From: Michal Privoznik Date: Fri, 7 Aug 2015 14:36:38 +0000 (+0200) Subject: virDomainDefParseXML: Check for malicious cpu ids in X-Git-Tag: v1.2.19-rc1~147 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=82af954c527e88111b05d50953b80eb4afde4d9a;p=thirdparty%2Flibvirt.git virDomainDefParseXML: Check for malicious cpu ids in https://bugzilla.redhat.com/show_bug.cgi?id=1176020 Some users think this is a good idea: 4 It's not. Lets therefore introduce a check and discourage them in doing so. Signed-off-by: Michal Privoznik --- diff --git a/src/conf/domain_conf.c b/src/conf/domain_conf.c index 5eaeb21806..e4114f8210 100644 --- a/src/conf/domain_conf.c +++ b/src/conf/domain_conf.c @@ -15105,6 +15105,12 @@ virDomainDefParseXML(xmlDocPtr xml, goto error; } + if (virDomainNumaGetMaxCPUID(def->numa) >= def->maxvcpus) { + virReportError(VIR_ERR_INTERNAL_ERROR, "%s", + _("CPU IDs in exceed the count")); + goto error; + } + if (virDomainNumatuneParseXML(def->numa, def->placement_mode == VIR_DOMAIN_CPU_PLACEMENT_MODE_STATIC,