diff options
Diffstat (limited to 'common/recipes-kernel/linux/linux-yocto-4.9.21/0013-x86-boot-objtool-Annotate-indirect-jump-in-secondary.patch')
-rw-r--r-- | common/recipes-kernel/linux/linux-yocto-4.9.21/0013-x86-boot-objtool-Annotate-indirect-jump-in-secondary.patch | 54 |
1 files changed, 0 insertions, 54 deletions
diff --git a/common/recipes-kernel/linux/linux-yocto-4.9.21/0013-x86-boot-objtool-Annotate-indirect-jump-in-secondary.patch b/common/recipes-kernel/linux/linux-yocto-4.9.21/0013-x86-boot-objtool-Annotate-indirect-jump-in-secondary.patch deleted file mode 100644 index 7fa185ec..00000000 --- a/common/recipes-kernel/linux/linux-yocto-4.9.21/0013-x86-boot-objtool-Annotate-indirect-jump-in-secondary.patch +++ /dev/null @@ -1,54 +0,0 @@ -From 8642e6bac57983a63f16725873f6df03a16c5e14 Mon Sep 17 00:00:00 2001 -From: Peter Zijlstra <peterz@infradead.org> -Date: Tue, 16 Jan 2018 10:38:09 +0100 -Subject: [PATCH 13/14] x86/boot, objtool: Annotate indirect jump in - secondary_startup_64() - -commit bd89004f6305cbf7352238f61da093207ee518d6 upstream. - -The objtool retpoline validation found this indirect jump. Seeing how -it's on CPU bringup before we run userspace it should be safe, annotate -it. - -Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org> -Reviewed-by: David Woodhouse <dwmw@amazon.co.uk> -Acked-by: Thomas Gleixner <tglx@linutronix.de> -Acked-by: Josh Poimboeuf <jpoimboe@redhat.com> -Cc: Andy Lutomirski <luto@kernel.org> -Cc: Arjan van de Ven <arjan@linux.intel.com> -Cc: Borislav Petkov <bp@alien8.de> -Cc: Dan Williams <dan.j.williams@intel.com> -Cc: Dave Hansen <dave.hansen@linux.intel.com> -Cc: David Woodhouse <dwmw2@infradead.org> -Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org> -Cc: Linus Torvalds <torvalds@linux-foundation.org> -Cc: Peter Zijlstra <peterz@infradead.org> -Signed-off-by: Ingo Molnar <mingo@kernel.org> -Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> ---- - arch/x86/kernel/head_64.S | 2 ++ - 1 file changed, 2 insertions(+) - -diff --git a/arch/x86/kernel/head_64.S b/arch/x86/kernel/head_64.S -index 67cd7c1..9d72cf5 100644 ---- a/arch/x86/kernel/head_64.S -+++ b/arch/x86/kernel/head_64.S -@@ -22,6 +22,7 @@ - #include <asm/nops.h> - #include "../entry/calling.h" - #include <asm/export.h> -+#include <asm/nospec-branch.h> - - #ifdef CONFIG_PARAVIRT - #include <asm/asm-offsets.h> -@@ -200,6 +201,7 @@ ENTRY(secondary_startup_64) - - /* Ensure I am executing from virtual addresses */ - movq $1f, %rax -+ ANNOTATE_RETPOLINE_SAFE - jmp *%rax - 1: - --- -2.7.4 - |