On Sun, 7 Jan 2018, Marek Marczykowski-Górecki wrote:
> On Fri, Jan 05, 2018 at 07:05:56PM +0000, Andrew Cooper wrote:
> > On 05/01/18 18:16, Rich Persaud wrote:
> > >> On Jan 5, 2018, at 06:35, Lars Kurth <lars.kurth....@gmail.com
> > >> <mailto:lars.kurth....@gmail.com>> wrote:
> > >> Linux’s KPTI series is designed to address SP3 only.  For Xen guests,
> > >> only 64-bit PV guests are affected by SP3. A KPTI-like approach was
> > >> explored initially, but required significant ABI changes.  
> 
> Is some partial KPTI-like approach feasible? Like unmapping memory owned
> by other guests, but keeping Xen areas mapped? This will still allow
> leaking Xen memory, but there are very few secrets there (vCPUs state,
> anything else?), so overall impact will be much lower.

+1
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to