Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2362124imm; Mon, 28 May 2018 06:45:04 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpB11cKp8kZ+vDsyGbvTuT3pcW1CRqekSz8AxWBfSILHX67nRamnkbOmCR2+x3sf8dPkTqW X-Received: by 2002:a17:902:b184:: with SMTP id s4-v6mr13382191plr.359.1527515104192; Mon, 28 May 2018 06:45:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527515104; cv=none; d=google.com; s=arc-20160816; b=dWQt8+kOqEtShgZWPw7K3ky2Uj7yNwGZRJG4WjZjcwC479WtPx56JA2o4P7qpK1ncE pOayGTGMtSNNLH84zylvT6CDUdznRB6nVEupC9r63IOcjZCttYHtsttncmTDJDxFV48B mcg//Bqo6Mkmt8fYCbA6Mj5uCN+sJR1N1FzUQafds944ecYz2QXWuOIrHw66kUFmgFCc aVb88bykbhdVbEQyNcUJyBQvnPImvHE1VRy13hijXnsPewoDhAh1e+2J1N2Px0TgzBZL MgPhTfiSVLrUmmzEYemnbEgmpjglAAS9V3nBAknHWQh+KMZWACeHqgO9oRwhzFNY1Ts8 Q1nA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=nTg4mgfbwNwNxt40OW4/er49EHpwUp47E+Wp2Gt/SeU=; b=0b+dVjXfnXm+SJ/uiFUr1eY4ta/ESjfvdLBPe9B4mTn//KKF1jNtjAg76glEgSjXyF uQI1bu4NSNZICHEduvBbO6VkvntacGZSTW4nK7RKY3M+QLvnyjBFZX6nLw9Luj/fJeCP 2SZIi4ZTOIFZYbQP4f71qp3B2tnnzidy8ACOLH4JMsXVAmzUSyz9ZbKzeORjli82mOqz Ic5hLsRb/5PCp8cFFIbFr3n6EBNb/8InWejYz/XsmsOgsQ3nh+lWTq5BO8npYUHPkDWW 6Q8pjtucA/wJV2rUvz+MyXupuHR+hbd8hjHmwyK43OksKqW+tqzFUvhLW+PNFR/FlXmu QXDQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tWEjOHQJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bi1-v6si1092888plb.126.2018.05.28.06.44.49; Mon, 28 May 2018 06:45:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tWEjOHQJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1162867AbeE1Kn2 (ORCPT + 99 others); Mon, 28 May 2018 06:43:28 -0400 Received: from mail.kernel.org ([198.145.29.99]:34364 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S937565AbeE1KnQ (ORCPT ); Mon, 28 May 2018 06:43:16 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1A42D2089E; Mon, 28 May 2018 10:43:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527504195; bh=Th7dWU1/zPg7+1VD5Hb7zIzlRdhF0nomv/jpMWr0WyI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tWEjOHQJNnR6WDj1T8lJ+qZKXB74CvW9+785o6c7W16CZxgxGHimDeq58loEy2HOA vvB0Xb4dgf7o5dsMcSh9mE+Ds+T9I1Inxj8SudIyhSKu8nU+5G8SapyuK63LNE014x KHSuL2j6wNVj6AVnZVx52fi7C3S7nm5bWMaaoChw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org, greg@kroah.com Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Michael Ellerman Subject: [PATCH 4.14 050/496] powerpc/64s: Wire up cpu_show_spectre_v1() Date: Mon, 28 May 2018 11:57:15 +0200 Message-Id: <20180528100321.870531258@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180528100319.498712256@linuxfoundation.org> References: <20180528100319.498712256@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Michael Ellerman commit 56986016cb8cd9050e601831fe89f332b4e3c46e upstream. Add a definition for cpu_show_spectre_v1() to override the generic version. Currently this just prints "Not affected" or "Vulnerable" based on the firmware flag. Although the kernel does have array_index_nospec() in a few places, we haven't yet audited all the powerpc code to see where it's necessary, so for now we don't list that as a mitigation. Signed-off-by: Michael Ellerman Signed-off-by: Greg Kroah-Hartman --- arch/powerpc/kernel/security.c | 8 ++++++++ 1 file changed, 8 insertions(+) --- a/arch/powerpc/kernel/security.c +++ b/arch/powerpc/kernel/security.c @@ -50,3 +50,11 @@ ssize_t cpu_show_meltdown(struct device return sprintf(buf, "Vulnerable\n"); } + +ssize_t cpu_show_spectre_v1(struct device *dev, struct device_attribute *attr, char *buf) +{ + if (!security_ftr_enabled(SEC_FTR_BNDS_CHK_SPEC_BAR)) + return sprintf(buf, "Not affected\n"); + + return sprintf(buf, "Vulnerable\n"); +}