Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3425589imu; Fri, 18 Jan 2019 10:08:41 -0800 (PST) X-Google-Smtp-Source: ALg8bN5rjMMraE+mxeFzEnNqm6Z5VgLU2/93+c1gin8WVlEd06zICQeZ1KH3e8LC8jju/LA58dwe X-Received: by 2002:a63:d157:: with SMTP id c23mr18583134pgj.170.1547834921419; Fri, 18 Jan 2019 10:08:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547834921; cv=none; d=google.com; s=arc-20160816; b=br7uOkD8m6Uo+ri8oc/BAHqaUHTqhkPCMJaF6KUPlGtlnRLzyDuBL8DjQry4H4TUv7 kccwKsVlkl85EGu/9VdeRSQFjlHPrf2sETj/coVXGKCfMdHkCj10Tm8G+gOi2bipgzeG rGNF90nVLg+XLF5j+Nxl9WkWlt1+maetyFYcyc3MG6FhnH5vF12KW2m0yYsiIG3RCgX3 quwLd6BEC4tBj7oRwdhvTAQP4ojEyBfII9Je4eBp3Z/yelntw0znyeOuw60Op0hxDu7V zzcNf3IpPmrhcSdG4K6QI9BzYrc76NdRlIy71tq+cmHExN0uGQnWzZAwnjlQ95OmeDlB pJDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:importance:content-transfer-encoding :mime-version:subject:references:in-reply-to:message-id:cc:to:from :date; bh=Qbxz1NEXmirggvdl80Nt4/GgNnl8HcZHAR8g7yk2iGY=; b=msiO67NVfX4ODsoQ1drocrzVsQXv26qbYL+ZpaEbI7AGiDsoWxjE1SrG1iX1JsQ0OC Y2xHiR8GomSc9lj9x68WoeSkW7cK7jYDTrgpO1McNwUlgYTkMK7mmByN5UUsXuRoQLll QDlo2t7XXvl8J+b41sYwkyr2laZQEE8WjpfRpsK7AuU5h3A5OLDxDZxF1RGF2XIoYc6s Fw9LR0tUGNyuQewCH2C0ahK99ULXuwZs/+8GgGko0L0ukGAg8t+q7aQwcKso/TQqTOkB fa+vJf/FY42UiLigOAut+YoA2IrgenAV57Y1p1L1hdo8bptnAfAXS29UhWV9l3SMQQyu BCvQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h69si5134430pge.121.2019.01.18.10.08.23; Fri, 18 Jan 2019 10:08:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728916AbfARSFx (ORCPT + 99 others); Fri, 18 Jan 2019 13:05:53 -0500 Received: from mout.kundenserver.de ([217.72.192.74]:35349 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728822AbfARSFw (ORCPT ); Fri, 18 Jan 2019 13:05:52 -0500 Received: from oxbsltgw66.schlund.de ([212.227.220.204]) by mrelayeu.kundenserver.de (mreue106 [213.165.67.113]) with ESMTPSA (Nemesis) id 1MxEYY-1h8x5s34zQ-00xZ54; Fri, 18 Jan 2019 19:05:36 +0100 Date: Fri, 18 Jan 2019 19:05:35 +0100 (CET) From: Stefan Wahren To: Jeremy Linton , marc.zyngier@arm.com Cc: mlangsdo@redhat.com, suzuki.poulose@arm.com, linux-arm-kernel@lists.infradead.org, catalin.marinas@arm.com, julien.thierry@arm.com, will.deacon@arm.com, linux-kernel@vger.kernel.org, steven.price@arm.com, ykaukab@suse.de, dave.martin@arm.com, shankerd@codeaurora.org Message-ID: <575913854.422488.1547834735236@email.ionos.de> In-Reply-To: References: <20190109235544.2992426-1-jeremy.linton@arm.com> <884332236.499392.1547581848222@email.ionos.de> Subject: Re: [PATCH v3 0/7] arm64: add system vulnerability sysfs entries MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Priority: 3 Importance: Medium X-Mailer: Open-Xchange Mailer v7.8.4-Rev47 X-Originating-Client: open-xchange-appsuite X-Provags-ID: V03:K1:ZoURWHSIlPpYkd2EnWsFsQ8SWv7CpPvZNTMHt3wz4UaeaNhZEzy iOxccCipZ7wm6wnJigp1k7fjQ/OlSNWmcFbQ1tv9x4nZldlWSLYK9BH8HiG8YYrBq9qrkRy mq26uzJRV5RmsCaC1AvbuiVLReROd831julPROi4BzrS0glCoJCud/CBXrfNBJXDOUwrIHO bff2QxmS9bCKRRNhFgnqA== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:31AmI8rdDIA=:pxW8TEtyU2nbIAidssiwFi YMzQ4SGC9vu8nYoFOEsnvBQcyAbiXYtoupCbhexv/xnMgXO3w6ndIB7iwjcL1oYv2sCVpxW2O qwyqslyuCVjY3GdyjZkmryCZx/Sa6OqMaAmd3ILL9RiwxOfs6M805K7IRLEpICCfGcxYRyT30 N95+/tP41X72suqOGnJ5z+KaRRYHfHQKC85Hu/jlCWF6rWmRlao7WrboLRyx6gibTi0S2MkRX XS1Cpo7/+xloCxcQwDEO399e1VKIXp7lYn+zBpEf7qfDlPgyAbAscMvhw7Yme5kCET+2W2Pcv JLKu4TDsrF+ehYgrS7w/+k1dpifsqecntIgNlyN4+b6xVGo4q+uXjHTf5JG7d04AX0s5k4Zmi Nm+7Cvp0S55+00k+GBXtHkXMecWh9Oqgl+aUPgmuh8ptISkp6vAXLIM8Nau3fCHg6ZlbZik5k kKarDXnMOx0IcPs0ILhskBRWLJWw2ibfCRJSHf4i4Y3t8H10iXa6KuPndMknt7zZZ4lxQWCtS q495UWDGsJC1iKHVyvMM2Pmbcq+pBj9Mv6lwCu5blPZ8l6Fb1GRLeIpCPxXMszv7hLF61oFv4 e3jNRJ7i4A/qPcmBQzd7B/mt+uYsdEbhMw17ucUSzAejeUqa3vW4vGWKmpWNqIuHCvYup7KVS GJmbb3CybBRh55jfH4jsO0Kvb/fsS2Q4vC+iizSxaW0nEUeudLvIQ8Uc4PVSi6v22uspEY/Kj 1PbNSvwNfuVh8Y0O5ZbbfrC8cUzOblJHDTLd2PHSuV+KC2sAsoles5LKKec= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, > Jeremy Linton hat am 15. Januar 2019 um 22:21 geschrieben: > > > Hi, > > On 01/15/2019 01:50 PM, Stefan Wahren wrote: > > Hi Jeremy, > > > >> Jeremy Linton hat am 10. Januar 2019 um 00:55 geschrieben: > >> > >> > >> Arm64 machines should be displaying a human readable > >> vulnerability status to speculative execution attacks in > >> /sys/devices/system/cpu/vulnerabilities > >> > >> This series enables that behavior by providing the expected > >> functions. Those functions expose the cpu errata and feature > >> states, as well as whether firmware is responding appropriately > >> to display the overall machine status. This means that in a > >> heterogeneous machine we will only claim the machine is mitigated > >> or safe if we are confident all booted cores are safe or > >> mitigated. > >> > > > > i applied this v3 series and Marc's v2 series. > > > > Now i'm getting the following on a Raspberry Pi 3 B+ : > > > > meltdown:Not affected > > spec_store_bypass:Not affected > > spectre_v1:Mitigation: __user pointer sanitization > > > > So the entries l1tf and spectre_v2 disappeared. > > Yes, the l1tf entry should be gone. > > I believe there is a problem with the "1/2 advertise.." patch in that > the 'arm64_requested_vuln_attrs |=' line needs to be hoisted to the top > of check_branch_predictor() and the '__spectrev2_safe = false' line > needs to be hoisted 6 lines immediately above "/* Fallback to firmware > detection*/" a snippet or a new version would be nice > > That should re-enable the spectre_v2 entry.