Received: by 10.223.176.5 with SMTP id f5csp1543101wra; Wed, 31 Jan 2018 07:59:40 -0800 (PST) X-Google-Smtp-Source: AH8x226OpZBRN0F38InzqIF0CcKG82r9BAhjhQ7+p7CcVtJKxggLehW7gj9mjQVG+UlzHSFTYtaF X-Received: by 2002:a17:902:7614:: with SMTP id k20-v6mr29014563pll.343.1517414380557; Wed, 31 Jan 2018 07:59:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517414380; cv=none; d=google.com; s=arc-20160816; b=u2VCJp46vuK+IbaL6MAdBcMzXR69yObgU1MpZnR/1AqiC4Abr7zjUAFmDvdTxT/xy/ 0j0HxjYT3pQvPS9JJQyflCS3KHulf9BwIy6rxFVov0NF7QA8Cv5ehfLTCeuo4a+9QpJa WQeNash+h5hSNOFzArSWa0SbukxJtPXYl7S2JGtWQ4yB4cE+/duUsMyPpAd4Crxbfy+b HDuvJwcfyQGAmDBeKHsAoc0HTkkBqOj5ferzqtd8evB1RHi+6o6E8gDH2iXK+DEblmdi qbRTQIBnI1Xr9m2bBYsSl4NAAy+JpmZjTc/pUVYAYyU27OcW4HxQ0PJ8jISCOVRHz+m6 JM7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:from:references:cc:to:subject :arc-authentication-results; bh=Lj/fFMHaCLWhb2NkT+p9N0QRsWoukSnMOaaXlG4HUeg=; b=QRV8Pg2X8B1ScH1w3W9hQXOL9Fc9F75l4zsbjfygJaTaQ3NA1W3gCiTwRoCivCzH6s QrcHoWrLPo+mwW2w7Kjo+s9dz4G5OsHKonDpGMny+FG6O9VfHwMXLwwTRnXsvfcF9XWV yvl5YR5ApWdP1Z152Bp0Vb5KiH7aPRfmWEaXcfN9j1IDyu9bFs4G5uubNJylB3stFbE6 blIWGKBj0I6b5QWzotQkjKjIxJksREvh8mIwVQ/7ehYIEde5q277PWTZSh9pDuDN+DSP aB34qRkbNKsZE0NWCPtdDKSJGcW6qOaFkeTEi+JlL+gukRc4CyNyMpLDx+byJITf0wuH yG0w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i9-v6si1728636plt.544.2018.01.31.07.59.26; Wed, 31 Jan 2018 07:59:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753196AbeAaPGA (ORCPT + 99 others); Wed, 31 Jan 2018 10:06:00 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:39028 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751899AbeAaPF7 (ORCPT ); Wed, 31 Jan 2018 10:05:59 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 90F021529; Wed, 31 Jan 2018 07:05:58 -0800 (PST) Received: from [10.1.207.62] (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E422E3F41F; Wed, 31 Jan 2018 07:05:54 -0800 (PST) Subject: Re: [PATCH v2 16/16] arm64: Add ARM_SMCCC_ARCH_WORKAROUND_1 BP hardening support To: Ard Biesheuvel Cc: Hanjun Guo , Linux Kernel Mailing List , linux-arm-kernel , kvmarm , Catalin Marinas , Will Deacon , Peter Maydell , Christoffer Dall , Lorenzo Pieralisi , Mark Rutland , Robin Murphy , Jon Masters References: <20180129174559.1866-1-marc.zyngier@arm.com> <20180129174559.1866-17-marc.zyngier@arm.com> <476d111e-6fb0-9bef-2448-a94d0cc03f45@huawei.com> <49853e5e-f093-2e79-1cfb-182f51fcd6a0@arm.com> From: Marc Zyngier Organization: ARM Ltd Message-ID: <501451b6-cc84-e8d3-b7b6-49a7de953976@arm.com> Date: Wed, 31 Jan 2018 15:05:53 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.5.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 31/01/18 14:38, Ard Biesheuvel wrote: > On 31 January 2018 at 14:35, Ard Biesheuvel wrote: >> On 31 January 2018 at 14:11, Marc Zyngier wrote: >>> On 31/01/18 13:56, Hanjun Guo wrote: >>>> Hi Marc, >>>> >>>> On 2018/1/30 1:45, Marc Zyngier wrote: >>>>> static int enable_psci_bp_hardening(void *data) >>>>> { >>>>> const struct arm64_cpu_capabilities *entry = data; >>>>> >>>>> - if (psci_ops.get_version) >>>>> + if (psci_ops.get_version) { >>>>> + if (check_smccc_arch_workaround_1(entry)) >>>>> + return 0; >>>> >>>> If I'm using the new version SMCCC, the firmware have the choicARM_SMCCC_ARCH_WORKAROUND_1e to decide >>>> whether this machine needs the workaround, even if the CPU is vulnerable >>>> for CVE-2017-5715, but.. >>>> >>>>> + >>>>> install_bp_hardening_cb(entry, >>>>> (bp_hardening_cb_t)psci_ops.get_version, >>>>> __psci_hyp_bp_inval_start, >>>>> __psci_hyp_bp_inval_end); >>>> >>>> ..the code above seems will enable get_psci_version() for CPU and will >>>> trap to trust firmware even the new version of firmware didn't say >>>> we need the workaround, did I understand it correctly? >>> >>> Well, you only get there if we've established that your CPU is affected >>> (it has an entry matching its MIDR with the HARDEN_BRANCH_PREDICTOR >>> capability), and that entry points to enable_psci_bp_hardening. It is >>> not the firmware that decides whether we need hardening, but the kernel. >>> The firmware merely provides a facility to apply the hardening. >>> >>>> I'm ask this because some platform will not expose to users to >>>> take advantage of CVE-2017-5715, and we can use different firmware >>>> to report we need such workaround or not, then use a single kernel >>>> image for both vulnerable platforms and no vulnerable ones. >>> >>> You cannot have your cake and eat it. If you don't want to workaround >>> the issue, you can disable the hardening. But asking for the same kernel >>> to do both depending on what the firmware reports doesn't make much >>> sense to me. >> >> The SMCCC v1.1. document does appear to imply that systems that >> implement SMCCC v1.1 but don't implement ARM_SMCCC_ARCH_WORKAROUND_1 >> should be assumed to be unaffected. >> >> """ >> If the discovery call returns NOT_SUPPORTED: >> • SMCCC_ARCH_WORKAROUND_1 must not be invoked on any PE in the system, and >> • none of the PEs in the system require firmware mitigation for CVE-2017-5715. >> """ >> >> How to deal with conflicting information in this regard (quirk table >> vs firmware implementation) is a matter of policy, of course. Yup. And the current approach fits the spec, I believe. The PSCI_GET_VERSION band-aid should normally be removed shortly after these patches hit mainline. > > ... and actually, perhaps it makes sense for the > SMCCC_ARCH_WORKAROUND_1 check to be completely independent of MIDR > based errata matching? > > I.e., if SMCCC v1.1 and SMCCC_ARCH_WORKAROUND_1 are both implemented, > we should probably invoke it even if the MIDR is not known to belong > to an affected implementation. This would have an impact on big-little systems, for which there is often a bunch of unaffected CPUs. Thanks, M. -- Jazz is not dead. It just smells funny...