arm64: Add sysfs vulnerability show for spectre-v1
authorMian Yousaf Kaukab <ykaukab@suse.de>
Mon, 15 Apr 2019 21:21:21 +0000 (16:21 -0500)
committerWill Deacon <will.deacon@arm.com>
Fri, 26 Apr 2019 15:27:10 +0000 (16:27 +0100)
spectre-v1 has been mitigated and the mitigation is always active.
Report this to userspace via sysfs

Signed-off-by: Mian Yousaf Kaukab <ykaukab@suse.de>
Signed-off-by: Jeremy Linton <jeremy.linton@arm.com>
Reviewed-by: Andre Przywara <andre.przywara@arm.com>
Reviewed-by: Catalin Marinas <catalin.marinas@arm.com>
Tested-by: Stefan Wahren <stefan.wahren@i2se.com>
Acked-by: Suzuki K Poulose <suzuki.poulose@arm.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
arch/arm64/kernel/cpu_errata.c

index d2b2c69d31bb625fe1d484bc39d6b576e1cd41e6..cf623657cf3c68b327ce958cde24b4f0e1da4655 100644 (file)
@@ -755,3 +755,9 @@ const struct arm64_cpu_capabilities arm64_errata[] = {
        {
        }
 };
+
+ssize_t cpu_show_spectre_v1(struct device *dev, struct device_attribute *attr,
+                           char *buf)
+{
+       return sprintf(buf, "Mitigation: __user pointer sanitization\n");
+}