The main point of the series is really patch 1 (which after consultation among the security team doesn't appear to represent a security fix); the other two are just cleanup that I found possible/desirable while putting together the first one.
1: x86: allow 64-bit PV guest kernels to suppress user mode exposure of M2P 2: slightly reduce vm_assist code 3: x86/shadow: pass domain to sh_install_xen_entries_in_lN() Signed-off-by: Jan Beulich <jbeul...@suse.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel