Hi Jeremy, > Jeremy Linton <jeremy.lin...@arm.com> hat am 27. Februar 2019 um 02:05 > geschrieben: > > > Arm64 machines should be displaying a human readable > vulnerability status to speculative execution attacks in > /sys/devices/system/cpu/vulnerabilities > > This series enables that behavior by providing the expected > functions. Those functions expose the cpu errata and feature > states, as well as whether firmware is responding appropriately > to display the overall machine status. This means that in a > heterogeneous machine we will only claim the machine is mitigated > or safe if we are confident all booted cores are safe or > mitigated. >
here are the results for Raspberry Pi 3 B: l1tf:Not affected meltdown:Not affected spec_store_bypass:Not affected spectre_v1:Mitigation: __user pointer sanitization spectre_v2:Not affected Tested-by: Stefan Wahren <stefan.wah...@i2se.com>