Retpoline v5 Published For Fending Off Spectre Branch Target Injection
![LINUX SECURITY](/assets/categories/linuxsecurity.webp)
Retpoline v5 is the latest as of Saturday morning as the ongoing effort for avoiding speculative indirect calls within the Linux kernel for preventing a branch target injection style attack. These 200+ lines of kernel code paired with the GCC Retpoline patches are able to address vulnerable indirect branches in the Linux kernel.
The Retpoline approach is said to only have up to a ~1.5% performance hit when patched... I hope this weekend to get around to trying these kernel and GCC patches on some of my systems for looking at the performance impact in our commonly benchmarked workloads. The Retpoline work is separate from the KPTI page table isolation work for addressing the Intel CPU Meltdown issue.
With the fifth version of these patches, some warnings have been taken care of, the X86_FEATURE_RETPOLINE logic improved, and the AMD support for Retpoline has been merged into the main patches rather than having its own patch. Of Variant Two, AMD's security notice did say that their architecture has "near zero risk of exploitation" but looks like it will be protected nevertheless by the Retpoline patches with nominal performance overhead.
These latest patches for now can be found on the kernel mailing list while should be merged to the mainline tree for Linux 4.16. There is also the GCC patch tree and the patches can be obtained as well via linux-retpoline.git. Stay tuned for benchmarks.
23 Comments