qemu/intel_iommu-Send-IQE-event-when-setting-reserved-bit.patch

40 lines
1.5 KiB
Diff
Raw Normal View History

QEMU update to version 6.2.0-103: - Introduce the SM4 cipher algorithms (OSCCA GB/T 32907-2016). - intel_iommu: Add missed sanity check for 256-bit invalidation queue - linux-user: use 'max' instead of 'qemu32' / 'qemu64' by default - chardev/baum: Use definitions to avoid dynamic stack allocation - ui/console: Get tab completion working again in the SDL monitor vc - s390x/tcg: Fix opcode for lzrf - virtiofsd: use g_date_time_get_microsecond to get subsecond - ui/curses: Avoid dynamic stack allocation - target/m68k: always call gen_exit_tb() after writes to SR - target/m68k: Perform writback before modifying SR - target/m68k: Fix MACSR to CCR - target/m68k: Implement atomic test-and-set - block/nvme: nvme_process_completion() fix bound for cid - hw/pci-host: pnv_phb{3, 4}: Fix heap out-of-bound access failure - target/ppc: Zero second doubleword of VSR registers for FPR insns - target/ppc: Set OV32 when OV is set - target/ppc: Zero second doubleword for VSX madd instructions - target/ppc: Set result to QNaN for DENBCD when VXCVI occurs - hw/pci: Add parenthesis to PCI_BUILD_BDF macro - intel_iommu: Send IQE event when setting reserved bit in IQT_TAIL - acpi: cpuhp: fix guest-visible maximum access size to the legacy reg block - acpi: ged: Add macro for acpi sleep control register - hw/pci-bridge: Add a Kconfig switch for the normal PCI bridge - ui/vnc: fix handling of VNC_FEATURE_XVP - s390/sclp: fix SCLP facility map - docs/tools/qemu-img.rst: fix typo (sumarizes) - chardev/char: fix qemu_chr_is_busy() check - edu: fix DMA range upper bound check - platform-bus: fix refcount leak - hw/net/virtio-net: fix qemu set used ring flag even vhost started - hw/net/can/sja1000: fix bug for single acceptance filter and standard frame - tests/avocado: fix typo in replay_linux - util/userfaultfd: Remove unused uffd_poll_events - hw/core/ptimer: fix timer zero period condition for freq > 1GHz - hcd-ohci: Drop ohci_service_iso_td() if ed->head & OHCI_DPTR_MASK is zero - tests/unit/test-vmstate: Avoid dynamic stack allocation - hw/usb/hcd-ohci: Use definition to avoid dynamic stack allocation - hw/i386/multiboot: Avoid dynamic stack allocation - hw/ppc/spapr: Fix code style problems reported by checkpatch - chardev/baum: Replace magic values by X_MAX / Y_MAX definitions - hw/intc/xics: Avoid dynamic stack allocation - hw/net/e1000e_core: Use definition to avoid dynamic stack allocation - intel_iommu: Fix invalidation descriptor type field - configs: Fix typo in the sh4-softmmu devices config file Signed-off-by: Jiabo Feng <fengjiabo1@huawei.com> (cherry picked from commit 9813ed21ec2499c50cb58ac5fb114a1641708eb2)
2024-11-30 09:13:10 +08:00
From aa81e4e3f5d02bd8e8012df677452c4a8b208ac7 Mon Sep 17 00:00:00 2001
From: Zhenzhong Duan <zhenzhong.duan@intel.com>
Date: Mon, 4 Nov 2024 20:55:34 +0800
Subject: [PATCH] intel_iommu: Send IQE event when setting reserved bit in
IQT_TAIL
According to VTD spec, Figure 11-22, Invalidation Queue Tail Register,
"When Descriptor Width (DW) field in Invalidation Queue Address Register
(IQA_REG) is Set (256-bit descriptors), hardware treats bit-4 as reserved
and a value of 1 in the bit will result in invalidation queue error."
Current code missed to send IQE event to guest, fix it.
Fixes: c0c1d351849b ("intel_iommu: add 256 bits qi_desc support")
Suggested-by: Yi Liu <yi.l.liu@intel.com>
Signed-off-by: Zhenzhong Duan <zhenzhong.duan@intel.com>
Message-Id: <20241104125536.1236118-2-zhenzhong.duan@intel.com>
Reviewed-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Zhongrui Tang <tangzhongrui_yewu@cmss.chinamobile.com>
---
hw/i386/intel_iommu.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/hw/i386/intel_iommu.c b/hw/i386/intel_iommu.c
index 2f8bcc1557..deb853e1ea 100644
--- a/hw/i386/intel_iommu.c
+++ b/hw/i386/intel_iommu.c
@@ -2605,6 +2605,7 @@ static void vtd_handle_iqt_write(IntelIOMMUState *s)
if (s->iq_dw && (val & VTD_IQT_QT_256_RSV_BIT)) {
error_report_once("%s: RSV bit is set: val=0x%"PRIx64,
__func__, val);
+ vtd_handle_inv_queue_error(s);
return;
}
s->iq_tail = VTD_IQT_QT(s->iq_dw, val);
--
2.41.0.windows.1