On 21/11/2018 10:05, Norbert Manthey wrote:
> On 11/20/18 17:37, Andrew Cooper wrote:
>> On 20/11/2018 15:49, Jan Beulich wrote:
>>>>>> On 20.11.18 at 16:37, <nmant...@amazon.de> wrote:
>>>> To mitigate Meltdown, Xen has been fixed with a software fix, namely
>>>> using retpoline sequences generated by the compiler. This way, indirect
>>>> branches are protected against the attack.
>>> Actually I was meaning to commit this right away, but then my
>>> attention was drawn by the mention of Meltdown above: I think
>>> you mean Spectre v2 instead? I'd like to avoid the change being
>>> confusing to readers later on ...
>> Yes - jump tables / retpolines are only relevant to Spectre v2 / "Branch
>> Target Injection".
>>
>> Meltdown isn't applicable here.
>>
>> ~Andrew
> Yes, I mixed these two up. I sometimes get confused with all the
> variants and numbers. I'll send a second version with an updated commit
> message.

No need.  Jan fixed it up on commit.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to