From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([140.186.70.92]:38229) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1QlMvV-00047V-0L for qemu-devel@nongnu.org; Mon, 25 Jul 2011 11:18:37 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1QlMvQ-0002mi-E9 for qemu-devel@nongnu.org; Mon, 25 Jul 2011 11:18:36 -0400 Received: from thoth.sbs.de ([192.35.17.2]:34097) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1QlMvQ-0002ma-2U for qemu-devel@nongnu.org; Mon, 25 Jul 2011 11:18:32 -0400 Message-ID: <4E2D8945.50502@siemens.com> Date: Mon, 25 Jul 2011 17:18:29 +0200 From: Jan Kiszka MIME-Version: 1.0 References: <4E2858C2.5050909@siemens.com> <20110722052707.GA8241@redhat.com> <4E293D3D.8070904@siemens.com> <20110725151729.GA27323@redhat.com> In-Reply-To: <20110725151729.GA27323@redhat.com> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] [PATCH v2] pci: Common overflow prevention List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: "Michael S. Tsirkin" Cc: Isaku Yamahata , qemu-devel On 2011-07-25 17:17, Michael S. Tsirkin wrote: >> Introduce pci_config_read/write_common helpers to prevent passing >> accesses down the callback chain that go beyond the config space limits. >> Adjust length assertions as they are no longer correct (cutting may >> generate valid 3 byte accesses). >> >> Signed-off-by: Jan Kiszka > > I renamed to pci_host_config_read/write_common and applied this. > Thanks! Perfect, thanks for cleaning up! Jan -- Siemens AG, Corporate Technology, CT T DE IT 1 Corporate Competence Center Embedded Linux