author | Jeremy Linton <jeremy.linton@arm.com> | |
Tue, 8 Oct 2019 15:39:27 +0000 (17:39 +0200) | ||
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | |
Fri, 11 Oct 2019 16:21:35 +0000 (18:21 +0200) | ||
commit | f41df38898ecb5a0a9b5efb863d999d27393c907 | |
tree | 095031c6fce084d05571e0983715db35553fcb67 | tree | snapshot (tar.xz tar.gz zip) |
parent | 9d1bb39cdd9629d1a6127bd085d3ecc7009789e0 | commit | diff |
arm64: add sysfs vulnerability show for spectre-v2
[ Upstream commit d2532e27b5638bb2e2dd52b80b7ea2ec65135377 ]
Track whether all the cores in the machine are vulnerable to Spectre-v2,
and whether all the vulnerable cores have been mitigated. We then expose
this information to userspace via sysfs.
Signed-off-by: Jeremy Linton <jeremy.linton@arm.com>
Reviewed-by: Andre Przywara <andre.przywara@arm.com>
Reviewed-by: Catalin Marinas <catalin.marinas@arm.com>
Tested-by: Stefan Wahren <stefan.wahren@i2se.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
[ Upstream commit d2532e27b5638bb2e2dd52b80b7ea2ec65135377 ]
Track whether all the cores in the machine are vulnerable to Spectre-v2,
and whether all the vulnerable cores have been mitigated. We then expose
this information to userspace via sysfs.
Signed-off-by: Jeremy Linton <jeremy.linton@arm.com>
Reviewed-by: Andre Przywara <andre.przywara@arm.com>
Reviewed-by: Catalin Marinas <catalin.marinas@arm.com>
Tested-by: Stefan Wahren <stefan.wahren@i2se.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/arm64/kernel/cpu_errata.c | diff | blob | history |