm-EABI- > obsolete-syscalls.patch > +++ b/meta/recipes-devtools/qemu/qemu/exclude-some-arm-EABI- > obsolete-syscalls.patch > @@ -1,4 +1,7 @@ > -[PATCH] exclude some arm EABI obsolete syscalls > +From 51910343594b3f655a205a096e092ecdacc253da Mon Sep 17 00:00:00 2001 > +From: "Roy.Li" <rongqing.li@windriver.com> > +Date: Mon, 23 Jun 2014 14:28:30 +0800 > +Subject: [PATCH 02/11] [PATCH] exclude some arm EABI obsolete syscalls > > Upstream-Status: Pending > > @@ -26,15 +29,16 @@ or kernel header: > /usr/include/asm/unistd.h > > Signed-off-by: Roy.Li <rongqing.li@windriver.com> > + > --- > - qemu-seccomp.c | 14 ++++++++------ > - 1 file changed, 8 insertions(+), 6 deletions(-) > + qemu-seccomp.c | 13 ++++++++----- > + 1 file changed, 8 insertions(+), 5 deletions(-) > > diff --git a/qemu-seccomp.c b/qemu-seccomp.c > -index caa926e..5a78502 100644 > +index df75d9c..0e577f8 100644 > --- a/qemu-seccomp.c > +++ b/qemu-seccomp.c > -@@ -25,15 +25,21 @@ static const struct QemuSeccompSyscall > seccomp_whitelist[] = { > +@@ -35,15 +35,21 @@ static const struct QemuSeccompSyscall > seccomp_whitelist[] = { > { SCMP_SYS(timer_settime), 255 }, > { SCMP_SYS(timer_gettime), 254 }, > { SCMP_SYS(futex), 253 }, > @@ -58,7 +62,7 @@ index caa926e..5a78502 100644 > { SCMP_SYS(mprotect), 246 }, > { SCMP_SYS(execve), 245 }, > { SCMP_SYS(open), 245 }, > -@@ -48,13 +54,11 @@ static const struct QemuSeccompSyscall > seccomp_whitelist[] = { > +@@ -58,7 +64,6 @@ static const struct QemuSeccompSyscall > seccomp_whitelist[] = { > { SCMP_SYS(bind), 245 }, > { SCMP_SYS(listen), 245 }, > { SCMP_SYS(semget), 245 }, > @@ -66,13 +70,7 @@ index caa926e..5a78502 100644 > { SCMP_SYS(gettimeofday), 245 }, > { SCMP_SYS(readlink), 245 }, > { SCMP_SYS(access), 245 }, > - { SCMP_SYS(prctl), 245 }, > - { SCMP_SYS(signalfd), 245 }, > -- { SCMP_SYS(getrlimit), 245 }, > - { SCMP_SYS(set_tid_address), 245 }, > - { SCMP_SYS(statfs), 245 }, > - { SCMP_SYS(unlink), 245 }, > -@@ -93,7 +97,6 @@ static const struct QemuSeccompSyscall > seccomp_whitelist[] = { > +@@ -104,7 +109,6 @@ static const struct QemuSeccompSyscall > seccomp_whitelist[] = { > { SCMP_SYS(times), 245 }, > { SCMP_SYS(exit), 245 }, > { SCMP_SYS(clock_gettime), 245 }, > @@ -80,7 +78,7 @@ index caa926e..5a78502 100644 > { SCMP_SYS(restart_syscall), 245 }, > { SCMP_SYS(pwrite64), 245 }, > { SCMP_SYS(nanosleep), 245 }, > -@@ -182,7 +185,6 @@ static const struct QemuSeccompSyscall > seccomp_whitelist[] = { > +@@ -194,7 +198,6 @@ static const struct QemuSeccompSyscall > seccomp_whitelist[] = { > { SCMP_SYS(lstat64), 241 }, > { SCMP_SYS(sendfile64), 241 }, > { SCMP_SYS(ugetrlimit), 241 }, > @@ -89,5 +87,5 @@ index caa926e..5a78502 100644 > { SCMP_SYS(rt_sigqueueinfo), 241 }, > { SCMP_SYS(rt_tgsigqueueinfo), 241 }, > -- > -1.9.1 > +2.1.4 > > diff --git a/meta/recipes-devtools/qemu/qemu_2.7.0.bb > b/meta/recipes-devtools/qemu/qemu_2.8.0.bb > similarity index 58% > rename from meta/recipes-devtools/qemu/qemu_2.7.0.bb > rename to meta/recipes-devtools/qemu/qemu_2.8.0.bb > index 0d680a7..efb1fb0 100644 > --- a/meta/recipes-devtools/qemu/qemu_2.7.0.bb > +++ b/meta/recipes-devtools/qemu/qemu_2.8.0.bb > @@ -5,20 +5,14 @@ LIC_FILES_CHKSUM = "file://COPYING;md5= > 441c28d2cf86e15a37fa47e15a72fbac \ > > SRC_URI += "file://configure-fix-Darwin-target-detection.patch \ > file://qemu-enlarge-env-entry-size.patch \ > - file://Qemu-Arm-versatilepb-Add-memory-size-checking.patch \ > file://no-valgrind.patch \ > file://pathlimit.patch \ > file://qemu-2.5.0-cflags.patch \ > - file://0001-virtio-zero-vq-inuse-in-virtio_reset.patch \ > - file://0002-fix-CVE-2016-7423.patch \ > - file://0003-fix-CVE-2016-7908.patch \ > - file://0004-fix-CVE-2016-7909.patch \ > - file://0001-pci-assign-sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch > \ > " > > SRC_URI_prepend = "http://wiki.qemu-project.org/download/${BP}.tar.bz2" > -SRC_URI[md5sum] = "08d4d06d1cb598efecd796137f4844ab" > -SRC_URI[sha256sum] = "326e739506ba690daf69fc17bd3913 > a6c313d9928d743bd8eddb82f403f81e53" > +SRC_URI[md5sum] = "17940dce063b6ce450a12e719a6c9c43" > +SRC_URI[sha256sum] = "dafd5d7f649907b6b617b822692f4c > 82e60cf29bc0fc58bc2036219b591e5e62" > > COMPATIBLE_HOST_mipsarchn32 = "null" > COMPATIBLE_HOST_mipsarchn64 = "null" > -- > 2.1.4 > > [-- Attachment #2: Type: text/html, Size: 33344 bytes --] ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCHv2] qemu: Upgrade to 2.8.0 2017-01-16 16:36 ` Burton, Ross @ 2017-01-16 16:43 ` Aníbal Limón 2017-01-16 16:47 ` Burton, Ross 0 siblings, 1 reply; 9+ messages in thread From: Aníbal Limón @ 2017-01-16 16:43 UTC (permalink / raw) To: Burton, Ross; +Cc: OE-core [-- Attachment #1: Type: text/plain, Size: 26692 bytes --] On 01/16/2017 10:36 AM, Burton, Ross wrote: > Looks like this is broken for ppc when building gobject-introspection: It's weird, i'll review it, but i don't imagine what is failing gobject-introspection because a qemu upgrade. Cheers, alimon > > http://errors.yoctoproject.org/Errors/Latest/Autobuilder/?filter=%20gobject-introspection:%20do_compile&type=failure&page=1 > > (top seven results in ross/mut2) > > Ross > > On 12 January 2017 at 16:19, Aníbal Limón <anibal.limon@linux.intel.com> > wrote: > >> Rebased patches: >> >> - exclude-some-arm-EABI-obsolete-syscalls.patc >> >> Removed patches (already in upstream): >> >> - 0001-pci-assign-sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch >> - 0002-fix-CVE-2016-7423.patch >> - 0003-fix-CVE-2016-7908.patch >> - 0004-fix-CVE-2016-7909.patch >> - Qemu-Arm-versatilepb-Add-memory-size-checking.patch >> - 0001-target-mips-add-24KEc-CPU-definition.patch >> >> Changelog, >> >> http://wiki.qemu.org/ChangeLog/2.8 >> >> Signed-off-by: Aníbal Limón <anibal.limon@linux.intel.com> >> --- >> meta/conf/auto.conf | 6 ++ >> meta/recipes-devtools/qemu/qemu.inc | 3 - >> ...sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch | 71 >> ---------------------- >> ...0001-target-mips-add-24KEc-CPU-definition.patch | 54 ---------------- >> ...0001-virtio-zero-vq-inuse-in-virtio_reset.patch | 57 ----------------- >> .../qemu/qemu/0002-fix-CVE-2016-7423.patch | 45 -------------- >> .../qemu/qemu/0003-fix-CVE-2016-7908.patch | 62 >> ------------------- >> .../qemu/qemu/0004-fix-CVE-2016-7909.patch | 42 ------------- >> ...-Arm-versatilepb-Add-memory-size-checking.patch | 46 -------------- >> .../exclude-some-arm-EABI-obsolete-syscalls.patch | 28 ++++----- >> .../qemu/{qemu_2.7.0.bb => qemu_2.8.0.bb} | 10 +-- >> 11 files changed, 21 insertions(+), 403 deletions(-) >> create mode 100644 meta/conf/auto.conf >> delete mode 100644 meta/recipes-devtools/qemu/ >> qemu/0001-pci-assign-sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch >> delete mode 100644 meta/recipes-devtools/qemu/qemu/0001-target-mips-add- >> 24KEc-CPU-definition.patch >> delete mode 100644 meta/recipes-devtools/qemu/qemu/0001-virtio-zero-vq- >> inuse-in-virtio_reset.patch >> delete mode 100644 meta/recipes-devtools/qemu/ >> qemu/0002-fix-CVE-2016-7423.patch >> delete mode 100644 meta/recipes-devtools/qemu/ >> qemu/0003-fix-CVE-2016-7908.patch >> delete mode 100644 meta/recipes-devtools/qemu/ >> qemu/0004-fix-CVE-2016-7909.patch >> delete mode 100644 meta/recipes-devtools/qemu/ >> qemu/Qemu-Arm-versatilepb-Add-memory-size-checking.patch >> rename meta/recipes-devtools/qemu/{qemu_2.7.0.bb => qemu_2.8.0.bb} (58%) >> >> diff --git a/meta/conf/auto.conf b/meta/conf/auto.conf >> new file mode 100644 >> index 0000000..492ac82 >> --- /dev/null >> +++ b/meta/conf/auto.conf >> @@ -0,0 +1,6 @@ >> +SSTATE_MIRRORS = "file://.* http://yctb01.zpn.intel.com/data/sstates/PATH >> \n" >> +PREMIRRORS_prepend = "\ >> + git://.*/.* http://yctb01.zpn.intel.com/data/sources/ \n \ >> + ftp://.*/.* http://yctb01.zpn.intel.com/data/sources/ \n \ >> + http://.*/.* http://yctb01.zpn.intel.com/data/sources/ \n \ >> + https://.*/.* http://yctb01.zpn.intel.com/data/sources/ \n" >> diff --git a/meta/recipes-devtools/qemu/qemu.inc >> b/meta/recipes-devtools/qemu/qemu.inc >> index b46e7f7..e3af5c2 100644 >> --- a/meta/recipes-devtools/qemu/qemu.inc >> +++ b/meta/recipes-devtools/qemu/qemu.inc >> @@ -9,8 +9,6 @@ require qemu-targets.inc >> inherit autotools ptest >> BBCLASSEXTEND = "native nativesdk" >> >> -PR = "r1" >> - >> # QEMU_TARGETS is overridable variable >> QEMU_TARGETS ?= "arm aarch64 i386 mips mipsel mips64 mips64el ppc sh4 >> x86_64" >> >> @@ -21,7 +19,6 @@ SRC_URI = "\ >> file://wacom.patch \ >> file://add-ptest-in-makefile.patch \ >> file://run-ptest \ >> - file://0001-target-mips-add-24KEc-CPU-definition.patch \ >> " >> >> SRC_URI_append_class-native = "\ >> diff --git a/meta/recipes-devtools/qemu/qemu/0001-pci-assign-sync-MSI- >> MSI-X-cap-and-table-with-PCIDevi.patch b/meta/recipes-devtools/qemu/ >> qemu/0001-pci-assign-sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch >> deleted file mode 100644 >> index 03472dd..0000000 >> --- a/meta/recipes-devtools/qemu/qemu/0001-pci-assign-sync-MSI- >> MSI-X-cap-and-table-with-PCIDevi.patch >> +++ /dev/null >> @@ -1,71 +0,0 @@ >> -From 6baa545df93253fced4fc0d52b14b98447e00473 Mon Sep 17 00:00:00 2001 >> -From: Peter Xu <peterx@redhat.com> >> -Date: Mon, 28 Nov 2016 15:02:44 +0800 >> -Subject: [PATCH] pci-assign: sync MSI/MSI-X cap and table with PCIDevice >> - >> -Since commit e1d4fb2d ("kvm-irqchip: x86: add msi route notify fn"), >> -kvm_irqchip_add_msi_route() starts to use pci_get_msi_message() to fetch >> -MSI info. This requires that we setup MSI related fields in PCIDevice. >> -For most devices, that won't be a problem, as long as we are using >> -general interfaces like msi_init()/msix_init(). >> - >> -However, for pci-assign devices, MSI/MSI-X is treated differently - PCI >> -assign devices are maintaining its own MSI table and cap information in >> -AssignedDevice struct. however that's not synced up with PCIDevice's >> -fields. That will leads to pci_get_msi_message() failed to find correct >> -MSI capability, even with an NULL msix_table. >> - >> -A quick fix is to sync up the two places: both the capability bits and >> -table address for MSI/MSI-X. >> - >> -Upstream-Status: Backport [https://lists.gnu.org/ >> archive/html/qemu-devel/2016-11/msg04649.html] >> - >> -Reported-by: Changlimin <address@hidden> >> -Tested-by: Changlimin <address@hidden> >> -Cc: address@hidden >> -Fixes: e1d4fb2d ("kvm-irqchip: x86: add msi route notify fn") >> -Signed-off-by: Peter Xu <address@hidden> >> -Signed-off-by: He Zhe <zhe.he@windriver.com> >> ---- >> - hw/i386/kvm/pci-assign.c | 4 ++++ >> - 1 file changed, 4 insertions(+) >> - >> -diff --git a/hw/i386/kvm/pci-assign.c b/hw/i386/kvm/pci-assign.c >> -index 8238fbc..87dcbdd 100644 >> ---- a/hw/i386/kvm/pci-assign.c >> -+++ b/hw/i386/kvm/pci-assign.c >> -@@ -1251,6 +1251,7 @@ static int assigned_device_pci_cap_init(PCIDevice >> *pci_dev, Error **errp) >> - error_propagate(errp, local_err); >> - return -ENOTSUP; >> - } >> -+ dev->dev.cap_present |= QEMU_PCI_CAP_MSI; >> - dev->cap.available |= ASSIGNED_DEVICE_CAP_MSI; >> - /* Only 32-bit/no-mask currently supported */ >> - ret = pci_add_capability2(pci_dev, PCI_CAP_ID_MSI, pos, 10, >> -@@ -1285,6 +1286,7 @@ static int assigned_device_pci_cap_init(PCIDevice >> *pci_dev, Error **errp) >> - error_propagate(errp, local_err); >> - return -ENOTSUP; >> - } >> -+ dev->dev.cap_present |= QEMU_PCI_CAP_MSIX; >> - dev->cap.available |= ASSIGNED_DEVICE_CAP_MSIX; >> - ret = pci_add_capability2(pci_dev, PCI_CAP_ID_MSIX, pos, 12, >> - &local_err); >> -@@ -1648,6 +1650,7 @@ static void assigned_dev_register_msix_mmio(AssignedDevice >> *dev, Error **errp) >> - dev->msix_table = NULL; >> - return; >> - } >> -+ dev->dev.msix_table = (uint8_t *)dev->msix_table; >> - >> - assigned_dev_msix_reset(dev); >> - >> -@@ -1665,6 +1668,7 @@ static void assigned_dev_unregister_msix_mmio(AssignedDevice >> *dev) >> - error_report("error unmapping msix_table! %s", strerror(errno)); >> - } >> - dev->msix_table = NULL; >> -+ dev->dev.msix_table = NULL; >> - } >> - >> - static const VMStateDescription vmstate_assigned_device = { >> --- >> -2.8.3 >> - >> diff --git a/meta/recipes-devtools/qemu/qemu/0001-target-mips-add-24KEc-CPU-definition.patch >> b/meta/recipes-devtools/qemu/qemu/0001-target-mips-add- >> 24KEc-CPU-definition.patch >> deleted file mode 100644 >> index c4dbee7..0000000 >> --- a/meta/recipes-devtools/qemu/qemu/0001-target-mips-add- >> 24KEc-CPU-definition.patch >> +++ /dev/null >> @@ -1,54 +0,0 @@ >> -From 926bc194f918d46bd93557b15da8153b6a94a1d5 Mon Sep 17 00:00:00 2001 >> -From: =?UTF-8?q?Andr=C3=A9=20Draszik?= <git@andred.net> >> -Date: Mon, 25 Jul 2016 23:58:22 +0100 >> -Subject: [PATCH] target-mips: add 24KEc CPU definition >> -MIME-Version: 1.0 >> -Content-Type: text/plain; charset=UTF-8 >> -Content-Transfer-Encoding: 8bit >> - >> -Define a new CPU definition supporting 24KEc cores, similar to >> -the existing 24Kc, but with added support for DSP instructions >> -and MIPS16e (and without FPU). >> - >> -Signed-off-by: André Draszik <git@andred.net> >> ---- >> -Upstream-Status: Submitted [http://lists.nongnu.org/ >> archive/html/qemu-devel/2016-07/msg05778.html] >> - target-mips/translate_init.c | 22 ++++++++++++++++++++++ >> - 1 file changed, 22 insertions(+) >> - >> -diff --git a/target-mips/translate_init.c b/target-mips/translate_init.c >> -index 39ed5c4..6ae23e4 100644 >> ---- a/target-mips/translate_init.c >> -+++ b/target-mips/translate_init.c >> -@@ -256,6 +256,28 @@ static const mips_def_t mips_defs[] = >> - .mmu_type = MMU_TYPE_R4000, >> - }, >> - { >> -+ .name = "24KEc", >> -+ .CP0_PRid = 0x00019600, >> -+ .CP0_Config0 = MIPS_CONFIG0 | (0x1 << CP0C0_AR) | >> -+ (MMU_TYPE_R4000 << CP0C0_MT), >> -+ .CP0_Config1 = MIPS_CONFIG1 | (15 << CP0C1_MMU) | >> -+ (0 << CP0C1_IS) | (3 << CP0C1_IL) | (1 << >> CP0C1_IA) | >> -+ (0 << CP0C1_DS) | (3 << CP0C1_DL) | (1 << >> CP0C1_DA) | >> -+ (1 << CP0C1_CA), >> -+ .CP0_Config2 = MIPS_CONFIG2, >> -+ .CP0_Config3 = MIPS_CONFIG3 | (1 << CP0C3_DSPP) | (0 << >> CP0C3_VInt), >> -+ .CP0_LLAddr_rw_bitmask = 0, >> -+ .CP0_LLAddr_shift = 4, >> -+ .SYNCI_Step = 32, >> -+ .CCRes = 2, >> -+ /* we have a DSP, but no FPU */ >> -+ .CP0_Status_rw_bitmask = 0x1378FF1F, >> -+ .SEGBITS = 32, >> -+ .PABITS = 32, >> -+ .insn_flags = CPU_MIPS32R2 | ASE_MIPS16 | ASE_DSP, >> -+ .mmu_type = MMU_TYPE_R4000, >> -+ }, >> -+ { >> - .name = "24Kf", >> - .CP0_PRid = 0x00019300, >> - .CP0_Config0 = MIPS_CONFIG0 | (0x1 << CP0C0_AR) | >> --- >> -2.8.1 >> - >> diff --git a/meta/recipes-devtools/qemu/qemu/0001-virtio-zero-vq-inuse-in-virtio_reset.patch >> b/meta/recipes-devtools/qemu/qemu/0001-virtio-zero-vq- >> inuse-in-virtio_reset.patch >> deleted file mode 100644 >> index 86955d0..0000000 >> --- a/meta/recipes-devtools/qemu/qemu/0001-virtio-zero-vq- >> inuse-in-virtio_reset.patch >> +++ /dev/null >> @@ -1,57 +0,0 @@ >> -Upstream-Status: Backport >> - >> -Supplementary fix of CVE-2016-5403 which is backported from: >> - >> -http://git.qemu.org/?p=qemu.git;a=commit;h=4b7f91e >> - >> -Signed-off-by: Kai Kang <kai.kang@windriver.com> >> ---- >> -From 4b7f91ed0270a371e1933efa21ba600b6da23ab9 Mon Sep 17 00:00:00 2001 >> -From: Stefan Hajnoczi <stefanha@redhat.com> >> -Date: Wed, 7 Sep 2016 11:51:25 -0400 >> -Subject: [PATCH] virtio: zero vq->inuse in virtio_reset() >> - >> -vq->inuse must be zeroed upon device reset like most other virtqueue >> -fields. >> - >> -In theory, virtio_reset() just needs assert(vq->inuse == 0) since >> -devices must clean up in-flight requests during reset (requests cannot >> -not be leaked!). >> - >> -In practice, it is difficult to achieve vq->inuse == 0 across reset >> -because balloon, blk, 9p, etc implement various different strategies for >> -cleaning up requests. Most devices call g_free(elem) directly without >> -telling virtio.c that the VirtQueueElement is cleaned up. Therefore >> -vq->inuse is not decremented during reset. >> - >> -This patch zeroes vq->inuse and trusts that devices are not leaking >> -VirtQueueElements across reset. >> - >> -I will send a follow-up series that refactors request life-cycle across >> -all devices and converts vq->inuse = 0 into assert(vq->inuse == 0) but >> -this more invasive approach is not appropriate for stable trees. >> - >> -Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> >> -Cc: qemu-stable <qemu-stable@nongnu.org> >> -Reviewed-by: Michael S. Tsirkin <mst@redhat.com> >> -Signed-off-by: Michael S. Tsirkin <mst@redhat.com> >> -Reviewed-by: Ladi Prosek <lprosek@redhat.com> >> ---- >> - hw/virtio/virtio.c | 1 + >> - 1 file changed, 1 insertion(+) >> - >> -diff --git a/hw/virtio/virtio.c b/hw/virtio/virtio.c >> -index 74c085c..e8a13a5 100644 >> ---- a/hw/virtio/virtio.c >> -+++ b/hw/virtio/virtio.c >> -@@ -822,6 +822,7 @@ void virtio_reset(void *opaque) >> - vdev->vq[i].signalled_used_valid = false; >> - vdev->vq[i].notification = true; >> - vdev->vq[i].vring.num = vdev->vq[i].vring.num_default; >> -+ vdev->vq[i].inuse = 0; >> - } >> - } >> - >> --- >> -2.9.3 >> - >> diff --git a/meta/recipes-devtools/qemu/qemu/0002-fix-CVE-2016-7423.patch >> b/meta/recipes-devtools/qemu/qemu/0002-fix-CVE-2016-7423.patch >> deleted file mode 100644 >> index fdf58a3..0000000 >> --- a/meta/recipes-devtools/qemu/qemu/0002-fix-CVE-2016-7423.patch >> +++ /dev/null >> @@ -1,45 +0,0 @@ >> -Upstream-Status: Backport >> - >> -Backport patch to fix CVE-2016-7423 from: >> - >> -http://git.qemu.org/?p=qemu.git;a=commit;h=670e56d3ed >> - >> -CVE: CVE-2016-7423 >> - >> -Signed-off-by: Kai Kang <kai.kang@windriver.com> >> ---- >> -From 670e56d3ed2918b3861d9216f2c0540d9e9ae0d5 Mon Sep 17 00:00:00 2001 >> -From: Li Qiang <liqiang6-s@360.cn> >> -Date: Mon, 12 Sep 2016 18:14:11 +0530 >> -Subject: [PATCH] scsi: mptsas: use g_new0 to allocate MPTSASRequest object >> - >> -When processing IO request in mptsas, it uses g_new to allocate >> -a 'req' object. If an error occurs before 'req->sreq' is >> -allocated, It could lead to an OOB write in mptsas_free_request >> -function. Use g_new0 to avoid it. >> - >> -Reported-by: Li Qiang <liqiang6-s@360.cn> >> -Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> >> -Message-Id: <1473684251-17476-1-git-send-email-ppandit@redhat.com> >> -Cc: qemu-stable@nongnu.org >> -Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> >> ---- >> - hw/scsi/mptsas.c | 2 +- >> - 1 file changed, 1 insertion(+), 1 deletion(-) >> - >> -diff --git a/hw/scsi/mptsas.c b/hw/scsi/mptsas.c >> -index 0e0a22f..eaae1bb 100644 >> ---- a/hw/scsi/mptsas.c >> -+++ b/hw/scsi/mptsas.c >> -@@ -304,7 +304,7 @@ static int mptsas_process_scsi_io_request(MPTSASState >> *s, >> - goto bad; >> - } >> - >> -- req = g_new(MPTSASRequest, 1); >> -+ req = g_new0(MPTSASRequest, 1); >> - QTAILQ_INSERT_TAIL(&s->pending, req, next); >> - req->scsi_io = *scsi_io; >> - req->dev = s; >> --- >> -2.9.3 >> - >> diff --git a/meta/recipes-devtools/qemu/qemu/0003-fix-CVE-2016-7908.patch >> b/meta/recipes-devtools/qemu/qemu/0003-fix-CVE-2016-7908.patch >> deleted file mode 100644 >> index 05cc3d9..0000000 >> --- a/meta/recipes-devtools/qemu/qemu/0003-fix-CVE-2016-7908.patch >> +++ /dev/null >> @@ -1,62 +0,0 @@ >> -Upstream-Status: Backport >> - >> -Backport patch to fix CVE-2016-7908 from: >> - >> -http://git.qemu.org/?p=qemu.git;a=commit;h=070c4b92b8c >> - >> -CVE: CVE-2016-7908 >> - >> -Signed-off-by: Kai Kang <kai.kang@windriver.com> >> ---- >> -From 070c4b92b8cd5390889716677a0b92444d6e087a Mon Sep 17 00:00:00 2001 >> -From: Prasad J Pandit <pjp@fedoraproject.org> >> -Date: Thu, 22 Sep 2016 16:02:37 +0530 >> -Subject: [PATCH] net: mcf: limit buffer descriptor count >> - >> -ColdFire Fast Ethernet Controller uses buffer descriptors to manage >> -data flow to/fro receive & transmit queues. While transmitting >> -packets, it could continue to read buffer descriptors if a buffer >> -descriptor has length of zero and has crafted values in bd.flags. >> -Set upper limit to number of buffer descriptors. >> - >> -Reported-by: Li Qiang <liqiang6-s@360.cn> >> -Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> >> -Reviewed-by: Paolo Bonzini <pbonzini@redhat.com> >> -Signed-off-by: Jason Wang <jasowang@redhat.com> >> ---- >> - hw/net/mcf_fec.c | 5 +++-- >> - 1 file changed, 3 insertions(+), 2 deletions(-) >> - >> -diff --git a/hw/net/mcf_fec.c b/hw/net/mcf_fec.c >> -index 0ee8ad9..d31fea1 100644 >> ---- a/hw/net/mcf_fec.c >> -+++ b/hw/net/mcf_fec.c >> -@@ -23,6 +23,7 @@ do { printf("mcf_fec: " fmt , ## __VA_ARGS__); } while >> (0) >> - #define DPRINTF(fmt, ...) do {} while(0) >> - #endif >> - >> -+#define FEC_MAX_DESC 1024 >> - #define FEC_MAX_FRAME_SIZE 2032 >> - >> - typedef struct { >> -@@ -149,7 +150,7 @@ static void mcf_fec_do_tx(mcf_fec_state *s) >> - uint32_t addr; >> - mcf_fec_bd bd; >> - int frame_size; >> -- int len; >> -+ int len, descnt = 0; >> - uint8_t frame[FEC_MAX_FRAME_SIZE]; >> - uint8_t *ptr; >> - >> -@@ -157,7 +158,7 @@ static void mcf_fec_do_tx(mcf_fec_state *s) >> - ptr = frame; >> - frame_size = 0; >> - addr = s->tx_descriptor; >> -- while (1) { >> -+ while (descnt++ < FEC_MAX_DESC) { >> - mcf_fec_read_bd(&bd, addr); >> - DPRINTF("tx_bd %x flags %04x len %d data %08x\n", >> - addr, bd.flags, bd.length, bd.data); >> --- >> -2.9.3 >> - >> diff --git a/meta/recipes-devtools/qemu/qemu/0004-fix-CVE-2016-7909.patch >> b/meta/recipes-devtools/qemu/qemu/0004-fix-CVE-2016-7909.patch >> deleted file mode 100644 >> index e71bbf6..0000000 >> --- a/meta/recipes-devtools/qemu/qemu/0004-fix-CVE-2016-7909.patch >> +++ /dev/null >> @@ -1,42 +0,0 @@ >> -Upstream-Status: Backport [http://git.qemu.org/?p=qemu. >> git;a=commit;h=34e29ce] >> -CVE: CVE-2016-7909 >> - >> -Signed-off-by: Kai Kang <kai.kang@windriver.com> >> ---- >> -From 34e29ce754c02bb6b3bdd244fbb85033460feaff Mon Sep 17 00:00:00 2001 >> -From: Prasad J Pandit <pjp@fedoraproject.org> >> -Date: Fri, 30 Sep 2016 00:27:33 +0530 >> -Subject: [PATCH] net: pcnet: check rx/tx descriptor ring length >> - >> -The AMD PC-Net II emulator has set of control and status(CSR) >> -registers. Of these, CSR76 and CSR78 hold receive and transmit >> -descriptor ring length respectively. This ring length could range >> -from 1 to 65535. Setting ring length to zero leads to an infinite >> -loop in pcnet_rdra_addr() or pcnet_transmit(). Add check to avoid it. >> - >> -Reported-by: Li Qiang <liqiang6-s@360.cn> >> -Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> >> -Signed-off-by: Jason Wang <jasowang@redhat.com> >> ---- >> - hw/net/pcnet.c | 3 +++ >> - 1 file changed, 3 insertions(+) >> - >> -diff --git a/hw/net/pcnet.c b/hw/net/pcnet.c >> -index 198a01f..3078de8 100644 >> ---- a/hw/net/pcnet.c >> -+++ b/hw/net/pcnet.c >> -@@ -1429,8 +1429,11 @@ static void pcnet_csr_writew(PCNetState *s, >> uint32_t rap, uint32_t new_value) >> - case 47: /* POLLINT */ >> - case 72: >> - case 74: >> -+ break; >> - case 76: /* RCVRL */ >> - case 78: /* XMTRL */ >> -+ val = (val > 0) ? val : 512; >> -+ break; >> - case 112: >> - if (CSR_STOP(s) || CSR_SPND(s)) >> - break; >> --- >> -2.10.1 >> - >> diff --git a/meta/recipes-devtools/qemu/qemu/Qemu-Arm-versatilepb-Add-memory-size-checking.patch >> b/meta/recipes-devtools/qemu/qemu/Qemu-Arm-versatilepb-Add- >> memory-size-checking.patch >> deleted file mode 100644 >> index 1a6cf51..0000000 >> --- a/meta/recipes-devtools/qemu/qemu/Qemu-Arm-versatilepb-Add- >> memory-size-checking.patch >> +++ /dev/null >> @@ -1,46 +0,0 @@ >> -From 896fa02c24347e6e9259812cfda187b1d6ca6199 Mon Sep 17 00:00:00 2001 >> -From: Jiang Lu <lu.jiang@windriver.com> >> -Date: Wed, 13 Nov 2013 10:38:08 +0800 >> -Subject: [PATCH] Qemu:Arm:versatilepb: Add memory size checking >> - >> -The machine can not work with memory over 256M, so add a checking >> -at startup. If the memory size exceed 256M, just stop emulation then >> -throw out warning about memory limitation. >> - >> -Upstream-Status: Pending >> - >> -Signed-off-by: Jiang Lu <lu.jiang@windriver.com> >> - >> -Updated it on 2014-01-15 for rebasing >> - >> -Signed-off-by: Robert Yang <liezhi.yang@windriver.com> >> - >> -Update it when upgrade qemu to 2.2.0 >> - >> -Signed-off-by: Kai Kang <kai.kang@windriver.com> >> -Signed-off-by: Cristian Iorga <cristian.iorga@intel.com> >> ---- >> - hw/arm/versatilepb.c | 7 +++++++ >> - 1 file changed, 7 insertions(+) >> - >> -diff --git a/hw/arm/versatilepb.c b/hw/arm/versatilepb.c >> -index 6c69f4e..9278d90 100644 >> ---- a/hw/arm/versatilepb.c >> -+++ b/hw/arm/versatilepb.c >> -@@ -204,6 +204,13 @@ static void versatile_init(MachineState *machine, >> int board_id) >> - exit(1); >> - } >> - >> -+ if (machine->ram_size > (256 << 20)) { >> -+ fprintf(stderr, >> -+ "qemu: Too much memory for this machine: %d MB, maximum >> 256 MB\n", >> -+ ((unsigned int)ram_size / (1 << 20))); >> -+ exit(1); >> -+ } >> -+ >> - cpuobj = object_new(object_class_get_name(cpu_oc)); >> - >> - /* By default ARM1176 CPUs have EL3 enabled. This board does not >> --- >> -2.1.0 >> - >> diff --git a/meta/recipes-devtools/qemu/qemu/exclude-some-arm-EABI-obsolete-syscalls.patch >> b/meta/recipes-devtools/qemu/qemu/exclude-some-arm-EABI- >> obsolete-syscalls.patch >> index 171bda7..60253bd 100644 >> --- a/meta/recipes-devtools/qemu/qemu/exclude-some-arm-EABI- >> obsolete-syscalls.patch >> +++ b/meta/recipes-devtools/qemu/qemu/exclude-some-arm-EABI- >> obsolete-syscalls.patch >> @@ -1,4 +1,7 @@ >> -[PATCH] exclude some arm EABI obsolete syscalls >> +From 51910343594b3f655a205a096e092ecdacc253da Mon Sep 17 00:00:00 2001 >> +From: "Roy.Li" <rongqing.li@windriver.com> >> +Date: Mon, 23 Jun 2014 14:28:30 +0800 >> +Subject: [PATCH 02/11] [PATCH] exclude some arm EABI obsolete syscalls >> >> Upstream-Status: Pending >> >> @@ -26,15 +29,16 @@ or kernel header: >> /usr/include/asm/unistd.h >> >> Signed-off-by: Roy.Li <rongqing.li@windriver.com> >> + >> --- >> - qemu-seccomp.c | 14 ++++++++------ >> - 1 file changed, 8 insertions(+), 6 deletions(-) >> + qemu-seccomp.c | 13 ++++++++----- >> + 1 file changed, 8 insertions(+), 5 deletions(-) >> >> diff --git a/qemu-seccomp.c b/qemu-seccomp.c >> -index caa926e..5a78502 100644 >> +index df75d9c..0e577f8 100644 >> --- a/qemu-seccomp.c >> +++ b/qemu-seccomp.c >> -@@ -25,15 +25,21 @@ static const struct QemuSeccompSyscall >> seccomp_whitelist[] = { >> +@@ -35,15 +35,21 @@ static const struct QemuSeccompSyscall >> seccomp_whitelist[] = { >> { SCMP_SYS(timer_settime), 255 }, >> { SCMP_SYS(timer_gettime), 254 }, >> { SCMP_SYS(futex), 253 }, >> @@ -58,7 +62,7 @@ index caa926e..5a78502 100644 >> { SCMP_SYS(mprotect), 246 }, >> { SCMP_SYS(execve), 245 }, >> { SCMP_SYS(open), 245 }, >> -@@ -48,13 +54,11 @@ static const struct QemuSeccompSyscall >> seccomp_whitelist[] = { >> +@@ -58,7 +64,6 @@ static const struct QemuSeccompSyscall >> seccomp_whitelist[] = { >> { SCMP_SYS(bind), 245 }, >> { SCMP_SYS(listen), 245 }, >> { SCMP_SYS(semget), 245 }, >> @@ -66,13 +70,7 @@ index caa926e..5a78502 100644 >> { SCMP_SYS(gettimeofday), 245 }, >> { SCMP_SYS(readlink), 245 }, >> { SCMP_SYS(access), 245 }, >> - { SCMP_SYS(prctl), 245 }, >> - { SCMP_SYS(signalfd), 245 }, >> -- { SCMP_SYS(getrlimit), 245 }, >> - { SCMP_SYS(set_tid_address), 245 }, >> - { SCMP_SYS(statfs), 245 }, >> - { SCMP_SYS(unlink), 245 }, >> -@@ -93,7 +97,6 @@ static const struct QemuSeccompSyscall >> seccomp_whitelist[] = { >> +@@ -104,7 +109,6 @@ static const struct QemuSeccompSyscall >> seccomp_whitelist[] = { >> { SCMP_SYS(times), 245 }, >> { SCMP_SYS(exit), 245 }, >> { SCMP_SYS(clock_gettime), 245 }, >> @@ -80,7 +78,7 @@ index caa926e..5a78502 100644 >> { SCMP_SYS(restart_syscall), 245 }, >> { SCMP_SYS(pwrite64), 245 }, >> { SCMP_SYS(nanosleep), 245 }, >> -@@ -182,7 +185,6 @@ static const struct QemuSeccompSyscall >> seccomp_whitelist[] = { >> +@@ -194,7 +198,6 @@ static const struct QemuSeccompSyscall >> seccomp_whitelist[] = { >> { SCMP_SYS(lstat64), 241 }, >> { SCMP_SYS(sendfile64), 241 }, >> { SCMP_SYS(ugetrlimit), 241 }, >> @@ -89,5 +87,5 @@ index caa926e..5a78502 100644 >> { SCMP_SYS(rt_sigqueueinfo), 241 }, >> { SCMP_SYS(rt_tgsigqueueinfo), 241 }, >> -- >> -1.9.1 >> +2.1.4 >> >> diff --git a/meta/recipes-devtools/qemu/qemu_2.7.0.bb >> b/meta/recipes-devtools/qemu/qemu_2.8.0.bb >> similarity index 58% >> rename from meta/recipes-devtools/qemu/qemu_2.7.0.bb >> rename to meta/recipes-devtools/qemu/qemu_2.8.0.bb >> index 0d680a7..efb1fb0 100644 >> --- a/meta/recipes-devtools/qemu/qemu_2.7.0.bb >> +++ b/meta/recipes-devtools/qemu/qemu_2.8.0.bb >> @@ -5,20 +5,14 @@ LIC_FILES_CHKSUM = "file://COPYING;md5= >> 441c28d2cf86e15a37fa47e15a72fbac \ >> >> SRC_URI += "file://configure-fix-Darwin-target-detection.patch \ >> file://qemu-enlarge-env-entry-size.patch \ >> - file://Qemu-Arm-versatilepb-Add-memory-size-checking.patch \ >> file://no-valgrind.patch \ >> file://pathlimit.patch \ >> file://qemu-2.5.0-cflags.patch \ >> - file://0001-virtio-zero-vq-inuse-in-virtio_reset.patch \ >> - file://0002-fix-CVE-2016-7423.patch \ >> - file://0003-fix-CVE-2016-7908.patch \ >> - file://0004-fix-CVE-2016-7909.patch \ >> - file://0001-pci-assign-sync-MSI-MSI-X-cap-and-table-with-PCIDevi.patch >> \ >> " >> >> SRC_URI_prepend = "http://wiki.qemu-project.org/download/${BP}.tar.bz2" >> -SRC_URI[md5sum] = "08d4d06d1cb598efecd796137f4844ab" >> -SRC_URI[sha256sum] = "326e739506ba690daf69fc17bd3913 >> a6c313d9928d743bd8eddb82f403f81e53" >> +SRC_URI[md5sum] = "17940dce063b6ce450a12e719a6c9c43" >> +SRC_URI[sha256sum] = "dafd5d7f649907b6b617b822692f4c >> 82e60cf29bc0fc58bc2036219b591e5e62" >> >> COMPATIBLE_HOST_mipsarchn32 = "null" >> COMPATIBLE_HOST_mipsarchn64 = "null" >> -- >> 2.1.4 >> >> > [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 836 bytes --] ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCHv2] qemu: Upgrade to 2.8.0 2017-01-16 16:43 ` Aníbal Limón @ 2017-01-16 16:47 ` Burton, Ross 2017-01-16 21:42 ` Aníbal Limón 0 siblings, 1 reply; 9+ messages in thread From: Burton, Ross @ 2017-01-16 16:47 UTC (permalink / raw) To: Aníbal Limón; +Cc: OE-core [-- Attachment #1: Type: text/plain, Size: 300 bytes --] On 16 January 2017 at 16:43, Aníbal Limón <anibal.limon@linux.intel.com> wrote: > It's weird, i'll review it, but i don't imagine what is failing > gobject-introspection because a qemu upgrade. > The g-i build runs largely inside a qemu-user instance (the crash is inside qemu). Ross [-- Attachment #2: Type: text/html, Size: 727 bytes --] ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCHv2] qemu: Upgrade to 2.8.0 2017-01-16 16:47 ` Burton, Ross @ 2017-01-16 21:42 ` Aníbal Limón 2017-01-17 12:04 ` Alexander Kanavin 2017-01-19 22:46 ` Aníbal Limón 0 siblings, 2 replies; 9+ messages in thread From: Aníbal Limón @ 2017-01-16 21:42 UTC (permalink / raw) To: Burton, Ross; +Cc: OE-core [-- Attachment #1: Type: text/plain, Size: 2467 bytes --] On 01/16/2017 10:47 AM, Burton, Ross wrote: > On 16 January 2017 at 16:43, Aníbal Limón <anibal.limon@linux.intel.com> > wrote: > >> It's weird, i'll review it, but i don't imagine what is failing >> gobject-introspection because a qemu upgrade. >> > > The g-i build runs largely inside a qemu-user instance (the crash is inside > qemu). Hi, I got the stack trace, it's an issue in the PPC TCG some patches in upstream looks like could be cause the problem [1][2][3]. (gdb) bt #0 0x000000000086e204 in static_code_gen_buffer () #1 0x000000000040e922 in cpu_tb_exec (itb=<optimized out>, itb=<optimized out>, cpu=0x29864d0) at /home/alimon/repos/poky/build-ppc/tmp/work/x86_64-linux/qemu-native/2.8.0-r0/qemu-2.8.0/cpu-exec.c:164 #2 cpu_loop_exec_tb (sc=<optimized out>, tb_exit=<synthetic pointer>, last_tb=<synthetic pointer>, tb=<optimized out>, cpu=0x29864d0) at /home/alimon/repos/poky/build-ppc/tmp/work/x86_64-linux/qemu-native/2.8.0-r0/qemu-2.8.0/cpu-exec.c:544 #3 cpu_exec (cpu=cpu@entry=0x29864d0) at /home/alimon/repos/poky/build-ppc/tmp/work/x86_64-linux/qemu-native/2.8.0-r0/qemu-2.8.0/cpu-exec.c:638 #4 0x0000000000445fba in cpu_loop (env=env@entry=0x298e750) at /home/alimon/repos/poky/build-ppc/tmp/work/x86_64-linux/qemu-native/2.8.0-r0/qemu-2.8.0/linux-user/main.c:1359 #5 0x0000000000448a95 in clone_func (arg=0x7fffffffa910) at /home/alimon/repos/poky/build-ppc/tmp/work/x86_64-linux/qemu-native/2.8.0-r0/qemu-2.8.0/linux-user/syscall.c:6090 #6 0x00007ffff6a750a4 in start_thread (arg=0x7ffff7f4d700) at pthread_create.c:309 #7 0x00007ffff67aa62d in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:111 (gdb) info threds Id Target Id Frame 1 Thread 0x7ffff7fd0780 (LWP 25006) "qemu-ppc" pthread_cond_wait@@GLIBC_2.3.2 () at ../nptl/sysdeps/unix/sysv/linux/x86_64/pthread_cond_wait.S:185 2 Thread 0x7ffff647e700 (LWP 25010) "qemu-ppc" syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38 * 3 Thread 0x7ffff7f4d700 (LWP 25011) "qemu-ppc" 0x000000000086e204 in static_code_gen_buffer () I'll send an email to the qemu mailing list. Cheers, alimon [1] http://git.qemu.org/?p=qemu.git;a=commit;h=bd6fefe71cec5a0c7d2be4ac96307f25db56abf9 [2] http://git.qemu.org/?p=qemu.git;a=commit;h=ba4a8df83f474be1ba02510f960e5224f29d229c [3] http://git.qemu.org/?p=qemu.git;a=commit;h=4f5d326046fa522010c0a66f1bcaac9068253085 > > Ross > [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 836 bytes --] ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCHv2] qemu: Upgrade to 2.8.0 2017-01-16 21:42 ` Aníbal Limón @ 2017-01-17 12:04 ` Alexander Kanavin 2017-01-17 12:15 ` Burton, Ross 2017-01-19 22:46 ` Aníbal Limón 1 sibling, 1 reply; 9+ messages in thread From: Alexander Kanavin @ 2017-01-17 12:04 UTC (permalink / raw) To: openembedded-core On 01/16/2017 11:42 PM, Aníbal Limón wrote: > (gdb) info threds > Id Target Id Frame > 1 Thread 0x7ffff7fd0780 (LWP 25006) "qemu-ppc" > pthread_cond_wait@@GLIBC_2.3.2 () at > ../nptl/sysdeps/unix/sysv/linux/x86_64/pthread_cond_wait.S:185 > 2 Thread 0x7ffff647e700 (LWP 25010) "qemu-ppc" syscall () at > ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38 > * 3 Thread 0x7ffff7f4d700 (LWP 25011) "qemu-ppc" 0x000000000086e204 > in static_code_gen_buffer () > > I'll send an email to the qemu mailing list. If this isn't fixed in reasonable time, we should probably disable qemu usermode on ppc - unfortunate, but that's the deal with using it for anything. You would need to just copy/tweak the corresponding line from meta/conf/machine/include/powerpc/arch-powerpc64.inc Alex ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCHv2] qemu: Upgrade to 2.8.0 2017-01-17 12:04 ` Alexander Kanavin @ 2017-01-17 12:15 ` Burton, Ross 0 siblings, 0 replies; 9+ messages in thread From: Burton, Ross @ 2017-01-17 12:15 UTC (permalink / raw) To: Alexander Kanavin; +Cc: OE-core [-- Attachment #1: Type: text/plain, Size: 371 bytes --] On 17 January 2017 at 12:04, Alexander Kanavin < alexander.kanavin@linux.intel.com> wrote: > If this isn't fixed in reasonable time, we should probably disable qemu > usermode on ppc - unfortunate, but that's the deal with using it for > anything. > I consider that a backup position, stalling the upgrade to see if upstream can fix it is preferable. Ross [-- Attachment #2: Type: text/html, Size: 821 bytes --] ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCHv2] qemu: Upgrade to 2.8.0 2017-01-16 21:42 ` Aníbal Limón 2017-01-17 12:04 ` Alexander Kanavin @ 2017-01-19 22:46 ` Aníbal Limón 2017-01-31 21:52 ` Aníbal Limón 1 sibling, 1 reply; 9+ messages in thread From: Aníbal Limón @ 2017-01-19 22:46 UTC (permalink / raw) To: Burton, Ross; +Cc: OE-core [-- Attachment #1: Type: text/plain, Size: 2755 bytes --] On 01/16/2017 03:42 PM, Aníbal Limón wrote: > > > On 01/16/2017 10:47 AM, Burton, Ross wrote: >> On 16 January 2017 at 16:43, Aníbal Limón <anibal.limon@linux.intel.com> >> wrote: >> >>> It's weird, i'll review it, but i don't imagine what is failing >>> gobject-introspection because a qemu upgrade. >>> >> >> The g-i build runs largely inside a qemu-user instance (the crash is inside >> qemu). > > Hi, > > I got the stack trace, it's an issue in the PPC TCG some patches in > upstream looks like could be cause the problem [1][2][3]. > > > (gdb) bt > #0 0x000000000086e204 in static_code_gen_buffer () > #1 0x000000000040e922 in cpu_tb_exec (itb=<optimized out>, > itb=<optimized out>, cpu=0x29864d0) at > /home/alimon/repos/poky/build-ppc/tmp/work/x86_64-linux/qemu-native/2.8.0-r0/qemu-2.8.0/cpu-exec.c:164 > #2 cpu_loop_exec_tb (sc=<optimized out>, tb_exit=<synthetic pointer>, > last_tb=<synthetic pointer>, tb=<optimized out>, cpu=0x29864d0) at > /home/alimon/repos/poky/build-ppc/tmp/work/x86_64-linux/qemu-native/2.8.0-r0/qemu-2.8.0/cpu-exec.c:544 > #3 cpu_exec (cpu=cpu@entry=0x29864d0) at > /home/alimon/repos/poky/build-ppc/tmp/work/x86_64-linux/qemu-native/2.8.0-r0/qemu-2.8.0/cpu-exec.c:638 > #4 0x0000000000445fba in cpu_loop (env=env@entry=0x298e750) at > /home/alimon/repos/poky/build-ppc/tmp/work/x86_64-linux/qemu-native/2.8.0-r0/qemu-2.8.0/linux-user/main.c:1359 > #5 0x0000000000448a95 in clone_func (arg=0x7fffffffa910) at > /home/alimon/repos/poky/build-ppc/tmp/work/x86_64-linux/qemu-native/2.8.0-r0/qemu-2.8.0/linux-user/syscall.c:6090 > #6 0x00007ffff6a750a4 in start_thread (arg=0x7ffff7f4d700) at > pthread_create.c:309 > #7 0x00007ffff67aa62d in clone () at > ../sysdeps/unix/sysv/linux/x86_64/clone.S:111 > > (gdb) info threds > Id Target Id Frame > 1 Thread 0x7ffff7fd0780 (LWP 25006) "qemu-ppc" > pthread_cond_wait@@GLIBC_2.3.2 () at > ../nptl/sysdeps/unix/sysv/linux/x86_64/pthread_cond_wait.S:185 > 2 Thread 0x7ffff647e700 (LWP 25010) "qemu-ppc" syscall () at > ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38 > * 3 Thread 0x7ffff7f4d700 (LWP 25011) "qemu-ppc" 0x000000000086e204 > in static_code_gen_buffer () > > I'll send an email to the qemu mailing list. > > Cheers, > alimon > > [1] > http://git.qemu.org/?p=qemu.git;a=commit;h=bd6fefe71cec5a0c7d2be4ac96307f25db56abf9 > [2] > http://git.qemu.org/?p=qemu.git;a=commit;h=ba4a8df83f474be1ba02510f960e5224f29d229c > [3] > http://git.qemu.org/?p=qemu.git;a=commit;h=4f5d326046fa522010c0a66f1bcaac9068253085 I can't get a response from qemu people so i will send a minor upgrade 2.7.1 while i debug the issue. alimon > >> >> Ross >> > > > [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 836 bytes --] ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCHv2] qemu: Upgrade to 2.8.0 2017-01-19 22:46 ` Aníbal Limón @ 2017-01-31 21:52 ` Aníbal Limón 0 siblings, 0 replies; 9+ messages in thread From: Aníbal Limón @ 2017-01-31 21:52 UTC (permalink / raw) To: Burton, Ross; +Cc: OE-core [-- Attachment #1: Type: text/plain, Size: 3151 bytes --] On 01/19/2017 04:46 PM, Aníbal Limón wrote: > > > On 01/16/2017 03:42 PM, Aníbal Limón wrote: >> >> >> On 01/16/2017 10:47 AM, Burton, Ross wrote: >>> On 16 January 2017 at 16:43, Aníbal Limón <anibal.limon@linux.intel.com> >>> wrote: >>> >>>> It's weird, i'll review it, but i don't imagine what is failing >>>> gobject-introspection because a qemu upgrade. >>>> >>> >>> The g-i build runs largely inside a qemu-user instance (the crash is inside >>> qemu). >> >> Hi, >> >> I got the stack trace, it's an issue in the PPC TCG some patches in >> upstream looks like could be cause the problem [1][2][3]. >> >> >> (gdb) bt >> #0 0x000000000086e204 in static_code_gen_buffer () >> #1 0x000000000040e922 in cpu_tb_exec (itb=<optimized out>, >> itb=<optimized out>, cpu=0x29864d0) at >> /home/alimon/repos/poky/build-ppc/tmp/work/x86_64-linux/qemu-native/2.8.0-r0/qemu-2.8.0/cpu-exec.c:164 >> #2 cpu_loop_exec_tb (sc=<optimized out>, tb_exit=<synthetic pointer>, >> last_tb=<synthetic pointer>, tb=<optimized out>, cpu=0x29864d0) at >> /home/alimon/repos/poky/build-ppc/tmp/work/x86_64-linux/qemu-native/2.8.0-r0/qemu-2.8.0/cpu-exec.c:544 >> #3 cpu_exec (cpu=cpu@entry=0x29864d0) at >> /home/alimon/repos/poky/build-ppc/tmp/work/x86_64-linux/qemu-native/2.8.0-r0/qemu-2.8.0/cpu-exec.c:638 >> #4 0x0000000000445fba in cpu_loop (env=env@entry=0x298e750) at >> /home/alimon/repos/poky/build-ppc/tmp/work/x86_64-linux/qemu-native/2.8.0-r0/qemu-2.8.0/linux-user/main.c:1359 >> #5 0x0000000000448a95 in clone_func (arg=0x7fffffffa910) at >> /home/alimon/repos/poky/build-ppc/tmp/work/x86_64-linux/qemu-native/2.8.0-r0/qemu-2.8.0/linux-user/syscall.c:6090 >> #6 0x00007ffff6a750a4 in start_thread (arg=0x7ffff7f4d700) at >> pthread_create.c:309 >> #7 0x00007ffff67aa62d in clone () at >> ../sysdeps/unix/sysv/linux/x86_64/clone.S:111 >> >> (gdb) info threds >> Id Target Id Frame >> 1 Thread 0x7ffff7fd0780 (LWP 25006) "qemu-ppc" >> pthread_cond_wait@@GLIBC_2.3.2 () at >> ../nptl/sysdeps/unix/sysv/linux/x86_64/pthread_cond_wait.S:185 >> 2 Thread 0x7ffff647e700 (LWP 25010) "qemu-ppc" syscall () at >> ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38 >> * 3 Thread 0x7ffff7f4d700 (LWP 25011) "qemu-ppc" 0x000000000086e204 >> in static_code_gen_buffer () >> >> I'll send an email to the qemu mailing list. >> >> Cheers, >> alimon >> >> [1] >> http://git.qemu.org/?p=qemu.git;a=commit;h=bd6fefe71cec5a0c7d2be4ac96307f25db56abf9 This patch caused the issue, i received a email with the patch for fix this problem from the qemu-ppc ML. https://lists.gnu.org/archive/html/qemu-ppc/2017-01/msg00413.html I tested the patch and send again the qemu upgrade to 2.8.0. Cheers, alimon >> [2] >> http://git.qemu.org/?p=qemu.git;a=commit;h=ba4a8df83f474be1ba02510f960e5224f29d229c >> [3] >> http://git.qemu.org/?p=qemu.git;a=commit;h=4f5d326046fa522010c0a66f1bcaac9068253085 > > I can't get a response from qemu people so i will send a minor upgrade > 2.7.1 while i debug the issue. > > alimon > >> >>> >>> Ross >>> >> >> >> > > > [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 836 bytes --] ^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2017-01-31 21:49 UTC | newest] Thread overview: 9+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2017-01-12 16:19 [PATCHv2] qemu: Upgrade to 2.8.0 Aníbal Limón 2017-01-16 16:36 ` Burton, Ross 2017-01-16 16:43 ` Aníbal Limón 2017-01-16 16:47 ` Burton, Ross 2017-01-16 21:42 ` Aníbal Limón 2017-01-17 12:04 ` Alexander Kanavin 2017-01-17 12:15 ` Burton, Ross 2017-01-19 22:46 ` Aníbal Limón 2017-01-31 21:52 ` Aníbal Limón
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox