This is the mail archive of the
gcc-help@gcc.gnu.org
mailing list for the GCC project.
Re: Patches for Spectre
- From: Mason <slash dot tmp at free dot fr>
- To: Robert Dinse <nanook at eskimo dot com>
- Cc: GCC help <gcc-help at gcc dot gnu dot org>
- Date: Mon, 15 Jan 2018 11:10:28 +0100
- Subject: Re: Patches for Spectre
- Authentication-results: sourceware.org; auth=none
- References: <Pine.LNX.4.64.1801120635230.13736@centos6.eskimo.com>
On 12/01/2018 15:36, Robert Dinse wrote:
> I'm hoping someone can tell me where to find patches for gcc-8
> that add the various options necessary for mitigating Spectre in
> compilation of a Linux kernel?
https://www.phoronix.com/scan.php?page=news_item&px=GCC-8-Patches-Spectre
https://gcc.gnu.org/ml/gcc-patches/2018-01/msg00422.html
"Retpoline: a software construct for preventing branch-target-injection"
https://support.google.com/faqs/answer/7625886
The post that started it all:
"Reading privileged memory with a side-channel"
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Follow-up to the original post:
"More details about mitigations for the CPU Speculative Execution issue"
https://security.googleblog.com/2018/01/more-details-about-mitigations-for-cpu_4.html
Mainstream coverage:
https://www.bleepingcomputer.com/news/google/google-unveils-new-retpoline-coding-technique-for-mitigating-spectre-attacks/
Regards.