qemu-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Qemu-commits] [qemu/qemu] fdd514: meson: sort C warning flags alphabeti


From: Peter Maydell
Subject: [Qemu-commits] [qemu/qemu] fdd514: meson: sort C warning flags alphabetically
Date: Mon, 12 Feb 2024 10:31:16 -0800

  Branch: refs/heads/master
  Home:   https://github.com/qemu/qemu
  Commit: fdd51403a35a484f29c405c3d5cb0058f80bd3ba
      
https://github.com/qemu/qemu/commit/fdd51403a35a484f29c405c3d5cb0058f80bd3ba
  Author: Daniel P. Berrangé <berrange@redhat.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M meson.build

  Log Message:
  -----------
  meson: sort C warning flags alphabetically

When scanning the list of warning flags to see if one is present, it is
helpful if they are in alphabetical order. It is further helpful to
separate out the 'no-' prefixed warnings.

Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: 52ed9f455ee0063958a1b18e54cab9a427fc422f
      
https://github.com/qemu/qemu/commit/52ed9f455ee0063958a1b18e54cab9a427fc422f
  Author: Hyman Huang <yong.huang@smartx.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M crypto/block-luks.c
    M crypto/cipher-gcrypt.c.inc
    M crypto/cipher-nettle.c.inc
    M crypto/cipher.c
    M meson.build
    M qapi/crypto.json
    M tests/unit/test-crypto-cipher.c

  Log Message:
  -----------
  crypto: Introduce SM4 symmetric cipher algorithm

Introduce the SM4 cipher algorithms (OSCCA GB/T 32907-2016).

SM4 (GBT.32907-2016) is a cryptographic standard issued by the
Organization of State Commercial Administration of China (OSCCA)
as an authorized cryptographic algorithms for the use within China.

Detect the SM4 cipher algorithms and enable the feature silently
if it is available.

Signed-off-by: Hyman Huang <yong.huang@smartx.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: 03e471c41d8b1b6eb16c9714f387449f52fe5c1d
      
https://github.com/qemu/qemu/commit/03e471c41d8b1b6eb16c9714f387449f52fe5c1d
  Author: Fiona Ebner <f.ebner@proxmox.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M include/sysemu/os-posix.h
    M include/sysemu/os-win32.h
    M os-posix.c
    M system/vl.c

  Log Message:
  -----------
  qemu_init: increase NOFILE soft limit on POSIX

In many configurations, e.g. multiple vNICs with multiple queues or
with many Ceph OSDs, the default soft limit of 1024 is not enough.
QEMU is supposed to work fine with file descriptors >= 1024 and does
not use select() on POSIX. Bump the soft limit to the allowed hard
limit to avoid issues with the aforementioned configurations.

Of course the limit could be raised from the outside, but the man page
of systemd.exec states about 'LimitNOFILE=':

> Don't use.
> [...]
> Typically applications should increase their soft limit to the hard
> limit on their own, if they are OK with working with file
> descriptors above 1023,

If the soft limit is already the same as the hard limit, avoid the
superfluous setrlimit call. This can avoid a warning with a strict
seccomp filter blocking setrlimit if NOFILE was already raised before
executing QEMU.

Buglink: https://bugzilla.proxmox.com/show_bug.cgi?id=4507
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
Signed-off-by: Fiona Ebner <f.ebner@proxmox.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: 0e74eb86eaf3ef57e9f9741cb668784c96e654ff
      
https://github.com/qemu/qemu/commit/0e74eb86eaf3ef57e9f9741cb668784c96e654ff
  Author: Daniel P. Berrangé <berrange@redhat.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M ui/vnc.c
    M ui/vnc.h

  Log Message:
  -----------
  ui: drop VNC feature _MASK constants

Each VNC feature enum entry has a corresponding _MASK constant
which is the bit-shifted value. It is very easy for contributors
to accidentally use the _MASK constant, instead of the non-_MASK
constant, or the reverse. No compiler warning is possible and
it'll just silently do the wrong thing at runtime.

By introducing the vnc_set_feature helper method, we can drop
all the _MASK constants and thus prevent any future accidents.

Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: 3b219d99af282b21b3c87ad948dbb21082e8fa1b
      
https://github.com/qemu/qemu/commit/3b219d99af282b21b3c87ad948dbb21082e8fa1b
  Author: Daniel P. Berrangé <berrange@redhat.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M system/vl.c

  Log Message:
  -----------
  softmmu: remove obsolete comment about libvirt timeouts

For a long time now, libvirt has pre-created the monitor connection
socket and passed the pre-opened FD into QEMU during startup. Thus
libvirt does not have any timeouts waiting for the monitor socket
to appear, it is immediately connected.

Reviewed-by: Zhao Liu <zhao1.liu@intel.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: f424bc3312cbc1ff2748c263883e4480fa1586bc
      
https://github.com/qemu/qemu/commit/f424bc3312cbc1ff2748c263883e4480fa1586bc
  Author: Daniel P. Berrangé <berrange@redhat.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M scripts/cpu-x86-uarch-abi.py

  Log Message:
  -----------
  scripts: drop comment about autogenerated CPU API file

The RST doc include can't be made to skip the comment indicating the CPU
CSV file is auto-generated when importing it. This comment line was
previously manually removed from the generated output that was committed.

Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: 86cf437d7adb6d79953db9496abef5e332385b37
      
https://github.com/qemu/qemu/commit/86cf437d7adb6d79953db9496abef5e332385b37
  Author: Daniel P. Berrangé <berrange@redhat.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M docs/system/cpu-models-x86.rst.inc

  Log Message:
  -----------
  docs: fix highlighting of CPU ABI header rows

The 'header-rows' directive indicates how many rows in the generated
table are to be highlighted as headers. We only have one such row in
the CSV file included. This removes the accident bold highlighting
of the 'i486' CPU model.

Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: 30c917b0d82b1e793d0004ef14792369b7cd80df
      
https://github.com/qemu/qemu/commit/30c917b0d82b1e793d0004ef14792369b7cd80df
  Author: Daniel P. Berrangé <berrange@redhat.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M docs/system/cpu-models-x86-abi.csv

  Log Message:
  -----------
  docs: re-generate x86_64 ABI compatibility CSV

This picks up the new EPYC-Genoa, SapphireRapids & GraniteRapids CPUs,
removes the now deleted Icelake-Client CPU, and adds the newer versions
of many existing CPUs.

Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: cb8ded0f6d919a61ef890be14b28e765fba81f66
      
https://github.com/qemu/qemu/commit/cb8ded0f6d919a61ef890be14b28e765fba81f66
  Author: Daniel P. Berrangé <berrange@redhat.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M chardev/char-socket.c

  Log Message:
  -----------
  chardev: close QIOChannel before unref'ing

The chardev socket backend will unref the QIOChannel object while
it is still potentially open. When using TLS there could be a
pending TLS handshake taking place. If the channel is left open
then when the TLS handshake callback runs, it can end up accessing
free'd memory in the tcp_chr_tls_handshake method.

Closing the QIOChannel will unregister any pending handshake
source.

Reported-by: jiangyegen <jiangyegen@huawei.com>
Reviewed-by: Marc-André Lureau <marcandre.lureau@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: 003f15369de4e290a4d2e58292d96c5a506e4ee6
      
https://github.com/qemu/qemu/commit/003f15369de4e290a4d2e58292d96c5a506e4ee6
  Author: Daniel P. Berrangé <berrange@redhat.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M io/channel-tls.c
    M io/trace-events

  Log Message:
  -----------
  io: add trace event when cancelling TLS handshake

Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: 9ad5c4e7ee513019e75ea8ece0d1da6ecce540e6
      
https://github.com/qemu/qemu/commit/9ad5c4e7ee513019e75ea8ece0d1da6ecce540e6
  Author: Hyman Huang <yong.huang@smartx.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M block/crypto.c
    M crypto/block-luks.c
    M include/crypto/block.h
    M qapi/block-core.json

  Log Message:
  -----------
  crypto: Support LUKS volume with detached header

By enhancing the LUKS driver, it is possible to implement
the LUKS volume with a detached header.

Normally a LUKS volume has a layout:
  disk:  | header | key material | disk payload data |

With a detached LUKS header, you need 2 disks so getting:
  disk1:  | header | key material |
  disk2:  | disk payload data |

There are a variety of benefits to doing this:
 * Secrecy - the disk2 cannot be identified as containing LUKS
             volume since there's no header
 * Control - if access to the disk1 is restricted, then even
             if someone has access to disk2 they can't unlock
             it. Might be useful if you have disks on NFS but
             want to restrict which host can launch a VM
             instance from it, by dynamically providing access
             to the header to a designated host
 * Flexibility - your application data volume may be a given
                 size and it is inconvenient to resize it to
                 add encryption.You can store the LUKS header
                 separately and use the existing storage
                 volume for payload
 * Recovery - corruption of a bit in the header may make the
              entire payload inaccessible. It might be
              convenient to take backups of the header. If
              your primary disk header becomes corrupt, you
              can unlock the data still by pointing to the
              backup detached header

Take the raw-format image as an example to introduce the usage
of the LUKS volume with a detached header:

1. prepare detached LUKS header images
$ dd if=/dev/zero of=test-header.img bs=1M count=32
$ dd if=/dev/zero of=test-payload.img bs=1M count=1000
$ cryptsetup luksFormat --header test-header.img test-payload.img
> --force-password --type luks1

2. block-add a protocol blockdev node of payload image
$ virsh qemu-monitor-command vm '{"execute":"blockdev-add",
> "arguments":{"node-name":"libvirt-1-storage", "driver":"file",
> "filename":"test-payload.img"}}'

3. block-add a protocol blockdev node of LUKS header as above.
$ virsh qemu-monitor-command vm '{"execute":"blockdev-add",
> "arguments":{"node-name":"libvirt-2-storage", "driver":"file",
> "filename": "test-header.img" }}'

4. object-add the secret for decrypting the cipher stored in
   LUKS header above
$ virsh qemu-monitor-command vm '{"execute":"object-add",
> "arguments":{"qom-type":"secret", "id":
> "libvirt-2-storage-secret0", "data":"abc123"}}'

5. block-add the raw-drived blockdev format node
$ virsh qemu-monitor-command vm '{"execute":"blockdev-add",
> "arguments":{"node-name":"libvirt-1-format", "driver":"raw",
> "file":"libvirt-1-storage"}}'

6. block-add the luks-drived blockdev to link the raw disk
   with the LUKS header by specifying the field "header"
$ virsh qemu-monitor-command vm '{"execute":"blockdev-add",
> "arguments":{"node-name":"libvirt-2-format", "driver":"luks",
> "file":"libvirt-1-format", "header":"libvirt-2-storage",
> "key-secret":"libvirt-2-format-secret0"}}'

7. hot-plug the virtio-blk device finally
$ virsh qemu-monitor-command vm '{"execute":"device_add",
> "arguments": {"num-queues":"1", "driver":"virtio-blk-pci",
> "drive": "libvirt-2-format", "id":"virtio-disk2"}}'

Starting a VM with a LUKS volume with detached header is
somewhat similar to hot-plug in that both maintaining the
same json command while the starting VM changes the
"blockdev-add/device_add" parameters to "blockdev/device".

Signed-off-by: Hyman Huang <yong.huang@smartx.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: 433957bb7f99d7577601949c92f2fffa9457cd7b
      
https://github.com/qemu/qemu/commit/433957bb7f99d7577601949c92f2fffa9457cd7b
  Author: Hyman Huang <yong.huang@smartx.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M block/crypto.c
    M qapi/block-core.json

  Log Message:
  -----------
  qapi: Make parameter 'file' optional for BlockdevCreateOptionsLUKS

To support detached LUKS header creation, make the existing 'file'
field in BlockdevCreateOptionsLUKS optional.

Signed-off-by: Hyman Huang <yong.huang@smartx.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: d74523a3b395dc8470177dcdfa13644b98494334
      
https://github.com/qemu/qemu/commit/d74523a3b395dc8470177dcdfa13644b98494334
  Author: Hyman Huang <yong.huang@smartx.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M block/crypto.c
    M block/qcow.c
    M block/qcow2.c
    M crypto/block-luks.c
    M crypto/block.c
    M crypto/blockpriv.h
    M include/crypto/block.h
    M tests/unit/test-crypto-block.c

  Log Message:
  -----------
  crypto: Modify the qcrypto_block_create to support creation flags

Expand the signature of qcrypto_block_create to enable the
formation of LUKS volumes with detachable headers. To accomplish
that, introduce QCryptoBlockCreateFlags to instruct the creation
process to set the payload_offset_sector to 0.

Signed-off-by: Hyman Huang <yong.huang@smartx.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: d0112eb415bd1bfae3b61818d9ded936f05f1afb
      
https://github.com/qemu/qemu/commit/d0112eb415bd1bfae3b61818d9ded936f05f1afb
  Author: Hyman Huang <yong.huang@smartx.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M block/crypto.c
    M qapi/block-core.json

  Log Message:
  -----------
  block: Support detached LUKS header creation using blockdev-create

Firstly, enable the ability to choose the block device containing
a detachable LUKS header by adding the 'header' parameter to
BlockdevCreateOptionsLUKS.

Secondly, when formatting the LUKS volume with a detachable header,
truncate the payload volume to length without a header size.

Using the qmp blockdev command, create the LUKS volume with a
detachable header as follows:

1. add the secret to lock/unlock the cipher stored in the
   detached LUKS header
$ virsh qemu-monitor-command vm '{"execute":"object-add",
> "arguments":{"qom-type": "secret", "id": "sec0", "data": "foo"}}'

2. create a header img with 0 size
$ virsh qemu-monitor-command vm '{"execute":"blockdev-create",
> "arguments":{"job-id":"job0", "options":{"driver":"file",
> "filename":"/path/to/detached_luks_header.img", "size":0 }}}'

3. add protocol blockdev node for header
$ virsh qemu-monitor-command vm '{"execute":"blockdev-add",
> "arguments": {"driver":"file", "filename":
> "/path/to/detached_luks_header.img", "node-name":
> "detached-luks-header-storage"}}'

4. create a payload img with 0 size
$ virsh qemu-monitor-command vm '{"execute":"blockdev-create",
> "arguments":{"job-id":"job1", "options":{"driver":"file",
> "filename":"/path/to/detached_luks_payload_raw.img", "size":0}}}'

5. add protocol blockdev node for payload
$ virsh qemu-monitor-command vm '{"execute":"blockdev-add",
> "arguments": {"driver":"file", "filename":
> "/path/to/detached_luks_payload_raw.img", "node-name":
> "luks-payload-raw-storage"}}'

6. do the formatting with 128M size
$ virsh qemu-monitor-command c81_node1 '{"execute":"blockdev-create",
> "arguments":{"job-id":"job2", "options":{"driver":"luks", "header":
> "detached-luks-header-storage", "file":"luks-payload-raw-storage",
> "size":134217728, "preallocation":"full", "key-secret":"sec0" }}}'

Signed-off-by: Hyman Huang <yong.huang@smartx.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: 35286daeca43444aa1a9c7a36ffc499877eb6668
      
https://github.com/qemu/qemu/commit/35286daeca43444aa1a9c7a36ffc499877eb6668
  Author: Hyman Huang <yong.huang@smartx.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M block.c
    M block/crypto.c
    M block/crypto.h
    M qapi/crypto.json

  Log Message:
  -----------
  block: Support detached LUKS header creation using qemu-img

Even though a LUKS header might be created with cryptsetup,
qemu-img should be enhanced to accommodate it as well.

Add the 'detached-header' option to specify the creation of
a detached LUKS header. This is how it is used:
$ qemu-img create --object secret,id=sec0,data=abc123 -f luks
> -o cipher-alg=aes-256,cipher-mode=xts -o key-secret=sec0
> -o detached-header=true header.luks

Using qemu-img or cryptsetup tools to query information of
an LUKS header image as follows:

Assume a detached LUKS header image has been created by:
$ dd if=/dev/zero of=test-header.img bs=1M count=32
$ dd if=/dev/zero of=test-payload.img bs=1M count=1000
$ cryptsetup luksFormat --header test-header.img test-payload.img
> --force-password --type luks1

Header image information could be queried using cryptsetup:
$ cryptsetup luksDump test-header.img

or qemu-img:
$ qemu-img info 'json:{"driver":"luks","file":{"filename":
> "test-payload.img"},"header":{"filename":"test-header.img"}}'

When using qemu-img, keep in mind that the entire disk
information specified by the JSON-format string above must be
supplied on the commandline; if not, an overlay check will reveal
a problem with the LUKS volume check logic.

Signed-off-by: Hyman Huang <yong.huang@smartx.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
[changed to pass 'cflags' to block_crypto_co_create_generic]
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: 0bd779e27ee7c737fdaee2e52e6d1c5951375177
      
https://github.com/qemu/qemu/commit/0bd779e27ee7c737fdaee2e52e6d1c5951375177
  Author: Hyman Huang <yong.huang@smartx.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M crypto/block-luks.c
    M qapi/crypto.json
    M tests/qemu-iotests/210.out

  Log Message:
  -----------
  crypto: Introduce 'detached-header' field in QCryptoBlockInfoLUKS

When querying the LUKS disk with the qemu-img tool or other APIs,
add information about whether the LUKS header is detached.

Additionally, update the test case with the appropriate
modification.

Signed-off-by: Hyman Huang <yong.huang@smartx.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: d87b258b75498d3e8563ec8ebaaf67efc27be945
      
https://github.com/qemu/qemu/commit/d87b258b75498d3e8563ec8ebaaf67efc27be945
  Author: Hyman Huang <yong.huang@smartx.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M MAINTAINERS
    A tests/qemu-iotests/tests/luks-detached-header
    A tests/qemu-iotests/tests/luks-detached-header.out

  Log Message:
  -----------
  tests: Add case for LUKS volume with detached header

Also, add a section to the MAINTAINERS file for detached
LUKS header, it only has a test case in it currently.

Signed-off-by: Hyman Huang <yong.huang@smartx.com>
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>


  Commit: 7485508341f4e8c6802f7716a64dd49a4dd28d22
      
https://github.com/qemu/qemu/commit/7485508341f4e8c6802f7716a64dd49a4dd28d22
  Author: Fabiano Rosas <farosas@suse.de>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M tests/docker/dockerfiles/opensuse-leap.docker
    M tests/lcitool/mappings.yml
    M tests/lcitool/projects/qemu.yml

  Log Message:
  -----------
  tests/docker: Add sqlite3 module to openSUSE Leap container

Avocado needs sqlite3:

  Failed to load plugin from module "avocado.plugins.journal":
  ImportError("Module 'sqlite3' is not installed.
  Use: sudo zypper install python311 to install it")

>From 'zypper info python311':
  "This package supplies rich command line features provided by
  readline, and sqlite3 support for the interpreter core, thus forming
  a so called "extended" runtime."

Include the appropriate package in the lcitool mappings which will
guarantee the dockerfile gets properly updated when lcitool is
run. Also include the updated dockerfile.

Signed-off-by: Fabiano Rosas <farosas@suse.de>
Suggested-by: Andrea Bolognani <abologna@redhat.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
Message-Id: <20240117164227.32143-1-farosas@suse.de>
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
Message-Id: <20240207163812.3231697-2-alex.bennee@linaro.org>


  Commit: c7bbef40234c80672e6dccaafbc352b4aeb78413
      
https://github.com/qemu/qemu/commit/c7bbef40234c80672e6dccaafbc352b4aeb78413
  Author: Alex Bennée <alex.bennee@linaro.org>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M docs/about/deprecated.rst

  Log Message:
  -----------
  docs: mark CRIS support as deprecated

This might be premature but while streamlining the avocado tests I
realised the only tests we have are "check-tcg" ones. The ageing
fedora-cris-cross image works well enough for developers but can't be
used in CI as we need supported build platforms to build QEMU.

Does this mean the writing is on the wall for this architecture?

Cc: Rabin Vincent <rabinv@axis.com>
Reviewed-by: Thomas Huth <thuth@redhat.com>
Acked-by: Edgar E. Iglesias <edgar.iglesias@gmail.com>
Reviewed-by: Thomas Huth <thuth@redhat.com>
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
Message-Id: <20240207163812.3231697-3-alex.bennee@linaro.org>


  Commit: 15cc103362499bd94c5aec5fa66543d0de3bf4b5
      
https://github.com/qemu/qemu/commit/15cc103362499bd94c5aec5fa66543d0de3bf4b5
  Author: Paolo Bonzini <pbonzini@redhat.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M configure

  Log Message:
  -----------
  configure: run plugin TCG tests again

Commit 39fb3cfc28b ("configure: clean up plugin option handling", 2023-10-18)
dropped the CONFIG_PLUGIN line from tests/tcg/config-host.mak, due to confusion
caused by the shadowing of $config_host_mak.  However, TCG tests were still
expecting it.  Oops.

Put it back, in the meanwhile the shadowing is gone so it's clear that it goes
in the tests/tcg configuration.

Cc:  <alex.bennee@linaro.org>
Fixes: 39fb3cfc28b ("configure: clean up plugin option handling", 2023-10-18)
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <20240124115332.612162-1-pbonzini@redhat.com>
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
Message-Id: <20240207163812.3231697-4-alex.bennee@linaro.org>


  Commit: 1fed4cd04d80a9d808319e1cd05ff247b3eedeed
      
https://github.com/qemu/qemu/commit/1fed4cd04d80a9d808319e1cd05ff247b3eedeed
  Author: Alex Bennée <alex.bennee@linaro.org>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M include/hw/elf_ops.h

  Log Message:
  -----------
  Revert "hw/elf_ops: Ignore loadable segments with zero size"

This regressed qemu-system-xtensa:

    TEST    test_load_store on xtensa
  qemu-system-xtensa: Some ROM regions are overlapping
  These ROM regions might have been loaded by direct user request or by default.
  They could be BIOS/firmware images, a guest kernel, initrd or some other file 
loaded into guest memory.
  Check whether you intended to load all this guest code, and whether it has 
been built to load to the correct addresses.

  The following two regions overlap (in the memory address space):
    test_load_store ELF program header segment 1 (addresses 0x0000000000001000 
- 0x0000000000001f26)
    test_load_store ELF program header segment 2 (addresses 0x0000000000001ab8 
- 0x0000000000001ab8)
  make[1]: *** [Makefile:187: run-test_load_store] Error 1

This reverts commit 62570f1434160d356311e1c217537e24a4ac85cd.

Reviewed-by: Thomas Huth <thuth@redhat.com>
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
Message-Id: <20240207163812.3231697-5-alex.bennee@linaro.org>


  Commit: 2df1eb2756658dc2c0e9d739cec6929e74e6c3b0
      
https://github.com/qemu/qemu/commit/2df1eb2756658dc2c0e9d739cec6929e74e6c3b0
  Author: Paolo Bonzini <pbonzini@redhat.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M configs/devices/m68k-softmmu/default.mak
    M configs/devices/mips-softmmu/common.mak
    M configs/devices/nios2-softmmu/default.mak
    M configs/devices/riscv32-softmmu/default.mak
    M configs/devices/riscv64-softmmu/default.mak
    M configs/devices/xtensa-softmmu/default.mak
    M target/m68k/Kconfig
    M target/mips/Kconfig
    M target/nios2/Kconfig
    M target/riscv/Kconfig
    M target/xtensa/Kconfig

  Log Message:
  -----------
  kconfig: use "select" to enable semihosting

Just like all other dependencies, these can be expressed in Kconfig
files rather than in the default configurations.

Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Acked-by: Alistair Francis <alistair.francis@wdc.com>
Reviewed-by: Thomas Huth <thuth@redhat.com>
Message-Id: <20240129115809.1039924-1-pbonzini@redhat.com>
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
Message-Id: <20240207163812.3231697-10-alex.bennee@linaro.org>


  Commit: 4aad096587a28ef967f319279bca78e2b216b7f3
      
https://github.com/qemu/qemu/commit/4aad096587a28ef967f319279bca78e2b216b7f3
  Author: Ilya Leoshkevich <iii@linux.ibm.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M gdbstub/internals.h
    M gdbstub/user-target.c

  Log Message:
  -----------
  gdbstub: Expose TARGET_SIGTRAP in a target-agnostic way

The upcoming syscall catchpoint support needs to send SIGTRAP stop
packets to GDB. Being able to compile this support only once for all
targets is a good thing, and it requires hiding TARGET_SIGTRAP behind
a function call.

Signed-off-by: Ilya Leoshkevich <iii@linux.ibm.com>
Message-Id: <20240202152506.279476-2-iii@linux.ibm.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org>
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
Message-Id: <20240207163812.3231697-11-alex.bennee@linaro.org>


  Commit: 8b7fcb8ed159d1caeb0b6e5b753b539d65092282
      
https://github.com/qemu/qemu/commit/8b7fcb8ed159d1caeb0b6e5b753b539d65092282
  Author: Ilya Leoshkevich <iii@linux.ibm.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M gdbstub/user.c
    M include/gdbstub/user.h

  Log Message:
  -----------
  gdbstub: Allow specifying a reason in stop packets

The upcoming syscall catchpoint support needs to send stop packets with
an associated reason to GDB. Add an extra parameter to gdb_handlesig()
for that, and rename it to gdb_handlesig_reason(). Provide a
compatibility wrapper with an old name.

Signed-off-by: Ilya Leoshkevich <iii@linux.ibm.com>
Message-Id: <20240202152506.279476-3-iii@linux.ibm.com>
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
Message-Id: <20240207163812.3231697-12-alex.bennee@linaro.org>


  Commit: 0a0d87c9b851338934f3018e9c18139b6c26f405
      
https://github.com/qemu/qemu/commit/0a0d87c9b851338934f3018e9c18139b6c26f405
  Author: Ilya Leoshkevich <iii@linux.ibm.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M gdbstub/user.c
    M include/gdbstub/user.h
    M include/user/syscall-trace.h

  Log Message:
  -----------
  gdbstub: Add syscall entry/return hooks

The upcoming syscall catchpoint support needs to get control on syscall
entry and return. Provide the necessary hooks for that, which are
no-ops for now.

Signed-off-by: Ilya Leoshkevich <iii@linux.ibm.com>
Message-Id: <20240202152506.279476-4-iii@linux.ibm.com>
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
Message-Id: <20240207163812.3231697-13-alex.bennee@linaro.org>


  Commit: 046f143c51128d130fac8ed1ddda1bae33c4bb4b
      
https://github.com/qemu/qemu/commit/046f143c51128d130fac8ed1ddda1bae33c4bb4b
  Author: Ilya Leoshkevich <iii@linux.ibm.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M gdbstub/gdbstub.c
    M gdbstub/internals.h
    M gdbstub/user.c

  Log Message:
  -----------
  gdbstub: Implement catching syscalls

GDB supports stopping on syscall entry and exit using the "catch
syscall" command. It relies on 3 packets, which are currently not
supported by QEMU:

* qSupported:QCatchSyscalls+ [1]
* QCatchSyscalls: [2]
* T05syscall_entry: and T05syscall_return: [3]

Implement generation and handling of these packets.

[1] 
https://sourceware.org/gdb/current/onlinedocs/gdb.html/General-Query-Packets.html#qSupported
[2] 
https://sourceware.org/gdb/current/onlinedocs/gdb.html/General-Query-Packets.html#QCatchSyscalls
[3] 
https://sourceware.org/gdb/current/onlinedocs/gdb.html/Stop-Reply-Packets.html

Signed-off-by: Ilya Leoshkevich <iii@linux.ibm.com>
Message-Id: <20240202152506.279476-5-iii@linux.ibm.com>
[AJB: GString -> g_strdup_printf]
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
Message-Id: <20240207163812.3231697-14-alex.bennee@linaro.org>


  Commit: 86b75667e04b49a0b75f061f589b3fbec3fb78f1
      
https://github.com/qemu/qemu/commit/86b75667e04b49a0b75f061f589b3fbec3fb78f1
  Author: Ilya Leoshkevich <iii@linux.ibm.com>
  Date:   2024-02-09 (Fri, 09 Feb 2024)

  Changed paths:
    M tests/tcg/multiarch/Makefile.target
    A tests/tcg/multiarch/catch-syscalls.c
    A tests/tcg/multiarch/gdbstub/catch-syscalls.py

  Log Message:
  -----------
  tests/tcg: Add the syscall catchpoint gdbstub test

Check that adding/removing syscall catchpoints works.

Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
Signed-off-by: Ilya Leoshkevich <iii@linux.ibm.com>
Message-Id: <20240202152506.279476-6-iii@linux.ibm.com>
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
Message-Id: <20240207163812.3231697-15-alex.bennee@linaro.org>


  Commit: 15dbbeaff3c696be8c9c236ffb25d25ce21cba38
      
https://github.com/qemu/qemu/commit/15dbbeaff3c696be8c9c236ffb25d25ce21cba38
  Author: Peter Maydell <peter.maydell@linaro.org>
  Date:   2024-02-12 (Mon, 12 Feb 2024)

  Changed paths:
    M MAINTAINERS
    M block.c
    M block/crypto.c
    M block/crypto.h
    M block/qcow.c
    M block/qcow2.c
    M chardev/char-socket.c
    M crypto/block-luks.c
    M crypto/block.c
    M crypto/blockpriv.h
    M crypto/cipher-gcrypt.c.inc
    M crypto/cipher-nettle.c.inc
    M crypto/cipher.c
    M docs/system/cpu-models-x86-abi.csv
    M docs/system/cpu-models-x86.rst.inc
    M include/crypto/block.h
    M include/sysemu/os-posix.h
    M include/sysemu/os-win32.h
    M io/channel-tls.c
    M io/trace-events
    M meson.build
    M os-posix.c
    M qapi/block-core.json
    M qapi/crypto.json
    M scripts/cpu-x86-uarch-abi.py
    M system/vl.c
    M tests/qemu-iotests/210.out
    A tests/qemu-iotests/tests/luks-detached-header
    A tests/qemu-iotests/tests/luks-detached-header.out
    M tests/unit/test-crypto-block.c
    M tests/unit/test-crypto-cipher.c
    M ui/vnc.c
    M ui/vnc.h

  Log Message:
  -----------
  Merge tag 'misc-fixes-pull-request' of https://gitlab.com/berrange/qemu into 
staging

 - LUKS support for detached headers
 - Update x86 CPU model docs and script
 - Add missing close of chardev QIOChannel
 - More trace events o nTKS handshake
 - Drop unsafe VNC constants
 - Increase NOFILE limit during startup

# -----BEGIN PGP SIGNATURE-----
#
# iQIzBAABCAAdFiEE2vOm/bJrYpEtDo4/vobrtBUQT98FAmXGMNUACgkQvobrtBUQ
# T998JQ//SqQ3L/AZmhE5cIwZ1XipSMMZ/yEoVIyniA3tL41S7Oimj3O9XvY68TEG
# nnj9Oh+zOlVLxauTHAczveJ7z+XfonQZS3HrbGRUTHU+ezGVjyM618e/h9pSQtYI
# +CCkrjtey1NoT42/um4D/bKg/B2XQeulS+pD12Z9l5zbqEZiw0R9+UwVIJ52G811
# 5UQgIjJ7GNFzalxqiMCkGc0nTyU8keEXQJcdZ4droo42DnU4pZeQWGDimzP61JnW
# 1Crm6aZSuUriUbVmxJde+2eEdPSR4rr/yQ4Pw06hoi1QJALSgGYtOTo8+qsyumHd
# us/2ouMrxOMdsIk4ViAkSTiaje9agPj84VE1Z229Y/uqZcEAuX572n730/kkzqUv
# ZDKxMz0v3rzpkjFmsgj5D4yqJaQp4zn1zYm98ld7HWJVIOf3GSvpaNg9J6jwN7Gi
# HKKkvYns9pxg3OSx++gqnM32HV6nnMDFiddipl/hTiUsnNlnWyTDSvJoNxIUU5+l
# /uEbbdt8xnxx1JP0LiOhgmz6N6FU7oOpaPuJ5CD8xO2RO8D1uBRvmpFcdOTDAfv0
# uYdjhKBI+quKjE64p7gNWYCoqZtipRIJ6AY2VaPU8XHx8GvGFwBLX64oLYiYtrBG
# gkv3NTHRkMhQw9cGQcZIgZ+OLU+1eNF+m9EV7LUjuKl0HWC3Vjs=
# =61zI
# -----END PGP SIGNATURE-----
# gpg: Signature made Fri 09 Feb 2024 14:04:05 GMT
# gpg:                using RSA key DAF3A6FDB26B62912D0E8E3FBE86EBB415104FDF
# gpg: Good signature from "Daniel P. Berrange <dan@berrange.com>" [full]
# gpg:                 aka "Daniel P. Berrange <berrange@redhat.com>" [full]
# Primary key fingerprint: DAF3 A6FD B26B 6291 2D0E  8E3F BE86 EBB4 1510 4FDF

* tag 'misc-fixes-pull-request' of https://gitlab.com/berrange/qemu:
  tests: Add case for LUKS volume with detached header
  crypto: Introduce 'detached-header' field in QCryptoBlockInfoLUKS
  block: Support detached LUKS header creation using qemu-img
  block: Support detached LUKS header creation using blockdev-create
  crypto: Modify the qcrypto_block_create to support creation flags
  qapi: Make parameter 'file' optional for BlockdevCreateOptionsLUKS
  crypto: Support LUKS volume with detached header
  io: add trace event when cancelling TLS handshake
  chardev: close QIOChannel before unref'ing
  docs: re-generate x86_64 ABI compatibility CSV
  docs: fix highlighting of CPU ABI header rows
  scripts: drop comment about autogenerated CPU API file
  softmmu: remove obsolete comment about libvirt timeouts
  ui: drop VNC feature _MASK constants
  qemu_init: increase NOFILE soft limit on POSIX
  crypto: Introduce SM4 symmetric cipher algorithm
  meson: sort C warning flags alphabetically

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>


  Commit: 5005aed8a7e728d028efb40e243ecfc2b4f3df3a
      
https://github.com/qemu/qemu/commit/5005aed8a7e728d028efb40e243ecfc2b4f3df3a
  Author: Peter Maydell <peter.maydell@linaro.org>
  Date:   2024-02-12 (Mon, 12 Feb 2024)

  Changed paths:
    M configs/devices/m68k-softmmu/default.mak
    M configs/devices/mips-softmmu/common.mak
    M configs/devices/nios2-softmmu/default.mak
    M configs/devices/riscv32-softmmu/default.mak
    M configs/devices/riscv64-softmmu/default.mak
    M configs/devices/xtensa-softmmu/default.mak
    M configure
    M docs/about/deprecated.rst
    M gdbstub/gdbstub.c
    M gdbstub/internals.h
    M gdbstub/user-target.c
    M gdbstub/user.c
    M include/gdbstub/user.h
    M include/hw/elf_ops.h
    M include/user/syscall-trace.h
    M target/m68k/Kconfig
    M target/mips/Kconfig
    M target/nios2/Kconfig
    M target/riscv/Kconfig
    M target/xtensa/Kconfig
    M tests/docker/dockerfiles/opensuse-leap.docker
    M tests/lcitool/mappings.yml
    M tests/lcitool/projects/qemu.yml
    M tests/tcg/multiarch/Makefile.target
    A tests/tcg/multiarch/catch-syscalls.c
    A tests/tcg/multiarch/gdbstub/catch-syscalls.py

  Log Message:
  -----------
  Merge tag 'pull-maintainer-updates-090224-1' of 
https://gitlab.com/stsquad/qemu into staging

testing, doc and gdbstub updates:

  - add sqlite3 to openSUSE image
  - mark CRIS as deprecated
  - re-enable the TCG plugin tests
  - use select for semihosting
  - implement syscall catching in gdbstub

# -----BEGIN PGP SIGNATURE-----
#
# iQEzBAABCgAdFiEEZoWumedRZ7yvyN81+9DbCVqeKkQFAmXGZtQACgkQ+9DbCVqe
# KkTegAgAg7Kkd0Pa2cgkPfNPYR5yT4hYurjVSfi/69cOpj/Vadsav4WWFsuUiQMI
# FfKWCNDo5lmNcWIPKgC0oeWVwxal4IhqhO8f9lRIYqg9z4bRkZbdsrvh8J52Q6Xh
# Bu9UAEk5KBGrMfEdsAwHnVDg435c7IGdJZnE/iKBK1aKljS5LOiX1J6ZxrqUoMsJ
# keTAcdXyvs/BIz68c87AHrW/HKO9KKLgHA2n7T/l2N5KJdoa3p8La9py+v1SGUh8
# 6JlDRYR1H16mITS8tm6ZffPqcOpfHXp7DRquu7obVS5+CVTJ2H9w8TICw56rqMg7
# cVnysNLhdS18cMNKD2Jx3zgd5Nq/cg==
# =deHm
# -----END PGP SIGNATURE-----
# gpg: Signature made Fri 09 Feb 2024 17:54:28 GMT
# gpg:                using RSA key 6685AE99E75167BCAFC8DF35FBD0DB095A9E2A44
# gpg: Good signature from "Alex Bennée (Master Work Key) 
<alex.bennee@linaro.org>" [full]
# Primary key fingerprint: 6685 AE99 E751 67BC AFC8  DF35 FBD0 DB09 5A9E 2A44

* tag 'pull-maintainer-updates-090224-1' of https://gitlab.com/stsquad/qemu:
  tests/tcg: Add the syscall catchpoint gdbstub test
  gdbstub: Implement catching syscalls
  gdbstub: Add syscall entry/return hooks
  gdbstub: Allow specifying a reason in stop packets
  gdbstub: Expose TARGET_SIGTRAP in a target-agnostic way
  kconfig: use "select" to enable semihosting
  Revert "hw/elf_ops: Ignore loadable segments with zero size"
  configure: run plugin TCG tests again
  docs: mark CRIS support as deprecated
  tests/docker: Add sqlite3 module to openSUSE Leap container

Signed-off-by: Peter Maydell <peter.maydell@linaro.org>


Compare: https://github.com/qemu/qemu/compare/df50424b4dcf...5005aed8a7e7



reply via email to

[Prev in Thread] Current Thread [Next in Thread]