[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] [Xen-devel] Xen Project Spectre/Meltdown FAQ



Julien,

On 5 Jan 2018, at 14:40, Julien Grall <julien.grall@xxxxxxxxxx> wrote:

(apologies for the formatting)

Hi Lars,

Thank you for putting together an FAQ.

Few comments below around Arm.

Systems running Xen, like all operating systems and hypervisors, are potentially affected by Spectre (referred to as SP1 and SP2 in Advisory 254 [1]). For Arm Processors information, you can find which processors are impacted here [2].  In general, both the hypervisor and a guest kernel are vulnerable to attack via SP1 and SP2.

The website list processors designed by Arm (i.e Cortex family). It does not include processors made by Arm licensees. I will leave the various licensees speak for themselves here.

Regarding Arm-designed processors, most of them are not vulnerable to any variant. Those affected will mostly be vulnerable to attack via SP1 and SP2.

But this does not rule out attack via SP3 on Arm. From the website, one Cortex processor is affected.

While this will not affect Xen (the hypervisor is using a different set  of page-tables). Guest kernel will be vulnerable to it.

I would be quite happy to have a specific question covering ARM/ARM eco-system where you can explain all this. Feel free to formulate a question + answer and I will add it
Lars
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-users

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.