243 Commits

Author SHA1 Message Date
openeuler-ci-bot
da8ce906cb !272 Automatically generate code patches with openeuler !97
From: @kuhnchen18
Reviewed-by: @kevinzhu1
Signed-off-by: @kevinzhu1
2021-05-12 09:00:06 +08:00
Chen Qun
bbf3284f03 spec: Update release version with !97
increase release verison by one

Signed-off-by: Chen Qun <kuhn.chenqun@huawei.com>
2021-05-11 21:27:13 +08:00
Chen Qun
4facc655e6 spec: Update patch and changelog with !97 arm/cpu: Fixed function undefined error at compile time under arm !97
arm/cpu: Fixed function undefined error at compile time under arm

Signed-off-by: Chen Qun<kuhn.chenqun@huawei.com>
2021-05-11 21:27:11 +08:00
Chen Qun
1c362cdbe3 arm/cpu: Fixed function undefined error at compile time under arm
Add the compilation option CONFIG_KVM while using
    "kvm_arm_cpu_feature_supported" and "kvm_arm_get_one_reg".
    In arm, the default value of CONFIG_KVM is no.

    While the target is arm, the compilation fails because
    the function "kvm_arm_cpu_feature_supporte" is declared
    or the function "kvm_arm_get_one_reg" is not defined.

Signed-off-by: zhanghao1 <zhanghao1@kylinos.cn>
2021-05-11 21:27:11 +08:00
openeuler-ci-bot
3b91346f3e !271 添加qemu-block-iscsi安装要求
From: @yangming73
Reviewed-by: @imxcc
Signed-off-by: @imxcc
2021-05-11 19:47:55 +08:00
Ming Yang
7e89dcfc7a add qemu-block-iscsi installing requirement.
Signed-off-by: Ming Yang <yangming73@huawei.com>
2021-05-11 11:12:51 +00:00
openeuler-ci-bot
4fe2cff526 !265 migration feature: Add support for dirtyrate and multifd-tls
From: @Chuan-Zheng
Reviewed-by: @xydong
Signed-off-by: @xydong
2021-04-25 21:36:31 +08:00
Chuan Zheng
2344dad98b migration: add migration dirtyrate and multifd-tls feature
add migration dirtyrate and multifd-tls feature
2021-04-25 20:35:14 +08:00
openeuler-ci-bot
eeff6ad938 !264 build smt processor structure to support smt topology
From: @imxcc
Reviewed-by: @xydong
Signed-off-by: @xydong
2021-04-25 19:55:10 +08:00
imxcc
fcf4e22194 build smt processor structure to support topology
Signed-off-by: imxcc <xingchaochao@huawei.com>
2021-04-25 19:35:37 +08:00
openeuler-ci-bot
011850ba5f !263 Automatically generate code patches with openeuler !89
From: @kuhnchen18
Reviewed-by: @xydong
Signed-off-by: @xydong
2021-04-25 19:08:11 +08:00
Chen Qun
12f72a255d spec: Update release version with !89
increase release verison by one

Signed-off-by: Chen Qun <kuhn.chenqun@huawei.com>
2021-04-25 19:01:21 +08:00
Chen Qun
c6b6e4f79b spec: Update patch and changelog with !89 block: Add retry for werror=/rerror= mechanism !89
scsi-bus: Refactor the code that retries requests
scsi-disk: Add support for retry on errors
qapi/block-core: Add retry option for error action
block-backend: Introduce retry timer
block-backend: Add device specific retry callback
block-backend: Enable retry action on errors
block-backend: Add timeout support for retry
block: Add error retry param setting
virtio-blk: Refactor the code that processes queued requests
virtio-blk: On restart, process queued requests in the proper context
virtio_blk: Add support for retry on errors
block-backend: Stop retrying when draining
block: Add sanity check when setting retry parameters

Signed-off-by: Chen Qun<kuhn.chenqun@huawei.com>
2021-04-25 19:01:21 +08:00
Chen Qun
d658092c90 block: Add sanity check when setting retry parameters
Add sanity check when setting retry parameters to avoid invalid retry
configuration.

Signed-off-by: Jiahui Cen <cenjiahui@huawei.com>
2021-04-25 19:01:21 +08:00
Chen Qun
a66461bb40 block-backend: Stop retrying when draining
Retrying failed requests when draining would make the draining hung. So it
is better not to trigger the retry timer when draining. And after the
virtual devices go back to work, they would retry those queued requests.

Signed-off-by: Jiahui Cen <cenjiahui@huawei.com>
Signed-off-by: Ying Fang <fangying1@huawei.com>
2021-04-25 19:01:21 +08:00
Chen Qun
e3d4a29b0d virtio_blk: Add support for retry on errors
Insert failed requests into device's list for later retry and handle
queued requests to implement retry_request_cb.

Signed-off-by: Jiahui Cen <cenjiahui(a)huawei.com>
Signed-off-by: Ying Fang <fangying1(a)huawei.com>
2021-04-25 19:01:21 +08:00
Chen Qun
59155b37d3 virtio-blk: On restart, process queued requests in the proper context
On restart, we were scheduling a BH to process queued requests, which
would run before starting up the data plane, leading to those requests
being assigned and started on coroutines on the main context.

This could cause requests to be wrongly processed in parallel from
different threads (the main thread and the iothread managing the data
plane), potentially leading to multiple issues.

For example, stopping and resuming a VM multiple times while the guest
is generating I/O on a virtio_blk device can trigger a crash with a
stack tracing looking like this one:

<------>
 Thread 2 (Thread 0x7ff736765700 (LWP 1062503)):
 #0  0x00005567a13b99d6 in iov_memset
     (iov=0x6563617073206f4e, iov_cnt=1717922848, offset=516096, fillc=0, bytes=7018105756081554803)
     at util/iov.c:69
 #1  0x00005567a13bab73 in qemu_iovec_memset
     (qiov=0x7ff73ec99748, offset=516096, fillc=0, bytes=7018105756081554803) at util/iov.c:530
 #2  0x00005567a12f411c in qemu_laio_process_completion (laiocb=0x7ff6512ee6c0) at block/linux-aio.c:86
 #3  0x00005567a12f42ff in qemu_laio_process_completions (s=0x7ff7182e8420) at block/linux-aio.c:217
 #4  0x00005567a12f480d in ioq_submit (s=0x7ff7182e8420) at block/linux-aio.c:323
 #5  0x00005567a12f43d9 in qemu_laio_process_completions_and_submit (s=0x7ff7182e8420)
     at block/linux-aio.c:236
 #6  0x00005567a12f44c2 in qemu_laio_poll_cb (opaque=0x7ff7182e8430) at block/linux-aio.c:267
 #7  0x00005567a13aed83 in run_poll_handlers_once (ctx=0x5567a2b58c70, timeout=0x7ff7367645f8)
     at util/aio-posix.c:520
 #8  0x00005567a13aee9f in run_poll_handlers (ctx=0x5567a2b58c70, max_ns=16000, timeout=0x7ff7367645f8)
     at util/aio-posix.c:562
 #9  0x00005567a13aefde in try_poll_mode (ctx=0x5567a2b58c70, timeout=0x7ff7367645f8)
     at util/aio-posix.c:597
 #10 0x00005567a13af115 in aio_poll (ctx=0x5567a2b58c70, blocking=true) at util/aio-posix.c:639
 #11 0x00005567a109acca in iothread_run (opaque=0x5567a2b29760) at iothread.c:75
 #12 0x00005567a13b2790 in qemu_thread_start (args=0x5567a2b694c0) at util/qemu-thread-posix.c:519
 #13 0x00007ff73eedf2de in start_thread () at /lib64/libpthread.so.0
 #14 0x00007ff73ec10e83 in clone () at /lib64/libc.so.6

 Thread 1 (Thread 0x7ff743986f00 (LWP 1062500)):
 #0  0x00005567a13b99d6 in iov_memset
     (iov=0x6563617073206f4e, iov_cnt=1717922848, offset=516096, fillc=0, bytes=7018105756081554803)
     at util/iov.c:69
 #1  0x00005567a13bab73 in qemu_iovec_memset
     (qiov=0x7ff73ec99748, offset=516096, fillc=0, bytes=7018105756081554803) at util/iov.c:530
 #2  0x00005567a12f411c in qemu_laio_process_completion (laiocb=0x7ff6512ee6c0) at block/linux-aio.c:86
 #3  0x00005567a12f42ff in qemu_laio_process_completions (s=0x7ff7182e8420) at block/linux-aio.c:217
 #4  0x00005567a12f480d in ioq_submit (s=0x7ff7182e8420) at block/linux-aio.c:323
 #5  0x00005567a12f4a2f in laio_do_submit (fd=19, laiocb=0x7ff5f4ff9ae0, offset=472363008, type=2)
     at block/linux-aio.c:375
 #6  0x00005567a12f4af2 in laio_co_submit
     (bs=0x5567a2b8c460, s=0x7ff7182e8420, fd=19, offset=472363008, qiov=0x7ff5f4ff9ca0, type=2)
     at block/linux-aio.c:394
 #7  0x00005567a12f1803 in raw_co_prw
     (bs=0x5567a2b8c460, offset=472363008, bytes=20480, qiov=0x7ff5f4ff9ca0, type=2)
     at block/file-posix.c:1892
 #8  0x00005567a12f1941 in raw_co_pwritev
     (bs=0x5567a2b8c460, offset=472363008, bytes=20480, qiov=0x7ff5f4ff9ca0, flags=0)
     at block/file-posix.c:1925
 #9  0x00005567a12fe3e1 in bdrv_driver_pwritev
     (bs=0x5567a2b8c460, offset=472363008, bytes=20480, qiov=0x7ff5f4ff9ca0, qiov_offset=0, flags=0)
     at block/io.c:1183
 #10 0x00005567a1300340 in bdrv_aligned_pwritev
     (child=0x5567a2b5b070, req=0x7ff5f4ff9db0, offset=472363008, bytes=20480, align=512, qiov=0x7ff72c0425b8, qiov_offset=0, flags=0) at block/io.c:1980
 #11 0x00005567a1300b29 in bdrv_co_pwritev_part
     (child=0x5567a2b5b070, offset=472363008, bytes=20480, qiov=0x7ff72c0425b8, qiov_offset=0, flags=0)
     at block/io.c:2137
 #12 0x00005567a12baba1 in qcow2_co_pwritev_task
     (bs=0x5567a2b92740, file_cluster_offset=472317952, offset=487305216, bytes=20480, qiov=0x7ff72c0425b8, qiov_offset=0, l2meta=0x0) at block/qcow2.c:2444
 #13 0x00005567a12bacdb in qcow2_co_pwritev_task_entry (task=0x5567a2b48540) at block/qcow2.c:2475
 #14 0x00005567a13167d8 in aio_task_co (opaque=0x5567a2b48540) at block/aio_task.c:45
 #15 0x00005567a13cf00c in coroutine_trampoline (i0=738245600, i1=32759) at util/coroutine-ucontext.c:115
 #16 0x00007ff73eb622e0 in __start_context () at /lib64/libc.so.6
 #17 0x00007ff6626f1350 in  ()
 #18 0x0000000000000000 in  ()
<------>

This is also known to cause crashes with this message (assertion
failed):

 aio_co_schedule: Co-routine was already scheduled in 'aio_co_schedule'

RHBZ: https://bugzilla.redhat.com/show_bug.cgi?id=1812765
Signed-off-by: Sergio Lopez <slp(a)redhat.com>
Message-Id: <20200603093240.40489-3-slp(a)redhat.com>
Signed-off-by: Kevin Wolf <kwolf(a)redhat.com>
2021-04-25 19:01:21 +08:00
Chen Qun
8923f326a3 virtio-blk: Refactor the code that processes queued requests
Move the code that processes queued requests from
virtio_blk_dma_restart_bh() to its own, non-static, function. This
will allow us to call it from the virtio_blk_data_plane_start() in a
future patch.

Signed-off-by: Sergio Lopez <slp(a)redhat.com>
Message-Id: <20200603093240.40489-2-slp(a)redhat.com>
Signed-off-by: Kevin Wolf <kwolf(a)redhat.com>
2021-04-25 19:01:21 +08:00
Chen Qun
bc5b44a2f1 block: Add error retry param setting
Add "retry_interval" and "retry_timeout" parameter for drive and device
option. These parameter are valid only when werror/rerror=retry.

eg. --drive file=image,rerror=retry,retry_interval=1000,retry_timeout=5000

Signed-off-by: Jiahui Cen <cenjiahui(a)huawei.com>
Signed-off-by: Ying Fang <fangying1(a)huawei.com>
2021-04-25 19:01:21 +08:00
Chen Qun
236eb1a165 block-backend: Add timeout support for retry
Retry should only be triggered when timeout is not reached, so let's check
timeout before retry. Device should also reset retry_start_time after
successful retry.

Signed-off-by: Jiahui Cen <cenjiahui(a)huawei.com>
Signed-off-by: Ying Fang <fangying1(a)huawei.com>
2021-04-25 19:01:21 +08:00
Chen Qun
f4ba0414fc block-backend: Enable retry action on errors
Enable retry action when backend's retry timer is available. It would
trigger the timer to do device specific retry action.

Signed-off-by: Jiahui Cen <cenjiahui(a)huawei.com>
Signed-off-by: Ying Fang <fangying1(a)huawei.com>
2021-04-25 19:01:21 +08:00
Chen Qun
3336d8481a block-backend: Add device specific retry callback
Add retry_request_cb in BlockDevOps to do device specific retry action.
Backend's timer would be registered only when the backend is set 'retry'
on errors and the device supports retry action.

Signed-off-by: Jiahui Cen <cenjiahui(a)huawei.com>
Signed-off-by: Ying Fang <fangying1(a)huawei.com>
2021-04-25 19:01:21 +08:00
Chen Qun
2248e4c884 block-backend: Introduce retry timer
Add a timer to regularly trigger retry on errors.

Signed-off-by: Jiahui Cen <cenjiahui(a)huawei.com>
Signed-off-by: Ying Fang <fangying1(a)huawei.com>
2021-04-25 19:01:21 +08:00
Chen Qun
5184fd2f02 qapi/block-core: Add retry option for error action
Add a new error action 'retry' to support retry on errors.

Signed-off-by: Jiahui Cen <cenjiahui(a)huawei.com>
Signed-off-by: Ying Fang <fangying1(a)huawei.com>
2021-04-25 19:01:21 +08:00
Chen Qun
f165da2d05 scsi-disk: Add support for retry on errors
Mark failed requests as to be retried and implement retry_request_cb to
handle these requests.

Signed-off-by: Jiahui Cen <cenjiahui(a)huawei.com>
Signed-off-by: Ying Fang <fangying1(a)huawei.com>
2021-04-25 19:01:21 +08:00
Chen Qun
07ed5a03ec scsi-bus: Refactor the code that retries requests
Move the code that retries requests from scsi_dma_restart_bh() to its own,
non-static, function. This will allow us to call it from the
retry_request_cb() of scsi-disk in a future patch.

Signed-off-by: Jiahui Cen <cenjiahui(a)huawei.com>
Signed-off-by: Ying Fang <fangying1(a)huawei.com>
2021-04-25 19:01:21 +08:00
openeuler-ci-bot
bde7331b41 !246 更新包依赖
From: @yangming73
Reviewed-by: @zhanghailiang_lucky
Signed-off-by: @zhanghailiang_lucky
2021-04-25 15:14:24 +08:00
Ming Yang
b39041a629 Merge branch 'openEuler-20.03-LTS-Next' of gitee.com:src-openeuler/qemu into yangming-rbd-20.03-next-v1 2021-04-25 10:33:29 +08:00
openeuler-ci-bot
d439c66cb4 !251 Revert migration feature
From: @Chuan-Zheng
Reviewed-by: @zhanghailiang_lucky
Signed-off-by: @zhanghailiang_lucky
2021-04-19 10:36:02 +08:00
Chuan Zheng
0d8a7eb3ab Revert "migration/dirtyrate: add migration dirtyrate feature"
This reverts commit 31dcda4fc76a2079da58ace9f2c502c065eda1fd.
2021-04-19 09:58:03 +08:00
Chuan Zheng
70ead7ca97 Revert "multifd/tls: add support for multifd tls feature"
This reverts commit 7c511d7e1ffa9376fd98d1d4916287eb787e21b9.
2021-04-19 09:57:40 +08:00
openeuler-ci-bot
22d11ce60d !250 Add Multifd support for TLS migration
From: @Chuan-Zheng
Reviewed-by: @zhanghailiang_lucky
Signed-off-by: @zhanghailiang_lucky
2021-04-17 17:07:32 +08:00
Ming Yang
01ed8a90f1 Merge branch 'openEuler-20.03-LTS-Next' of gitee.com:src-openeuler/qemu into yangming-rbd-20.03-next-v1 2021-04-17 16:57:00 +08:00
ChuanZheng
7c511d7e1f multifd/tls: add support for multifd tls feature
tls migration can easily reach bottleneck of cpu which results in
migration failure.
add support for multifd tls feature to make fully use of bandwidth.
2021-04-17 16:43:05 +08:00
openeuler-ci-bot
5772a1a3d4 !249 A Method for evaluating dirty page rate
From: @Chuan-Zheng
Reviewed-by: @zhanghailiang_lucky
Signed-off-by: @zhanghailiang_lucky
2021-04-17 16:00:22 +08:00
Chuan Zheng
31dcda4fc7 migration/dirtyrate: add migration dirtyrate feature
dirtyrate feature provides a method for calcluting dirty
page rate before migration.

Test dirtyrate by qmp command like this:
1. virsh qemu-monitor-command [vmname] '{"execute":"calc-dirty-rate", "arguments": {"calc-time": [sleep-time]}}'
2. sleep specific time which is a bit larger than sleep-time
3. virsh qemu-monitor-command [vmname] '{"execute":"query-dirty-rate"}'
2021-04-17 15:41:25 +08:00
Ming Yang
008c87949f Add block-rbd block-ssh and block-iscsi packages.
Signed-off-by: Ming Yang <yangming73@huawei.com>
2021-04-16 09:12:25 +00:00
openeuler-ci-bot
1888b25440 !237 Automatically generate code patches with openeuler !85
From: @kuhnchen18
Reviewed-by: @yorifang
Signed-off-by: @yorifang
2021-03-18 22:08:06 +08:00
Chen Qun
975b491b36 spec: Update release version with !85
increase release verison by one

Signed-off-by: Chen Qun <kuhn.chenqun@huawei.com>
2021-03-18 22:02:22 +08:00
Chen Qun
91aea89496 spec: Update patch and changelog with !85 fix CVE-2021-20203 #I3A34O !85
net: vmxnet3: validate configuration values during activate (CVE-2021-20203)

Signed-off-by: Chen Qun<kuhn.chenqun@huawei.com>
2021-03-18 22:02:10 +08:00
Chen Qun
ad2227f9a2 net: vmxnet3: validate configuration values during activate (CVE-2021-20203)
fix CVE-2021-20203 #I3A34O

While activating device in vmxnet3_acticate_device(), it does not
validate guest supplied configuration values against predefined
minimum - maximum limits. This may lead to integer overflow or
OOB access issues. Add checks to avoid it.

Fixes: CVE-2021-20203
Buglink: https://bugs.launchpad.net/qemu/+bug/1913873
Reported-by: Gaoning Pan <pgn@zju.edu.cn>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>

Signed-off-by: Jiajie Li <lijiajie11@huawei.com>
2021-03-18 22:02:10 +08:00
openeuler-ci-bot
1375b06271 !207 Automatically generate code patches with openeuler !75
From: @zhendongchen
Reviewed-by: @yorifang,@yorifang,@yorifang
Signed-off-by: @yorifang,@yorifang,@yorifang
2021-02-27 14:53:47 +08:00
Euler Robot
b6ea3e737f spec: Update release version with !75
increase release verison by one

Signed-off-by: Euler Robot <euler.robot@huawei.com>
2021-02-26 16:28:26 +08:00
Euler Robot
918f84359b spec: Update patch and changelog with !75
ide:atapi: check io_buffer_index in ide_atapi_cmd_reply_end

Signed-off-by: Alex Chen <alex.chen@huawei.com>
2021-02-26 16:27:54 +08:00
Huawei Technologies Co., Ltd
d2b7c174c0 ide:atapi: check io_buffer_index in ide_atapi_cmd_reply_end
Fix CVE-2020-29443

During data transfer via packet command in 'ide_atapi_cmd_reply_end'
's->io_buffer_index' could exceed the 's->io_buffer' length, leading
to OOB access issue. Add check to avoid it.
 ...
 #9  ahci_pio_transfer ../hw/ide/ahci.c:1383
 #10 ide_transfer_start_norecurse ../hw/ide/core.c:553
 #11 ide_atapi_cmd_reply_end ../hw/ide/atapi.c:284
 #12 ide_atapi_cmd_read_pio ../hw/ide/atapi.c:329
 #13 ide_atapi_cmd_read ../hw/ide/atapi.c:442
 #14 cmd_read ../hw/ide/atapi.c:988
 #15 ide_atapi_cmd ../hw/ide/atapi.c:1352
 #16 ide_transfer_start ../hw/ide/core.c:561
 #17 cmd_packet ../hw/ide/core.c:1729
 #18 ide_exec_cmd ../hw/ide/core.c:2107
 #19 handle_reg_h2d_fis ../hw/ide/ahci.c:1267
 #20 handle_cmd ../hw/ide/ahci.c:1318
 #21 check_cmd ../hw/ide/ahci.c:592
 #22 ahci_port_write ../hw/ide/ahci.c:373
 #23 ahci_mem_write ../hw/ide/ahci.c:513

Reported-by: Wenxiang Qian <leonwxqian@gmail.com>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>

Signed-off-by: Jiajie Li <lijiajie11@huawei.com>
2021-02-26 16:27:54 +08:00
openeuler-ci-bot
4d5aeb28d7 !202 Automatically generate code patches with openeuler !72
From: @zhendongchen
Reviewed-by: @yorifang,@yorifang
Signed-off-by: @yorifang,@yorifang
2021-02-24 15:22:16 +08:00
Euler Robot
c31379c458 spec: Update release version with !72
increase release verison by one

Signed-off-by: Euler Robot <euler.robot@huawei.com>
2021-02-19 21:28:38 +08:00
Euler Robot
e540b82f51 spec: Update patch and changelog with !72
ati: use vga_read_byte in ati_cursor_define
sd: sdhci: assert data_count is within fifo_buffer
msix: add valid.accepts methods to check address

Signed-off-by: Alex Chen <alex.chen@huawei.com>
2021-02-19 21:27:55 +08:00
Huawei Technologies Co., Ltd
466af714ca msix: add valid.accepts methods to check address
Fix CVE-2020-13754

While doing msi-x mmio operations, a guest may send an address
that leads to an OOB access issue. Add valid.accepts methods to
ensure that ensuing mmio r/w operation don't go beyond regions.

Reported-by: Ren Ding <rding@gatech.edu>
Reported-by: Hanqing Zhao <hanqing@gatech.edu>
Reported-by: Anatoly Trosinenko <anatoly.trosinenko@gmail.com>
Reported-by: Alexander Bulekov <alxndr@bu.edu>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>

patch link: https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00004.html
Signed-off-by: Jiajie Li <lijiajie11@huawei.com>
2021-02-19 21:27:55 +08:00
Huawei Technologies Co., Ltd
c655a2b9f6 sd: sdhci: assert data_count is within fifo_buffer
Fix CVE-2020-17380

While doing multi block SDMA, transfer block size may exceed
the 's->fifo_buffer[s->buf_maxsz]' size. It may leave the
current element pointer 's->data_count' pointing out of bounds.
Leading the subsequent DMA r/w operation to OOB access issue.
Assert that 's->data_count' is within fifo_buffer.

 -> https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Fsdhci_oob_write1
 ==1459837==ERROR: AddressSanitizer: heap-buffer-overflow
 WRITE of size 54722048 at 0x61500001e280 thread T3
 #0  __interceptor_memcpy (/lib64/libasan.so.6+0x3a71d)
 #1  flatview_read_continue ../exec.c:3245
 #2  flatview_read ../exec.c:3278
 #3  address_space_read_full ../exec.c:3291
 #4  address_space_rw ../exec.c:3319
 #5  dma_memory_rw_relaxed ../include/sysemu/dma.h:87
 #6  dma_memory_rw ../include/sysemu/dma.h:110
 #7  dma_memory_read ../include/sysemu/dma.h:116
 #8  sdhci_sdma_transfer_multi_blocks ../hw/sd/sdhci.c:629
 #9  sdhci_write ../hw/sd/sdhci.c:1097
 #10 memory_region_write_accessor ../softmmu/memory.c:483
 ...

Reported-by: Ruhr-University <bugs-syssec@rub.de>
Suggested-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>

patch link: https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg01175.html
Signed-off-by: Jiajie Li <lijiajie11@hw.com>
2021-02-19 21:27:55 +08:00