On 21/11/2018 10:05, Norbert Manthey wrote: > On 11/20/18 17:37, Andrew Cooper wrote: >> On 20/11/2018 15:49, Jan Beulich wrote: >>>>>> On 20.11.18 at 16:37, <nmant...@amazon.de> wrote: >>>> To mitigate Meltdown, Xen has been fixed with a software fix, namely >>>> using retpoline sequences generated by the compiler. This way, indirect >>>> branches are protected against the attack. >>> Actually I was meaning to commit this right away, but then my >>> attention was drawn by the mention of Meltdown above: I think >>> you mean Spectre v2 instead? I'd like to avoid the change being >>> confusing to readers later on ... >> Yes - jump tables / retpolines are only relevant to Spectre v2 / "Branch >> Target Injection". >> >> Meltdown isn't applicable here. >> >> ~Andrew > Yes, I mixed these two up. I sometimes get confused with all the > variants and numbers. I'll send a second version with an updated commit > message.
No need. Jan fixed it up on commit. ~Andrew _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel