Received: by 10.223.148.5 with SMTP id 5csp7755649wrq; Thu, 18 Jan 2018 09:04:42 -0800 (PST) X-Google-Smtp-Source: ACJfBotpxx0NnKpSNxIdXX4S9IKW81ibFrYoFikZNvq9WTFXEqU3E7OHSUAb6vpVEJ9A4tbJcQWV X-Received: by 2002:a17:902:7b98:: with SMTP id w24-v6mr102942pll.79.1516295082026; Thu, 18 Jan 2018 09:04:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516295081; cv=none; d=google.com; s=arc-20160816; b=sNA2Y3CZi1n04d7tmrMrUtFNvm/fWRbT9rQVh8iucfBKbWaW8cyw+C1XL4Q1UUmSwQ /zKhiSrEUBxlSOURBooDwrgDavf2zK0wUpf2IPdjaHtMZrD8Za9RQSQYF4kMYR3iXQUu zTsV400YMwvc34jbWPkMly0eSbl+qYo2xn/wmfZ1FAW6qH3sakw7ETQ0prV5ex5ZRdAc rLDR2ux/qKnZKSzt7Mol5+xE/ZB0b302PKrqlz7B19uFr9PX7z7sG+tMIUj+BEfCsMXx KSsge5vYBvTWds1h9bR5tnSdtyo6rggIt/c2FtVMHUq8LUujo4C5l8Nz5XYLR1yiV6AM MlZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=mvfhPGZx404Jup1ut5Bv0A3m+nBz2FBiwtPDMyfXsEg=; b=qJ4V8ojbWqqKc2HMNYAVIrBgpeX5MWcgwavwdCdxmnPu4fVqjpimsS+hYhFyOn+qjz rmOrrdSEW9V16cVR8S0QIU7Vm9ombJ365xNpN5HeBBejFdv3uBAUBOnNK9jEXveRdZRs EmKRmlkk1oUCALAAbXnfiKAybwkcZoAzHg8gD9nOIMWyr8mrMkzCdBDhouuE0sDnkmBn tgGnJodsywV9Ypuj7v877Z4tZbILiXEh6Myg0bLSq0L4XlsP5sZJo8Cr52ci/Oz74bT+ z3RTT5mhVqoMINKGFlvq5mcg3ac/na6wjECuKTBu7hJZ3Qm4fuXPdOi89lvw3fonbpXB HowQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g15si2826101pgo.87.2018.01.18.09.04.27; Thu, 18 Jan 2018 09:04:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932830AbeARRDA (ORCPT + 99 others); Thu, 18 Jan 2018 12:03:00 -0500 Received: from mx1.redhat.com ([209.132.183.28]:52238 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932357AbeARRC7 (ORCPT ); Thu, 18 Jan 2018 12:02:59 -0500 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 0A2835537B; Thu, 18 Jan 2018 17:02:59 +0000 (UTC) Received: from treble (ovpn-126-50.rdu2.redhat.com [10.10.126.50]) by smtp.corp.redhat.com (Postfix) with SMTP id 9E05A18146; Thu, 18 Jan 2018 17:02:56 +0000 (UTC) Date: Thu, 18 Jan 2018 11:02:55 -0600 From: Josh Poimboeuf To: tip-bot for Andi Kleen Cc: linux-tip-commits@vger.kernel.org, linux-kernel@vger.kernel.org, gregkh@linuxfoundation.org, ak@linux.intel.com, dwmw@amazon.co.uk, mingo@kernel.org, hpa@zytor.com, tglx@linutronix.de Subject: Re: [tip:x86/pti] module: Add retpoline tag to VERMAGIC Message-ID: <20180118170255.wgcqrqiflikd3tmz@treble> References: <20180116205228.4890-1-andi@firstfloor.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.6.0.1 (2016-04-01) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.30]); Thu, 18 Jan 2018 17:02:59 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 17, 2018 at 02:40:43AM -0800, tip-bot for Andi Kleen wrote: > Commit-ID: 6cfb521ac0d5b97470883ff9b7facae264b7ab12 > Gitweb: https://git.kernel.org/tip/6cfb521ac0d5b97470883ff9b7facae264b7ab12 > Author: Andi Kleen > AuthorDate: Tue, 16 Jan 2018 12:52:28 -0800 > Committer: Thomas Gleixner > CommitDate: Wed, 17 Jan 2018 11:35:14 +0100 > > module: Add retpoline tag to VERMAGIC > > Add a marker for retpoline to the module VERMAGIC. This catches the case > when a non RETPOLINE compiled module gets loaded into a retpoline kernel, > making it insecure. > > It doesn't handle the case when retpoline has been runtime disabled. Even > in this case the match of the retcompile status will be enforced. This > implies that even with retpoline run time disabled all modules loaded need > to be recompiled. If the user overrides the vermagic and loads the module, shouldn't we update the spectre_v2 sysfs vulnerability status and print a warning like in v2? -- Josh