summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2023-07-24测试 uintr_event 的打印HEADmasterYour Name
2023-07-13屏蔽 TNT 位Your Name
更多的打印输出
2022-07-24recover from cpu.c项小羽
2022-07-24temp work, but still have some problem项小羽
2022-07-20for debug uring项小羽
2022-07-20visial of core项小羽
2022-07-15modify clui instruction implement项小羽
2022-06-08clean and workable code here项小羽
2022-06-08recode debug process项小羽
2022-06-06modify uif to register项小羽
2022-06-06now direct send is mostly work项小羽
2022-06-04temp solve some problem of direct sending项小羽
2022-06-04Fix implementation of clearing rrUNIDY2002
2022-06-02Fix incorrect implementation of pushing UIRRVUNIDY2002
2022-06-01merge from clean for better develop项小羽
2022-06-01merge from direc branch项小羽
2022-06-01only save prev level trace output项小羽
2022-05-31direct ok项小羽
2022-05-28make a clean version of current stageclean项小羽
2022-05-27work half on direct send项小羽
2022-05-24now could success for many times项小羽
2022-05-19now muti thread could work partly项小羽
2022-05-15Merge branch 'master' of github.com:OS-F-4/qemu-uintr项晨东
2022-05-15try different methods of eob项晨东
2022-05-15try some different method of eob项晨东
2022-05-12Now uipi_sample.c can sometimes exit successfullyUNIDY2002
2022-05-10more mofity项晨东
2022-05-07working log addedUbuntu
2022-05-03tempUbuntu
2022-05-03now control flow could reach uiretUbuntu
2022-05-02add call functions in do interrupt 64Ubuntu
2022-05-02add XSaveUINTR in X86XSaveArea add functions to write and read from ↵Ubuntu
corespond area
2022-04-30memory write backUbuntu
2022-04-29add access of puidUbuntu
2022-04-27mam accessedxxy
2022-04-25for safexxy
2022-04-22 working log upgradexxy
2022-04-20just push modifty c4 and other out putxxy
2022-04-19add .vscode gitignorexxy
2022-04-18all instructions caughted, msrs workedxxy
2022-04-16working log addedxxy
2022-04-15frist push just some marksxxy
2022-04-12Update version for v7.0.0-rc4 releasePeter Maydell
Signed-off-by: Peter Maydell <[email protected]>
2022-04-08virtio-iommu: use-after-free fixWentao Liang
A potential Use-after-free was reported in virtio_iommu_handle_command when using virtio-iommu: > I find a potential Use-after-free in QEMU 6.2.0, which is in > virtio_iommu_handle_command() (./hw/virtio/virtio-iommu.c). > > > Specifically, in the loop body, the variable 'buf' allocated at line 639 can be > freed by g_free() at line 659. However, if the execution path enters the loop > body again and the if branch takes true at line 616, the control will directly > jump to 'out' at line 651. At this time, 'buf' is a freed pointer, which is not > assigned with an allocated memory but used at line 653. As a result, a UAF bug > is triggered. > > > > 599 for (;;) { > ... > 615 sz = iov_to_buf(iov, iov_cnt, 0, &head, sizeof(head)); > 616 if (unlikely(sz != sizeof(head))) { > 617 tail.status = VIRTIO_IOMMU_S_DEVERR; > 618 goto out; > 619 } > ... > 639 buf = g_malloc0(output_size); > ... > 651 out: > 652 sz = iov_from_buf(elem->in_sg, elem->in_num, 0, > 653 buf ? buf : &tail, output_size); > ... > 659 g_free(buf); > > We can fix it by set ‘buf‘ to NULL after freeing it: > > > 651 out: > 652 sz = iov_from_buf(elem->in_sg, elem->in_num, 0, > 653 buf ? buf : &tail, output_size); > ... > 659 g_free(buf); > +++ buf = NULL; > 660 } Fix as suggested by the reporter. Signed-off-by: Wentao Liang <[email protected]> Signed-off-by: Michael S. Tsirkin <[email protected]> Message-id: [email protected] Message-ID: <[email protected]> Signed-off-by: Peter Maydell <[email protected]>
2022-04-08Merge tag 'fixes-20220408-pull-request' of git://git.kraxel.org/qemu into ↵Peter Maydell
staging two cursor/qxl related security fixes. # gpg: Signature made Fri 08 Apr 2022 05:37:16 BST # gpg: using RSA key A0328CFFB93A17A79901FE7D4CB6D8EED3E87138 # gpg: Good signature from "Gerd Hoffmann (work) <[email protected]>" [full] # gpg: aka "Gerd Hoffmann <[email protected]>" [full] # gpg: aka "Gerd Hoffmann (private) <[email protected]>" [full] # Primary key fingerprint: A032 8CFF B93A 17A7 9901 FE7D 4CB6 D8EE D3E8 7138 * tag 'fixes-20220408-pull-request' of git://git.kraxel.org/qemu: ui/cursor: fix integer overflow in cursor_alloc (CVE-2021-4206) display/qxl-render: fix race condition in qxl_cursor (CVE-2021-4207) Signed-off-by: Peter Maydell <[email protected]>
2022-04-07ui/cursor: fix integer overflow in cursor_alloc (CVE-2021-4206)Mauro Matteo Cascella
Prevent potential integer overflow by limiting 'width' and 'height' to 512x512. Also change 'datasize' type to size_t. Refer to security advisory https://starlabs.sg/advisories/22-4206/ for more information. Fixes: CVE-2021-4206 Signed-off-by: Mauro Matteo Cascella <[email protected]> Reviewed-by: Marc-André Lureau <[email protected]> Message-Id: <[email protected]> Signed-off-by: Gerd Hoffmann <[email protected]>
2022-04-07display/qxl-render: fix race condition in qxl_cursor (CVE-2021-4207)Mauro Matteo Cascella
Avoid fetching 'width' and 'height' a second time to prevent possible race condition. Refer to security advisory https://starlabs.sg/advisories/22-4207/ for more information. Fixes: CVE-2021-4207 Signed-off-by: Mauro Matteo Cascella <[email protected]> Reviewed-by: Marc-André Lureau <[email protected]> Message-Id: <[email protected]> Signed-off-by: Gerd Hoffmann <[email protected]>
2022-04-06Update version for v7.0.0-rc3 releasePeter Maydell
Signed-off-by: Peter Maydell <[email protected]>
2022-04-06acpi: fix acpi_index migrationDr. David Alan Gilbert
vmstate_acpi_pcihp_use_acpi_index() was expecting AcpiPciHpState as state but it actually received PIIX4PMState, because VMSTATE_PCI_HOTPLUG is a macro and not another struct. So it ended up accessing random pointer, which resulted in 'false' return value and acpi_index field wasn't ever sent. However in 7.0 that pointer de-references to value > 0, and destination QEMU starts to expect the field which isn't sent in migratioon stream from older QEMU (6.2 and older). As result migration fails with: qemu-system-x86_64: Missing section footer for 0000:00:01.3/piix4_pm qemu-system-x86_64: load of migration failed: Invalid argument In addition with QEMU-6.2, destination due to not expected state, also never expects the acpi_index field in migration stream. Q35 is not affected as it always sends/expects the field as long as acpi based PCI hotplug is enabled. Fix issue by introducing compat knob to never send/expect acpi_index in migration stream for 6.2 and older PC machine types and always send it for 7.0 and newer PC machine types. Diagnosed-by: Dr. David Alan Gilbert <[email protected]> Fixes: b32bd76 ("pci: introduce acpi-index property for PCI device") Resolves: https://gitlab.com/qemu-project/qemu/-/issues/932 Signed-off-by: Igor Mammedov <[email protected]> Reviewed-by: Dr. David Alan Gilbert <[email protected]> Signed-off-by: Peter Maydell <[email protected]>
2022-04-05Merge tag 'for-upstream' of https://gitlab.com/bonzini/qemu into stagingPeter Maydell
* fix vss-win32 compilation with clang++ * update Coverity model * add measurement calculation to amd-memory-encryption docs # gpg: Signature made Tue 05 Apr 2022 09:42:59 BST # gpg: using RSA key F13338574B662389866C7682BFFBD25F78C7AE83 # gpg: issuer "[email protected]" # gpg: Good signature from "Paolo Bonzini <[email protected]>" [full] # gpg: aka "Paolo Bonzini <[email protected]>" [full] # Primary key fingerprint: 46F5 9FBD 57D6 12E7 BFD4 E2F7 7E15 100C CD36 69B1 # Subkey fingerprint: F133 3857 4B66 2389 866C 7682 BFFB D25F 78C7 AE83 * tag 'for-upstream' of https://gitlab.com/bonzini/qemu: docs/system/i386: Add measurement calculation details to amd-memory-encryption qga/vss-win32: fix compilation with clang++ coverity: update model for latest tools Signed-off-by: Peter Maydell <[email protected]>