msix: Prevent bogus mask updates on MMIO accesses
>From: Jan Kiszka <jan.kiszka@siemens.com> Only accesses to the MSI-X table must trigger a call to msix_handle_mask_update, otherwise the vector value might be out of range. Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com> Signed-off-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
This commit is contained in:
		
							parent
							
								
									50322249fd
								
							
						
					
					
						commit
						9a93b61730
					
				@ -176,6 +176,12 @@ static void msix_mmio_write(void *opaque, target_phys_addr_t addr,
 | 
			
		||||
    PCIDevice *dev = opaque;
 | 
			
		||||
    unsigned int offset = addr & (MSIX_PAGE_SIZE - 1) & ~0x3;
 | 
			
		||||
    int vector = offset / PCI_MSIX_ENTRY_SIZE;
 | 
			
		||||
 | 
			
		||||
    /* MSI-X page includes a read-only PBA and a writeable Vector Control. */
 | 
			
		||||
    if (vector >= dev->msix_entries_nr) {
 | 
			
		||||
        return;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    pci_set_long(dev->msix_table_page + offset, val);
 | 
			
		||||
    msix_handle_mask_update(dev, vector);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user