On Fri, Apr 18, 2014 at 02:33:06AM +0300, Nadav Amit wrote:
> This series of patches fix various scenarios in which KVM behavior does not
> follow x86 specifications.  Each patch actually deals with a separate bug.
> These bugs can cause the guest to get stuck (i.e., make no progress), 
> encounter
> spurious injected exceptions, or cause guest code to misbehave. As a result
> guest OS can potentially fail.
> 
> Thanks for reviewing the patches.
> 
> Nadav Amit (5):
>   KVM: x86: Fix wrong/stuck PMU when guest does not use PMI
>   KVM: x86: Fix CR3 reserved bits
>   KVM: x86: IN instruction emulation should ignore REP-prefix
>   KVM: x86: RSI/RDI/RCX are zero-extended when affected by string ops
>   KVM: x86: Processor mode may be determined incorrectly

Applied all except patch 4.


--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to