Branch: refs/heads/master
  Home:   https://github.com/qemu/qemu
  Commit: 04eeeec69771958bc28564a05a40919e201ba862
      
https://github.com/qemu/qemu/commit/04eeeec69771958bc28564a05a40919e201ba862
  Author: Dr. David Alan Gilbert <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M crypto/der.c
    M crypto/der.h

  Log Message:
  -----------
  crypto: Remove unused DER string functions

qcrypto_der_encode_octet_str_begin and _end have been unused
since they were added in
  3b34ccad66 ("crypto: Support DER encodings")

Remove them.

Signed-off-by: Dr. David Alan Gilbert <[email protected]>
Reviewed-by: Daniel P. Berrangé <[email protected]>
Signed-off-by: Daniel P. Berrangé <[email protected]>


  Commit: a3472075147162c935d841b8f0571e5616947d6a
      
https://github.com/qemu/qemu/commit/a3472075147162c935d841b8f0571e5616947d6a
  Author: Dr. David Alan Gilbert <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M include/qemu/sockets.h
    M util/qemu-sockets.c

  Log Message:
  -----------
  sockets: Remove deadcode

socket_remote_address hasn't been used since it was added in
  17c55decec ("sockets: add helpers for creating SocketAddress from a socket")

inet_connect hasn't been used since 2017's
  8ecc2f9eab ("sheepdog: Use SocketAddress and socket_connect()")

Remove them.

Signed-off-by: Dr. David Alan Gilbert <[email protected]>
Reviewed-by: Daniel P. Berrangé <[email protected]>
Signed-off-by: Daniel P. Berrangé <[email protected]>


  Commit: b5b89e9bc6a20677ff59e5049ba6b89a68105b5e
      
https://github.com/qemu/qemu/commit/b5b89e9bc6a20677ff59e5049ba6b89a68105b5e
  Author: Daniel P. Berrangé <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M util/qemu-sockets.c

  Log Message:
  -----------
  util: don't set SO_REUSEADDR on client sockets

Setting the SO_REUSEADDR property on a socket allows binding to a port
number that is in the TIMED_WAIT state. This is usually done on listener
sockets, to enable a server to restart itself without having to wait for
the completion of TIMED_WAIT on the port.

It is also possible, but highly unusual, to set it on client sockets. It
is rare to explicitly bind() a client socket, since it is almost always
fine to allow the kernel to auto-bind a client socket to a random free
port. Most systems will have many 10's of 1000's of free ports that
client sockets will be bound to.

eg on Linux

  $ sysctl -a | grep local_port
  net.ipv4.ip_local_port_range = 32768  60999

eg on OpenBSD

  $ sysctl -a | grep net.inet.ip.port
  net.inet.ip.portfirst=1024
  net.inet.ip.portlast=49151
  net.inet.ip.porthifirst=49152
  net.inet.ip.porthilast=65535

A connected socket must have a unique set of value for

 (protocol, localip, localport, remoteip, remoteport)

otherwise it is liable to get EADDRINUSE.

A client connection should trivially avoid EADDRINUSE if letting the
kernel auto-assign the 'localport' value, which QEMU always does.

When QEMU sets SO_REUSEADDR on a client socket on OpenBSD, however, it
upsets this situation.

The OpenBSD kernel appears to happily pick a 'localport' that is in the
TIMED_WAIT state, even if there are many other available local ports
available for use that are not in the TIMED_WAIT state.

A test program that just loops opening client sockets will start seeing
EADDRINUSE on OpenBSD when as few as 2000 ports are in TIMED_WAIT,
despite 10's of 1000's ports still being unused. This contrasts with
Linux which appears to avoid picking local ports in TIMED_WAIT state.

This problem on OpenBSD exhibits itself periodically with the migration
test failing with a message like[1]:

  qemu-system-ppc64: Failed to connect to '127.0.0.1:24109': Address already in 
use

While I have not been able to reproduce the OpenBSD failure in my own
testing, given the scope of what QEMU tests do, it is entirely possible
that there could be a lot of ports in TIMED_WAIT state when the
migration test runs.

Removing SO_REUSEADDR from the client sockets should not affect normal
QEMU usage, and should improve reliability on OpenBSD.

This use of SO_REUSEADDR on client sockets is highly unusual, and
appears to have been present since the very start of the QEMU socket
helpers in 2008. The orignal commit has no comment about the use of
SO_REUSEADDR on the client, so is most likely just an 16 year old
copy+paste bug.

[1] https://lists.nongnu.org/archive/html/qemu-devel/2024-10/msg03427.html
    https://lists.nongnu.org/archive/html/qemu-devel/2024-02/msg01572.html

Fixes: d247d25f18764402899b37c381bb696a79000b4e
Reviewed-by: Peter Xu <[email protected]>
Reviewed-by: Fabiano Rosas <[email protected]>
Signed-off-by: Daniel P. Berrangé <[email protected]>


  Commit: dde538c9a76f328a92c532893e97e18785d57364
      
https://github.com/qemu/qemu/commit/dde538c9a76f328a92c532893e97e18785d57364
  Author: Daniel P. Berrangé <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M crypto/hash-gcrypt.c
    M crypto/hash-glib.c
    M crypto/hash-gnutls.c
    M crypto/hash-nettle.c

  Log Message:
  -----------
  crypto/hash: avoid overwriting user supplied result pointer

If the user provides a pre-allocated buffer for the hash result,
we must use that rather than re-allocating a new buffer.

Reported-by: Dorjoy Chowdhury <[email protected]>
Signed-off-by: Daniel P. Berrangé <[email protected]>


  Commit: 164f2be1b513c16dfa65f092f223310992c29828
      
https://github.com/qemu/qemu/commit/164f2be1b513c16dfa65f092f223310992c29828
  Author: Daniel P. Berrangé <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M tests/unit/test-crypto-hash.c
    M tests/unit/test-crypto-hmac.c

  Log Message:
  -----------
  tests: correctly validate result buffer in hash/hmac tests

Validate that the pre-allocated buffer pointer was not overwritten
by the hash/hmac APIs.

Reviewed-by: Dorjoy Chowdhury <[email protected]>
Signed-off-by: Daniel P. Berrangé <[email protected]>


  Commit: 769660955a62ddcb75a1f9a0d1c6c0f840d533e8
      
https://github.com/qemu/qemu/commit/769660955a62ddcb75a1f9a0d1c6c0f840d533e8
  Author: Daniel P. Berrangé <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M include/crypto/hash.h
    M include/crypto/hmac.h

  Log Message:
  -----------
  include/crypto: clarify @result/@result_len for hash/hmac APIs

The @result parameter passed to hash/hmac APIs may either contain
a pre-allocated buffer, or a buffer can be allocated on the fly.
Clarify these two different usage models in the API docs.

Reviewed-by: Dorjoy Chowdhury <[email protected]>
Signed-off-by: Daniel P. Berrangé <[email protected]>


  Commit: f8395ce8a349245c5b7e4645e34350366b0c734b
      
https://github.com/qemu/qemu/commit/f8395ce8a349245c5b7e4645e34350366b0c734b
  Author: Markus Armbruster <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M crypto/hash-afalg.c

  Log Message:
  -----------
  crypto/hash-afalg: Fix broken build

Fux build broken by semantic conflict with commit
8f525028bc6 (qapi/crypto: Rename QCryptoAFAlg to QCryptoAFAlgo).

Fixes: 90c3dc60735a (crypto/hash-afalg: Implement new hash API)
Signed-off-by: Markus Armbruster <[email protected]>
Signed-off-by: Daniel P. Berrangé <[email protected]>


  Commit: 46c80446b5c1caf39a7ed2d0e426c4712f8e98d2
      
https://github.com/qemu/qemu/commit/46c80446b5c1caf39a7ed2d0e426c4712f8e98d2
  Author: Daniel P. Berrangé <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M ui/vnc-auth-sasl.c

  Log Message:
  -----------
  ui/vnc: don't return an empty SASL mechlist to the client

The SASL initialization phase may determine that there are no valid
mechanisms available to use. This may be because the host OS admin
forgot to install some packages, or it might be because the requested
SSF level is incompatible with available mechanisms, or other unknown
reasons.

If we return an empty mechlist to the client, they're going to get a
failure from the SASL library on their end and drop the connection.
Thus there is no point even sending this back to the client, we can
just drop the connection immediately.

Reviewed-by: Marc-André Lureau <[email protected]>
Signed-off-by: Daniel P. Berrangé <[email protected]>


  Commit: e9eabcc911a2056a91e37384f002610351ca0907
      
https://github.com/qemu/qemu/commit/e9eabcc911a2056a91e37384f002610351ca0907
  Author: Daniel P. Berrangé <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M ui/vnc-auth-sasl.c

  Log Message:
  -----------
  ui/vnc: don't raise error formatting socket address for non-inet

The SASL library requires the connection's local & remote IP address to
be passed in, since some mechanism may use this information. Currently
QEMU raises an error for non-inet sockets, but it is valid to pass NULL
to the SASL library. Doing so makes SASL work on UNIX sockets.

Reviewed-by: Marc-André Lureau <[email protected]>
Signed-off-by: Daniel P. Berrangé <[email protected]>


  Commit: c0a9c92bd5a9c410a2b981f4d88f5584b55c1dfd
      
https://github.com/qemu/qemu/commit/c0a9c92bd5a9c410a2b981f4d88f5584b55c1dfd
  Author: Daniel P. Berrangé <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M ui/vnc-auth-sasl.c
    M ui/vnc.c
    M ui/vnc.h

  Log Message:
  -----------
  ui/vnc: fix skipping SASL SSF on UNIX sockets

The 'is_unix' flag is set on the VNC server during startup, however,
a regression in:

  commit 8bd22f477f68bbd7a9c88e926e7a58bf65605e39
  Author: Daniel P. Berrangé <[email protected]>
  Date:   Fri Feb 3 12:06:46 2017 +0000

    ui: extract code to connect/listen from vnc_display_open

meant we stopped setting the 'is_unix' flag when QEMU listens for
VNC sockets, only setting when QEMU does a reverse VNC connection.

Rather than fixing setting of the 'is_unix' flag, remove it, and
directly check the live client socket address. This is more robust
to a possible situation where the VNC server was listening on a
mixture of INET and UNIX sockets.

Reviewed-by: Marc-André Lureau <[email protected]>
Signed-off-by: Daniel P. Berrangé <[email protected]>


  Commit: 2b69564798f3cd43ab9bdf70a96d2373cb544a9a
      
https://github.com/qemu/qemu/commit/2b69564798f3cd43ab9bdf70a96d2373cb544a9a
  Author: Daniel P. Berrangé <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M ui/vnc-auth-sasl.c

  Log Message:
  -----------
  ui/vnc: don't check for SSF after SASL authentication on UNIX sockets

Although we avoid requesting an SSF when querying SASL mechanisms for a
UNIX socket client, we still mistakenly checked for availability of an
SSF once the SASL auth process is complete.

Reviewed-by: Marc-André Lureau <[email protected]>
Signed-off-by: Daniel P. Berrangé <[email protected]>


  Commit: 829cb3d0eab08e4fea768926f06db1c411a2767f
      
https://github.com/qemu/qemu/commit/829cb3d0eab08e4fea768926f06db1c411a2767f
  Author: Daniel P. Berrangé <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M ui/vnc-auth-sasl.c

  Log Message:
  -----------
  ui: fix handling of NULL SASL server data

The code is supposed to distinguish between SASL server data that
is NULL, vs non-NULL but zero-length. It was incorrectly checking
the 'serveroutlen' variable, rather than 'serverout' though, so
failing to distinguish the cases.

Fortunately we can fix this without breaking compatibility with
clients, as clients already know how to decode the input data
correctly.

Reviewed-by: Marc-André Lureau <[email protected]>
Signed-off-by: Daniel P. Berrangé <[email protected]>


  Commit: 1a225f57f3a6bc7a9544b0aa567727f0ef51bc17
      
https://github.com/qemu/qemu/commit/1a225f57f3a6bc7a9544b0aa567727f0ef51bc17
  Author: Daniel P. Berrangé <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M ui/vnc-auth-sasl.c

  Log Message:
  -----------
  ui: validate NUL byte padding in SASL client data more strictly

When the SASL data is non-NULL, the SASL protocol spec requires that
it is padded with a trailing NUL byte. QEMU discards the trailing
byte, but does not currently validate that it was in fact a NUL.
Apply strict validation to better detect any broken clients.

Reviewed-by: Marc-André Lureau <[email protected]>
Signed-off-by: Daniel P. Berrangé <[email protected]>


  Commit: c64df333f92798823c4897ae6d4bd7f49d060225
      
https://github.com/qemu/qemu/commit/c64df333f92798823c4897ae6d4bd7f49d060225
  Author: Daniel P. Berrangé <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M .gitlab-ci.d/buildtest.yml

  Log Message:
  -----------
  gitlab: enable afalg tests in fedora system test

The AF_ALG crypto integration for Linux is not being tested in
any CI scenario. It always requires an explicit configure time
flag to be passed to turn it on. The Fedora system test is
arbitrarily picked as the place to test it.

Reviewed-by: Philippe Mathieu-Daudé <[email protected]>
Reviewed-by: Thomas Huth <[email protected]>
Signed-off-by: Daniel P. Berrangé <[email protected]>


  Commit: 75200708cec2377425e3ca916cc5706ba22c9272
      
https://github.com/qemu/qemu/commit/75200708cec2377425e3ca916cc5706ba22c9272
  Author: Peter Maydell <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M block/gluster.c

  Log Message:
  -----------
  block/gluster: Use g_autofree for string in qemu_gluster_parse_json()

In the loop in qemu_gluster_parse_json() we do:

    char *str = NULL;
    for(...) {
        str = g_strdup_printf(...);
        ...
        if (various errors) {
            goto out;
        }
        ...
        g_free(str);
        str = NULL;
    }
    return 0;
out:
    various cleanups;
    g_free(str);
    ...
    return -errno;

Coverity correctly complains that the assignment "str = NULL" at the
end of the loop is unnecessary, because we will either go back to the
top of the loop and overwrite it, or else we will exit the loop and
then exit the function without ever reading str again. The assignment
is there as defensive coding to ensure that str is only non-NULL if
it's a live allocation, so this is intentional.

We can make Coverity happier and simplify the code here by using
g_autofree, since we never need 'str' outside the loop.

Resolves: Coverity CID 1527385
Signed-off-by: Peter Maydell <[email protected]>
Reviewed-by: Kevin Wolf <[email protected]>
Reviewed-by: Philippe Mathieu-Daudé <[email protected]>
Message-ID: <[email protected]>
Reviewed-by: Richard Henderson <[email protected]>
Signed-off-by: Kevin Wolf <[email protected]>


  Commit: 19c1e44123d53bfae4aae38e38a4342b789a581c
      
https://github.com/qemu/qemu/commit/19c1e44123d53bfae4aae38e38a4342b789a581c
  Author: Peter Maydell <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M block/ssh.c

  Log Message:
  -----------
  block/ssh.c: Don't double-check that characters are hex digits

In compare_fingerprint() we effectively check whether the characters
in the fingerprint are valid hex digits twice: first we do so with
qemu_isxdigit(), but then the hex2decimal() function also has a code
path where it effectively detects an invalid digit and returns -1.
This causes Coverity to complain because it thinks that we might use
that -1 value in an expression where it would be an integer overflow.

Avoid the double-check of hex digit validity by testing the return
values from hex2decimal() rather than doing separate calls to
qemu_isxdigit().

Since this means we now use the illegal-character return value
from hex2decimal(), rewrite it from "-1" to "UINT_MAX", which
has the same effect since the return type is "unsigned" but
looks less confusing at the callsites when we detect it with
"c0 > 0xf".

Resolves: Coverity CID 1547813
Signed-off-by: Peter Maydell <[email protected]>
Reviewed-by: Kevin Wolf <[email protected]>
Message-ID: <[email protected]>
Reviewed-by: Richard Henderson <[email protected]>
Signed-off-by: Kevin Wolf <[email protected]>


  Commit: d60bd080e783107cb876a6f16561fe03f9dcbca7
      
https://github.com/qemu/qemu/commit/d60bd080e783107cb876a6f16561fe03f9dcbca7
  Author: Peter Maydell <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M tests/qemu-iotests/211.out

  Log Message:
  -----------
  tests/qemu-iotests/211.out: Update to expect MapEntry 'compressed' field

In commit 52b10c9c0c68e90f in 2023 the QAPI MapEntry struct was
updated to add a 'compressed' field. That commit updated a number
of iotest expected-output files, but missed 211, which is vdi
specific. The result is that
 ./check -vdi
and more specifically
 ./check -vdi 211
fails because the expected and actual output don't match.

Update the reference output.

Cc: [email protected]
Fixes: 52b10c9c0c68e90f ("qemu-img: map: report compressed data blocks")
Signed-off-by: Peter Maydell <[email protected]>
Message-ID: <[email protected]>
Reviewed-by: Kevin Wolf <[email protected]>
Signed-off-by: Kevin Wolf <[email protected]>


  Commit: 4d7c5f8335dad1aac9bf00704dab5409b9a9f4db
      
https://github.com/qemu/qemu/commit/4d7c5f8335dad1aac9bf00704dab5409b9a9f4db
  Author: Peter Maydell <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M block/vdi.c

  Log Message:
  -----------
  block/vdi.c: Make SECTOR_SIZE constant 64-bits

Make the VDI SECTOR_SIZE define be a 64-bit constant; this matches
how we define BDRV_SECTOR_SIZE.  The benefit is that it means that we
don't need to carefully cast to 64-bits when doing operations like
"n_sectors * SECTOR_SIZE" to avoid doing a 32x32->32 multiply, which
might overflow, and which Coverity and other static analysers tend to
warn about.

The specific potential overflow Coverity is highlighting is the one
at the end of vdi_co_pwritev() where we write out n_sectors sectors
to the block map.  This is very unlikely to actually overflow, since
the block map has 4 bytes per block and the maximum number of blocks
in the image must fit into a 32-bit integer.  So this commit is not
fixing a real-world bug.

An inspection of all the places currently using SECTOR_SIZE in the
file shows none which care about the change in its type, except for
one call to error_setg() which needs the format string adjusting.

Resolves: Coverity CID 1508076
Suggested-by: Kevin Wolf <[email protected]>
Message-ID: <[email protected]>
Reviewed-by: Kevin Wolf <[email protected]>
Signed-off-by: Kevin Wolf <[email protected]>


  Commit: b4bc6ad1d79a0fe9c06ada7ff036578f3400258d
      
https://github.com/qemu/qemu/commit/b4bc6ad1d79a0fe9c06ada7ff036578f3400258d
  Author: Vladimir Sementsov-Ogievskiy <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M tests/qemu-iotests/tests/backup-discard-source

  Log Message:
  -----------
  iotests/backup-discard-source: convert size variable to be int

Make variable reusable in code for checks. Don't care to change "512 *
1024" invocations as they will be dropped in the next commit.

Signed-off-by: Vladimir Sementsov-Ogievskiy <[email protected]>
Message-ID: <[email protected]>
Reviewed-by: Kevin Wolf <[email protected]>
Signed-off-by: Kevin Wolf <[email protected]>


  Commit: 526c4a90c48eae2d0c37ae36ec83376b44a4cce4
      
https://github.com/qemu/qemu/commit/526c4a90c48eae2d0c37ae36ec83376b44a4cce4
  Author: Vladimir Sementsov-Ogievskiy <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M tests/qemu-iotests/tests/backup-discard-source

  Log Message:
  -----------
  iotests/backup-discard-source: don't use actual-size

Relying on disk usage is bad thing, and test just doesn't work on XFS.

Let's instead add a dirty bitmap to track writes to test image.

Signed-off-by: Vladimir Sementsov-Ogievskiy <[email protected]>
Message-ID: <[email protected]>
Reviewed-by: Kevin Wolf <[email protected]>
Tested-by: Kevin Wolf <[email protected]>
Signed-off-by: Kevin Wolf <[email protected]>


  Commit: 7452162adec25c1003d5bf0079aca52913a80e0c
      
https://github.com/qemu/qemu/commit/7452162adec25c1003d5bf0079aca52913a80e0c
  Author: Vladimir Sementsov-Ogievskiy <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M block/block-backend.c
    M qapi/block-core.json

  Log Message:
  -----------
  qapi: add qom-path to BLOCK_IO_ERROR event

We need something more reliable than "device" (which absent in modern
interfaces) and "node-name" (which may absent, and actually don't
specify the device, which is a source of error) to make a per-device
throttling for the event in the following commit.

Signed-off-by: Vladimir Sementsov-Ogievskiy <[email protected]>
Message-ID: <[email protected]>
Reviewed-by: Kevin Wolf <[email protected]>
Signed-off-by: Kevin Wolf <[email protected]>


  Commit: 2155d2dd7f733674586119b6b4ee0f52d2032779
      
https://github.com/qemu/qemu/commit/2155d2dd7f733674586119b6b4ee0f52d2032779
  Author: Leonid Kaplan <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M monitor/monitor.c
    M qapi/block-core.json

  Log Message:
  -----------
  block-backend: per-device throttling of BLOCK_IO_ERROR reports

BLOCK_IO_ERROR events comes from guest, so we must throttle them.
We still want per-device throttling, so let's use device id as a key.

Signed-off-by: Leonid Kaplan <[email protected]>
Signed-off-by: Vladimir Sementsov-Ogievskiy <[email protected]>
Message-ID: <[email protected]>
Reviewed-by: Kevin Wolf <[email protected]>
Signed-off-by: Kevin Wolf <[email protected]>


  Commit: 04bbc3ee52b32ac465547bb40c1f090a1b8f315a
      
https://github.com/qemu/qemu/commit/04bbc3ee52b32ac465547bb40c1f090a1b8f315a
  Author: Kevin Wolf <[email protected]>
  Date:   2024-10-22 (Tue, 22 Oct 2024)

  Changed paths:
    M block/raw-format.c

  Log Message:
  -----------
  raw-format: Fix error message for invalid offset/size

s->offset and s->size are only set at the end of the function and still
contain the old values when formatting the error message. Print the
parameters with the new values that we actually checked instead.

Fixes: 500e2434207d ('raw-format: Split raw_read_options()')
Signed-off-by: Kevin Wolf <[email protected]>
Message-ID: <[email protected]>
Reviewed-by: Daniel P. Berrangé <[email protected]>
Reviewed-by: Hanna Czenczek <[email protected]>
Signed-off-by: Kevin Wolf <[email protected]>


  Commit: e51d8fbb7e673e487e98327fc067700b5a3edf30
      
https://github.com/qemu/qemu/commit/e51d8fbb7e673e487e98327fc067700b5a3edf30
  Author: Peter Maydell <[email protected]>
  Date:   2024-10-24 (Thu, 24 Oct 2024)

  Changed paths:
    M .gitlab-ci.d/buildtest.yml
    M crypto/der.c
    M crypto/der.h
    M crypto/hash-afalg.c
    M crypto/hash-gcrypt.c
    M crypto/hash-glib.c
    M crypto/hash-gnutls.c
    M crypto/hash-nettle.c
    M include/crypto/hash.h
    M include/crypto/hmac.h
    M include/qemu/sockets.h
    M tests/unit/test-crypto-hash.c
    M tests/unit/test-crypto-hmac.c
    M ui/vnc-auth-sasl.c
    M ui/vnc.c
    M ui/vnc.h
    M util/qemu-sockets.c

  Log Message:
  -----------
  Merge tag 'misc-fixes-pull-request' of https://gitlab.com/berrange/qemu into 
staging

Misc sockets, crypto and VNC fixes

* Fix rare EADDRINUSE failures on OpenBSD platforms seen
  with migration
* Fix & test overwriting of hash output buffer
* Close connection instead of returning empty SASL mechlist to
  VNC clients
* Fix handling of SASL SSF on VNC server UNIX sockets
* Fix handling of NULL SASL server data in VNC server
* Validate trailing NUL padding byte from SASL client
* Fix & test AF_ALG crypto backend build
* Remove unused code in sockets and crypto subsystems

# -----BEGIN PGP SIGNATURE-----
#
# iQIzBAABCAAdFiEE2vOm/bJrYpEtDo4/vobrtBUQT98FAmcXscUACgkQvobrtBUQ
# T9+S+Q//W9fywFY42VnsPqIAi7Q+QPDvXrPVVQ1z817hcyxdMVWC+eAg97i3QsE8
# f/+nwrigV9CIv9jqdBdMUIRLm4XhyuDspksgBAQUJ1XYmmVSmFwh2ej31m/qI8fK
# fu0v6N6udkcg+5eoWEOL873hKAA+vjq30tM5Zp74fMHZahnvgjThgaJY6Z6OsCyX
# 6Pgxl3Z1gym1IqQFz0nOdTMnzsQrAJbV8z2FWMKgHayg01nVoXlo5FMnNgIdItJC
# v+4qX5sfRJIENJcRKMNY4dQUqbO1004+HXECLbge8pR7vsUli06xjLBkSbt/9M6r
# x3lfDGKavPrKfsPk1H+eTlge/43IjJk+mXMgZxmyvrvgnyVulxRvz7ABKJ+VBUeq
# CDrAuAK4tm5BIxKu6cg4CcmlqsDXwq6Sb+NdsbxTv0Deop73WZR3HCamRNU1JXkA
# eXBY4QSuVA96s5TnlfZWZytIY9NmyjN48ov+ly2fOkbv/xxoUNFBY8TApSJZ/Veo
# 4EvGlIfgxjv668n/2eyt67E00dGC3idTbaWYeGjgUKVyNPpxicDOnM3NTwMP3/0k
# DZbvfoJcwfhPVoFMdV7ZvJKA3i8v11HdaEI0urfjm5nJWbyik6+++skan9F/femL
# eRTnH2hr5sUV+eQAl2YhGuBElLmKf/HqTCeNs3lwrUQsnb9bPNc=
# =fK8K
# -----END PGP SIGNATURE-----
# gpg: Signature made Tue 22 Oct 2024 15:08:05 BST
# gpg:                using RSA key DAF3A6FDB26B62912D0E8E3FBE86EBB415104FDF
# gpg: Good signature from "Daniel P. Berrange <[email protected]>" [full]
# gpg:                 aka "Daniel P. Berrange <[email protected]>" [full]
# Primary key fingerprint: DAF3 A6FD B26B 6291 2D0E  8E3F BE86 EBB4 1510 4FDF

* tag 'misc-fixes-pull-request' of https://gitlab.com/berrange/qemu:
  gitlab: enable afalg tests in fedora system test
  ui: validate NUL byte padding in SASL client data more strictly
  ui: fix handling of NULL SASL server data
  ui/vnc: don't check for SSF after SASL authentication on UNIX sockets
  ui/vnc: fix skipping SASL SSF on UNIX sockets
  ui/vnc: don't raise error formatting socket address for non-inet
  ui/vnc: don't return an empty SASL mechlist to the client
  crypto/hash-afalg: Fix broken build
  include/crypto: clarify @result/@result_len for hash/hmac APIs
  tests: correctly validate result buffer in hash/hmac tests
  crypto/hash: avoid overwriting user supplied result pointer
  util: don't set SO_REUSEADDR on client sockets
  sockets: Remove deadcode
  crypto: Remove unused DER string functions

Signed-off-by: Peter Maydell <[email protected]>


  Commit: e67b7aef7c7f67ecd0282e903e0daff806d5d680
      
https://github.com/qemu/qemu/commit/e67b7aef7c7f67ecd0282e903e0daff806d5d680
  Author: Peter Maydell <[email protected]>
  Date:   2024-10-24 (Thu, 24 Oct 2024)

  Changed paths:
    M block/block-backend.c
    M block/gluster.c
    M block/raw-format.c
    M block/ssh.c
    M block/vdi.c
    M monitor/monitor.c
    M qapi/block-core.json
    M tests/qemu-iotests/211.out
    M tests/qemu-iotests/tests/backup-discard-source

  Log Message:
  -----------
  Merge tag 'for-upstream' of https://repo.or.cz/qemu/kevin into staging

Block layer patches

- Event throttling for BLOCK_IO_ERROR
- iotests: Fix backup-discard-source test for XFS
- Coverity fixes
- raw-format: Fix error message for invalid offset/size

# -----BEGIN PGP SIGNATURE-----
#
# iQJFBAABCAAvFiEE3D3rFZqa+V09dFb+fwmycsiPL9YFAmcX1wQRHGt3b2xmQHJl
# ZGhhdC5jb20ACgkQfwmycsiPL9aWKA//cyG+Q3EXLouSu2Ob04RArX8HgAzLmHL3
# Fx9x6BbDtusPfzxKVLqhJhJ5/oRyk0QWkdZKGNSxinLD3DBJ6q6FMNaWhuvzOBcy
# iHnWlMfwEIBl5vFJwM5Q/d7F2afOUiVSeR7E4TQn063cBo96qIrAD7DRLM01jBEN
# d9+9nkBruwgmxZJIr3WTsqjDoTqflcjxA6Adp/WkzVXBMMYqcsuReXQtrgfFooKw
# yhjkHq5nFKzebvK+BLjA0ytuvUlsRqLYDXN+bAk/rC6oCgbzygAjNwL5kUEYnV1r
# lVRSOxRUlet4v2GFCvplxw5tX3aJzlWB50v7d+oaBYR72htTtPeIZzadBJySdtSk
# DxEUR5kTcGK/vSI+WOapTVK+qU+Wr+6lFwGOL0zEYZyfvpyoFwfAlkjAUbf27FzX
# BDIL+hi9aVr+ZDooqcs0XUjGe1/1B+8SaNqMexqDUjxGDN4OfZhdQKD6uTjabc07
# aiZqKH1ZWViQlNgMcqpXecXS+r+Qc+R6Qga/iwJuhhPKp3VhUEtuDaHajPiTx17q
# 157CedcXxXKPRnNC/IneU0lOageknCLpRpIHZi3pYgcyfX1evE8CgF0aLZsN8tTv
# cdFJh7S89CknvK1sL18pcbV5/mtpDH/0DIWGg4d98O9X8Y/vluYEqSf6kPrjg6lR
# aVHU4/E8p8Y=
# =c+28
# -----END PGP SIGNATURE-----
# gpg: Signature made Tue 22 Oct 2024 17:47:00 BST
# gpg:                using RSA key DC3DEB159A9AF95D3D7456FE7F09B272C88F2FD6
# gpg:                issuer "[email protected]"
# gpg: Good signature from "Kevin Wolf <[email protected]>" [full]
# Primary key fingerprint: DC3D EB15 9A9A F95D 3D74  56FE 7F09 B272 C88F 2FD6

* tag 'for-upstream' of https://repo.or.cz/qemu/kevin:
  raw-format: Fix error message for invalid offset/size
  block-backend: per-device throttling of BLOCK_IO_ERROR reports
  qapi: add qom-path to BLOCK_IO_ERROR event
  iotests/backup-discard-source: don't use actual-size
  iotests/backup-discard-source: convert size variable to be int
  block/vdi.c: Make SECTOR_SIZE constant 64-bits
  tests/qemu-iotests/211.out: Update to expect MapEntry 'compressed' field
  block/ssh.c: Don't double-check that characters are hex digits
  block/gluster: Use g_autofree for string in qemu_gluster_parse_json()

Signed-off-by: Peter Maydell <[email protected]>


Compare: https://github.com/qemu/qemu/compare/55522f72149f...e67b7aef7c7f

To unsubscribe from these emails, change your notification settings at 
https://github.com/qemu/qemu/settings/notifications

Reply via email to