On 01/27/2018 06:35 PM, Richard Purdie wrote:
On Tue, 2018-01-16 at 11:38 +0000, Richard Purdie wrote:
I just wanted to give people an update on where the project stands
with these issues.
Master now contains gcc and kernel fixes (in linux-yocto). meta-yocto-
bsp updates are still pending.
rocko-next also has those fixes and is undergoing testing which if it
passes, will get pushed to rocko.
A quick way to check what degree of protection there is on a system is
to look at what is in /sys/devices/system/cpu/vulnerabilities:
ak@linux-f9zs:/sys/devices/system/cpu/vulnerabilities> ls
meltdown spectre_v1 spectre_v2
ak@linux-f9zs:/sys/devices/system/cpu/vulnerabilities> cat spectre_v1
spectre_v2 meltdown
Vulnerable
Mitigation: Full generic retpoline
Mitigation: PTI
Of course, outdated, unprotected kernels do not have this directory at all.
Paul, perhaps this could go to release notes?
Alex
--
_______________________________________________
Openembedded-core mailing list
[email protected]
http://lists.openembedded.org/mailman/listinfo/openembedded-core