[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH for-4.11 v2 0/3] x86: XSA-267 follow-up



>>> On 26.06.18 at 09:39, <jgross@xxxxxxxx> wrote:
> On 26/06/18 08:24, Jan Beulich wrote:
>> The first patch alone should be sufficient to address an issue with the
>> XSA-267 changes, causing a BUG_ON() to be triggered. The other two
>> patches would, afaict, each individually also have avoided the issue,
>> hence I'm also including them here. While the first patch obviously is
>> a strong candidate for 4.11, the latter two are candidates too imo; at
>> least I consider them backporting candidates (albeit, to be clear, patch
>> 2 is useful only as far back as we have exception recovery attached
>> to emulator stubs, i.e. no farther than 4.9).
>> 
>> 1: x86/HVM: don't cause #NM to be raised in Xen
>> 2: x86: guard against #NM
>> 3: VMX: check host CR0 before entering guest
> 
> For the series:
> 
> Release-acked-by: Juergen Gross <jgross@xxxxxxxx>

Thanks. What about "x86/EFI: further correct FPU state handling around
runtime calls", which has all other necessary tags already?

Jan



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.