Gentoo Archives: gentoo-user

From: Alexander Kapshuk <alexander.kapshuk@×××××.com>
To: Gentoo mailing list <gentoo-user@l.g.o>
Subject: Re: [gentoo-user] x86.c:(.text+0xb2): undefined reference to `l1tf_vmx_mitigation' with linux kernel 4.18.1
Date: Fri, 17 Aug 2018 05:58:11
Message-Id: CAJ1xhMXTuQ9JdjHejbSqbXJau4Q--N7NJT2F+_eucNpqpUyzpw@mail.gmail.com
In Reply to: Re: [gentoo-user] x86.c:(.text+0xb2): undefined reference to `l1tf_vmx_mitigation' with linux kernel 4.18.1 by tuxic@posteo.de
1 On Fri, Aug 17, 2018 at 8:10 AM <tuxic@××××××.de> wrote:
2 >
3 > On 08/17 02:53, Adam Carter wrote:
4 > > On Fri, Aug 17, 2018 at 1:15 PM, <tuxic@××××××.de> wrote:
5 > >
6 > > > Hi,
7 > > >
8 > > > CPU bugs seem to be more and more common:
9 > > > https://www.heise.de/security/meldung/Linux-Kernel-und-
10 > > > Distributionen-schuetzen-vor-Prozessorluecke-Foreshadow-L1TF-4137264.html
11 > > > https://www.heise.de/security/meldung/Spectre-NG-Foreshadow-
12 > > > gefaehrdet-Intel-Prozessoren-4137209.html
13 > > > (sorry, I only know of this german spoken references...)
14 > > >
15 > > > With Linux kernel 4.18.1 Linus has introduced a fix (aka workaround)
16 > > > of the Foreshadow bug.
17 > > >
18 > >
19 > > 4.18, 4.17, 4.14, 4.9, and 4.4 have all had the fixes applied.
20 > >
21 > > >
22 > > > Unfortunately compiling that kernel (as downloaded from
23 > > > https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ )
24 > > >
25 > > > gives me this bug:
26 > > >
27 > >
28 > > gentoo-sources with gcc 7.3 builds fine for me.
29 > >
30 > > Intel: grep . /sys/devices/system/cpu/vulnerabilities/*
31 > > /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
32 > > /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
33 > > /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation:
34 > > Speculative Store Bypass disabled via prctl and seccomp
35 > > /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
36 > > pointer sanitization
37 > > /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic
38 > > retpoline, IBPB, IBRS_FW
39 > >
40 > > AMD: grep . /sys/devices/system/cpu/vulnerabilities/*
41 > > /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
42 > > /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
43 > > /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation:
44 > > Speculative Store Bypass disabled via prctl and seccomp
45 > > /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
46 > > pointer sanitization
47 > > /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD
48 > > retpoline, IBPB
49 >
50 > Hi,
51 >
52 > I am happy, that other sources do work for you Adam.
53 >
54 > Interesting would be, why the original sources does not compile for
55 > me.
56 > Any idea?
57 >
58 >
59 >
60
61 This problem has been reported upstream. See below.
62 https://lkml.org/lkml/2018/8/15/118
63
64 In particular:
65
66 Build is successful with
67 CONFIG_KVM=y
68 CONFIG_KVM_INTEL=y
69 CONFIG_KVM_AMD=y
70 but fails if only
71 CONFIG_KVM=y
72 CONFIG_KVM_AMD=y
73 are selected.

Replies