Received: by 10.223.176.46 with SMTP id f43csp9531wra; Tue, 23 Jan 2018 15:06:41 -0800 (PST) X-Google-Smtp-Source: AH8x22746oIsEJOMPlOaaDQvUTWMen//jdBnBn5gOnBWh89xmCBKpAwZjdsi+OSqdhgziItOYCyD X-Received: by 10.107.19.9 with SMTP id b9mr6263435ioj.251.1516748801346; Tue, 23 Jan 2018 15:06:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516748801; cv=none; d=google.com; s=arc-20160816; b=cS0G6Hvxigp0Yil8D1qyNK/kiz1KcfuNzOBnq45v8h8Gh4+o/SSXXNRPjkpSBrAuQZ PdS0voAJvZ2SpZ8t7vFnGFK0/6DzT0QGkWdrYcLECZVt5RbGV1XfAd5ZUuHYRH2aGQ5a i2rWv5b4YVeq7RmmsNbRKl84f4AathtstCWFkI10U8yARWqt7nSLGfSiy+qGfrogwUvU AGfBLUplTCg6LhlQk9bZm+vU8qgJDDnzQKTXE2pU8NVawAq9sFO25T7ldoSYVkUU8xLh E2DI8Sp25YltaHInNp1hK7DPeHC4xI3Uf198DY/yuPFufP0Wcr1b9sIOhgdiVTtsrUDS ifrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=ZDnE82dyKUISojd7cmOnWNPojJZBMxKIZFO9YMiy63I=; b=nDtca+z8On9hkgrwEL7i/ch3adXQyzEadKDRVUe9kvnTJ3lzLSiVEISA5UH7TqjlDb jAqLgclWgx91fn2Fcl2NqYFtKO0hbHm+7rzc+ooUkZ/wzjj7zVUBR5Cza472H2iW0mkr W/0w7iBQn3gKVT3XkWVLWx9ovZC4ySRSS6+fOHt7+9Oaube4RsajM9VSOyrERI6T7PVo uozEiuzsglNwOJvVVFq7eLBleXHjQVwOhQTY5tbi68fRu/iAlPo3cXXlvXyCXgqhUfY3 h4SQNFG5ojjiBI8Fj/y2YVClEIoGn5orpeDj5N1LGvv1gRrVvAc1iHRYwizCX6el+Jbo a1ig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s71si15972557ioi.135.2018.01.23.15.06.25; Tue, 23 Jan 2018 15:06:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932431AbeAWXGE (ORCPT + 99 others); Tue, 23 Jan 2018 18:06:04 -0500 Received: from mga06.intel.com ([134.134.136.31]:39131 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932273AbeAWXGC (ORCPT ); Tue, 23 Jan 2018 18:06:02 -0500 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Jan 2018 15:06:01 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.46,403,1511856000"; d="scan'208";a="12534730" Received: from tassilo.jf.intel.com (HELO tassilo.localdomain) ([10.7.201.35]) by orsmga008.jf.intel.com with ESMTP; 23 Jan 2018 15:06:01 -0800 Received: by tassilo.localdomain (Postfix, from userid 1000) id 1B586300D79; Tue, 23 Jan 2018 15:05:53 -0800 (PST) Date: Tue, 23 Jan 2018 15:05:53 -0800 From: Andi Kleen To: David Woodhouse Cc: Borislav Petkov , Paul Turner , LKML , Linus Torvalds , Greg Kroah-Hartman , Tim Chen , Dave Hansen , tglx@linutronix.de, Kees Cook , Rik van Riel , Peter Zijlstra , Andy Lutomirski , Jiri Kosina , gnomes@lxorguk.ukuu.org.uk, x86@kernel.org, thomas.lendacky@amd.com, Josh Poimboeuf Subject: Re: [PATCH v8 04/12] x86/spectre: Add boot time option to select Spectre v2 mitigation Message-ID: <20180123230553.GR7844@tassilo.jf.intel.com> References: <1515707194-20531-1-git-send-email-dwmw@amazon.co.uk> <1515707194-20531-5-git-send-email-dwmw@amazon.co.uk> <20180123224014.dsbzps4hydt6h7ed@pd.tnic> <1516748034.13558.15.camel@infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1516748034.13558.15.camel@infradead.org> User-Agent: Mutt/1.9.1 (2017-09-22) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > > And it probably should be a more reliable method which we probably could > > use to detect !retpolined modules too. > > Andi actually implemented this, but it ended up being watered down > somewhat. It's enforced in mainline with the following patch It's not fully bullet proof, but should be good enough to protect against mistakes at least. commit 6cfb521ac0d5b97470883ff9b7facae264b7ab12 Author: Andi Kleen Date: Tue Jan 16 12:52:28 2018 -0800 module: Add retpoline tag to VERMAGIC Add a marker for retpoline to the module VERMAGIC. This catches the case when a non RETPOLINE compiled module gets loaded into a retpoline kernel, making it insecure. It doesn't handle the case when retpoline has been runtime disabled. Even in this case the match of the retcompile status will be enforced. This implies that even with retpoline run time disabled all modules loaded need to be recompiled.