From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: <gentoo-user+bounces-184687-garchives=archives.gentoo.org@lists.gentoo.org> Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 54456138334 for <garchives@archives.gentoo.org>; Fri, 17 Aug 2018 06:06:56 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 7F57DE0909; Fri, 17 Aug 2018 06:06:49 +0000 (UTC) Received: from mail-it0-x241.google.com (mail-it0-x241.google.com [IPv6:2607:f8b0:4001:c0b::241]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 057E2E08FA for <gentoo-user@lists.gentoo.org>; Fri, 17 Aug 2018 06:06:48 +0000 (UTC) Received: by mail-it0-x241.google.com with SMTP id s7-v6so9912634itb.4 for <gentoo-user@lists.gentoo.org>; Thu, 16 Aug 2018 23:06:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=3QMH9vzbNGMFxJYqOWMBa3qyyC1R8FrdDwa0oOMVHFk=; b=ouZNKyhi2qBeOWrZJz1rueCvSzFE05YapvL4b4+UzqjnLD1vhH/CEUSio1A0Is9t61 KyBAQIwFym/X+XqCkToQLZFs0oRAxYXguTlohYp0961LtaIWQlyXovbpuKUjVCFCCJNg pjyhIxLp+Z54xRGueTov29ImGbyMAlbwr3ZZkWlS9UEVp9GQ3djiwSLcqzx7FtY768BF oraaPCJPHr7COnbMg7KXgyeGfqd3bTrbJuRrNptwZ6lGmH69+tvg2TZ7xb1gzUzh6/OJ 2cYqqEfIzUzBz0nnaxsbl1moMH8U/X7+ZZtAbCRjWGLjXIP4Pz7ZZizoNeHFmf1qHhe8 I6mQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=3QMH9vzbNGMFxJYqOWMBa3qyyC1R8FrdDwa0oOMVHFk=; b=Iaa+VYi+6QHf2/WrjnpJP90mQ3CvbQLMSxAPEWgfaSY17o84Gil3D0cpUDKw2GFNtQ 4jfobtphgn6AnvarBVREz4U3uXXEhOAaW1ZOltOOvlBggq4PU119/n7OgFutivF01/5B TIdYDNJB/p34XcOVndxhzuGvpSTK2JX9rDzSVyLfP45xvowzN7vMPnbaS9y3erkCKtIc yhPNdX9Vq7FqX9uk3LECxdGnrodM/6Rf8vDRCwbSzsHTwZ4YlSbraJ8j7+KA2kmTgAGW PiWIF1iQAYiMm+o/ZVwDsTGXcJ57fQ0XzZXJ/sc2WpQPsQnR+jQ9G+cuEBe1JvOOQj8f e5fQ== X-Gm-Message-State: AOUpUlE6SjoVbBkrksQdCd6HYJTB9iFXPTwxaaXrxi7FKfbGsqIc/yL9 TpiM19ubnNjr27SwaA4orSp66NcIMid1StaNjjy4SK2/ X-Google-Smtp-Source: AA+uWPxmPh0z5SK5/KeQd7mqa9UW7hN8FOjVh4HCqsqzPnYSlhyGYS9Ij9fpkQ/khN54e6y57Tfsri61NLY/MAYCXwI= X-Received: by 2002:a24:6b0e:: with SMTP id v14-v6mr4950604itc.90.1534486007836; Thu, 16 Aug 2018 23:06:47 -0700 (PDT) Precedence: bulk List-Post: <mailto:gentoo-user@lists.gentoo.org> List-Help: <mailto:gentoo-user+help@lists.gentoo.org> List-Unsubscribe: <mailto:gentoo-user+unsubscribe@lists.gentoo.org> List-Subscribe: <mailto:gentoo-user+subscribe@lists.gentoo.org> List-Id: Gentoo Linux mail <gentoo-user.gentoo.org> X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 References: <20180817031542.xsrem2yee3yhfy4h@solfire> <CAC=wYCGdQfi0O6mUeO-XJ4evYHhLuwsuY7mmmDvh-RCrWKS8ig@mail.gmail.com> <20180817051032.u75dwomjje5uerg3@solfire> <CAJ1xhMXTuQ9JdjHejbSqbXJau4Q--N7NJT2F+_eucNpqpUyzpw@mail.gmail.com> <CAJ1xhMWRrZzFRhNUSSKPjDMuZXoQsADfgj1Wk3SpGevXLdG5_Q@mail.gmail.com> In-Reply-To: <CAJ1xhMWRrZzFRhNUSSKPjDMuZXoQsADfgj1Wk3SpGevXLdG5_Q@mail.gmail.com> From: Alexander Kapshuk <alexander.kapshuk@gmail.com> Date: Fri, 17 Aug 2018 09:06:11 +0300 Message-ID: <CAJ1xhMXEq8Ck+ei=HQ=LXrfyDi8rnUKfLszi6agPqfG27riB+A@mail.gmail.com> Subject: Re: [gentoo-user] x86.c:(.text+0xb2): undefined reference to `l1tf_vmx_mitigation' with linux kernel 4.18.1 To: Gentoo mailing list <gentoo-user@lists.gentoo.org> Content-Type: text/plain; charset="UTF-8" X-Archives-Salt: 244eea1d-8626-46c3-aff0-efce60b10862 X-Archives-Hash: 800ace375d133139fa93ca5f6fb0195b On Fri, Aug 17, 2018 at 8:58 AM Alexander Kapshuk <alexander.kapshuk@gmail.com> wrote: > > On Fri, Aug 17, 2018 at 8:57 AM Alexander Kapshuk > <alexander.kapshuk@gmail.com> wrote: > > > > On Fri, Aug 17, 2018 at 8:10 AM <tuxic@posteo.de> wrote: > > > > > > On 08/17 02:53, Adam Carter wrote: > > > > On Fri, Aug 17, 2018 at 1:15 PM, <tuxic@posteo.de> wrote: > > > > > > > > > Hi, > > > > > > > > > > CPU bugs seem to be more and more common: > > > > > https://www.heise.de/security/meldung/Linux-Kernel-und- > > > > > Distributionen-schuetzen-vor-Prozessorluecke-Foreshadow-L1TF-4137264.html > > > > > https://www.heise.de/security/meldung/Spectre-NG-Foreshadow- > > > > > gefaehrdet-Intel-Prozessoren-4137209.html > > > > > (sorry, I only know of this german spoken references...) > > > > > > > > > > With Linux kernel 4.18.1 Linus has introduced a fix (aka workaround) > > > > > of the Foreshadow bug. > > > > > > > > > > > > > 4.18, 4.17, 4.14, 4.9, and 4.4 have all had the fixes applied. > > > > > > > > > > > > > > Unfortunately compiling that kernel (as downloaded from > > > > > https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ ) > > > > > > > > > > gives me this bug: > > > > > > > > > > > > > gentoo-sources with gcc 7.3 builds fine for me. > > > > > > > > Intel: grep . /sys/devices/system/cpu/vulnerabilities/* > > > > /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion > > > > /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI > > > > /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: > > > > Speculative Store Bypass disabled via prctl and seccomp > > > > /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user > > > > pointer sanitization > > > > /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic > > > > retpoline, IBPB, IBRS_FW > > > > > > > > AMD: grep . /sys/devices/system/cpu/vulnerabilities/* > > > > /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected > > > > /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected > > > > /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: > > > > Speculative Store Bypass disabled via prctl and seccomp > > > > /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user > > > > pointer sanitization > > > > /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD > > > > retpoline, IBPB > > > > > > Hi, > > > > > > I am happy, that other sources do work for you Adam. > > > > > > Interesting would be, why the original sources does not compile for > > > me. > > > Any idea? > > > > > > > > > > > > > This problem has been reported upstream. See below. > > https://lkml.org/lkml/2018/8/15/118 > > > > In particular: > > > > Build is successful with > > CONFIG_KVM=y > > CONFIG_KVM_INTEL=y > > CONFIG_KVM_AMD=y > > but fails if only > > CONFIG_KVM=y > > CONFIG_KVM_AMD=y > > are selected. > > And a follow up email with a reference to a patch that addresses the issue: > https://lkml.org/lkml/2018/8/15/122 The patch in question will become available in 4.18.2 upstream. See the link below. https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git/commit/?h=linux-4.18.y&id=eca268a3133cafcd188d85489f08a7c5907d985d