diff options
author | Michael Cree <mcree@orcon.net.nz> | 2018-02-26 22:02:12 +1300 |
---|---|---|
committer | Matt Turner <mattst88@gmail.com> | 2018-04-07 15:04:04 -0700 |
commit | 6fd16ce5590e30d0ed8b21e977102361ff9f92ef (patch) | |
tree | 5f785735470f60b11bc8191c6431fea4c5d67e17 /arch/alpha/kernel/Makefile | |
parent | 54f16b1967bd7c6a252b3c128032deb37cc61cf3 (diff) | |
download | linux-stable-6fd16ce5590e30d0ed8b21e977102361ff9f92ef.tar.gz linux-stable-6fd16ce5590e30d0ed8b21e977102361ff9f92ef.tar.bz2 linux-stable-6fd16ce5590e30d0ed8b21e977102361ff9f92ef.zip |
alpha: Implement CPU vulnerabilities sysfs functions.
Implement the CPU vulnerabilty show functions for meltdown, spectre_v1
and spectre_v2 on Alpha.
Tests on XP1000 (EV67/667MHz) and ES45 (EV68CB/1.25GHz) show them
to be vulnerable to Meltdown and Spectre V1. In the case of
Meltdown I saw a 1 to 2% success rate in reading bytes on the
XP1000 and 50 to 60% success rate on the ES45. (This compares to
99.97% success reported for Intel CPUs.) Report EV6 and later
CPUs as vulnerable.
Tests on PWS600au (EV56/600MHz) for Spectre V1 attack were
unsuccessful (though I did not try particularly hard) so mark EV4
through to EV56 as not vulnerable.
Signed-off-by: Michael Cree <mcree@orcon.net.nz>
Signed-off-by: Matt Turner <mattst88@gmail.com>
Diffstat (limited to 'arch/alpha/kernel/Makefile')
-rw-r--r-- | arch/alpha/kernel/Makefile | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/alpha/kernel/Makefile b/arch/alpha/kernel/Makefile index bf7b41fa7b01..5a74581bf0ee 100644 --- a/arch/alpha/kernel/Makefile +++ b/arch/alpha/kernel/Makefile @@ -9,7 +9,7 @@ ccflags-y := -Wno-sign-compare obj-y := entry.o traps.o process.o osf_sys.o irq.o \ irq_alpha.o signal.o setup.o ptrace.o time.o \ - systbls.o err_common.o io.o + systbls.o err_common.o io.o bugs.o obj-$(CONFIG_VGA_HOSE) += console.o obj-$(CONFIG_SMP) += smp.o |