> On 12 Jan 2018, at 14:37, Warner Losh <i...@bsdimp.com> wrote:
> 
> 
> 
> On Fri, Jan 12, 2018 at 7:15 AM, Andrew Turner <and...@freebsd.org 
> <mailto:and...@freebsd.org>> wrote:
> 
> 
>> On 12 Jan 2018, at 14:10, Marcin Wojtas <m...@semihalf.com 
>> <mailto:m...@semihalf.com>> wrote:
>> 
>> Hi Andrew,
>> 
>> 
>> 
>> 2018-01-12 15:01 GMT+01:00 Andrew Turner <and...@freebsd.org 
>> <mailto:and...@freebsd.org>>:
>>> Author: andrew
>>> Date: Fri Jan 12 14:01:38 2018
>>> New Revision: 327876
>>> URL: https://svnweb.freebsd.org/changeset/base/327876 
>>> <https://svnweb.freebsd.org/changeset/base/327876>
>>> 
>>> Log:
>>>  Workaround Spectre Variant 2 on arm64.
>>> 
>>>  We need to handle two cases:
>>> 
>>>  1. One process attacking another process.
>>>  2. A process attacking the kernel.
>>> 
>>>  For the first case we clear the branch predictor state on context switch
>>>  between different processes. For the second we do this when taking an
>>>  instruction abort on a non-userspace address.
>>> 
>>>  To clear the branch predictor state a per-CPU function pointer has been
>>>  added. This is set by the new cpu errata code based on if the CPU is
>>>  known to be affected.
>>> 
>>>  On Cortex-A57, A72, A73, and A75 we call into the PSCI firmware as newer
>>>  versions of this will clear the branch predictor state for us.
>>> 
>>>  It has been reported the ThunderX is unaffected, however the ThunderX2 is
>>>  vulnerable. The Qualcomm Falkor core is also affected. As FreeBSD doesn't
>>>  yet run on the ThunderX2 or Falkor no workaround is included for these 
>>> CPUs.
>> 
>> Regardless ThunderX2 / Falkor work-arounds, do I understand correctly
>> that pure CA72 machines, such as Marvell Armada 7k/8k are immune to
>> Variant 2 now?
> 
> It is my understanding that the A72 will be immune with this patch and an 
> updated Arm Trusted Firmware as documented in [1].
> 
> Andrew
> 
> [1] 
> https://github.com/ARM-software/arm-trusted-firmware/wiki/ARM-Trusted-Firmware-Security-Advisory-TFV-6
>  
> <https://github.com/ARM-software/arm-trusted-firmware/wiki/ARM-Trusted-Firmware-Security-Advisory-TFV-6>
> 
> Are you also working on aarch32 mitigation?

No. I think a similar technique could be used, however as aarch32 has 
instructions to invalidate the branch predictor these can be used directly.

Andrew
_______________________________________________
svn-src-head@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/svn-src-head
To unsubscribe, send any mail to "svn-src-head-unsubscr...@freebsd.org"

Reply via email to