From patchwork Wed Nov 7 16:43:43 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: David Long X-Patchwork-Id: 150420 Delivered-To: patches@linaro.org Received: by 2002:a2e:299d:0:0:0:0:0 with SMTP id p29-v6csp5387193ljp; Wed, 7 Nov 2018 08:44:11 -0800 (PST) X-Received: by 2002:ac8:1794:: with SMTP id o20mr916523qtj.98.1541609051471; Wed, 07 Nov 2018 08:44:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1541609051; cv=none; d=google.com; s=arc-20160816; b=SSkoOOl7Am7IHrewTDCquqBYx95A7Pmbo7EsSloXI5WLF/fnapsNYA2YgTYEusvoJr AOPHlF8r+FqEl3cWJ92uLjFyi0p1s1ph1GExCibm6Y+6DL6M6Y25hcKXO2f2+KbQTZtu 2qZyPSmHeAYiA8DmqAj7I4MiamzKPOgb96cbcT6wL1VO5V9M2NXQrtZC6V7Ejh+VOn/R ZQMHk+mVMDIA+DroEuOAVjK7C36K6hLFR4WeVpTs31nSecJb/Io+uq5q2+uUts1ve3P2 UCOsVv5YjTYaWZuznTBlu3/SxkHFplpKj7MHhx2F6D+d0tlZn6Dr6hg1VJwvVedgXmq1 X+Aw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=VsTOFUcZ+3bSgWLY/gphMhAUNgvi7bl1zA2jWn9hbr8=; b=LDegqfSR1J3SDf2atFaGJXoGo+ktEB5jlPzonHv4mbzA1Y3Fz4Sn/HanvRW97qckT6 JGdgRwmTS+DqdOQFawUNuOl+YWH8NU+xqmTA4u5Kg2vRPZUXhusWrCqazHA7lZ5VlSKH BQM1TpvSLZ8yOWAc4sQfdBdtnmx/iPGRX50KM3pjvW1f2RtrTN7nj5JXyqwRKeWlL0sY xRv0/CSR/S9mkY5fZaIMmlYqxSaKvv2aTgITVa5RMSVSOOgBnTPd2x+IusOpCt/wBBH4 8r3w7VDlYNX/3cZM4H88x83e3dPLhJAVB8dUsnUnumGxncDAqXB1g/e/C3e/D3p/ov2/ oSEQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=fNfnqv6U; spf=pass (google.com: domain of dave.long@linaro.org designates 209.85.220.65 as permitted sender) smtp.mailfrom=dave.long@linaro.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from mail-sor-f65.google.com (mail-sor-f65.google.com. [209.85.220.65]) by mx.google.com with SMTPS id n63-v6sor599653qkf.76.2018.11.07.08.44.11 for (Google Transport Security); Wed, 07 Nov 2018 08:44:11 -0800 (PST) Received-SPF: pass (google.com: domain of dave.long@linaro.org designates 209.85.220.65 as permitted sender) client-ip=209.85.220.65; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=fNfnqv6U; spf=pass (google.com: domain of dave.long@linaro.org designates 209.85.220.65 as permitted sender) smtp.mailfrom=dave.long@linaro.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=VsTOFUcZ+3bSgWLY/gphMhAUNgvi7bl1zA2jWn9hbr8=; b=fNfnqv6UGTJ4UAkS5JRdVb7nSwZAHqON2HW2PLTISiuxSEiTcUZYK6b4Ug2aMlG0JY +FrnLHFv5v2GkCR+R/pEyRkV77yQCBI+yTfoqWnE2zo10askR6wYk+oumvGqv4kpXfR3 h0DfLuIRTvKvwO6C46Lf0W+lo9jYQB9zFsjL8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=VsTOFUcZ+3bSgWLY/gphMhAUNgvi7bl1zA2jWn9hbr8=; b=UEQKPb+cRq+A6M9SXMWIH/uoDD+cXO9xxRfrNcb8sgg2tdfagPYcH+Mzdb+4l/bSN6 svyR5DQzdGxdsnsMfXEK7X5B4gmDyvmTjiZoziYP+71XXgQ4SJJIb9+wcZ5v6sWAgWCU 0PZz4VuKyULOaEGbeVk0UU4wfXg6VNIo8Q9uXiQVxhG7XQqBydBufySBIGnfD6ffab/6 tK8fmTh8No0YndEWnStZQCXwNRaAN1uFHbgvtwM5Rm2veWRIeYIe8Q2YHo851IwlbHFp zlu3oxrMD9ERNzvE/VmMpM9NVY3lrhcstXu504xg1e0ve8h7sGwQrLxQO5YgaoCO3FeZ NaIA== X-Gm-Message-State: AGRZ1gLUUOUlVpD0/KjPDSbSz1NpXUwhiNz0+LcojKZFXkXG+BHWk+RF Y7oY3l43r97msqBjZSA7aC7vglP5 X-Google-Smtp-Source: AJdET5fBPJEusAajYI0L34NyFtl9GxfR9OKvKCmsQfH+lrFk87fYSEIw0CBxHFw98hcCEu4/EOKHUg== X-Received: by 2002:a37:d6ce:: with SMTP id p75mr899502qkl.270.1541609050956; Wed, 07 Nov 2018 08:44:10 -0800 (PST) Return-Path: Received: from localhost.localdomain (pool-72-71-243-63.cncdnh.fast00.myfairpoint.net. [72.71.243.63]) by smtp.googlemail.com with ESMTPSA id 96-v6sm681817qtc.56.2018.11.07.08.44.09 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 07 Nov 2018 08:44:10 -0800 (PST) From: David Long To: stable@vger.kernel.org, Russell King - ARM Linux , Florian Fainelli , Tony Lindgren , Marc Zyngier , Mark Rutland Cc: Greg KH , Mark Brown Subject: [PATCH 4.9 V2 05/24] ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre Date: Wed, 7 Nov 2018 11:43:43 -0500 Message-Id: <20181107164402.9380-6-dave.long@linaro.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20181107164402.9380-1-dave.long@linaro.org> References: <20181107164402.9380-1-dave.long@linaro.org> From: Russell King Commit c58d237d0852a57fde9bc2c310972e8f4e3d155d upstream. Add a Kconfig symbol for CPUs which are vulnerable to the Spectre attacks. Signed-off-by: Russell King Reviewed-by: Florian Fainelli Boot-tested-by: Tony Lindgren Reviewed-by: Tony Lindgren Acked-by: Marc Zyngier Signed-off-by: David A. Long --- arch/arm/mm/Kconfig | 4 ++++ 1 file changed, 4 insertions(+) -- 2.17.1 diff --git a/arch/arm/mm/Kconfig b/arch/arm/mm/Kconfig index c1799dd1d0d9..d37af5e63411 100644 --- a/arch/arm/mm/Kconfig +++ b/arch/arm/mm/Kconfig @@ -396,6 +396,7 @@ config CPU_V7 select CPU_CP15_MPU if !MMU select CPU_HAS_ASID if MMU select CPU_PABRT_V7 + select CPU_SPECTRE if MMU select CPU_TLB_V7 if MMU # ARMv7M @@ -800,6 +801,9 @@ config CPU_BPREDICT_DISABLE help Say Y here to disable branch prediction. If unsure, say N. +config CPU_SPECTRE + bool + config TLS_REG_EMUL bool select NEED_KUSER_HELPERS