Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp547770imu; Wed, 16 Jan 2019 03:37:33 -0800 (PST) X-Google-Smtp-Source: ALg8bN5oM/Ma8fpeVBkf7/4n6DOSU5yIn/CsSv/ipXqith1AtNm6/IrFJCsQvCL1hJI0XE/2K5ny X-Received: by 2002:a62:3811:: with SMTP id f17mr9508953pfa.206.1547638653183; Wed, 16 Jan 2019 03:37:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547638653; cv=none; d=google.com; s=arc-20160816; b=zlE6tqaiG1OR+PIFN0uPEWiwQJJscjTt09rayI92l2K9rxpdvZOqsV2fef7w3zWtA5 v0v3KmfQzL43DJjnU/GamK9AlvrSIh6Id9NlMVCuwsEqIJyLaRpR40RMRTdzIEwK0Bdw YJwJorsfUprki8zccgL/m8OmkIl8Zlb4jEmVaqjLvaWTAUn0BAr87CB5BNw0jJKLxUUE iNZXoBWzfbAobndAG5gXBUFafdxQWgpkM4tQZyJ6rRHmguY1zzS+0+sMmSXfy5ZVRbDl YzFCcENzkEuJh9u8bb42XMcUoWgWXnN+NSCxwi3RCvhs+IXZKLVLYLi3MBhJ67w6TRJT 0I8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:importance:content-transfer-encoding :mime-version:subject:references:in-reply-to:message-id:cc:to:from :date; bh=kuiYcWNbMOnbjYKvvymtKB0/AWuzSWngcJ5JOEQk3p4=; b=BSmIjfCB2s439kYk+9DhLK0hmfwJ6lR3ZrG86tsSK/aUVsk9VRP3VLDa7x3plrqrxU GqLXQ3TInFak7tQ3trZsPRVWXw5xXwsTfZPycDvFLg+1JMU+zcif2h76F1tiofUkPTid ZkGITeHeSekNxgQ+kcP3y0JTb46zyHktHPPMDV/1HrU7iZAmxSO6v/YL8iT35tArwkFZ N55ZfRXWH/bk1QSyrEKM2BcYpTpDm2sSRPWLR5NCXO6/oOWlHhcximWS604wl4lnoaMz ZCsDLV5Zgv9AruDu1ECF+Fsa5NQWzNs9u94iACGV1b26FTWSlh/D3+sv/OfvRIpsWf01 w05A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c7si950561plz.118.2019.01.16.03.37.17; Wed, 16 Jan 2019 03:37:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389511AbfAOTvH (ORCPT + 99 others); Tue, 15 Jan 2019 14:51:07 -0500 Received: from mout.kundenserver.de ([217.72.192.74]:57589 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728745AbfAOTvG (ORCPT ); Tue, 15 Jan 2019 14:51:06 -0500 Received: from oxbsltgw35.schlund.de ([212.227.220.134]) by mrelayeu.kundenserver.de (mreue107 [213.165.67.113]) with ESMTPSA (Nemesis) id 1MF45G-1gU2Gf1HnU-00FUB6; Tue, 15 Jan 2019 20:50:49 +0100 Date: Tue, 15 Jan 2019 20:50:48 +0100 (CET) From: Stefan Wahren To: Jeremy Linton , linux-arm-kernel@lists.infradead.org Cc: mlangsdo@redhat.com, suzuki.poulose@arm.com, marc.zyngier@arm.com, catalin.marinas@arm.com, julien.thierry@arm.com, will.deacon@arm.com, linux-kernel@vger.kernel.org, steven.price@arm.com, ykaukab@suse.de, dave.martin@arm.com, shankerd@codeaurora.org Message-ID: <884332236.499392.1547581848222@email.ionos.de> In-Reply-To: <20190109235544.2992426-1-jeremy.linton@arm.com> References: <20190109235544.2992426-1-jeremy.linton@arm.com> Subject: Re: [PATCH v3 0/7] arm64: add system vulnerability sysfs entries MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Priority: 3 Importance: Medium X-Mailer: Open-Xchange Mailer v7.8.4-Rev47 X-Originating-Client: open-xchange-appsuite X-Provags-ID: V03:K1:+elgm5XkOyevwG1T38e8l8G5/xrYrE/AXpRfEqSejzcD3j/tTTm garzisnzmfWhuxI9fmnIaajQLlzVYnxMcO0AY2FF/dKlnZWh9hutuKR7EBAd5hDw9DTCpLn fegPCon/vjdIEUSvcermSZENwTiBYEUuxAB5t5NyMAcfz/i33PfK1qt4Y4EkI78xYypQ+H3 GtqHjWakuhlgJsx6ww4hg== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:b3DnGGu1+C4=:2UWRM59ehu+mczGkpaQ3gd YHNZRq6Ct/0hKTjTli1v+A8LPw0c30Kh95XHcwWYROUOAmnfsZ2BnZBAxLQvZExdNGs/ie1Me njQEdv0/0FKimYnpl038AWAUEmxJzfOp63L2myVPKKCrND208EEkpIYJ0/MRXC7bFpXP74TAb UljjRH/QShwgZT9/cUd3uS7T5njU50hWUDbEPGk4eMojWfsgvHDagyI1Vh/JlKO/kOpAgnZKh +FT3GtB7Zr1eOxso6VjbakG1jcYEEkl0ojW5qFExKFXmzYm7FfzbgA15xL57BoIdJVUMMdVaZ B75tK9ZrLjB5TsqTyEHPOsKGehDDTX0wDXgSbw4PQ4GAv27Mg2F5tLbMrDu9nWbyJqwjjn6Gt nwXs+Q3kC1kaqRk+tZkd3DY0jgjH4rEcd9E+FbdE0HyHDjsKz5Ygv8Wz35xlEZlzDrhXPkc2l gkHAkxukLR8/SeyFKPv09KCnScMhxLabVS8SdN7fQ2DyD/KgOOMNxnGZn11kaTVfNc6gnK596 MIBxMPzid1S/+97Da9LyMKeZaaxFuduxvuHzG40m0RmSVEVhyTR/rQbMGr7Uilx9V+E3RuxG3 fMiUUZ+xgaXEvBP1Lf86N7PFNJNhJ6HN2Z+oPQHD0xfIUS1BMQ6Zthx+CT/p+/XFn7/tLDew1 l/S+yY8vn8pq37+eliX2oKIdKiAWBjZnr7nFWJtKC/om9m6YetHgNjXIQw2EaX+UbTVF/cCTM tI2leT43NDgQMr6FGvf4WP1XNNuV/YVgKadlfOeq/rLQyoJpLhjCXWZDA08= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Jeremy, > Jeremy Linton hat am 10. Januar 2019 um 00:55 geschrieben: > > > Arm64 machines should be displaying a human readable > vulnerability status to speculative execution attacks in > /sys/devices/system/cpu/vulnerabilities > > This series enables that behavior by providing the expected > functions. Those functions expose the cpu errata and feature > states, as well as whether firmware is responding appropriately > to display the overall machine status. This means that in a > heterogeneous machine we will only claim the machine is mitigated > or safe if we are confident all booted cores are safe or > mitigated. > i applied this v3 series and Marc's v2 series. Now i'm getting the following on a Raspberry Pi 3 B+ : meltdown:Not affected spec_store_bypass:Not affected spectre_v1:Mitigation: __user pointer sanitization So the entries l1tf and spectre_v2 disappeared. Stefan