Hacker News new | past | comments | ask | show | jobs | submit login

Not able to answer your questions, but a comment on the article -

>During this same time period, we saw additional CPU increases on our PV instances that had been previously upgraded. This seems to imply some level of HVM patching was occurring on these PV instances around the same time that all pure-HVM instances were patched

This is likely due to Vixen: https://lists.xenproject.org/archives/html/xen-devel/2018-01...

>.... Instead of trying to make a KPTI-like approach work for Xen PV, it seems reasonable to run a copy of Xen within an HVM (or PVH) domU ..... >.... all PV instances in EC2 are using this ....

So the initial bump after the reboot would have been the shim hypervisor which mitigates Vixen. The secondary bump, and bump the native HVM instances saw, would have been the Spectre related stuff.

Based on https://aws.amazon.com/security/security-bulletins/AWS-2018-... - guessing Intel microcode updates




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: