Received: by 10.223.176.5 with SMTP id f5csp2661973wra; Mon, 29 Jan 2018 01:48:53 -0800 (PST) X-Google-Smtp-Source: AH8x224m6pn5lmPhdQdUiuvuGal6zt0qHfPdOBJBQ22yrGVwr9U/1uy7rYJ6I/BR6CN2rVEVNTfS X-Received: by 10.99.126.73 with SMTP id o9mr12496825pgn.429.1517219333321; Mon, 29 Jan 2018 01:48:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517219333; cv=none; d=google.com; s=arc-20160816; b=hWCKnizFBrdew6a35lkOjo0ZVsUOyh2KW2z8EOm44YpDLz1DmtKJHqeiXdwILBMgW6 WgMXU79XMVxAX/CtgguxjfUjkq5VHaeFpythY5kEXyjlcPyJu8B+6TZxPbaV57K41fxP aUiwEaUWZ5rAS8EyGnfw+szLt3JO9g+HTi+62yE1qsBIn7pJGwb7sGizLFJsmUhTTzYA aTXytf9uLa208aCIxkSVhLNP5SLILo7cjvd3OMsA7HfnsVEKeVVbZ8e4DG8AaPo9sgmR yF6AcD5C074+N/hyBgEvXr0Qn7kENvyMfumvspt6YD3amX/ZyhWO0VycN/KoZdLeraZx NvMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=5+l+/QgKeHxHvqcuA39KEMBQqzOQg8tOKPmZXt7X6Lk=; b=0XLG7K8eeqS/m8gBS7BN0fSgBdIMpp0vwYzbvnVhc0IYYZ8TaMYc88CVp5Ft5NZa2V fQ9V65NKHEklIJO+XL12Od1ITa07je7okHb9CUeOjkt9FzVGkOmRHd8TbG+v+vjjW3JM 79UAcc25aa1z4LNCpaE/iUwDNYPR2HLHT04lHyixytvvDrn8ISu21pZG4HR2QecWjrDa D49/uQtpgXJ7zPvwL7Zssqf/2CJZbzbgancrQrb5K3gQ2JgYpm1UAzvq39bt1KvB0ZhD DwspuzRtp8d7IjMx8xcBz+c5sVYw9jMtRGi5PSosE3GnZ70TCYl3cKBZNcZ7t3F6EGNO +l5g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o1-v6si1049498pld.445.2018.01.29.01.48.39; Mon, 29 Jan 2018 01:48:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751678AbeA2JrW convert rfc822-to-8bit (ORCPT + 99 others); Mon, 29 Jan 2018 04:47:22 -0500 Received: from mondschein.lichtvoll.de ([194.150.191.11]:47331 "EHLO mail.lichtvoll.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751360AbeA2JrV (ORCPT ); Mon, 29 Jan 2018 04:47:21 -0500 X-Greylist: delayed 364 seconds by postgrey-1.27 at vger.kernel.org; Mon, 29 Jan 2018 04:47:21 EST Received: from merkaba.localnet (ppp-46-244-246-178.dynamic.mnet-online.de [46.244.246.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.lichtvoll.de (Postfix) with ESMTPSA id 69644264DE4; Mon, 29 Jan 2018 10:41:16 +0100 (CET) From: Martin Steigerwald To: Linus Torvalds Cc: Linux Kernel Mailing List Subject: Requirements for retpoline in Linux 4.15 (was: Re: Linux 4.15) Date: Mon, 29 Jan 2018 10:41:15 +0100 Message-ID: <1620541.3EV38X6Ctd@merkaba> In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8BIT Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, hi everyone, Linus Torvalds - 28.01.18, 22:52: > details), and perhaps equally importantly, to actually get the biggest > fix for the indirect branch mitigations, you need not just the kernel > updates, you need to have a compiler with support for the "retpoline" > indirect branch model. > > You can do > > cat /sys/devices/system/cpu/vulnerabilities/spectre_v2 > > and if you don't have a compiler that supports the retpoline > mitigations, you'll get: > > Vulnerable: Minimal generic ASM retpoline > > because only the assembly code (not the C code) will have the > retpoline mitigation. So keep that in mind. I have: % cat /proc/version Linux version 4.15.0-tp520-btrfstrim+ ([…]) (gcc version 7.3.0 (Debian 7.3.0-1)) #38 SMP PREEMPT Mon Jan 29 09:38:44 CET 2018 % grep RETPO /boot/config-4.15.0-tp520-btrfstrim+ CONFIG_RETPOLINE=y % gcc --version | head -1 gcc (Debian 7.3.0-1) 7.3.0 % apt changelog gcc-7 gcc-7 (7.3.0-1) unstable; urgency=medium * GCC 7.3.0 release. * Ignore bootstrap comparison failures in gcc/d on alpha. Addresses: #888394. -- Matthias Klose […] Thu, 25 Jan 2018 12:07:10 +0100 Yet: % grep . /sys/devices/system/cpu/vulnerabilities/* /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spectre_v1:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable: Minimal generic ASM retpoline From what I read gcc 7.3 was supposed to include back ported retpoline patches. What am I missing here? Thanks, -- Martin