x86/ACPI/x2APIC: guard against out of range ACPI or APIC IDs
authorJan Beulich <jbeulich@suse.com>
Mon, 4 Nov 2013 09:10:04 +0000 (10:10 +0100)
committerJan Beulich <jbeulich@suse.com>
Mon, 4 Nov 2013 09:10:04 +0000 (10:10 +0100)
commit2c24cdcce3269f3286790c63821951a1de93c66a
treeb939d7ff96362d06802f5dbe3a2ea7bfa637ffba
parenta321abc6d8122f8cb3928066cc74363c4fdddcfd
x86/ACPI/x2APIC: guard against out of range ACPI or APIC IDs

Other than for the legacy APIC, the x2APIC MADT entries have valid
ranges possibly extending beyond what our internal arrays can handle,
and hence we need to guard ourselves against corrupting memory here.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Keir Fraser <keir@xen.org>
xen/arch/x86/acpi/boot.c