Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp295465imu; Wed, 2 Jan 2019 20:21:13 -0800 (PST) X-Google-Smtp-Source: AFSGD/V4qvZ7w4pgiuDB4K5pdrqHukBowKdNL/86qZhUrUqul1atJqpdoIwrx9WGPnobbCXzegoc X-Received: by 2002:a62:c613:: with SMTP id m19mr47255731pfg.207.1546489273907; Wed, 02 Jan 2019 20:21:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546489273; cv=none; d=google.com; s=arc-20160816; b=OzC/Cp0gbCW93xeKy1Qty+SAooeYRe+d0oJ7wvlv3L7cZIRR+8qots5doZdT4gwbLi B2Rmen6wL94thjYwdjDdaXkRRNJv/JTQFgfXoBSMfI+brIU9zh7R1xauE0jkVmK78sJK gs8a2VcgZQOoxDO+EoP3hsSICC4hz2QJHEhDaDJ5fHWawg03VpqthSMvMbnA9GM9iclX UyPcxyIHJfCaeI+rXynawQguqM3NorvfPnhOYPF+S+96VAKpm0KG2kOokVzZxBmzbdII Xpjuu0QirgG6KlzcLz11XQAzNIkGlQQ7gQm6umTXnw018hwNlhv+tRAc4L3nOLvAlwJA R5MA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=nujYigEZEYQvOo/px7JA187/vxmeSCVob1dF9n02g8k=; b=R5YV44uNXAemwy+2vjdMU321LbQeK8IeFLt2IBsG9/yxeKVtj+3h0x26Rbrss1CnYn Nt8vj+/sbqI6qODbI3epxLJ5shm7Vy1lZDPsPGj4VuKtkfGxXMb9tlMg8UfEPA3aGt4I 6X/OEDdakKMsAhVU5e2NUYKgZlgcURoa04vJuII0v9Zg5nFW/JCBWylVW3VshTTOW7iB tYgbaP0LK7R9AEgxgUh8y2cbRoQS9q3mChjQ2rIBvaXVNHt6o0Ctfg9T0EnSkEF2bNik AeGOfUTUUoz8IG9cO1Ly9OJuUBEkXdInWmD8fOxE6b70/kOSJOqXmnJ7jDlOUdTDCKs4 J54A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n8si48359185plp.137.2019.01.02.20.20.58; Wed, 02 Jan 2019 20:21:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730192AbfACAtc (ORCPT + 99 others); Wed, 2 Jan 2019 19:49:32 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:39766 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726101AbfACAtb (ORCPT ); Wed, 2 Jan 2019 19:49:31 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 3E2C580D; Wed, 2 Jan 2019 16:49:31 -0800 (PST) Received: from beelzebub.austin.arm.com (beelzebub.austin.arm.com [10.118.12.119]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 090573F5AF; Wed, 2 Jan 2019 16:49:29 -0800 (PST) From: Jeremy Linton To: linux-arm-kernel@lists.infradead.org Cc: catalin.marinas@arm.com, will.deacon@arm.com, marc.zyngier@arm.com, suzuki.poulose@arm.com, dave.martin@arm.com, shankerd@codeaurora.org, mark.rutland@arm.com, linux-kernel@vger.kernel.org, ykaukab@suse.de, julien.thierry@arm.com, mlangsdo@redhat.com, steven.price@arm.com, Jeremy Linton , Thomas Gleixner , Greg Kroah-Hartman , "Rafael J . Wysocki" , Konrad Rzeszutek Wilk , Peter Zijlstra , Dave Hansen , Borislav Petkov , David Woodhouse Subject: [PATCH v2 1/7] sysfs/cpu: Add "Unknown" vulnerability state Date: Wed, 2 Jan 2019 18:49:15 -0600 Message-Id: <20190103004921.1928921-2-jeremy.linton@arm.com> X-Mailer: git-send-email 2.17.2 In-Reply-To: <20190103004921.1928921-1-jeremy.linton@arm.com> References: <20190103004921.1928921-1-jeremy.linton@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org There is a lot of variation in the Arm ecosystem. Because of this, there exist possible cases where the kernel cannot authoritatively determine if a machine is vulnerable. Rather than guess the vulnerability status in cases where the mitigation is disabled or the firmware isn't responding correctly, we need to display an "Unknown" state. Signed-off-by: Jeremy Linton Cc: Thomas Gleixner Cc: Greg Kroah-Hartman Cc: Rafael J. Wysocki Cc: Konrad Rzeszutek Wilk Cc: Peter Zijlstra Cc: Dave Hansen Cc: Borislav Petkov Cc: David Woodhouse --- Documentation/ABI/testing/sysfs-devices-system-cpu | 1 + 1 file changed, 1 insertion(+) diff --git a/Documentation/ABI/testing/sysfs-devices-system-cpu b/Documentation/ABI/testing/sysfs-devices-system-cpu index 9605dbd4b5b5..876103fddfa4 100644 --- a/Documentation/ABI/testing/sysfs-devices-system-cpu +++ b/Documentation/ABI/testing/sysfs-devices-system-cpu @@ -495,6 +495,7 @@ Description: Information about CPU vulnerabilities "Not affected" CPU is not affected by the vulnerability "Vulnerable" CPU is affected and no mitigation in effect "Mitigation: $M" CPU is affected and mitigation $M is in effect + "Unknown" The kernel is unable to make a determination Details about the l1tf file can be found in Documentation/admin-guide/l1tf.rst -- 2.17.2