Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1826874imm; Mon, 3 Sep 2018 10:26:52 -0700 (PDT) X-Google-Smtp-Source: ANB0VdbbJ+cIR+a+be68hLHY9rz3bT5UdDiZvUbQuB8V27Bxe4rgvDuZJaZfjP+6vGCMfFhQwd3X X-Received: by 2002:a62:6948:: with SMTP id e69-v6mr30406596pfc.166.1535995611949; Mon, 03 Sep 2018 10:26:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535995611; cv=none; d=google.com; s=arc-20160816; b=ncVWkPoDJKfReKpIY92g5aoYVFdPzAi62/SIhSrEfEa492nN3HhR4X4EFPwGTsyheD gk2OHO2z+Z5Wq8FhR0wsklhYqgk0kTLoPGliU2cj0ahNrrOMALK0JctK969jW23dL9k2 oWF5spXYsWGpB1qagMPScn+z85gorT8yuDhfgXgE0omwdlt7xoFfljfLgKneKP27hhZr CXDhgmcLRejFv6xr/MRIwQ+zcHUZYQqY1fX0YfjtnHif2+X9m5EJVldfDp+aaj1hGaAO rh5bR1wXUFOuE9/XotcfvCDfHWtTU3pDlNyg0MMLmmbatmumoTLdsBQ6l/bYaVyLHnmI qs1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=nC9LJJ+0odGapgis2V4ocHpMj95PM8rFk+2BdXnXKss=; b=eZ9o6oZ/ErSrvvg84s/ZIJK55DaAP2IFSS+f2HZdcK9ZoGyTiVYhDYXPBUr6d6k58t yj3DP9h9XJYZLM0ze//OL+cAL4QQwair6DTwDIH2AcGl7UjCi5TcgNWH5ztYQG1aXRXn lvNXDBnnIci4PojVWRHdXAd5ulStCBi3VjfXeiD/PofPtqqX9xI9m+9aruRiw3K4OmYO +F6wzotFXxgy7LIelttwzn5GrsJ7TVccdJaL1aVAQai0+3ebascuYEyjuCwxDqWdkkwl MhMQ+QnsTJPHOX81ioeu23aiy+bsW7I56C0eLG/KmiXWDNFpAlEjw+Z9FPOKV4eapABw H4Xg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x4-v6si18018684plo.459.2018.09.03.10.26.36; Mon, 03 Sep 2018 10:26:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730595AbeICVqQ (ORCPT + 99 others); Mon, 3 Sep 2018 17:46:16 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:45678 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728609AbeICVqO (ORCPT ); Mon, 3 Sep 2018 17:46:14 -0400 Received: from localhost (ip-213-127-74-90.ip.prioritytelecom.net [213.127.74.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id BD96BD37; Mon, 3 Sep 2018 17:25:06 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andy Lutomirski , Thomas Gleixner , Matt Rickard , Borislav Petkov , Jason Vas Dias , David Woodhouse , Peter Zijlstra , Andi Kleen Subject: [PATCH 4.14 114/165] x86/vdso: Fix vDSO build if a retpoline is emitted Date: Mon, 3 Sep 2018 18:56:40 +0200 Message-Id: <20180903165701.245301231@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180903165655.003605184@linuxfoundation.org> References: <20180903165655.003605184@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Andy Lutomirski commit 2e549b2ee0e358bc758480e716b881f9cabedb6a upstream. Currently, if the vDSO ends up containing an indirect branch or call, GCC will emit the "external thunk" style of retpoline, and it will fail to link. Fix it by building the vDSO with inline retpoline thunks. I haven't seen any reports of this triggering on an unpatched kernel. Fixes: commit 76b043848fd2 ("x86/retpoline: Add initial retpoline support") Signed-off-by: Andy Lutomirski Signed-off-by: Thomas Gleixner Acked-by: Matt Rickard Cc: Borislav Petkov Cc: Jason Vas Dias Cc: David Woodhouse Cc: Peter Zijlstra Cc: Andi Kleen Cc: stable@vger.kernel.org Link: https://lkml.kernel.org/r/c76538cd3afbe19c6246c2d1715bc6a60bd63985.1534448381.git.luto@kernel.org Signed-off-by: Greg Kroah-Hartman --- Makefile | 4 ++++ arch/x86/entry/vdso/Makefile | 6 ++++-- 2 files changed, 8 insertions(+), 2 deletions(-) --- a/Makefile +++ b/Makefile @@ -490,9 +490,13 @@ KBUILD_AFLAGS += $(CLANG_TARGET) $(CLANG endif RETPOLINE_CFLAGS_GCC := -mindirect-branch=thunk-extern -mindirect-branch-register +RETPOLINE_VDSO_CFLAGS_GCC := -mindirect-branch=thunk-inline -mindirect-branch-register RETPOLINE_CFLAGS_CLANG := -mretpoline-external-thunk +RETPOLINE_VDSO_CFLAGS_CLANG := -mretpoline RETPOLINE_CFLAGS := $(call cc-option,$(RETPOLINE_CFLAGS_GCC),$(call cc-option,$(RETPOLINE_CFLAGS_CLANG))) +RETPOLINE_VDSO_CFLAGS := $(call cc-option,$(RETPOLINE_VDSO_CFLAGS_GCC),$(call cc-option,$(RETPOLINE_VDSO_CFLAGS_CLANG))) export RETPOLINE_CFLAGS +export RETPOLINE_VDSO_CFLAGS ifeq ($(config-targets),1) # =========================================================================== --- a/arch/x86/entry/vdso/Makefile +++ b/arch/x86/entry/vdso/Makefile @@ -74,9 +74,9 @@ $(obj)/vdso-image-%.c: $(obj)/vdso%.so.d CFL := $(PROFILING) -mcmodel=small -fPIC -O2 -fasynchronous-unwind-tables -m64 \ $(filter -g%,$(KBUILD_CFLAGS)) $(call cc-option, -fno-stack-protector) \ -fno-omit-frame-pointer -foptimize-sibling-calls \ - -DDISABLE_BRANCH_PROFILING -DBUILD_VDSO + -DDISABLE_BRANCH_PROFILING -DBUILD_VDSO $(RETPOLINE_VDSO_CFLAGS) -$(vobjs): KBUILD_CFLAGS := $(filter-out $(GCC_PLUGINS_CFLAGS),$(KBUILD_CFLAGS)) $(CFL) +$(vobjs): KBUILD_CFLAGS := $(filter-out $(GCC_PLUGINS_CFLAGS) $(RETPOLINE_CFLAGS),$(KBUILD_CFLAGS)) $(CFL) # # vDSO code runs in userspace and -pg doesn't help with profiling anyway. @@ -147,11 +147,13 @@ KBUILD_CFLAGS_32 := $(filter-out -mcmode KBUILD_CFLAGS_32 := $(filter-out -fno-pic,$(KBUILD_CFLAGS_32)) KBUILD_CFLAGS_32 := $(filter-out -mfentry,$(KBUILD_CFLAGS_32)) KBUILD_CFLAGS_32 := $(filter-out $(GCC_PLUGINS_CFLAGS),$(KBUILD_CFLAGS_32)) +KBUILD_CFLAGS_32 := $(filter-out $(RETPOLINE_CFLAGS),$(KBUILD_CFLAGS_32)) KBUILD_CFLAGS_32 += -m32 -msoft-float -mregparm=0 -fpic KBUILD_CFLAGS_32 += $(call cc-option, -fno-stack-protector) KBUILD_CFLAGS_32 += $(call cc-option, -foptimize-sibling-calls) KBUILD_CFLAGS_32 += -fno-omit-frame-pointer KBUILD_CFLAGS_32 += -DDISABLE_BRANCH_PROFILING +KBUILD_CFLAGS_32 += $(RETPOLINE_VDSO_CFLAGS) $(obj)/vdso32.so.dbg: KBUILD_CFLAGS = $(KBUILD_CFLAGS_32) $(obj)/vdso32.so.dbg: FORCE \