hw/i386/intel_iommu: Fix out-of-bounds access on guest IRT
vtd_irte_get failed to check the index against the configured table size, causing an out-of-bounds access on guest memory and potentially misinterpreting the result. Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com> Message-Id: <4b15b728-bdfe-3bbe-3a5c-ca3baeef3c5c@siemens.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
This commit is contained in:
parent
6c94b95274
commit
3c507c26ec
@ -3094,6 +3094,12 @@ static int vtd_irte_get(IntelIOMMUState *iommu, uint16_t index,
|
||||
uint16_t mask, source_id;
|
||||
uint8_t bus, bus_max, bus_min;
|
||||
|
||||
if (index >= iommu->intr_size) {
|
||||
error_report_once("%s: index too large: ind=0x%x",
|
||||
__func__, index);
|
||||
return -VTD_FR_IR_INDEX_OVER;
|
||||
}
|
||||
|
||||
addr = iommu->intr_root + index * sizeof(*entry);
|
||||
if (dma_memory_read(&address_space_memory, addr, entry,
|
||||
sizeof(*entry))) {
|
||||
|
Loading…
Reference in New Issue
Block a user