<div dir="auto"><div><div class="gmail_extra"><div class="gmail_quote">On 31 Jan. 2018 10:35 am, &quot;Sam McLeod&quot; &lt;<a href="mailto:mailinglists@smcleod.net">mailinglists@smcleod.net</a>&gt; wrote:<br type="attribution"><blockquote class="quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word;line-break:after-white-space">Hi Trevor,<div><br></div><div>I didn&#39;t think that to compile a kernel with IBRS/IBPB your <i>compiler</i> had to be updated as well?</div><div>I thought that was a seperate issue but perhaps I&#39;m mistaken.<div class="quoted-text"><br><div>
<div dir="auto" style="color:rgb(0,0,0);letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word;line-break:after-white-space"><div dir="auto" style="color:rgb(0,0,0);letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word;line-break:after-white-space"><div dir="auto" style="word-wrap:break-word;line-break:after-white-space"><div style="color:rgb(0,0,0);font-family:Helvetica;font-size:12px;font-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px"></div></div></div></div></div></div></div></div></blockquote></div></div></div><div dir="auto"><br></div><div dir="auto">Yes, it does require a newer compiler...you can see the details of why here:</div><div dir="auto"><br></div><div dir="auto"><a href="https://support.google.com/faqs/answer/7625886">https://support.google.com/faqs/answer/7625886</a><br></div><div dir="auto"><br></div><div dir="auto">Cheers</div><div dir="auto">L.</div><div dir="auto"><br></div><div dir="auto"><br></div><div dir="auto"><br></div><div dir="auto"><br></div><div dir="auto"><br></div><div dir="auto"><div class="gmail_extra"><div class="gmail_quote"><blockquote class="quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word;line-break:after-white-space"><div><div class="quoted-text"><div><div dir="auto" style="color:rgb(0,0,0);letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word;line-break:after-white-space"><div dir="auto" style="color:rgb(0,0,0);letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word;line-break:after-white-space"><div dir="auto" style="word-wrap:break-word;line-break:after-white-space"><div style="color:rgb(0,0,0);font-family:Helvetica;font-size:12px;font-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px"><br>--<br>Sam McLeod<br><a href="https://smcleod.net" target="_blank">https://smcleod.net</a><br><a href="https://twitter.com/s_mcleod" target="_blank">https://twitter.com/s_mcleod</a></div></div></div></div>
</div>
</div><div class="elided-text"><div><br><blockquote type="cite"><div>On 31 Jan 2018, at 12:22 am, Trevor Hemsley &lt;<a href="mailto:themsley@voiceflex.com" target="_blank">themsley@voiceflex.com</a>&gt; wrote:</div><br class="m_1858835190506110400Apple-interchange-newline"><div>
  
    
  
  <div text="#000000" bgcolor="#FFFFFF">
    <div class="m_1858835190506110400moz-cite-prefix">Sam<br>
      <br>
      I&#39;m not ELRepo but I don&#39;t think they can do that until/unless RH
      fix the compilers in the distro to be retpoline aware. If they do.<br>
      <br>
      And, in any case, Intel have pretty much said &quot;don&#39;t use the new
      microcode&quot; so there is no working microcode available that the
      kernel can use anyway. All the vendors have pulled their BIOS
      updates and backed out e.g. the microcode_ctl updates.<br>
      <br>
      Trevor<br>
      <br>
      On 30/01/18 08:42, Sam McLeod wrote:<br>
    </div>
    <blockquote type="cite">
      
      Are there any plans to enable IBRS/IBPB in the kernel-ml kernels?
      <div><br>
      </div>
      <div>While I understand the desire to keep the builds as ‘stock’
        as possible, given the potential impact of the this I’d consider
        it a worth enabling unless I’m misunderstanding the situation?</div>
      <div><br>
        <div>
          <div>
            <div>
              <div>
                <div dir="auto" style="word-wrap:break-word;line-break:after-white-space">
                  <div dir="auto" style="word-wrap:break-word;line-break:after-white-space">
                    <div dir="auto" style="word-wrap:break-word;line-break:after-white-space">
                      <div><font><span style="background-color:rgba(255,255,255,0)">--<br>
                            Sam McLeod<br>
                            <a href="https://smcleod.net/" target="_blank">https://smcleod.net</a><br>
                            <a href="https://twitter.com/s_mcleod" target="_blank">https://twitter.com/s_mcleod</a></span></font></div>
                      <div><font><span style="background-color:rgba(255,255,255,0)"><br>
                          </span></font></div>
                    </div>
                  </div>
                </div>
              </div>
            </div>
          </div>
        </div>
        <div><br>
          On 30 Jan 2018, at 10:09 am, Sam McLeod &lt;<a href="mailto:mailinglists@smcleod.net" target="_blank">mailinglists@smcleod.net</a>&gt;
          wrote:<br>
          <br>
        </div>
        <blockquote type="cite">
          <div>For those wondering about the status of Spectre and
            Meltdown on kernel-ml 4.15, below is the output of the
            speed47 test (<a href="https://github.com/speed47/spectre-meltdown-checker" target="_blank">https://github.com/speed47/<wbr>spectre-meltdown-checker</a>).
            <div><br>
            </div>
            <div>I&#39;ve found this to be consistent between
              CentOS 7 VMs (PVHVM) on XenServer 7.2 w/ E5-2660 CPUs and
              physical servers using older X5650 CPUs.</div>
            <div><br>
            </div>
            <div>So it looks like at present we&#39;re still
              vulnerable to Spectre Variant 1 and 2 with Kernel 4.15,
              obviously resolving this in full will require a working
              microcode update from Intel.<br>
              <div><br>
              </div>
              <div><br>
              </div>
              <div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">#
                  ./spectre-meltdown-checker.sh</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(100,181,246);background-color:rgb(0,0,0)">Spectre and
                  Meltdown mitigation detection tool v0.33+</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0);min-height:18px"><br>
                </div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">Checking for
                  vulnerabilities on current system</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(106,30,154);background-color:rgb(0,0,0)"><span style="color:#eaeaea">Kernel is </span>Linux
                  4.15.0-1.el7.elrepo.x86_64 #1 SMP Sun Jan 28 20:45:20
                  EST 2018 x86_64</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(106,30,154);background-color:rgb(0,0,0)"><span style="color:#eaeaea">CPU is </span>Intel(R)
                  Xeon(R) CPU E5-2660 0 @ 2.20GHz</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0);min-height:18px"><br>
                </div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(100,181,246);background-color:rgb(0,0,0)">Hardware
                  check</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">* Hardware
                  support (CPU microcode) for mitigation techniques</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">  * Indirect
                  Branch Restricted Speculation (IBRS)</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">    *
                  SPEC_CTRL MSR is available: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">    * CPU
                  indicates IBRS capability: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">  * Indirect
                  Branch Prediction Barrier (IBPB)</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">    *
                  PRED_CMD MSR is available: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">    * CPU
                  indicates IBPB capability: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">  * Single
                  Thread Indirect Branch Predictors (STIBP)</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">    *
                  SPEC_CTRL MSR is available: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">    * CPU
                  indicates STIBP capability: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">  * Enhanced
                  IBRS (IBRS_ALL)</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">    * CPU
                  indicates ARCH_CAPABILITIES MSR availability: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">    *
                  ARCH_CAPABILITIES MSR advertises IBRS_ALL capability: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">  * CPU
                  explicitly indicates not being vulnerable to Meltdown
                  (RDCL_NO): <span style="color:#2c2c2c;background-color:#1565c0"> NO</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">  * CPU
                  microcode is known to cause stability problems: <span style="color:#2c2c2c;background-color:#558b2f"> NO</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">* CPU
                  vulnerability to the three speculative execution
                  attacks variants</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">  *
                  Vulnerable to Variant 1: <span style="color:#2c2c2c;background-color:#c62828"> YES</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">  *
                  Vulnerable to Variant 2: <span style="color:#2c2c2c;background-color:#c62828"> YES</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">  *
                  Vulnerable to Variant 3: <span style="color:#2c2c2c;background-color:#c62828"> YES</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0);min-height:18px"><br>
                </div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(100,181,246);background-color:rgb(0,0,0)">CVE-2017-5753
                  [bounds check bypass] aka &#39;Spectre Variant 1&#39;</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">* Mitigated
                  according to the /sys interface: <span style="color:#2c2c2c;background-color:#c62828"> NO </span>
                  (kernel confirms your system is vulnerable)</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(44,44,44);background-color:rgb(0,0,0)"><span style="color:#eaeaea">&gt; </span><span style="background-color:#00838f">STATUS:</span><span style="color:#eaeaea"> </span><span style="background-color:#c62828">
                    VULNERABLE </span><span style="color:#eaeaea"> (Vulnerable)</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0);min-height:18px"><br>
                </div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(100,181,246);background-color:rgb(0,0,0)">CVE-2017-5715
                  [branch target injection] aka &#39;Spectre Variant 2&#39;</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">* Mitigated
                  according to the /sys interface: <span style="color:#2c2c2c;background-color:#c62828"> NO </span>
                  (kernel confirms your system is vulnerable)</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">* Mitigation
                  1</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">  * Kernel
                  is compiled with IBRS/IBPB support: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">  *
                  Currently enabled features</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">    * IBRS
                  enabled for Kernel space: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">    * IBRS
                  enabled for User space: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">    * IBPB
                  enabled: <span style="color:#2c2c2c;background-color:#c62828"> NO</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">* Mitigation
                  2</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">  * Kernel
                  compiled with retpoline option: <span style="color:#2c2c2c;background-color:#558b2f"> YES</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">  * Kernel
                  compiled with a retpoline-aware compiler: <span style="color:#2c2c2c;background-color:#c62828"> NO </span> (kernel reports minimal
                  retpoline compilation)</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">  *
                  Retpoline enabled: <span style="color:#2c2c2c;background-color:#558b2f"> YES</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">&gt; <span style="color:#2c2c2c;background-color:#00838f">STATUS:</span> <span style="color:#2c2c2c;background-color:#c62828"> VULNERABLE </span>
                  (Vulnerable: Minimal generic ASM retpoline)</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0);min-height:18px"><br>
                </div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(100,181,246);background-color:rgb(0,0,0)">CVE-2017-5754
                  [rogue data cache load] aka &#39;Meltdown&#39; aka &#39;Variant 3&#39;</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">* Mitigated
                  according to the /sys interface: <span style="color:#2c2c2c;background-color:#558b2f"> YES </span>
                  (kernel confirms that the mitigation is active)</div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">* Kernel
                  supports Page Table Isolation (PTI): <span style="color:#2c2c2c;background-color:#558b2f"> YES</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">* PTI
                  enabled and active: <span style="color:#2c2c2c;background-color:#558b2f"> YES</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">* Running as
                  a Xen PV DomU: <span style="color:#2c2c2c;background-color:#558b2f"> NO</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(44,44,44);background-color:rgb(0,0,0)"><span style="color:#eaeaea">&gt; </span><span style="background-color:#00838f">STATUS:</span><span style="color:#eaeaea"> </span><span style="background-color:#558b2f"> NOT
                    VULNERABLE </span><span style="color:#eaeaea"> (Mitigation: PTI)</span></div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0);min-height:18px"><br>
                </div>
                <div style="margin:0px;font-stretch:normal;font-size:14px;line-height:normal;font-family:&quot;IBM Plex Mono&quot;;color:rgb(234,234,234);background-color:rgb(0,0,0)">A false
                  sense of security is worse than no security at all,
                  see --disclaimer</div>
                <div>
                  <div dir="auto" style="letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word;line-break:after-white-space">
                    <div dir="auto" style="letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word;line-break:after-white-space">
                      <div dir="auto" style="word-wrap:break-word;line-break:after-white-space">
                        <div style="font-family:Helvetica;font-size:12px;font-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px"><br>
                          --<br>
                          Sam McLeod<br>
                          <a href="https://smcleod.net/" target="_blank">https://smcleod.net</a><br>
                          <a href="https://twitter.com/s_mcleod" target="_blank">https://twitter.com/s_mcleod</a></div>
                      </div>
                    </div>
                  </div>
                </div>
                <div><br>
                  <blockquote type="cite">
                    <div>On 30 Jan 2018, at 5:20 am, Alan
                      Bartlett &lt;<a href="mailto:ajb@elrepo.org" target="_blank">ajb@elrepo.org</a>&gt;
                      wrote:</div>
                    <br class="m_1858835190506110400Apple-interchange-newline">
                    <div>
                      <div>Announcing the release of the
                        kernel-ml-4.15.0-1.el7.elrepo package<br>
                        set into the EL7 elrepo-kernel repository:<br>
                        <br>
                        <a href="https://elrepo.org/tiki/kernel-ml" target="_blank">https://elrepo.org/tiki/<wbr>kernel-ml</a><br>
                        <br>
                        The following files are currently synchronising
                        to our mirror sites:<br>
                        <br>
                        x86_64<br>
                        kernel-ml-4.15.0-1.el7.elrepo.<wbr>x86_64.rpm<br>
                        kernel-ml-devel-4.15.0-1.el7.<wbr>elrepo.x86_64.rpm<br>
                        kernel-ml-doc-4.15.0-1.el7.<wbr>elrepo.noarch.rpm<br>
                        kernel-ml-headers-4.15.0-1.<wbr>el7.elrepo.x86_64.rpm<br>
                        kernel-ml-tools-4.15.0-1.el7.<wbr>elrepo.x86_64.rpm<br>
kernel-ml-tools-libs-4.15.0-1.<wbr>el7.elrepo.x86_64.rpm<br>
kernel-ml-tools-libs-devel-4.<wbr>15.0-1.el7.elrepo.x86_64.rpm<br>
                        perf-4.15.0-1.el7.elrepo.x86_<wbr>64.rpm<br>
                        python-perf-4.15.0-1.el7.<wbr>elrepo.x86_64.rpm<br>
                        <br>
                        nosrc<br>
                        kernel-ml-4.15.0-1.el7.elrepo.<wbr>nosrc.rpm<br>
                        <br>
                        We provide these kernels for hardware testing in
                        an effort to identify<br>
                        new/updated drivers which can then be targeted
                        for backporting as kmod<br>
                        packages. Meanwhile, these kernels may provide
                        interim relief to<br>
                        people with non-functional hardware. We stress
                        that we consider such<br>
                        kernels as a last resort for those who are
                        unable to get their<br>
                        hardware working using the RHEL-7 kernel with
                        supplementary kmod<br>
                        packages.<br>
                        <br>
                        These packages are provided &quot;As-Is&quot; with no
                        implied warranty or<br>
                        support. Using the kernel-ml may expose your
                        system to security,<br>
                        performance and/or data corruption issues. Since
                        timely updates may<br>
                        not be available from the ELRepo Project, the
                        end user has the<br>
                        ultimate responsibility for deciding whether to
                        continue using the<br>
                        kernel-ml packages in regular service.<br>
                        <br>
                        The packages are intentionally named kernel-ml
                        so as not to conflict<br>
                        with the RHEL-7 kernels and, as such, they may
                        be installed and<br>
                        updated alongside the regular kernel. The kernel
                        configuration is<br>
                        based upon a default RHEL-7 configuration with
                        added functionality<br>
                        enabled as appropriate.<br>
                        <br>
                        If a bug is found when using these kernels, the
                        end user is encouraged<br>
                        to report it upstream to the Linux Kernel Bug
                        Tracker [1] and, for our<br>
                        reference, to the ELRepo bug tracker [2]. By
                        taking such action, the<br>
                        reporter will be assisting the kernel
                        developers, Red Hat and the Open<br>
                        Source Community as a whole.<br>
                        <br>
                        Thank you,<br>
                        <br>
                        The ELRepo Team.<br>
                        <br>
                        [1] <a href="https://bugzilla.kernel.org/" target="_blank">https://bugzilla.kernel.org/</a><br>
                        [2] <a href="https://elrepo.org/bugs/" target="_blank">https://elrepo.org/bugs/</a><br>
                        ______________________________<wbr>_________________<br>
                        elrepo mailing list<br>
                        <a href="mailto:elrepo@lists.elrepo.org" target="_blank">elrepo@lists.elrepo.org</a><br>
                        <a href="http://lists.elrepo.org/mailman/listinfo/elrepo" target="_blank">http://lists.elrepo.org/<wbr>mailman/listinfo/elrepo</a><br>
                      </div>
                    </div>
                  </blockquote>
                </div>
                <br>
              </div>
            </div>
          </div>
        </blockquote>
        <blockquote type="cite">
          <div><span>______________________________<wbr>_________________</span><br>
            <span>elrepo mailing list</span><br>
            <span><a href="mailto:elrepo@lists.elrepo.org" target="_blank">elrepo@lists.elrepo.org</a></span><br>
            <span><a href="http://lists.elrepo.org/mailman/listinfo/elrepo" target="_blank">http://lists.elrepo.org/<wbr>mailman/listinfo/elrepo</a></span><br>
          </div>
        </blockquote>
      </div>
      <br clear="all">
______________________________<wbr>______________________________<wbr>__________<br>
      This email has been scanned by the Symantec Email Security.cloud
      service.<br>
      For more information please visit <a class="m_1858835190506110400moz-txt-link-freetext" href="http://www.symanteccloud.com/" target="_blank">http://www.symanteccloud.com</a><br>
______________________________<wbr>______________________________<wbr>__________<br>
      <br>
      <fieldset class="m_1858835190506110400mimeAttachmentHeader"></fieldset>
      <br>
      <pre>______________________________<wbr>_________________
elrepo mailing list
<a class="m_1858835190506110400moz-txt-link-abbreviated" href="mailto:elrepo@lists.elrepo.org" target="_blank">elrepo@lists.elrepo.org</a>
<a class="m_1858835190506110400moz-txt-link-freetext" href="http://lists.elrepo.org/mailman/listinfo/elrepo" target="_blank">http://lists.elrepo.org/<wbr>mailman/listinfo/elrepo</a>
</pre>
    </blockquote><p><br>
    </p>
  </div>

</div></blockquote></div><br></div></div></div><br>______________________________<wbr>_________________<br>
elrepo mailing list<br>
<a href="mailto:elrepo@lists.elrepo.org">elrepo@lists.elrepo.org</a><br>
<a href="http://lists.elrepo.org/mailman/listinfo/elrepo" rel="noreferrer" target="_blank">http://lists.elrepo.org/<wbr>mailman/listinfo/elrepo</a><br>
<br></blockquote></div><br></div></div></div>