gcc version 4.8.5 20150623 / Meltdown and/or Spectre vulnerabilities

Vassilena Treneva treneva@gmail.com
Mon Jun 18 11:51:00 GMT 2018


Thank you!

Which the the knowledge base article that you would recommend I read to get
a bit more familiar with this topic?

On Fri, Jun 15, 2018 at 6:47 PM Jeff Law <law@redhat.com> wrote:

> On 06/15/2018 09:34 AM, Vassilena Treneva wrote:
> > Many thanks for your quick answers.
> >
> > Perhaps silly questions but:
> >
> > 1) is there a way to check if the version that I am using really
> > contains those patches?
> > Running on Red Hat Enterprise Linux Server release 7.2 (Maipo) with gcc
> > (GCC) 4.8.5 20150623 (Red Hat 4.8.5-4).
> Use RPM to get the precise version of the package you are using rather
> than "gcc -v".  "rpm -qi gcc"
>
> You'll be looking for a release like 4.el7_2.1
>
> >
> > 2) Does that mean that to avoid Spectre v2 I can add  -mindirect-branch
> > compiler option? Are there other options in place?
> I would suggest you read the knowledge base article on the subject.  In
> general we do not recommend compiling user space code with spectre
> mitigations.  It is unnecessary.
>
> THe kernel and kernel modules provided by Red Hat are already build with
> the proper mitigations.   Out of tree kernel modules that use the kbuild
> system and have been rebuilt since the release of the kernel and
> compiler updates will automatically use appropriate mitigation.  Out of
> kernel module builds which do not use kbuild require special flags.
> This is all covered in the kbase article.
>
> jeff
>



More information about the Gcc-help mailing list