On Fri, 2018-01-26 at 14:02 -0500, Konrad Rzeszutek Wilk wrote:
> 
> -ECONFUSED, see ==>
> 
> Is this incorrect then?
> I see:
> 
> 241          * Skylake era CPUs have a separate issue with *underflow* of the 
>       
> 242          * RSB, when they will predict 'ret' targets from the generic 
> BTB.      
> 243          * The proper mitigation for this is IBRS. If IBRS is not 
> supported     
> 244          * or deactivated in favour of retpolines the RSB fill on context 
>       
> 245          * switch is required.                                            
>       
> 246          */                       

No, that's correct (well, except that it's kind of written for a world
where Linus is going to let IBRS anywhere near his kernel, and could
survive being rephrased a little :)

The RSB-stuffing on context switch (or kernel entry) is one of a
*litany* of additional hacks we need on Skylake to make retpolines
safe.

We were adding the RSB-stuffing in this case *anyway* for !SMEP, so it
was trivial enough to add in the (|| Skylake) condition while we were
at it.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to