Commit 220ca8c2 authored by Michal Suchanek's avatar Michal Suchanek Committed by Khalid Elmously

powerpc/64s: Enhance the information in cpu_show_spectre_v1()

BugLink: https://bugs.launchpad.net/bugs/1830176

commit a3775145 upstream.

We now have barrier_nospec as mitigation so print it in
cpu_show_spectre_v1() when enabled.
Signed-off-by: default avatarMichal Suchanek <msuchanek@suse.de>
Signed-off-by: default avatarMichael Ellerman <mpe@ellerman.id.au>
Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: default avatarJuerg Haefliger <juergh@canonical.com>
Signed-off-by: default avatarKleber Sacilotto de Souza <kleber.souza@canonical.com>
parent bafab443
...@@ -122,6 +122,9 @@ ssize_t cpu_show_spectre_v1(struct device *dev, struct device_attribute *attr, c ...@@ -122,6 +122,9 @@ ssize_t cpu_show_spectre_v1(struct device *dev, struct device_attribute *attr, c
if (!security_ftr_enabled(SEC_FTR_BNDS_CHK_SPEC_BAR)) if (!security_ftr_enabled(SEC_FTR_BNDS_CHK_SPEC_BAR))
return sprintf(buf, "Not affected\n"); return sprintf(buf, "Not affected\n");
if (barrier_nospec_enabled)
return sprintf(buf, "Mitigation: __user pointer sanitization\n");
return sprintf(buf, "Vulnerable\n"); return sprintf(buf, "Vulnerable\n");
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment