]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/commit - include/linux/module.h
module/retpoline: Warn about missing retpoline in module
authorAndi Kleen <ak@linux.intel.com>
Thu, 25 Jan 2018 23:50:28 +0000 (15:50 -0800)
committerSeth Forshee <seth.forshee@canonical.com>
Thu, 8 Feb 2018 03:08:32 +0000 (21:08 -0600)
commitd280282b4c00559a1f0c315e30e785c01f7371af
tree358756defc743091839160b4bac683d0a08aaca1
parent405b60d20e3915919f2d16e75839eb5341a00e3a
module/retpoline: Warn about missing retpoline in module

BugLink: http://bugs.launchpad.net/bugs/1748072
commit caf7501a1b4ec964190f31f9c3f163de252273b8

There's a risk that a kernel which has full retpoline mitigations becomes
vulnerable when a module gets loaded that hasn't been compiled with the
right compiler or the right option.

To enable detection of that mismatch at module load time, add a module info
string "retpoline" at build time when the module was compiled with
retpoline support. This only covers compiled C source, but assembler source
or prebuilt object files are not checked.

If a retpoline enabled kernel detects a non retpoline protected module at
load time, print a warning and report it in the sysfs vulnerability file.

[ tglx: Massaged changelog ]

Signed-off-by: Andi Kleen <ak@linux.intel.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Cc: David Woodhouse <dwmw2@infradead.org>
Cc: gregkh@linuxfoundation.org
Cc: torvalds@linux-foundation.org
Cc: jeyu@kernel.org
Cc: arjan@linux.intel.com
Link: https://lkml.kernel.org/r/20180125235028.31211-1-andi@firstfloor.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
arch/x86/kernel/cpu/bugs.c
include/linux/module.h
kernel/module.c
scripts/mod/modpost.c