On 17/06/19 22:07, Sean Christopherson wrote: > On Mon, Jun 17, 2019 at 09:17:24PM +0200, Radim Krčmář wrote: >> 2019-06-13 19:03+0200, Paolo Bonzini: >>> From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx> >>> >>> ... as a malicious userspace can run a toy guest to generate invalid >>> virtual-APIC page addresses in L1, i.e. flood the kernel log with error >>> messages. >>> >>> Fixes: 690908104e39d ("KVM: nVMX: allow tests to use bad virtual-APIC page address") >>> Cc: stable@xxxxxxxxxxxxxxx >>> Cc: Paolo Bonzini <pbonzini@xxxxxxxxxx> >>> Signed-off-by: Sean Christopherson <sean.j.christopherson@xxxxxxxxx> >>> Signed-off-by: Paolo Bonzini <pbonzini@xxxxxxxxxx> >>> --- >> >> Makes me wonder why it looks like this in kvm/queue. :) > > Presumably something is wonky in Paolo's workflow, this happened before. It's more my non-workflow... when I cannot find a patch for some reason (deleted by mistake, eaten by Gmane, etc.), I search it with Google and sometimes spinics.net comes up which mangles the domain. I should just subscribe to kvm@xxxxxxxxxxxxxxx since Gmane has gotten less reliable, or set up a Patchew instance for it. Paolo