On Wed, 3 Jan 2018, Andi Kleen wrote:
>       unwind_init();
> +
> +#ifndef RETPOLINE
> +     add_taint(TAINT_NO_RETPOLINE, LOCKDEP_STILL_OK);
> +     pr_warn("No support for retpoline in kernel compiler\n");
> +     pr_warn("Kernel may be vulnerable to data leaks.\n");

That's blantantly wrong.

The kernel is not vulnerable to data leaks. The hardware is.

An that's what the CPU_BUG bit is for. If the mitigation is in place,
activate the proper feature bit like we did with PTI

Thanks,

        tglx




Reply via email to