Received: by 10.223.185.116 with SMTP id b49csp694976wrg; Fri, 16 Feb 2018 05:49:52 -0800 (PST) X-Google-Smtp-Source: AH8x226dDzyhhLFzMeWUtRrF1XjNBTscn4VeLJ9sssyMMX1h96OAhORHChGSqnKdTj/TCdhp5m5C X-Received: by 2002:a17:902:8a4:: with SMTP id 33-v6mr5869915pll.279.1518788992827; Fri, 16 Feb 2018 05:49:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518788992; cv=none; d=google.com; s=arc-20160816; b=X1wisNluu6RDMjJGanWnSmkAkQDFDRwxtqhejYLhtXiaLSC9S+OEMAfZ5nkzNfqefR kD0XbL5i79uzs+yevzASqjQr+zfblaWmvOM6L9HIdhfpFwypuXG7uO2Q97+nRzgnvLI2 d97jhu1gcX1nfC9l4Gid15nQnHbK8VXxNnc5NT6fyt6Gtrwh4TRZnauyQg7Ws8eflhTQ T42q00x0ZFcuXgtxTOtD3ubdDMu4q2+UM7qL1QDht0XRzs1veT+6Im6gfar3v57Zl2uN 7qrbJbNsBpvd+T/UKpc8HklRyLLnZFG52UXKElOaXl/5sgm4KbkQJDpM4Pj/LwC74gdW EM9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=+D+nFBs5mqCloKGpRyvshbKfVdtMukO/MUEjoUWy6C0=; b=eBPRNs9u3TQ5q0t+Yd6juEZHGT1Nq4X58K3s5bzel94QniTxxaVcPm3gIG3JmZMRqc h4MnMObLveB65k0pA7Yw61cGxK4srChKBVTsZ7+KamSK6KT+WvqhK8rQVSFABFpjpHs/ FweHR+t0pcZ162F30sNBwdmtk0PjoePkO7KohogyWvo3s5GKsuZuQuPuoSXE+ezzAQOP 8EkMCF2qNq6oGsymFiyITq33dsOhcPr3TKI7o3MUrwsZkrg/heoHn+udTEzgvwiJsRN+ uTDcbkt0RmYly5dYNZY/SL4WgOhMDr+FB3lHNyQ+DmDO94/pmRn9cV4EEjUkh3QWnPxK 0V0g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h90si1374056pfa.257.2018.02.16.05.49.38; Fri, 16 Feb 2018 05:49:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1166793AbeBOSpB (ORCPT + 99 others); Thu, 15 Feb 2018 13:45:01 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:50416 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1162500AbeBOPW6 (ORCPT ); Thu, 15 Feb 2018 10:22:58 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 0084FE34; Thu, 15 Feb 2018 15:22:41 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Michael Ellerman Subject: [PATCH 4.4 015/108] powerpc/64s: Wire up cpu_show_meltdown() Date: Thu, 15 Feb 2018 16:16:12 +0100 Message-Id: <20180215151224.669637675@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180215151222.267507937@linuxfoundation.org> References: <20180215151222.267507937@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Michael Ellerman commit fd6e440f20b1a4304553775fc55938848ff617c9 upstream. The recent commit 87590ce6e373 ("sysfs/cpu: Add vulnerability folder") added a generic folder and set of files for reporting information on CPU vulnerabilities. One of those was for meltdown: /sys/devices/system/cpu/vulnerabilities/meltdown This commit wires up that file for 64-bit Book3S powerpc. For now we default to "Vulnerable" unless the RFI flush is enabled. That may not actually be true on all hardware, further patches will refine the reporting based on the CPU/platform etc. But for now we default to being pessimists. Signed-off-by: Michael Ellerman Signed-off-by: Greg Kroah-Hartman --- arch/powerpc/Kconfig | 1 + arch/powerpc/kernel/setup_64.c | 8 ++++++++ 2 files changed, 9 insertions(+) --- a/arch/powerpc/Kconfig +++ b/arch/powerpc/Kconfig @@ -136,6 +136,7 @@ config PPC select GENERIC_SMP_IDLE_THREAD select GENERIC_CMOS_UPDATE select GENERIC_TIME_VSYSCALL_OLD + select GENERIC_CPU_VULNERABILITIES if PPC_BOOK3S_64 select GENERIC_CLOCKEVENTS select GENERIC_CLOCKEVENTS_BROADCAST if SMP select ARCH_HAS_TICK_BROADCAST if GENERIC_CLOCKEVENTS_BROADCAST --- a/arch/powerpc/kernel/setup_64.c +++ b/arch/powerpc/kernel/setup_64.c @@ -934,5 +934,13 @@ void __init setup_rfi_flush(enum l1d_flu if (!no_rfi_flush) rfi_flush_enable(enable); } + +ssize_t cpu_show_meltdown(struct device *dev, struct device_attribute *attr, char *buf) +{ + if (rfi_flush) + return sprintf(buf, "Mitigation: RFI Flush\n"); + + return sprintf(buf, "Vulnerable\n"); +} #endif /* CONFIG_PPC_BOOK3S_64 */ #endif