msix: Prevent bogus mask updates on MMIO accesses
>From: Jan Kiszka <jan.kiszka@siemens.com> Only accesses to the MSI-X table must trigger a call to msix_handle_mask_update, otherwise the vector value might be out of range. Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com> Signed-off-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
This commit is contained in:
parent
50322249fd
commit
9a93b61730
@ -176,6 +176,12 @@ static void msix_mmio_write(void *opaque, target_phys_addr_t addr,
|
|||||||
PCIDevice *dev = opaque;
|
PCIDevice *dev = opaque;
|
||||||
unsigned int offset = addr & (MSIX_PAGE_SIZE - 1) & ~0x3;
|
unsigned int offset = addr & (MSIX_PAGE_SIZE - 1) & ~0x3;
|
||||||
int vector = offset / PCI_MSIX_ENTRY_SIZE;
|
int vector = offset / PCI_MSIX_ENTRY_SIZE;
|
||||||
|
|
||||||
|
/* MSI-X page includes a read-only PBA and a writeable Vector Control. */
|
||||||
|
if (vector >= dev->msix_entries_nr) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
pci_set_long(dev->msix_table_page + offset, val);
|
pci_set_long(dev->msix_table_page + offset, val);
|
||||||
msix_handle_mask_update(dev, vector);
|
msix_handle_mask_update(dev, vector);
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user