[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <0575AF4FD06DD142AD198903C74E1CC87A5CB32D@FMSMSX151.amr.corp.intel.com>
Date: Mon, 15 Jan 2018 12:53:01 +0000
From: "Van De Ven, Arjan" <arjan.van.de.ven@...el.com>
To: David Laight <David.Laight@...LAB.COM>,
'Andi Kleen' <andi@...stfloor.org>,
"tglx@...utronix.de" <tglx@...utronix.de>
CC: "dwmw@...zon.co.uk" <dwmw@...zon.co.uk>,
"torvalds@...ux-foundation.org" <torvalds@...ux-foundation.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"gregkh@...uxfoundation.org" <gregkh@...uxfoundation.org>,
"peterz@...radead.org" <peterz@...radead.org>,
Andi Kleen <ak@...ux.intel.com>,
"jeyu@...nel.org" <jeyu@...nel.org>
Subject: RE: [PATCH] retpoline/module: Taint kernel for missing retpoline in
module
> > For modules it is checked at compile time, however it cannot
> > check assembler or other non compiled objects used in the module link.
>
> It is not unlikely that most of a module's code is released as a
> binary 'blob', with only the part that needs to match the kernel ABI
> compiled on the target system.
> (This allows a single binary driver be loaded onto different Linux
> kernel versions.)
binary what? ;-)
retpoline (or lack thereof) is part of the kernel ABI at this point....
now clearly security does not matter for this (not unlikely that you have more severe issues) but warning of a mismatch is not a bad thing so that you at least know.
Powered by blists - more mailing lists