On Thu, Jun 29, 2023 at 10:54:10AM +0200, Theo Buehler wrote:
> On Thu, Jun 29, 2023 at 09:23:53AM +0100, Stuart Henderson wrote:
> > Does the same happen if you build your own kernel rather than using a
> > snap?
> 
> Someone will have to port the patches that add _CET_ENDBR from
> security/boringssl/head to security/rust-ring.

Something like this should do the trick. Can't test it.  Build and
install rust-ring with this patch, then build and install ncspot.

Index: Makefile
===================================================================
RCS file: /cvs/ports/security/rust-ring/Makefile,v
retrieving revision 1.10
diff -u -p -r1.10 Makefile
--- Makefile    12 Apr 2023 18:43:01 -0000      1.10
+++ Makefile    29 Jun 2023 09:22:34 -0000
@@ -4,7 +4,7 @@ COMMENT =               ring crate source patched for
 VERSION =              0.16.20
 DISTNAME =             ring-${VERSION}
 PKGNAME =              rust-${DISTNAME}
-REVISION =             6
+REVISION =             7
 
 SUBST_VARS =           VERSION
 
Index: patches/patch-pregenerated_aesni-gcm-x86_64-elf_S
===================================================================
RCS file: 
/cvs/ports/security/rust-ring/patches/patch-pregenerated_aesni-gcm-x86_64-elf_S,v
retrieving revision 1.2
diff -u -p -r1.2 patch-pregenerated_aesni-gcm-x86_64-elf_S
--- patches/patch-pregenerated_aesni-gcm-x86_64-elf_S   24 Feb 2023 08:09:50 
-0000      1.2
+++ patches/patch-pregenerated_aesni-gcm-x86_64-elf_S   29 Jun 2023 09:17:43 
-0000
@@ -1,7 +1,23 @@
 Index: pregenerated/aesni-gcm-x86_64-elf.S
 --- pregenerated/aesni-gcm-x86_64-elf.S.orig
 +++ pregenerated/aesni-gcm-x86_64-elf.S
-@@ -827,6 +827,7 @@ GFp_aesni_gcm_encrypt:
+@@ -346,6 +346,7 @@ _aesni_ctr32_ghash_6x:
+ .align        32
+ GFp_aesni_gcm_decrypt:
+ .cfi_startproc        
++      _CET_ENDBR
+       xorq    %r10,%r10
+ 
+ 
+@@ -553,6 +554,7 @@ _aesni_ctr32_6x:
+ .align        32
+ GFp_aesni_gcm_encrypt:
+ .cfi_startproc        
++      _CET_ENDBR
+       xorq    %r10,%r10
+ 
+ 
+@@ -827,6 +829,7 @@ GFp_aesni_gcm_encrypt:
        .byte   0xf3,0xc3
  .cfi_endproc  
  .size GFp_aesni_gcm_encrypt,.-GFp_aesni_gcm_encrypt
@@ -9,7 +25,7 @@ Index: pregenerated/aesni-gcm-x86_64-elf
  .align        64
  .Lbswap_mask:
  .byte 15,14,13,12,11,10,9,8,7,6,5,4,3,2,1,0
-@@ -839,6 +840,7 @@ GFp_aesni_gcm_encrypt:
+@@ -839,6 +842,7 @@ GFp_aesni_gcm_encrypt:
  .Lone_lsb:
  .byte 1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0
  .byte 
65,69,83,45,78,73,32,71,67,77,32,109,111,100,117,108,101,32,102,111,114,32,120,56,54,95,54,52,44,32,67,82,89,80,84,79,71,65,77,83,32,98,121,32,60,97,112,112,114,111,64,111,112,101,110,115,115,108,46,111,114,103,62,0
Index: patches/patch-pregenerated_aesni-x86_64-elf_S
===================================================================
RCS file: 
/cvs/ports/security/rust-ring/patches/patch-pregenerated_aesni-x86_64-elf_S,v
retrieving revision 1.2
diff -u -p -r1.2 patch-pregenerated_aesni-x86_64-elf_S
--- patches/patch-pregenerated_aesni-x86_64-elf_S       24 Feb 2023 08:09:50 
-0000      1.2
+++ patches/patch-pregenerated_aesni-x86_64-elf_S       29 Jun 2023 09:17:43 
-0000
@@ -1,7 +1,31 @@
 Index: pregenerated/aesni-x86_64-elf.S
 --- pregenerated/aesni-x86_64-elf.S.orig
 +++ pregenerated/aesni-x86_64-elf.S
-@@ -1157,6 +1157,7 @@ __aesni_set_encrypt_key:
+@@ -17,6 +17,7 @@
+ .align        16
+ GFp_aes_hw_encrypt:
+ .cfi_startproc        
++      _CET_ENDBR
+       movups  (%rdi),%xmm2
+       movl    240(%rdx),%eax
+       movups  (%rdx),%xmm0
+@@ -274,6 +275,7 @@ _aesni_encrypt8:
+ .align        16
+ GFp_aes_hw_ctr32_encrypt_blocks:
+ .cfi_startproc        
++      _CET_ENDBR
+       cmpq    $1,%rdx
+       jne     .Lctr32_bulk
+ 
+@@ -856,6 +858,7 @@ GFp_aes_hw_ctr32_encrypt_blocks:
+ GFp_aes_hw_set_encrypt_key:
+ __aesni_set_encrypt_key:
+ .cfi_startproc        
++      _CET_ENDBR
+ .byte 0x48,0x83,0xEC,0x08
+ .cfi_adjust_cfa_offset        8
+       movq    $-1,%rax
+@@ -1157,6 +1160,7 @@ __aesni_set_encrypt_key:
        .byte   0xf3,0xc3
  .size GFp_aes_hw_set_encrypt_key,.-GFp_aes_hw_set_encrypt_key
  .size __aesni_set_encrypt_key,.-__aesni_set_encrypt_key
@@ -9,7 +33,7 @@ Index: pregenerated/aesni-x86_64-elf.S
  .align        64
  .Lbswap_mask:
  .byte 15,14,13,12,11,10,9,8,7,6,5,4,3,2,1,0
-@@ -1177,5 +1178,6 @@ __aesni_set_encrypt_key:
+@@ -1177,5 +1181,6 @@ __aesni_set_encrypt_key:
  
  .byte 
65,69,83,32,102,111,114,32,73,110,116,101,108,32,65,69,83,45,78,73,44,32,67,82,89,80,84,79,71,65,77,83,32,98,121,32,60,97,112,112,114,111,64,111,112,101,110,115,115,108,46,111,114,103,62,0
  .align        64
Index: patches/patch-pregenerated_chacha-x86_64-elf_S
===================================================================
RCS file: 
/cvs/ports/security/rust-ring/patches/patch-pregenerated_chacha-x86_64-elf_S,v
retrieving revision 1.2
diff -u -p -r1.2 patch-pregenerated_chacha-x86_64-elf_S
--- patches/patch-pregenerated_chacha-x86_64-elf_S      24 Feb 2023 08:09:50 
-0000      1.2
+++ patches/patch-pregenerated_chacha-x86_64-elf_S      29 Jun 2023 09:17:43 
-0000
@@ -9,7 +9,7 @@ Index: pregenerated/chacha-x86_64-elf.S
  .align        64
  .Lzero:
  .long 0,0,0,0
-@@ -42,6 +43,7 @@
+@@ -42,12 +43,14 @@
  .Lsixteen:
  .long 16,16,16,16,16,16,16,16,16,16,16,16,16,16,16,16
  .byte 
67,104,97,67,104,97,50,48,32,102,111,114,32,120,56,54,95,54,52,44,32,67,82,89,80,84,79,71,65,77,83,32,98,121,32,60,97,112,112,114,111,64,111,112,101,110,115,115,108,46,111,114,103,62,0
@@ -17,3 +17,10 @@ Index: pregenerated/chacha-x86_64-elf.S
  .globl        GFp_ChaCha20_ctr32
  .hidden GFp_ChaCha20_ctr32
  .type GFp_ChaCha20_ctr32,@function
+ .align        64
+ GFp_ChaCha20_ctr32:
+ .cfi_startproc        
++      _CET_ENDBR
+       cmpq    $0,%rdx
+       je      .Lno_data
+       movq    GFp_ia32cap_P+4(%rip),%r10
Index: patches/patch-pregenerated_chacha20_poly1305_x86_64-elf_S
===================================================================
RCS file: 
/cvs/ports/security/rust-ring/patches/patch-pregenerated_chacha20_poly1305_x86_64-elf_S,v
retrieving revision 1.2
diff -u -p -r1.2 patch-pregenerated_chacha20_poly1305_x86_64-elf_S
--- patches/patch-pregenerated_chacha20_poly1305_x86_64-elf_S   24 Feb 2023 
08:09:50 -0000      1.2
+++ patches/patch-pregenerated_chacha20_poly1305_x86_64-elf_S   29 Jun 2023 
09:17:43 -0000
@@ -17,3 +17,19 @@ Index: pregenerated/chacha20_poly1305_x8
  
  .type poly_hash_ad_internal,@function
  .align        64
+@@ -225,6 +227,7 @@ poly_hash_ad_internal:
+ .align        64
+ GFp_chacha20_poly1305_open:
+ .cfi_startproc        
++      _CET_ENDBR
+       pushq   %rbp
+ .cfi_adjust_cfa_offset        8
+ .cfi_offset   %rbp,-16
+@@ -2109,6 +2112,7 @@ GFp_chacha20_poly1305_open:
+ .align        64
+ GFp_chacha20_poly1305_seal:
+ .cfi_startproc        
++      _CET_ENDBR
+       pushq   %rbp
+ .cfi_adjust_cfa_offset        8
+ .cfi_offset   %rbp,-16
Index: patches/patch-pregenerated_ghash-x86_64-elf_S
===================================================================
RCS file: 
/cvs/ports/security/rust-ring/patches/patch-pregenerated_ghash-x86_64-elf_S,v
retrieving revision 1.2
diff -u -p -r1.2 patch-pregenerated_ghash-x86_64-elf_S
--- patches/patch-pregenerated_ghash-x86_64-elf_S       24 Feb 2023 08:09:50 
-0000      1.2
+++ patches/patch-pregenerated_ghash-x86_64-elf_S       29 Jun 2023 09:17:43 
-0000
@@ -1,7 +1,47 @@
 Index: pregenerated/ghash-x86_64-elf.S
 --- pregenerated/ghash-x86_64-elf.S.orig
 +++ pregenerated/ghash-x86_64-elf.S
-@@ -1100,6 +1100,7 @@ GFp_gcm_ghash_avx:
+@@ -17,6 +17,7 @@
+ .align        16
+ GFp_gcm_init_clmul:
+ .cfi_startproc        
++      _CET_ENDBR
+ .L_init_clmul:
+       movdqu  (%rsi),%xmm2
+       pshufd  $78,%xmm2,%xmm2
+@@ -176,6 +177,7 @@ GFp_gcm_init_clmul:
+ .align        16
+ GFp_gcm_gmult_clmul:
+ .cfi_startproc        
++      _CET_ENDBR
+ .L_gmult_clmul:
+       movdqu  (%rdi),%xmm0
+       movdqa  .Lbswap_mask(%rip),%xmm5
+@@ -230,6 +232,7 @@ GFp_gcm_gmult_clmul:
+ .align        32
+ GFp_gcm_ghash_clmul:
+ .cfi_startproc        
++      _CET_ENDBR
+ .L_ghash_clmul:
+       movdqa  .Lbswap_mask(%rip),%xmm10
+ 
+@@ -617,6 +620,7 @@ GFp_gcm_ghash_clmul:
+ .align        32
+ GFp_gcm_init_avx:
+ .cfi_startproc        
++      _CET_ENDBR
+       vzeroupper
+ 
+       vmovdqu (%rsi),%xmm2
+@@ -727,6 +731,7 @@ GFp_gcm_init_avx:
+ .align        32
+ GFp_gcm_ghash_avx:
+ .cfi_startproc        
++      _CET_ENDBR
+       vzeroupper
+ 
+       vmovdqu (%rdi),%xmm10
+@@ -1100,6 +1105,7 @@ GFp_gcm_ghash_avx:
        .byte   0xf3,0xc3
  .cfi_endproc  
  .size GFp_gcm_ghash_avx,.-GFp_gcm_ghash_avx
@@ -9,7 +49,7 @@ Index: pregenerated/ghash-x86_64-elf.S
  .align        64
  .Lbswap_mask:
  .byte 15,14,13,12,11,10,9,8,7,6,5,4,3,2,1,0
-@@ -1111,5 +1112,6 @@ GFp_gcm_ghash_avx:
+@@ -1111,5 +1117,6 @@ GFp_gcm_ghash_avx:
  
  .byte 
71,72,65,83,72,32,102,111,114,32,120,56,54,95,54,52,44,32,67,82,89,80,84,79,71,65,77,83,32,98,121,32,60,97,112,112,114,111,64,111,112,101,110,115,115,108,46,111,114,103,62,0
  .align        64
Index: patches/patch-pregenerated_p256-x86_64-asm-elf_S
===================================================================
RCS file: 
/cvs/ports/security/rust-ring/patches/patch-pregenerated_p256-x86_64-asm-elf_S,v
retrieving revision 1.2
diff -u -p -r1.2 patch-pregenerated_p256-x86_64-asm-elf_S
--- patches/patch-pregenerated_p256-x86_64-asm-elf_S    24 Feb 2023 08:09:50 
-0000      1.2
+++ patches/patch-pregenerated_p256-x86_64-asm-elf_S    29 Jun 2023 09:17:43 
-0000
@@ -10,12 +10,102 @@ Index: pregenerated/p256-x86_64-asm-elf.
  .align        64
  .Lpoly:
  .quad 0xffffffffffffffff, 0x00000000ffffffff, 0x0000000000000000, 
0xffffffff00000001
-@@ -31,7 +31,7 @@
+@@ -31,9 +31,9 @@
  .quad 0xf3b9cac2fc632551, 0xbce6faada7179e84, 0xffffffffffffffff, 
0xffffffff00000000
  .LordK:
  .quad 0xccd1c8aaee00bc4f
--
 +.text
  
  
+-
  .globl        GFp_nistz256_add
+ .hidden GFp_nistz256_add
+ .type GFp_nistz256_add,@function
+@@ -87,6 +87,7 @@ GFp_nistz256_add:
+ .align        32
+ GFp_nistz256_neg:
+ .cfi_startproc        
++      _CET_ENDBR
+       pushq   %r12
+ .cfi_adjust_cfa_offset        8
+ .cfi_offset   %r12,-16
+@@ -149,6 +150,7 @@ GFp_nistz256_neg:
+ .align        32
+ GFp_p256_scalar_mul_mont:
+ .cfi_startproc        
++      _CET_ENDBR
+       leaq    GFp_ia32cap_P(%rip),%rcx
+       movq    8(%rcx),%rcx
+       andl    $0x80100,%ecx
+@@ -483,6 +485,7 @@ GFp_p256_scalar_mul_mont:
+ .align        32
+ GFp_p256_scalar_sqr_rep_mont:
+ .cfi_startproc        
++      _CET_ENDBR
+       leaq    GFp_ia32cap_P(%rip),%rcx
+       movq    8(%rcx),%rcx
+       andl    $0x80100,%ecx
+@@ -1242,6 +1245,7 @@ ecp_nistz256_ord_sqr_montx:
+ .align        32
+ GFp_nistz256_mul_mont:
+ .cfi_startproc        
++      _CET_ENDBR
+       leaq    GFp_ia32cap_P(%rip),%rcx
+       movq    8(%rcx),%rcx
+       andl    $0x80100,%ecx
+@@ -1539,6 +1543,7 @@ __ecp_nistz256_mul_montq:
+ .align        32
+ GFp_nistz256_sqr_mont:
+ .cfi_startproc        
++      _CET_ENDBR
+       leaq    GFp_ia32cap_P(%rip),%rcx
+       movq    8(%rcx),%rcx
+       andl    $0x80100,%ecx
+@@ -2069,6 +2074,7 @@ __ecp_nistz256_sqr_montx:
+ .align        32
+ GFp_nistz256_select_w5:
+ .cfi_startproc        
++      _CET_ENDBR
+       leaq    GFp_ia32cap_P(%rip),%rax
+       movq    8(%rax),%rax
+       testl   $32,%eax
+@@ -2136,6 +2142,7 @@ GFp_nistz256_select_w5:
+ .align        32
+ GFp_nistz256_select_w7:
+ .cfi_startproc        
++      _CET_ENDBR
+       leaq    GFp_ia32cap_P(%rip),%rax
+       movq    8(%rax),%rax
+       testl   $32,%eax
+@@ -2255,6 +2262,7 @@ GFp_nistz256_avx2_select_w5:
+ .align        32
+ GFp_nistz256_avx2_select_w7:
+ .cfi_startproc        
++      _CET_ENDBR
+ .Lavx2_select_w7:
+       vzeroupper
+       vmovdqa .LThree(%rip),%ymm0
+@@ -2462,6 +2470,7 @@ __ecp_nistz256_mul_by_2q:
+ .align        32
+ GFp_nistz256_point_double:
+ .cfi_startproc        
++      _CET_ENDBR
+       leaq    GFp_ia32cap_P(%rip),%rcx
+       movq    8(%rcx),%rcx
+       andl    $0x80100,%ecx
+@@ -2696,6 +2705,7 @@ GFp_nistz256_point_double:
+ .align        32
+ GFp_nistz256_point_add:
+ .cfi_startproc        
++      _CET_ENDBR
+       leaq    GFp_ia32cap_P(%rip),%rcx
+       movq    8(%rcx),%rcx
+       andl    $0x80100,%ecx
+@@ -3133,6 +3143,7 @@ GFp_nistz256_point_add:
+ .align        32
+ GFp_nistz256_point_add_affine:
+ .cfi_startproc        
++      _CET_ENDBR
+       leaq    GFp_ia32cap_P(%rip),%rcx
+       movq    8(%rcx),%rcx
+       andl    $0x80100,%ecx
Index: patches/patch-pregenerated_sha256-x86_64-elf_S
===================================================================
RCS file: 
/cvs/ports/security/rust-ring/patches/patch-pregenerated_sha256-x86_64-elf_S,v
retrieving revision 1.2
diff -u -p -r1.2 patch-pregenerated_sha256-x86_64-elf_S
--- patches/patch-pregenerated_sha256-x86_64-elf_S      24 Feb 2023 08:09:50 
-0000      1.2
+++ patches/patch-pregenerated_sha256-x86_64-elf_S      29 Jun 2023 09:17:43 
-0000
@@ -1,7 +1,15 @@
 Index: pregenerated/sha256-x86_64-elf.S
 --- pregenerated/sha256-x86_64-elf.S.orig
 +++ pregenerated/sha256-x86_64-elf.S
-@@ -1735,6 +1735,7 @@ GFp_sha256_block_data_order:
+@@ -18,6 +18,7 @@
+ .align        16
+ GFp_sha256_block_data_order:
+ .cfi_startproc        
++      _CET_ENDBR
+       leaq    GFp_ia32cap_P(%rip),%r11
+       movl    0(%r11),%r9d
+       movl    4(%r11),%r10d
+@@ -1735,6 +1736,7 @@ GFp_sha256_block_data_order:
        .byte   0xf3,0xc3
  .cfi_endproc  
  .size GFp_sha256_block_data_order,.-GFp_sha256_block_data_order
@@ -9,7 +17,7 @@ Index: pregenerated/sha256-x86_64-elf.S
  .align        64
  .type K256,@object
  K256:
-@@ -1778,6 +1779,7 @@ K256:
+@@ -1778,6 +1780,7 @@ K256:
  .long 0xffffffff,0xffffffff,0x03020100,0x0b0a0908
  .long 0xffffffff,0xffffffff,0x03020100,0x0b0a0908
  .byte 
83,72,65,50,53,54,32,98,108,111,99,107,32,116,114,97,110,115,102,111,114,109,32,102,111,114,32,120,56,54,95,54,52,44,32,67,82,89,80,84,79,71,65,77,83,32,98,121,32,60,97,112,112,114,111,64,111,112,101,110,115,115,108,46,111,114,103,62,0
Index: patches/patch-pregenerated_sha512-x86_64-elf_S
===================================================================
RCS file: 
/cvs/ports/security/rust-ring/patches/patch-pregenerated_sha512-x86_64-elf_S,v
retrieving revision 1.2
diff -u -p -r1.2 patch-pregenerated_sha512-x86_64-elf_S
--- patches/patch-pregenerated_sha512-x86_64-elf_S      24 Feb 2023 08:09:50 
-0000      1.2
+++ patches/patch-pregenerated_sha512-x86_64-elf_S      29 Jun 2023 09:17:43 
-0000
@@ -1,7 +1,15 @@
 Index: pregenerated/sha512-x86_64-elf.S
 --- pregenerated/sha512-x86_64-elf.S.orig
 +++ pregenerated/sha512-x86_64-elf.S
-@@ -1733,6 +1733,7 @@ GFp_sha512_block_data_order:
+@@ -18,6 +18,7 @@
+ .align        16
+ GFp_sha512_block_data_order:
+ .cfi_startproc        
++      _CET_ENDBR
+       leaq    GFp_ia32cap_P(%rip),%r11
+       movl    0(%r11),%r9d
+       movl    4(%r11),%r10d
+@@ -1733,6 +1734,7 @@ GFp_sha512_block_data_order:
        .byte   0xf3,0xc3
  .cfi_endproc  
  .size GFp_sha512_block_data_order,.-GFp_sha512_block_data_order
@@ -9,7 +17,7 @@ Index: pregenerated/sha512-x86_64-elf.S
  .align        64
  .type K512,@object
  K512:
-@@ -1820,6 +1821,7 @@ K512:
+@@ -1820,6 +1822,7 @@ K512:
  .quad 0x0001020304050607,0x08090a0b0c0d0e0f
  .quad 0x0001020304050607,0x08090a0b0c0d0e0f
  .byte 
83,72,65,53,49,50,32,98,108,111,99,107,32,116,114,97,110,115,102,111,114,109,32,102,111,114,32,120,56,54,95,54,52,44,32,67,82,89,80,84,79,71,65,77,83,32,98,121,32,60,97,112,112,114,111,64,111,112,101,110,115,115,108,46,111,114,103,62,0
Index: patches/patch-pregenerated_vpaes-x86_64-elf_S
===================================================================
RCS file: patches/patch-pregenerated_vpaes-x86_64-elf_S
diff -N patches/patch-pregenerated_vpaes-x86_64-elf_S
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ patches/patch-pregenerated_vpaes-x86_64-elf_S       29 Jun 2023 09:17:43 
-0000
@@ -0,0 +1,27 @@
+Index: pregenerated/vpaes-x86_64-elf.S
+--- pregenerated/vpaes-x86_64-elf.S.orig
++++ pregenerated/vpaes-x86_64-elf.S
+@@ -579,6 +579,7 @@ _vpaes_schedule_mangle:
+ .align        16
+ GFp_vpaes_set_encrypt_key:
+ .cfi_startproc        
++      _CET_ENDBR
+ #ifdef BORINGSSL_DISPATCH_TEST
+ .extern       BORINGSSL_function_hit
+ .hidden BORINGSSL_function_hit
+@@ -604,6 +605,7 @@ GFp_vpaes_set_encrypt_key:
+ .align        16
+ GFp_vpaes_encrypt:
+ .cfi_startproc        
++      _CET_ENDBR
+       movdqu  (%rdi),%xmm0
+       call    _vpaes_preheat
+       call    _vpaes_encrypt_core
+@@ -617,6 +619,7 @@ GFp_vpaes_encrypt:
+ .align        16
+ GFp_vpaes_ctr32_encrypt_blocks:
+ .cfi_startproc        
++      _CET_ENDBR
+ 
+       xchgq   %rcx,%rdx
+       testq   %rcx,%rcx
Index: patches/patch-pregenerated_x86_64-mont-elf_S
===================================================================
RCS file: patches/patch-pregenerated_x86_64-mont-elf_S
diff -N patches/patch-pregenerated_x86_64-mont-elf_S
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ patches/patch-pregenerated_x86_64-mont-elf_S        29 Jun 2023 09:17:43 
-0000
@@ -0,0 +1,11 @@
+Index: pregenerated/x86_64-mont-elf.S
+--- pregenerated/x86_64-mont-elf.S.orig
++++ pregenerated/x86_64-mont-elf.S
+@@ -19,6 +19,7 @@
+ .align        16
+ GFp_bn_mul_mont:
+ .cfi_startproc        
++      _CET_ENDBR
+       movl    %r9d,%r9d
+       movq    %rsp,%rax
+ .cfi_def_cfa_register %rax
Index: patches/patch-pregenerated_x86_64-mont5-elf_S
===================================================================
RCS file: 
/cvs/ports/security/rust-ring/patches/patch-pregenerated_x86_64-mont5-elf_S,v
retrieving revision 1.2
diff -u -p -r1.2 patch-pregenerated_x86_64-mont5-elf_S
--- patches/patch-pregenerated_x86_64-mont5-elf_S       24 Feb 2023 08:09:50 
-0000      1.2
+++ patches/patch-pregenerated_x86_64-mont5-elf_S       29 Jun 2023 09:17:43 
-0000
@@ -1,7 +1,63 @@
 Index: pregenerated/x86_64-mont5-elf.S
 --- pregenerated/x86_64-mont5-elf.S.orig
 +++ pregenerated/x86_64-mont5-elf.S
-@@ -3777,10 +3777,12 @@ GFp_bn_gather5:
+@@ -19,6 +19,7 @@
+ .align        64
+ GFp_bn_mul_mont_gather5:
+ .cfi_startproc        
++      _CET_ENDBR
+       movl    %r9d,%r9d
+       movq    %rsp,%rax
+ .cfi_def_cfa_register %rax
+@@ -1093,6 +1094,7 @@ mul4x_internal:
+ .align        32
+ GFp_bn_power5:
+ .cfi_startproc        
++      _CET_ENDBR
+       movq    %rsp,%rax
+ .cfi_def_cfa_register %rax
+       leaq    GFp_ia32cap_P(%rip),%r11
+@@ -1232,6 +1234,7 @@ GFp_bn_power5:
+ GFp_bn_sqr8x_internal:
+ __bn_sqr8x_internal:
+ .cfi_startproc        
++      _CET_ENDBR
+ 
+ 
+ 
+@@ -2070,6 +2073,7 @@ __bn_post4x_internal:
+ .align        32
+ GFp_bn_from_montgomery:
+ .cfi_startproc        
++      _CET_ENDBR
+       testl   $7,%r9d
+       jz      bn_from_mont8x
+       xorl    %eax,%eax
+@@ -2922,6 +2926,7 @@ bn_powerx5:
+ GFp_bn_sqrx8x_internal:
+ __bn_sqrx8x_internal:
+ .cfi_startproc        
++      _CET_ENDBR
+ 
+ 
+ 
+@@ -3594,6 +3599,7 @@ __bn_postx4x_internal:
+ .align        16
+ GFp_bn_scatter5:
+ .cfi_startproc        
++      _CET_ENDBR
+       cmpl    $0,%esi
+       jz      .Lscatter_epilogue
+       leaq    (%rdx,%rcx,8),%rdx
+@@ -3615,6 +3621,7 @@ GFp_bn_scatter5:
+ .align        32
+ GFp_bn_gather5:
+ .cfi_startproc        
++      _CET_ENDBR
+ .LSEH_begin_GFp_bn_gather5:
+ 
+ .byte 0x4c,0x8d,0x14,0x24
+@@ -3777,10 +3784,12 @@ GFp_bn_gather5:
  .LSEH_end_GFp_bn_gather5:
  .cfi_endproc  
  .size GFp_bn_gather5,.-GFp_bn_gather5

Reply via email to