* Clarification Meltdown for vulnerability between 64-bit PV guests
@ 2018-05-16 8:37 John Wang
2018-05-16 12:56 ` Andrew Cooper
0 siblings, 1 reply; 2+ messages in thread
From: John Wang @ 2018-05-16 8:37 UTC (permalink / raw)
To: xen-devel
[-- Attachment #1.1: Type: text/plain, Size: 305 bytes --]
Hi:
64 bit PV guest can attack hypervisor by SP3, whether it still can
attack others 64 bit PV guest by SP3 ? If yes, whether the xpti enable
on hypervisor can prevent vulnerability? if no, what operations need
to be done on 64 PV guest or hypervisor?
--
Thanks
APACII QA
John(XiaoGen Wang)
[-- Attachment #1.2: Type: text/html, Size: 625 bytes --]
[-- Attachment #2: Type: text/plain, Size: 157 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: Clarification Meltdown for vulnerability between 64-bit PV guests
2018-05-16 8:37 Clarification Meltdown for vulnerability between 64-bit PV guests John Wang
@ 2018-05-16 12:56 ` Andrew Cooper
0 siblings, 0 replies; 2+ messages in thread
From: Andrew Cooper @ 2018-05-16 12:56 UTC (permalink / raw)
To: John Wang, xen-devel
[-- Attachment #1.1: Type: text/plain, Size: 444 bytes --]
On 16/05/18 09:37, John Wang wrote:
>
> Hi:
>
> 64 bit PV guest can attack hypervisor by SP3
>
Yes.
> whether it still can attack others 64 bit PV guest by SP3?
>
Meltdown attacks only operate within a single address space. You can't
attack a separate address space with it.
That said, the VM => VM attack with Meltdown is due to the fact that
other VMs are mapped into Xen's directmap, so available by attacking the
hypervisor.
~Andrew
[-- Attachment #1.2: Type: text/html, Size: 1099 bytes --]
[-- Attachment #2: Type: text/plain, Size: 157 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2018-05-16 12:56 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-05-16 8:37 Clarification Meltdown for vulnerability between 64-bit PV guests John Wang
2018-05-16 12:56 ` Andrew Cooper
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.