Received: by 10.223.176.5 with SMTP id f5csp1202093wra; Tue, 6 Feb 2018 14:43:54 -0800 (PST) X-Google-Smtp-Source: AH8x225W1XV51LaqweQ541fOQwyrLOsKx2BNoXjtH4+sNTk+ugn3DbJxnQatrNs8HPJ4KRI/M1l7 X-Received: by 2002:a17:902:4523:: with SMTP id m32-v6mr3845058pld.449.1517957033907; Tue, 06 Feb 2018 14:43:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517957033; cv=none; d=google.com; s=arc-20160816; b=e8LGUm14QCXi/4rxmxhlWPSDuGMIsrZU0MOu07+9txaEYYrethQEiMDXIJ2b2SAc3Q ad62RaiDg1emmQ9NYtPJTGNxwiMQbhpC6rhPCn6dzWUB4musYEnB3zPJ3Qw7KbAKqjjq D+7fKt6uV3lX15RD/SE+QEnrFUwiAHfjh7spJHHVvC/GIN2xSngQjv7tEFaH/707kvo2 RDLLZ0REXMRSUhdHycGpVMVWXqfjNc2PN9R79QE5ScIRm63/HMqYEK/05ujvF/EQjDE/ bIKoFoQAHi3umCQs0zdR08Xwppdpy/9Uz3IbBt9v9EtbZz/xWmk5cNiUXJ7R6+6lynZW I+jQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=mCSdq52xgqMdIoiJnBpq9ZD07X73kyQk8Nh7Cblyzxc=; b=YOrmWtsv9Sc02a5NX39ozTV+14U5bewT6G9D0XTstzsUHLzYCZ8xyTzlswU5whHdMj zhI3a++CR5OulbwEguI5PwdfKoUeZY7kjVp/nhOqx+OG+OaWlzuaX8Vp62qGfHZ2//ac Pkx7xJL4+Li2sBDu6bfbghIsleZcDuwi3H27v0cf+k21vQHI7Y+bFRj6x4Gci+zKktaN iCdX1GhfqZFWGQa0KXuXfhbX/uijnlb0hmvAfPksPwtCS/XsrdVLK+mO9WmUgZnk//tj HvRnSolNdX2B9XlkqwQ+zBxDk8nZxLRfL3eUL5HczQ/ZZVZBt9RTJTgxcHNoaU0B3AE4 cF4g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a5si33811pgv.672.2018.02.06.14.43.39; Tue, 06 Feb 2018 14:43:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753457AbeBFWnA (ORCPT + 99 others); Tue, 6 Feb 2018 17:43:00 -0500 Received: from foss.arm.com ([217.140.101.70]:43874 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753171AbeBFWm7 (ORCPT ); Tue, 6 Feb 2018 17:42:59 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 220CD1435; Tue, 6 Feb 2018 14:42:59 -0800 (PST) Received: from armageddon.cambridge.arm.com (armageddon.cambridge.arm.com [10.1.206.84]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 73CCA3F53D; Tue, 6 Feb 2018 14:42:56 -0800 (PST) Date: Tue, 6 Feb 2018 22:42:53 +0000 From: Catalin Marinas To: Marc Zyngier Cc: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, Mark Rutland , Peter Maydell , Andrew Jones , Lorenzo Pieralisi , Jon Masters , Ard Biesheuvel , Will Deacon , Russell King - ARM Linux , Jayachandran C , Hanjun Guo , Robin Murphy , Christoffer Dall Subject: Re: [PATCH v4 00/17] arm64: Add SMCCC v1.1 support and CVE-2017-5715 (Spectre variant 2) mitigation Message-ID: <20180206224253.5rsus3u3wt6eluxv@armageddon.cambridge.arm.com> References: <20180206175621.929-1-marc.zyngier@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180206175621.929-1-marc.zyngier@arm.com> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 06, 2018 at 05:56:04PM +0000, Marc Zyngier wrote: > ARM has recently published a SMC Calling Convention (SMCCC) > specification update[1] that provides an optimised calling convention > and optional, discoverable support for mitigating CVE-2017-5715. ARM > Trusted Firmware (ATF) has already gained such an implementation[2]. > > This series addresses a few things: > > - It provides a KVM implementation of PSCI v1.0, which is a > prerequisite for being able to discover SMCCC v1.1. > > - It allows KVM to advertise SMCCC v1.1, which is de-facto supported > already (it never corrupts any of the guest registers). > > - It implements KVM support for the ARCH_WORKAROUND_1 function that is > used to mitigate CVE-2017-5715 in a guest (if such mitigation is > available on the host). > > - It implements SMCCC v1.1 and ARCH_WORKAROUND_1 discovery support in > the kernel itself. > > - It finally provides firmware callbacks for CVE-2017-5715 for both > kernel and KVM and drop the initial PSCI_GET_VERSION based > mitigation. > > Patch 1 is already merged, and included here for reference. Patches on > top of arm64/for-next/core. Tested on Seattle and Juno, the latter > with ATF implementing SMCCC v1.1. Queued for 4.16. I merged the first patch as well since for-next/core is based on -rc3 and the patch went in afterwards (I dropped cc stable since there is a version with this tag already). Thanks. -- Catalin