[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAD=FV=WhzZ_v1+WPpG9839JwN=fKyiY_T1M37RAU_e9cHy4XGw@mail.gmail.com>
Date: Thu, 19 Dec 2024 11:12:49 -0800
From: Doug Anderson <dianders@...omium.org>
To: Will Deacon <will@...nel.org>
Cc: Catalin Marinas <catalin.marinas@....com>, Mark Rutland <mark.rutland@....com>,
linux-arm-msm@...r.kernel.org, Jeffrey Hugo <quic_jhugo@...cinc.com>,
Julius Werner <jwerner@...omium.org>, linux-arm-kernel@...ts.infradead.org,
Roxana Bradescu <roxabee@...gle.com>, Trilok Soni <quic_tsoni@...cinc.com>,
bjorn.andersson@....qualcomm.com, stable@...r.kernel.org,
James Morse <james.morse@....com>, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v2 1/6] arm64: errata: Assume that unknown CPUs _are_
vulnerable to Spectre BHB
Hi,
On Thu, Dec 19, 2024 at 9:51 AM Will Deacon <will@...nel.org> wrote:
>
> > As of right now, the only CPU IDs added to the "unaffected" list are
> > ARM Cortex A35, A53, and A55. This list was created by looking at
> > older cores listed in cputype.h that weren't listed in the "affected"
> > list previously.
>
> There's a list of affected CPUs from Arm here:
>
> https://developer.arm.com/Arm%20Security%20Center/Spectre-BHB
>
> (obviously only covers their own designs).
>
> So it looks like A510 and A520 should be unaffected too, although I
> didn't check exhaustively.
I was hoping that newer cores would hit the supports_csv2p3() check
and be considered safe, but I guess the white paper explicitly says
that A510 doesn't implement it and is still considered safe. I looked
up the TRM of A520 and it looks like it also doesn't set CSV2P3, so I
guess I'll add that one too.
> It also looks like A715 is affected but the
> whitepaper doesn't tell you what version of 'k' to use...
It doesn't? I see a "k" of 38 there. Wow, and Neoverse N2 needs 132!!!
...though I guess on newer steppings of those chips they'll just use
"clear BHB", which seems available and is the preferred mitigation?
Powered by blists - more mailing lists