On Fri, Oct 20, 2017 at 4:25 PM, Paolo Bonzini <pbonzini@xxxxxxxxxx> wrote: > On 21/10/2017 00:40, Paolo Bonzini wrote: >> This breaks KVM completely on x86, due to two ioctls >> (KVM_GET/SET_CPUID2) accessing the cpuid_entries field of struct >> kvm_vcpu_arch. >> >> There's also another broken ioctl, KVM_XEN_HVM_CONFIG, but it is >> obsolete and not a big deal at all. >> >> I can post some patches, but probably not until the beginning of >> November due to travelling. Please do not send this too close to the >> beginning of the merge window. > > Sleeping is overrated, sending patches now... Oh awesome, thank you very much for tracking this down and building fixes! I'll insert these into the usercopy whitelisting series, and see if I can find any similar cases. Thanks! -Kees -- Kees Cook Pixel Security -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxx. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>