qemu/hw/rdma/vmw
Yuval Shaia a2efa1fac4 hw/pvrdma: Protect against buggy or malicious guest driver
Guest driver might execute HW commands when shared buffers are not yet
allocated.
This could happen on purpose (malicious guest) or because of some other
guest/host address mapping error.
We need to protect againts such case.

Fixes: CVE-2022-1050

Reported-by: Raven <wxhusst@gmail.com>
Signed-off-by: Yuval Shaia <yuval.shaia.ml@gmail.com>
Message-Id: <20220403095234.2210-1-yuval.shaia.ml@gmail.com>
Signed-off-by: Laurent Vivier <laurent@vivier.eu>
(cherry picked from commit 31c4b6fb02)
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
2023-03-30 12:19:04 +03:00
..
pvrdma_cmd.c hw/pvrdma: Protect against buggy or malicious guest driver 2023-03-30 12:19:04 +03:00
pvrdma_dev_ring.c Use g_new() & friends where that makes obvious sense 2022-03-21 15:44:44 +01:00
pvrdma_dev_ring.h pvrdma: wean code off pvrdma_ring.h kernel header 2021-03-15 16:41:22 +08:00
pvrdma_main.c msix: Assert that specified vector is in range 2022-11-07 14:08:17 -05:00
pvrdma_qp_ops.c Use g_new() & friends where that makes obvious sense 2022-03-21 15:44:44 +01:00
pvrdma_qp_ops.h Clean up header guards that don't match their file name 2019-05-13 08:58:55 +02:00
pvrdma.h pvrdma: wean code off pvrdma_ring.h kernel header 2021-03-15 16:41:22 +08:00
trace-events docs: fix references to docs/devel/tracing.rst 2021-06-02 06:51:09 +02:00
trace.h trace: switch position of headers to what Meson requires 2020-08-21 06:18:24 -04:00