[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Qemu-devel] [Bug 1240669] Re: sd_init() generates SIGSEGV when passed N
From: |
Devin Boyer |
Subject: |
[Qemu-devel] [Bug 1240669] Re: sd_init() generates SIGSEGV when passed NULL |
Date: |
Wed, 16 Oct 2013 20:10:39 -0000 |
** Description changed:
Ran into a bug following the following tutorial:
- http://balau82.wordpress.com/2010/03/10/u-boot-for-arm-on-qemu/
+ http://balau82.wordpress.com/2010/03/10/u-boot-for-arm-on-qemu/
I built QEMU from a clone of master and became stuck at the beginning
part of the tutorial where only u-boot.bin is exectuted.
-
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4f8a066b5fc254eeaabbbde56ba4f5b29cc68fdf
- See the modifications to sd.c specifically.
+
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4f8a066b5fc254eeaabbbde56ba4f5b29cc68fdf
+ See the modifications to sd.c specifically.
When sd_init (sd.c) is called from pl181_init(), bs is potentially null:
- s->card = sd_init(dinfo ? dinfo->bdrv : NULL, false);
+ s->card = sd_init(dinfo ? dinfo->bdrv : NULL, false);
- sd_init() :
+ sd_init():
+
SDState *sd_init(BlockDriverState *bs, bool is_spi)
{
SDState *sd;
+
+ if (bdrv_is_read_only(bs)) {
+ fprintf(stderr, "sd_init: Cannot use read-only drive\n");
+ return NULL;
+ }
sd = (SDState *) g_malloc0(sizeof(SDState));
sd->buf = qemu_blockalign(bs, 512);
sd->spi = is_spi;
sd->enable = true;
sd_reset(sd, bs);
if (sd->bdrv) {
bdrv_attach_dev_nofail(sd->bdrv, sd);
bdrv_set_dev_ops(sd->bdrv, &sd_block_ops, sd);
}
vmstate_register(NULL, -1, &sd_vmstate, sd);
return sd;
}
- Line 497 calls bdrv_is_read_only(bs) (from block.c)and this generates a
- SEGSIGV.
- int bdrv_is_read_only(BlockDriverState *bs)
- {
- return bs->read_only;
- }
+ Line 497 calls bdrv_is_read_only(bs) (from block.c)and this generates a
SEGSIGV.
+
+ int bdrv_is_read_only(BlockDriverState *bs)
+ {
+ return bs->read_only;
+ }
Checking out tag v1.6.1 reverted the problem. Thanks!
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1240669
Title:
sd_init() generates SIGSEGV when passed NULL
Status in QEMU:
New
Bug description:
Ran into a bug following the following tutorial:
http://balau82.wordpress.com/2010/03/10/u-boot-for-arm-on-qemu/
I built QEMU from a clone of master and became stuck at the beginning
part of the tutorial where only u-boot.bin is exectuted.
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4f8a066b5fc254eeaabbbde56ba4f5b29cc68fdf
See the modifications to sd.c specifically.
When sd_init (sd.c) is called from pl181_init(), bs is potentially null:
s->card = sd_init(dinfo ? dinfo->bdrv : NULL, false);
sd_init():
SDState *sd_init(BlockDriverState *bs, bool is_spi)
{
SDState *sd;
if (bdrv_is_read_only(bs)) {
fprintf(stderr, "sd_init: Cannot use read-only drive\n");
return NULL;
}
sd = (SDState *) g_malloc0(sizeof(SDState));
sd->buf = qemu_blockalign(bs, 512);
sd->spi = is_spi;
sd->enable = true;
sd_reset(sd, bs);
if (sd->bdrv) {
bdrv_attach_dev_nofail(sd->bdrv, sd);
bdrv_set_dev_ops(sd->bdrv, &sd_block_ops, sd);
}
vmstate_register(NULL, -1, &sd_vmstate, sd);
return sd;
}
Line 497 calls bdrv_is_read_only(bs) (from block.c)and this generates a
SEGSIGV.
int bdrv_is_read_only(BlockDriverState *bs)
{
return bs->read_only;
}
Checking out tag v1.6.1 reverted the problem. Thanks!
To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1240669/+subscriptions
- [Qemu-devel] [PATCH 0/7] virtio endian-ambivalent target fixes., Rusty Russell, 2013/10/16
- [Qemu-devel] [PATCH 1/7] virtio_get_byteswap: function for endian-ambivalent targets using virtio., Rusty Russell, 2013/10/16
- [Qemu-devel] [PATCH 7/7] hw/char/virtio-serial-bus: use virtio wrappers to access headers., Rusty Russell, 2013/10/16
- [Qemu-devel] [PATCH 6/7] hw/scsi/virtio-scsi: use virtio wrappers to access headers., Rusty Russell, 2013/10/16
- [Qemu-devel] [PATCH 5/7] hw/block/virtio-blk: use virtio wrappers to access headers., Rusty Russell, 2013/10/16
- [Qemu-devel] [PATCH 4/7] hw/net/virtio-balloon: use virtio wrappers to access page frame numbers., Rusty Russell, 2013/10/16
- [Qemu-devel] [PATCH 3/7] hw/net/virtio-net: use virtio wrappers to access headers., Rusty Russell, 2013/10/16
- [Qemu-devel] [PATCH 2/7] virtio: allow byte swapping for vring and config access, Rusty Russell, 2013/10/16