From: Keir Fraser Date: Fri, 29 Oct 2010 17:44:54 +0000 (+0100) Subject: Xen: fix various checks of unsigned integers < 0 X-Git-Tag: 4.0.2-rc1~52 X-Git-Url: http://xenbits.xensource.com/gitweb?a=commitdiff_plain;h=e91d6cc3949869f6602bfd48ce0d1f607dd5be96;p=people%2Fvhanquez%2Fxen.git Xen: fix various checks of unsigned integers < 0 Some of these could be benignly discarded by the compiler but some are actual bugs. Signed-off-by: Tim Deegan xen-unstable changeset: 22336:49803ac994f4 xen-unstable date: Fri Oct 29 18:05:50 2010 +0100 --- diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index 594247a83..9705598fe 100644 --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -4223,7 +4223,7 @@ static int handle_iomem_range(unsigned long s, unsigned long e, void *p) ent.size = (uint64_t)(s - ctxt->s) << PAGE_SHIFT; ent.type = E820_RESERVED; buffer = guest_handle_cast(ctxt->map.buffer, e820entry_t); - if ( __copy_to_guest_offset(buffer, ctxt->n, &ent, 1) < 0 ) + if ( __copy_to_guest_offset(buffer, ctxt->n, &ent, 1) ) return -EFAULT; ctxt->n++; } @@ -4439,7 +4439,7 @@ long arch_memory_op(int op, XEN_GUEST_HANDLE(void) arg) } if ( ctxt.map.nr_entries <= ctxt.n + (e820.nr_map - i) ) return -EINVAL; - if ( __copy_to_guest_offset(buffer, ctxt.n, e820.map + i, 1) < 0 ) + if ( __copy_to_guest_offset(buffer, ctxt.n, e820.map + i, 1) ) return -EFAULT; ctxt.s = PFN_UP(e820.map[i].addr + e820.map[i].size); } diff --git a/xen/arch/x86/physdev.c b/xen/arch/x86/physdev.c index baaff24ba..6a12f0013 100644 --- a/xen/arch/x86/physdev.c +++ b/xen/arch/x86/physdev.c @@ -202,7 +202,7 @@ ret_t do_physdev_op(int cmd, XEN_GUEST_HANDLE(void) arg) if ( copy_from_guest(&eoi, arg, 1) != 0 ) break; ret = -EINVAL; - if ( eoi.irq < 0 || eoi.irq >= v->domain->nr_pirqs ) + if ( eoi.irq >= v->domain->nr_pirqs ) break; if ( v->domain->arch.pirq_eoi_map ) evtchn_unmask(v->domain->pirq_to_evtchn[eoi.irq]); diff --git a/xen/arch/x86/platform_hypercall.c b/xen/arch/x86/platform_hypercall.c index e7f3283c1..e2b4fe015 100644 --- a/xen/arch/x86/platform_hypercall.c +++ b/xen/arch/x86/platform_hypercall.c @@ -413,7 +413,6 @@ ret_t do_platform_op(XEN_GUEST_HANDLE(xen_platform_op_t) u_xenpf_op) } if ( (g_info->xen_cpuid >= NR_CPUS) || - (g_info->xen_cpuid < 0) || !cpu_present(g_info->xen_cpuid) ) { g_info->flags |= XEN_PCPU_FLAGS_INVALID; diff --git a/xen/arch/x86/x86_emulate/x86_emulate.c b/xen/arch/x86/x86_emulate/x86_emulate.c index 51e199adb..7ad0dd5d2 100644 --- a/xen/arch/x86/x86_emulate/x86_emulate.c +++ b/xen/arch/x86/x86_emulate/x86_emulate.c @@ -2102,7 +2102,7 @@ x86_emulate( _regs.edx = (uint32_t)(((int32_t)_regs.eax < 0) ? -1 : 0); break; case 8: - _regs.edx = (_regs.eax < 0) ? -1 : 0; + _regs.edx = ((int64_t)_regs.eax < 0) ? -1 : 0; break; } break; diff --git a/xen/drivers/cpufreq/cpufreq.c b/xen/drivers/cpufreq/cpufreq.c index 627435d88..824314312 100644 --- a/xen/drivers/cpufreq/cpufreq.c +++ b/xen/drivers/cpufreq/cpufreq.c @@ -115,8 +115,7 @@ int cpufreq_limit_change(unsigned int cpu) if (!cpu_online(cpu) || !data || !processor_pminfo[cpu]) return -ENODEV; - if ((perf->platform_limit < 0) || - (perf->platform_limit >= perf->state_count)) + if (perf->platform_limit >= perf->state_count) return -EINVAL; memcpy(&policy, data, sizeof(struct cpufreq_policy));