Re: [Xen-devel] Spectre Mitigations in Xen 4.6

2018-03-20 Thread Jason Andryuk
On Tue, Mar 20, 2018 at 11:20 AM, Jan Beulich wrote: On 20.03.18 at 13:58, wrote: >> With that in place, I'm seeing Dom0 receive a general protection fault on >> boot >> >> [ 25.460035] general protection fault: [#1] SMP >> [ 25.460292] EIP: switch_mm_irqs_off+0xbe/0x600 >> >> switc

Re: [Xen-devel] Spectre Mitigations in Xen 4.6

2018-03-20 Thread Jan Beulich
>>> On 20.03.18 at 13:58, wrote: > With that in place, I'm seeing Dom0 receive a general protection fault on > boot > > [ 25.460035] general protection fault: [#1] SMP > [ 25.460292] EIP: switch_mm_irqs_off+0xbe/0x600 > > switch_mm_irqs_off+0xbe is the inlined > indirect_branch_predict

Re: [Xen-devel] Spectre Mitigations in Xen 4.6

2018-03-20 Thread Jan Beulich
>>> On 20.03.18 at 13:58, wrote: > I've been experimenting with Linux 4.14 on Xen 4.6. Now that Intel > microcode is generally > available, I'm starting to exercise the new mitigation code paths. > > For Xen 4.6-4.8, microcode loading happens after > init_speculation_mitigations, so Xen only > d

[Xen-devel] Spectre Mitigations in Xen 4.6

2018-03-20 Thread Jason Andryuk
Hi, I've been experimenting with Linux 4.14 on Xen 4.6. Now that Intel microcode is generally available, I'm starting to exercise the new mitigation code paths. For Xen 4.6-4.8, microcode loading happens after init_speculation_mitigations, so Xen only detects the boot firmware features. The ear