Received: by 2002:ac0:8845:0:0:0:0:0 with SMTP id g63csp1229070img; Tue, 26 Feb 2019 17:08:04 -0800 (PST) X-Google-Smtp-Source: AHgI3IYoRCnk5pwaexJr9p+T8bsL5n8wk5mjiSukJ1gG06bQwf4teYC/gLcpyBaUZwQ3RYeLGp1d X-Received: by 2002:a62:36c7:: with SMTP id d190mr28865608pfa.178.1551229684392; Tue, 26 Feb 2019 17:08:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551229684; cv=none; d=google.com; s=arc-20160816; b=0a9Ds8HdATTOezDt0pOhwOTEFOGKLd2M6GR3NEe/3hcHkYdxVy3U0baOHbBF6mp2pe p6m8K8N1y+xk13Xf0Py+swO19wMchc3gIR75BAkMLC9bh6GzNKDZKzGH95d+gkAKUxNi Yi21IQGpF0X6SvEYQtJ2kFHapOiCowg4hfeOo6dHHilg5c+GiLO3je3wY9gXe5Q4sngE h9hs+B3zGr4DzSEuwiTEwdKcrBgtCUUptb9pHxN9ASu3LnoATeiQPYrlE6/gdno2czeX jVeyXam9YQ0/MOaLST4puwGaY4Eod/az+nRAQ2Sym4XVA9FnJwzHCFlOJ8eIE7wFYWfk 5bcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=z+wqWVaVf19XwPrsAbS9T1Y+l/CVn/R028F7RLLoYgQ=; b=ujImoo3nwQzquu+RYdU9Pidiihp17lUN6UKMVNGzuw8q4iWxWzcLvTGAmAHaTClGHy ae55Ojx0o2aNhpR5nGvUONEMD+eRlrWwJhxgOmV1Vf9EHfKRxuPONBIYNEwOaQdMGUiW m/hG6mFgckyto+SO8eLZfqs58cXuiqg2mDAnAbTMYIV14BcTGp5OPSjcrmrU+vgzC6lp FLwsoBfrXO/KM0k6Zbv/P4mafFDkgJolrqWpGO9Jx5OTv8PjHTMn6lF7JVY/BgsQdnxl 6h7Y4CHIj68N8YvI4P2l3xTco1HC+LnWeBWLm7Zw6nLf9tNy9Q+EkNUGNlP+i55pVyiH UJAA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q83si13707915pfa.205.2019.02.26.17.07.49; Tue, 26 Feb 2019 17:08:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729534AbfB0BGF (ORCPT + 99 others); Tue, 26 Feb 2019 20:06:05 -0500 Received: from foss.arm.com ([217.140.101.70]:55600 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729446AbfB0BGD (ORCPT ); Tue, 26 Feb 2019 20:06:03 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 020EA169E; Tue, 26 Feb 2019 17:06:03 -0800 (PST) Received: from beelzebub.austin.arm.com (beelzebub.austin.arm.com [10.118.12.119]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 51C823F5C1; Tue, 26 Feb 2019 17:06:02 -0800 (PST) From: Jeremy Linton To: linux-arm-kernel@lists.infradead.org Cc: catalin.marinas@arm.com, will.deacon@arm.com, marc.zyngier@arm.com, suzuki.poulose@arm.com, Dave.Martin@arm.com, shankerd@codeaurora.org, julien.thierry@arm.com, mlangsdo@redhat.com, stefan.wahren@i2e.com, Andre.Przywara@arm.com, linux-kernel@vger.kernel.org, Mian Yousaf Kaukab , Jeremy Linton Subject: [PATCH v5 02/10] arm64: add sysfs vulnerability show for spectre v1 Date: Tue, 26 Feb 2019 19:05:36 -0600 Message-Id: <20190227010544.597579-3-jeremy.linton@arm.com> X-Mailer: git-send-email 2.17.2 In-Reply-To: <20190227010544.597579-1-jeremy.linton@arm.com> References: <20190227010544.597579-1-jeremy.linton@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mian Yousaf Kaukab spectre v1, has been mitigated, and the mitigation is always active. Signed-off-by: Mian Yousaf Kaukab Signed-off-by: Jeremy Linton --- arch/arm64/kernel/cpu_errata.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/arch/arm64/kernel/cpu_errata.c b/arch/arm64/kernel/cpu_errata.c index d2b2c69d31bb..ad58958becb6 100644 --- a/arch/arm64/kernel/cpu_errata.c +++ b/arch/arm64/kernel/cpu_errata.c @@ -755,3 +755,9 @@ const struct arm64_cpu_capabilities arm64_errata[] = { { } }; + +ssize_t cpu_show_spectre_v1(struct device *dev, struct device_attribute *attr, + char *buf) +{ + return sprintf(buf, "Mitigation: __user pointer sanitization\n"); +} -- 2.20.1