Received: by 10.213.65.68 with SMTP id h4csp263073imn; Tue, 13 Mar 2018 03:40:47 -0700 (PDT) X-Google-Smtp-Source: AG47ELugt9qtxDwXY7rXWiDdiiVOSjbKaa7q43HoBQdcUGAHBvxzHF0qB7NSvUVSX1sajcEf4M5H X-Received: by 10.98.141.205 with SMTP id p74mr89959pfk.211.1520937647794; Tue, 13 Mar 2018 03:40:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1520937647; cv=none; d=google.com; s=arc-20160816; b=lmAxOI2txFTFzPnnu7FXNcNmjjxy0Y7JbcVNW4nfsgz1EIShFMXpluRw2PIXoPM5QV u6RFT5vnqiLL6VKP2C5xF5Molirq9JugvmeRKYxzIx9hXP7wq839HR7LSidgUcQpNCP4 Ho4vgLIiTL0lMpTsTHRHvfeKrmumgXsxuAQtPav2u0AuNrWl7OhxFeeb2sGzEX53fuIU UsjOGq+b3bfTFdZ+vN4mBa1cRbGsZmTF8n7VI6clkXcs/G7pJvxihJ363Bi2BsN314BR ApF57738nf6DK2EDb1RVxvV/irP5hlGoejxEJoVE4T3fgduvPDHzI7+pSJ2LD6cdVJh8 0mqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=hkuD79qk+iomoLMVt/vuoAlaaFOIKjszAS7MWbDAYA4=; b=QVsC9+0iMpadMR77Jz/qhcjn9hMhph+LvaKXp7yNqVXjlBpRXEMHoewOPm+fam8AA+ h1QjB1CT8XxQgPR5PrXfRBeeCoZ1nNB9kUUzjimg2TZ5/9ce+spSmc9LzVDp3iKu7fpD zX1znZpSdfATm5a05qtrug6Vtl8WdqiFqbhVpDUFwZUAbeteaVKXgKPK5YyGoBkNHYWF qR3aqTppAKvtDxWT+38GeQT/P0Qrz9fcKQgu57UKrajQZgbB6Rj3tgSMOqbQpxKRC1Ju sXGwFUn3QiVY56EXECJpIAkOQkNNQlo3EoL9zA8RIOpg/vfV3RRXbXEWa+tMkuAkAOmv JjkA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b=RFqMWAlq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o188si47035pga.132.2018.03.13.03.40.33; Tue, 13 Mar 2018 03:40:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b=RFqMWAlq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932951AbeCMKio (ORCPT + 99 others); Tue, 13 Mar 2018 06:38:44 -0400 Received: from out1-smtp.messagingengine.com ([66.111.4.25]:44523 "EHLO out1-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932706AbeCMKil (ORCPT ); Tue, 13 Mar 2018 06:38:41 -0400 Received: from compute6.internal (compute6.nyi.internal [10.202.2.46]) by mailout.nyi.internal (Postfix) with ESMTP id EA1D420D07; Tue, 13 Mar 2018 06:38:40 -0400 (EDT) Received: from frontend2 ([10.202.2.161]) by compute6.internal (MEProxy); Tue, 13 Mar 2018 06:38:40 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=hkuD79qk+iomoLMVt/vuoAlaaFOIK jszAS7MWbDAYA4=; b=RFqMWAlqEGwjntG7JHM0tvy6/jk6NRBTeGSs6LP3AZMfQ BSXsqPh+mZF46tMGSpeulowxGoPhsoruMohMmj0nV23X4T/aldy5OfTt4V45Dnwo 7ZlI0Np9MuEDitZwUd+um5Max0Mif7ujRKAAeAsUGRdpA2EkJti8pQQ5tVs4TYBM IxM784ZC3AdeyK+Ts0Fm7K9thutIv4CHEZSoLDfNt46efzevWL3pvHO5B6Hx0+9H dro2txVUcEvKmBeB81wZHfeTPRkEgUYZI6Rh+0f3SN6PO+SWv298/l1nDAH7yCPT Bqgc3lLtkCzSZQarOPo+5Pz191kvfjyLymCPpnhxg== X-ME-Sender: Received: from localhost (lfbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.messagingengine.com (Postfix) with ESMTPA id 7FF8D24136; Tue, 13 Mar 2018 06:38:40 -0400 (EDT) Date: Tue, 13 Mar 2018 11:38:43 +0100 From: Greg KH To: Ard Biesheuvel Cc: Alex Shi , Marc Zyngier , Will Deacon , Catalin Marinas , stable@vger.kernel.org, linux-arm-kernel , Linux Kernel Mailing List Subject: Re: [PATCH 0/29] arm meltdown fix backporting review for lts 4.9 Message-ID: <20180313103843.GA29908@kroah.com> References: <1519790211-16582-1-git-send-email-alex.shi@linaro.org> <20180301152450.GA4061@kroah.com> <5cf40379-9098-da02-a471-8abd7d8f0be8@linaro.org> <20180302165415.GB8704@kroah.com> <20180313100442.GB1999@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 13, 2018 at 10:13:26AM +0000, Ard Biesheuvel wrote: > On 13 March 2018 at 10:04, Greg KH wrote: > > On Wed, Mar 07, 2018 at 06:24:09PM +0000, Ard Biesheuvel wrote: > >> On 2 March 2018 at 16:54, Greg KH wrote: > >> > On Fri, Mar 02, 2018 at 05:14:50PM +0800, Alex Shi wrote: > >> >> > >> >> > >> >> On 03/01/2018 11:24 PM, Greg KH wrote: > >> >> > On Wed, Feb 28, 2018 at 11:56:22AM +0800, Alex Shi wrote: > >> >> >> Hi All, > >> >> >> > >> >> >> This backport patchset fixed the meltdown issue, it's original branch: > >> >> >> https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/log/?h=kpti > >> >> >> A few dependency or fixingpatches are also picked up, if they are necessary > >> >> >> and no functional changes. > >> >> >> > >> >> >> The patchset also on repository: > >> >> >> git://git.linaro.org/kernel/linux-linaro-stable.git lts-4.9-spectrevv2 > >> >> >> > >> >> >> No bug found yet from kernelci.org and lkft testing. > >> >> > > >> >> > No bugs is good, but does it actually fix the meltdown problem? What > >> >> > did you test it on? > >> >> > >> >> Oh, I have no A73/A75 cpu, so I can not reproduce meltdown bug. > >> > > >> > Then why should I trust this backport at all? > >> > > >> > Please test on the hardware that is affected, otherwise you do not know > >> > if your patches do anything or not. > >> > > >> > >> I don't think it is feasible to test these backports by confirming > >> that they make the fundamental issue go away. We simply don't have the > >> code to reproduce all the variants, and we have to rely on the > >> information provided by ARM Ltd. regarding which cores are affected > >> and which aren't. > > > > You really don't have the reproducers? Please work with ARM to resolve > > that, this should not be a non-tested set of patches. That's really > > worse than no patches at all, as if they were applied, that would > > provide a false-sense of "all is fixed". > > > > I know that on x86, the line between architecture and platform is > blurry. That is not the case on ARM, though. > > Unlike platform firmware, the OS is built on top of an abstracted > platform which is described by ARM's Architecture Reference Manual. If > ARM Ltd. issues recommendations regarding what firmware PSCI methods > to call when doing a context switch, or which barrier instruction to > issue in certain circumstances, they do so because a certain class of > hardware may require it in some cases. It is really not up to me to go > find some exploit code on GitHub, run it before and after applying the > patch and conclude that the problem is fixed. Instead, what I should > do is confirm that the changes result in the recommended actions to be > taken at the appropriate times. To _not_ take that exploit code and run it to _verify_ that your patches work, would be foolish, right? I can't believe we are having the argument of "Test that your patches actually work"... Ugh, these series are all now dropped from my patch queue until you all get your act together and get someone to verify the changes actually work. greg k-h