-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
alpha: Implement CPU vulnerabilities sysfs functions.
Implement the CPU vulnerabilty show functions for meltdown, spectre_v1 and spectre_v2 on Alpha. Tests on XP1000 (EV67/667MHz) and ES45 (EV68CB/1.25GHz) show them to be vulnerable to Meltdown and Spectre V1. In the case of Meltdown I saw a 1 to 2% success rate in reading bytes on the XP1000 and 50 to 60% success rate on the ES45. (This compares to 99.97% success reported for Intel CPUs.) Report EV6 and later CPUs as vulnerable. Tests on PWS600au (EV56/600MHz) for Spectre V1 attack were unsuccessful (though I did not try particularly hard) so mark EV4 through to EV56 as not vulnerable. Signed-off-by: Michael Cree <mcree@orcon.net.nz> Signed-off-by: Matt Turner <mattst88@gmail.com>
- Loading branch information
Michael Cree
authored and
Matt Turner
committed
Apr 7, 2018
1 parent
54f16b1
commit 6fd16ce
Showing
3 changed files
with
47 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
|
||
#include <asm/hwrpb.h> | ||
#include <linux/device.h> | ||
|
||
|
||
#ifdef CONFIG_SYSFS | ||
|
||
static int cpu_is_ev6_or_later(void) | ||
{ | ||
struct percpu_struct *cpu; | ||
unsigned long cputype; | ||
|
||
cpu = (struct percpu_struct *)((char *)hwrpb + hwrpb->processor_offset); | ||
cputype = cpu->type & 0xffffffff; | ||
/* Include all of EV6, EV67, EV68, EV7, EV79 and EV69. */ | ||
return (cputype == EV6_CPU) || ((cputype >= EV67_CPU) && (cputype <= EV69_CPU)); | ||
} | ||
|
||
ssize_t cpu_show_meltdown(struct device *dev, | ||
struct device_attribute *attr, char *buf) | ||
{ | ||
if (cpu_is_ev6_or_later()) | ||
return sprintf(buf, "Vulnerable\n"); | ||
else | ||
return sprintf(buf, "Not affected\n"); | ||
} | ||
|
||
ssize_t cpu_show_spectre_v1(struct device *dev, | ||
struct device_attribute *attr, char *buf) | ||
{ | ||
if (cpu_is_ev6_or_later()) | ||
return sprintf(buf, "Vulnerable\n"); | ||
else | ||
return sprintf(buf, "Not affected\n"); | ||
} | ||
|
||
ssize_t cpu_show_spectre_v2(struct device *dev, | ||
struct device_attribute *attr, char *buf) | ||
{ | ||
if (cpu_is_ev6_or_later()) | ||
return sprintf(buf, "Vulnerable\n"); | ||
else | ||
return sprintf(buf, "Not affected\n"); | ||
} | ||
#endif |