Verify the offset to prevent OOB access in the hypervisor FF-A buffer in case an untrusted large enough value [U32_MAX - sizeof(struct ffa_composite_mem_region) + 1, U32_MAX] is set from the host kernel. Signed-off-by: Sebastian Ene <sebastianene@google.com> Acked-by: Will Deacon <will@kernel.org> Link: https://patch.msgid.link/20251017075710.2605118-1-sebastianene@google.com Signed-off-by: Marc Zyngier <maz@kernel.org> |
||
|---|---|---|
| .. | ||
| include | ||
| nvhe | ||
| vhe | ||
| Makefile | ||
| aarch32.c | ||
| entry.S | ||
| exception.c | ||
| fpsimd.S | ||
| hyp-constants.c | ||
| hyp-entry.S | ||
| pgtable.c | ||
| vgic-v2-cpuif-proxy.c | ||
| vgic-v3-sr.c | ||