Rust Linux Kernel Code Prepares For CPU Mitigations Handling
([Programming] 4 Hours Ago
Rust CPU Mitigations)
- Reference: 0001480973
- News link: https://www.phoronix.com/news/Rust-Linux-CPU-Mitigations
- Source link:
The latest Rust for the Linux kernel work led by Miguel Ojeda is on preparing the Rust kernel code for various CPU security mitigations.
Miguel today sent out the latest patches on implementing various CPU security mitigations within the Rust kernel code and as part of that enabling objtool support for Rust.
The focus is on passing the relevant compiler flags for building the Rust code in light of Retpolines, Rethunk, and Straight Line Speculation (SLS) handling by the compiler. With these patches the appropriate flags will be passed down to the Rust compiler for adequate protections in the security mitigations requiring compiler-side actions.
See [1]this patch series for those interested in this CPU mitigations handling for the Rust Linux kernel code. Miguel is hoping to get these patches applied soon as to avoid objtool warnings currently when building the kernel's Rust code.
[1] https://lore.kernel.org/rust-for-linux/20240724161501.1319115-1-ojeda@kernel.org/
Miguel today sent out the latest patches on implementing various CPU security mitigations within the Rust kernel code and as part of that enabling objtool support for Rust.
The focus is on passing the relevant compiler flags for building the Rust code in light of Retpolines, Rethunk, and Straight Line Speculation (SLS) handling by the compiler. With these patches the appropriate flags will be passed down to the Rust compiler for adequate protections in the security mitigations requiring compiler-side actions.
See [1]this patch series for those interested in this CPU mitigations handling for the Rust Linux kernel code. Miguel is hoping to get these patches applied soon as to avoid objtool warnings currently when building the kernel's Rust code.
[1] https://lore.kernel.org/rust-for-linux/20240724161501.1319115-1-ojeda@kernel.org/
phoronix