diff options
author | Anthony Steinhauser <asteinhauser@google.com> | 2019-10-29 20:07:59 +0100 |
---|---|---|
committer | Michael Ellerman <mpe@ellerman.id.au> | 2019-11-05 02:20:06 +0100 |
commit | 8e6b6da91ac9b9ec5a925b6cb13f287a54bd547d (patch) | |
tree | 752053052a125fdd4fb527ebb879aa4fc5db257f /arch/powerpc/kernel/security.c | |
parent | powerpc/pseries: safely roll back failed DLPAR cpu add (diff) | |
download | linux-8e6b6da91ac9b9ec5a925b6cb13f287a54bd547d.tar.xz linux-8e6b6da91ac9b9ec5a925b6cb13f287a54bd547d.zip |
powerpc/security/book3s64: Report L1TF status in sysfs
Some PowerPC CPUs are vulnerable to L1TF to the same extent as to
Meltdown. It is also mitigated by flushing the L1D on privilege
transition.
Currently the sysfs gives a false negative on L1TF on CPUs that I
verified to be vulnerable, a Power9 Talos II Boston 004e 1202, PowerNV
T2P9D01.
Signed-off-by: Anthony Steinhauser <asteinhauser@google.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
[mpe: Just have cpu_show_l1tf() call cpu_show_meltdown() directly]
Link: https://lore.kernel.org/r/20191029190759.84821-1-asteinhauser@google.com
Diffstat (limited to '')
-rw-r--r-- | arch/powerpc/kernel/security.c | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/arch/powerpc/kernel/security.c b/arch/powerpc/kernel/security.c index 7cfcb294b11c..ad7f4bf8447c 100644 --- a/arch/powerpc/kernel/security.c +++ b/arch/powerpc/kernel/security.c @@ -167,6 +167,11 @@ ssize_t cpu_show_meltdown(struct device *dev, struct device_attribute *attr, cha return sprintf(buf, "Vulnerable\n"); } + +ssize_t cpu_show_l1tf(struct device *dev, struct device_attribute *attr, char *buf) +{ + return cpu_show_meltdown(dev, attr, buf); +} #endif ssize_t cpu_show_spectre_v1(struct device *dev, struct device_attribute *attr, char *buf) |