[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] x86: fix an off-by-one pirq range check



>>> On 30.06.10 at 18:16, Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> wrote:
> On Wed, Jun 30, 2010 at 07:37:26AM +0100, Jan Beulich wrote:
>> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
> 
> Won't that make PV guest with only one IRQ passed through unable to ACK it?
> (and if the IRQ is not shared that is).

Why would you think so? In such a case, nr_pirqs would be 1, and the
only permitted pirq would be 0. All other places do the range checks
correctly, just this one would let through an out of bounds number.

Jan

> This code does get executed when the PHYSDEVOP_eoi hypercall is made I
> believe.
>> 
>> --- 2010-06-15.orig/xen/arch/x86/irq.c       2010-06-15 13:23:00.000000000 
>> +0200
>> +++ 2010-06-15/xen/arch/x86/irq.c    2010-06-29 10:15:13.000000000 +0200
>> @@ -1027,7 +1027,7 @@ static void __pirq_guest_eoi(struct doma
>>  
>>  int pirq_guest_eoi(struct domain *d, int irq)
>>  {
>> -    if ( (irq < 0) || (irq > d->nr_pirqs) )
>> +    if ( (irq < 0) || (irq >= d->nr_pirqs) )
>>          return -EINVAL;
>>  
>>      __pirq_guest_eoi(d, irq);
>> 
>> 
>> 
>> 
>> _______________________________________________
>> Xen-devel mailing list
>> Xen-devel@xxxxxxxxxxxxxxxxxxx 
>> http://lists.xensource.com/xen-devel 




_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.