]> git.baikalelectronics.ru Git - kernel.git/commit
powerpc/64: Update Speculation_Store_Bypass in /proc/<pid>/status
authorMichael Ellerman <mpe@ellerman.id.au>
Thu, 2 Apr 2020 12:49:29 +0000 (23:49 +1100)
committerMichael Ellerman <mpe@ellerman.id.au>
Mon, 18 May 2020 11:58:43 +0000 (21:58 +1000)
commitc13d1ed210633f42c4169110226c0fc200a765e3
tree8370a48a6588de9449b102a78c444ae99bc0e258
parent2172d3124dd74a2d0dd0d334ccd1e9c6b9164227
powerpc/64: Update Speculation_Store_Bypass in /proc/<pid>/status

Currently we don't report anything useful in /proc/<pid>/status:

  $ grep Speculation_Store_Bypass /proc/self/status
  Speculation_Store_Bypass:       unknown

Our mitigation is currently always a barrier instruction, which
doesn't map that well onto the existing possibilities for the PR_SPEC
values.

However even if we added a "barrier" type PR_SPEC value, userspace
would still need to consult some other source to work out which type
of barrier to use. So reporting "vulnerable" seems sufficient, as
userspace can see that and then consult its source to determine what
barrier to use.

Signed-off-by: Gustavo Walbon <gwalbon@linux.ibm.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/20200402124929.3574166-1-mpe@ellerman.id.au
arch/powerpc/kernel/security.c