On 26/03/2020 15:24, Alexandru Elisei wrote: > After writing to the device fd as part of the PCI configuration space > emulation, we read back from the device to make sure that the write > finished. The value is read back into the PCI configuration space and > afterwards, the same value is copied by the PCI emulation code. Let's > read from the device fd into a temporary variable, to prevent this > double write. > > The double write is harmless in itself. But when we implement > reassignable BARs, we need to keep track of the old BAR value, and the > VFIO code is overwritting it. > It seems still a bit fragile, since we rely on code in other places to limit "sz" to 4 or less, but in practice we should be covered. Can you maybe add an assert here to prevent accidents on the stack? > Signed-off-by: Alexandru Elisei <alexandru.elisei@xxxxxxx> Cheers, Andre > --- > vfio/pci.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/vfio/pci.c b/vfio/pci.c > index fe02574390f6..8b2a0c8dbac3 100644 > --- a/vfio/pci.c > +++ b/vfio/pci.c > @@ -470,7 +470,7 @@ static void vfio_pci_cfg_write(struct kvm *kvm, struct pci_device_header *pci_hd > struct vfio_region_info *info; > struct vfio_pci_device *pdev; > struct vfio_device *vdev; > - void *base = pci_hdr; > + u32 tmp; > > if (offset == PCI_ROM_ADDRESS) > return; > @@ -490,7 +490,7 @@ static void vfio_pci_cfg_write(struct kvm *kvm, struct pci_device_header *pci_hd > if (pdev->irq_modes & VFIO_PCI_IRQ_MODE_MSI) > vfio_pci_msi_cap_write(kvm, vdev, offset, data, sz); > > - if (pread(vdev->fd, base + offset, sz, info->offset + offset) != sz) > + if (pread(vdev->fd, &tmp, sz, info->offset + offset) != sz) > vfio_dev_warn(vdev, "Failed to read %d bytes from Configuration Space at 0x%x", > sz, offset); > } >