Files
kernel/include/linux
Andi Kleen caf7501a1b module/retpoline: Warn about missing retpoline in module
There's a risk that a kernel which has full retpoline mitigations becomes
vulnerable when a module gets loaded that hasn't been compiled with the
right compiler or the right option.

To enable detection of that mismatch at module load time, add a module info
string "retpoline" at build time when the module was compiled with
retpoline support. This only covers compiled C source, but assembler source
or prebuilt object files are not checked.

If a retpoline enabled kernel detects a non retpoline protected module at
load time, print a warning and report it in the sysfs vulnerability file.

[ tglx: Massaged changelog ]

Signed-off-by: Andi Kleen <ak@linux.intel.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Cc: David Woodhouse <dwmw2@infradead.org>
Cc: gregkh@linuxfoundation.org
Cc: torvalds@linux-foundation.org
Cc: jeyu@kernel.org
Cc: arjan@linux.intel.com
Link: https://lkml.kernel.org/r/20180125235028.31211-1-andi@firstfloor.org
2018-01-26 15:03:56 +01:00
..
2017-08-30 14:40:40 +02:00
2018-01-08 11:10:33 +01:00
2017-09-04 00:05:22 +02:00
2017-09-04 00:06:02 +02:00
2017-08-24 13:23:03 -07:00
2017-08-03 19:09:26 -07:00
2017-08-07 17:22:14 +02:00
2017-09-08 18:26:46 -07:00
2017-08-15 18:23:52 +02:00
2017-08-14 13:33:39 -07:00
2017-08-28 20:51:22 +02:00
2017-09-07 11:53:11 +02:00
2017-08-18 15:32:01 -07:00
2017-07-25 18:05:25 +02:00
2017-09-25 08:56:05 -06:00
2017-08-06 20:55:29 -07:00
2017-08-06 20:55:29 -07:00
2017-08-16 16:28:47 -07:00
2017-08-16 16:28:47 -07:00
2017-07-24 17:50:37 +02:00
2017-08-31 18:50:14 +02:00
2017-08-15 09:02:07 -07:00
2017-08-15 09:02:08 -07:00