Announcement

Collapse
No announcement yet.

ARM64 Mitigation Posted For Spectre 4 / SSBD

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • PeeJay
    replied
    Mmmm KFC....

    Leave a comment:


  • boxie
    replied
    For anyone looking for the meaning of that "Chicken Bit" reference - These are usually undocumented (publicly) toggles for disabling CPU features if they do not work - i.e. Chickening Out

    Leave a comment:


  • Kayote
    replied
    my trusty old motorola e2 still safe knock on wood.

    Leave a comment:


  • davidlt
    replied
    Originally posted by andreano View Post
    Am I right in speculating that ARM A53 and A55 are still unaffected?
    Correct. ARM updated their vulnerability table ( https://developer.arm.com/support/ar...-vulnerability ). All ARMv8 big cores (A57, A72, A73, A75) are affected, but all other are fine for this one.

    TL;DR low-end and some mid-end smartphones are still safe.

    Leave a comment:


  • andreano
    replied
    Am I right in speculating that ARM A53 and A55 are still unaffected?

    Leave a comment:


  • phoronix
    started a topic ARM64 Mitigation Posted For Spectre 4 / SSBD

    ARM64 Mitigation Posted For Spectre 4 / SSBD

    Phoronix: ARM64 Mitigation Posted For Spectre 4 / SSBD

    Following the Intel/AMD Spectre Variant 4 mitigation landing yesterday with "Speculative Store Bypass Disable" (SSBD) and then the POWER CPU mitigation landing today, ARM developers have posted their set of patches for 64-bit ARM CPUs to mitigate against this latest Spectre vulnerability around speculative execution...

    http://www.phoronix.com/scan.php?pag...pectre-V4-SSBD
Working...
X