On Fri, Feb 02, 2018 at 10:00:45AM -0800, Paul Rogers wrote:
>
> The compile went fine, and when I patched the kernel I agreed to the
> "retpoline" option. But when I use a version of my usual kern-build script
> modified with the PATH change as Ken used it, going first through menuconfig
> (t
On Fri, Feb 2, 2018, at 10:00 AM, Paul Rogers wrote:
...
> installed this system with the original kernel on a 1 MHz low-power
> (~10W) VIA C7 "Esther" (P3 equivalent) system, but while compatible the
> CPU can be painfully slow. Not today, Esther. I worked on my
> "development box", on a 2.66
The most recent i686 system I have running (and want to still consider
runnable) is an LFS-7.7 with gcc-4.9.2. I had already patched the kernel to
4.1.42, then recently 4.4.110. The most recent patch level I saw today is
4.4.114, which I suppose has "nicer" patches. I've installed this system
On 01/31/2018 10:43 PM, Ken Moffat wrote:
If anybody wants to add full retpoline mitigation (against Spectre
v2) to an older system, the following works on x86_64 (I no longer
have i686 systems to test on).
I have tested this on my oldest available system (LFS-7.6, using
gcc-4.9.1 and which ha
Thomas Seeling wrote:
Hallo,
I rebuilt LFS from SVN with kernel 4.15 gcc 7.3 on i686.
# head -n7 /proc/cpuinfo
processor : 0
vendor_id : GenuineIntel
cpu family : 15
model : 4
model name : Intel(R) Pentium(R) 4 CPU 3.20GHz
stepping: 9
microcode : 0
Hallo,
I rebuilt LFS from SVN with kernel 4.15 gcc 7.3 on i686.
# head -n7 /proc/cpuinfo
processor : 0
vendor_id : GenuineIntel
cpu family : 15
model : 4
model name : Intel(R) Pentium(R) 4 CPU 3.20GHz
stepping: 9
microcode : 0x3
> PTI offers mitigat
On Fri, Feb 02, 2018 at 12:11:18AM +, Ken Moffat wrote:
> On Thu, Feb 01, 2018 at 01:52:46PM -0800, Paul Rogers wrote:
> > > If anybody wants to add full retpoline mitigation (against Spectre
> > > v2) to an older system, the following works on x86_64 (I no longer
> > > have i686 systems to tes
On Thu, Feb 01, 2018 at 01:52:46PM -0800, Paul Rogers wrote:
> > If anybody wants to add full retpoline mitigation (against Spectre
> > v2) to an older system, the following works on x86_64 (I no longer
> > have i686 systems to test on).
>
> Thank you, Ken. I do. I can try it. I'll report back
> If anybody wants to add full retpoline mitigation (against Spectre
> v2) to an older system, the following works on x86_64 (I no longer
> have i686 systems to test on).
Thank you, Ken. I do. I can try it. I'll report back when I have
information. I haven't seen any indications yet that the
If anybody wants to add full retpoline mitigation (against Spectre
v2) to an older system, the following works on x86_64 (I no longer
have i686 systems to test on).
I have tested this on my oldest available system (LFS-7.6, using
gcc-4.9.1 and which had used a 3.18 kernel) to prove the approach.
T
10 matches
Mail list logo