In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
| linux | | https://git.kernel.org/linus/8b79feffeca28c5459458fe78676b081e87c93a4 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
IntheLinuxkernel,thefollowingvulnerabilityhasbeenresolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
| linux | | https://git.kernel.org/linus/8b79feffeca28c5459458fe78676b081e87c93a4 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
| linux | | https://git.kernel.org/linus/8b79feffeca28c5459458fe78676b081e87c93a4 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
| linux | | https://git.kernel.org/linus/8b79feffeca28c5459458fe78676b081e87c93a4 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.
| linux | | https://git.kernel.org/linus/8b79feffeca28c5459458fe78676b081e87c93a4 | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:x86/kvm: Teardown PV features on boot CPU as wellVarious PV features (Async PF, PV EOI, steal time) work through memoryshared with hypervisor and when we restore from hibernation we mustproperly teardown all these features to make sure hypervisor doesn twrite to stale locations after we jump to the previously hibernated kernel(which can try to place anything there). For secondary CPUs the job isalready done by kvm_cpu_down_prepare(), register syscore ops to dothe same for boot CPU.