Thanks for the suggestion. I've sent an inquiry to the author of
-mharden-sls* in GCC and hopefully that would shed some more light. We
do get warnings for oraphon sections when using lld. The other linkers
do not seem to provide such warnings, although the boot failure also
does not seem to happen
On Wed, Mar 10, 2021 at 5:43 AM Jian Cai wrote:
> On Sat, Mar 6, 2021 at 4:25 AM Linus Walleij wrote:
> > On Fri, Mar 5, 2021 at 12:23 AM Jian Cai wrote:
> > > On Wed, Mar 3, 2021 at 7:04 AM Linus Walleij
> > > wrote:
> > > I think gcc also has these options.
> > > https://gcc.gnu.org/onlined
On Sat, Mar 6, 2021 at 4:25 AM Linus Walleij wrote:
>
> On Fri, Mar 5, 2021 at 12:23 AM Jian Cai wrote:
> > On Wed, Mar 3, 2021 at 7:04 AM Linus Walleij
> > wrote:
> > >
> > > On Tue, Feb 23, 2021 at 3:36 AM Jian Cai wrote:
> > >
> > > > This patch adds CONFIG_HARDEN_SLS_ALL that can be used t
On Fri, Mar 5, 2021 at 12:23 AM Jian Cai wrote:
> On Wed, Mar 3, 2021 at 7:04 AM Linus Walleij wrote:
> >
> > On Tue, Feb 23, 2021 at 3:36 AM Jian Cai wrote:
> >
> > > This patch adds CONFIG_HARDEN_SLS_ALL that can be used to turn on
> > > -mharden-sls=all, which mitigates the straight-line spec
On Wed, Mar 3, 2021 at 7:04 AM Linus Walleij wrote:
>
> On Tue, Feb 23, 2021 at 3:36 AM Jian Cai wrote:
>
> > This patch adds CONFIG_HARDEN_SLS_ALL that can be used to turn on
> > -mharden-sls=all, which mitigates the straight-line speculation
> > vulnerability, speculative execution of the instr
On Tue, Feb 23, 2021 at 3:36 AM Jian Cai wrote:
> This patch adds CONFIG_HARDEN_SLS_ALL that can be used to turn on
> -mharden-sls=all, which mitigates the straight-line speculation
> vulnerability, speculative execution of the instruction following some
> unconditional jumps. Notice -mharden-sls
6 matches
Mail list logo