Revert the change that enables retpoline PLTs by default. While these
authorkettenis <kettenis@openbsd.org>
Mon, 12 Feb 2024 10:46:10 +0000 (10:46 +0000)
committerkettenis <kettenis@openbsd.org>
Mon, 12 Feb 2024 10:46:10 +0000 (10:46 +0000)
commit2e1a1ea9d7cb961ac7559076a37c41ff955fc0dc
tree106dcbc40775f444e148d4e5465a359998c16155
parent1adcc54fab8fde334a25d1b100ff42513ad93b2d
Revert the change that enables retpoline PLTs by default.  While these
provide a mitigation against branch speculation attacks, they also make
IBT control flow integrity less effective.  Our kernel now uses IBPB to
as a mitigation against branch speculation attacks, so we can disable
retpoline PLTs again.

ok deraadt@
gnu/llvm/lld/ELF/Driver.cpp