Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752749AbeAFIzg (ORCPT + 1 other); Sat, 6 Jan 2018 03:55:36 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:42620 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752550AbeAFIzf (ORCPT ); Sat, 6 Jan 2018 03:55:35 -0500 Date: Sat, 6 Jan 2018 09:55:38 +0100 From: Greg KH To: Tim Chen Cc: Thomas Gleixner , Andy Lutomirski , Linus Torvalds , Dave Hansen , Andrea Arcangeli , Andi Kleen , Arjan Van De Ven , David Woodhouse , linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 8/8] x86: Use IBRS for firmware update path Message-ID: <20180106085538.GB4380@kroah.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Fri, Jan 05, 2018 at 06:12:23PM -0800, Tim Chen wrote: > From: David Woodhouse > > We are impervious to the indirect branch prediction attack with retpoline > but firmware won't be, so we still need to set IBRS to protect > firmware code execution when calling into firmware at runtime. > > Signed-off-by: David Woodhouse > Signed-off-by: Tim Chen > --- > arch/x86/include/asm/apm.h | 6 ++++++ > arch/x86/include/asm/efi.h | 17 +++++++++++++-- > arch/x86/include/asm/spec_ctrl.h | 3 +++ > arch/x86/kernel/cpu/spec_ctrl.c | 45 ++++++++++++++++++++++++++++++++++++++++ > 4 files changed, 69 insertions(+), 2 deletions(-) The files that Alan pointed out as being missed in the last version of this patch don't seem to be updated here either :( thanks, greg k-h