[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH for-4.11 v2 0/3] x86: XSA-267 follow-up
The first patch alone should be sufficient to address an issue with the XSA-267 changes, causing a BUG_ON() to be triggered. The other two patches would, afaict, each individually also have avoided the issue, hence I'm also including them here. While the first patch obviously is a strong candidate for 4.11, the latter two are candidates too imo; at least I consider them backporting candidates (albeit, to be clear, patch 2 is useful only as far back as we have exception recovery attached to emulator stubs, i.e. no farther than 4.9). 1: x86/HVM: don't cause #NM to be raised in Xen 2: x86: guard against #NM 3: VMX: check host CR0 before entering guest Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |