updating gcc in the Fedora 25 build chroot (was: Re: [qubes-devel] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre))

2018-02-27 Thread Simon Gaiser
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Simon Gaiser: [...] >>> - Installing the patched gcc required manual intervention in my chroot >>>(didn't tried a fresh chroot yet). For some reasons it only wanted to >>>install it when I told dnf explicitly to install the updated gcc and >

Re: Fedora gcc 6.4.1 source tarball (was: Re: [qubes-devel] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre))

2018-02-26 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Mon, Feb 26, 2018 at 01:32:00PM +, Simon Gaiser wrote: > Marek Marczykowski-Górecki: > [...] > > I'd go with backporting patches to original Fedora's gcc. > > Fedora uses their own gcc snapshot in their package (i.e. not an > upstream tarball

Fedora gcc 6.4.1 source tarball (was: Re: [qubes-devel] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre))

2018-02-26 Thread Simon Gaiser
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Marek Marczykowski-Górecki: [...] > I'd go with backporting patches to original Fedora's gcc. Fedora uses their own gcc snapshot in their package (i.e. not an upstream tarball). AFAICS Fedora does not host it directly anywhere. Where should qubes-bu

Re: [qubes-devel] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-02-26 Thread Simon Gaiser
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Reg Tiangha: > On 02/25/2018 01:53 PM, Simon Gaiser wrote: >> - The Fedora gcc package build seems to be flacky. It failed twice for >>me with different errors (both verry likely unrelated to the backport >>patches). Assigning a lot of memor

Re: [qubes-devel] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-02-26 Thread Simon Gaiser
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Marek Marczykowski-Górecki: > On Sun, Feb 25, 2018 at 08:53:00PM +, Simon Gaiser wrote: >> Marek Marczykowski-Górecki: >>> On Fri, Feb 23, 2018 at 03:27:38PM -0700, Reg Tiangha wrote: I've noticed that Xen has updated the XSA-254 advisory wi

Re: [qubes-devel] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-02-25 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sun, Feb 25, 2018 at 08:53:00PM +, Simon Gaiser wrote: > Marek Marczykowski-Górecki: > > On Fri, Feb 23, 2018 at 03:27:38PM -0700, Reg Tiangha wrote: > >> I've noticed that Xen has updated the XSA-254 advisory with Spectre v2 > >> mitigations

Re: [qubes-devel] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-02-25 Thread Simon Gaiser
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Marek Marczykowski-Górecki: > On Fri, Feb 23, 2018 at 03:27:38PM -0700, Reg Tiangha wrote: >> I've noticed that Xen has updated the XSA-254 advisory with Spectre v2 >> mitigations for Xen 4.6-4.10. I know we'd have to figure out how to >> backport Re

Re: [qubes-devel] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-02-23 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Fri, Feb 23, 2018 at 03:27:38PM -0700, Reg Tiangha wrote: > I've noticed that Xen has updated the XSA-254 advisory with Spectre v2 > mitigations for Xen 4.6-4.10. I know we'd have to figure out how to > backport Retpoline compatible compilers to t

Re: [qubes-devel] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-02-23 Thread 'awokd' via qubes-devel
On Fri, February 23, 2018 10:27 pm, Reg Tiangha wrote: > And a side question about qubes-builder: Does it build in a chroot? I'd > like to attempt to backport a build environment that has a > retpoline-enabled version of gcc, and I'm wondering if I could just bypass > qubes-builder entirely and ru

Re: [qubes-devel] Re: [UPDATE] QSB #37: Information leaks due to processor speculative execution bugs (XSA-254, Meltdown & Sepctre)

2018-01-26 Thread taii...@gmx.com
On 01/25/2018 09:03 PM, Rich Persaud wrote: This OpenXT wiki page aggregates evolving info from upstream projects and vendor disclosures on Spectre/Meltdown: https://openxt.atlassian.net/wiki/spaces/DC/pages/397967361/Meltdown+and+Spectre+mitigations+for+Xen+Linux+and+Windows It links to an e