Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add retpoline mitigation for x86-64 Linux indirect calls #315

Merged
merged 2 commits into from Jul 20, 2023

Conversation

hawkinsw
Copy link
Collaborator

Spectre/Meltdown lurk where indirect calls are used. Let's protect against the badness if we can.

@hawkinsw hawkinsw self-assigned this Jul 17, 2023
@hawkinsw hawkinsw force-pushed the linux_x86_64_retpolines branch 4 times, most recently from ead37a5 to 0a0a94c Compare July 19, 2023 02:37
@Alan-Jowett
Copy link
Collaborator

What changed in bpf_conformance for this?

Spectre/Meltdown lurk where indirect calls are used. Let's protect
against the badness if we can.

Signed-off-by: Will Hawkins <hawkinsw@obs.cr>
@hawkinsw
Copy link
Collaborator Author

What changed in bpf_conformance for this?

Mistake! Should be sorted in the newest version!

@Alan-Jowett Alan-Jowett merged commit 7c6b844 into iovisor:main Jul 20, 2023
30 of 34 checks passed
@hawkinsw hawkinsw deleted the linux_x86_64_retpolines branch July 21, 2023 15:48
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants