summaryrefslogtreecommitdiffstats
path: root/scripts/sortextable.h
diff options
context:
space:
mode:
authorMichael Cree <mcree@orcon.net.nz>2018-02-26 10:02:12 +0100
committerMatt Turner <mattst88@gmail.com>2018-04-08 00:04:04 +0200
commit6fd16ce5590e30d0ed8b21e977102361ff9f92ef (patch)
tree5f785735470f60b11bc8191c6431fea4c5d67e17 /scripts/sortextable.h
parentalpha: rtc: stop validating rtc_time in .read_time (diff)
downloadlinux-6fd16ce5590e30d0ed8b21e977102361ff9f92ef.tar.xz
linux-6fd16ce5590e30d0ed8b21e977102361ff9f92ef.zip
alpha: Implement CPU vulnerabilities sysfs functions.
Implement the CPU vulnerabilty show functions for meltdown, spectre_v1 and spectre_v2 on Alpha. Tests on XP1000 (EV67/667MHz) and ES45 (EV68CB/1.25GHz) show them to be vulnerable to Meltdown and Spectre V1. In the case of Meltdown I saw a 1 to 2% success rate in reading bytes on the XP1000 and 50 to 60% success rate on the ES45. (This compares to 99.97% success reported for Intel CPUs.) Report EV6 and later CPUs as vulnerable. Tests on PWS600au (EV56/600MHz) for Spectre V1 attack were unsuccessful (though I did not try particularly hard) so mark EV4 through to EV56 as not vulnerable. Signed-off-by: Michael Cree <mcree@orcon.net.nz> Signed-off-by: Matt Turner <mattst88@gmail.com>
Diffstat (limited to 'scripts/sortextable.h')
0 files changed, 0 insertions, 0 deletions