From mboxrd@z Thu Jan 1 00:00:00 1970 From: Tony Lindgren Subject: Re: Spectre and Cortex-A8/A9 Date: Thu, 10 May 2018 07:47:03 -0700 Message-ID: <20180510144703.GD98604@atomide.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Content-Disposition: inline In-Reply-To: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=m.gmane.org@lists.infradead.org To: Adam Ford Cc: linux-omap@vger.kernel.org, arm-soc List-Id: linux-omap@vger.kernel.org * Adam Ford [180509 18:23]: > There is a lot of information pushed around the web about the Spectre > bug. I went to ARM's support site and there are some patches > available from February that haven't made their way into the mainline. > > Sorry if this has been covered before, but I am curious to know if > there is a good place or method to determine whether or not the > Cortex-A8 and A9 are still vulnerable and which versions or 4.4, 4.9, > or 4.14 have any items fixed. Well while we're waiting to figure out what all needs to be fixed, here's what I'd do meanwhile: 1. Make sure the bootloader sets IBE bit 2. Make sure you have CONFIG_ARM_ERRATA_430973=y 3. Apply Marc Zyngier's patches from thread "[PATCH v4 0/6] 32bit ARM branch predictor hardening", but note that these are still being discussed 4. Update kernel when patches that have been validated against test cases get merged Regards, Tony From mboxrd@z Thu Jan 1 00:00:00 1970 From: tony@atomide.com (Tony Lindgren) Date: Thu, 10 May 2018 07:47:03 -0700 Subject: Spectre and Cortex-A8/A9 In-Reply-To: References: Message-ID: <20180510144703.GD98604@atomide.com> To: linux-arm-kernel@lists.infradead.org List-Id: linux-arm-kernel.lists.infradead.org * Adam Ford [180509 18:23]: > There is a lot of information pushed around the web about the Spectre > bug. I went to ARM's support site and there are some patches > available from February that haven't made their way into the mainline. > > Sorry if this has been covered before, but I am curious to know if > there is a good place or method to determine whether or not the > Cortex-A8 and A9 are still vulnerable and which versions or 4.4, 4.9, > or 4.14 have any items fixed. Well while we're waiting to figure out what all needs to be fixed, here's what I'd do meanwhile: 1. Make sure the bootloader sets IBE bit 2. Make sure you have CONFIG_ARM_ERRATA_430973=y 3. Apply Marc Zyngier's patches from thread "[PATCH v4 0/6] 32bit ARM branch predictor hardening", but note that these are still being discussed 4. Update kernel when patches that have been validated against test cases get merged Regards, Tony