Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2446465yba; Mon, 15 Apr 2019 11:48:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqxc3q7lPfbPwB0U+Zv4tmfHBTsuMl8LjCohI+HXMk3w+7bng/lQnFZ1wRNzSr4PdT0uhnCi X-Received: by 2002:a17:902:463:: with SMTP id 90mr43234765ple.140.1555354131019; Mon, 15 Apr 2019 11:48:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555354131; cv=none; d=google.com; s=arc-20160816; b=RtojoklDj7BL7DBtuWZmO5j/ADGcp9azyLWkSVv1x1FynP+XnReh+uY9cpPOOGCHgR zsbCPXxUEK38CWK/8WJnGuh/jnhRM/Sx5W5C5Nhv6rDtX6M70IdaCoyz70fV7odSEGjJ nuZWf63SH6EjkBZ9M6k5Frhu/jQDe+2qhMVrB18PVMG+46zRAEawUGFWXDJuoK3LHEce gb24D+3xvmA2Q0Ki6qFGpc19oLnO9zww5Csk+YpZ1OnEGS4XWvdPYRBaKpyoTEyDxMJl I1VsZihNrl9T0HY4QNrgHWce8EaBjQk69SpYrpNskal4oPXUkQSUATlyVZeQJnwp90qw bj/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=LTd9x+WUcPYWS0+rha7CFn7VULZ/dPmfK0xAQ8jog/g=; b=n+0OdRMDptU1dE2V0Z4skm3GV1dFKb5ZMxWBSJTSDqKWRg73aMQXYzPRDsslhUsVPN NzXP/ZyG3ahSsj6q6olM9aWspTnwEG5W/5V5iAdrTn2Rk5iKiFpsOIOKrX9KXYMcNT99 GcIq/6fWzLzOo4hMp0jk5a949FeIgwv0AAzcrMl6F2MgMlSq7bDPcUrWqhkughEief5L cuFSC2qNglwdSjVkBBPqOmp8RH70xCEOZS9147lTnJYBG/DcGYbeYAZCze7wGGppooLw PV6qk9TFZTpMv7IMTK6/r5ko+O9KSyJ1GYQJufaUcyDIfr/wN2pBYDGDjpZ5D9VdK+XD W6ZQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=O+xxLirf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c24si39546434plo.220.2019.04.15.11.48.35; Mon, 15 Apr 2019 11:48:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=O+xxLirf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728443AbfDOSr0 (ORCPT + 99 others); Mon, 15 Apr 2019 14:47:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:50632 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728425AbfDOSrX (ORCPT ); Mon, 15 Apr 2019 14:47:23 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 73C93218D3; Mon, 15 Apr 2019 18:47:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555354042; bh=gsrIuS87PKHpdBIKiY8Xbmm9wek4Xo2YlcKMxhytBu0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=O+xxLirf70W6ERC7wD7YjiVfBzHhsXDW2p5RzvuOpvx9Lqb6W6I9Yqnt+wqckPYMg m5AX5U7Sbt8ncy4pumily56I57bm+Rt+UCwpbGZeUWe8E9X9KFT1gAxhobu7YVjTPJ AtOyNj6qcL4l/qZSR5aHoZa4IeNoknswI8COKmDA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Diana Craciun , Michael Ellerman , Sasha Levin Subject: [PATCH 4.9 41/76] powerpc/fsl: Update Spectre v2 reporting Date: Mon, 15 Apr 2019 20:44:05 +0200 Message-Id: <20190415183718.146987235@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190415183707.712011689@linuxfoundation.org> References: <20190415183707.712011689@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org commit dfa88658fb0583abb92e062c7a9cd5a5b94f2a46 upstream. Report branch predictor state flush as a mitigation for Spectre variant 2. Signed-off-by: Diana Craciun Signed-off-by: Michael Ellerman Signed-off-by: Sasha Levin --- arch/powerpc/kernel/security.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/arch/powerpc/kernel/security.c b/arch/powerpc/kernel/security.c index 6dc5cdc2b87c..43ce800e73bf 100644 --- a/arch/powerpc/kernel/security.c +++ b/arch/powerpc/kernel/security.c @@ -213,8 +213,11 @@ ssize_t cpu_show_spectre_v2(struct device *dev, struct device_attribute *attr, c if (count_cache_flush_type == COUNT_CACHE_FLUSH_HW) seq_buf_printf(&s, "(hardware accelerated)"); - } else + } else if (btb_flush_enabled) { + seq_buf_printf(&s, "Mitigation: Branch predictor state flush"); + } else { seq_buf_printf(&s, "Vulnerable"); + } seq_buf_printf(&s, "\n"); -- 2.19.1