[Xen-devel] SpectreV1+L1TF Patch Series v7

2019-02-21 Thread Norbert Manthey
Dear all, This patch series attempts to mitigate the issue that have been raised in the XSA-289 (https://xenbits.xen.org/xsa/advisory-289.html), namely to avoid touching memory from the hypervisor speculatively that would not be touched without speculation. To block speculative execution on Intel

Re: [Xen-devel] SpectreV1+L1TF Patch Series v6

2019-02-08 Thread Julien Grall
Hi, Please don't send the next version in reply-to a random e-mail from the previous version. Instead you should create a new thread to make things easier for review. Cheers, -- Julien Grall ___ Xen-devel mailing list

[Xen-devel] SpectreV1+L1TF Patch Series v6

2019-02-08 Thread Norbert Manthey
Dear all, This patch series attempts to mitigate the issue that have been raised in the XSA-289 (https://xenbits.xen.org/xsa/advisory-289.html). To block speculative execution on Intel hardware, an lfence instruction is required to make sure that selected checks are not bypassed. Speculative

[Xen-devel] SpectreV1+L1TF Patch Series v5

2019-01-29 Thread Norbert Manthey
Dear all, This patch series attempts to mitigate the issue that have been raised in the XSA-289 (https://xenbits.xen.org/xsa/advisory-289.html). To block speculative execution on Intel hardware, an lfence instruction is required to make sure that selected checks are not bypassed. Speculative

Re: [Xen-devel] SpectreV1+L1TF Patch Series

2019-01-28 Thread Norbert Manthey
On 1/24/19 22:05, Andrew Cooper wrote: > On 23/01/2019 11:51, Norbert Manthey wrote: >> Dear all, >> >> This patch series attempts to mitigate the issue that have been raised in the >> XSA-289 (https://xenbits.xen.org/xsa/advisory-289.html). To block speculative >> execution on Intel hardware, an

Re: [Xen-devel] SpectreV1+L1TF Patch Series

2019-01-28 Thread Juergen Gross
On 28/01/2019 10:56, Jan Beulich wrote: On 28.01.19 at 09:47, wrote: >> On 28/01/2019 09:28, Jan Beulich wrote: >> On 23.01.19 at 12:51, wrote: This patch series attempts to mitigate the issue that have been raised in the XSA-289

Re: [Xen-devel] SpectreV1+L1TF Patch Series

2019-01-28 Thread Jan Beulich
>>> On 28.01.19 at 09:47, wrote: > On 28/01/2019 09:28, Jan Beulich wrote: > On 23.01.19 at 12:51, wrote: >>> This patch series attempts to mitigate the issue that have been raised in >>> the >>> XSA-289 (https://xenbits.xen.org/xsa/advisory-289.html). To block >>> speculative >>>

Re: [Xen-devel] SpectreV1+L1TF Patch Series

2019-01-28 Thread Juergen Gross
On 28/01/2019 09:28, Jan Beulich wrote: > Jürgen, > On 23.01.19 at 12:51, wrote: >> This patch series attempts to mitigate the issue that have been raised in the >> XSA-289 (https://xenbits.xen.org/xsa/advisory-289.html). To block speculative >> execution on Intel hardware, an lfence

Re: [Xen-devel] SpectreV1+L1TF Patch Series

2019-01-28 Thread Jan Beulich
Jürgen, >>> On 23.01.19 at 12:51, wrote: > This patch series attempts to mitigate the issue that have been raised in the > XSA-289 (https://xenbits.xen.org/xsa/advisory-289.html). To block speculative > execution on Intel hardware, an lfence instruction is required to make sure > that selected

Re: [Xen-devel] SpectreV1+L1TF Patch Series

2019-01-24 Thread Andrew Cooper
On 23/01/2019 11:51, Norbert Manthey wrote: > Dear all, > > This patch series attempts to mitigate the issue that have been raised in the > XSA-289 (https://xenbits.xen.org/xsa/advisory-289.html). To block speculative > execution on Intel hardware, an lfence instruction is required to make sure >

[Xen-devel] SpectreV1+L1TF Patch Series

2019-01-23 Thread Norbert Manthey
Dear all, This patch series attempts to mitigate the issue that have been raised in the XSA-289 (https://xenbits.xen.org/xsa/advisory-289.html). To block speculative execution on Intel hardware, an lfence instruction is required to make sure that selected checks are not bypassed. Speculative