Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2481714imm; Mon, 28 May 2018 08:55:47 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrmNwcwSgp1THnDyTwh9t/71xBgNcupcx0lgtdsolgYHAiwXQtBa3y5Y6TRI4klOyRT/fSm X-Received: by 2002:a63:7043:: with SMTP id a3-v6mr11024162pgn.206.1527522946945; Mon, 28 May 2018 08:55:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527522946; cv=none; d=google.com; s=arc-20160816; b=x3Hh10pfB3FdIbIVCqrV0wTdzk5cnr0EYqBo3GL1Mcv9lK4xyKd8wR+/G3Ybsc1CbF TwIRmt3MGa7SVB9B0XqBGTetp4tYwMjjJKLePyeX8hLxS+/LJvS26LSGNrKBZLrOX5wZ BiumYdvI5Nux7DbZt9hGeO/dfrV06pBddc9xJB3rLSPJ41Jzmf9bqtnWUFvjZ+UXih1H corptycTJb9v0lm7/DbSX0eP2VSMIXyamEv7ptf8AAs+fS2wEwi7ibHjFr09Il8J517F qFCDnGKevLa/4m40W66xKDj4iQSuktPpX9nss+VNuepC5cVavNPAQ+6IGp4saeBQ6jD0 Taew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:to:from:arc-authentication-results; bh=Xxvul4YdzoiVWQxwZdS6bSAQHm/mjSlY8WzTv3Unbh0=; b=nig7lwYjheMVtMd3PXGuM8fVq8uce4IHvgdA/0NwK53nTCQmw9a+md9E4jfAr4PcLW BTkCfmDbI5cxDnBWBU89eHccBQU351b/Ow4OamCqjS2vnPkMMARIP3YJIA/cHl5HBQ/F 77vxZo9XhRyF9su/87LLJID+hGkUjYs5C74ZxlzDFASrS4pB0dKlInfMlYQwZBiBIB2K vBhH7v11A4w+PADxWtuE9Ey001ODje+NkZUxqn1RIY+ZFyvwEaP1N3MMeoNcQyDjR22+ s1RuGkkXFPYyHEn0BOKXjeG5fMKgsc6fPlRx7vU/2cTVryPdz7ZhiuV2ymspRN0rUWCF kXzg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w23-v6si14271478ply.563.2018.05.28.08.55.32; Mon, 28 May 2018 08:55:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1425299AbeE1Pye (ORCPT + 99 others); Mon, 28 May 2018 11:54:34 -0400 Received: from mx2.suse.de ([195.135.220.15]:44268 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1425224AbeE1PyP (ORCPT ); Mon, 28 May 2018 11:54:15 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext-too.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 924A9AE82; Mon, 28 May 2018 15:54:12 +0000 (UTC) From: Michal Suchanek To: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Michal Suchanek , Mauricio Faria de Oliveira , Nicholas Piggin , Michael Neuling , linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org Subject: [PATCH] powerpc/64s: Enhance the information in cpu_show_spectre_v1() Date: Mon, 28 May 2018 15:19:14 +0200 Message-Id: <20180528131914.32231-1-msuchanek@suse.de> X-Mailer: git-send-email 2.13.6 In-Reply-To: <20180424041559.32410-1-mpe@ellerman.id.au> References: <20180424041559.32410-1-mpe@ellerman.id.au> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We now have barrier_nospec as mitigation so print it in cpu_show_spectre_v1 when enabled. Signed-off-by: Michal Suchanek --- arch/powerpc/kernel/security.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/arch/powerpc/kernel/security.c b/arch/powerpc/kernel/security.c index 0239383c7e4d..a0c32d53980b 100644 --- a/arch/powerpc/kernel/security.c +++ b/arch/powerpc/kernel/security.c @@ -120,7 +120,10 @@ ssize_t cpu_show_spectre_v1(struct device *dev, struct device_attribute *attr, c if (!security_ftr_enabled(SEC_FTR_BNDS_CHK_SPEC_BAR)) return sprintf(buf, "Not affected\n"); - return sprintf(buf, "Vulnerable\n"); + if (barrier_nospec_enabled) + return sprintf(buf, "Mitigation: __user pointer sanitization\n"); + else + return sprintf(buf, "Vulnerable\n"); } ssize_t cpu_show_spectre_v2(struct device *dev, struct device_attribute *attr, char *buf) -- 2.13.6