Re: [PATCH v4] KVM: Fix stack-out-of-bounds read in write_mmio

2017-12-15 Thread Darren Kenny
Code-wise, that looks good to me now. I also don't have ARM handy to validate though - but it looks correct. Reviewed-by: Darren Kenny <darren.ke...@oracle.com> Thanks, Darren. On Thu, Dec 14, 2017 at 05:40:50PM -0800, Wanpeng Li wrote: From: Wanpeng Li <wanpeng...@hotmail.com&g

Re: [PATCH v3] KVM: X86: Fix stack-out-of-bounds read in write_mmio

2017-12-14 Thread Darren Kenny
Hi, I'm wondering about the change to trace_kvm_mmio() here, since it doesn't appear to be changing the use of it in virt/kvm/arm/mmio.c, e.g: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/virt/kvm/arm/mmio.c#n114 which seems to be still using it with a data value

Re: [PATCH] KVM: X86: Limit timer frequency with more smaller interval

2018-04-30 Thread Darren Kenny
com> Cc: Anthoine Bourgeois <anthoine.bourge...@blade-group.com> Signed-off-by: Wanpeng Li <wanpen...@tencent.com> With those changes (or similar): Reviewed-by: Darren Kenny <darren.ke...@oracle.com> --- arch/x86/kvm/x86.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff

[PATCH] Fix typo IBRS_ATT, which should be IBRS_ALL

2018-02-02 Thread Darren Kenny
Fixes a typo in commit 117cc7a908c83697b0b737d15ae1eb5943afe35b ("x86/retpoline: Fill return stack buffer on vmexit") Signed-off-by: Darren Kenny <darren.ke...@oracle.com> Reviewed-by: Konrad Rzeszutek Wilk <konrad.w...@oracle.com> --- arch/x86/include/asm/nospec-branch.h

Re: [PATCH v6 3/5] KVM: VMX: Emulate MSR_IA32_ARCH_CAPABILITIES

2018-02-02 Thread Darren Kenny
@kernel.org> Cc: Greg KH <gre...@linuxfoundation.org> Cc: Paolo Bonzini <pbonz...@redhat.com> Cc: Ashok Raj <ashok@intel.com> Reviewed-by: Paolo Bonzini <pbonz...@redhat.com> Signed-off-by: KarimAllah Ahmed <karah...@amazon.de> Signed-off-by: David Woodhouse <d...@

Re: [PATCH v6 4/5] KVM: VMX: Allow direct access to MSR_IA32_SPEC_CTRL

2018-02-02 Thread Darren Kenny
-off-by: KarimAllah Ahmed <karah...@amazon.de> Signed-off-by: David Woodhouse <d...@amazon.co.uk> Reviewed-by: Darren Kenny <darren.ke...@oracle.com> --- v6: - got rid of save_spec_ctrl_on_exit - introduce msr_write_intercepted v5: - Also check for X86_FEATURE_SPEC_CTRL for the m

Re: [PATCH v6 5/5] KVM: SVM: Allow direct access to MSR_IA32_SPEC_CTRL

2018-02-02 Thread Darren Kenny
oodhouse <d...@amazon.co.uk> Cc: Greg KH <gre...@linuxfoundation.org> Cc: Andy Lutomirski <l...@kernel.org> Cc: Ashok Raj <ashok@intel.com> Signed-off-by: KarimAllah Ahmed <karah...@amazon.de> Signed-off-by: David Woodhouse <d...@amazon.co.uk> Reviewed-by: Da

Re: [PATCH] Fix typo IBRS_ATT, which should be IBRS_ALL

2018-02-05 Thread Darren Kenny
On Fri, Feb 02, 2018 at 11:42:12PM +, David Woodhouse wrote: On Fri, 2018-02-02 at 19:12 +, Darren Kenny wrote: Fixes a typo in commit 117cc7a908c83697b0b737d15ae1eb5943afe35b ("x86/retpoline: Fill return stack buffer on vmexit") Signed-off-by: Darren Kenny <darren.ke.

Re: [PATCH v2] Correct use of IBRS_ATT name, should be IBRS_ALL

2018-02-05 Thread Darren Kenny
Please ignore this, didn't realise it had been already applied - guess I looked in the wrong place. Thanks, Darren. On Mon, Feb 05, 2018 at 11:02:20AM +, Darren Kenny wrote: Fixes a comment in commit 117cc7a908c83697b0b737d15ae1eb5943afe35b ("x86/retpoline: Fill return stack b

[PATCH v2] Correct use of IBRS_ATT name, should be IBRS_ALL

2018-02-05 Thread Darren Kenny
Fixes a comment in commit 117cc7a908c83697b0b737d15ae1eb5943afe35b ("x86/retpoline: Fill return stack buffer on vmexit") While the original name was "IBRS All The Time" (IBRS_ATT), the publicly documented name is IBRS_ALL, we should be using that. Signed-off-by: Dar

Re: [PATCH v2 1/6] x86/speculation: Update Speculation Control microcode blacklist

2018-02-12 Thread Darren Kenny
-by: David Woodhouse <d...@amazon.co.uk> Reviewed-by: Darren Kenny <darren.ke...@oracle.com> --- arch/x86/kernel/cpu/intel.c | 4 1 file changed, 4 deletions(-) diff --git a/arch/x86/kernel/cpu/intel.c b/arch/x86/kernel/cpu/intel.c index 319bf98..f73b814 100644 --- a/arch/x86/kernel

Re: [PATCH] x86/spectre_v2: Remove 0xc2 from spectre_bad_microcodes

2018-02-09 Thread Darren Kenny
On Fri, Feb 09, 2018 at 02:29:27PM +, David Woodhouse wrote: On Fri, 2018-02-09 at 14:10 +, Darren Kenny wrote: According to the latest microcode update from Intel (on Feb 8, 2018) on Skylake we should be using the microcode revisions 0xC2***, so we need to remove that from

[PATCH] x86/spectre_v2: Remove 0xc2 from spectre_bad_microcodes

2018-02-09 Thread Darren Kenny
According to the latest microcode update from Intel (on Feb 8, 2018) on Skylake we should be using the microcode revisions 0xC2***, so we need to remove that from the blacklist now. Signed-off-by: Darren Kenny <darren.ke...@oracle.com> Reviewed-by: Konrad Rzeszutek Wilk <konrad.w...@o

Re: [PATCH] vhost: fix vhost ioctl signature to build with clang

2018-03-15 Thread Darren Kenny
(). Signed-off-by: Sonny Rao <sonny...@chromium.org> Reviewed-by: Darren Kenny <darren.ke...@oracle.com> All the other callers of this function already appear to assume that it is an unsigned int. Thanks, Darren. --- drivers/vhost/vhost.c | 2 +- drivers/vhost/vhost.h | 4 ++-- 2 f

Re: [PATCH net] vhost: correctly remove wait queue during poll failure

2018-03-27 Thread Darren Kenny
Hi Jason, On Tue, Mar 27, 2018 at 11:47:22AM +0800, Jason Wang wrote: We tried to remove vq poll from wait queue, but do not check whether or not it was in a list before. This will lead double free. Fixing this by checking poll->wqh to make sure it was in a list. This text seems at odds with

Re: [PATCH net V2] vhost: correctly remove wait queue during poll failure

2018-03-27 Thread Darren Kenny
eue to make sure it won't be freed twice. Cc: Darren Kenny <darren.ke...@oracle.com> Reported-by: syzbot+c0272972b01b872e6...@syzkaller.appspotmail.com Fixes: 2b8b328b61c79 ("vhost_net: handle polling errors when setting backend") Signed-off-by: Jason Wang <jasow...@redhat.com&

Re: [PATCH] x86/MSR: Move native_* variants to msr.h

2018-03-02 Thread Darren Kenny
On Thu, Mar 01, 2018 at 04:13:36PM +0100, Borislav Petkov wrote: From: Borislav Petkov <b...@suse.de> ... where they belong. No functionality change. Signed-off-by: Borislav Petkov <b...@suse.de> Cc: k...@vger.kernel.org Seems like the right place to put them. Reviewed-by:

Re: [PATCH] vhost: fix vhost ioctl signature to build with clang

2018-03-15 Thread Darren Kenny
(). Signed-off-by: Sonny Rao Reviewed-by: Darren Kenny All the other callers of this function already appear to assume that it is an unsigned int. Thanks, Darren. --- drivers/vhost/vhost.c | 2 +- drivers/vhost/vhost.h | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git

Re: [PATCH net] vhost: correctly remove wait queue during poll failure

2018-03-27 Thread Darren Kenny
Hi Jason, On Tue, Mar 27, 2018 at 11:47:22AM +0800, Jason Wang wrote: We tried to remove vq poll from wait queue, but do not check whether or not it was in a list before. This will lead double free. Fixing this by checking poll->wqh to make sure it was in a list. This text seems at odds with

Re: [PATCH net V2] vhost: correctly remove wait queue during poll failure

2018-03-27 Thread Darren Kenny
eue to make sure it won't be freed twice. Cc: Darren Kenny Reported-by: syzbot+c0272972b01b872e6...@syzkaller.appspotmail.com Fixes: 2b8b328b61c79 ("vhost_net: handle polling errors when setting backend") Signed-off-by: Jason Wang Reviewed-by: Darren Kenny --- Changes from V1: - twe

Re: [PATCH] KVM: X86: Limit timer frequency with more smaller interval

2018-04-30 Thread Darren Kenny
it as 'Lower timer frequency limit to 200ms'? Reported-by: Anthoine Bourgeois Suggested-by: Paolo Bonzini Cc: Paolo Bonzini Cc: Radim Krčmář Cc: Anthoine Bourgeois Signed-off-by: Wanpeng Li With those changes (or similar): Reviewed-by: Darren Kenny --- arch/x86/kvm/x86.c | 2 +- 1

Re: [PATCH v3] KVM: X86: Fix stack-out-of-bounds read in write_mmio

2017-12-14 Thread Darren Kenny
Hi, I'm wondering about the change to trace_kvm_mmio() here, since it doesn't appear to be changing the use of it in virt/kvm/arm/mmio.c, e.g: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/virt/kvm/arm/mmio.c#n114 which seems to be still using it with a data value

Re: [PATCH v4] KVM: Fix stack-out-of-bounds read in write_mmio

2017-12-15 Thread Darren Kenny
Code-wise, that looks good to me now. I also don't have ARM handy to validate though - but it looks correct. Reviewed-by: Darren Kenny Thanks, Darren. On Thu, Dec 14, 2017 at 05:40:50PM -0800, Wanpeng Li wrote: From: Wanpeng Li Reported by syzkaller: BUG: KASAN: stack-out-of-bounds

Re: [PATCH v6 3/5] KVM: VMX: Emulate MSR_IA32_ARCH_CAPABILITIES

2018-02-02 Thread Darren Kenny
Bonzini Cc: Ashok Raj Reviewed-by: Paolo Bonzini Signed-off-by: KarimAllah Ahmed Signed-off-by: David Woodhouse Reviewed-by: Darren Kenny --- arch/x86/kvm/cpuid.c | 2 +- arch/x86/kvm/vmx.c | 15 +++ arch/x86/kvm/x86.c | 1 + 3 files changed, 17 insertions(+), 1 deletion

Re: [PATCH v6 4/5] KVM: VMX: Allow direct access to MSR_IA32_SPEC_CTRL

2018-02-02 Thread Darren Kenny
: Dan Williams Cc: Jun Nakajima Cc: Paolo Bonzini Cc: David Woodhouse Cc: Greg KH Cc: Andy Lutomirski Cc: Ashok Raj Signed-off-by: KarimAllah Ahmed Signed-off-by: David Woodhouse Reviewed-by: Darren Kenny --- v6: - got rid of save_spec_ctrl_on_exit - introduce msr_write_intercepted v5

Re: [PATCH v6 5/5] KVM: SVM: Allow direct access to MSR_IA32_SPEC_CTRL

2018-02-02 Thread Darren Kenny
-off-by: KarimAllah Ahmed Signed-off-by: David Woodhouse Reviewed-by: Darren Kenny --- v5: - Add SPEC_CTRL to direct_access_msrs. --- arch/x86/kvm/svm.c | 59 ++ 1 file changed, 59 insertions(+) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm

[PATCH] Fix typo IBRS_ATT, which should be IBRS_ALL

2018-02-02 Thread Darren Kenny
Fixes a typo in commit 117cc7a908c83697b0b737d15ae1eb5943afe35b ("x86/retpoline: Fill return stack buffer on vmexit") Signed-off-by: Darren Kenny Reviewed-by: Konrad Rzeszutek Wilk --- arch/x86/include/asm/nospec-branch.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --

Re: [PATCH] Fix typo IBRS_ATT, which should be IBRS_ALL

2018-02-05 Thread Darren Kenny
On Fri, Feb 02, 2018 at 11:42:12PM +, David Woodhouse wrote: On Fri, 2018-02-02 at 19:12 +, Darren Kenny wrote: Fixes a typo in commit 117cc7a908c83697b0b737d15ae1eb5943afe35b ("x86/retpoline: Fill return stack buffer on vmexit") Signed-off-by: Darren Kenny Reviewed-

Re: [PATCH v2] Correct use of IBRS_ATT name, should be IBRS_ALL

2018-02-05 Thread Darren Kenny
Please ignore this, didn't realise it had been already applied - guess I looked in the wrong place. Thanks, Darren. On Mon, Feb 05, 2018 at 11:02:20AM +, Darren Kenny wrote: Fixes a comment in commit 117cc7a908c83697b0b737d15ae1eb5943afe35b ("x86/retpoline: Fill return stack b

Re: [PATCH] x86/MSR: Move native_* variants to msr.h

2018-03-02 Thread Darren Kenny
On Thu, Mar 01, 2018 at 04:13:36PM +0100, Borislav Petkov wrote: From: Borislav Petkov ... where they belong. No functionality change. Signed-off-by: Borislav Petkov Cc: k...@vger.kernel.org Seems like the right place to put them. Reviewed-by: Darren Kenny --- arch/x86/include/asm

Re: [PATCH v2 1/6] x86/speculation: Update Speculation Control microcode blacklist

2018-02-12 Thread Darren Kenny
-by: David Woodhouse Reviewed-by: Darren Kenny --- arch/x86/kernel/cpu/intel.c | 4 1 file changed, 4 deletions(-) diff --git a/arch/x86/kernel/cpu/intel.c b/arch/x86/kernel/cpu/intel.c index 319bf98..f73b814 100644 --- a/arch/x86/kernel/cpu/intel.c +++ b/arch/x86/kernel/cpu/intel.c @@ -123,8

[PATCH v2] Correct use of IBRS_ATT name, should be IBRS_ALL

2018-02-05 Thread Darren Kenny
Fixes a comment in commit 117cc7a908c83697b0b737d15ae1eb5943afe35b ("x86/retpoline: Fill return stack buffer on vmexit") While the original name was "IBRS All The Time" (IBRS_ATT), the publicly documented name is IBRS_ALL, we should be using that. Signed-off-by: Da

Re: [PATCH] x86/sgx: fix the return type of sgx_init

2021-01-14 Thread Darren Kenny
> (EPC) sections") > Signed-off-by: Sami Tolvanen Makes sense. Reviewed-by: Darren Kenny > --- > arch/x86/kernel/cpu/sgx/main.c | 14 +- > 1 file changed, 9 insertions(+), 5 deletions(-) > > diff --git a/arch/x86/kernel/cpu/sgx/main.c b/arch/x86/kernel/cpu/sg

Re: [PATCH v36 10/24] mm: Add vm_ops->mprotect()

2020-08-06 Thread Darren Kenny
s that set the upper limit for possible >VMA permissions. Not respecting this can cause #GP's to be emitted. > > Cc: linux...@kvack.org > Cc: Andrew Morton > Cc: Matthew Wilcox > Acked-by: Jethro Beekman > Signed-off-by: Sean Christopherson > Co-developed-by: Jarkko Sakkine

Re: [PATCH v36 14/24] x86/sgx: Add SGX_IOC_ENCLAVE_INIT

2020-08-06 Thread Darren Kenny
by: Jethro Beekman > Tested-by: Haitao Huang > Tested-by: Chunyang Hui > Tested-by: Jordan Hand > Tested-by: Nathaniel McCallum > Tested-by: Seth Moore Tested-by: Darren Kenny Reviewed-by: Darren Kenny > Co-developed-by: Sean Christopherson > Signed-off-by: Sean Christoph

Re: [PATCH v36 09/24] x86/sgx: Add __sgx_alloc_epc_page() and sgx_free_epc_page()

2020-08-06 Thread Darren Kenny
function > implicitly calls ENCLS[EREMOVE], which will return the page to the > uninitialized state (i.e. not required from caller part). > > Acked-by: Jethro Beekman > Co-developed-by: Sean Christopherson > Signed-off-by: Sean Christopherson > Signed-off-by: Jarkko Sakkin

Re: [PATCH v36 07/24] x86/cpu/intel: Add nosgx kernel parameter

2020-08-06 Thread Darren Kenny
On Thursday, 2020-07-16 at 16:52:46 +03, Jarkko Sakkinen wrote: > Add kernel parameter to disable Intel SGX kernel support. > > Tested-by: Sean Christopherson > Reviewed-by: Sean Christopherson > Signed-off-by: Jarkko Sakkinen Reviewed-by: Darren Kenny > --- > Docu

Re: [PATCH v36 02/24] x86/cpufeatures: x86/msr: Add Intel SGX Launch Control hardware bits

2020-08-06 Thread Darren Kenny
kov > Acked-by: Jethro Beekman > Signed-off-by: Sean Christopherson > Co-developed-by: Jarkko Sakkinen > Signed-off-by: Jarkko Sakkinen Reviewed-by: Darren Kenny > --- > arch/x86/include/asm/cpufeatures.h | 1 + > arch/x86/include/asm/msr-index.h | 7 +++ >

Re: [PATCH v36 11/24] x86/sgx: Add SGX enclave driver

2020-08-06 Thread Darren Kenny
n > Tested-by: Haitao Huang > Tested-by: Chunyang Hui > Tested-by: Jordan Hand > Tested-by: Nathaniel McCallum > Tested-by: Seth Moore Tested-by: Darren Kenny Reviewed-by: Darren Kenny > Co-developed-by: Sean Christopherson > Signed-off-by: Sean Christopherson > C

Re: [PATCH v36 15/24] x86/sgx: Allow a limited use of ATTRIBUTE.PROVISIONKEY for attestation

2020-08-06 Thread Darren Kenny
d-by: Jethro Beekman > Suggested-by: Andy Lutomirski > Signed-off-by: Jarkko Sakkinen Reviewed-by: Darren Kenny > --- > arch/x86/include/uapi/asm/sgx.h | 11 > arch/x86/kernel/cpu/sgx/driver.c | 18 > arch/x86/kernel/cpu/sgx/driver.h | 2 ++ > arch/

Re: [PATCH v36 08/24] x86/sgx: Initialize metadata for Enclave Page Cache (EPC) sections

2020-08-06 Thread Darren Kenny
> Signed-off-by: Sean Christopherson > Co-developed-by: Serge Ayoun > Signed-off-by: Serge Ayoun > Co-developed-by: Jarkko Sakkinen > Signed-off-by: Jarkko Sakkinen Reviewed-by: Darren Kenny > --- > arch/x86/Kconfig | 17 +++ > arch/x86/kernel/cpu/Ma

Re: [PATCH v36 03/24] x86/mm: x86/sgx: Signal SIGSEGV with PF_SGX

2020-08-06 Thread Darren Kenny
he enclave, > which was invalidated). > > [1] Intel SDM: 36.5.1 Enclave Page Cache Map (EPCM) > > Acked-by: Jethro Beekman > Signed-off-by: Sean Christopherson > Signed-off-by: Jarkko Sakkinen Reviewed-by: Darren Kenny > --- > arch/x86/include/asm/traps.h | 14 ++

Re: [PATCH v36 13/24] x86/sgx: Add SGX_IOC_ENCLAVE_ADD_PAGES

2020-08-06 Thread Darren Kenny
be mapped to the > address range of an enclave. > > Acked-by: Jethro Beekman > Tested-by: Jethro Beekman > Tested-by: Haitao Huang > Tested-by: Chunyang Hui > Tested-by: Jordan Hand > Tested-by: Nathaniel McCallum > Tested-by: Seth Moore Tested-by: Darren Kenny Reviewed-by: Da

Re: [PATCH v36 06/24] x86/cpu/intel: Detect SGX support

2020-08-06 Thread Darren Kenny
-off-by: Sean Christopherson > Co-developed-by: Jarkko Sakkinen > Signed-off-by: Jarkko Sakkinen Reviewed-by: Darren Kenny > --- > arch/x86/kernel/cpu/feat_ctl.c | 32 +++- > 1 file changed, 31 insertions(+), 1 deletion(-) > > diff --git a/arch/x

Re: [PATCH v36 04/24] x86/sgx: Add SGX microarchitectural data structures

2020-08-06 Thread Darren Kenny
s are described in: > > Intel SDM: 37.6 INTEL® SGX DATA STRUCTURES OVERVIEW > > Acked-by: Jethro Beekman > Signed-off-by: Jarkko Sakkinen Reviewed-by: Darren Kenny > --- > arch/x86/kernel/cpu/sgx/arch.h | 343 + > 1 file changed, 343 inser

Re: [PATCH v36 01/24] x86/cpufeatures: x86/msr: Add Intel SGX hardware bits

2020-08-06 Thread Darren Kenny
ration > > Reviewed-by: Borislav Petkov > Acked-by: Jethro Beekman > Signed-off-by: Sean Christopherson > Co-developed-by: Jarkko Sakkinen Reviewed-by: Darren Kenny > Signed-off-by: Jarkko Sakkinen > --- > arch/x86/include/asm/cpufeature.h| 5 +++-- > arch/x8

Re: [PATCH v36 12/24] x86/sgx: Add SGX_IOC_ENCLAVE_CREATE

2020-08-06 Thread Darren Kenny
value. > > Acked-by: Jethro Beekman > Tested-by: Jethro Beekman > Tested-by: Haitao Huang > Tested-by: Chunyang Hui > Tested-by: Jordan Hand > Tested-by: Nathaniel McCallum > Tested-by: Seth Moore Tested-by: Darren Kenny Reviewed-by: Darren Kenny > Co-de

Re: [PATCH v36 05/24] x86/sgx: Add wrappers for ENCLS leaf functions

2020-08-07 Thread Darren Kenny
layer generates the correct > input/output annotations based on the number of operands for each leaf > function. > > ENCLS leaf functions are documented in > > Intel SDM: 36.6 ENCLAVE INSTRUCTIONS AND INTEL® Tested-by: Darren Kenny > > Acked-by: Jethro Beekman > Co-de

Re: [PATCH v32 12/21] x86/sgx: Add provisioning

2020-06-05 Thread Darren Kenny
Hi Jarkko, Just a couple of nits below... On Monday, 2020-06-01 at 10:52:09 +03, Jarkko Sakkinen wrote: > In order to provide a mechanism for devilering provisoning rights: TYPO: s/devilering/delivering/? > > 1. Add a new device file /dev/sgx/provision that works as a token for >allowing

[PATCH] x86/spectre_v2: Remove 0xc2 from spectre_bad_microcodes

2018-02-09 Thread Darren Kenny
According to the latest microcode update from Intel (on Feb 8, 2018) on Skylake we should be using the microcode revisions 0xC2***, so we need to remove that from the blacklist now. Signed-off-by: Darren Kenny Reviewed-by: Konrad Rzeszutek Wilk Tested-by: Konrad Rzeszutek Wilk --- arch/x86

Re: [PATCH] x86/spectre_v2: Remove 0xc2 from spectre_bad_microcodes

2018-02-09 Thread Darren Kenny
On Fri, Feb 09, 2018 at 02:29:27PM +, David Woodhouse wrote: On Fri, 2018-02-09 at 14:10 +, Darren Kenny wrote: According to the latest microcode update from Intel (on Feb 8, 2018) on Skylake we should be using the microcode revisions 0xC2***, so we need to remove that from

[tip:x86/pti] x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL

2018-02-02 Thread tip-bot for Darren Kenny
Commit-ID: af189c95a371b59f493dbe0f50c0a09724868881 Gitweb: https://git.kernel.org/tip/af189c95a371b59f493dbe0f50c0a09724868881 Author: Darren Kenny <darren.ke...@oracle.com> AuthorDate: Fri, 2 Feb 2018 19:12:20 + Committer: Thomas Gleixner <t...@linutronix.de> CommitDate

[tip:x86/pti] x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL

2018-02-02 Thread tip-bot for Darren Kenny
Commit-ID: af189c95a371b59f493dbe0f50c0a09724868881 Gitweb: https://git.kernel.org/tip/af189c95a371b59f493dbe0f50c0a09724868881 Author: Darren Kenny AuthorDate: Fri, 2 Feb 2018 19:12:20 + Committer: Thomas Gleixner CommitDate: Fri, 2 Feb 2018 23:13:57 +0100 x86/speculation: Fix