On 17/06/19 22:07, Sean Christopherson wrote:
On Mon, Jun 17, 2019 at 09:17:24PM +0200, Radim Krčmář wrote:
2019-06-13 19:03+0200, Paolo Bonzini:
From: Sean Christopherson sean.j.christopherson@intel.com
... as a malicious userspace can run a toy guest to generate invalid virtual-APIC page addresses in L1, i.e. flood the kernel log with error messages.
Fixes: 690908104e39d ("KVM: nVMX: allow tests to use bad virtual-APIC page address") Cc: stable@vger.kernel.org Cc: Paolo Bonzini pbonzini@redhat.com Signed-off-by: Sean Christopherson sean.j.christopherson@intel.com Signed-off-by: Paolo Bonzini pbonzini@redhat.com
Makes me wonder why it looks like this in kvm/queue. :)
Presumably something is wonky in Paolo's workflow, this happened before.
It's more my non-workflow... when I cannot find a patch for some reason (deleted by mistake, eaten by Gmane, etc.), I search it with Google and sometimes spinics.net comes up which mangles the domain. I should just subscribe to kvm@vger.kernel.org since Gmane has gotten less reliable, or set up a Patchew instance for it.
Paolo