linux/arch/x86/kvm/mmu
Haimin Zhang eb7511bf91 KVM: x86: Handle SRCU initialization failure during page track init
Check the return of init_srcu_struct(), which can fail due to OOM, when
initializing the page track mechanism.  Lack of checking leads to a NULL
pointer deref found by a modified syzkaller.

Reported-by: TCS Robot <tcs_robot@tencent.com>
Signed-off-by: Haimin Zhang <tcs_kernel@tencent.com>
Message-Id: <1630636626-12262-1-git-send-email-tcs_kernel@tencent.com>
[Move the call towards the beginning of kvm_arch_init_vm. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2021-09-22 10:33:09 -04:00
..
mmu_audit.c KVM: x86/mmu: Rename __gfn_to_rmap to gfn_to_rmap 2021-08-06 07:52:58 -04:00
mmu_internal.h KVM: x86/mmu: Move lpage_disallowed_link further "down" in kvm_mmu_page 2021-09-06 06:20:05 -04:00
mmu.c KVM: MMU: mark role_regs and role accessors as maybe unused 2021-09-06 06:56:38 -04:00
mmutrace.h KVM: x86/mmu: Fix use of enums in trace_fast_page_fault 2021-08-02 11:01:47 -04:00
page_track.c KVM: x86: Handle SRCU initialization failure during page track init 2021-09-22 10:33:09 -04:00
paging_tmpl.h KVM: x86/mmu: allow kvm_faultin_pfn to return page fault handling code 2021-08-20 16:06:20 -04:00
paging.h KVM: x86/mmu: Do not apply HPA (memory encryption) mask to GPAs 2021-07-14 12:17:56 -04:00
spte.c KVM: x86/mmu: WARN on any reserved SPTE value when making a valid SPTE 2021-06-24 18:00:46 -04:00
spte.h KVM: x86/mmu: Do not apply HPA (memory encryption) mask to GPAs 2021-07-14 12:17:56 -04:00
tdp_iter.c KVM: x86/mmu: Store the address space ID in the TDP iterator 2021-03-16 14:16:34 -04:00
tdp_iter.h KVM: x86/mmu: Store the address space ID in the TDP iterator 2021-03-16 14:16:34 -04:00
tdp_mmu.c KVM: x86/mmu: Drop 'shared' param from tdp_mmu_link_page() 2021-08-20 16:06:35 -04:00
tdp_mmu.h Revert "KVM: x86/mmu: Allow zap gfn range to operate under the mmu read lock" 2021-08-20 16:06:15 -04:00