Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp71671imu; Thu, 3 Jan 2019 14:19:17 -0800 (PST) X-Google-Smtp-Source: ALg8bN5e7oyRi/CfiZ8Z7IGILAW+TNoK1OhuavELzEEgNnKfYcFIyMQ4c0N1+jaJaVwdg4UAy3iB X-Received: by 2002:a17:902:7588:: with SMTP id j8mr49104451pll.215.1546553957225; Thu, 03 Jan 2019 14:19:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546553957; cv=none; d=google.com; s=arc-20160816; b=KVcz7rMVuTeexbAE5aYb1nG9sc95Yyq/Iqa9E6J5EfCZpcaSPArR8O3N1Kcufm62Ua EnKADsT5CHs+QUHd9+GLPmPWAjw47UgL2sQ7Y7H7GJPss1/QnRFJAUEM/ane+QZiIVeL sSc5/6mvIC/+aU5/OoHX4RoWFvb3nGgaxMpesTFfZGi7GF0u85jk2lXY3Y4Go4Bh92WP Irk0vZCqKdf93NP1gopEbckO8ICbZACCSQZwwbPitsqHJ2KH6kiA/a+gnZyOcpO7Lbgv x6irnLdtibKwL6C/pkeUWmBfw9oqVHJTAIXenNzWKfH4b0EF8nMF4ViIBn5oP5WMRaAB 1X8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=77G9uvnPsshtkiObM5F7gTDrIJDrM9vHhDk0J/XSIsw=; b=IF4hQ+Jl6SM6yZQGl5TypZhuDXYhAsn136eKbA2QulVTLoiAyhVzgJl4MUqmPHh+dw 283gyjMG/2ETvRp+Fmyz1NeLgWwGGUmBeixpQ7+kFGR3/38KXypkUcO3mMmiu6wWslBC F+DmzeQGoBo93PVk7wao+019mm7PULFFn/MX4gmT8hrtkwPXzxYgq5pucoLQl/ci+yTC kaAwsJCZCI+Y3wmJG8BVDJDPH2r0tnfERZJLFmQN4boA5EQaePu4HfSMVaP3l3BraPuX /wqymAN/AGE4gLSMGKma9OgHY1uScVMqtjuybi+PKvgUYjiXVKdhH8O6shnCgFMxpzif KswQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b17si21935757pgk.581.2019.01.03.14.18.58; Thu, 03 Jan 2019 14:19:17 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732316AbfACQiV (ORCPT + 99 others); Thu, 3 Jan 2019 11:38:21 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:52734 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729598AbfACQiU (ORCPT ); Thu, 3 Jan 2019 11:38:20 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0303315AD; Thu, 3 Jan 2019 08:38:20 -0800 (PST) Received: from [192.168.100.243] (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id BC3C43F5D4; Thu, 3 Jan 2019 08:38:18 -0800 (PST) Subject: Re: [PATCH v2 1/7] sysfs/cpu: Add "Unknown" vulnerability state To: Greg Kroah-Hartman Cc: linux-arm-kernel@lists.infradead.org, catalin.marinas@arm.com, will.deacon@arm.com, marc.zyngier@arm.com, suzuki.poulose@arm.com, dave.martin@arm.com, shankerd@codeaurora.org, mark.rutland@arm.com, linux-kernel@vger.kernel.org, ykaukab@suse.de, julien.thierry@arm.com, mlangsdo@redhat.com, steven.price@arm.com, Thomas Gleixner , "Rafael J . Wysocki" , Konrad Rzeszutek Wilk , Peter Zijlstra , Dave Hansen , Borislav Petkov , David Woodhouse References: <20190103004921.1928921-1-jeremy.linton@arm.com> <20190103004921.1928921-2-jeremy.linton@arm.com> <20190103093858.GA10794@kroah.com> From: Jeremy Linton Message-ID: Date: Thu, 3 Jan 2019 10:38:16 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <20190103093858.GA10794@kroah.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/03/2019 03:38 AM, Greg Kroah-Hartman wrote: > On Wed, Jan 02, 2019 at 06:49:15PM -0600, Jeremy Linton wrote: >> There is a lot of variation in the Arm ecosystem. Because of this, >> there exist possible cases where the kernel cannot authoritatively >> determine if a machine is vulnerable. > > Really? Why not? What keeps you from "knowing" this? Can't the > developer of the chip tell you? There tends to be a few cases, possibly incomplete white/black lists, firmware that isn't responding correctly, or the user didn't build in the code to check the mitigation (possibly because its an embedded system and they know its not vulnerable?). I would hope that it is an exceptional case. > >> Rather than guess the vulnerability status in cases where >> the mitigation is disabled or the firmware isn't responding >> correctly, we need to display an "Unknown" state. > > Shouldn't "Unknown" really be the same thing as "Vulnerable"? A user > should treat it the same way, "Unknown" makes it feel like "maybe I can > just ignore this and hope I really am safe", which is not a good idea at > all. I tend to agree its not clear what to do with "unknown". OTOH, I think there is a hesitation to declare something vulnerable when it isn't. Meltdown for example, is fairly rare given that it currently only affects a few arm parts, so declaring someone vulnerable when they likely aren't is going to be just as difficult to explain.