Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp651212imu; Wed, 16 Jan 2019 05:27:35 -0800 (PST) X-Google-Smtp-Source: ALg8bN65gBAlTtRRNObsitMaFr/uVGfexeRkGijiCWa2/Z0aoqVRYJYV24c3sl/m072Up6bC5bMw X-Received: by 2002:a63:6cc:: with SMTP id 195mr8863497pgg.401.1547645255167; Wed, 16 Jan 2019 05:27:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547645255; cv=none; d=google.com; s=arc-20160816; b=K5d/2yoUwv1KcRye4I1k9pojj9IYfd/ZEC2CpUnIqhLgpozPq8UyGMiMMf2loTocmB bNiW6T59lRwbd3vmwe3R2IymFuGl9SgkteVQHbNbymg3Yo6m8I/6pZtZ7n+WLPYN28ov K0HTVdQ8vk1llR/31xRclImrOt1yPwd3A+7Q4yl50wCau1SCnS8MG+/UiDKadm6iwhsN s3bQHZKU8Dm6n/AAql+TLknFR85qpYigwCGE/Rq6ahTa4vBdx7q7C/xt+oOU7pPiDcon qUnP/T9UU3CRnI6Wxm/fTak+ztPOqfYAACf2LvAwQDoVpa7p3fbr08KFJd+MV8gv0Zab rc3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=msKvFKujJnLLha/UjZsm4APvfwSYrAF/2SnfXAzLvww=; b=sSRVDmaSaJUS2BDMGEkreISceskmWgS43ry8gfh7GwVs43uy9QiQIUl9tA4LfJ/Bhg EdYCWTH96QzEDBgI5j0/PK/aa/VgJvOKsN5jbGb/pZ3bOv6ej6jG6pNU/9Op2xVxlctp BCR0h3kKXG+O6jpp5x//pRExoLYKKBkfGK9dTFzY32jzCafmB8piCwTOILsAgFV1lYPx IGv73zCePpi8gUub6niNOvEDtwMfd1gqghC06/LdpC46v743JPhYTnMnzTrgQyZok+18 VDSspqpKTMxUPgeHsQqR7B/x/WjtvjjIGSbxDWq7rRlz7mU4626dqZgk4Z0+2ytdIqFh 6f+g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t136si6853084pfc.262.2019.01.16.05.27.19; Wed, 16 Jan 2019 05:27:35 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390357AbfAOVVt (ORCPT + 99 others); Tue, 15 Jan 2019 16:21:49 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:34748 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733166AbfAOVVs (ORCPT ); Tue, 15 Jan 2019 16:21:48 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 23CF780D; Tue, 15 Jan 2019 13:21:48 -0800 (PST) Received: from [192.168.100.241] (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 9F6683F917; Tue, 15 Jan 2019 13:21:46 -0800 (PST) Subject: Re: [PATCH v3 0/7] arm64: add system vulnerability sysfs entries To: Stefan Wahren , linux-arm-kernel@lists.infradead.org Cc: mlangsdo@redhat.com, suzuki.poulose@arm.com, marc.zyngier@arm.com, catalin.marinas@arm.com, julien.thierry@arm.com, will.deacon@arm.com, linux-kernel@vger.kernel.org, steven.price@arm.com, ykaukab@suse.de, dave.martin@arm.com, shankerd@codeaurora.org References: <20190109235544.2992426-1-jeremy.linton@arm.com> <884332236.499392.1547581848222@email.ionos.de> From: Jeremy Linton Message-ID: Date: Tue, 15 Jan 2019 15:21:44 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <884332236.499392.1547581848222@email.ionos.de> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On 01/15/2019 01:50 PM, Stefan Wahren wrote: > Hi Jeremy, > >> Jeremy Linton hat am 10. Januar 2019 um 00:55 geschrieben: >> >> >> Arm64 machines should be displaying a human readable >> vulnerability status to speculative execution attacks in >> /sys/devices/system/cpu/vulnerabilities >> >> This series enables that behavior by providing the expected >> functions. Those functions expose the cpu errata and feature >> states, as well as whether firmware is responding appropriately >> to display the overall machine status. This means that in a >> heterogeneous machine we will only claim the machine is mitigated >> or safe if we are confident all booted cores are safe or >> mitigated. >> > > i applied this v3 series and Marc's v2 series. > > Now i'm getting the following on a Raspberry Pi 3 B+ : > > meltdown:Not affected > spec_store_bypass:Not affected > spectre_v1:Mitigation: __user pointer sanitization > > So the entries l1tf and spectre_v2 disappeared. Yes, the l1tf entry should be gone. I believe there is a problem with the "1/2 advertise.." patch in that the 'arm64_requested_vuln_attrs |=' line needs to be hoisted to the top of check_branch_predictor() and the '__spectrev2_safe = false' line needs to be hoisted 6 lines immediately above "/* Fallback to firmware detection*/" That should re-enable the spectre_v2 entry.