On Tue, May 22, 2018 at 06:15:02PM +0100, Marc Zyngier wrote: > On 21/05/18 12:45, Russell King wrote: > > + switch (read_cpuid_part()) { > > + case ARM_CPU_PART_CORTEX_A8: > > + case ARM_CPU_PART_CORTEX_A9: > > + case ARM_CPU_PART_CORTEX_A12: > > + case ARM_CPU_PART_CORTEX_A17: > > + case ARM_CPU_PART_CORTEX_A73: > > + case ARM_CPU_PART_CORTEX_A75: > > + harden_branch_predictor = harden_branch_predictor_bpiall; > > + spectre_v2_method = "BPIALL"; > > + break; > > You don't seem to take into account the PFR0.CSV2 field which indicates > that the CPU has a branch predictor that is immune to Spectre-v2.
That information is not covered in the description of the vulnerability - the published information on the security-updates site states that BPIALL is required without stating any conditions. > See for example the Cortex-A75 r3p0 TRM[1]. So which cores should such a test be applied to? As I mention, the support site doesn't give this detail. That brings up the obvious question: what else does the web page miss out on? -- RMK's Patch system: http://www.armlinux.org.uk/developer/patches/ FTTC broadband for 0.8mile line in suburbia: sync at 8.8Mbps down 630kbps up According to speedtest.net: 8.21Mbps down 510kbps up _______________________________________________ kvmarm mailing list kvmarm@lists.cs.columbia.edu https://lists.cs.columbia.edu/mailman/listinfo/kvmarm