summaryrefslogtreecommitdiff
path: root/drivers/edac
diff options
context:
space:
mode:
authorBen Gardon <bgardon@google.com>2019-04-08 21:07:30 +0300
committerPaolo Bonzini <pbonzini@redhat.com>2019-04-16 16:37:30 +0300
commitbc8a3d8925a8fa09fa550e0da115d95851ce33c6 (patch)
tree1b4b023ac429a1b0607e0f67c2d58cad725d3ea4 /drivers/edac
parent2b27924bb1d48e3775f432b70bdad5e6dd4e7798 (diff)
downloadlinux-bc8a3d8925a8fa09fa550e0da115d95851ce33c6.tar.xz
kvm: mmu: Fix overflow on kvm mmu page limit calculation
KVM bases its memory usage limits on the total number of guest pages across all memslots. However, those limits, and the calculations to produce them, use 32 bit unsigned integers. This can result in overflow if a VM has more guest pages that can be represented by a u32. As a result of this overflow, KVM can use a low limit on the number of MMU pages it will allocate. This makes KVM unable to map all of guest memory at once, prompting spurious faults. Tested: Ran all kvm-unit-tests on an Intel Haswell machine. This patch introduced no new failures. Signed-off-by: Ben Gardon <bgardon@google.com> Cc: stable@vger.kernel.org Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'drivers/edac')
0 files changed, 0 insertions, 0 deletions