• Jeremy Linton's avatar
    arm64: add sysfs vulnerability show for speculative store bypass · 526e065d
    Jeremy Linton authored
    Return status based on ssbd_state and __ssb_safe. If the
    mitigation is disabled, or the firmware isn't responding then
    return the expected machine state based on a whitelist of known
    good cores.
    
    Given a heterogeneous machine, the overall machine vulnerability
    defaults to safe but is reset to unsafe when we miss the whitelist
    and the firmware doesn't explicitly tell us the core is safe.
    In order to make that work we delay transitioning to vulnerable
    until we know the firmware isn't responding to avoid a case
    where we miss the whitelist, but the firmware goes ahead and
    reports the core is not vulnerable. If all the cores in the
    machine have SSBS, then __ssb_safe will remain true.
    Tested-by: default avatarStefan Wahren <stefan.wahren@i2se.com>
    Signed-off-by: default avatarJeremy Linton <jeremy.linton@arm.com>
    Signed-off-by: default avatarWill Deacon <will.deacon@arm.com>
    526e065d
cpu_errata.c 20.9 KB