RFR: 8164652: c1 port, code patching

Andrew Haley aph at redhat.com
Sun Sep 4 07:43:00 UTC 2016

On 31/08/16 17:58, Andrew Haley wrote:
> [ As an aside: I don't think that the trampolines on AArch64 are
> vulnerable in the same way ... Having said that, perhaps we need
> an acquiring load in this AArch64 stub instead of a simple LDR. ]

I realized [remembered?] that this isn't really a problem.  The worst
that can happen is that we see a pointer to the old version of our
callee and jump to it.  That's OK because the old version is still a
correct execution, but it'll probably trap because it's marked as


More information about the aarch32-port-dev mailing list