[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH for-4.11 v2 0/3] x86: XSA-267 follow-up
>>> On 26.06.18 at 09:39, <jgross@xxxxxxxx> wrote: > On 26/06/18 08:24, Jan Beulich wrote: >> The first patch alone should be sufficient to address an issue with the >> XSA-267 changes, causing a BUG_ON() to be triggered. The other two >> patches would, afaict, each individually also have avoided the issue, >> hence I'm also including them here. While the first patch obviously is >> a strong candidate for 4.11, the latter two are candidates too imo; at >> least I consider them backporting candidates (albeit, to be clear, patch >> 2 is useful only as far back as we have exception recovery attached >> to emulator stubs, i.e. no farther than 4.9). >> >> 1: x86/HVM: don't cause #NM to be raised in Xen >> 2: x86: guard against #NM >> 3: VMX: check host CR0 before entering guest > > For the series: > > Release-acked-by: Juergen Gross <jgross@xxxxxxxx> Thanks. What about "x86/EFI: further correct FPU state handling around runtime calls", which has all other necessary tags already? Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |