hw/virtio/virtio-crypto: Protect from DMA re-entrancy bugs
Replace qemu_bh_new_guarded() by virtio_bh_new_guarded() so the bus and device use the same guard. Otherwise the DMA-reentrancy protection can be bypassed. Fixes: CVE-2024-3446 Cc: qemu-stable@nongnu.org Suggested-by: Alexander Bulekov <alxndr@bu.edu> Reviewed-by: Gerd Hoffmann <kraxel@redhat.com> Acked-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> Reviewed-by: Michael S. Tsirkin <mst@redhat.com> Message-Id: <20240409105537.18308-5-philmd@linaro.org>
This commit is contained in:
parent
b4295bff25
commit
f4729ec39a
@ -1080,8 +1080,8 @@ static void virtio_crypto_device_realize(DeviceState *dev, Error **errp)
|
|||||||
vcrypto->vqs[i].dataq =
|
vcrypto->vqs[i].dataq =
|
||||||
virtio_add_queue(vdev, 1024, virtio_crypto_handle_dataq_bh);
|
virtio_add_queue(vdev, 1024, virtio_crypto_handle_dataq_bh);
|
||||||
vcrypto->vqs[i].dataq_bh =
|
vcrypto->vqs[i].dataq_bh =
|
||||||
qemu_bh_new_guarded(virtio_crypto_dataq_bh, &vcrypto->vqs[i],
|
virtio_bh_new_guarded(dev, virtio_crypto_dataq_bh,
|
||||||
&dev->mem_reentrancy_guard);
|
&vcrypto->vqs[i]);
|
||||||
vcrypto->vqs[i].vcrypto = vcrypto;
|
vcrypto->vqs[i].vcrypto = vcrypto;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user