Skip to content

Commit 568879c

Browse files
committed
Add vuln/mitigation section to the BCM2712.
1 parent 316fbd3 commit 568879c

File tree

1 file changed

+17
-0
lines changed

1 file changed

+17
-0
lines changed

documentation/asciidoc/computers/processors/bcm2712.adoc

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,3 +24,20 @@ Headline features include:
2424
** H264 1080p30 encode (from ISP) ~30–40% CPU
2525
2626
In aggregate, the new features present in BCM2712 deliver a performance uplift of 2-3× over Raspberry Pi 4 for common CPU or I/O-intensive use cases.
27+
28+
=== Vulnerabilities and mitigations
29+
30+
The Cortex-A76 CPU used in the BCM2712 SoC has known vulnerabilites that are all mitigated in Raspberry Pi OS.
31+
32+
To determine the full list of vulnerabilities and the mitigations, you can use the following command line which will list all those in place.
33+
34+
```bash
35+
$ lscpu | grep Vulnerability | grep -v "Not affected"
36+
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl
37+
Vulnerability Spectre v1: Mitigation; __user pointer sanitization
38+
Vulnerability Spectre v2: Mitigation; CSV2, BHB
39+
```
40+
41+
WARNING: The list above was correct as of April 2025 but may have been superceded. You should use `lscpu` on your Raspberry Pi to get up to date information. This is especially important when using a third-party operating system, as these may not include all the latest mitigations in their Linux kernel builds. The Arm processors used by Raspberry Pi Ltd do not use microcode, so all mitigations are at the kernel level.
42+
43+
The vulnerability information reported by `lscpu` is based on the currently executing kernel's detection scheme. It may not accurately reflect the true vulnerability status of the hardware, especially if the OS lacks recent kernel updates. Further vulnerability information on the CPU vendor advisories can be obtained from https://developer.arm.com/Arm%20Security%20Center/Speculative%20Processor%20Vulnerability referencing the Vendor ID and Model name reported by `lscpu`.

0 commit comments

Comments
 (0)