This is the mail archive of the
binutils@sourceware.org
mailing list for the binutils project.
Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre".
- From: Nick Clifton <nickc at redhat dot com>
- To: Sriraman Tallam <tmsriram at google dot com>, Cary Coutant <ccoutant at gmail dot com>, binutils <binutils at sourceware dot org>
- Cc: Chandler Carruth <chandlerc at google dot com>, Reid Kleckner <rnk at google dot com>, Eric Christopher <echristo at google dot com>, Rui Ueyama <ruiu at google dot com>, Brooks Moses <bmoses at google dot com>, Sidney Hummert <shummert at google dot com>, Xinliang David Li <davidxl at google dot com>, "H.J. Lu" <hjl dot tools at gmail dot com>
- Date: Mon, 8 Jan 2018 11:16:17 +0000
- Subject: Re: Gold Linker Patch: Introduce the "retpoline" x86 mitigation technique for variant #2 of the speculative execution vulnerabilities disclosed today, specifically identified by CVE-2017-5715 and in some places called "spectre".
- Authentication-results: sourceware.org; auth=none
- References: <CAAs8HmzJkLiGaUWf9czpNfEejM=uCP=zFvudADEuxsA2wHk+fQ@mail.gmail.com> <CAAs8HmwWFfA24ngmPWv4xOVYsV1+QY_EsNNpRgD9n_6iPLdy9w@mail.gmail.com>
Hi Sri,
> Patch attached for the gold linker.
Did I miss something, or has this patch only been submitted for the gold linker
and not the bfd linker ?
>> This "retpoline" mitigation is fully described in the following blog post:
>> https://support.google.com/faqs/answer/7625886
I think that it might be useful to include this link in the documentation
for the -z retpolineplt option.
It occurs to me that it might also be useful to be able to mark a binary
as having been linked with this option, so that the loader (or a static
tool) can check, and if desired, reject a binary as being insecure.
Cheers
Nick