On 11/20/18 17:37, Andrew Cooper wrote: > On 20/11/2018 15:49, Jan Beulich wrote: >>>>> On 20.11.18 at 16:37, <nmant...@amazon.de> wrote: >>> To mitigate Meltdown, Xen has been fixed with a software fix, namely >>> using retpoline sequences generated by the compiler. This way, indirect >>> branches are protected against the attack. >> Actually I was meaning to commit this right away, but then my >> attention was drawn by the mention of Meltdown above: I think >> you mean Spectre v2 instead? I'd like to avoid the change being >> confusing to readers later on ... > Yes - jump tables / retpolines are only relevant to Spectre v2 / "Branch > Target Injection". > > Meltdown isn't applicable here. > > ~Andrew
Yes, I mixed these two up. I sometimes get confused with all the variants and numbers. I'll send a second version with an updated commit message. Best, Norbert Amazon Development Center Germany GmbH Krausenstr. 38 10117 Berlin Geschaeftsfuehrer: Christian Schlaeger, Ralf Herbrich Ust-ID: DE 289 237 879 Eingetragen am Amtsgericht Charlottenburg HRB 149173 B _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel