diff options
author | James Morse <james.morse@arm.com> | 2019-12-17 13:38:09 +0100 |
---|---|---|
committer | Marc Zyngier <maz@kernel.org> | 2020-01-19 19:05:20 +0100 |
commit | 1559b7583ff6ed018c5320d1503fa80b435775f0 (patch) | |
tree | 007e2f546b1201d4a2301ebacc8d9273ddf093ce /crypto/ecdh_helper.c | |
parent | KVM: arm: Remove duplicate include (diff) | |
download | linux-1559b7583ff6ed018c5320d1503fa80b435775f0.tar.xz linux-1559b7583ff6ed018c5320d1503fa80b435775f0.zip |
KVM: arm/arm64: Re-check VMA on detecting a poisoned page
When we check for a poisoned page, we use the VMA to tell userspace
about the looming disaster. But we pass a pointer to this VMA
after having released the mmap_sem, which isn't a good idea.
Instead, stash the shift value that goes with this pfn while
we are holding the mmap_sem.
Reported-by: Marc Zyngier <maz@kernel.org>
Signed-off-by: James Morse <james.morse@arm.com>
Signed-off-by: Marc Zyngier <maz@kernel.org>
Reviewed-by: Christoffer Dall <christoffer.dall@arm.com>
Link: https://lore.kernel.org/r/20191211165651.7889-3-maz@kernel.org
Link: https://lore.kernel.org/r/20191217123809.197392-1-james.morse@arm.com
Diffstat (limited to 'crypto/ecdh_helper.c')
0 files changed, 0 insertions, 0 deletions