In-Reply-To: <641e1f35-813a-4244-0194-ffce08130...@redhat.com>
On Fri, Jun 23, 2017 at 01:19:35PM +0200, Paolo Bonzini wrote:
>
>
> On 21/06/2017 16:21, Wu Xiang wrote:
> > In do_interrupt64(), when interrupt stack table(ist) is enabled
> > and the the target co
main unchanged. Otherwise higher privileged
code can be compromised.
The patch fix this for always set dpl = cpl when the target code segment
is conforming, and modify the last parameter `flags`, which contains
correct new CPL, in cpu_x86_load_seg_cache().
Signed-off-by: Wu Xiang
---
target/