1 | The following changes since commit 64175afc695c0672876fbbfc31b299c86d562cb4: | 1 | The following changes since commit 27c94566379069fb8930bb1433dcffbf7df3203d: |
---|---|---|---|
2 | 2 | ||
3 | arm_gicv3: Fix ICC_BPR1 reset value when EL3 not implemented (2017-06-07 17:21:44 +0100) | 3 | Merge remote-tracking branch 'remotes/edgar/tags/edgar/xilinx-next-2020-04-30.for-upstream' into staging (2020-04-30 16:47:23 +0100) |
4 | 4 | ||
5 | are available in the git repository at: | 5 | are available in the Git repository at: |
6 | 6 | ||
7 | git://github.com/codyprime/qemu-kvm-jtc.git tags/block-pull-request | 7 | https://github.com/stefanha/qemu.git tags/block-pull-request |
8 | 8 | ||
9 | for you to fetch changes up to 56faeb9bb6872b3f926b3b3e0452a70beea10af2: | 9 | for you to fetch changes up to cc1adc4488059ac16d4d2772a7aa7cd1323deeca: |
10 | 10 | ||
11 | block/gluster.c: Handle qdict_array_entries() failure (2017-06-09 08:41:29 -0400) | 11 | lockable: Replace locks with lock guard macros (2020-05-01 09:19:25 +0100) |
12 | 12 | ||
13 | ---------------------------------------------------------------- | 13 | ---------------------------------------------------------------- |
14 | Gluster patch | 14 | Pull request |
15 | |||
16 | Fix the QEMU_LOCK_GUARD() macros, use them more widely, and allow fuzzer | ||
17 | targets to be invoked depending on argv[0]. | ||
18 | |||
15 | ---------------------------------------------------------------- | 19 | ---------------------------------------------------------------- |
16 | 20 | ||
17 | Peter Maydell (1): | 21 | Alexander Bulekov (1): |
18 | block/gluster.c: Handle qdict_array_entries() failure | 22 | fuzz: select fuzz target using executable name |
19 | 23 | ||
20 | block/gluster.c | 3 +-- | 24 | Daniel Brodsky (2): |
21 | 1 file changed, 1 insertion(+), 2 deletions(-) | 25 | lockable: fix __COUNTER__ macro to be referenced properly |
26 | lockable: replaced locks with lock guard macros where appropriate | ||
27 | |||
28 | Simran Singhal (1): | ||
29 | lockable: Replace locks with lock guard macros | ||
30 | |||
31 | include/qemu/lockable.h | 7 +++--- | ||
32 | include/qemu/rcu.h | 2 +- | ||
33 | block/iscsi.c | 7 ++---- | ||
34 | block/nfs.c | 51 +++++++++++++++++++---------------------- | ||
35 | cpus-common.c | 14 ++++------- | ||
36 | hw/display/qxl.c | 43 ++++++++++++++++------------------ | ||
37 | hw/hyperv/hyperv.c | 15 ++++++------ | ||
38 | hw/rdma/rdma_backend.c | 50 ++++++++++++++++++++-------------------- | ||
39 | hw/rdma/rdma_rm.c | 3 +-- | ||
40 | hw/vfio/platform.c | 5 ++-- | ||
41 | migration/migration.c | 3 +-- | ||
42 | migration/multifd.c | 8 +++---- | ||
43 | migration/ram.c | 3 +-- | ||
44 | monitor/misc.c | 4 +--- | ||
45 | tests/qtest/fuzz/fuzz.c | 19 ++++++++------- | ||
46 | ui/spice-display.c | 14 +++++------ | ||
47 | util/log.c | 4 ++-- | ||
48 | util/qemu-timer.c | 17 +++++++------- | ||
49 | util/rcu.c | 8 +++---- | ||
50 | util/thread-pool.c | 3 +-- | ||
51 | util/vfio-helpers.c | 5 ++-- | ||
52 | slirp | 2 +- | ||
53 | 22 files changed, 133 insertions(+), 154 deletions(-) | ||
22 | 54 | ||
23 | -- | 55 | -- |
24 | 2.9.3 | 56 | 2.25.3 |
25 | 57 | ||
26 | diff view generated by jsdifflib |
1 | From: Peter Maydell <peter.maydell@linaro.org> | 1 | From: Alexander Bulekov <alxndr@bu.edu> |
---|---|---|---|
2 | 2 | ||
3 | In qemu_gluster_parse_json(), the call to qdict_array_entries() | 3 | The fuzzers are built into a binary (e.g. qemu-fuzz-i386). To select the |
4 | could return a negative error code, which we were ignoring | 4 | device to fuzz/fuzz target, we usually use the --fuzz-target= argument. |
5 | because we assigned the result to an unsigned variable. | 5 | This commit allows the fuzz-target to be specified using the name of the |
6 | Fix this by using the 'int' type instead, which matches the | 6 | executable. If the executable name ends with -target-FUZZ_TARGET, then |
7 | return type of qdict_array_entries() and also the type | 7 | we select the fuzz target based on this name, rather than the |
8 | we use for the loop enumeration variable 'i'. | 8 | --fuzz-target argument. This is useful for systems such as oss-fuzz |
9 | where we don't have control of the arguments passed to the fuzzer. | ||
9 | 10 | ||
10 | (Spotted by Coverity, CID 1360960.) | 11 | [Fixed incorrect indentation. |
12 | --Stefan] | ||
11 | 13 | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 14 | Signed-off-by: Alexander Bulekov <alxndr@bu.edu> |
13 | Reviewed-by: Eric Blake <eblake@redhat.com> | 15 | Reviewed-by: Darren Kenny <darren.kenny@oracle.com> |
14 | Reviewed-by: Jeff Cody <jcody@redhat.com> | 16 | Message-id: 20200421182230.6313-1-alxndr@bu.edu |
15 | Message-id: 1496682098-1540-1-git-send-email-peter.maydell@linaro.org | 17 | Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> |
16 | Signed-off-by: Jeff Cody <jcody@redhat.com> | ||
17 | --- | 18 | --- |
18 | block/gluster.c | 3 +-- | 19 | tests/qtest/fuzz/fuzz.c | 19 +++++++++++-------- |
19 | 1 file changed, 1 insertion(+), 2 deletions(-) | 20 | slirp | 2 +- |
21 | 2 files changed, 12 insertions(+), 9 deletions(-) | ||
20 | 22 | ||
21 | diff --git a/block/gluster.c b/block/gluster.c | 23 | diff --git a/tests/qtest/fuzz/fuzz.c b/tests/qtest/fuzz/fuzz.c |
22 | index XXXXXXX..XXXXXXX 100644 | 24 | index XXXXXXX..XXXXXXX 100644 |
23 | --- a/block/gluster.c | 25 | --- a/tests/qtest/fuzz/fuzz.c |
24 | +++ b/block/gluster.c | 26 | +++ b/tests/qtest/fuzz/fuzz.c |
25 | @@ -XXX,XX +XXX,XX @@ static int qemu_gluster_parse_json(BlockdevOptionsGluster *gconf, | 27 | @@ -XXX,XX +XXX,XX @@ static void usage(char *path) |
26 | Error *local_err = NULL; | 28 | printf(" * %s : %s\n", tmp->target->name, |
27 | char *str = NULL; | 29 | tmp->target->description); |
28 | const char *ptr; | 30 | } |
29 | - size_t num_servers; | 31 | + printf("Alternatively, add -target-FUZZ_TARGET to the executable name\n"); |
30 | - int i, type; | 32 | exit(0); |
31 | + int i, type, num_servers; | 33 | } |
32 | 34 | ||
33 | /* create opts info from runtime_json_opts list */ | 35 | @@ -XXX,XX +XXX,XX @@ int LLVMFuzzerInitialize(int *argc, char ***argv, char ***envp) |
34 | opts = qemu_opts_create(&runtime_json_opts, NULL, 0, &error_abort); | 36 | module_call_init(MODULE_INIT_QOM); |
37 | module_call_init(MODULE_INIT_LIBQOS); | ||
38 | |||
39 | - if (*argc <= 1) { | ||
40 | + target_name = strstr(**argv, "-target-"); | ||
41 | + if (target_name) { /* The binary name specifies the target */ | ||
42 | + target_name += strlen("-target-"); | ||
43 | + } else if (*argc > 1) { /* The target is specified as an argument */ | ||
44 | + target_name = (*argv)[1]; | ||
45 | + if (!strstr(target_name, "--fuzz-target=")) { | ||
46 | + usage(**argv); | ||
47 | + } | ||
48 | + target_name += strlen("--fuzz-target="); | ||
49 | + } else { | ||
50 | usage(**argv); | ||
51 | } | ||
52 | |||
53 | /* Identify the fuzz target */ | ||
54 | - target_name = (*argv)[1]; | ||
55 | - if (!strstr(target_name, "--fuzz-target=")) { | ||
56 | - usage(**argv); | ||
57 | - } | ||
58 | - | ||
59 | - target_name += strlen("--fuzz-target="); | ||
60 | - | ||
61 | fuzz_target = fuzz_get_target(target_name); | ||
62 | if (!fuzz_target) { | ||
63 | usage(**argv); | ||
64 | diff --git a/slirp b/slirp | ||
65 | index XXXXXXX..XXXXXXX 160000 | ||
66 | --- a/slirp | ||
67 | +++ b/slirp | ||
68 | @@ -1 +1 @@ | ||
69 | -Subproject commit 2faae0f778f818fadc873308f983289df697eb93 | ||
70 | +Subproject commit 55ab21c9a36852915b81f1b41ebaf3b6509dd8ba | ||
35 | -- | 71 | -- |
36 | 2.9.3 | 72 | 2.25.3 |
37 | 73 | ||
38 | diff view generated by jsdifflib |