fc2ddd6b1c
- kvm-memory-prevent-dma-reentracy-issues.patch [bz#1999236] - kvm-async-Add-an-optional-reentrancy-guard-to-the-BH-API.patch [bz#1999236] - kvm-checkpatch-add-qemu_bh_new-aio_bh_new-checks.patch [bz#1999236] - kvm-hw-replace-most-qemu_bh_new-calls-with-qemu_bh_new_g.patch [bz#1999236] - kvm-lsi53c895a-disable-reentrancy-detection-for-script-R.patch [bz#1999236] - kvm-bcm2835_property-disable-reentrancy-detection-for-io.patch [bz#1999236] - kvm-raven-disable-reentrancy-detection-for-iomem.patch [bz#1999236] - kvm-apic-disable-reentrancy-detection-for-apic-msi.patch [bz#1999236] - kvm-async-avoid-use-after-free-on-re-entrancy-guard.patch [bz#1999236] - kvm-memory-stricter-checks-prior-to-unsetting-engaged_in.patch [bz#1999236] - kvm-lsi53c895a-disable-reentrancy-detection-for-MMIO-reg.patch [bz#1999236] - kvm-hw-scsi-lsi53c895a-Fix-reentrancy-issues-in-the-LSI-.patch [bz#1999236] - kvm-target-i386-add-support-for-FLUSH_L1D-feature.patch [bz#2216203] - kvm-target-i386-add-support-for-FB_CLEAR-feature.patch [bz#2216203] - kvm-migration-Disable-postcopy-multifd-migration.patch [bz#2169733] - Resolves: bz#1999236 (CVE-2021-3750 virt:rhel/qemu-kvm: QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free [rhel-8]) - Resolves: bz#2216203 ([qemu-kvm]VM reports vulnerabilty to mmio_stale_data on patched host with microcode) - Resolves: bz#2169733 (Qemu on destination host crashed if migrate with postcopy and multifd enabled)
450 lines
19 KiB
Diff
450 lines
19 KiB
Diff
From 146cfb23b76b898f08690ffc14aab16d22a41404 Mon Sep 17 00:00:00 2001
|
|
From: Jon Maloy <jmaloy@redhat.com>
|
|
Date: Tue, 9 May 2023 10:29:03 -0400
|
|
Subject: [PATCH 04/15] hw: replace most qemu_bh_new calls with
|
|
qemu_bh_new_guarded
|
|
|
|
RH-Author: Jon Maloy <jmaloy@redhat.com>
|
|
RH-MergeRequest: 277: memory: prevent dma-reentracy issues
|
|
RH-Bugzilla: 1999236
|
|
RH-Acked-by: Thomas Huth <thuth@redhat.com>
|
|
RH-Acked-by: Miroslav Rezanina <mrezanin@redhat.com>
|
|
RH-Commit: [4/12] 00c51d30246b3aa529f6043e35ee471660aa1fce (redhat/rhel/src/qemu-kvm/jons-qemu-kvm-2)
|
|
|
|
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1999236
|
|
Upstream: Merged
|
|
CVE: CVE-2021-3750
|
|
Conflicts: In hw/nvme/ctrl.c there are no calls to qemu_bh_new() at the two locations
|
|
the replacement is done in the upstream commit. Instead, timer_new_ns() is
|
|
used. We leave these functions unaltered.
|
|
|
|
commit f63192b0544af5d3e4d5edfd85ab520fcf671377
|
|
Author: Alexander Bulekov <alxndr@bu.edu>
|
|
Date: Thu Apr 27 17:10:09 2023 -0400
|
|
|
|
hw: replace most qemu_bh_new calls with qemu_bh_new_guarded
|
|
|
|
This protects devices from bh->mmio reentrancy issues.
|
|
|
|
Thanks: Thomas Huth <thuth@redhat.com> for diagnosing OS X test failure.
|
|
Signed-off-by: Alexander Bulekov <alxndr@bu.edu>
|
|
Reviewed-by: Darren Kenny <darren.kenny@oracle.com>
|
|
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>
|
|
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
|
|
Reviewed-by: Paul Durrant <paul@xen.org>
|
|
Reviewed-by: Thomas Huth <thuth@redhat.com>
|
|
Message-Id: <20230427211013.2994127-5-alxndr@bu.edu>
|
|
Signed-off-by: Thomas Huth <thuth@redhat.com>
|
|
|
|
Signed-off-by: Jon Maloy <jmaloy@redhat.com>
|
|
---
|
|
hw/9pfs/xen-9p-backend.c | 5 ++++-
|
|
hw/block/dataplane/virtio-blk.c | 3 ++-
|
|
hw/block/dataplane/xen-block.c | 5 +++--
|
|
hw/char/virtio-serial-bus.c | 3 ++-
|
|
hw/display/qxl.c | 9 ++++++---
|
|
hw/display/virtio-gpu.c | 6 ++++--
|
|
hw/ide/ahci.c | 3 ++-
|
|
hw/ide/ahci_internal.h | 1 +
|
|
hw/ide/core.c | 4 +++-
|
|
hw/misc/imx_rngc.c | 6 ++++--
|
|
hw/misc/macio/mac_dbdma.c | 2 +-
|
|
hw/net/virtio-net.c | 3 ++-
|
|
hw/scsi/mptsas.c | 3 ++-
|
|
hw/scsi/scsi-bus.c | 3 ++-
|
|
hw/scsi/vmw_pvscsi.c | 3 ++-
|
|
hw/usb/dev-uas.c | 3 ++-
|
|
hw/usb/hcd-dwc2.c | 3 ++-
|
|
hw/usb/hcd-ehci.c | 3 ++-
|
|
hw/usb/hcd-uhci.c | 2 +-
|
|
hw/usb/host-libusb.c | 6 ++++--
|
|
hw/usb/redirect.c | 6 ++++--
|
|
hw/usb/xen-usb.c | 3 ++-
|
|
hw/virtio/virtio-balloon.c | 5 +++--
|
|
hw/virtio/virtio-crypto.c | 3 ++-
|
|
24 files changed, 62 insertions(+), 31 deletions(-)
|
|
|
|
diff --git a/hw/9pfs/xen-9p-backend.c b/hw/9pfs/xen-9p-backend.c
|
|
index 65c4979c3c..09f7c13588 100644
|
|
--- a/hw/9pfs/xen-9p-backend.c
|
|
+++ b/hw/9pfs/xen-9p-backend.c
|
|
@@ -60,6 +60,7 @@ typedef struct Xen9pfsDev {
|
|
|
|
int num_rings;
|
|
Xen9pfsRing *rings;
|
|
+ MemReentrancyGuard mem_reentrancy_guard;
|
|
} Xen9pfsDev;
|
|
|
|
static void xen_9pfs_disconnect(struct XenLegacyDevice *xendev);
|
|
@@ -441,7 +442,9 @@ static int xen_9pfs_connect(struct XenLegacyDevice *xendev)
|
|
xen_9pdev->rings[i].ring.out = xen_9pdev->rings[i].data +
|
|
XEN_FLEX_RING_SIZE(ring_order);
|
|
|
|
- xen_9pdev->rings[i].bh = qemu_bh_new(xen_9pfs_bh, &xen_9pdev->rings[i]);
|
|
+ xen_9pdev->rings[i].bh = qemu_bh_new_guarded(xen_9pfs_bh,
|
|
+ &xen_9pdev->rings[i],
|
|
+ &xen_9pdev->mem_reentrancy_guard);
|
|
xen_9pdev->rings[i].out_cons = 0;
|
|
xen_9pdev->rings[i].out_size = 0;
|
|
xen_9pdev->rings[i].inprogress = false;
|
|
diff --git a/hw/block/dataplane/virtio-blk.c b/hw/block/dataplane/virtio-blk.c
|
|
index ee5a5352dc..5f0de7da1e 100644
|
|
--- a/hw/block/dataplane/virtio-blk.c
|
|
+++ b/hw/block/dataplane/virtio-blk.c
|
|
@@ -127,7 +127,8 @@ bool virtio_blk_data_plane_create(VirtIODevice *vdev, VirtIOBlkConf *conf,
|
|
} else {
|
|
s->ctx = qemu_get_aio_context();
|
|
}
|
|
- s->bh = aio_bh_new(s->ctx, notify_guest_bh, s);
|
|
+ s->bh = aio_bh_new_guarded(s->ctx, notify_guest_bh, s,
|
|
+ &DEVICE(vdev)->mem_reentrancy_guard);
|
|
s->batch_notify_vqs = bitmap_new(conf->num_queues);
|
|
|
|
*dataplane = s;
|
|
diff --git a/hw/block/dataplane/xen-block.c b/hw/block/dataplane/xen-block.c
|
|
index 860787580a..07855feea6 100644
|
|
--- a/hw/block/dataplane/xen-block.c
|
|
+++ b/hw/block/dataplane/xen-block.c
|
|
@@ -631,8 +631,9 @@ XenBlockDataPlane *xen_block_dataplane_create(XenDevice *xendev,
|
|
} else {
|
|
dataplane->ctx = qemu_get_aio_context();
|
|
}
|
|
- dataplane->bh = aio_bh_new(dataplane->ctx, xen_block_dataplane_bh,
|
|
- dataplane);
|
|
+ dataplane->bh = aio_bh_new_guarded(dataplane->ctx, xen_block_dataplane_bh,
|
|
+ dataplane,
|
|
+ &DEVICE(xendev)->mem_reentrancy_guard);
|
|
|
|
return dataplane;
|
|
}
|
|
diff --git a/hw/char/virtio-serial-bus.c b/hw/char/virtio-serial-bus.c
|
|
index f01ec2137c..f18124b155 100644
|
|
--- a/hw/char/virtio-serial-bus.c
|
|
+++ b/hw/char/virtio-serial-bus.c
|
|
@@ -985,7 +985,8 @@ static void virtser_port_device_realize(DeviceState *dev, Error **errp)
|
|
return;
|
|
}
|
|
|
|
- port->bh = qemu_bh_new(flush_queued_data_bh, port);
|
|
+ port->bh = qemu_bh_new_guarded(flush_queued_data_bh, port,
|
|
+ &dev->mem_reentrancy_guard);
|
|
port->elem = NULL;
|
|
}
|
|
|
|
diff --git a/hw/display/qxl.c b/hw/display/qxl.c
|
|
index bcd9e8716a..0f663b9912 100644
|
|
--- a/hw/display/qxl.c
|
|
+++ b/hw/display/qxl.c
|
|
@@ -2206,11 +2206,14 @@ static void qxl_realize_common(PCIQXLDevice *qxl, Error **errp)
|
|
|
|
qemu_add_vm_change_state_handler(qxl_vm_change_state_handler, qxl);
|
|
|
|
- qxl->update_irq = qemu_bh_new(qxl_update_irq_bh, qxl);
|
|
+ qxl->update_irq = qemu_bh_new_guarded(qxl_update_irq_bh, qxl,
|
|
+ &DEVICE(qxl)->mem_reentrancy_guard);
|
|
qxl_reset_state(qxl);
|
|
|
|
- qxl->update_area_bh = qemu_bh_new(qxl_render_update_area_bh, qxl);
|
|
- qxl->ssd.cursor_bh = qemu_bh_new(qemu_spice_cursor_refresh_bh, &qxl->ssd);
|
|
+ qxl->update_area_bh = qemu_bh_new_guarded(qxl_render_update_area_bh, qxl,
|
|
+ &DEVICE(qxl)->mem_reentrancy_guard);
|
|
+ qxl->ssd.cursor_bh = qemu_bh_new_guarded(qemu_spice_cursor_refresh_bh, &qxl->ssd,
|
|
+ &DEVICE(qxl)->mem_reentrancy_guard);
|
|
}
|
|
|
|
static void qxl_realize_primary(PCIDevice *dev, Error **errp)
|
|
diff --git a/hw/display/virtio-gpu.c b/hw/display/virtio-gpu.c
|
|
index d78b9700c7..ecf9079145 100644
|
|
--- a/hw/display/virtio-gpu.c
|
|
+++ b/hw/display/virtio-gpu.c
|
|
@@ -1332,8 +1332,10 @@ void virtio_gpu_device_realize(DeviceState *qdev, Error **errp)
|
|
|
|
g->ctrl_vq = virtio_get_queue(vdev, 0);
|
|
g->cursor_vq = virtio_get_queue(vdev, 1);
|
|
- g->ctrl_bh = qemu_bh_new(virtio_gpu_ctrl_bh, g);
|
|
- g->cursor_bh = qemu_bh_new(virtio_gpu_cursor_bh, g);
|
|
+ g->ctrl_bh = qemu_bh_new_guarded(virtio_gpu_ctrl_bh, g,
|
|
+ &qdev->mem_reentrancy_guard);
|
|
+ g->cursor_bh = qemu_bh_new_guarded(virtio_gpu_cursor_bh, g,
|
|
+ &qdev->mem_reentrancy_guard);
|
|
QTAILQ_INIT(&g->reslist);
|
|
QTAILQ_INIT(&g->cmdq);
|
|
QTAILQ_INIT(&g->fenceq);
|
|
diff --git a/hw/ide/ahci.c b/hw/ide/ahci.c
|
|
index a94c6e26fb..7488b28065 100644
|
|
--- a/hw/ide/ahci.c
|
|
+++ b/hw/ide/ahci.c
|
|
@@ -1504,7 +1504,8 @@ static void ahci_cmd_done(const IDEDMA *dma)
|
|
ahci_write_fis_d2h(ad);
|
|
|
|
if (ad->port_regs.cmd_issue && !ad->check_bh) {
|
|
- ad->check_bh = qemu_bh_new(ahci_check_cmd_bh, ad);
|
|
+ ad->check_bh = qemu_bh_new_guarded(ahci_check_cmd_bh, ad,
|
|
+ &ad->mem_reentrancy_guard);
|
|
qemu_bh_schedule(ad->check_bh);
|
|
}
|
|
}
|
|
diff --git a/hw/ide/ahci_internal.h b/hw/ide/ahci_internal.h
|
|
index 109de9e2d1..a7768dd69e 100644
|
|
--- a/hw/ide/ahci_internal.h
|
|
+++ b/hw/ide/ahci_internal.h
|
|
@@ -321,6 +321,7 @@ struct AHCIDevice {
|
|
bool init_d2h_sent;
|
|
AHCICmdHdr *cur_cmd;
|
|
NCQTransferState ncq_tfs[AHCI_MAX_CMDS];
|
|
+ MemReentrancyGuard mem_reentrancy_guard;
|
|
};
|
|
|
|
struct AHCIPCIState {
|
|
diff --git a/hw/ide/core.c b/hw/ide/core.c
|
|
index 15138225be..05a32d0a99 100644
|
|
--- a/hw/ide/core.c
|
|
+++ b/hw/ide/core.c
|
|
@@ -510,6 +510,7 @@ BlockAIOCB *ide_issue_trim(
|
|
BlockCompletionFunc *cb, void *cb_opaque, void *opaque)
|
|
{
|
|
IDEState *s = opaque;
|
|
+ IDEDevice *dev = s->unit ? s->bus->slave : s->bus->master;
|
|
TrimAIOCB *iocb;
|
|
|
|
/* Paired with a decrement in ide_trim_bh_cb() */
|
|
@@ -517,7 +518,8 @@ BlockAIOCB *ide_issue_trim(
|
|
|
|
iocb = blk_aio_get(&trim_aiocb_info, s->blk, cb, cb_opaque);
|
|
iocb->s = s;
|
|
- iocb->bh = qemu_bh_new(ide_trim_bh_cb, iocb);
|
|
+ iocb->bh = qemu_bh_new_guarded(ide_trim_bh_cb, iocb,
|
|
+ &DEVICE(dev)->mem_reentrancy_guard);
|
|
iocb->ret = 0;
|
|
iocb->qiov = qiov;
|
|
iocb->i = -1;
|
|
diff --git a/hw/misc/imx_rngc.c b/hw/misc/imx_rngc.c
|
|
index 632c03779c..082c6980ad 100644
|
|
--- a/hw/misc/imx_rngc.c
|
|
+++ b/hw/misc/imx_rngc.c
|
|
@@ -228,8 +228,10 @@ static void imx_rngc_realize(DeviceState *dev, Error **errp)
|
|
sysbus_init_mmio(sbd, &s->iomem);
|
|
|
|
sysbus_init_irq(sbd, &s->irq);
|
|
- s->self_test_bh = qemu_bh_new(imx_rngc_self_test, s);
|
|
- s->seed_bh = qemu_bh_new(imx_rngc_seed, s);
|
|
+ s->self_test_bh = qemu_bh_new_guarded(imx_rngc_self_test, s,
|
|
+ &dev->mem_reentrancy_guard);
|
|
+ s->seed_bh = qemu_bh_new_guarded(imx_rngc_seed, s,
|
|
+ &dev->mem_reentrancy_guard);
|
|
}
|
|
|
|
static void imx_rngc_reset(DeviceState *dev)
|
|
diff --git a/hw/misc/macio/mac_dbdma.c b/hw/misc/macio/mac_dbdma.c
|
|
index e220f1a927..f6a9e76fe7 100644
|
|
--- a/hw/misc/macio/mac_dbdma.c
|
|
+++ b/hw/misc/macio/mac_dbdma.c
|
|
@@ -912,7 +912,7 @@ static void mac_dbdma_realize(DeviceState *dev, Error **errp)
|
|
{
|
|
DBDMAState *s = MAC_DBDMA(dev);
|
|
|
|
- s->bh = qemu_bh_new(DBDMA_run_bh, s);
|
|
+ s->bh = qemu_bh_new_guarded(DBDMA_run_bh, s, &dev->mem_reentrancy_guard);
|
|
}
|
|
|
|
static void mac_dbdma_class_init(ObjectClass *oc, void *data)
|
|
diff --git a/hw/net/virtio-net.c b/hw/net/virtio-net.c
|
|
index 7e172ef829..ddaa8fa122 100644
|
|
--- a/hw/net/virtio-net.c
|
|
+++ b/hw/net/virtio-net.c
|
|
@@ -2753,7 +2753,8 @@ static void virtio_net_add_queue(VirtIONet *n, int index)
|
|
n->vqs[index].tx_vq =
|
|
virtio_add_queue(vdev, n->net_conf.tx_queue_size,
|
|
virtio_net_handle_tx_bh);
|
|
- n->vqs[index].tx_bh = qemu_bh_new(virtio_net_tx_bh, &n->vqs[index]);
|
|
+ n->vqs[index].tx_bh = qemu_bh_new_guarded(virtio_net_tx_bh, &n->vqs[index],
|
|
+ &DEVICE(vdev)->mem_reentrancy_guard);
|
|
}
|
|
|
|
n->vqs[index].tx_waiting = 0;
|
|
diff --git a/hw/scsi/mptsas.c b/hw/scsi/mptsas.c
|
|
index f6c7765544..ab8aaca85d 100644
|
|
--- a/hw/scsi/mptsas.c
|
|
+++ b/hw/scsi/mptsas.c
|
|
@@ -1313,7 +1313,8 @@ static void mptsas_scsi_realize(PCIDevice *dev, Error **errp)
|
|
}
|
|
s->max_devices = MPTSAS_NUM_PORTS;
|
|
|
|
- s->request_bh = qemu_bh_new(mptsas_fetch_requests, s);
|
|
+ s->request_bh = qemu_bh_new_guarded(mptsas_fetch_requests, s,
|
|
+ &DEVICE(dev)->mem_reentrancy_guard);
|
|
|
|
scsi_bus_init(&s->bus, sizeof(s->bus), &dev->qdev, &mptsas_scsi_info);
|
|
}
|
|
diff --git a/hw/scsi/scsi-bus.c b/hw/scsi/scsi-bus.c
|
|
index 77325d8cc7..b506ab7d04 100644
|
|
--- a/hw/scsi/scsi-bus.c
|
|
+++ b/hw/scsi/scsi-bus.c
|
|
@@ -192,7 +192,8 @@ static void scsi_dma_restart_cb(void *opaque, bool running, RunState state)
|
|
AioContext *ctx = blk_get_aio_context(s->conf.blk);
|
|
/* The reference is dropped in scsi_dma_restart_bh.*/
|
|
object_ref(OBJECT(s));
|
|
- s->bh = aio_bh_new(ctx, scsi_dma_restart_bh, s);
|
|
+ s->bh = aio_bh_new_guarded(ctx, scsi_dma_restart_bh, s,
|
|
+ &DEVICE(s)->mem_reentrancy_guard);
|
|
qemu_bh_schedule(s->bh);
|
|
}
|
|
}
|
|
diff --git a/hw/scsi/vmw_pvscsi.c b/hw/scsi/vmw_pvscsi.c
|
|
index cd76bd67ab..4c36febbc0 100644
|
|
--- a/hw/scsi/vmw_pvscsi.c
|
|
+++ b/hw/scsi/vmw_pvscsi.c
|
|
@@ -1178,7 +1178,8 @@ pvscsi_realizefn(PCIDevice *pci_dev, Error **errp)
|
|
pcie_endpoint_cap_init(pci_dev, PVSCSI_EXP_EP_OFFSET);
|
|
}
|
|
|
|
- s->completion_worker = qemu_bh_new(pvscsi_process_completion_queue, s);
|
|
+ s->completion_worker = qemu_bh_new_guarded(pvscsi_process_completion_queue, s,
|
|
+ &DEVICE(pci_dev)->mem_reentrancy_guard);
|
|
|
|
scsi_bus_init(&s->bus, sizeof(s->bus), DEVICE(pci_dev), &pvscsi_scsi_info);
|
|
/* override default SCSI bus hotplug-handler, with pvscsi's one */
|
|
diff --git a/hw/usb/dev-uas.c b/hw/usb/dev-uas.c
|
|
index 599d6b52a0..a36a7c3013 100644
|
|
--- a/hw/usb/dev-uas.c
|
|
+++ b/hw/usb/dev-uas.c
|
|
@@ -935,7 +935,8 @@ static void usb_uas_realize(USBDevice *dev, Error **errp)
|
|
|
|
QTAILQ_INIT(&uas->results);
|
|
QTAILQ_INIT(&uas->requests);
|
|
- uas->status_bh = qemu_bh_new(usb_uas_send_status_bh, uas);
|
|
+ uas->status_bh = qemu_bh_new_guarded(usb_uas_send_status_bh, uas,
|
|
+ &d->mem_reentrancy_guard);
|
|
|
|
dev->flags |= (1 << USB_DEV_FLAG_IS_SCSI_STORAGE);
|
|
scsi_bus_init(&uas->bus, sizeof(uas->bus), DEVICE(dev), &usb_uas_scsi_info);
|
|
diff --git a/hw/usb/hcd-dwc2.c b/hw/usb/hcd-dwc2.c
|
|
index e1d96acf7e..0e238f8422 100644
|
|
--- a/hw/usb/hcd-dwc2.c
|
|
+++ b/hw/usb/hcd-dwc2.c
|
|
@@ -1364,7 +1364,8 @@ static void dwc2_realize(DeviceState *dev, Error **errp)
|
|
s->fi = USB_FRMINTVL - 1;
|
|
s->eof_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL, dwc2_frame_boundary, s);
|
|
s->frame_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL, dwc2_work_timer, s);
|
|
- s->async_bh = qemu_bh_new(dwc2_work_bh, s);
|
|
+ s->async_bh = qemu_bh_new_guarded(dwc2_work_bh, s,
|
|
+ &dev->mem_reentrancy_guard);
|
|
|
|
sysbus_init_irq(sbd, &s->irq);
|
|
}
|
|
diff --git a/hw/usb/hcd-ehci.c b/hw/usb/hcd-ehci.c
|
|
index 6caa7ac6c2..df4ff6f2c1 100644
|
|
--- a/hw/usb/hcd-ehci.c
|
|
+++ b/hw/usb/hcd-ehci.c
|
|
@@ -2528,7 +2528,8 @@ void usb_ehci_realize(EHCIState *s, DeviceState *dev, Error **errp)
|
|
}
|
|
|
|
s->frame_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL, ehci_work_timer, s);
|
|
- s->async_bh = qemu_bh_new(ehci_work_bh, s);
|
|
+ s->async_bh = qemu_bh_new_guarded(ehci_work_bh, s,
|
|
+ &dev->mem_reentrancy_guard);
|
|
s->device = dev;
|
|
|
|
s->vmstate = qemu_add_vm_change_state_handler(usb_ehci_vm_state_change, s);
|
|
diff --git a/hw/usb/hcd-uhci.c b/hw/usb/hcd-uhci.c
|
|
index 7930b868fa..469c5e57e9 100644
|
|
--- a/hw/usb/hcd-uhci.c
|
|
+++ b/hw/usb/hcd-uhci.c
|
|
@@ -1195,7 +1195,7 @@ void usb_uhci_common_realize(PCIDevice *dev, Error **errp)
|
|
USB_SPEED_MASK_LOW | USB_SPEED_MASK_FULL);
|
|
}
|
|
}
|
|
- s->bh = qemu_bh_new(uhci_bh, s);
|
|
+ s->bh = qemu_bh_new_guarded(uhci_bh, s, &DEVICE(dev)->mem_reentrancy_guard);
|
|
s->frame_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL, uhci_frame_timer, s);
|
|
s->num_ports_vmstate = NB_PORTS;
|
|
QTAILQ_INIT(&s->queues);
|
|
diff --git a/hw/usb/host-libusb.c b/hw/usb/host-libusb.c
|
|
index d0d46dd0a4..09b961116b 100644
|
|
--- a/hw/usb/host-libusb.c
|
|
+++ b/hw/usb/host-libusb.c
|
|
@@ -1141,7 +1141,8 @@ static void usb_host_nodev_bh(void *opaque)
|
|
static void usb_host_nodev(USBHostDevice *s)
|
|
{
|
|
if (!s->bh_nodev) {
|
|
- s->bh_nodev = qemu_bh_new(usb_host_nodev_bh, s);
|
|
+ s->bh_nodev = qemu_bh_new_guarded(usb_host_nodev_bh, s,
|
|
+ &DEVICE(s)->mem_reentrancy_guard);
|
|
}
|
|
qemu_bh_schedule(s->bh_nodev);
|
|
}
|
|
@@ -1739,7 +1740,8 @@ static int usb_host_post_load(void *opaque, int version_id)
|
|
USBHostDevice *dev = opaque;
|
|
|
|
if (!dev->bh_postld) {
|
|
- dev->bh_postld = qemu_bh_new(usb_host_post_load_bh, dev);
|
|
+ dev->bh_postld = qemu_bh_new_guarded(usb_host_post_load_bh, dev,
|
|
+ &DEVICE(dev)->mem_reentrancy_guard);
|
|
}
|
|
qemu_bh_schedule(dev->bh_postld);
|
|
dev->bh_postld_pending = true;
|
|
diff --git a/hw/usb/redirect.c b/hw/usb/redirect.c
|
|
index 5f0ef9cb3b..59cd3cd7c4 100644
|
|
--- a/hw/usb/redirect.c
|
|
+++ b/hw/usb/redirect.c
|
|
@@ -1437,8 +1437,10 @@ static void usbredir_realize(USBDevice *udev, Error **errp)
|
|
}
|
|
}
|
|
|
|
- dev->chardev_close_bh = qemu_bh_new(usbredir_chardev_close_bh, dev);
|
|
- dev->device_reject_bh = qemu_bh_new(usbredir_device_reject_bh, dev);
|
|
+ dev->chardev_close_bh = qemu_bh_new_guarded(usbredir_chardev_close_bh, dev,
|
|
+ &DEVICE(dev)->mem_reentrancy_guard);
|
|
+ dev->device_reject_bh = qemu_bh_new_guarded(usbredir_device_reject_bh, dev,
|
|
+ &DEVICE(dev)->mem_reentrancy_guard);
|
|
dev->attach_timer = timer_new_ms(QEMU_CLOCK_VIRTUAL, usbredir_do_attach, dev);
|
|
|
|
packet_id_queue_init(&dev->cancelled, dev, "cancelled");
|
|
diff --git a/hw/usb/xen-usb.c b/hw/usb/xen-usb.c
|
|
index 0f7369e7ed..dec91294ad 100644
|
|
--- a/hw/usb/xen-usb.c
|
|
+++ b/hw/usb/xen-usb.c
|
|
@@ -1021,7 +1021,8 @@ static void usbback_alloc(struct XenLegacyDevice *xendev)
|
|
|
|
QTAILQ_INIT(&usbif->req_free_q);
|
|
QSIMPLEQ_INIT(&usbif->hotplug_q);
|
|
- usbif->bh = qemu_bh_new(usbback_bh, usbif);
|
|
+ usbif->bh = qemu_bh_new_guarded(usbback_bh, usbif,
|
|
+ &DEVICE(xendev)->mem_reentrancy_guard);
|
|
}
|
|
|
|
static int usbback_free(struct XenLegacyDevice *xendev)
|
|
diff --git a/hw/virtio/virtio-balloon.c b/hw/virtio/virtio-balloon.c
|
|
index 9a4f491b54..f503572e27 100644
|
|
--- a/hw/virtio/virtio-balloon.c
|
|
+++ b/hw/virtio/virtio-balloon.c
|
|
@@ -917,8 +917,9 @@ static void virtio_balloon_device_realize(DeviceState *dev, Error **errp)
|
|
precopy_add_notifier(&s->free_page_hint_notify);
|
|
|
|
object_ref(OBJECT(s->iothread));
|
|
- s->free_page_bh = aio_bh_new(iothread_get_aio_context(s->iothread),
|
|
- virtio_ballloon_get_free_page_hints, s);
|
|
+ s->free_page_bh = aio_bh_new_guarded(iothread_get_aio_context(s->iothread),
|
|
+ virtio_ballloon_get_free_page_hints, s,
|
|
+ &dev->mem_reentrancy_guard);
|
|
}
|
|
|
|
if (virtio_has_feature(s->host_features, VIRTIO_BALLOON_F_REPORTING)) {
|
|
diff --git a/hw/virtio/virtio-crypto.c b/hw/virtio/virtio-crypto.c
|
|
index 54f9bbb789..1be7bb543c 100644
|
|
--- a/hw/virtio/virtio-crypto.c
|
|
+++ b/hw/virtio/virtio-crypto.c
|
|
@@ -817,7 +817,8 @@ static void virtio_crypto_device_realize(DeviceState *dev, Error **errp)
|
|
vcrypto->vqs[i].dataq =
|
|
virtio_add_queue(vdev, 1024, virtio_crypto_handle_dataq_bh);
|
|
vcrypto->vqs[i].dataq_bh =
|
|
- qemu_bh_new(virtio_crypto_dataq_bh, &vcrypto->vqs[i]);
|
|
+ qemu_bh_new_guarded(virtio_crypto_dataq_bh, &vcrypto->vqs[i],
|
|
+ &dev->mem_reentrancy_guard);
|
|
vcrypto->vqs[i].vcrypto = vcrypto;
|
|
}
|
|
|
|
--
|
|
2.37.3
|
|
|