From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: <gentoo-user+bounces-184687-garchives=archives.gentoo.org@lists.gentoo.org>
Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by finch.gentoo.org (Postfix) with ESMTPS id 54456138334
	for <garchives@archives.gentoo.org>; Fri, 17 Aug 2018 06:06:56 +0000 (UTC)
Received: from pigeon.gentoo.org (localhost [127.0.0.1])
	by pigeon.gentoo.org (Postfix) with SMTP id 7F57DE0909;
	Fri, 17 Aug 2018 06:06:49 +0000 (UTC)
Received: from mail-it0-x241.google.com (mail-it0-x241.google.com [IPv6:2607:f8b0:4001:c0b::241])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by pigeon.gentoo.org (Postfix) with ESMTPS id 057E2E08FA
	for <gentoo-user@lists.gentoo.org>; Fri, 17 Aug 2018 06:06:48 +0000 (UTC)
Received: by mail-it0-x241.google.com with SMTP id s7-v6so9912634itb.4
        for <gentoo-user@lists.gentoo.org>; Thu, 16 Aug 2018 23:06:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=20161025;
        h=mime-version:references:in-reply-to:from:date:message-id:subject:to;
        bh=3QMH9vzbNGMFxJYqOWMBa3qyyC1R8FrdDwa0oOMVHFk=;
        b=ouZNKyhi2qBeOWrZJz1rueCvSzFE05YapvL4b4+UzqjnLD1vhH/CEUSio1A0Is9t61
         KyBAQIwFym/X+XqCkToQLZFs0oRAxYXguTlohYp0961LtaIWQlyXovbpuKUjVCFCCJNg
         pjyhIxLp+Z54xRGueTov29ImGbyMAlbwr3ZZkWlS9UEVp9GQ3djiwSLcqzx7FtY768BF
         oraaPCJPHr7COnbMg7KXgyeGfqd3bTrbJuRrNptwZ6lGmH69+tvg2TZ7xb1gzUzh6/OJ
         2cYqqEfIzUzBz0nnaxsbl1moMH8U/X7+ZZtAbCRjWGLjXIP4Pz7ZZizoNeHFmf1qHhe8
         I6mQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=1e100.net; s=20161025;
        h=x-gm-message-state:mime-version:references:in-reply-to:from:date
         :message-id:subject:to;
        bh=3QMH9vzbNGMFxJYqOWMBa3qyyC1R8FrdDwa0oOMVHFk=;
        b=Iaa+VYi+6QHf2/WrjnpJP90mQ3CvbQLMSxAPEWgfaSY17o84Gil3D0cpUDKw2GFNtQ
         4jfobtphgn6AnvarBVREz4U3uXXEhOAaW1ZOltOOvlBggq4PU119/n7OgFutivF01/5B
         TIdYDNJB/p34XcOVndxhzuGvpSTK2JX9rDzSVyLfP45xvowzN7vMPnbaS9y3erkCKtIc
         yhPNdX9Vq7FqX9uk3LECxdGnrodM/6Rf8vDRCwbSzsHTwZ4YlSbraJ8j7+KA2kmTgAGW
         PiWIF1iQAYiMm+o/ZVwDsTGXcJ57fQ0XzZXJ/sc2WpQPsQnR+jQ9G+cuEBe1JvOOQj8f
         e5fQ==
X-Gm-Message-State: AOUpUlE6SjoVbBkrksQdCd6HYJTB9iFXPTwxaaXrxi7FKfbGsqIc/yL9
	TpiM19ubnNjr27SwaA4orSp66NcIMid1StaNjjy4SK2/
X-Google-Smtp-Source: AA+uWPxmPh0z5SK5/KeQd7mqa9UW7hN8FOjVh4HCqsqzPnYSlhyGYS9Ij9fpkQ/khN54e6y57Tfsri61NLY/MAYCXwI=
X-Received: by 2002:a24:6b0e:: with SMTP id v14-v6mr4950604itc.90.1534486007836;
 Thu, 16 Aug 2018 23:06:47 -0700 (PDT)
Precedence: bulk
List-Post: <mailto:gentoo-user@lists.gentoo.org>
List-Help: <mailto:gentoo-user+help@lists.gentoo.org>
List-Unsubscribe: <mailto:gentoo-user+unsubscribe@lists.gentoo.org>
List-Subscribe: <mailto:gentoo-user+subscribe@lists.gentoo.org>
List-Id: Gentoo Linux mail <gentoo-user.gentoo.org>
X-BeenThere: gentoo-user@lists.gentoo.org
Reply-to: gentoo-user@lists.gentoo.org
MIME-Version: 1.0
References: <20180817031542.xsrem2yee3yhfy4h@solfire> <CAC=wYCGdQfi0O6mUeO-XJ4evYHhLuwsuY7mmmDvh-RCrWKS8ig@mail.gmail.com>
 <20180817051032.u75dwomjje5uerg3@solfire> <CAJ1xhMXTuQ9JdjHejbSqbXJau4Q--N7NJT2F+_eucNpqpUyzpw@mail.gmail.com>
 <CAJ1xhMWRrZzFRhNUSSKPjDMuZXoQsADfgj1Wk3SpGevXLdG5_Q@mail.gmail.com>
In-Reply-To: <CAJ1xhMWRrZzFRhNUSSKPjDMuZXoQsADfgj1Wk3SpGevXLdG5_Q@mail.gmail.com>
From: Alexander Kapshuk <alexander.kapshuk@gmail.com>
Date: Fri, 17 Aug 2018 09:06:11 +0300
Message-ID: <CAJ1xhMXEq8Ck+ei=HQ=LXrfyDi8rnUKfLszi6agPqfG27riB+A@mail.gmail.com>
Subject: Re: [gentoo-user] x86.c:(.text+0xb2): undefined reference to
 `l1tf_vmx_mitigation' with linux kernel 4.18.1
To: Gentoo mailing list <gentoo-user@lists.gentoo.org>
Content-Type: text/plain; charset="UTF-8"
X-Archives-Salt: 244eea1d-8626-46c3-aff0-efce60b10862
X-Archives-Hash: 800ace375d133139fa93ca5f6fb0195b

On Fri, Aug 17, 2018 at 8:58 AM Alexander Kapshuk
<alexander.kapshuk@gmail.com> wrote:
>
> On Fri, Aug 17, 2018 at 8:57 AM Alexander Kapshuk
> <alexander.kapshuk@gmail.com> wrote:
> >
> > On Fri, Aug 17, 2018 at 8:10 AM <tuxic@posteo.de> wrote:
> > >
> > > On 08/17 02:53, Adam Carter wrote:
> > > > On Fri, Aug 17, 2018 at 1:15 PM, <tuxic@posteo.de> wrote:
> > > >
> > > > > Hi,
> > > > >
> > > > > CPU bugs seem to be more and more common:
> > > > > https://www.heise.de/security/meldung/Linux-Kernel-und-
> > > > > Distributionen-schuetzen-vor-Prozessorluecke-Foreshadow-L1TF-4137264.html
> > > > > https://www.heise.de/security/meldung/Spectre-NG-Foreshadow-
> > > > > gefaehrdet-Intel-Prozessoren-4137209.html
> > > > > (sorry, I only know of this german spoken references...)
> > > > >
> > > > > With Linux kernel 4.18.1 Linus has introduced a fix (aka workaround)
> > > > > of the  Foreshadow bug.
> > > > >
> > > >
> > > >  4.18, 4.17, 4.14, 4.9, and 4.4 have all had the fixes applied.
> > > >
> > > > >
> > > > > Unfortunately compiling that kernel (as downloaded from
> > > > > https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ )
> > > > >
> > > > > gives me this bug:
> > > > >
> > > >
> > > > gentoo-sources with gcc 7.3 builds fine for me.
> > > >
> > > > Intel: grep . /sys/devices/system/cpu/vulnerabilities/*
> > > > /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
> > > > /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
> > > > /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation:
> > > > Speculative Store Bypass disabled via prctl and seccomp
> > > > /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
> > > > pointer sanitization
> > > > /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic
> > > > retpoline, IBPB, IBRS_FW
> > > >
> > > > AMD: grep . /sys/devices/system/cpu/vulnerabilities/*
> > > > /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
> > > > /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
> > > > /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation:
> > > > Speculative Store Bypass disabled via prctl and seccomp
> > > > /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
> > > > pointer sanitization
> > > > /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD
> > > > retpoline, IBPB
> > >
> > > Hi,
> > >
> > > I am happy, that other sources do work for you Adam.
> > >
> > > Interesting would be, why the original sources does not compile for
> > > me.
> > > Any idea?
> > >
> > >
> > >
> >
> > This problem has been reported upstream. See below.
> > https://lkml.org/lkml/2018/8/15/118
> >
> > In particular:
> >
> > Build is successful with
> > CONFIG_KVM=y
> > CONFIG_KVM_INTEL=y
> > CONFIG_KVM_AMD=y
> > but fails if only
> > CONFIG_KVM=y
> > CONFIG_KVM_AMD=y
> > are selected.
>
> And a follow up email with a reference to a patch that addresses the issue:
> https://lkml.org/lkml/2018/8/15/122

The patch in question will become available in 4.18.2 upstream. See
the link below.
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git/commit/?h=linux-4.18.y&id=eca268a3133cafcd188d85489f08a7c5907d985d