<div dir="auto"><div><div class="gmail_extra"><div class="gmail_quote">On 31 Jan. 2018 10:35 am, "Sam McLeod" <<a href="mailto:mailinglists@smcleod.net">mailinglists@smcleod.net</a>> wrote:<br type="attribution"><blockquote class="quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word;line-break:after-white-space">Hi Trevor,<div><br></div><div>I didn't think that to compile a kernel with IBRS/IBPB your <i>compiler</i> had to be updated as well?</div><div>I thought that was a seperate issue but perhaps I'm mistaken.<div class="quoted-text"><br><div>
<div dir="auto" style="color:rgb(0,0,0);letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word;line-break:after-white-space"><div dir="auto" style="color:rgb(0,0,0);letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word;line-break:after-white-space"><div dir="auto" style="word-wrap:break-word;line-break:after-white-space"><div style="color:rgb(0,0,0);font-family:Helvetica;font-size:12px;font-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px"></div></div></div></div></div></div></div></div></blockquote></div></div></div><div dir="auto"><br></div><div dir="auto">Yes, it does require a newer compiler...you can see the details of why here:</div><div dir="auto"><br></div><div dir="auto"><a href="https://support.google.com/faqs/answer/7625886">https://support.google.com/faqs/answer/7625886</a><br></div><div dir="auto"><br></div><div dir="auto">Cheers</div><div dir="auto">L.</div><div dir="auto"><br></div><div dir="auto"><br></div><div dir="auto"><br></div><div dir="auto"><br></div><div dir="auto"><br></div><div dir="auto"><div class="gmail_extra"><div class="gmail_quote"><blockquote class="quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word;line-break:after-white-space"><div><div class="quoted-text"><div><div dir="auto" style="color:rgb(0,0,0);letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word;line-break:after-white-space"><div dir="auto" style="color:rgb(0,0,0);letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word;line-break:after-white-space"><div dir="auto" style="word-wrap:break-word;line-break:after-white-space"><div style="color:rgb(0,0,0);font-family:Helvetica;font-size:12px;font-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px"><br>--<br>Sam McLeod<br><a href="https://smcleod.net" target="_blank">https://smcleod.net</a><br><a href="https://twitter.com/s_mcleod" target="_blank">https://twitter.com/s_mcleod</a></div></div></div></div>
</div>
</div><div class="elided-text"><div><br><blockquote type="cite"><div>On 31 Jan 2018, at 12:22 am, Trevor Hemsley <<a href="mailto:themsley@voiceflex.com" target="_blank">themsley@voiceflex.com</a>> wrote:</div><br class="m_1858835190506110400Apple-interchange-newline"><div>
<div text="#000000" bgcolor="#FFFFFF">
<div class="m_1858835190506110400moz-cite-prefix">Sam<br>
<br>
I'm not ELRepo but I don't think they can do that until/unless RH
fix the compilers in the distro to be retpoline aware. If they do.<br>
<br>
And, in any case, Intel have pretty much said "don't use the new
microcode" so there is no working microcode available that the
kernel can use anyway. All the vendors have pulled their BIOS
updates and backed out e.g. the microcode_ctl updates.<br>
<br>
Trevor<br>
<br>
On 30/01/18 08:42, Sam McLeod wrote:<br>
</div>
<blockquote type="cite">
Are there any plans to enable IBRS/IBPB in the kernel-ml kernels?
<div><br>
</div>
<div>While I understand the desire to keep the builds as ‘stock’
as possible, given the potential impact of the this I’d consider
it a worth enabling unless I’m misunderstanding the situation?</div>
<div><br>
<div>
<div>
<div>
<div>
<div dir="auto" style="word-wrap:break-word;line-break:after-white-space">
<div dir="auto" style="word-wrap:break-word;line-break:after-white-space">
<div dir="auto" style="word-wrap:break-word;line-break:after-white-space">
<div><font><span style="background-color:rgba(255,255,255,0)">--<br>
Sam McLeod<br>
<a href="https://smcleod.net/" target="_blank">https://smcleod.net</a><br>
<a href="https://twitter.com/s_mcleod" target="_blank">https://twitter.com/s_mcleod</a></span></font></div>
<div><font><span style="background-color:rgba(255,255,255,0)"><br>
</span></font></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div><br>
On 30 Jan 2018, at 10:09 am, Sam McLeod <<a href="mailto:mailinglists@smcleod.net" target="_blank">mailinglists@smcleod.net</a>>
wrote:<br>
<br>
</div>
<blockquote type="cite">
<div>For those wondering about the status of Spectre and
Meltdown on kernel-ml 4.15, below is the output of the
speed47 test (<a href="https://github.com/speed47/spectre-meltdown-checker" target="_blank">https://github.com/speed47/<wbr>spectre-meltdown-checker</a>).
<div><br>
</div>
<div>I've found this to be consistent between
CentOS 7 VMs (PVHVM) on XenServer 7.2 w/ E5-2660 CPUs and
physical servers using older X5650 CPUs.</div>
<div><br>
</div>
<div>So it looks like at present we're still
vulnerable to Spectre Variant 1 and 2 with Kernel 4.15,
obviously resolving this in full will require a working
microcode update from Intel.<br>
<div><br>
</div>
<div><br>
</div>
<div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)">#
./spectre-meltdown-checker.sh</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(100,181,246);background-color:rgb(0,0,0)">Spectre and
Meltdown mitigation detection tool v0.33+</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0);min-height:18px"><br>
</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)">Checking for
vulnerabilities on current system</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(106,30,154);background-color:rgb(0,0,0)"><span style="color:#eaeaea">Kernel is </span>Linux
4.15.0-1.el7.elrepo.x86_64 #1 SMP Sun Jan 28 20:45:20
EST 2018 x86_64</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(106,30,154);background-color:rgb(0,0,0)"><span style="color:#eaeaea">CPU is </span>Intel(R)
Xeon(R) CPU E5-2660 0 @ 2.20GHz</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0);min-height:18px"><br>
</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(100,181,246);background-color:rgb(0,0,0)">Hardware
check</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)">* Hardware
support (CPU microcode) for mitigation techniques</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * Indirect
Branch Restricted Speculation (IBRS)</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> *
SPEC_CTRL MSR is available: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * CPU
indicates IBRS capability: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * Indirect
Branch Prediction Barrier (IBPB)</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> *
PRED_CMD MSR is available: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * CPU
indicates IBPB capability: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * Single
Thread Indirect Branch Predictors (STIBP)</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> *
SPEC_CTRL MSR is available: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * CPU
indicates STIBP capability: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * Enhanced
IBRS (IBRS_ALL)</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * CPU
indicates ARCH_CAPABILITIES MSR availability: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> *
ARCH_CAPABILITIES MSR advertises IBRS_ALL capability: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * CPU
explicitly indicates not being vulnerable to Meltdown
(RDCL_NO): <span style="color:#2c2c2c;background-color:#1565c0"> NO</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * CPU
microcode is known to cause stability problems: <span style="color:#2c2c2c;background-color:#558b2f"> NO</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)">* CPU
vulnerability to the three speculative execution
attacks variants</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> *
Vulnerable to Variant 1: <span style="color:#2c2c2c;background-color:#c62828"> YES</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> *
Vulnerable to Variant 2: <span style="color:#2c2c2c;background-color:#c62828"> YES</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> *
Vulnerable to Variant 3: <span style="color:#2c2c2c;background-color:#c62828"> YES</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0);min-height:18px"><br>
</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(100,181,246);background-color:rgb(0,0,0)">CVE-2017-5753
[bounds check bypass] aka 'Spectre Variant 1'</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)">* Mitigated
according to the /sys interface: <span style="color:#2c2c2c;background-color:#c62828"> NO </span>
(kernel confirms your system is vulnerable)</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(44,44,44);background-color:rgb(0,0,0)"><span style="color:#eaeaea">> </span><span style="background-color:#00838f">STATUS:</span><span style="color:#eaeaea"> </span><span style="background-color:#c62828">
VULNERABLE </span><span style="color:#eaeaea"> (Vulnerable)</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0);min-height:18px"><br>
</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(100,181,246);background-color:rgb(0,0,0)">CVE-2017-5715
[branch target injection] aka 'Spectre Variant 2'</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)">* Mitigated
according to the /sys interface: <span style="color:#2c2c2c;background-color:#c62828"> NO </span>
(kernel confirms your system is vulnerable)</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)">* Mitigation
1</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * Kernel
is compiled with IBRS/IBPB support: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> *
Currently enabled features</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * IBRS
enabled for Kernel space: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * IBRS
enabled for User space: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * IBPB
enabled: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)">* Mitigation
2</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * Kernel
compiled with retpoline option: <span style="color:#2c2c2c;background-color:#558b2f"> YES</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> * Kernel
compiled with a retpoline-aware compiler: <span style="color:#2c2c2c;background-color:#c62828"> NO </span> (kernel reports minimal
retpoline compilation)</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)"> *
Retpoline enabled: <span style="color:#2c2c2c;background-color:#558b2f"> YES</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)">> <span style="color:#2c2c2c;background-color:#00838f">STATUS:</span> <span style="color:#2c2c2c;background-color:#c62828"> VULNERABLE </span>
(Vulnerable: Minimal generic ASM retpoline)</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0);min-height:18px"><br>
</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(100,181,246);background-color:rgb(0,0,0)">CVE-2017-5754
[rogue data cache load] aka 'Meltdown' aka 'Variant 3'</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)">* Mitigated
according to the /sys interface: <span style="color:#2c2c2c;background-color:#558b2f"> YES </span>
(kernel confirms that the mitigation is active)</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)">* Kernel
supports Page Table Isolation (PTI): <span style="color:#2c2c2c;background-color:#558b2f"> YES</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)">* PTI
enabled and active: <span style="color:#2c2c2c;background-color:#558b2f"> YES</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)">* Running as
a Xen PV DomU: <span style="color:#2c2c2c;background-color:#558b2f"> NO</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(44,44,44);background-color:rgb(0,0,0)"><span style="color:#eaeaea">> </span><span style="background-color:#00838f">STATUS:</span><span style="color:#eaeaea"> </span><span style="background-color:#558b2f"> NOT
VULNERABLE </span><span style="color:#eaeaea"> (Mitigation: PTI)</span></div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0);min-height:18px"><br>
</div>
<div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:"IBM Plex Mono";color:rgb(234,234,234);background-color:rgb(0,0,0)">A false
sense of security is worse than no security at all,
see --disclaimer</div>
<div>
<div dir="auto" style="letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word;line-break:after-white-space">
<div dir="auto" style="letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word;line-break:after-white-space">
<div dir="auto" style="word-wrap:break-word;line-break:after-white-space">
<div style="font-family:Helvetica;font-size:12px;font-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px"><br>
--<br>
Sam McLeod<br>
<a href="https://smcleod.net/" target="_blank">https://smcleod.net</a><br>
<a href="https://twitter.com/s_mcleod" target="_blank">https://twitter.com/s_mcleod</a></div>
</div>
</div>
</div>
</div>
<div><br>
<blockquote type="cite">
<div>On 30 Jan 2018, at 5:20 am, Alan
Bartlett <<a href="mailto:ajb@elrepo.org" target="_blank">ajb@elrepo.org</a>>
wrote:</div>
<br class="m_1858835190506110400Apple-interchange-newline">
<div>
<div>Announcing the release of the
kernel-ml-4.15.0-1.el7.elrepo package<br>
set into the EL7 elrepo-kernel repository:<br>
<br>
<a href="https://elrepo.org/tiki/kernel-ml" target="_blank">https://elrepo.org/tiki/<wbr>kernel-ml</a><br>
<br>
The following files are currently synchronising
to our mirror sites:<br>
<br>
x86_64<br>
kernel-ml-4.15.0-1.el7.elrepo.<wbr>x86_64.rpm<br>
kernel-ml-devel-4.15.0-1.el7.<wbr>elrepo.x86_64.rpm<br>
kernel-ml-doc-4.15.0-1.el7.<wbr>elrepo.noarch.rpm<br>
kernel-ml-headers-4.15.0-1.<wbr>el7.elrepo.x86_64.rpm<br>
kernel-ml-tools-4.15.0-1.el7.<wbr>elrepo.x86_64.rpm<br>
kernel-ml-tools-libs-4.15.0-1.<wbr>el7.elrepo.x86_64.rpm<br>
kernel-ml-tools-libs-devel-4.<wbr>15.0-1.el7.elrepo.x86_64.rpm<br>
perf-4.15.0-1.el7.elrepo.x86_<wbr>64.rpm<br>
python-perf-4.15.0-1.el7.<wbr>elrepo.x86_64.rpm<br>
<br>
nosrc<br>
kernel-ml-4.15.0-1.el7.elrepo.<wbr>nosrc.rpm<br>
<br>
We provide these kernels for hardware testing in
an effort to identify<br>
new/updated drivers which can then be targeted
for backporting as kmod<br>
packages. Meanwhile, these kernels may provide
interim relief to<br>
people with non-functional hardware. We stress
that we consider such<br>
kernels as a last resort for those who are
unable to get their<br>
hardware working using the RHEL-7 kernel with
supplementary kmod<br>
packages.<br>
<br>
These packages are provided "As-Is" with no
implied warranty or<br>
support. Using the kernel-ml may expose your
system to security,<br>
performance and/or data corruption issues. Since
timely updates may<br>
not be available from the ELRepo Project, the
end user has the<br>
ultimate responsibility for deciding whether to
continue using the<br>
kernel-ml packages in regular service.<br>
<br>
The packages are intentionally named kernel-ml
so as not to conflict<br>
with the RHEL-7 kernels and, as such, they may
be installed and<br>
updated alongside the regular kernel. The kernel
configuration is<br>
based upon a default RHEL-7 configuration with
added functionality<br>
enabled as appropriate.<br>
<br>
If a bug is found when using these kernels, the
end user is encouraged<br>
to report it upstream to the Linux Kernel Bug
Tracker [1] and, for our<br>
reference, to the ELRepo bug tracker [2]. By
taking such action, the<br>
reporter will be assisting the kernel
developers, Red Hat and the Open<br>
Source Community as a whole.<br>
<br>
Thank you,<br>
<br>
The ELRepo Team.<br>
<br>
[1] <a href="https://bugzilla.kernel.org/" target="_blank">https://bugzilla.kernel.org/</a><br>
[2] <a href="https://elrepo.org/bugs/" target="_blank">https://elrepo.org/bugs/</a><br>
______________________________<wbr>_________________<br>
elrepo mailing list<br>
<a href="mailto:elrepo@lists.elrepo.org" target="_blank">elrepo@lists.elrepo.org</a><br>
<a href="http://lists.elrepo.org/mailman/listinfo/elrepo" target="_blank">http://lists.elrepo.org/<wbr>mailman/listinfo/elrepo</a><br>
</div>
</div>
</blockquote>
</div>
<br>
</div>
</div>
</div>
</blockquote>
<blockquote type="cite">
<div><span>______________________________<wbr>_________________</span><br>
<span>elrepo mailing list</span><br>
<span><a href="mailto:elrepo@lists.elrepo.org" target="_blank">elrepo@lists.elrepo.org</a></span><br>
<span><a href="http://lists.elrepo.org/mailman/listinfo/elrepo" target="_blank">http://lists.elrepo.org/<wbr>mailman/listinfo/elrepo</a></span><br>
</div>
</blockquote>
</div>
<br clear="all">
______________________________<wbr>______________________________<wbr>__________<br>
This email has been scanned by the Symantec Email Security.cloud
service.<br>
For more information please visit <a class="m_1858835190506110400moz-txt-link-freetext" href="http://www.symanteccloud.com/" target="_blank">http://www.symanteccloud.com</a><br>
______________________________<wbr>______________________________<wbr>__________<br>
<br>
<fieldset class="m_1858835190506110400mimeAttachmentHeader"></fieldset>
<br>
<pre>______________________________<wbr>_________________
elrepo mailing list
<a class="m_1858835190506110400moz-txt-link-abbreviated" href="mailto:elrepo@lists.elrepo.org" target="_blank">elrepo@lists.elrepo.org</a>
<a class="m_1858835190506110400moz-txt-link-freetext" href="http://lists.elrepo.org/mailman/listinfo/elrepo" target="_blank">http://lists.elrepo.org/<wbr>mailman/listinfo/elrepo</a>
</pre>
</blockquote><p><br>
</p>
</div>
</div></blockquote></div><br></div></div></div><br>______________________________<wbr>_________________<br>
elrepo mailing list<br>
<a href="mailto:elrepo@lists.elrepo.org">elrepo@lists.elrepo.org</a><br>
<a href="http://lists.elrepo.org/mailman/listinfo/elrepo" rel="noreferrer" target="_blank">http://lists.elrepo.org/<wbr>mailman/listinfo/elrepo</a><br>
<br></blockquote></div><br></div></div></div>