Re: [Xen-devel] Clarification regarding Meltdown and 64-bit PV guests

2018-01-15 Thread Stefano Stabellini
On Sun, 14 Jan 2018, Hans van Kranenburg wrote: > On 14/01/2018 15:00, Dongli Zhang wrote: > > Hi Hans, > > > > On 01/13/2018 07:12 PM, Hans van Kranenburg wrote: > >> On 01/13/2018 11:08 AM, Andy Smith wrote: > >>> Hi Hans, > >>> > >>> On Sat, Jan 13, 2018 at 10:43:03AM +0100, Hans van Kranenburg

Re: [Xen-devel] Clarification regarding Meltdown and 64-bit PV guests

2018-01-14 Thread Hans van Kranenburg
On 14/01/2018 15:00, Dongli Zhang wrote: > Hi Hans, > > On 01/13/2018 07:12 PM, Hans van Kranenburg wrote: >> On 01/13/2018 11:08 AM, Andy Smith wrote: >>> Hi Hans, >>> >>> On Sat, Jan 13, 2018 at 10:43:03AM +0100, Hans van Kranenburg wrote: By injecting a copy of a hypervisor between the out

Re: [Xen-devel] Clarification regarding Meltdown and 64-bit PV guests

2018-01-14 Thread Dongli Zhang
Hi Hans and Lars, On 01/13/2018 07:12 PM, Hans van Kranenburg wrote: > On 01/13/2018 11:08 AM, Andy Smith wrote: >> Hi Hans, >> >> On Sat, Jan 13, 2018 at 10:43:03AM +0100, Hans van Kranenburg wrote: >>> By injecting a copy of a hypervisor between the outer level hypervisor >>> (that's called L0 r

Re: [Xen-devel] Clarification regarding Meltdown and 64-bit PV guests

2018-01-14 Thread Dongli Zhang
Hi Hans, On 01/13/2018 07:12 PM, Hans van Kranenburg wrote: > On 01/13/2018 11:08 AM, Andy Smith wrote: >> Hi Hans, >> >> On Sat, Jan 13, 2018 at 10:43:03AM +0100, Hans van Kranenburg wrote: >>> By injecting a copy of a hypervisor between the outer level hypervisor >>> (that's called L0 right?) (i

Re: [Xen-devel] Clarification regarding Meltdown and 64-bit PV guests

2018-01-13 Thread Hans van Kranenburg
On 01/13/2018 11:08 AM, Andy Smith wrote: > Hi Hans, > > On Sat, Jan 13, 2018 at 10:43:03AM +0100, Hans van Kranenburg wrote: >> By injecting a copy of a hypervisor between the outer level hypervisor >> (that's called L0 right?) (in HVM or PVH mode) and the guest, having it >> just run 1 guest, th

Re: [Xen-devel] Clarification regarding Meltdown and 64-bit PV guests

2018-01-13 Thread Andy Smith
Hi Hans, On Sat, Jan 13, 2018 at 10:43:03AM +0100, Hans van Kranenburg wrote: > By injecting a copy of a hypervisor between the outer level hypervisor > (that's called L0 right?) (in HVM or PVH mode) and the guest, having it > just run 1 guest, that (64-bit PV) guest cannot attack its own kernel,

Re: [Xen-devel] Clarification regarding Meltdown and 64-bit PV guests

2018-01-13 Thread Hans van Kranenburg
On 01/13/2018 07:42 AM, Andy Smith wrote: > Hi, > > In > : > > "On Intel processors, only 64-bit PV mode guests can attack Xen > using Variant 3. [...] 64bit PV domU userspace can attack the hypervisor -> read "host

[Xen-devel] Clarification regarding Meltdown and 64-bit PV guests

2018-01-12 Thread Andy Smith
Hi, In : "On Intel processors, only 64-bit PV mode guests can attack Xen using Variant 3. Guests running in 32-bit PV mode, HVM mode, and PVH mode (both v1 and v2) cannot attack the hypervisor using Variant 3