Commit 9f3191ae authored by Jan Kiszka's avatar Jan Kiszka Committed by Avi Kivity

KVM: Fix off-by-one in overflow check of KVM_ASSIGN_SET_MSIX_NR

KVM_MAX_MSIX_PER_DEV implies that up to that many MSI-X entries can be
requested. But the kernel so far rejected already the upper limit.
Signed-off-by: default avatarJan Kiszka <jan.kiszka@siemens.com>
Signed-off-by: default avatarAvi Kivity <avi@redhat.com>
parent 1dda606c
...@@ -617,7 +617,7 @@ static int kvm_vm_ioctl_set_msix_nr(struct kvm *kvm, ...@@ -617,7 +617,7 @@ static int kvm_vm_ioctl_set_msix_nr(struct kvm *kvm,
if (adev->entries_nr == 0) { if (adev->entries_nr == 0) {
adev->entries_nr = entry_nr->entry_nr; adev->entries_nr = entry_nr->entry_nr;
if (adev->entries_nr == 0 || if (adev->entries_nr == 0 ||
adev->entries_nr >= KVM_MAX_MSIX_PER_DEV) { adev->entries_nr > KVM_MAX_MSIX_PER_DEV) {
r = -EINVAL; r = -EINVAL;
goto msix_nr_out; goto msix_nr_out;
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment