RFR: 8164652: c1 port, code patching
Andrew Haley
aph at redhat.com
Sun Sep 4 07:43:00 UTC 2016
On 31/08/16 17:58, Andrew Haley wrote:
> [ As an aside: I don't think that the trampolines on AArch64 are
> vulnerable in the same way ... Having said that, perhaps we need
> an acquiring load in this AArch64 stub instead of a simple LDR. ]
I realized [remembered?] that this isn't really a problem. The worst
that can happen is that we see a pointer to the old version of our
callee and jump to it. That's OK because the old version is still a
correct execution, but it'll probably trap because it's marked as
non-entrant.
Andrew.
More information about the aarch32-port-dev
mailing list