The nospec implementation is deeply integrated into the alternatives code: only for nospec an alternative facility list is implemented and used by the alternative code, while it is modified by nospec specific needs. Push down the nospec alternative handling into the nospec by introducing a new alternative type and a specific nospec callback to decide if alternatives should be applied. Also introduce a new global nobp variable which together with facility 82 can be used to decide if nobp is enabled or not. Acked-by: Alexander Gordeev <agordeev@linux.ibm.com> Tested-by: Sven Schnelle <svens@linux.ibm.com> Signed-off-by: Heiko Carstens <hca@linux.ibm.com> Signed-off-by: Vasily Gorbik <gor@linux.ibm.com>
23 lines
702 B
C
23 lines
702 B
C
// SPDX-License-Identifier: GPL-2.0
|
|
#include <linux/device.h>
|
|
#include <linux/cpu.h>
|
|
#include <asm/facility.h>
|
|
#include <asm/nospec-branch.h>
|
|
|
|
ssize_t cpu_show_spectre_v1(struct device *dev,
|
|
struct device_attribute *attr, char *buf)
|
|
{
|
|
return sprintf(buf, "Mitigation: __user pointer sanitization\n");
|
|
}
|
|
|
|
ssize_t cpu_show_spectre_v2(struct device *dev,
|
|
struct device_attribute *attr, char *buf)
|
|
{
|
|
if (test_facility(156))
|
|
return sprintf(buf, "Mitigation: etokens\n");
|
|
if (nospec_uses_trampoline())
|
|
return sprintf(buf, "Mitigation: execute trampolines\n");
|
|
if (nobp_enabled())
|
|
return sprintf(buf, "Mitigation: limited branch prediction\n");
|
|
return sprintf(buf, "Vulnerable\n");
|
|
}
|