From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1031797AbeEZOYH (ORCPT ); Sat, 26 May 2018 10:24:07 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:46064 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753924AbeEZOYG (ORCPT ); Sat, 26 May 2018 10:24:06 -0400 Date: Sat, 26 May 2018 16:24:01 +0200 From: Radim =?utf-8?B?S3LEjW3DocWZ?= To: Brijesh Singh Cc: Dan Carpenter , Joerg Roedel , Paolo Bonzini , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , x86@kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, kernel-janitors@vger.kernel.org Subject: Re: [PATCH] KVM: X86: prevent integer overflows in KVM_MEMORY_ENCRYPT_REG_REGION Message-ID: <20180526142400.GD23390@flask> References: <20180519060135.GA4991@mwanda> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 2018-05-21 10:52-0500, Brijesh Singh: > On 05/19/2018 01:01 AM, Dan Carpenter wrote: > > This is a fix from reviewing the code, but it looks like it might be > > able to lead to an Oops. It affects 32bit systems. > > > > Please note that SEV is not available on 32bit systems. Added this note and queued, thanks.