[PATCH v2 8/8] x86,sme: Annotate indirect call

2018-02-12 Thread Peter Zijlstra
This is boot code, we run this _way_ before userspace comes along to poison our branch predictor. Cc: Tom Lendacky Cc: Borislav Petkov Acked-by: Josh Poimboeuf Signed-off-by: Peter Zijlstra (Intel) ---

[PATCH v2 8/8] x86,sme: Annotate indirect call

2018-02-12 Thread Peter Zijlstra
This is boot code, we run this _way_ before userspace comes along to poison our branch predictor. Cc: Tom Lendacky Cc: Borislav Petkov Acked-by: Josh Poimboeuf Signed-off-by: Peter Zijlstra (Intel) --- arch/x86/mm/mem_encrypt_boot.S |2 ++ 1 file changed, 2 insertions(+) ---