From 19ea9ecc64a84b20440a0767ea235fd79d6d394b Mon Sep 17 00:00:00 2001 From: Jonathan Gray Date: Thu, 21 Feb 2019 03:37:31 +0000 Subject: Cortex A76 is not affected by spectre variant 2 branch target injection attacks described in CVE-2017-5715 and ATF does not implement a workaround for Cortex A76. --- sys/arch/arm64/arm64/cpu.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) (limited to 'sys') diff --git a/sys/arch/arm64/arm64/cpu.c b/sys/arch/arm64/arm64/cpu.c index 42d440c2b6c..68e468f26a3 100644 --- a/sys/arch/arm64/arm64/cpu.c +++ b/sys/arch/arm64/arm64/cpu.c @@ -1,4 +1,4 @@ -/* $OpenBSD: cpu.c,v 1.25 2018/12/31 18:00:53 kettenis Exp $ */ +/* $OpenBSD: cpu.c,v 1.26 2019/02/21 03:37:30 jsg Exp $ */ /* * Copyright (c) 2016 Dale Rahn @@ -239,6 +239,7 @@ cpu_identify(struct cpu_info *ci) case CPU_PART_CORTEX_A35: case CPU_PART_CORTEX_A53: case CPU_PART_CORTEX_A55: + case CPU_PART_CORTEX_A76: /* Not vulnerable. */ ci->ci_flush_bp = cpu_flush_bp_noop; break; -- cgit v1.2.3