ACK/cmt: [Bionic] [PATCH] powerpc/pseries: Fix clearing of security feature flags
Breno Leitao
leitao at debian.org
Thu Apr 19 15:23:21 UTC 2018
Hi Seth,
On Thu, Apr 19, 2018 at 08:32:07AM -0500, Seth Forshee wrote:
> On Thu, Apr 19, 2018 at 10:16:03AM -0300, Breno Leitao wrote:
> > From: Mauricio Faria de Oliveira <mauricfo at linux.vnet.ibm.com>
> >
> > The H_CPU_BEHAV_* flags should be checked for in the 'behaviour' field
> > of 'struct h_cpu_char_result' -- 'character' is for H_CPU_CHAR_*
> > flags.
> >
> > Found by playing around with QEMU's implementation of the hypercall:
> >
> > H_CPU_CHAR=0xf000000000000000
> > H_CPU_BEHAV=0x0000000000000000
> >
> > This clears H_CPU_BEHAV_FAVOUR_SECURITY and H_CPU_BEHAV_L1D_FLUSH_PR
> > so pseries_setup_rfi_flush() disables 'rfi_flush'; and it also
> > clears H_CPU_CHAR_L1D_THREAD_PRIV flag. So there is no RFI flush
> > mitigation at all for cpu_show_meltdown() to report; but currently
> > it does:
> >
> > Original kernel:
> >
> > # cat /sys/devices/system/cpu/vulnerabilities/meltdown
> > Mitigation: RFI Flush
> >
> > Patched kernel:
> >
> > # cat /sys/devices/system/cpu/vulnerabilities/meltdown
> > Not affected
> >
> > H_CPU_CHAR=0x0000000000000000
> > H_CPU_BEHAV=0xf000000000000000
> >
> > This sets H_CPU_BEHAV_BNDS_CHK_SPEC_BAR so cpu_show_spectre_v1() should
> > report vulnerable; but currently it doesn't:
> >
> > Original kernel:
> >
> > # cat /sys/devices/system/cpu/vulnerabilities/spectre_v1
> > Not affected
> >
> > Patched kernel:
> >
> > # cat /sys/devices/system/cpu/vulnerabilities/spectre_v1
> > Vulnerable
> >
> > Brown-paper-bag-by: Michael Ellerman <mpe at ellerman.id.au>
> > Fixes: f636c14790ea ("powerpc/pseries: Set or clear security feature flags")
> > Signed-off-by: Mauricio Faria de Oliveira <mauricfo at linux.vnet.ibm.com>
> > Signed-off-by: Michael Ellerman <mpe at ellerman.id.au>
> > (cherry picked from commit 0f9bdfe3c77091e8704d2e510eb7c2c2c6cde524)
> > Signed-off-by: Breno Leitao <leitao at debian.org>
>
> The patch looks fine, however we do need a bug in launchpad for any
> patches for bionic now. You can reply with a bug number and we can add
> the bug link when applying.
Right, this is the bug link:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1765429
Thanks,
Breno
More information about the kernel-team
mailing list