[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH RFC for-4.13 00/10] xen/arm: XSA-201 and XSA-263 fixes
On 26.09.19 20:37, Julien Grall wrote: Hi all, This patch series aims to fix two bugs in the entry path from the guest: 1) Make sure that SSBD workaround is enabled before executing any hypervisor code 2) Avoid guest state corruption when an virtual SError is received The full series is candidate for Xen 4.13. Without it, the hypervisor would not be properly protected against SSB vulnerability and the guest state may get corrupted if an SError is received. This is in RFC state because the entry code is now quite different and arm32 changes are not yet implemented. I will modify arm32 once we agreed on the approach. Cheers, Cc: jgross@xxxxxxxx I think the explanation of the motivation qualifies the series to be marked as a blocker for 4.13. Juergen _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |