• This patch introduces a generic internal API for access control lists
    to be used by network servers in QEMU. It adds support for checking
    these ACL in the VNC server, in two places. The first ACL is for the
    SASL authentication mechanism, checking the SASL username. This ACL
    is called 'vnc.username'. The second is for the TLS authentication
    mechanism, when x509 client certificates are turned on, checking against
    the Distinguished Name of the client. This ACL is called 'vnc.x509dname'
    
    The internal API provides for an ACL with the following characteristics
    
     - A unique name, eg  vnc.username, and vnc.x509dname.
     - A default policy, allow or deny
     - An ordered series of match rules, with allow or deny policy
    
    If none of the match rules apply, then the default policy is
    used.
    
    There is a monitor API to manipulate the ACLs, which I'll describe via
    examples
    
      (qemu) acl show vnc.username
      policy: allow
      (qemu) acl policy vnc.username denya
      acl: policy set to 'deny'
      (qemu) acl allow vnc.username fred
      acl: added rule at position 1
      (qemu) acl allow vnc.username bob
      acl: added rule at position 2
      (qemu) acl allow vnc.username joe 1
      acl: added rule at position 1
      (qemu) acl show vnc.username
      policy: deny
      0: allow fred
      1: allow joe
      2: allow bob
    
    
      (qemu) acl show vnc.x509dname
      policy: allow
      (qemu) acl policy vnc.x509dname deny
      acl: policy set to 'deny'
      (qemu) acl allow vnc.x509dname C=GB,O=ACME,L=London,CN=*
      acl: added rule at position 1
      (qemu) acl allow vnc.x509dname C=GB,O=ACME,L=Boston,CN=bob
      acl: added rule at position 2
      (qemu) acl show vnc.x509dname
      policy: deny
      0: allow C=GB,O=ACME,L=London,CN=*
      1: allow C=GB,O=ACME,L=Boston,CN=bob
    
    By default the VNC server will not use any ACLs, allowing access to
    the server if the user successfully authenticates. To enable use of
    ACLs to restrict user access, the ',acl' flag should be given when
    starting QEMU. The initial ACL activated will be a 'deny all' policy
    and should be customized using monitor commands.
    
    eg enable SASL auth and ACLs
    
        qemu ....  -vnc localhost:1,sasl,acl
    
    The next patch will provide a way to load a pre-defined ACL when
    starting up
    
    
     Makefile        |    6 +
     b/acl.c         |  185 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++
     b/acl.h         |   74 ++++++++++++++++++++++
     configure       |   18 +++++
     monitor.c       |   95 ++++++++++++++++++++++++++++
     qemu-doc.texi   |   49 ++++++++++++++
     vnc-auth-sasl.c |   16 +++-
     vnc-auth-sasl.h |    7 ++
     vnc-tls.c       |   19 +++++
     vnc-tls.h       |    3 
     vnc.c           |   21 ++++++
     vnc.h           |    3 
     12 files changed, 491 insertions(+), 5 deletions(-)
    
       Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6726 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • This patch extends the 'info vnc' monitor output to include information
    about the VNC client authentication credentials.
    
    For clients authenticated using SASL, this will output the username.
    
    For clients authenticated using x509 certificates, this will output
    the x509 distinguished name.
    
    Auth can be stacked, so both username & x509 dname may be shown.
    
        Server:
             address: 0.0.0.0:5902
                auth: vencrypt+x509+sasl
        Client:
             address: 10.33.6.67:38621
          x509 dname: C=GB,O=ACME,L=London,ST=London,CN=localhost
            username: admin
        Client:
             address: 10.33.6.63:38620
          x509 dname: C=GB,O=ACME,L=London,ST=London,CN=localhost
            username: admin
    
    
    
     vnc-tls.c |   17 +++++++++++++++++
     vnc-tls.h |    3 +++
     vnc.c     |   19 +++++++++++++++++--
     3 files changed, 37 insertions(+), 2 deletions(-)
    
       Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6725 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • This patch adds the new SASL authentication protocol to the VNC server.
    
    It is enabled by setting the 'sasl' flag when launching VNC. SASL can
    optionally provide encryption via its SSF layer, if a suitable mechanism
    is configured (eg, GSSAPI/Kerberos, or Digest-MD5).  If an SSF layer is
    not available, then it should be combined with the x509 VNC authentication
    protocol which provides encryption.
    
    eg, if using GSSAPI
    
       qemu -vnc localhost:1,sasl
    
    eg if using  TLS/x509 for encryption
    
       qemu -vnc localhost:1,sasl,tls,x509
    
    
    By default the Cyrus SASL library will look for its configuration in
    the file /etc/sasl2/qemu.conf.  For non-root users, this can be overridden
    by setting the SASL_CONF_PATH environment variable, eg to make it look in
    $HOME/.sasl2.  NB unprivileged users may not have access to the full range
    of SASL mechanisms, since some of them require some administrative privileges
    to configure. The patch includes an example SASL configuration file which
    illustrates config for GSSAPI and Digest-MD5, though it should be noted that
    the latter is not really considered secure any more.
    
    Most of the SASL authentication code is located in a separate source file,
    vnc-auth-sasl.c.  The main vnc.c file only contains minimal integration
    glue, specifically parsing of command line flags / setup, and calls to
    start the SASL auth process, to do encoding/decoding for data.
    
    There are several possible stacks for reading & writing of data, depending
    on the combo of VNC authentication methods in use
    
     - Clear.    read/write straight to socket
     - TLS.      read/write via GNUTLS helpers
     - SASL.     encode/decode via SASL SSF layer, then read/write to socket
     - SASL+TLS. encode/decode via SASL SSF layer, then read/write via GNUTLS
    
    Hence, the vnc_client_read & vnc_client_write methods have been refactored
    a little.
    
       vnc_client_read:  main entry point for reading, calls either
    
           - vnc_client_read_plain   reading, with no intermediate decoding
           - vnc_client_read_sasl    reading, with SASL SSF decoding
    
       These two methods, then call vnc_client_read_buf(). This decides
       whether to write to the socket directly or write via GNUTLS.
    
    The situation is the same for writing data. More extensive comments
    have been added in the code / patch. The vnc_client_read_sasl and
    vnc_client_write_sasl method implementations live in the separate
    vnc-auth-sasl.c file.
    
    The state required for the SASL auth mechanism is kept in a separate
    VncStateSASL struct, defined in vnc-auth-sasl.h and included in the
    main VncState.
    
    The configure script probes for SASL and automatically enables it
    if found, unless --disable-vnc-sasl was given to override it.
    
    
     Makefile            |    7 
     Makefile.target     |    5 
     b/qemu.sasl         |   34 ++
     b/vnc-auth-sasl.c   |  626 ++++++++++++++++++++++++++++++++++++++++++++++++++++
     b/vnc-auth-sasl.h   |   67 +++++
     configure           |   34 ++
     qemu-doc.texi       |   97 ++++++++
     vnc-auth-vencrypt.c |   12 
     vnc.c               |  249 ++++++++++++++++++--
     vnc.h               |   31 ++
     10 files changed, 1129 insertions(+), 33 deletions(-)
    
       Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6724 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • This patch refactors the existing TLS code to make the main VNC code
    more managable. The code moves to two new files
    
     - vnc-tls.c: generic helpers for TLS handshake & credential setup
     - vnc-auth-vencrypt.c: the actual VNC TLS authentication mechanism.
    
    The reason for this split is that there are other TLS based auth
    mechanisms which we may like to use in the future. These can all
    share the same vnc-tls.c routines. In addition this will facilitate
    anyone who may want to port the vnc-tls.c file to allow for choice
    of GNUTLS & NSS for impl.
    
    The TLS state is moved out of the VncState struct, and into a separate
    VncStateTLS struct, defined in vnc-tls.h. This is then referenced from
    the main VncState. End size of the struct is the same, but it keeps
    things a little more managable.
    
    The vnc.h file gains a bunch more function prototypes, for functions
    in vnc.c that were previously static, but now need to be accessed
    from the separate auth code files.
    
    The only TLS related code still in the main vl.c is the command line
    argument handling / setup, and the low level I/O routines calling
    gnutls_send/recv.
    
    
     Makefile              |   11 
     b/vnc-auth-vencrypt.c |  167 ++++++++++++++
     b/vnc-auth-vencrypt.h |   33 ++
     b/vnc-tls.c           |  414 +++++++++++++++++++++++++++++++++++
     b/vnc-tls.h           |   70 ++++++
     vnc.c                 |  581 +++-----------------------------------------------
     vnc.h                 |   76 ++++--
     7 files changed, 780 insertions(+), 572 deletions(-)
    
       Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6723 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • This patch moves the definitions of VncState and VncDisplay structs
    out into a vnc.h header file. This is to allow the code for TLS
    and SASL auth mechanisms to be moved out of the main vnc.c file.
    
    
     vnc.c |  109 ------------------------------------------------
     vnc.h |  149 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++--
     2 files changed, 148 insertions(+), 110 deletions(-)
    
       Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6722 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • Each of the graphical frontends #include a .c file, for keymap code
    resulting in duplicated definitions & duplicated compiled code. A
    couple of small changes allowed this to be sanitized, so instead of
    doing a #include "keymaps.c", duplicating all code, we can have a
    shared keymaps.h file, and only compile code once. This allows the
    next patch to move the VncState struct out into a header file without
    causing clashing definitions.
    
    
     Makefile      |    9 +++++---
     b/keymaps.h   |   60 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
     curses.c      |    3 --
     curses_keys.h |    9 +++-----
     keymaps.c     |   45 ++++++++++++++++---------------------------
     sdl.c         |    3 --
     sdl_keysym.h  |    7 ++----
     vnc.c         |    5 +---
     vnc_keysym.h  |    7 ++----
     9 files changed, 97 insertions(+), 51 deletions(-)
    
       Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6721 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • The current 'info vnc' monitor output just displays the VNC server address
    as provided by the -vnc command line flag. This isn't particularly useful
    since it doesn't tell you what VNC is actually listening on. eg, if you
    use '-vnc :1' it is useful to know whether this translated to '0.0.0.0:5901'
    or chose IPv6 ':::5901'.  It is also useful to know the address of the
    client that is currently connected. It is also useful to know the active
    authentication (if any).
    
    This patch tweaks the monitor output to look like:
    
       (qemu) info vnc
        Server:
             address: 0.0.0.0:5902
                auth: vencrypt+x509
        Client: none
    
    And when 2 clients are connected
    
       (qemu) info vnc
        Server:
             address: 0.0.0.0:5902
                auth: vencrypt+x509
        Client:
             address: 10.33.6.67:38621
        Client:
             address: 10.33.6.63:38620
    
    More data will be added to this later in the patch series...
    
    The 'addr_to_string' helper method in this patch is overly generic
    for the needs of this patch alone. This is because it will be re-used
    by the later SASL patches in this series, where the flexibility is
    important.
    
    
     vnc.c |  137 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-----
     1 file changed, 127 insertions(+), 10 deletions(-)
    
       Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6720 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • This patch was previously posted here:
    
      http://lists.gnu.org/archive/html/qemu-devel/2009-02/msg00820.html
    
    In the case where the TLS handshake does *not* block on I/O, QEMU
    sends the next 'start sub-auth' message twice. This seriously confuses
    the VNC client :-) Fortunately the chances of the handshake not blocking
    are close to zero for a TCP socket, which is why it has not been noticed
    thus far. Even with both client & server on localhost, I can only hit the
    bug 1 time in 20.
    
    NB, the diff context here is not too informative. If you look at the
    full code you'll see that a few lines early we called vnc_start_tls()
    which called vnc_continue_handshake() which called the method
    start_auth_vencrypt_subauth(). Hence, fixing the bug, just involves
    removing the 2nd bogus call to start_auth_vencrypt_subauth() as per
    this patch.
    
    
     vnc.c |    8 --------
     1 file changed, 8 deletions(-)
    
       Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6719 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »

  • Create a monitor terminal and pass it through the gdbstub. This allows
    to use gdb's monitor command to access the QEMU monitor. Works for all
    commands except for non-detached migration and password retrieval (user
    will receive error messages instead).
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6718 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • This allows to create monitor terminals that do not make use of the
    interactive readline back-end but rather send complete commands. The
    pass-through monitor interface of the gdbstub will be an example.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6717 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • Up to now, you never really knew if you already switched the console
    after pressing CTRL-A C or if you mistyped it again. This patch
    clarifies the situation by providing a prompt in a new line and
    injecting a linebreak when switching away again. For this purpose, the
    two events CHR_EVENT_MUX_IN and CHR_EVENT_MUX_OUT are introduced and
    distributed on focus switches.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6716 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • Currently all registered (and activate) monitor terminals work in
    broadcast mode: Everyone sees what someone else types on some other
    terminal and what the monitor reports back. This model is broken when
    you have a management monitor terminal that is automatically operated
    and some other terminal used for independent guest inspection. Such
    additional terminals can be multiplexed device channels or a gdb
    frontend connected to QEMU's stub.
    
    Therefore, this patch decouples the buffers and states of all monitor
    terminals, allowing the user to operate them independently. It finally
    starts to use the 'mon' parameter that was introduced earlier with the
    API rework. It also defines the default monitor: the first instantance
    that has the MONITOR_IS_DEFAULT flag set, and that is the monitor
    created via the "-monitor" command line switch (or "vc" if none is
    given).
    
    As the patch requires to rework the monitor suspension interface, it
    also takes the freedom to make it "truely" suspending (so far suspending
    meant suppressing the prompt, but inputs were still processed).
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6715 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • As another step towards decoupled monitor terminals encapsulate the
    state of the readline processor in a separate data structure called
    ReadLineState and adapt all interfaces appropriately. For now the
    monitor continues to instantiate just a single readline state.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6714 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • There is no use for the hide/show banner option, and it is applied
    inconsistently anyway (or what makes the difference between
     -serial mon:stdio and -nographic for the monitor?). So drop this mode.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6713 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • Remove the static MAX_MON limit by managing monitor terminals in a
    linked list.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6712 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • Refactor the monitor API and prepare it for decoupled terminals:
    term_print functions are renamed to monitor_* and all monitor services
    gain a new parameter (mon) that will once refer to the monitor instance
    the output is supposed to appear on. However, the argument remains
    unused for now. All monitor command callbacks are also extended by a mon
    parameter so that command handlers are able to pass an appropriate
    reference to monitor output services.
    
    For the case that monitor outputs so far happen without clearly
    identifiable context, the global variable cur_mon is introduced that
    shall once provide a pointer either to the current active monitor (while
    processing commands) or to the default one. On the mid or long term,
    those use case will be obsoleted so that this variable can be removed
    again.
    
    Due to the broad usage of the monitor interface, this patch mostly deals
    with converting users of the monitor API. A few of them are already
    extended to pass 'mon' from the command handler further down to internal
    functions that invoke monitor_printf.
    
    At this chance, monitor-related prototypes are moved from console.h to
    a new monitor.h. The same is done for the readline API.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6711 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • Currently, waiting for the user to type in some password blocks the
    whole VM because monitor_readline starts its own I/O loop. And this loop
    also screws up reading passwords from virtual console.
    
    Patch below fixes the shortcomings by using normal I/O processing also
    for waiting on a password. To keep to modal property for the monitor
    terminal, the command handler is temporarily replaced by a password
    handler and a callback infrastructure is established to process the
    result before switching back to command mode.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6710 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • Break readline_show_prompt out of readline_start so that (re-)printing
    the prompt can be controlled in a more fine-grained way.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6709 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • Drop the hack to query passwords on all monitor terminals now that they
    are requested when the user initially enters 'continue'.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6708 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • Reading the passwords for encrypted hard disks during early startup is
    broken (I guess for quiet a while now):
     - No monitor terminal is ready for input at this point
     - Forcing all mux'ed terminals into monitor mode can confuse other
       users of that channels
    
    To overcome these issues and to lay the ground for a clean decoupling of
    monitor terminals, this patch changes the initial password inquiry as
    follows:
     - Prevent autostart if there is some encrypted disk
     - Once the user tries to resume the VM, prompt for all missing
       passwords
     - Only resume if all passwords were accepted
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6707 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • If the backing file is encrypted, 'info block' currently does not report
    the disk as encrypted. Fix this by using the standard API to check disk
    encryption mode. Moreover, switch to a canonical output format.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6706 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • If a target uses a tiny display (like the MusicPal), the default monitor
    is currently set to the same size. Fix this by applying the same
    defaults like already used serial and virtio consoles.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6705 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • Introduce bdrv_get_encrypted_filename service to allow more informative
    password prompting.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6704 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • Make bdrv_iterate more useful by passing the BlockDriverState to the
    iterator instead of the device name.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6703 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • Make sure that we always delete temporary disk images on error, remove
    obsolete malloc error checks and return proper error codes.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6702 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • Currently, the intermediate input buffer of mux'ed character devices
    records data across all sub-devices. This has the side effect that we
    easily leak data recorded over one sub-devices to another once we switch
    the focus. Avoid data loss and confusion by defining exclusive buffers.
    
    Note: In contrast to the original author's claim, the buffering concept
    still breaks down when the fifo of the currently active sub-device is
    full. As we cannot accept futher data from this point on without risking
    to loose it, we will also miss escape sequences, just like without all
    that buffering. In short: There is no reliable escape sequence handling
    without infinite buffers or the risk of loosing some data.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6701 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • Recent changes to the graphical console initialization broke the initial
    CHR_EVENT_RESET distribution. The reset BHs generated on char device
    initialization are now already consumed during machine init (ide init
    ... -> qemu_aio_wait -> qemu_bh_poll). Therefore, this patch moves the
    initial qemu_chr_reset calls into a separate funtion which is called
    after machine init.
    
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6700 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • Cpuid should return into vec, not overwrite past address in count.
    Changeset 6565 broke this.
    
    Signed-off-by: Lubomir Rintel <lkundrak@v3.sk>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6689 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »
  • SLES10 SP2 installer complains when probing a scsi disk and exits qemu
    when failing to read one of the registers.
    
    lsi_scsi: error: readb 0x15
    
    
    -- 
    Ryan Harper
    Software Engineer; Linux Technology Center
    IBM Corp., Austin, Tx
    ryanh@us.ibm.com
    
    
    
    diffstat output:
     lsi53c895a.c |    2 ++
     1 files changed, 2 insertions(+)
    
    Signed-off-by: Ryan Harper <ryanh@us.ibm.com>
    ---
    Subject: [PATCH] lsi: add ISTAT1 register read
    From: Ryan Harper <ryanh@us.ibm.com>
    Cc: kvm@vger.kernel.org
    
    SLES10 SP2 installer complains when probing a scsi disk and exits qemu when
    failing to read one of the registers.
    
    lsi_scsi: error: readb 0x15
    
    Signed-off-by: Ryan Harper <ryanh@us.ibm.com>
    Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
    
    
    git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6688 c046a42c-6fe2-441c-8c8c-71466251a162
    aliguori authored
     
    Browse Code »