summaryrefslogtreecommitdiffstats
path: root/crypto/ecdh_helper.c
diff options
context:
space:
mode:
authorJames Morse <james.morse@arm.com>2019-12-17 13:38:09 +0100
committerMarc Zyngier <maz@kernel.org>2020-01-19 19:05:20 +0100
commit1559b7583ff6ed018c5320d1503fa80b435775f0 (patch)
tree007e2f546b1201d4a2301ebacc8d9273ddf093ce /crypto/ecdh_helper.c
parentKVM: arm: Remove duplicate include (diff)
downloadlinux-1559b7583ff6ed018c5320d1503fa80b435775f0.tar.xz
linux-1559b7583ff6ed018c5320d1503fa80b435775f0.zip
KVM: arm/arm64: Re-check VMA on detecting a poisoned page
When we check for a poisoned page, we use the VMA to tell userspace about the looming disaster. But we pass a pointer to this VMA after having released the mmap_sem, which isn't a good idea. Instead, stash the shift value that goes with this pfn while we are holding the mmap_sem. Reported-by: Marc Zyngier <maz@kernel.org> Signed-off-by: James Morse <james.morse@arm.com> Signed-off-by: Marc Zyngier <maz@kernel.org> Reviewed-by: Christoffer Dall <christoffer.dall@arm.com> Link: https://lore.kernel.org/r/20191211165651.7889-3-maz@kernel.org Link: https://lore.kernel.org/r/20191217123809.197392-1-james.morse@arm.com
Diffstat (limited to 'crypto/ecdh_helper.c')
0 files changed, 0 insertions, 0 deletions