From: David Hildenbrand Date: Wed, 30 Aug 2017 16:06:00 +0000 (+0200) Subject: KVM: s390: guestdbg: fix range check X-Git-Tag: v4.14-rc1~88^2~3^2~2 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=8149fc07724a1eee65d772749935bd923ae4f686;p=thirdparty%2Fkernel%2Flinux.git KVM: s390: guestdbg: fix range check Looks like the "overflowing" range check is wrong. |=======b-------a=======| addr >= a || addr <= b Signed-off-by: David Hildenbrand Message-Id: <20170830160603.5452-2-david@redhat.com> Reviewed-by: Christian Borntraeger Reviewed-by: Cornelia Huck Signed-off-by: Christian Borntraeger --- diff --git a/arch/s390/kvm/guestdbg.c b/arch/s390/kvm/guestdbg.c index c2e0ddc1356e5..bcbd86621d018 100644 --- a/arch/s390/kvm/guestdbg.c +++ b/arch/s390/kvm/guestdbg.c @@ -308,7 +308,7 @@ static inline int in_addr_range(u64 addr, u64 a, u64 b) return (addr >= a) && (addr <= b); else /* "overflowing" interval */ - return (addr <= a) && (addr >= b); + return (addr >= a) || (addr <= b); } #define end_of_range(bp_info) (bp_info->addr + bp_info->len - 1)