Received: by 10.223.185.116 with SMTP id b49csp805206wrg; Fri, 16 Feb 2018 07:28:44 -0800 (PST) X-Google-Smtp-Source: AH8x224pZ6VLUzLhN/tf095oUmbsgxu3AkUoBtLEOA/aztc1SEYq0N2Wd1WAFFm/HdcuRsrwJ8tU X-Received: by 2002:a17:902:7485:: with SMTP id h5-v6mr6326256pll.236.1518794924669; Fri, 16 Feb 2018 07:28:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518794924; cv=none; d=google.com; s=arc-20160816; b=iVt4fKoGUHXeWjrKkP65EiLeGvKjmUFm7d9AJgWsaHEn7Fg83OmYv5qdfC6AUfTtnj I4dIBfVUAjKHA1A0dgaPTNz3U2J1s3FWBVneiKNmeAifr5CXYngl6kM3nzeuFREIl3d7 1GHQDrOKtVULoEoJCww3Fr2HwKdysmAILjZ1ofbZu0kGMp8JW/j8FocRluI9QQP0/Zml PfXFCY3shew9+/Bxrht1LQ8OXTk62Jn30sajNJiMZpTXEafAwoxUCRKAAtEFsP4+e6hs tSb0OeuAdG+7aqDjrV06PENfKCeQFAJOy5L7CYeootkV4J3ZclUhsbiw/DgfixthOg0f zXxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:user-agent:references:in-reply-to:subject:cc:to:from :message-id:date:arc-authentication-results; bh=k0Ede14Hvdnfqro+bLLFGwRpzzOJ1rAcXcJORgCB8fQ=; b=LZsb+zwSXtNlEDAQSDCSy4p0qZ2EruOMrv9rKDpY4Xq0aY1nhg572Ky/iN1WJ0HCK7 j9ZCDMG+l0qyPechFN9bwK5tFi9YVo5YaP/4Ah2XC3GLCbk23k8f/tP1EUSf/ablxYl9 ilHyzbZio0gDa5wRNKnFG6ZYNpPPmRiResagUm2L9k7bJx9nVdMfxDkHjzzoLAeJPdyy uewapAB5romDqwaB5UEnH9deu86Urlsyf0QVecT0BZYUvYK5mz5X5qcMRnE/2L6Wlsjh n5PuXZ4O+Lz2n9Te5Q2YNszC85zG5Iu8oFmTkh2nGWwaTPeWOPQ8mkFAsxNNXmUknpAt rWXQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i5si1152815pgc.521.2018.02.16.07.28.30; Fri, 16 Feb 2018 07:28:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756038AbeBOV2g convert rfc822-to-8bit (ORCPT + 99 others); Thu, 15 Feb 2018 16:28:36 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:34002 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755958AbeBOV2f (ORCPT ); Thu, 15 Feb 2018 16:28:35 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 24DB380D; Thu, 15 Feb 2018 13:28:35 -0800 (PST) Received: from big-swifty.misterjones.org (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 655C13F487; Thu, 15 Feb 2018 13:28:31 -0800 (PST) Date: Thu, 15 Feb 2018 21:28:28 +0000 Message-ID: <86fu6254eb.wl-marc.zyngier@arm.com> From: Marc Zyngier To: Jon Masters Cc: , , , Catalin Marinas , Will Deacon , Peter Maydell , Christoffer Dall , Lorenzo Pieralisi , Mark Rutland , Robin Murphy , Ard Biesheuvel , Andrew Jones , Hanjun Guo , Jayachandran C , Russell King - ARM Linux Subject: Re: [PATCH v4 00/17] arm64: Add SMCCC v1.1 support and CVE-2017-5715 (Spectre variant 2) mitigation In-Reply-To: References: <20180206175621.929-1-marc.zyngier@arm.com> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM/1.14.9 (=?ISO-8859-4?Q?Goj=F2?=) APEL/10.8 EasyPG/1.0.0 Emacs/25.1 (aarch64-unknown-linux-gnu) MULE/6.0 (HANACHIRUSATO) Organization: ARM Ltd MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 15 Feb 2018 20:59:29 +0000, Jon Masters wrote: > > Hi Marc, all, > > On 02/06/2018 12:56 PM, Marc Zyngier wrote: > > ARM has recently published a SMC Calling Convention (SMCCC) > > specification update[1] that provides an optimised calling convention > > and optional, discoverable support for mitigating CVE-2017-5715. ARM > > Trusted Firmware (ATF) has already gained such an implementation[2]. > > I'm probably just missing something, but does this end up reported > somewhere conveniently user visible? In particular, if the new SMC is > *not* provided, does the user end up easily seeing this? What exactly do you want to make visible to userspace? If you want the SMC implementation of the CVE workaround to be reported, it wouldn't be very useful, as the SMC instruction is not available at EL0. It also only covers part of the mitigation spectrum (we have cores that implement the mitigation using different mechanisms). If what you're after is a userspace visible indication of a mitigation for this CVE (by whatever method available), then this is still a work in progress, and relies on this series[1] so that we can properly handle systems containing a combination of affected and non-affected CPUs. The plan is to expose the status as part of the sysfs interface, ? la x86 and covering all 3 known vulnerabilities. Thanks, M. [1] https://lkml.org/lkml/2018/2/9/579 -- Jazz is not dead, it just smell funny.