Hi, all! On linux-stable 6.10 vanilla tree, another NULL pointer is passed, which was detected by the fortify-string.h mechanism. arch/x86/kvm/x86.c ================== 13667 kvm_prepare_emulation_failure_exit(vcpu); calls 8796 __kvm_prepare_emulation_failure_exit(vcpu, NULL, 0); which calls 8790 prepare_emulation_failure_exit(vcpu, data, ndata, NULL, 0); Note here that data == NULL and ndata = 0. again data == NULL and ndata == 0, which passes unchanged all until 8773 memcpy(&run->internal.data[info_start + ARRAY_SIZE(info)], data, ndata * sizeof(data[0])); The problem code was introduced with the commit e615e355894e6. arch/x86/kvm/x86.c ================== 8728 static void prepare_emulation_failure_exit(struct kvm_vcpu *vcpu, u64 *data, 8729 u8 ndata, u8 *insn_bytes, u8 insn_size) 8730 { 8731 struct kvm_run *run = vcpu->run; 8732 u64 info[5]; 8733 u8 info_start; 8734 8735 /* 8736 * Zero the whole array used to retrieve the exit info, as casting to 8737 * u32 for select entries will leave some chunks uninitialized. 8738 */ 8739 memset(&info, 0, sizeof(info)); 8740 8741 static_call(kvm_x86_get_exit_info)(vcpu, (u32 *)&info[0], &info[1], 8742 &info[2], (u32 *)&info[3], 8743 (u32 *)&info[4]); 8744 8745 run->exit_reason = KVM_EXIT_INTERNAL_ERROR; 8746 run->emulation_failure.suberror = KVM_INTERNAL_ERROR_EMULATION; 8747 8748 /* 8749 * There's currently space for 13 entries, but 5 are used for the exit 8750 * reason and info. Restrict to 4 to reduce the maintenance burden 8751 * when expanding kvm_run.emulation_failure in the future. 8752 */ 8753 if (WARN_ON_ONCE(ndata > 4)) 8754 ndata = 4; 8755 8756 /* Always include the flags as a 'data' entry. */ 8757 info_start = 1; 8758 run->emulation_failure.flags = 0; 8759 8760 if (insn_size) { 8761 BUILD_BUG_ON((sizeof(run->emulation_failure.insn_size) + 8762 sizeof(run->emulation_failure.insn_bytes) != 16)); 8763 info_start += 2; 8764 run->emulation_failure.flags |= 8765 KVM_INTERNAL_ERROR_EMULATION_FLAG_INSTRUCTION_BYTES; 8766 run->emulation_failure.insn_size = insn_size; 8767 memset(run->emulation_failure.insn_bytes, 0x90, 8768 sizeof(run->emulation_failure.insn_bytes)); 8769 memcpy(run->emulation_failure.insn_bytes, insn_bytes, insn_size); 8770 } 8771 8772 memcpy(&run->internal.data[info_start], info, sizeof(info)); 8773 memcpy(&run->internal.data[info_start + ARRAY_SIZE(info)], data, 8774 ndata * sizeof(data[0])); 8775 8776 run->emulation_failure.ndata = info_start + ARRAY_SIZE(info) + ndata; 8777 } 8778 8779 static void prepare_emulation_ctxt_failure_exit(struct kvm_vcpu *vcpu) 8780 { 8781 struct x86_emulate_ctxt *ctxt = vcpu->arch.emulate_ctxt; 8782 8783 prepare_emulation_failure_exit(vcpu, NULL, 0, ctxt->fetch.data, 8784 ctxt->fetch.end - ctxt->fetch.data); 8785 } 8786 8787 void __kvm_prepare_emulation_failure_exit(struct kvm_vcpu *vcpu, u64 *data, 8788 u8 ndata) 8789 { 8790 prepare_emulation_failure_exit(vcpu, data, ndata, NULL, 0); 8791 } 8792 EXPORT_SYMBOL_GPL(__kvm_prepare_emulation_failure_exit); 8793 8794 void kvm_prepare_emulation_failure_exit(struct kvm_vcpu *vcpu) 8795 { 8796 __kvm_prepare_emulation_failure_exit(vcpu, NULL, 0); 8797 } Probably before memcpy() with ndata == 0 ended in a NOOP, but now CONFIG_FORTIFY_SOURCE=y turns a warning, or prevents the build with -Werror. Hope this helps. Best regards, Mirsad Todorovac