On Tue, 2018-01-23 at 16:25 +0100, Peter Zijlstra wrote: > The objtool retpoline validation found this indirect jump. Seeing how > its on CPU bringup before we run userspace it should be safe, annotate
http://angryflower.com/itsits.gif > it. > > Signed-off-by: Peter Zijlstra (Intel) <[email protected]> Reviewed-by: David Woodhouse <[email protected]> > --- > arch/x86/kernel/head_64.S | 2 ++ > 1 file changed, 2 insertions(+) > > --- a/arch/x86/kernel/head_64.S > +++ b/arch/x86/kernel/head_64.S > @@ -23,6 +23,7 @@ > #include > #include "../entry/calling.h" > #include > +#include > > #ifdef CONFIG_PARAVIRT > #include > @@ -134,6 +135,7 @@ ENTRY(secondary_startup_64) > > /* Ensure I am executing from virtual addresses */ > movq $1f, %rax > + ANNOTATE_RETPOLINE_SAFE > jmp *%rax > 1: > UNWIND_HINT_EMPTY > >
smime.p7s
Description: S/MIME cryptographic signature

