On 11/20/18 17:37, Andrew Cooper wrote:
> On 20/11/2018 15:49, Jan Beulich wrote:
>>>>> On 20.11.18 at 16:37, <nmant...@amazon.de> wrote:
>>> To mitigate Meltdown, Xen has been fixed with a software fix, namely
>>> using retpoline sequences generated by the compiler. This way, indirect
>>> branches are protected against the attack.
>> Actually I was meaning to commit this right away, but then my
>> attention was drawn by the mention of Meltdown above: I think
>> you mean Spectre v2 instead? I'd like to avoid the change being
>> confusing to readers later on ...
> Yes - jump tables / retpolines are only relevant to Spectre v2 / "Branch
> Target Injection".
>
> Meltdown isn't applicable here.
>
> ~Andrew

Yes, I mixed these two up. I sometimes get confused with all the
variants and numbers. I'll send a second version with an updated commit
message.

Best,
Norbert






Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrer: Christian Schlaeger, Ralf Herbrich
Ust-ID: DE 289 237 879
Eingetragen am Amtsgericht Charlottenburg HRB 149173 B

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to