Received: by 10.192.165.148 with SMTP id m20csp829694imm; Fri, 27 Apr 2018 08:10:12 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoWa2B++VuBplGiIMhraCPzZymZsgtKKtMx0p6+ska9hwxnoCNKqbkR/BhyvAEerwtwGRZv X-Received: by 2002:a17:902:7d95:: with SMTP id a21-v6mr2712612plm.12.1524841812136; Fri, 27 Apr 2018 08:10:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524841812; cv=none; d=google.com; s=arc-20160816; b=bbTyGuZ52zReU1Dy/9PryY0JwpdL3o9UrFeG+EIRsLW5cQMkZpmQEqSesvjzQTQQrU fWPEOwn6vkSnNA7YsHNSNSwxG8PPMYB9iB/hmV31j+gNirblzhwU72WG3uBbqMaFlkQ5 nC0x17s+fcyEk9Fwpgm8JqP/OPCr3xSgQKvpDTW6ZsLKKpZEXYBMyw06OELyqVloiyXF OGz63/x3sjb1GiTMGRYDMwRF23GeNfsAeKb2pyagBCEdeepeXi1LHKqZm+oh23zQVegS YPh76cle/6j4ZTQJUKn1F9lX+D/HNf96eJPkvm2oC0i8LhG1tox4jtfeJNRsc4lQ0obo JK8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dmarc-filter :arc-authentication-results; bh=q/nYsGOMfLFgm7rTQJtt7RHsHcVwkhXqpskm6dYpYGQ=; b=PF4LkGY96dm2L0RtH4kPHqzb45/+aQPqS1W5WWXhXDTMFa3ufJ/N/e8vhiKjRVEvVW 834Kc6C5Uf1gMIP7II04Taj97XNYyECLPUZy0ieBwemlF3FRmRtJQ/Qbyly6TDubnysE CRXk+5cEdIwAUZg7Cw4InzMpAc7N81olb+khzPDqctKQDQtBv+VGYEz9CHI+3ysiZ+yR wSiS/UOo+kfjQErtHMMChgKHXYs6Faw8zuvUt6VtmRtTr8QBDG276+hObevvatqKZDIX hJm60PSviK5x0XcxkW5R/laXatNQjkW80MEtdMkN9eTB+XJvn8nP+GsK31UilHSEylZ7 28SQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 87si1432121pfo.137.2018.04.27.08.09.57; Fri, 27 Apr 2018 08:10:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933718AbeD0OE3 (ORCPT + 99 others); Fri, 27 Apr 2018 10:04:29 -0400 Received: from mail.kernel.org ([198.145.29.99]:50776 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933706AbeD0OE0 (ORCPT ); Fri, 27 Apr 2018 10:04:26 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8DE7821890; Fri, 27 Apr 2018 14:04:25 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 8DE7821890 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=linuxfoundation.org Authentication-Results: mail.kernel.org; spf=fail smtp.mailfrom=gregkh@linuxfoundation.org From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Martin Schwidefsky Subject: [PATCH 4.9 45/74] s390: correct nospec auto detection init order Date: Fri, 27 Apr 2018 15:58:35 +0200 Message-Id: <20180427135711.789179250@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180427135709.899303463@linuxfoundation.org> References: <20180427135709.899303463@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Martin Schwidefsky [ Upstream commit 6a3d1e81a434fc311f224b8be77258bafc18ccc6 ] With CONFIG_EXPOLINE_AUTO=y the call of spectre_v2_auto_early() via early_initcall is done *after* the early_param functions. This overwrites any settings done with the nobp/no_spectre_v2/spectre_v2 parameters. The code patching for the kernel is done after the evaluation of the early parameters but before the early_initcall is done. The end result is a kernel image that is patched correctly but the kernel modules are not. Make sure that the nospec auto detection function is called before the early parameters are evaluated and before the code patching is done. Fixes: 6e179d64126b ("s390: add automatic detection of the spectre defense") Signed-off-by: Martin Schwidefsky Signed-off-by: Greg Kroah-Hartman --- arch/s390/include/asm/nospec-branch.h | 1 + arch/s390/kernel/nospec-branch.c | 8 ++------ arch/s390/kernel/setup.c | 3 +++ 3 files changed, 6 insertions(+), 6 deletions(-) --- a/arch/s390/include/asm/nospec-branch.h +++ b/arch/s390/include/asm/nospec-branch.h @@ -9,6 +9,7 @@ extern int nospec_disable; void nospec_init_branches(void); +void nospec_auto_detect(void); void nospec_revert(s32 *start, s32 *end); #endif /* __ASSEMBLY__ */ --- a/arch/s390/kernel/nospec-branch.c +++ b/arch/s390/kernel/nospec-branch.c @@ -73,7 +73,7 @@ static int __init nospectre_v2_setup_ear } early_param("nospectre_v2", nospectre_v2_setup_early); -static int __init spectre_v2_auto_early(void) +void __init nospec_auto_detect(void) { if (IS_ENABLED(CC_USING_EXPOLINE)) { /* @@ -88,11 +88,7 @@ static int __init spectre_v2_auto_early( * nobp setting decides what is done, this depends on the * CONFIG_KERNEL_NP option and the nobp/nospec parameters. */ - return 0; } -#ifdef CONFIG_EXPOLINE_AUTO -early_initcall(spectre_v2_auto_early); -#endif static int __init spectre_v2_setup_early(char *str) { @@ -103,7 +99,7 @@ static int __init spectre_v2_setup_early if (str && !strncmp(str, "off", 3)) nospec_disable = 1; if (str && !strncmp(str, "auto", 4)) - spectre_v2_auto_early(); + nospec_auto_detect(); return 0; } early_param("spectre_v2", spectre_v2_setup_early); --- a/arch/s390/kernel/setup.c +++ b/arch/s390/kernel/setup.c @@ -876,6 +876,9 @@ void __init setup_arch(char **cmdline_p) init_mm.end_data = (unsigned long) &_edata; init_mm.brk = (unsigned long) &_end; + if (IS_ENABLED(CONFIG_EXPOLINE_AUTO)) + nospec_auto_detect(); + parse_early_param(); #ifdef CONFIG_CRASH_DUMP /* Deactivate elfcorehdr= kernel parameter */