Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit ff348355 authored by Michael Ellerman's avatar Michael Ellerman
Browse files

powerpc/64s: Enhance the information in cpu_show_meltdown()



Now that we have the security feature flags we can make the
information displayed in the "meltdown" file more informative.

Signed-off-by: default avatarMichael Ellerman <mpe@ellerman.id.au>
parent 8ad33041
Loading
Loading
Loading
Loading
+1 −0
Original line number Diff line number Diff line
@@ -10,6 +10,7 @@


extern unsigned long powerpc_security_features;
extern bool rfi_flush;

static inline void security_ftr_set(unsigned long feature)
{
+28 −2
Original line number Diff line number Diff line
@@ -6,6 +6,7 @@

#include <linux/kernel.h>
#include <linux/device.h>
#include <linux/seq_buf.h>

#include <asm/security_features.h>

@@ -19,8 +20,33 @@ unsigned long powerpc_security_features __read_mostly = \

ssize_t cpu_show_meltdown(struct device *dev, struct device_attribute *attr, char *buf)
{
	bool thread_priv;

	thread_priv = security_ftr_enabled(SEC_FTR_L1D_THREAD_PRIV);

	if (rfi_flush || thread_priv) {
		struct seq_buf s;
		seq_buf_init(&s, buf, PAGE_SIZE - 1);

		seq_buf_printf(&s, "Mitigation: ");

		if (rfi_flush)
		return sprintf(buf, "Mitigation: RFI Flush\n");
			seq_buf_printf(&s, "RFI Flush");

		if (rfi_flush && thread_priv)
			seq_buf_printf(&s, ", ");

		if (thread_priv)
			seq_buf_printf(&s, "L1D private per thread");

		seq_buf_printf(&s, "\n");

		return s.len;
	}

	if (!security_ftr_enabled(SEC_FTR_L1D_FLUSH_HV) &&
	    !security_ftr_enabled(SEC_FTR_L1D_FLUSH_PR))
		return sprintf(buf, "Not affected\n");

	return sprintf(buf, "Vulnerable\n");
}