[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Xen Project Spectre/Meltdown FAQ
On Sun, 7 Jan 2018, Marek Marczykowski-Górecki wrote: > On Fri, Jan 05, 2018 at 07:05:56PM +0000, Andrew Cooper wrote: > > On 05/01/18 18:16, Rich Persaud wrote: > > >> On Jan 5, 2018, at 06:35, Lars Kurth <lars.kurth.xen@xxxxxxxxx > > >> <mailto:lars.kurth.xen@xxxxxxxxx>> wrote: > > >> Linux’s KPTI series is designed to address SP3 only. For Xen guests, > > >> only 64-bit PV guests are affected by SP3. A KPTI-like approach was > > >> explored initially, but required significant ABI changes. > > Is some partial KPTI-like approach feasible? Like unmapping memory owned > by other guests, but keeping Xen areas mapped? This will still allow > leaking Xen memory, but there are very few secrets there (vCPUs state, > anything else?), so overall impact will be much lower. +1 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |