Hi Jeremy, > Jeremy Linton <[email protected]> hat am 10. Januar 2019 um 00:55 > geschrieben: > > > Arm64 machines should be displaying a human readable > vulnerability status to speculative execution attacks in > /sys/devices/system/cpu/vulnerabilities > > This series enables that behavior by providing the expected > functions. Those functions expose the cpu errata and feature > states, as well as whether firmware is responding appropriately > to display the overall machine status. This means that in a > heterogeneous machine we will only claim the machine is mitigated > or safe if we are confident all booted cores are safe or > mitigated. >
i applied this v3 series and Marc's v2 series. Now i'm getting the following on a Raspberry Pi 3 B+ : meltdown:Not affected spec_store_bypass:Not affected spectre_v1:Mitigation: __user pointer sanitization So the entries l1tf and spectre_v2 disappeared. Stefan

