| # Use C++11 without extensions |
| set(CMAKE_CXX_STANDARD 11) |
| set(CMAKE_CXX_EXTENSIONS off) |
| |
| # Enable at least some optimization in all builds. The Ret2Spec demo, in |
| # particular, will segfault if built without optimizations. |
| # TODO(https://git.io/JecmX): Fix the crash in Ret2Spec |
| add_compile_options(-O2) |
| |
| # Disable run-time code checking on MSVC. It's enabled by default in CMake's |
| # debug build settings, but it's incompatible with optimizations. |
| string(REPLACE "/RTC1" "" CMAKE_CXX_FLAGS_DEBUG ${CMAKE_CXX_FLAGS_DEBUG}) |
| |
| # When targeting x86, we need to opt in to SSE2 instructions like |
| # clflush, mfence, lfence. |
| if((${CMAKE_SYSTEM_PROCESSOR} MATCHES "^(i.86)$") AND |
| (${CMAKE_C_COMPILER_ID} MATCHES "^(Clang)|(GNU)$")) |
| add_compile_options(-msse2) |
| endif() |
| |
| # Support library |
| add_library(safeside cache_sidechannel.cc instr.cc) |
| |
| # Spectre V1 -- bounds check bypass |
| add_executable(spectre_v1 spectre_v1.cc) |
| target_link_libraries(spectre_v1 safeside) |
| |
| # Spectre V1 indirect jumps -- mistrating BTB instead of PHT. |
| add_executable(spectre_v1_indirect_jumps spectre_v1_indirect_jumps.cc) |
| target_link_libraries(spectre_v1_indirect_jumps safeside) |
| |
| # Spectre V4 -- speculative store bypass |
| add_executable(spectre_v4 spectre_v4.cc) |
| target_link_libraries(spectre_v4 safeside) |
| |
| # Cyclic Ret2Spec -- rewriting the RSB |
| add_executable(ret2spec_cyclic ret2spec_cyclic.cc) |
| target_link_libraries(ret2spec_cyclic safeside) |
| |
| if((${CMAKE_SYSTEM_NAME} MATCHES "^(Linux)|(Darwin)$") AND |
| (${CMAKE_SYSTEM_PROCESSOR} MATCHES "^(i.86)|(x86_64)|(aarch64)$")) |
| # Ret2Spec -- speculative execution using return stack buffers |
| add_executable(ret2spec ret2spec.cc) |
| target_compile_options(ret2spec PRIVATE -fomit-frame-pointer) |
| target_link_libraries(ret2spec safeside) |
| endif() |
| |
| if((${CMAKE_SYSTEM_NAME} MATCHES "^(Linux)$") AND |
| (${CMAKE_SYSTEM_PROCESSOR} MATCHES "^(i.86)|(x86_64)|(ppc64le)$")) |
| # Spectre V3 / Meltdown |
| add_executable(meltdown meltdown.cc) |
| target_link_libraries(meltdown safeside) |
| endif() |
| |
| if((${CMAKE_SYSTEM_NAME} MATCHES "^(Linux)$") AND |
| (${CMAKE_SYSTEM_PROCESSOR} MATCHES "^(aarch64)$")) |
| # Speculation over ERET, HVC and SMC instructions |
| add_executable(eret_hvc_smc_wrapper eret_hvc_smc_wrapper.cc) |
| target_link_libraries(eret_hvc_smc_wrapper safeside) |
| |
| # Speculation over syscall |
| add_executable(speculation_over_syscall speculation_over_syscall.cc) |
| target_link_libraries(speculation_over_syscall safeside) |
| |
| # Meltdown UD -- speculation over an undefined instruction |
| add_executable(meltdown_ud meltdown_ud.cc) |
| target_link_libraries(meltdown_ud safeside) |
| endif() |
| |
| if((${CMAKE_SYSTEM_NAME} MATCHES "^(Linux)$") AND |
| (${CMAKE_SYSTEM_PROCESSOR} MATCHES "^(i.86)|(x86_64)$")) |
| # L1 terminal fault -- Foreshadow OS -- Meltdown P |
| add_executable(l1tf l1tf.cc) |
| target_link_libraries(l1tf safeside) |
| endif() |