Received: by 10.192.165.148 with SMTP id m20csp851565imm; Fri, 27 Apr 2018 08:31:02 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpkSo6aiG8gpFzgl/S5lgjVK0KT+xtdEs1uph3BVqXPuJT0SZSp41bku0gLr6xUNHKbA4gm X-Received: by 2002:a63:5fd2:: with SMTP id t201-v6mr2551912pgb.315.1524843062569; Fri, 27 Apr 2018 08:31:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524843062; cv=none; d=google.com; s=arc-20160816; b=VZ3B7gIg0xA/z+5Iuwmdhd66bH0Z2vFmz3ozQ+IKMyozqKDDvCRLktaq8Y5YyEiwfA K5EXD6hGnsL1yuw65kDqLKcrwXYJy1CvbKwaCSPV+BVQMwU6sNUKW6lKDWxE60kpJn+p fL9xZgGAYnW0mjPg27S4sXRzcOWrDdaZig9ydM3NA391VtpxvHIygc7Wx1gt9PrOkQqt ZC1TEgERjBAAaZhuF4nlEA7h+t+Csbw5eIHMgTO6+LzhmbSzlyQ59l7bw7IcWdWhNXKC PGRMcTgY4HqTudBPf7N19Qvt6nOHaD5Fj1s3Ju1BirqGCQVWnMdftAPLTlSXgF1Mbeia b5Bg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dmarc-filter :arc-authentication-results; bh=MrLN7bby7fDFoz9w67IYj3A63qVd7cqFttfS+IxX3J0=; b=bnJxt9032fGHR/8Oys99fcCvlWAgUy/DNDOKvF3ofrNc2IekiYv3DWp76l4cDkAvnY YAxXDWfFnA/FJifnHbwIrrhnZVvCCDOYMmwYTQ0OsNkVqI0pUyTFTfZRhJJ8eLDuSugw r/cK0oqSSliI4hnLqD+S6mJuyLdW1uFGeF4FxEQCKXDLGz1RqrGkahrSiyq3StBlhK1h Dk9UOVRZrO6IZ/QQdzHrQ1uCRHL3vRDiiEfkQwVJuFAlstirJXuOx6SwHSO7f7lURerG tlp8Fs2eWzCEbg07foLP2k/CM4LHgpNh7vqcxKRjeC2T55bkGvbnp/i/Qtg/35HLOsQt io5Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f13-v6si1314674pgp.666.2018.04.27.08.30.48; Fri, 27 Apr 2018 08:31:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933148AbeD0OB0 (ORCPT + 99 others); Fri, 27 Apr 2018 10:01:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:48354 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932862AbeD0OBW (ORCPT ); Fri, 27 Apr 2018 10:01:22 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A314A2185A; Fri, 27 Apr 2018 14:01:21 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org A314A2185A Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=linuxfoundation.org Authentication-Results: mail.kernel.org; spf=fail smtp.mailfrom=gregkh@linuxfoundation.org From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Martin Schwidefsky Subject: [PATCH 4.4 26/50] s390: correct nospec auto detection init order Date: Fri, 27 Apr 2018 15:58:28 +0200 Message-Id: <20180427135657.242749826@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180427135655.623669681@linuxfoundation.org> References: <20180427135655.623669681@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Martin Schwidefsky [ Upstream commit 6a3d1e81a434fc311f224b8be77258bafc18ccc6 ] With CONFIG_EXPOLINE_AUTO=y the call of spectre_v2_auto_early() via early_initcall is done *after* the early_param functions. This overwrites any settings done with the nobp/no_spectre_v2/spectre_v2 parameters. The code patching for the kernel is done after the evaluation of the early parameters but before the early_initcall is done. The end result is a kernel image that is patched correctly but the kernel modules are not. Make sure that the nospec auto detection function is called before the early parameters are evaluated and before the code patching is done. Fixes: 6e179d64126b ("s390: add automatic detection of the spectre defense") Signed-off-by: Martin Schwidefsky Signed-off-by: Greg Kroah-Hartman --- arch/s390/include/asm/nospec-branch.h | 1 + arch/s390/kernel/nospec-branch.c | 8 ++------ arch/s390/kernel/setup.c | 3 +++ 3 files changed, 6 insertions(+), 6 deletions(-) --- a/arch/s390/include/asm/nospec-branch.h +++ b/arch/s390/include/asm/nospec-branch.h @@ -9,6 +9,7 @@ extern int nospec_disable; void nospec_init_branches(void); +void nospec_auto_detect(void); void nospec_revert(s32 *start, s32 *end); #endif /* __ASSEMBLY__ */ --- a/arch/s390/kernel/nospec-branch.c +++ b/arch/s390/kernel/nospec-branch.c @@ -73,7 +73,7 @@ static int __init nospectre_v2_setup_ear } early_param("nospectre_v2", nospectre_v2_setup_early); -static int __init spectre_v2_auto_early(void) +void __init nospec_auto_detect(void) { if (IS_ENABLED(CC_USING_EXPOLINE)) { /* @@ -88,11 +88,7 @@ static int __init spectre_v2_auto_early( * nobp setting decides what is done, this depends on the * CONFIG_KERNEL_NP option and the nobp/nospec parameters. */ - return 0; } -#ifdef CONFIG_EXPOLINE_AUTO -early_initcall(spectre_v2_auto_early); -#endif static int __init spectre_v2_setup_early(char *str) { @@ -103,7 +99,7 @@ static int __init spectre_v2_setup_early if (str && !strncmp(str, "off", 3)) nospec_disable = 1; if (str && !strncmp(str, "auto", 4)) - spectre_v2_auto_early(); + nospec_auto_detect(); return 0; } early_param("spectre_v2", spectre_v2_setup_early); --- a/arch/s390/kernel/setup.c +++ b/arch/s390/kernel/setup.c @@ -846,6 +846,9 @@ void __init setup_arch(char **cmdline_p) init_mm.end_data = (unsigned long) &_edata; init_mm.brk = (unsigned long) &_end; + if (IS_ENABLED(CONFIG_EXPOLINE_AUTO)) + nospec_auto_detect(); + parse_early_param(); os_info_init(); setup_ipl();