We now have barrier_nospec as mitigation so print it in
cpu_show_spectre_v1 when enabled.

Signed-off-by: Michal Suchanek <msucha...@suse.de>
---
 arch/powerpc/kernel/security.c | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/arch/powerpc/kernel/security.c b/arch/powerpc/kernel/security.c
index 0239383c7e4d..a0c32d53980b 100644
--- a/arch/powerpc/kernel/security.c
+++ b/arch/powerpc/kernel/security.c
@@ -120,7 +120,10 @@ ssize_t cpu_show_spectre_v1(struct device *dev, struct 
device_attribute *attr, c
        if (!security_ftr_enabled(SEC_FTR_BNDS_CHK_SPEC_BAR))
                return sprintf(buf, "Not affected\n");
 
-       return sprintf(buf, "Vulnerable\n");
+       if (barrier_nospec_enabled)
+               return sprintf(buf, "Mitigation: __user pointer 
sanitization\n");
+       else
+               return sprintf(buf, "Vulnerable\n");
 }
 
 ssize_t cpu_show_spectre_v2(struct device *dev, struct device_attribute *attr, 
char *buf)
-- 
2.13.6

Reply via email to