[OE-core] Yocto Project, Spectre and Meltdown

Fathi Boudra fathi.boudra at linaro.org
Wed Feb 7 18:04:30 UTC 2018


On 7 February 2018 at 14:17, Alexander Kanavin
<alexander.kanavin at linux.intel.com> wrote:
> On 01/27/2018 06:35 PM, Richard Purdie wrote:
>>
>> On Tue, 2018-01-16 at 11:38 +0000, Richard Purdie wrote:
>>>
>>> I just wanted to give people an update on where the project stands
>>> with these issues.
>>
>>
>> Master now contains gcc and kernel fixes (in linux-yocto). meta-yocto-
>> bsp updates are still pending.
>>
>> rocko-next also has those fixes and is undergoing testing which if it
>> passes, will get pushed to rocko.
>
>
> A quick way to check what degree of protection there is on a system is to
> look at what is in /sys/devices/system/cpu/vulnerabilities:
>
> ak at linux-f9zs:/sys/devices/system/cpu/vulnerabilities> ls
> meltdown  spectre_v1  spectre_v2
>
> ak at linux-f9zs:/sys/devices/system/cpu/vulnerabilities> cat spectre_v1
> spectre_v2 meltdown
> Vulnerable
> Mitigation: Full generic retpoline
> Mitigation: PTI
>
> Of course, outdated, unprotected kernels do not have this directory at all.
>
>
> Paul, perhaps this could go to release notes?

It might be of interest to some since it's shipped by some distro:
https://github.com/speed47/spectre-meltdown-checker

>
> Alex
>
> --
> _______________________________________________
> Openembedded-core mailing list
> Openembedded-core at lists.openembedded.org
> http://lists.openembedded.org/mailman/listinfo/openembedded-core



More information about the Openembedded-core mailing list