]> www.infradead.org Git - users/jedix/linux-maple.git/commit
KVM: Harden guest memory APIs against out-of-bounds accesses
authorSean Christopherson <seanjc@google.com>
Thu, 29 Aug 2024 19:14:13 +0000 (12:14 -0700)
committerSean Christopherson <seanjc@google.com>
Tue, 10 Sep 2024 03:15:34 +0000 (20:15 -0700)
commit025dde582bbf31e7618f9283594ef5e2408e384b
treed722a6ec8fd040e4029ec6b43336d31131b88799
parentec495f2ab12290b008a691e826b39b895f458945
KVM: Harden guest memory APIs against out-of-bounds accesses

When reading or writing a guest page, WARN and bail if offset+len would
result in a read to a different page so that KVM bugs are more likely to
be detected, and so that any such bugs are less likely to escalate to an
out-of-bounds access.  E.g. if userspace isn't using guard pages and the
target page is at the end of a memslot.

Note, KVM already hardens itself in similar APIs, e.g. in the "cached"
variants, it's just the vanilla APIs that are playing with fire.

Link: https://lore.kernel.org/r/20240829191413.900740-3-seanjc@google.com
Signed-off-by: Sean Christopherson <seanjc@google.com>
virt/kvm/kvm_main.c