qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
* [Qemu-devel] [PATCH] virtio-balloon: Tweak recent fix for integer overflow
@ 2014-10-01 16:43 Markus Armbruster
  2014-10-01 16:48 ` Eric Blake
  2014-10-09 13:49 ` Luiz Capitulino
  0 siblings, 2 replies; 3+ messages in thread
From: Markus Armbruster @ 2014-10-01 16:43 UTC (permalink / raw)
  To: qemu-devel; +Cc: lcapitulino

Commit 1f9296b avoids "other kinds of overflow" by limiting the
polling interval to UINT_MAX.  The computations to protect are done in
64 bits.  This is indeed safe when unsigned is 32 bits, as it commonly
is.  It isn't when unsigned is 64 bits.  Purely theoretical; I'm not
aware of such a system.  Limit it to UINT32_MAX instead.

Signed-off-by: Markus Armbruster <armbru@redhat.com>
---
 hw/virtio/virtio-balloon.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/hw/virtio/virtio-balloon.c b/hw/virtio/virtio-balloon.c
index b5cf7ca..7bfbb75 100644
--- a/hw/virtio/virtio-balloon.c
+++ b/hw/virtio/virtio-balloon.c
@@ -170,7 +170,7 @@ static void balloon_stats_set_poll_interval(Object *obj, struct Visitor *v,
         return;
     }
 
-    if (value > UINT_MAX) {
+    if (value > UINT32_MAX) {
         error_setg(errp, "timer value is too big");
         return;
     }
-- 
1.9.3

^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: [Qemu-devel] [PATCH] virtio-balloon: Tweak recent fix for integer overflow
  2014-10-01 16:43 [Qemu-devel] [PATCH] virtio-balloon: Tweak recent fix for integer overflow Markus Armbruster
@ 2014-10-01 16:48 ` Eric Blake
  2014-10-09 13:49 ` Luiz Capitulino
  1 sibling, 0 replies; 3+ messages in thread
From: Eric Blake @ 2014-10-01 16:48 UTC (permalink / raw)
  To: Markus Armbruster, qemu-devel; +Cc: lcapitulino

[-- Attachment #1: Type: text/plain, Size: 1325 bytes --]

On 10/01/2014 10:43 AM, Markus Armbruster wrote:
> Commit 1f9296b avoids "other kinds of overflow" by limiting the
> polling interval to UINT_MAX.  The computations to protect are done in
> 64 bits.  This is indeed safe when unsigned is 32 bits, as it commonly
> is.  It isn't when unsigned is 64 bits.  Purely theoretical; I'm not
> aware of such a system.  Limit it to UINT32_MAX instead.
> 
> Signed-off-by: Markus Armbruster <armbru@redhat.com>
> ---
>  hw/virtio/virtio-balloon.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)

Reviewed-by: Eric Blake <eblake@redhat.com>

Harmless sanity addition (I seriously doubt at this point that anyone
would ever introduce a platform where 'int' is larger than 32 bits)

> 
> diff --git a/hw/virtio/virtio-balloon.c b/hw/virtio/virtio-balloon.c
> index b5cf7ca..7bfbb75 100644
> --- a/hw/virtio/virtio-balloon.c
> +++ b/hw/virtio/virtio-balloon.c
> @@ -170,7 +170,7 @@ static void balloon_stats_set_poll_interval(Object *obj, struct Visitor *v,
>          return;
>      }
>  
> -    if (value > UINT_MAX) {
> +    if (value > UINT32_MAX) {
>          error_setg(errp, "timer value is too big");
>          return;
>      }
> 

-- 
Eric Blake   eblake redhat com    +1-919-301-3266
Libvirt virtualization library http://libvirt.org


[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 539 bytes --]

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [Qemu-devel] [PATCH] virtio-balloon: Tweak recent fix for integer overflow
  2014-10-01 16:43 [Qemu-devel] [PATCH] virtio-balloon: Tweak recent fix for integer overflow Markus Armbruster
  2014-10-01 16:48 ` Eric Blake
@ 2014-10-09 13:49 ` Luiz Capitulino
  1 sibling, 0 replies; 3+ messages in thread
From: Luiz Capitulino @ 2014-10-09 13:49 UTC (permalink / raw)
  To: Markus Armbruster; +Cc: qemu-devel

On Wed,  1 Oct 2014 18:43:44 +0200
Markus Armbruster <armbru@redhat.com> wrote:

> Commit 1f9296b avoids "other kinds of overflow" by limiting the
> polling interval to UINT_MAX.  The computations to protect are done in
> 64 bits.  This is indeed safe when unsigned is 32 bits, as it commonly
> is.  It isn't when unsigned is 64 bits.  Purely theoretical; I'm not
> aware of such a system.  Limit it to UINT32_MAX instead.
> 
> Signed-off-by: Markus Armbruster <armbru@redhat.com>

Applied to the qmp branch, thanks.

> ---
>  hw/virtio/virtio-balloon.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/hw/virtio/virtio-balloon.c b/hw/virtio/virtio-balloon.c
> index b5cf7ca..7bfbb75 100644
> --- a/hw/virtio/virtio-balloon.c
> +++ b/hw/virtio/virtio-balloon.c
> @@ -170,7 +170,7 @@ static void balloon_stats_set_poll_interval(Object *obj, struct Visitor *v,
>          return;
>      }
>  
> -    if (value > UINT_MAX) {
> +    if (value > UINT32_MAX) {
>          error_setg(errp, "timer value is too big");
>          return;
>      }

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2014-10-09 14:09 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-10-01 16:43 [Qemu-devel] [PATCH] virtio-balloon: Tweak recent fix for integer overflow Markus Armbruster
2014-10-01 16:48 ` Eric Blake
2014-10-09 13:49 ` Luiz Capitulino

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).