Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3650882imu; Fri, 18 Jan 2019 14:24:45 -0800 (PST) X-Google-Smtp-Source: ALg8bN4LUjgMli0QpVCGRkbL0nzyEQKRj0injmQdyx+sDKmkdSwdC8Xgdh3SuSX70/d0houVXjEH X-Received: by 2002:a62:d448:: with SMTP id u8mr21036011pfl.105.1547850285375; Fri, 18 Jan 2019 14:24:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547850285; cv=none; d=google.com; s=arc-20160816; b=rPM+mTyyM+Oe4J112zk76ihSiwOmkUv22KVdUh4RZiIWPHeO+YPY8bFoZVtftaj2Hm VaWhpZT9zw+Vob7OPP7hA6SgulEqk7egrvFAkmB2NW0hoKEygb/f+XkaW30FP5T5zpL4 fQfsY2AojlHV57XtEINuQWZRvpCKJCdbKieqqWuElbHI5MYMYRzKPeP7RK/cMnxZkwMp RdApluXbcYR5jwLOSiy82opEmVLh/A+u2zUVyYKUS2iRMgIrHsWtrVqhYFgjuaSaiPYG gILvrJRVTzOoGB3xqyWIRnQaaN+qfxrl7KxzQQwivJ4tmlmnlKNVPiZhWS6MRiSPJn19 dZNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=TAaKVo6/zQcxVHFt5HBDqKJp8tt4bpWhpurYyfZ/cvw=; b=0tZ9oRdPWVMrTaMy/tqQFdMVrGsTzJzq78h+Md7v0EWizbNyXPCYtCyDFQ67TcK2bo /cpWGPq6oetQyE4eu0jf8tb9xUR9Rsjat+AkDghpEqREv1CxpslQt4hKOkM7/TU8z2GH tzztyWgTn63ZOwAik7+NsfLrd6Z3/hzgS0raJPvN6f9ZGXEwE59izGWhWv9Yn2CaP7MP vvfuvi2DSYo9OrSOcXUN8rAm7TW98C2y+Gy9zmVZkAd02H80I6eZsXDhJDJY3+LJk9xn oT+Dk2KQs8zR9siJEMRRe7qL0PPzkZ02wB3ZEvXaSI+fM2CQeSXc1tdSA5fty7nXCpEM S2uw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g34si5673810pld.15.2019.01.18.14.24.27; Fri, 18 Jan 2019 14:24:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729957AbfARWWS (ORCPT + 99 others); Fri, 18 Jan 2019 17:22:18 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:38932 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729892AbfARWWS (ORCPT ); Fri, 18 Jan 2019 17:22:18 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id EE51B80D; Fri, 18 Jan 2019 14:22:17 -0800 (PST) Received: from [192.168.100.241] (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 15E893F7BE; Fri, 18 Jan 2019 14:22:17 -0800 (PST) Subject: Re: [PATCH v3 0/7] arm64: add system vulnerability sysfs entries To: Stefan Wahren , marc.zyngier@arm.com Cc: mlangsdo@redhat.com, suzuki.poulose@arm.com, linux-arm-kernel@lists.infradead.org, catalin.marinas@arm.com, julien.thierry@arm.com, will.deacon@arm.com, linux-kernel@vger.kernel.org, steven.price@arm.com, ykaukab@suse.de, dave.martin@arm.com, shankerd@codeaurora.org References: <20190109235544.2992426-1-jeremy.linton@arm.com> <884332236.499392.1547581848222@email.ionos.de> <575913854.422488.1547834735236@email.ionos.de> From: Jeremy Linton Message-ID: <3af70b49-22e7-f394-1b35-ce3c86640bb7@arm.com> Date: Fri, 18 Jan 2019 16:22:16 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <575913854.422488.1547834735236@email.ionos.de> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/18/2019 12:05 PM, Stefan Wahren wrote: > Hi, > >> Jeremy Linton hat am 15. Januar 2019 um 22:21 geschrieben: >> >> >> Hi, >> >> On 01/15/2019 01:50 PM, Stefan Wahren wrote: >>> Hi Jeremy, >>> >>>> Jeremy Linton hat am 10. Januar 2019 um 00:55 geschrieben: >>>> >>>> >>>> Arm64 machines should be displaying a human readable >>>> vulnerability status to speculative execution attacks in >>>> /sys/devices/system/cpu/vulnerabilities >>>> >>>> This series enables that behavior by providing the expected >>>> functions. Those functions expose the cpu errata and feature >>>> states, as well as whether firmware is responding appropriately >>>> to display the overall machine status. This means that in a >>>> heterogeneous machine we will only claim the machine is mitigated >>>> or safe if we are confident all booted cores are safe or >>>> mitigated. >>>> >>> >>> i applied this v3 series and Marc's v2 series. >>> >>> Now i'm getting the following on a Raspberry Pi 3 B+ : >>> >>> meltdown:Not affected >>> spec_store_bypass:Not affected >>> spectre_v1:Mitigation: __user pointer sanitization >>> >>> So the entries l1tf and spectre_v2 disappeared. >> >> Yes, the l1tf entry should be gone. >> >> I believe there is a problem with the "1/2 advertise.." patch in that >> the 'arm64_requested_vuln_attrs |=' line needs to be hoisted to the top >> of check_branch_predictor() and the '__spectrev2_safe = false' line >> needs to be hoisted 6 lines immediately above "/* Fallback to firmware >> detection*/" > > a snippet or a new version would be nice Sure, I've got another version, to be posted soon (probably Tue of next week). In the meantime, Marc's tree should work with the following fix: diff --git a/arch/arm64/kernel/cpu_errata.c b/arch/arm64/kernel/cpu_errata.c index b44f87e7360d..7cfd34b2c0e5 100644 --- a/arch/arm64/kernel/cpu_errata.c +++ b/arch/arm64/kernel/cpu_errata.c @@ -286,11 +286,15 @@ static int detect_harden_bp_fw(void) } #endif /* CONFIG_HARDEN_BRANCH_PREDICTOR */ +#if defined(CONFIG_ARM64_SSBD) || \ + defined(CONFIG_GENERIC_CPU_VULNERABILITIES) +static bool __ssb_safe = true; +#endif + #ifdef CONFIG_ARM64_SSBD DEFINE_PER_CPU_READ_MOSTLY(u64, arm64_ssbd_callback_required); int ssbd_state __read_mostly = ARM64_SSBD_KERNEL; -static bool __ssb_safe = true; static const struct ssbd_options { const char *str; @@ -569,6 +573,8 @@ check_branch_predictor(const struct arm64_cpu_capabilities *entry, int scope) WARN_ON(scope != SCOPE_LOCAL_CPU || preemptible()); + arm64_requested_vuln_attrs |= VULN_SPECTREV2; + /* If the CPU has CSV2 set, we're safe */ if (cpuid_feature_extract_unsigned_field(read_cpuid(ID_AA64PFR0_EL1), ID_AA64PFR0_CSV2_SHIFT)) @@ -578,17 +584,17 @@ check_branch_predictor(const struct arm64_cpu_capabilities *entry, int scope) if (is_midr_in_range_list(read_cpuid_id(), spectre_v2_safe_list)) return false; + __spectrev2_safe = false; + /* Fallback to firmware detection */ need_wa = detect_harden_bp_fw(); if (!need_wa) return false; - __spectrev2_safe = false; - if (need_wa < 0) pr_warn_once("ARM_SMCCC_ARCH_WORKAROUND_1 missing from firmware\n"); - arm64_requested_vuln_attrs |= VULN_SPECTREV2; + return (need_wa > 0); }