diff options
author | Marc Zyngier <marc.zyngier@arm.com> | 2015-06-17 14:43:35 +0100 |
---|---|---|
committer | Marc Zyngier <marc.zyngier@arm.com> | 2015-06-17 15:18:59 +0100 |
commit | 4839ddc27b7212ec58874f62c97da7400c8523be (patch) | |
tree | 5278f3b4580f010ed2ca9692cefd25d1ab591123 /init/main.c | |
parent | 4642019dc4457486223e1fb75a6a4cba6e0e903a (diff) |
KVM: arm/arm64: vgic: Avoid injecting reserved IRQ numbers
Commit fd1d0ddf2ae9 (KVM: arm/arm64: check IRQ number on userland
injection) rightly limited the range of interrupts userspace can
inject in a guest, but failed to consider the (unlikely) case where
a guest is configured with 1024 interrupts.
In this case, interrupts ranging from 1020 to 1023 are unuseable,
as they have a special meaning for the GIC CPU interface.
Make sure that these number cannot be used as an IRQ. Also delete
a redundant (and similarily buggy) check in kvm_set_irq.
Reported-by: Peter Maydell <peter.maydell@linaro.org>
Cc: Andre Przywara <andre.przywara@arm.com>
Cc: <stable@vger.kernel.org> # 4.1, 4.0, 3.19, 3.18
Signed-off-by: Marc Zyngier <marc.zyngier@arm.com>
Diffstat (limited to 'init/main.c')
0 files changed, 0 insertions, 0 deletions