aboutsummaryrefslogtreecommitdiff
path: root/arch/powerpc/kernel/security.c
diff options
context:
space:
mode:
authorGravatar Anthony Steinhauser <asteinhauser@google.com> 2019-10-29 12:07:59 -0700
committerGravatar Michael Ellerman <mpe@ellerman.id.au> 2019-11-05 12:20:06 +1100
commit8e6b6da91ac9b9ec5a925b6cb13f287a54bd547d (patch)
tree752053052a125fdd4fb527ebb879aa4fc5db257f /arch/powerpc/kernel/security.c
parentpowerpc/pseries: safely roll back failed DLPAR cpu add (diff)
downloadlinux-8e6b6da91ac9b9ec5a925b6cb13f287a54bd547d.tar.gz
linux-8e6b6da91ac9b9ec5a925b6cb13f287a54bd547d.tar.bz2
linux-8e6b6da91ac9b9ec5a925b6cb13f287a54bd547d.zip
powerpc/security/book3s64: Report L1TF status in sysfs
Some PowerPC CPUs are vulnerable to L1TF to the same extent as to Meltdown. It is also mitigated by flushing the L1D on privilege transition. Currently the sysfs gives a false negative on L1TF on CPUs that I verified to be vulnerable, a Power9 Talos II Boston 004e 1202, PowerNV T2P9D01. Signed-off-by: Anthony Steinhauser <asteinhauser@google.com> Signed-off-by: Michael Ellerman <mpe@ellerman.id.au> [mpe: Just have cpu_show_l1tf() call cpu_show_meltdown() directly] Link: https://lore.kernel.org/r/20191029190759.84821-1-asteinhauser@google.com
Diffstat (limited to 'arch/powerpc/kernel/security.c')
-rw-r--r--arch/powerpc/kernel/security.c5
1 files changed, 5 insertions, 0 deletions
diff --git a/arch/powerpc/kernel/security.c b/arch/powerpc/kernel/security.c
index 7cfcb294b11c..ad7f4bf8447c 100644
--- a/arch/powerpc/kernel/security.c
+++ b/arch/powerpc/kernel/security.c
@@ -167,6 +167,11 @@ ssize_t cpu_show_meltdown(struct device *dev, struct device_attribute *attr, cha
return sprintf(buf, "Vulnerable\n");
}
+
+ssize_t cpu_show_l1tf(struct device *dev, struct device_attribute *attr, char *buf)
+{
+ return cpu_show_meltdown(dev, attr, buf);
+}
#endif
ssize_t cpu_show_spectre_v1(struct device *dev, struct device_attribute *attr, char *buf)