On Fri, Apr 18, 2014 at 02:33:06AM +0300, Nadav Amit wrote: > This series of patches fix various scenarios in which KVM behavior does not > follow x86 specifications. Each patch actually deals with a separate bug. > These bugs can cause the guest to get stuck (i.e., make no progress), > encounter > spurious injected exceptions, or cause guest code to misbehave. As a result > guest OS can potentially fail. > > Thanks for reviewing the patches. > > Nadav Amit (5): > KVM: x86: Fix wrong/stuck PMU when guest does not use PMI > KVM: x86: Fix CR3 reserved bits > KVM: x86: IN instruction emulation should ignore REP-prefix > KVM: x86: RSI/RDI/RCX are zero-extended when affected by string ops > KVM: x86: Processor mode may be determined incorrectly
Applied all except patch 4. -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html