- Sep 25, 2020
-
-
李澍非 authored
-
- Aug 31, 2020
-
-
李澍非 authored
-
- Aug 30, 2020
- Aug 29, 2020
- Aug 28, 2020
- Jul 23, 2020
-
-
Thomas Huth authored
Some tracepoints in megasas.c use a guest-controlled value as an index into the mfi_frame_desc[] array. Thus a malicious guest could cause an out-of-bounds error here. Fortunately, the impact is very low since this can only happen when the corresponding tracepoints have been enabled before, but the problem should be fixed anyway with a proper check. Buglink: https://bugs.launchpad.net/qemu/+bug/1882065 Signed-off-by:
Thomas Huth <thuth@redhat.com> Message-Id: <20200615072629.32321-1-thuth@redhat.com> Reviewed-by:
Philippe Mathieu-Daudé <f4bug@amsat.org> Signed-off-by:
Paolo Bonzini <pbonzini@redhat.com>
-
Prasad J Pandit authored
Use unsigned type for the MegasasState fields which hold positive numeric values. Signed-off-by:
Prasad J Pandit <pjp@fedoraproject.org> Reviewed-by:
Darren Kenny <darren.kenny@oracle.com> Message-Id: <20200513192540.1583887-4-ppandit@redhat.com> Signed-off-by:
Paolo Bonzini <pbonzini@redhat.com>
-
Prasad J Pandit authored
While in megasas_handle_frame(), megasas_enqueue_frame() may set a NULL frame into MegasasCmd object for a given 'frame_addr' address. Add check to avoid a NULL pointer dereference issue. Reported-by:
Alexander Bulekov <alxndr@bu.edu> Fixes: https://bugs.launchpad.net/qemu/+bug/1878259 Signed-off-by:
Prasad J Pandit <pjp@fedoraproject.org> Acked-by:
Alexander Bulekov <alxndr@bu.edu> Reviewed-by:
Darren Kenny <darren.kenny@oracle.com> Message-Id: <20200513192540.1583887-3-ppandit@redhat.com> Signed-off-by:
Paolo Bonzini <pbonzini@redhat.com>
-
Prasad J Pandit authored
A guest user may set 'reply_queue_head' field of MegasasState to a negative value. Later in 'megasas_lookup_frame' it is used to index into s->frames[] array. Use unsigned type to avoid OOB access issue. Also check that 'index' value stays within s->frames[] bounds through the while() loop in 'megasas_lookup_frame' to avoid OOB access. Reported-by:
Ren Ding <rding@gatech.edu> Reported-by:
Hanqing Zhao <hanqing@gatech.edu> Reported-by:
Alexander Bulekov <alxndr@bu.edu> Signed-off-by:
Prasad J Pandit <pjp@fedoraproject.org> Acked-by:
Alexander Bulekov <alxndr@bu.edu> Message-Id: <20200513192540.1583887-2-ppandit@redhat.com> Signed-off-by:
Paolo Bonzini <pbonzini@redhat.com>
-
Prasad J Pandit authored
While accessing VGA registers via ati_mm_read/write routines, a guest may set 's->regs.mm_index' such that it leads to infinite recursion. Check mm_index value to avoid such recursion. Log an error message for wrong values. Reported-by:
Ren Ding <rding@gatech.edu> Reported-by:
Hanqing Zhao <hanqing@gatech.edu> Reported-by:
Yi Ren <c4tren@gmail.com> Message-id: 20200604090830.33885-1-ppandit@redhat.com Suggested-by:
BALATON Zoltan <balaton@eik.bme.hu> Suggested-by:
Philippe Mathieu-Daudé <philmd@redhat.com> Signed-off-by:
Prasad J Pandit <pjp@fedoraproject.org> Signed-off-by:
Gerd Hoffmann <kraxel@redhat.com>
-
Prasad J Pandit authored
When mapping physical memory into host's virtual address space, 'address_space_map' may return NULL if BounceBuffer is in_use. Set and return '*plen = 0' to avoid later NULL pointer dereference. Reported-by:
Alexander Bulekov <alxndr@bu.edu> Fixes: https://bugs.launchpad.net/qemu/+bug/1878259 Suggested-by:
Paolo Bonzini <pbonzini@redhat.com> Suggested-by:
Peter Maydell <peter.maydell@linaro.org> Signed-off-by:
Prasad J Pandit <pjp@fedoraproject.org> Message-Id: <20200526111743.428367-1-ppandit@redhat.com> Reviewed-by:
Philippe Mathieu-Daudé <philmd@redhat.com> Signed-off-by:
Paolo Bonzini <pbonzini@redhat.com>
-
Prasad J Pandit authored
A guest user may set channel frame count via es1370_write() such that, in es1370_transfer_audio(), total frame count 'size' is lesser than the number of frames that are processed 'cnt'. int cnt = d->frame_cnt >> 16; int size = d->frame_cnt & 0xffff; if (size < cnt), it results in incorrect calculations leading to OOB access issue(s). Add check to avoid it. Reported-by:
Ren Ding <rding@gatech.edu> Reported-by:
Hanqing Zhao <hanqing@gatech.edu> Signed-off-by:
Prasad J Pandit <pjp@fedoraproject.org> Message-id: 20200514200608.1744203-1-ppandit@redhat.com Signed-off-by:
Gerd Hoffmann <kraxel@redhat.com>
-
- Jul 07, 2020
-
-
zhanghailiang authored
In the PAC computation, sbox was applied over wrong bits. As this is a 4-bit sbox, bit index should be incremented by 4 instead of 16. Test vector from QARMA paper (https://eprint.iacr.org/2016/444.pdf) was used to verify one computation of the pauth_computepac() function which uses sbox2. Launchpad: https://bugs.launchpad.net/bugs/1859713 Reviewed-by:
Richard Henderson <richard.henderson@linaro.org> Signed-off-by:
Vincent DEHORS <vincent.dehors@smile.fr> Signed-off-by:
Adrien GRASSEIN <adrien.grassein@smile.fr> Message-id: 20200116230809.19078-2-richard.henderson@linaro.org Reviewed-by:
Peter Maydell <peter.maydell@linaro.org> Signed-off-by:
Peter Maydell <peter.maydell@linaro.org> Signed-off-by:
zhanghailiang <zhang.zhanghailiang@huawei.com>
-
@zhanghailiang authored
Add the kvm_adjvtime vcpu property for ARM Cortex-A72 cpu model, so that virtual time adjust will be enabled for it. Signed-off-by:
Ying Fang <fangying1@huawei.com>
-
@zhanghailiang authored
This patch drops the vtimer virtual timer adjust, cross version migration from openEuler qemu-4.0.1 to qemu-4.1.0 is not supported as a consequence. By default openEuler qemu-4.1.0 use kvm_adjvtime as the virtual timer. Signed-off-by:
Ying Fang <fangying1@huawei.com>
-
@zhanghailiang authored
Vtimer adjust is used in openEuler qemu-4.0.1, however kvm_adjvtime is introduced in openEuler qemu-4.1.0. To maintain the compatibility and enable cross version migration, let's enable vtimer adjust only if kvm_adjvtime is not enabled, otherwise there may be conflicts between vtimer adjust and kvm_adjvtime. After this modification: 1: openEuler qemu-4.0.1 use vtimer as the default virtual timer 2: openEuler qemu-4.1.0 use kvm_adjvtime as the defaut virtual timer Migration from openEuler qemu-4.0.1 to openEuler qemu-4.1.0 will be ok, but migration path from upstream qemu-4.0.1 to openEuler qemu-4..0.1 will be broken. Since openEuler qemu-4.1.0, kvm_adjvtime is used as the default virtual timer. So please upgrade to openEuler qemu-4.1.0 and use the virt-4.1 machine. Signed-off-by:
Ying Fang <fangying1@huawei.com>
-
@zhanghailiang authored
Machine compatibility for kvm-no-adjvtime is missed, let's add it for virt machine 4.0 Signed-off-by:
Ying Fang <fangying1@huawei.com>
-
@zhanghailiang authored
The vtimer kick still increases even if the vcpu is stopped when VM has save/restore or suspend/resume operation. This will cause guest watchdog soft-lockup if the VM has lots of memory in use. Signed-off-by:
Hao Hong <honghao5@huawei.com> Signed-off-by:
Haibin Wang <wanghaibin.wang@huawei.com> Signed-off-by:
Ying Fang <fangying1@huawei.com>
-
@zhanghailiang authored
This reverts commit patch: vtimer-compat-cross-version-migration-from-v4.0.1.patch Signed-off-by:
Ying Fang <fangying1@huawei.com>
-
@zhanghailiang authored
Add logs on VM runtime path, to make it easier to do trouble shooting. Signed-off-by:
Ying Fang <fangying1@huawei.com>
-