summaryrefslogtreecommitdiff
path: root/lib/libcrypto/des
diff options
context:
space:
mode:
authorPhilip Guenther <guenther@cvs.openbsd.org>2023-07-31 04:01:08 +0000
committerPhilip Guenther <guenther@cvs.openbsd.org>2023-07-31 04:01:08 +0000
commit7bd20a387a6e2bbbca5ba752677e3dd8368caa1c (patch)
treea3e61f231334040504fa862ba0c6c280d37ea86b /lib/libcrypto/des
parent3cf9361b0320910c0548d575ba37cdd7532ad0b7 (diff)
On CPUs with eIBRS ("enhanced Indirect Branch Restricted Speculation")
or IBT enabled the kernel, the hardware should the attacks which retpolines were created to prevent. In those cases, retpolines should be a net negative for security as they are an indirect branch gadget. They're also slower. * use -mretpoline-external-thunk to give us control of the code used for indirect branches * default to using a retpoline as before, but marks it and the other ASM kernel retpolines for code patching * if the CPU has eIBRS, then enable it * if the CPU has eIBRS *or* IBT, then codepatch the three different retpolines to just indirect jumps make clean && make config required after this ok kettenis@
Diffstat (limited to 'lib/libcrypto/des')
0 files changed, 0 insertions, 0 deletions