|
From: | Avi Kivity |
Subject: | Re: [Qemu-devel] [PATCH] Fix subtle integer overflow bug in memory API |
Date: | Thu, 15 Sep 2011 10:28:42 +0300 |
User-agent: | Mozilla/5.0 (X11; Linux i686 on x86_64; rv:6.0.2) Gecko/20110906 Thunderbird/6.0.2 |
On 09/15/2011 05:58 AM, David Gibson wrote:
> Well.. I'm pretty sure that particular case can no longer be > triggered. But there may be other integer overflow bugs in this code, > though I didn't spot them at a glance. Actually, there definitely are. addrrange_end() should probably be redefined as the inclusive end, rather than the exclusive end, and computed as: (start + size - 1)< start ? INT64_MAX : start + size - 1 Hrm, except that that doesn't handle zero size ranges. And gets a bit weird for INT64_MAX sized regions. Hrm, yeah, these really should be changed to use unsigneds.
Unsigneds don't work because we sometimes subtract values and get into the negative area, due to aliases.
We're using values that are close to the end of the 63 or 64 bit range and playing with them. Overflow is always close and we'll always be able to find a way to defeat the code (even if it doesn't occur in practice). I'm tempted to declare that the memory API supports only 60 bits of address space (and s/INT64_MAX/MEMORY_REGION_SIZE_MAX/), that gives us a few levels of wild offsetting before we get confused.
-- I have a truly marvellous patch that fixes the bug which this signature is too narrow to contain.
[Prev in Thread] | Current Thread | [Next in Thread] |