Commit 8149fc07 authored by David Hildenbrand's avatar David Hildenbrand Committed by Christian Borntraeger

KVM: s390: guestdbg: fix range check

Looks like the "overflowing" range check is wrong.

|=======b-------a=======|

addr >= a || addr <= b
Signed-off-by: default avatarDavid Hildenbrand <david@redhat.com>
Message-Id: <20170830160603.5452-2-david@redhat.com>
Reviewed-by: default avatarChristian Borntraeger <borntraeger@de.ibm.com>
Reviewed-by: default avatarCornelia Huck <cohuck@redhat.com>
Signed-off-by: default avatarChristian Borntraeger <borntraeger@de.ibm.com>
parent 1935222d
...@@ -308,7 +308,7 @@ static inline int in_addr_range(u64 addr, u64 a, u64 b) ...@@ -308,7 +308,7 @@ static inline int in_addr_range(u64 addr, u64 a, u64 b)
return (addr >= a) && (addr <= b); return (addr >= a) && (addr <= b);
else else
/* "overflowing" interval */ /* "overflowing" interval */
return (addr <= a) && (addr >= b); return (addr >= a) || (addr <= b);
} }
#define end_of_range(bp_info) (bp_info->addr + bp_info->len - 1) #define end_of_range(bp_info) (bp_info->addr + bp_info->len - 1)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment