lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 1 Mar 2019 00:54:51 -0600 From: Andre Przywara <andre.przywara@....com> To: Jeremy Linton <jeremy.linton@....com>, linux-arm-kernel@...ts.infradead.org Cc: catalin.marinas@....com, will.deacon@....com, marc.zyngier@....com, suzuki.poulose@....com, Dave.Martin@....com, shankerd@...eaurora.org, julien.thierry@....com, mlangsdo@...hat.com, stefan.wahren@....com, linux-kernel@...r.kernel.org, Mian Yousaf Kaukab <ykaukab@...e.de> Subject: Re: [PATCH v5 02/10] arm64: add sysfs vulnerability show for spectre v1 Hi, On 2/26/19 7:05 PM, Jeremy Linton wrote: > From: Mian Yousaf Kaukab <ykaukab@...e.de> > > spectre v1, has been mitigated, and the mitigation is > always active. > > Signed-off-by: Mian Yousaf Kaukab <ykaukab@...e.de> > Signed-off-by: Jeremy Linton <jeremy.linton@....com> > --- > arch/arm64/kernel/cpu_errata.c | 6 ++++++ > 1 file changed, 6 insertions(+) > > diff --git a/arch/arm64/kernel/cpu_errata.c b/arch/arm64/kernel/cpu_errata.c > index d2b2c69d31bb..ad58958becb6 100644 > --- a/arch/arm64/kernel/cpu_errata.c > +++ b/arch/arm64/kernel/cpu_errata.c > @@ -755,3 +755,9 @@ const struct arm64_cpu_capabilities arm64_errata[] = { > { > } > }; > + > +ssize_t cpu_show_spectre_v1(struct device *dev, struct device_attribute *attr, > + char *buf) w/s issue, but it's not critical: Reviewed-by: Andre Przywara <andre.przywara@....com> Cheers, Andre > +{ > + return sprintf(buf, "Mitigation: __user pointer sanitization\n"); > +} >
Powered by blists - more mailing lists