Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp150762imu; Thu, 3 Jan 2019 16:13:12 -0800 (PST) X-Google-Smtp-Source: AFSGD/USmK88OQJrzT+WMsdSCS+LXH/qa2cC6I4kCta4w3Mo4Bt1Y9X8mkyUEL80EY36uw2FS3OL X-Received: by 2002:a62:1a44:: with SMTP id a65mr51125377pfa.30.1546560792342; Thu, 03 Jan 2019 16:13:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546560792; cv=none; d=google.com; s=arc-20160816; b=oLzRoXr35nTHZDxYzFKK9YyMufGaBnuLhbgjuXDl7SgI0ycMJ6mGdY0ssp0biimefO xhhTHprVVSgBrGWzdEaZdxGo02Y1seqogHE+PMxv7SUPgjMm3LfF6z0OOBHe4RpNVWBN 9XENyW87BSoVNqRGDCoHAJXN/c3uV9DZS/iPpB0D1BiO702OX6Woz9hl5MuQlD1VaaCU /Bs5xb2QqgZmYhhWv3tIEqRklYUGoIAYbZTGDxQiQENOdemfE5RRXbgK9I13TdSeukrT NZqFQWkB+/ioecf4g2i9ocfJq0SEsGVGElL3xRV+A/JJPSG+zTHko2BS1Sn1hY+D4IW1 CSlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:importance:content-transfer-encoding :mime-version:subject:references:in-reply-to:message-id:cc:to:from :date; bh=w8lUY/2xY7FSrefl6U/aoUHMpSHqd5CkQNihzmNP22w=; b=BdlixEYmh6fjnTd5i5fNohX4e7M41hg3p4KYohDC2VGB0mfhGLeqszCFBdKHvXM6wH LtopR243E+HF6pkknuY3aQga1zhc9ZrS4gpAkkEPYAIroWLZ5glkVyQ+zUzuTZM0rysi BXzZUAINZNB8S7jcOtf1u2iyQLyGCMsiexnhFS3eGSBSWS+AJPFUJXknIjN7c/IaEJBu WU8EPgwy3Fwh6IgMG9MeNXAOA5pQHN99/pdpMC0b2odQyuwMesxLCIlJWzCn8AKeAd7D EVv1cVwuYr19tbDs2bxSiQEsrmGhuDVSu5Ir1fC9syLXTUVXZRL1Fk6+qMo8Dmf9eX+1 bJMw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u11si7486100plq.287.2019.01.03.16.12.57; Thu, 03 Jan 2019 16:13:12 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727307AbfACTav (ORCPT + 99 others); Thu, 3 Jan 2019 14:30:51 -0500 Received: from mout.kundenserver.de ([212.227.126.187]:47217 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726813AbfACTau (ORCPT ); Thu, 3 Jan 2019 14:30:50 -0500 Received: from oxbsltgw35.schlund.de ([212.227.220.134]) by mrelayeu.kundenserver.de (mreue011 [213.165.67.97]) with ESMTPSA (Nemesis) id 1M1q8m-1gcwpb3SFE-002GgX; Thu, 03 Jan 2019 20:30:07 +0100 Date: Thu, 3 Jan 2019 20:30:06 +0100 (CET) From: Stefan Wahren To: Jeremy Linton , Dave Martin Cc: mark.rutland@arm.com, julien.thierry@arm.com, mlangsdo@redhat.com, Konrad Rzeszutek Wilk , suzuki.poulose@arm.com, marc.zyngier@arm.com, catalin.marinas@arm.com, "Rafael J . Wysocki" , will.deacon@arm.com, linux-kernel@vger.kernel.org, steven.price@arm.com, shankerd@codeaurora.org, Dave Hansen , Peter Zijlstra , Borislav Petkov , David Woodhouse , Greg Kroah-Hartman , ykaukab@suse.de, Thomas Gleixner , linux-arm-kernel@lists.infradead.org Message-ID: <1951199845.271163.1546543806398@email.ionos.de> In-Reply-To: References: <20190103004921.1928921-1-jeremy.linton@arm.com> <20190103004921.1928921-2-jeremy.linton@arm.com> <20190103163740.GC3529@e103592.cambridge.arm.com> Subject: Re: [PATCH v2 1/7] sysfs/cpu: Add "Unknown" vulnerability state MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Priority: 3 Importance: Medium X-Mailer: Open-Xchange Mailer v7.8.4-Rev47 X-Originating-Client: open-xchange-appsuite X-Provags-ID: V03:K1:yKSS8p5egjlaMhfhDeQJPIdcmGhd5xl+oENISsah/WG0MujPa2h LiJMMCQfW6PJ7Eqb6eOi9GIn0PtuqJuNzQe+lzjg8s7o+Kxv+fchFK4zeE5rWaRNBXs3WHb twJVYOfDA8BNqd0LJCGuflSdsIvfhsrOAq2FzC0PW4K3DmSrH1AmZd51HDxqM5ItLJGjsKm igvqWwly+YzfdmD1huaQA== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:pW995/OWosI=:4S/PKYyQXhoWhzTuLBtOvm 4i82PGUuiX8qrxniqMs0zyhWzTTXvBZV5beXckYtn9X9/DM9caKtF1mMCXcQr95kDuosZj/HQ VyWTe7QGvbKjziZXFvxdgq/xDtgjczTeN5LTiy4zvOsfvZ9Pq7h9YhTb5hX2UI99b6BevZ9I2 8eIbuQ/GWIFaaky/macSzOPqoNj/tqG+wfCrdDRZCqFpL+N16YjLR0umKQIfkntKYipLJCeDz z8WH51ps2dNVU6rZFxWSDPnVJ99JEmqvEFnKkre+i31wC4qxTelrxn1aDKE/hCGtKQl0bykNj C+Em/5Z+fY0q5ov33Jm7qyyatgXvO2EXy33zgs/64Hb/3wt0fdnFVAsHq9d6jIT45wuVbBAeV TivN1+XinOOAe5N1z3JcvReq5UzMtRNmhOwldRVG5GCp6CeUwNwMWW2qQQmabI5MVGc7/5qlZ 81K1ZaT73S5GynEZEAdlDgQn+cEApsAj5b7+CGb5zfFh8HsJIOf0Fld8H+Pdh2GTS1hM+mI55 f0arSTJ2RdG2WOPqA8sRLkkKuB2q1IgL1f0Bp2w9AH/P1vRhBxwJfZLTsRAykwAxnIqfqyp/3 1I8VlEKdXcsTSMuq1E45tuVSQjHozQmd+zC27LmR9TZY7ki5AcdQTM3nvavy3OaBe647NSPtT 9WNJBjhnLIo8ifxd5PVT9IIuWVcjdXAkArcpCGXON4KGZT1FJvPJ32VrLqqRhs5/afdf0gypP qRIP3DFW3j565ctOIw6cr6y31zGnwkcjUbhPFsrWdf4SC1jjEeg4MWNARRo= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Jeremy, > Jeremy Linton hat am 3. Januar 2019 um 17:46 geschrieben: > > > Hi, > > On 01/03/2019 10:37 AM, Dave Martin wrote: > > On Wed, Jan 02, 2019 at 06:49:15PM -0600, Jeremy Linton wrote: > >> There is a lot of variation in the Arm ecosystem. Because of this, > >> there exist possible cases where the kernel cannot authoritatively > >> determine if a machine is vulnerable. > >> > >> Rather than guess the vulnerability status in cases where > >> the mitigation is disabled or the firmware isn't responding > >> correctly, we need to display an "Unknown" state. > >> i applied your patch series on linux-next-20190103. On my Raspberry Pi 3B+ (defconfig) i'm getting this from sysfs: l1tf:Not affected meltdown:Not affected spec_store_bypass:Unknown spectre_v1:Mitigation: __user pointer sanitization spectre_v2:Unknown AFAIK it has 4 Cortex-A53 cores (no PSCI firmware), so shouldn't be affected. How can this be fixed? Thanks Stefan