- hw/virtio/virtio-crypto: Protect from DMA re-entrancy bugs(CVE-2024-3446) - hw/char/virtio-serial-bus: Protect from DMA re-entrancy bugs(CVE-2024-3446) - hw/display/virtio-gpu: Protect from DMA re-entrancy bugs(CVE-2024-3446) - hw/virtio: Introduce virtio_bh_new_guarded() helper - hw: replace most qemu_bh_new calls with qemu_bh_new_guarded - checkpatch: add qemu_bh_new/aio_bh_new checks - async: avoid use-after-free on re-entrancy guard - async: Add an optional reentrancy guard to the BH API - hw/sd/sdhci: Do not update TRNMOD when Command Inhibit (DAT) is set(CVE-2024-3447) - rtl8139: Remove unused variable - tulip: Remove unused variable - virtio-mem: Fix the bitmap index of the section offset - virtio-mem: Fix the iterator variable in a vmem->rdl_list loop - system/memory: use ldn_he_p/stn_he_p - block: Fix crash when loading snapshot on inactive node - smmu: Clear SMMUPciBus pointer cache when system reset - block/mirror: Fix NULL s->job in active writes - amd_iommu: Fix APIC address check - virtio-crypto: fix NULL pointer dereference in virtio_crypto_free_reques - libqos/virtio.c: Correct 'flags' reading in qvirtqueue_kick cherry-pick from 66e411885a23c96ff73742d06b793fec3ceaebb7 - ivshmem-test.c: enable test_ivshmem_server for ppc64 arch - ivshmem.c: change endianness to LITTLE_ENDIAN - hw/ppc/mac.h: Remove MAX_CPUS macro - configure: remove dead variables - virtio-gpu: do not byteswap padding - hw/intc: clean-up error reporting for failed ITS cmd - qemu-iotests: Discard stderr when probing devices - linux-user: un-parent OBJECT(cpu) when closing thread - hw/net/rocker: Avoid undefined shifts with more than 31 ports - contrib/vhost-user-blk: Clean up deallocation of VuVirtqElement - scsi-disk: fix overflow when block size is not a multiple of BDRV_SECTOR_SIZE Signed-off-by: Jiabo Feng <fengjiabo1@huawei.com> (cherry picked from commit bf54b48c2963c869dfdc89977c57be4bd9e772aa)
95 lines
3.9 KiB
Diff
95 lines
3.9 KiB
Diff
From 227f7f8b076ac11ff5959ddebc16569665b68e21 Mon Sep 17 00:00:00 2001
|
|
From: Luo Yifan <luoyifan_yewu@cmss.chinamobile.com>
|
|
Date: Thu, 28 Mar 2024 10:17:35 +0800
|
|
Subject: [PATCH] hw/intc: clean-up error reporting for failed ITS cmd
|
|
MIME-Version: 1.0
|
|
Content-Type: text/plain; charset=UTF-8
|
|
Content-Transfer-Encoding: 8bit
|
|
|
|
cherry picked from commit 229c57b1986484ea2cd1eb744e3492af7eee063e
|
|
|
|
While trying to debug a GIC ITS failure I saw some guest errors that
|
|
had poor formatting as well as leaving me confused as to what failed.
|
|
As most of the checks aren't possible without a valid dte split that
|
|
check apart and then check the other conditions in steps. This avoids
|
|
us relying on undefined data.
|
|
|
|
I still get a failure with the current kvm-unit-tests but at least I
|
|
know (partially) why now:
|
|
|
|
Exception return from AArch64 EL1 to AArch64 EL1 PC 0x40080588
|
|
PASS: gicv3: its-trigger: inv/invall: dev2/eventid=20 now triggers an LPI
|
|
ITS: MAPD devid=2 size = 0x8 itt=0x40430000 valid=0
|
|
INT dev_id=2 event_id=20
|
|
process_its_cmd: invalid command attributes: invalid dte: 0 for 2 (MEM_TX: 0)
|
|
PASS: gicv3: its-trigger: mapd valid=false: no LPI after device unmap
|
|
SUMMARY: 6 tests, 1 unexpected failures
|
|
|
|
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
|
|
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
|
|
Message-id: 20211112170454.3158925-1-alex.bennee@linaro.org
|
|
Cc: Shashi Mallela <shashi.mallela@linaro.org>
|
|
Cc: Peter Maydell <peter.maydell@linaro.org>
|
|
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
|
|
Signed-off-by: Luo Yifan <luoyifan_yewu@cmss.chinamobile.com>
|
|
---
|
|
hw/intc/arm_gicv3_its.c | 39 +++++++++++++++++++++++++++------------
|
|
1 file changed, 27 insertions(+), 12 deletions(-)
|
|
|
|
diff --git a/hw/intc/arm_gicv3_its.c b/hw/intc/arm_gicv3_its.c
|
|
index c929a9cb5c..b99e63d58f 100644
|
|
--- a/hw/intc/arm_gicv3_its.c
|
|
+++ b/hw/intc/arm_gicv3_its.c
|
|
@@ -274,21 +274,36 @@ static bool process_its_cmd(GICv3ITSState *s, uint64_t value, uint32_t offset,
|
|
if (res != MEMTX_OK) {
|
|
return result;
|
|
}
|
|
+ } else {
|
|
+ qemu_log_mask(LOG_GUEST_ERROR,
|
|
+ "%s: invalid command attributes: "
|
|
+ "invalid dte: %"PRIx64" for %d (MEM_TX: %d)\n",
|
|
+ __func__, dte, devid, res);
|
|
+ return result;
|
|
}
|
|
|
|
- if ((devid > s->dt.maxids.max_devids) || !dte_valid || !ite_valid ||
|
|
- !cte_valid || (eventid > max_eventid)) {
|
|
+
|
|
+ /*
|
|
+ * In this implementation, in case of guest errors we ignore the
|
|
+ * command and move onto the next command in the queue.
|
|
+ */
|
|
+ if (devid > s->dt.maxids.max_devids) {
|
|
qemu_log_mask(LOG_GUEST_ERROR,
|
|
- "%s: invalid command attributes "
|
|
- "devid %d or eventid %d or invalid dte %d or"
|
|
- "invalid cte %d or invalid ite %d\n",
|
|
- __func__, devid, eventid, dte_valid, cte_valid,
|
|
- ite_valid);
|
|
- /*
|
|
- * in this implementation, in case of error
|
|
- * we ignore this command and move onto the next
|
|
- * command in the queue
|
|
- */
|
|
+ "%s: invalid command attributes: devid %d>%d",
|
|
+ __func__, devid, s->dt.maxids.max_devids);
|
|
+
|
|
+ } else if (!dte_valid || !ite_valid || !cte_valid) {
|
|
+ qemu_log_mask(LOG_GUEST_ERROR,
|
|
+ "%s: invalid command attributes: "
|
|
+ "dte: %s, ite: %s, cte: %s\n",
|
|
+ __func__,
|
|
+ dte_valid ? "valid" : "invalid",
|
|
+ ite_valid ? "valid" : "invalid",
|
|
+ cte_valid ? "valid" : "invalid");
|
|
+ } else if (eventid > max_eventid) {
|
|
+ qemu_log_mask(LOG_GUEST_ERROR,
|
|
+ "%s: invalid command attributes: eventid %d > %d\n",
|
|
+ __func__, eventid, max_eventid);
|
|
} else {
|
|
/*
|
|
* Current implementation only supports rdbase == procnum
|
|
--
|
|
2.27.0
|
|
|