From nobody Sun Nov 9 20:21:48 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=redhat.com Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1552026372379972.5351410377422; Thu, 7 Mar 2019 22:26:12 -0800 (PST) Received: from localhost ([127.0.0.1]:37875 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1h28xJ-0000ZE-RN for importer@patchew.org; Fri, 08 Mar 2019 01:26:05 -0500 Received: from eggs.gnu.org ([209.51.188.92]:60093) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1h28wN-00007l-3g for qemu-devel@nongnu.org; Fri, 08 Mar 2019 01:25:08 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1h28wM-00038R-57 for qemu-devel@nongnu.org; Fri, 08 Mar 2019 01:25:07 -0500 Received: from mx1.redhat.com ([209.132.183.28]:49364) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1h28wJ-00033C-LP; Fri, 08 Mar 2019 01:25:03 -0500 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 521BE81E15; Fri, 8 Mar 2019 06:25:02 +0000 (UTC) Received: from blackfin.pond.sub.org (ovpn-116-92.ams2.redhat.com [10.36.116.92]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 3632B600C8; Fri, 8 Mar 2019 06:24:57 +0000 (UTC) Received: by blackfin.pond.sub.org (Postfix, from userid 1000) id 98CA31138660; Fri, 8 Mar 2019 07:24:55 +0100 (CET) From: Markus Armbruster To: qemu-devel@nongnu.org Date: Fri, 8 Mar 2019 07:24:55 +0100 Message-Id: <20190308062455.29755-1-armbru@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Fri, 08 Mar 2019 06:25:02 +0000 (UTC) Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-Received-From: 209.132.183.28 Subject: [Qemu-devel] [PATCH v7] pflash: Require backend size to match device, improve errors X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: kwolf@redhat.com, qemu-block@nongnu.org, alex.bennee@linaro.org, philmd@redhat.com, mreitz@redhat.com, lersek@redhat.com Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Type: text/plain; charset="utf-8" From: Alex Benn=C3=A9e We reject undersized backends with a rather enigmatic "failed to read the initial flash content" error. We happily accept oversized images, ignoring their tail. Throwing away parts of firmware that way is pretty much certain to end in an even more enigmatic failure to boot. Require the backend's size to match the device's size exactly. Report mismatch as "device requires N bytes, block backend 'NAME' provides M bytes". Improve the error for actual read failures to "can't read initial flash content from block backend 'NAME'. We disabled code to limit device sizes to 8, 16, 32 or 64MiB more than a decade ago in commit 95d1f3edd5e and c8b153d7949, v0.9.1. Bury. Signed-off-by: Alex Benn=C3=A9e Signed-off-by: Markus Armbruster --- hw/block/pflash_cfi01.c | 31 ++++++++++++++++++++++--------- hw/block/pflash_cfi02.c | 31 +++++++++++++++++++++++-------- 2 files changed, 45 insertions(+), 17 deletions(-) diff --git a/hw/block/pflash_cfi01.c b/hw/block/pflash_cfi01.c index 9d1c356eb6..2e3a05c0b3 100644 --- a/hw/block/pflash_cfi01.c +++ b/hw/block/pflash_cfi01.c @@ -730,13 +730,6 @@ static void pflash_cfi01_realize(DeviceState *dev, Err= or **errp) } device_len =3D sector_len_per_device * blocks_per_device; =20 - /* XXX: to be fixed */ -#if 0 - if (total_len !=3D (8 * 1024 * 1024) && total_len !=3D (16 * 1024 * 10= 24) && - total_len !=3D (32 * 1024 * 1024) && total_len !=3D (64 * 1024 * 1= 024)) - return NULL; -#endif - memory_region_init_rom_device( &pfl->mem, OBJECT(dev), &pflash_cfi01_ops, @@ -763,12 +756,32 @@ static void pflash_cfi01_realize(DeviceState *dev, Er= ror **errp) } =20 if (pfl->blk) { + /* + * Validate the backing store is the right size for pflash + * devices. If the user supplies a larger file we ignore the + * tail. + */ + int64_t backing_len =3D blk_getlength(pfl->blk); + + if (backing_len < 0) { + error_setg(errp, "can't get size of block backend '%s'", + blk_name(pfl->blk)); + return; + } + if (backing_len !=3D total_len) { + error_setg(errp, "device requires %" PRIu64 " bytes, " + "block backend '%s' provides %" PRIu64 " bytes", + total_len, blk_name(pfl->blk), backing_len); + return; + } + /* read the initial flash content */ ret =3D blk_pread(pfl->blk, 0, pfl->storage, total_len); - if (ret < 0) { vmstate_unregister_ram(&pfl->mem, DEVICE(pfl)); - error_setg(errp, "failed to read the initial flash content"); + error_setg(errp, "can't read initial flash content" + " from block backend '%s'", + blk_name(pfl->blk)); return; } } diff --git a/hw/block/pflash_cfi02.c b/hw/block/pflash_cfi02.c index 33779ce807..45b88d65d8 100644 --- a/hw/block/pflash_cfi02.c +++ b/hw/block/pflash_cfi02.c @@ -550,12 +550,6 @@ static void pflash_cfi02_realize(DeviceState *dev, Err= or **errp) } =20 chip_len =3D pfl->sector_len * pfl->nb_blocs; - /* XXX: to be fixed */ -#if 0 - if (total_len !=3D (8 * 1024 * 1024) && total_len !=3D (16 * 1024 * 10= 24) && - total_len !=3D (32 * 1024 * 1024) && total_len !=3D (64 * 1024 * 1= 024)) - return NULL; -#endif =20 memory_region_init_rom_device(&pfl->orig_mem, OBJECT(pfl), pfl->be ? &pflash_cfi02_ops_be : &pflash_cfi02_ops= _le, @@ -581,11 +575,32 @@ static void pflash_cfi02_realize(DeviceState *dev, Er= ror **errp) } =20 if (pfl->blk) { + /* + * Validate the backing store is the right size for pflash + * devices. If the user supplies a larger file we ignore the + * tail. + */ + int64_t backing_len =3D blk_getlength(pfl->blk); + + if (backing_len < 0) { + error_setg(errp, "can't get size of block backend '%s'", + blk_name(pfl->blk)); + return; + } + if (backing_len !=3D chip_len) { + error_setg(errp, "device requires %" PRIu32 " bytes, " + "block backend '%s' provides %" PRIu64 " bytes", + chip_len, blk_name(pfl->blk), backing_len); + return; + } + /* read the initial flash content */ ret =3D blk_pread(pfl->blk, 0, pfl->storage, chip_len); if (ret < 0) { - vmstate_unregister_ram(&pfl->orig_mem, DEVICE(pfl)); - error_setg(errp, "failed to read the initial flash content"); + vmstate_unregister_ram(&pfl->mem, DEVICE(pfl)); + error_setg(errp, "can't read initial flash content" + " from block backend '%s'", + blk_name(pfl->blk)); return; } } --=20 2.17.2