diff options
author | Christian Borntraeger <borntraeger@de.ibm.com> | 2010-01-21 12:19:07 +0100 |
---|---|---|
committer | Marcelo Tosatti <mtosatti@redhat.com> | 2010-01-25 12:26:39 -0200 |
commit | 062d5e9b0d714f449b261bb522eadaaf6f00f438 (patch) | |
tree | cd0e9b7e7449a2b067614865998218fd4462e581 /arch/x86 | |
parent | b6a114d27273c37cd0107b0f49af208168498f05 (diff) | |
download | op-kernel-dev-062d5e9b0d714f449b261bb522eadaaf6f00f438.zip op-kernel-dev-062d5e9b0d714f449b261bb522eadaaf6f00f438.tar.gz |
KVM: S390: fix potential array overrun in intercept handling
kvm_handle_sie_intercept uses a jump table to get the intercept handler
for a SIE intercept. Static code analysis revealed a potential problem:
the intercept_funcs jump table was defined to contain (0x48 >> 2) entries,
but we only checked for code > 0x48 which would cause an off-by-one
array overflow if code == 0x48.
Use the compiler and ARRAY_SIZE to automatically set the limits.
Cc: stable@kernel.org
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Diffstat (limited to 'arch/x86')
0 files changed, 0 insertions, 0 deletions