[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20250627090507.808319-1-maobibo@loongson.cn>
Date: Fri, 27 Jun 2025 17:05:01 +0800
From: Bibo Mao <maobibo@...ngson.cn>
To: Tianrui Zhao <zhaotianrui@...ngson.cn>,
Huacai Chen <chenhuacai@...nel.org>,
Xianglai Li <lixianglai@...ngson.cn>
Cc: kvm@...r.kernel.org,
loongarch@...ts.linux.dev,
linux-kernel@...r.kernel.org
Subject: [PATCH v4 0/6] LoongArch: KVM: Fixes with eiointc emulation
This series fix five issues about kernel eiointc emulation list as
follows:
1. The first patch fixes type forced assignment issue.
2. The second patch fixes interrupt route with physical cpu.
3. The third patch disables update property num_cpu and feature
4. The fourth patch adds validation check about num_cpu from user
space.
5. Overflow with array index when emulate register EIOINTC_ENABLE
writing operation.
6. The sixth patch adds address alignment check
---
v3 ... v4:
1. Remove patch about enhancement and only keep bugfix relative
patches.
2. Remove INTC indication in the patch title.
3. With access size, keep default case unchanged besides 1/2/4/8 since
here all patches are bugfix
4. Firstly check return value of copy_from_user() with error path,
keep the same order with old patch in patch 4.
v2 ... v3:
1. Add prefix INTC: in title of every patch.
2. Fix array index overflow when emulate register EIOINTC_ENABLE
writing operation.
3. Add address alignment check with eiointc register access operation.
v1 ... v2:
1. Add extra fix in patch 3 and patch 4, add num_cpu validation check
2. Name of stat information keeps unchanged, only move it from VM stat
to vCPU stat.
---
Bibo Mao (6):
LoongArch: KVM: Fix interrupt route update with eiointc
LoongArch: KVM: Check interrupt route from physical cpu
LoongArch: KVM: Disable update property num_cpu and feature
LoongArch: KVM: Check validation of num_cpu from user space
LoongArch: KVM: Avoid overflow with array index
LoongArch: KVM: Add address alignment check
arch/loongarch/kvm/intc/eiointc.c | 96 ++++++++++++++++++++++---------
1 file changed, 68 insertions(+), 28 deletions(-)
base-commit: f02769e7f272d6f42b9767f066c5a99afd2338f3
--
2.39.3
Powered by blists - more mailing lists