>>> On 20.11.18 at 16:37, <nmant...@amazon.de> wrote: > To mitigate Meltdown, Xen has been fixed with a software fix, namely > using retpoline sequences generated by the compiler. This way, indirect > branches are protected against the attack.
Actually I was meaning to commit this right away, but then my attention was drawn by the mention of Meltdown above: I think you mean Spectre v2 instead? I'd like to avoid the change being confusing to readers later on ... Jan _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel