Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp880773imu; Fri, 4 Jan 2019 08:50:50 -0800 (PST) X-Google-Smtp-Source: ALg8bN6M2ifoZIeCx/ja9Hvnw0hNvwK3KvMuPCifmBSL/+xF5ZdzsUKAFW/D4Og9x+86GvOx+TH6 X-Received: by 2002:a63:5402:: with SMTP id i2mr2198806pgb.79.1546620650810; Fri, 04 Jan 2019 08:50:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546620650; cv=none; d=google.com; s=arc-20160816; b=aCDztQGKMh8yzIMRXsgXTX5mohv/RoiSCMYKf75wSnreqVN9a8gM+FDUKmQODgNFj9 JdkmUnO8vH1ydKPwB943B6QqJHh/MBs/4229SjcYqdwMpyvLe3NxRGud6fATWbQNuU7l iKiJ445PG5EGdUk0xGSyaK0vBrybLebVYxnHNC0txgJ/a4pPOnWXqgl35f/IFf/ylB4S NEKBsED2i+luXaj79JI+zzk5Vdkmetf+CpkgpwDr2ljXlsyF/haTs4lUm08LRm5UQuQU xFJllFipIgjvTbGwcNFs3dXBpGcsO294P/ChJn9uvZ0EQdwP5O4BBE1IWetpijN4YkYm AShA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=B94hslO2f6JZoi9iZ9HnMveAnMyps8RTUie4jx7A82Q=; b=qiEnFBrakwzkJfYD0aNs1/3380MJxQIGxIP5x+/o4QwELlRR0VZ13v7B+oD891aaI8 w1yH5evCzNbbvvDifxTd4MQVfxgSTo2hwZBiDjoEQxKuTUJxWN3L09Sbtu8w7ZjJ9ieA 7qV3xHTZM2+2v3TQix+ff6jcQMvqt3SUuZxXNoo2btNBDf9kagcvxD0eIqOeuaGhsURN H4/Yxg6xpxll0JKY3LMFQ8wsmT4O15CJFZPXMC9GmH7pvFdoTcJ/5Bw9cSgcVmClJNuN b7tIg/ikdRe8gREdAHPmKoG6hO9SJB5DWZT4gz/nFglBiE/GJ5ZS24owiNSlGvIbWdQy W6pw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cw1791Uk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v6si54524206pgv.277.2019.01.04.08.50.36; Fri, 04 Jan 2019 08:50:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cw1791Uk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727345AbfADOSK (ORCPT + 99 others); Fri, 4 Jan 2019 09:18:10 -0500 Received: from mail.kernel.org ([198.145.29.99]:45024 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726928AbfADOSJ (ORCPT ); Fri, 4 Jan 2019 09:18:09 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9751B208E3; Fri, 4 Jan 2019 14:18:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1546611488; bh=lvh/revn/Ntxo2/w0uYzO0T0Wis5FHhyYbshoEFusdA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=cw1791UkRLdC77XIzT6wQ2JVvIaXhrvUyiwU9L/9hx37uh2B7kXX1YvTF+/CHAsl+ TGKnu8tUJomrgNk1hNtAm9TQrvhTzr05iqf5dwyoRlqcs670BcIFHbt7btVFajlI0x OmAo+sGYGGpKBuB6RSYrGQ2iZ2ET2DiGzqW2yFko= Date: Fri, 4 Jan 2019 15:18:05 +0100 From: Greg Kroah-Hartman To: Dave Martin Cc: Jeremy Linton , mark.rutland@arm.com, David Woodhouse , mlangsdo@redhat.com, "Rafael J . Wysocki" , Konrad Rzeszutek Wilk , suzuki.poulose@arm.com, marc.zyngier@arm.com, catalin.marinas@arm.com, Dave Hansen , julien.thierry@arm.com, will.deacon@arm.com, linux-kernel@vger.kernel.org, steven.price@arm.com, Peter Zijlstra , Borislav Petkov , shankerd@codeaurora.org, ykaukab@suse.de, Thomas Gleixner , linux-arm-kernel@lists.infradead.org Subject: Re: [PATCH v2 1/7] sysfs/cpu: Add "Unknown" vulnerability state Message-ID: <20190104141805.GA15939@kroah.com> References: <20190103004921.1928921-1-jeremy.linton@arm.com> <20190103004921.1928921-2-jeremy.linton@arm.com> <20190103093858.GA10794@kroah.com> <20190103164831.GF14994@kroah.com> <20190104140832.GC3571@e103592.cambridge.arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190104140832.GC3571@e103592.cambridge.arm.com> User-Agent: Mutt/1.11.1 (2018-12-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jan 04, 2019 at 02:08:32PM +0000, Dave Martin wrote: > On Thu, Jan 03, 2019 at 05:48:31PM +0100, Greg Kroah-Hartman wrote: > > On Thu, Jan 03, 2019 at 10:38:16AM -0600, Jeremy Linton wrote: > > > On 01/03/2019 03:38 AM, Greg Kroah-Hartman wrote: > > > > On Wed, Jan 02, 2019 at 06:49:15PM -0600, Jeremy Linton wrote: > > > > > There is a lot of variation in the Arm ecosystem. Because of this, > > > > > there exist possible cases where the kernel cannot authoritatively > > > > > determine if a machine is vulnerable. > > > > > > > > Really? Why not? What keeps you from "knowing" this? Can't the > > > > developer of the chip tell you? > > > > > > There tends to be a few cases, possibly incomplete white/black lists, > > > > Then fix the lists :) > > > > > firmware that isn't responding correctly, or the user didn't build in the > > > code to check the mitigation (possibly because its an embedded system and > > > they know its not vulnerable?). > > > > If the firmware doesn't respond, that would imply it is vulnerable :) > > > > And if the code isn't built in, again, it's vulnerable. > > > > > I would hope that it is an exceptional case. > > > > Then have the default be vulnerable, don't give people false hope. > > > > > > > Rather than guess the vulnerability status in cases where > > > > > the mitigation is disabled or the firmware isn't responding > > > > > correctly, we need to display an "Unknown" state. > > > > > > > > Shouldn't "Unknown" really be the same thing as "Vulnerable"? A user > > > > should treat it the same way, "Unknown" makes it feel like "maybe I can > > > > just ignore this and hope I really am safe", which is not a good idea at > > > > all. > > > > > > I tend to agree its not clear what to do with "unknown". > > > > > > OTOH, I think there is a hesitation to declare something vulnerable when it > > > isn't. Meltdown for example, is fairly rare given that it currently only > > > affects a few arm parts, so declaring someone vulnerable when they likely > > > aren't is going to be just as difficult to explain. > > > > If you know it is rare, then you know how to properly detect it so > > "unknown" is not needed, correct? > > > > Again, "unknown" is not going to help anyone out here, please don't do > > it. > > Thinking about it, "unknown" is actually the common case. > > Kernels that predate the sysfs vulnerabilities interface effectively > report this for all vulnerabilities by omitting the sysfs entries > entirely. > > Current kernels also don't know anything about future vulnerabilities > that may be added in sysfs later on (but which may nevertheless be > discovered subsequently to affect current hardware). > > So, can we simply omit the sysfs entries for which we can't provide a > good answer? As you say, we already do this for older systems. But don't add new logic to explicitly not create the files just because we "can not figure it out". For those systems, I would default to "vulnerable" as I think that's what we do today, right? thanks, g reg k-h