Re: [Xen-devel] L1TF Patch Series v8

2019-03-06 Thread Juergen Gross
On 06/03/2019 16:42, Jan Beulich wrote: On 27.02.19 at 17:13, wrote: >> This patch series attempts to mitigate the issue that have been raised in the >> XSA-289 (https://xenbits.xen.org/xsa/advisory-289.html). To block speculative >> execution on Intel hardware, an lfence instruction is requi

Re: [Xen-devel] L1TF Patch Series v8

2019-03-06 Thread Jan Beulich
>>> On 27.02.19 at 17:13, wrote: > This patch series attempts to mitigate the issue that have been raised in the > XSA-289 (https://xenbits.xen.org/xsa/advisory-289.html). To block speculative > execution on Intel hardware, an lfence instruction is required to make sure > that selected checks are

[Xen-devel] L1TF Patch Series v8

2019-02-27 Thread Norbert Manthey
This patch series attempts to mitigate the issue that have been raised in the XSA-289 (https://xenbits.xen.org/xsa/advisory-289.html). To block speculative execution on Intel hardware, an lfence instruction is required to make sure that selected checks are not bypassed. Speculative out-of-bound acc

[Xen-devel] L1TF Patch Series v8 (was SpectreV1+L1TF)

2019-02-25 Thread Norbert Manthey
Dear all, This patch series attempts to mitigate the issue that have been raised in the XSA-289 (https://xenbits.xen.org/xsa/advisory-289.html). To block speculative execution on Intel hardware, an lfence instruction is required to make sure that selected checks are not bypassed. Speculative out-o