Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
gcc 7.3 supports
-mindirect-branch=thunk-extern
which is used(if available) by the kernel build to mitigate Spectre attacks
with a method called retpoline. If
-mindirect-branch=thunk-extern
is not available, the kernel build will not (no longer) emit a
warning [1]. The insufficient protection will be visible on the
running system
whereas when the kernel is compiled with gcc 7.3 (
prun gcc-7.3.0-0 ./linux-4.14.18-207.bee
) the output is:Changes GCC 7: https://gcc.gnu.org/gcc-7/changes.html
Changes GCC 6: https://gcc.gnu.org/gcc-6/changes.html
Porting to GCC 7: https://gcc.gnu.org/gcc-7/porting_to.html
Porting to GCC 6: https://gcc.gnu.org/gcc-6/porting_to.html
[1] https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?h=linux-4.14.y&id=198660b7a5dd33b114001023d540c9072603e2a8