On 02/16/2018 01:17 PM, Jan Beulich wrote:
>>>> On 16.02.18 at 11:22, <rcojoc...@bitdefender.com> wrote:
>> The emulation layers of Xen lack PCID support, and as we only offer
>> PCID to HAP guests, all writes to CR3 are handled by hardware,
>> except when introspection is involved. Consequently, trying to set
>> CR3 when the noflush bit is set in hvm_set_cr3() leads to domain
>> crashes. The workaround is to clear the noflush bit in
>> hvm_set_cr3(). CR3 values in hvm_monitor_cr() are also sanitized.
>> Additionally, a bool parameter now propagates to
>> {svm,vmx}_update_guest_cr(), so that no flushes occur when
>> the bit was set.
>>
>> Signed-off-by: Razvan Cojocaru <rcojoc...@bitdefender.com>
>> Reported-by: Bitweasil <bitwea...@cryptohaze.com>
>> Suggested-by: Andrew Cooper <andrew.coop...@citrix.com>
>> Acked-by: Tamas K Lengyel <ta...@tklengyel.com>
> 
> Reviewed-by: Jan Beulich <jbeul...@suse.com>

Should I rebase this because of commit
24470b99c1671dca531c2cf5747eda2f8892ecbc?


Thanks,
Razvan

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to