Gentoo Archives: gentoo-user

From: Adam Carter <adamcarter3@×××××.com>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] x86.c:(.text+0xb2): undefined reference to `l1tf_vmx_mitigation' with linux kernel 4.18.1
Date: Fri, 17 Aug 2018 04:53:39
Message-Id: CAC=wYCGdQfi0O6mUeO-XJ4evYHhLuwsuY7mmmDvh-RCrWKS8ig@mail.gmail.com
In Reply to: [gentoo-user] x86.c:(.text+0xb2): undefined reference to `l1tf_vmx_mitigation' with linux kernel 4.18.1 by tuxic@posteo.de
1 On Fri, Aug 17, 2018 at 1:15 PM, <tuxic@××××××.de> wrote:
2
3 > Hi,
4 >
5 > CPU bugs seem to be more and more common:
6 > https://www.heise.de/security/meldung/Linux-Kernel-und-
7 > Distributionen-schuetzen-vor-Prozessorluecke-Foreshadow-L1TF-4137264.html
8 > https://www.heise.de/security/meldung/Spectre-NG-Foreshadow-
9 > gefaehrdet-Intel-Prozessoren-4137209.html
10 > (sorry, I only know of this german spoken references...)
11 >
12 > With Linux kernel 4.18.1 Linus has introduced a fix (aka workaround)
13 > of the Foreshadow bug.
14 >
15
16 4.18, 4.17, 4.14, 4.9, and 4.4 have all had the fixes applied.
17
18 >
19 > Unfortunately compiling that kernel (as downloaded from
20 > https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ )
21 >
22 > gives me this bug:
23 >
24
25 gentoo-sources with gcc 7.3 builds fine for me.
26
27 Intel: grep . /sys/devices/system/cpu/vulnerabilities/*
28 /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
29 /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
30 /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation:
31 Speculative Store Bypass disabled via prctl and seccomp
32 /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
33 pointer sanitization
34 /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic
35 retpoline, IBPB, IBRS_FW
36
37 AMD: grep . /sys/devices/system/cpu/vulnerabilities/*
38 /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
39 /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
40 /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation:
41 Speculative Store Bypass disabled via prctl and seccomp
42 /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
43 pointer sanitization
44 /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD
45 retpoline, IBPB

Replies