]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/commit
sysfs/cpu: Add vulnerability folder
authorThomas Gleixner <tglx@linutronix.de>
Sun, 7 Jan 2018 21:48:00 +0000 (22:48 +0100)
committerKleber Sacilotto de Souza <kleber.souza@canonical.com>
Mon, 5 Feb 2018 15:53:01 +0000 (16:53 +0100)
commit55320896a952678b6d2a0e487c0a61a8a6e2dc53
tree39eef56a275ae6b8bdd798f0b5980ae3bf1dfd8f
parent65671e7a019530b53e29686c48002d184dd6635d
sysfs/cpu: Add vulnerability folder

CVE-2017-5715 (Spectre v2 retpoline)

commit 87590ce6e373d1a5401f6539f0c59ef92dd924a9 upstream.

As the meltdown/spectre problem affects several CPU architectures, it makes
sense to have common way to express whether a system is affected by a
particular vulnerability or not. If affected the way to express the
mitigation should be common as well.

Create /sys/devices/system/cpu/vulnerabilities folder and files for
meltdown, spectre_v1 and spectre_v2.

Allow architectures to override the show function.

Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Will Deacon <will.deacon@arm.com>
Cc: Dave Hansen <dave.hansen@intel.com>
Cc: Linus Torvalds <torvalds@linuxfoundation.org>
Cc: Borislav Petkov <bp@alien8.de>
Cc: David Woodhouse <dwmw@amazon.co.uk>
Link: https://lkml.kernel.org/r/20180107214913.096657732@linutronix.de
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
(cherry picked from commit 039bb6382d905dad43104eb0086462ed12b17eb1)
Signed-off-by: Andy Whitcroft <apw@canonical.com>
Signed-off-by: Kleber Sacilotto de Souza <kleber.souza@canonical.com>
Documentation/ABI/testing/sysfs-devices-system-cpu
drivers/base/Kconfig
drivers/base/cpu.c
include/linux/cpu.h