diff options
author | Philip Guenther <guenther@cvs.openbsd.org> | 2023-07-31 04:01:08 +0000 |
---|---|---|
committer | Philip Guenther <guenther@cvs.openbsd.org> | 2023-07-31 04:01:08 +0000 |
commit | 7bd20a387a6e2bbbca5ba752677e3dd8368caa1c (patch) | |
tree | a3e61f231334040504fa862ba0c6c280d37ea86b /lib/libcrypto/des | |
parent | 3cf9361b0320910c0548d575ba37cdd7532ad0b7 (diff) |
On CPUs with eIBRS ("enhanced Indirect Branch Restricted Speculation")
or IBT enabled the kernel, the hardware should the attacks which
retpolines were created to prevent. In those cases, retpolines
should be a net negative for security as they are an indirect branch
gadget. They're also slower.
* use -mretpoline-external-thunk to give us control of the code
used for indirect branches
* default to using a retpoline as before, but marks it and the
other ASM kernel retpolines for code patching
* if the CPU has eIBRS, then enable it
* if the CPU has eIBRS *or* IBT, then codepatch the three different
retpolines to just indirect jumps
make clean && make config required after this
ok kettenis@
Diffstat (limited to 'lib/libcrypto/des')
0 files changed, 0 insertions, 0 deletions