summaryrefslogtreecommitdiffstats
path: root/block
Commit message (Expand)AuthorAgeFilesLines
* qerror.h: Remove QERR defines that are only used onceCole Robinson2014-04-251-1/+1
* block/cloop: use PRIu32 format specifier for uint32_tStefan Hajnoczi2014-04-231-6/+6
* vmdk: Fix "%x" to PRIx32 in format strings for cidFam Zheng2014-04-221-5/+5
* block: Add errp to bdrv_new()Kevin Wolf2014-04-222-2/+2
* convert fprintf() calls to error_setg() in block/qed.c:bdrv_qed_create()Aakriti Gupta2014-04-221-7/+9
* curl: Replaced old error handling with error reporting API.Maria Kustova2014-04-221-1/+1
* block: Handle error of bdrv_getlength in bdrv_create_dirty_bitmapFam Zheng2014-04-221-1/+4
* vmdk: Fix %d and %lld to PRI* in format stringsFam Zheng2014-04-221-6/+7
* iscsi: Remember to set ret for iscsi_open in error caseFam Zheng2014-04-111-0/+1
* bochs: Fix catalog size checkKevin Wolf2014-04-111-3/+11
* bochs: Fix memory leak in bochs_open() error pathKevin Wolf2014-04-111-2/+4
* qcow2: Put cache reference in error caseKevin Wolf2014-04-041-0/+1
* qcow2: Flush metadata during read-only reopenKevin Wolf2014-04-041-4/+21
* iscsi: Don't set error if already set in iscsi_do_inquiryFam Zheng2014-04-041-2/+4
* Merge remote-tracking branch 'remotes/bonzini/scsi-next' into stagingPeter Maydell2014-04-031-6/+13
|\
| * iscsi: always query max WRITE SAME lengthPaolo Bonzini2014-04-031-5/+7
| * iscsi: ignore flushes on scsi-generic devicesPaolo Bonzini2014-04-031-0/+4
| * iscsi: recognize "invalid field" ASCQ from WRITE SAME commandPaolo Bonzini2014-04-031-1/+2
* | qcow2: link all L2 meta updates in preallocate()Stefan Hajnoczi2014-04-011-1/+6
* | parallels: Sanity check for s->tracks (CVE-2014-0142)Kevin Wolf2014-04-011-1/+6
* | parallels: Fix catalog size integer overflow (CVE-2014-0143)Kevin Wolf2014-04-011-1/+6
* | qcow2: Limit snapshot table sizeKevin Wolf2014-04-012-1/+18
* | qcow2: Check maximum L1 size in qcow2_snapshot_load_tmp() (CVE-2014-0143)Kevin Wolf2014-04-013-3/+9
* | qcow2: Fix L1 allocation size in qcow2_snapshot_load_tmp() (CVE-2014-0145)Kevin Wolf2014-04-011-1/+1
* | qcow2: Fix NULL dereference in qcow2_open() error path (CVE-2014-0146)Kevin Wolf2014-04-011-3/+4
* | qcow2: Fix copy_sectors() with VM stateKevin Wolf2014-04-011-9/+0
* | dmg: prevent chunk buffer overflow (CVE-2014-0145)Stefan Hajnoczi2014-04-011-6/+33
* | dmg: use uint64_t consistently for sectors and lengthsStefan Hajnoczi2014-04-011-3/+3
* | dmg: sanitize chunk length and sectorcount (CVE-2014-0145)Stefan Hajnoczi2014-04-011-0/+24
* | dmg: use appropriate types when reading chunksStefan Hajnoczi2014-04-011-1/+2
* | dmg: drop broken bdrv_pread() loopStefan Hajnoczi2014-04-011-13/+2
* | dmg: prevent out-of-bounds array access on terminatorStefan Hajnoczi2014-04-011-1/+1
* | dmg: coding style and indentation cleanupStefan Hajnoczi2014-04-011-104/+120
* | qcow2: Fix new L1 table size check (CVE-2014-0143)Kevin Wolf2014-04-011-1/+1
* | qcow2: Protect against some integer overflows in bdrv_checkKevin Wolf2014-04-011-9/+9
* | qcow2: Fix types in qcow2_alloc_clusters and alloc_clusters_norefKevin Wolf2014-04-012-8/+9
* | qcow2: Check new refcount table size on growthKevin Wolf2014-04-013-3/+14
* | qcow2: Avoid integer overflow in get_refcount (CVE-2014-0143)Kevin Wolf2014-04-011-1/+1
* | qcow2: Don't rely on free_cluster_index in alloc_refcount_block() (CVE-2014-0...Kevin Wolf2014-04-012-40/+43
* | qcow2: Fix backing file name length checkKevin Wolf2014-04-011-3/+6
* | qcow2: Validate active L1 table offset and size (CVE-2014-0144)Kevin Wolf2014-04-011-0/+16
* | qcow2: Validate snapshot table offset/size (CVE-2014-0144)Kevin Wolf2014-04-013-26/+47
* | qcow2: Validate refcount table offsetKevin Wolf2014-04-011-0/+33
* | qcow2: Check refcount table size (CVE-2014-0144)Kevin Wolf2014-04-012-1/+12
* | qcow2: Check backing_file_offset (CVE-2014-0144)Kevin Wolf2014-04-011-0/+6
* | qcow2: Check header_length (CVE-2014-0144)Kevin Wolf2014-04-011-9/+25
* | curl: check data size before memcpy to local buffer. (CVE-2014-0144)Fam Zheng2014-04-011-0/+5
* | vhdx: Bounds checking for block_size and logical_sector_size (CVE-2014-0148)Jeff Cody2014-04-011-2/+10
* | vdi: add bounds checks for blocks_in_image and disk_size header fields (CVE-2...Jeff Cody2014-04-011-4/+33
* | vpc: Validate block size (CVE-2014-0142)Kevin Wolf2014-04-011-0/+5
OpenPOWER on IntegriCloud