-
Notifications
You must be signed in to change notification settings - Fork 114
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
arm64: Introduce separate file for spectre mitigations and reporting
The spectre mitigation code is spread over a few different files, which makes it both hard to follow, but also hard to remove it should we want to do that in future. Introduce a new file for housing the spectre mitigations, and populate it with the spectre-v1 reporting code to start with. Signed-off-by: Will Deacon <will@kernel.org>
- Loading branch information
1 parent
688f1e4
commit 455697a
Showing
3 changed files
with
33 additions
and
7 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,32 @@ | ||
// SPDX-License-Identifier: GPL-2.0-only | ||
/* | ||
* Handle detection, reporting and mitigation of Spectre v1, v2 and v4, as | ||
* detailed at: | ||
* | ||
* https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability | ||
* | ||
* This code was originally written hastily under an awful lot of stress and so | ||
* aspects of it are somewhat hacky. Unfortunately, changing anything in here | ||
* instantly makes me feel ill. Thanks, Jann. Thann. | ||
* | ||
* Copyright (C) 2018 ARM Ltd, All Rights Reserved. | ||
* Copyright (C) 2020 Google LLC | ||
* | ||
* "If there's something strange in your neighbourhood, who you gonna call?" | ||
* | ||
* Authors: Will Deacon <will@kernel.org> and Marc Zyngier <maz@kernel.org> | ||
*/ | ||
|
||
#include <linux/device.h> | ||
|
||
/* | ||
* Spectre v1. | ||
* | ||
* The kernel can't protect userspace for this one: it's each person for | ||
* themselves. Advertise what we're doing and be done with it. | ||
*/ | ||
ssize_t cpu_show_spectre_v1(struct device *dev, struct device_attribute *attr, | ||
char *buf) | ||
{ | ||
return sprintf(buf, "Mitigation: __user pointer sanitization\n"); | ||
} |