diff options
| author | Tom Lendacky <thomas.lendacky@amd.com> | 2023-06-22 08:45:05 -0500 |
|---|---|---|
| committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2023-10-10 22:03:05 +0200 |
| commit | 225d28de3fc3e53d3104afe73954769727886511 (patch) | |
| tree | aa4f7a425845713a9b24509ac12cdbd561541dd5 | |
| parent | 783142da973325186bf076272d3464c33d39d878 (diff) | |
| download | linux-225d28de3fc3e53d3104afe73954769727886511.tar.gz linux-225d28de3fc3e53d3104afe73954769727886511.tar.bz2 linux-225d28de3fc3e53d3104afe73954769727886511.zip | |
x86/sev: Change npages to unsigned long in snp_accept_memory()
commit 62d5e970d022ef4bde18948dd67247c3194384c1 upstream.
In snp_accept_memory(), the npages variables value is calculated from
phys_addr_t variables but is an unsigned int. A very large range passed
into snp_accept_memory() could lead to truncating npages to zero. This
doesn't happen at the moment but let's be prepared.
Fixes: 6c3211796326 ("x86/sev: Add SNP-specific unaccepted memory support")
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Cc: <stable@kernel.org>
Link: https://lore.kernel.org/r/6d511c25576494f682063c9fb6c705b526a3757e.1687441505.git.thomas.lendacky@amd.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
| -rw-r--r-- | arch/x86/kernel/sev.c | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/arch/x86/kernel/sev.c b/arch/x86/kernel/sev.c index 1ee7bed453de..2b0342a03c1b 100644 --- a/arch/x86/kernel/sev.c +++ b/arch/x86/kernel/sev.c @@ -868,8 +868,7 @@ void snp_set_memory_private(unsigned long vaddr, unsigned long npages) void snp_accept_memory(phys_addr_t start, phys_addr_t end) { - unsigned long vaddr; - unsigned int npages; + unsigned long vaddr, npages; if (!cc_platform_has(CC_ATTR_GUEST_SEV_SNP)) return; |
