On 7 February 2018 at 14:17, Alexander Kanavin <[email protected]> wrote: > On 01/27/2018 06:35 PM, Richard Purdie wrote: >> >> On Tue, 2018-01-16 at 11:38 +0000, Richard Purdie wrote: >>> >>> I just wanted to give people an update on where the project stands >>> with these issues. >> >> >> Master now contains gcc and kernel fixes (in linux-yocto). meta-yocto- >> bsp updates are still pending. >> >> rocko-next also has those fixes and is undergoing testing which if it >> passes, will get pushed to rocko. > > > A quick way to check what degree of protection there is on a system is to > look at what is in /sys/devices/system/cpu/vulnerabilities: > > ak@linux-f9zs:/sys/devices/system/cpu/vulnerabilities> ls > meltdown spectre_v1 spectre_v2 > > ak@linux-f9zs:/sys/devices/system/cpu/vulnerabilities> cat spectre_v1 > spectre_v2 meltdown > Vulnerable > Mitigation: Full generic retpoline > Mitigation: PTI > > Of course, outdated, unprotected kernels do not have this directory at all. > > > Paul, perhaps this could go to release notes?
It might be of interest to some since it's shipped by some distro: https://github.com/speed47/spectre-meltdown-checker > > Alex > > -- > _______________________________________________ > Openembedded-core mailing list > [email protected] > http://lists.openembedded.org/mailman/listinfo/openembedded-core -- _______________________________________________ Openembedded-core mailing list [email protected] http://lists.openembedded.org/mailman/listinfo/openembedded-core
