diff options
author | Paul Mackerras <paulus@ozlabs.org> | 2018-01-15 16:06:47 +1100 |
---|---|---|
committer | Paul Mackerras <paulus@ozlabs.org> | 2018-01-19 15:17:01 +1100 |
commit | 3214d01f139b7544e870fc0b7fcce8da13c1cb51 (patch) | |
tree | 15736d0929131d265751405b3cb262444246ab8c /drivers/tty/synclinkmp.c | |
parent | 37b95951c58fdf08dc10afa9d02066ed9f176fb5 (diff) | |
download | op-kernel-dev-3214d01f139b7544e870fc0b7fcce8da13c1cb51.zip op-kernel-dev-3214d01f139b7544e870fc0b7fcce8da13c1cb51.tar.gz |
KVM: PPC: Book3S: Provide information about hardware/firmware CVE workarounds
This adds a new ioctl, KVM_PPC_GET_CPU_CHAR, that gives userspace
information about the underlying machine's level of vulnerability
to the recently announced vulnerabilities CVE-2017-5715,
CVE-2017-5753 and CVE-2017-5754, and whether the machine provides
instructions to assist software to work around the vulnerabilities.
The ioctl returns two u64 words describing characteristics of the
CPU and required software behaviour respectively, plus two mask
words which indicate which bits have been filled in by the kernel,
for extensibility. The bit definitions are the same as for the
new H_GET_CPU_CHARACTERISTICS hypercall.
There is also a new capability, KVM_CAP_PPC_GET_CPU_CHAR, which
indicates whether the new ioctl is available.
Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
Diffstat (limited to 'drivers/tty/synclinkmp.c')
0 files changed, 0 insertions, 0 deletions