Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp5978892imm; Mon, 27 Aug 2018 07:39:44 -0700 (PDT) X-Google-Smtp-Source: ANB0VdYqnl5TPtOJrgzZ82EMHwbGHHGpRcIIRBCZXt7mZkbchQR5ziwzb33MCfWUNulM0J2RLeuK X-Received: by 2002:a62:5d89:: with SMTP id n9-v6mr14785409pfj.102.1535380784247; Mon, 27 Aug 2018 07:39:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535380784; cv=none; d=google.com; s=arc-20160816; b=H3+qkAu8Ddqa14sfbEdKj3eEp2Pkr+jZbB3nIi0zA43bfoaqHJ0eHs0sAARWQqgf1C WNHXwSNt6r8RY4XKivLNATgRedbj05xplwiH5UnZDuWqY40z22sQ7SbAPVJGIyx2j0P9 pm/1fsSdURnwquTcGnsTIL4tOJhuelm7MFLIwMvGyABHt5dcWzqaRzqBaSNUs8VYoNLZ 8tvfafTADB0fnUyfQZw5XkY3UOJDgmulcc3S2IZtUw6GRbMsO43Janu7ZlpBjSlKsK1i Yw+5gQBRiUjN4GATOrWddLTO0VWtkEspk5m7o+1eDelwnqFprjF0Rbn/ADHcq9y+ptjF O95A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=w2QL3i2yiYhiIHY2DcBlCMZ3aGJ8LwfceNj5L4e8bMc=; b=mi1y7DT/q7YLZNMM+iRKruHwS8zj1U1Sp+QQ4GyQAyAKAFf6vGUaQbqi14WHv8zTg1 YLzWhgIEMl58LDCmG1iwgjPr5WohcMB9FALRnimoywHidNsCFxLg5quYrk+mZYOJy7bR Oz1/7RKdWkbAxoYV9wWVjlukJIxixTzuSl8pI2P9mho2uUncoG6hNW4r8RP/QblTT7fF 5JX859/d1fMotI+DQvdedUZriNNafjNLg3BMUb3wSP0cEA8FOKrnQGzJPLvJcTRPj23Y vBZQc3U5wC2E5BvO/8/s984/2oIM88chh9R/09d1TyET+VjYH5CdfN8TTULZgnJuE9K2 eJug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o12-v6si12961002pls.94.2018.08.27.07.39.05; Mon, 27 Aug 2018 07:39:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727559AbeH0SUe (ORCPT + 99 others); Mon, 27 Aug 2018 14:20:34 -0400 Received: from mx2.suse.de ([195.135.220.15]:49984 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726953AbeH0SUe (ORCPT ); Mon, 27 Aug 2018 14:20:34 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 8F837AFE4; Mon, 27 Aug 2018 14:33:40 +0000 (UTC) From: Mian Yousaf Kaukab To: will.deacon@arm.com, marc.zyngier@arm.com Cc: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, robert.richter@cavium.com, cwu@amperecomputing.com, Mian Yousaf Kaukab Subject: [PATCH RESEND 0/6] arm64: add support for generic cpu vulnerabilities Date: Mon, 27 Aug 2018 16:33:04 +0200 Message-Id: <20180827143310.641-1-ykaukab@suse.de> X-Mailer: git-send-email 2.11.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org GENERIC_CPU_VULNERABILITIES provide a common way to figure out if a system is affected by vulnerabilities like meltdown and other variants of spectre. This small series adds support for it in arm64. Thank you, Best regards, Yousaf Mian Yousaf Kaukab (6): arm64: kpti: move check for non-vulnerable CPUs to a function arm64: add sysfs vulnerability show for meltdown arm64: add sysfs vulnerability show for spectre v1 arm64: add sysfs vulnerability show for spectre v2 arm64: add sysfs vulnerability show for speculative store bypass arm64: enable generic CPU vulnerabilites support arch/arm64/Kconfig | 1 + arch/arm64/include/asm/cpufeature.h | 16 +++++++ arch/arm64/kernel/cpu_errata.c | 84 ++++++++++++++++++++++++++++++++++++- arch/arm64/kernel/cpufeature.c | 9 +--- 4 files changed, 101 insertions(+), 9 deletions(-) -- 2.11.0