Received: by 10.223.176.46 with SMTP id f43csp791006wra; Wed, 24 Jan 2018 06:04:54 -0800 (PST) X-Google-Smtp-Source: AH8x226+aX+K1AEpsB5M0aTYxFMyqRU8Klli02lwueR7nxWtQ8rsCGNulEYUk5WSfgmpZHeg1MYx X-Received: by 10.101.77.208 with SMTP id q16mr10610118pgt.395.1516802694213; Wed, 24 Jan 2018 06:04:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516802694; cv=none; d=google.com; s=arc-20160816; b=bIp541ja8MK7TPg3BbrFXv00NoIhB5hJKWnnoOIMzDIRFnXvcVgtw6F1M7iVGV14Xn LskKTrJ7L+lL4mD/oZu9bw75Y4CcI6ppaFaDe5qckeW3e43YTBm4c3HA86GrMlKIHD5e nrw+rn2AJZvWaxQppBXRAItTRbtepu8N54zqNV1MKWI+DVvyJUfUKgoxQlord4aVavcp zbrN69rP1131KwZydMZIVh/0Z+yQa1WWXbZssZZyXIIBj0UEFVn2L4iOPWWSdWfHSBC6 GtBObHMLG4tdsmnFYJh0B3Ox0UfRpkYDUcdXPvrrJ7iYhCQ+hrz5t5WkipZ001Yu6lpq 85Dg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date :arc-authentication-results; bh=C1Jt1l5g6do5tpejVkIdcdDTki8IRpxzP6evHtpoQMg=; b=BT47KDsU0uX5sLy5uwhE7jGuwsyv4fEI2KlCyUNdoQFdMlPaZziA/K95ey7TPiSlcY QAr0snl9gmjmY9JG2pitRxiH9OsA9nxS1yr0MVA/MJzdHCUdDT9NlaMyvCvdMF1FiAst /vzDW0iTeaksOPIkZokaPa7IcuG5cMMDrT4MjjboeBtEbSOcthfSKuwMwqHAkqKr2Ujs AK9/UaB99+zNRw1Tj6iEJUr3KYCPzmqtVm1nJDgrVBa0EoB+dNLjNhc/q+aVK8xotW7n XrUN5PKeZvsKwEbSKI801BVmU9HFfVcueu9+qw+T/JmH8r5GYHphOvyg58ih2c5KQVAq Qj6w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 3-v6si254677pla.607.2018.01.24.06.04.32; Wed, 24 Jan 2018 06:04:54 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933949AbeAXODx (ORCPT + 99 others); Wed, 24 Jan 2018 09:03:53 -0500 Received: from mx2.suse.de ([195.135.220.15]:38775 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933642AbeAXODw (ORCPT ); Wed, 24 Jan 2018 09:03:52 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id C232FADF6; Wed, 24 Jan 2018 14:03:50 +0000 (UTC) Date: Wed, 24 Jan 2018 15:03:48 +0100 (CET) From: Jiri Kosina To: Greg Kroah-Hartman cc: Andi Kleen , Borislav Petkov , David Woodhouse , Paul Turner , LKML , Linus Torvalds , Tim Chen , Dave Hansen , Thomas Gleixner , Kees Cook , Rik van Riel , Peter Zijlstra , Andy Lutomirski , gnomes@lxorguk.ukuu.org.uk, x86@kernel.org, thomas.lendacky@amd.com, Josh Poimboeuf Subject: Re: [PATCH v8 04/12] x86/spectre: Add boot time option to select Spectre v2 mitigation In-Reply-To: <20180124135851.GA22180@kroah.com> Message-ID: References: <1515707194-20531-1-git-send-email-dwmw@amazon.co.uk> <1515707194-20531-5-git-send-email-dwmw@amazon.co.uk> <20180123224014.dsbzps4hydt6h7ed@pd.tnic> <20180123232125.GS7844@tassilo.jf.intel.com> <20180123234529.GU7844@tassilo.jf.intel.com> <20180124042631.GA6920@kroah.com> <20180124135851.GA22180@kroah.com> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 24 Jan 2018, Greg Kroah-Hartman wrote: > > > I just thought since you were already using modversions in enterprise > > > distros already, that adding it there would be the simplest. > > > > The patch as-is introduces immediate modversion mismatch between > > retpolined kernel and non-retpolined module, making each and every one > > fail to load. > > Good, the patch works then, because I thought that not loading > non-retpolined modules in a kernel that was built with retpoline was the > goal here. No, we do not want to break loading of externally-built modules just because they might contain indirect calls. Warning in such situations / tainting the kernel / reporting "might be vulnerable" in sysfs should be the proper way to go. retpolines are not kernel ABI (towards modules) breaker, so let's not pretend it is. Thanks, -- Jiri Kosina SUSE Labs