Received: by 10.213.65.68 with SMTP id h4csp349164imn; Tue, 13 Mar 2018 06:26:39 -0700 (PDT) X-Google-Smtp-Source: AG47ELveXuNszDsaNTdaX0pErol87d0Epfk26jyADd1wWe1hYpac1WyNqsXx4RPbiD5p+mI+D61f X-Received: by 2002:a17:902:44c:: with SMTP id 70-v6mr597790ple.354.1520947599362; Tue, 13 Mar 2018 06:26:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1520947599; cv=none; d=google.com; s=arc-20160816; b=dth0QBjuH2JXFpdjbvf9p+rlIAsFmt7Z0a80S18cAvG6UEPCdLJM+xpWGn+B04vQfQ eLpqfQDZ8/DlSwWgh9Lmav0Sjn2H+jaW9OFrFdxfM7X6lQua8BJqrUl1wgfn4q8RZZds uAPayjf8h5PlTIzbag6Dn3xc3rrQsRnkNZ7nhC0+nNfDYMkEB/B/lAnNXeIePog5fPX2 Ta0CLOOq3rUqc3TYS1PdsufwmXLddDjA6u7mTuhy24NtwFIxC02T2tYeerIAje1Raqmt B7v6yP2QROHhTLNvmBLrkIxTTEP6bNupsq5hvU7ddrf96ykS9deJSePTbW2RaES+ZGv1 3p8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=1oOMD+IPXw58dOYOyIjBLVzKFyle6cm3xYISX41Rn5w=; b=QRmyjQLcpXjMRQOLkbO5YYyrY7QLJVB2rRvWcGZTh6yZ6QKVnO67ZPzxPlyvI9xjm8 qNO9yC/R650Yzz6ZM8ukdCa5RHXKgJb2l2bifJVkpkWFuxxXLnyMkBdXbTtN0fJ4vzN4 DG4gIDBKD7a4KVxDuErS73z6OadnVpmKcmlFpXcCdYWu4KULeA4kFKucsd5AbcNYWcJZ 1sMtf9oWI92ttBCKfc1/64WC5v5mwNs5deDpg7vY3c++rXLBcTNt/+Tu3mH4gRykFgfj /1P7o22ZJI6Jfvbkc0g2O68PUcfWkeZ12x0j1v68mqIJC0281cPBksV7jlOyH4U4NU6+ Bc8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b=LAAEzRoo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z8-v6si133007plh.379.2018.03.13.06.26.24; Tue, 13 Mar 2018 06:26:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b=LAAEzRoo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752718AbeCMNZN (ORCPT + 99 others); Tue, 13 Mar 2018 09:25:13 -0400 Received: from out1-smtp.messagingengine.com ([66.111.4.25]:39103 "EHLO out1-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752084AbeCMNZI (ORCPT ); Tue, 13 Mar 2018 09:25:08 -0400 Received: from compute6.internal (compute6.nyi.internal [10.202.2.46]) by mailout.nyi.internal (Postfix) with ESMTP id 2C20720DF2; Tue, 13 Mar 2018 09:25:08 -0400 (EDT) Received: from frontend1 ([10.202.2.160]) by compute6.internal (MEProxy); Tue, 13 Mar 2018 09:25:08 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=1oOMD+IPXw58dOYOyIjBLVzKFyle6 cm3xYISX41Rn5w=; b=LAAEzRoogjVpIvqsQoZmrT6bJt6oThjxbKLZ3ZiGNrbmw cdszVzkQbhmM2MJiX7BzFIF9RLxIuEotn2ALP4R3ZSlIWKD6sEl6Ojz8EdOok9jV P1Hq4r8PXg07BfkgBLLiSepVCFEI19Yup4IeIQi8L9suJXx0Q6TGRaf9CQInY662 6kRkjxaeO2aHBPrU2ouz+bVugbHV7ilS0P9iZQNqD2u+8qrGcYVD1HpJ66//vyjO pmJswXGPLuX6B6m2XlW7Jwn3iJvPkcobGW/TcYbrfA6jCoqnZylJsq8YyVfvC26n ZF1upL08pZ1TgNsyrzhci7O1DTMdyLul91hIGGlTQ== X-ME-Sender: Received: from localhost (lfbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.messagingengine.com (Postfix) with ESMTPA id B39327E1C4; Tue, 13 Mar 2018 09:25:07 -0400 (EDT) Date: Tue, 13 Mar 2018 14:25:10 +0100 From: Greg KH To: Ard Biesheuvel Cc: Alex Shi , Marc Zyngier , Will Deacon , Catalin Marinas , stable@vger.kernel.org, linux-arm-kernel , Linux Kernel Mailing List Subject: Re: [PATCH 0/29] arm meltdown fix backporting review for lts 4.9 Message-ID: <20180313132510.GA3629@kroah.com> References: <1519790211-16582-1-git-send-email-alex.shi@linaro.org> <20180301152450.GA4061@kroah.com> <5cf40379-9098-da02-a471-8abd7d8f0be8@linaro.org> <20180302165415.GB8704@kroah.com> <20180313100442.GB1999@kroah.com> <20180313103843.GA29908@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 13, 2018 at 01:01:43PM +0000, Ard Biesheuvel wrote: > On 13 March 2018 at 10:38, Greg KH wrote: > > On Tue, Mar 13, 2018 at 10:13:26AM +0000, Ard Biesheuvel wrote: > >> On 13 March 2018 at 10:04, Greg KH wrote: > >> > On Wed, Mar 07, 2018 at 06:24:09PM +0000, Ard Biesheuvel wrote: > >> >> On 2 March 2018 at 16:54, Greg KH wrote: > ... > >> >> > Please test on the hardware that is affected, otherwise you do not know > >> >> > if your patches do anything or not. > >> >> > > >> >> > >> >> I don't think it is feasible to test these backports by confirming > >> >> that they make the fundamental issue go away. We simply don't have the > >> >> code to reproduce all the variants, and we have to rely on the > >> >> information provided by ARM Ltd. regarding which cores are affected > >> >> and which aren't. > >> > > >> > You really don't have the reproducers? Please work with ARM to resolve > >> > that, this should not be a non-tested set of patches. That's really > >> > worse than no patches at all, as if they were applied, that would > >> > provide a false-sense of "all is fixed". > >> > > >> > >> I know that on x86, the line between architecture and platform is > >> blurry. That is not the case on ARM, though. > >> > >> Unlike platform firmware, the OS is built on top of an abstracted > >> platform which is described by ARM's Architecture Reference Manual. If > >> ARM Ltd. issues recommendations regarding what firmware PSCI methods > >> to call when doing a context switch, or which barrier instruction to > >> issue in certain circumstances, they do so because a certain class of > >> hardware may require it in some cases. It is really not up to me to go > >> find some exploit code on GitHub, run it before and after applying the > >> patch and conclude that the problem is fixed. Instead, what I should > >> do is confirm that the changes result in the recommended actions to be > >> taken at the appropriate times. > > > > To _not_ take that exploit code and run it to _verify_ that your patches > > work, would be foolish, right? > > > > Oh, absolutely. But that presupposes access to both the affected > hardware and the exploit code. If you all don't have access to both, then someone is doing something seriously wrong. Go complain to ARM please, we all know they have both. I just got done yelling at a whole bunch of vendors last week about this whole mess at a very large meeting of a lot of different Linux-based companies. It's crazy that the disfunction is still happening. greg k-h