On 02/14/2018 05:35 PM, Tamas K Lengyel wrote: > On Fri, Feb 9, 2018 at 4:01 AM, Razvan Cojocaru > <rcojoc...@bitdefender.com> wrote: >> The emulation layers of Xen lack PCID support, and as we only offer >> PCID to HAP guests, all writes to CR3 are handled by hardware, >> except when introspection is involved. Consequently, trying to set >> CR3 when the noflush bit is set in hvm_set_cr3() leads to domain >> crashes. The workaround is to clear the noflush bit in >> hvm_set_cr3(). CR3 values in hvm_monitor_cr() are also sanitized. >> Additionally, a bool parameter now propagates to >> {svm,vmx}_update_guest_cr(), so that no flushes occur when >> the bit was set. >> >> Signed-off-by: Razvan Cojocaru <rcojoc...@bitdefender.com> >> Reported-by: Bitweasil <bitwea...@cryptohaze.com> >> Suggested-by: Andrew Cooper <andrew.coop...@citrix.com> > > Acked-by: Tamas K Lengyel <ta...@tklengyel.com>
Thanks! Razvan _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel