Announcement

Collapse
No announcement yet.

Retpoline v5 Published For Fending Off Spectre Branch Target Injection

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • audir8
    replied
    I'm guessing these patches will be back-ported to 4.14 or 4.15 once they're in 4.16-rc*. Which GCC versions (5.x, 6.x) will be getting the patches?

    Leave a comment:


  • andreano
    replied
    Retpoline = trampoline return = Some kind of indirect return to defend against return oriented programming?

    Just guessing.

    > Does every program have to be recompiled

    Since we're talking about Spectre, yes, that must be the null hypothesis. But the kernel is also more important to defend than the sum of all userspace programs, considering that the kernel can access other programs' memory.
    Last edited by andreano; 06 January 2018, 11:55 AM.

    Leave a comment:


  • eydee
    replied
    Without getting too convoluted... Does every program have to be recompiled with the new GCC, or just the kernel?

    Leave a comment:


  • Retpoline v5 Published For Fending Off Spectre Branch Target Injection

    Phoronix: Retpoline v5 Published For Fending Off Spectre Branch Target Injection

    David Woodhouse of Amazon has sent out the latest quickly-revising patches for introducing the "Retpoline" functionality to the Linux kernel for mitigating the Spectre "variant 2" attack...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite
Working...
X