[PATCH 0/5] x86: CVE-2017-5715, aka Spectre

Florian Weimer fw@deneb.enyo.de
Sat Jan 13 12:17:00 GMT 2018


* David Woodhouse:

>> Do you assume that you will eventually apply run-time patching to
>> thunks (in case they aren't needed)?
>
> "eventually"? We've been doing it for weeks. We are desperate to
> release the kernel.... when can we have agreement on at *least* the
> command line option and the name of the thunk? Internal implementation
> details we really don't care about, but those we do.

Thanks.  Are you content with patching just the thunk, or would you
prefer patching the control transfer to it, too?



More information about the Gcc-patches mailing list