[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH for-4.11 v2 0/3] x86: XSA-267 follow-up



The first patch alone should be sufficient to address an issue with the
XSA-267 changes, causing a BUG_ON() to be triggered. The other two
patches would, afaict, each individually also have avoided the issue,
hence I'm also including them here. While the first patch obviously is
a strong candidate for 4.11, the latter two are candidates too imo; at
least I consider them backporting candidates (albeit, to be clear, patch
2 is useful only as far back as we have exception recovery attached
to emulator stubs, i.e. no farther than 4.9).

1: x86/HVM: don't cause #NM to be raised in Xen
2: x86: guard against #NM
3: VMX: check host CR0 before entering guest

Jan



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.