Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4167219imu; Sat, 19 Jan 2019 03:54:24 -0800 (PST) X-Google-Smtp-Source: ALg8bN6gfWxi13WhzDTkVJREs00pQ5Hcz7dW9dSCQmz3ZhG6x69dAd+cR6Ew+9yOx5plgzlqB4mw X-Received: by 2002:a63:4002:: with SMTP id n2mr21168758pga.137.1547898864869; Sat, 19 Jan 2019 03:54:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547898864; cv=none; d=google.com; s=arc-20160816; b=kkZmqqdaWMwD+2ag0dFfk+W3IPLoNF2EZWRfkyKtlfRYkqGsKo8QD7AhtMNdoBVdyo BuwJ6/GJzH0ifHvxSuutF4ryaQnKm6Gmw02qu/03Im1Ox0E8MgzyOabnuNGQRl+HkhXw jQwiavGCuZQAZ4YcavG8ZXzdf+mbicHrdgLGfKLiKBhvekEvMsF6TkHZW7TMBzUNnwLn 4e068FiWJ073fWPtsPQKAru+bu3kdxaV+UEtAIidpahlDIembeu2hznOTF7GKm5Hm1e1 eDWP223WsRjIQuamZYGcxz/WeykCpKFJFtjXuDuV6w+Ry/h7Po9ZQa6R0ucF593/cSg8 /c3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:importance:content-transfer-encoding :mime-version:subject:references:in-reply-to:message-id:cc:to:from :date; bh=Rw52lqG0zx9M/AtuvLbfETTL34B2pNn7BK4hKvMnllo=; b=Z7nEWTiyxINK88eMXigxighOQI8H/VUTfF3jPHZVaTFTCgynHp9gWGfQVD52Y9XB0H mDZPZA3cp8GvsdT/nnvA27dJmuYUZLRM4ChU/qfsjT3uasTiMgAh89AT7EWsihYK1U7E HbGbIyOBXo9tjaS5Vnok7bbWPHcW+qOTETO98NdDz3dOZ780oyk1NidcGkvxDfrI61NL pIsdo2UlfbnGPSHCg9nQpuz4MgenXtaXaBpt6P6OOPJjxGlNqnEEUmIlwfda811ZkhnF 6CIeyf4KnpYkpHKwfW+wthCQOIc47PpUTjx1NUWX0443W3TWi1EBIjyvVAdAXNbgLX+R Il5w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d8si7247273pgl.386.2019.01.19.03.54.04; Sat, 19 Jan 2019 03:54:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727954AbfASLwm (ORCPT + 99 others); Sat, 19 Jan 2019 06:52:42 -0500 Received: from mout.kundenserver.de ([212.227.126.134]:44649 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727879AbfASLwm (ORCPT ); Sat, 19 Jan 2019 06:52:42 -0500 Received: from oxbsltgw64.schlund.de ([212.227.220.202]) by mrelayeu.kundenserver.de (mreue009 [213.165.67.97]) with ESMTPSA (Nemesis) id 1MDhpf-1gtvRd3XRn-00Aq7B; Sat, 19 Jan 2019 12:52:26 +0100 Date: Sat, 19 Jan 2019 12:52:25 +0100 (CET) From: Stefan Wahren To: Jeremy Linton , marc.zyngier@arm.com Cc: mlangsdo@redhat.com, suzuki.poulose@arm.com, linux-arm-kernel@lists.infradead.org, catalin.marinas@arm.com, julien.thierry@arm.com, will.deacon@arm.com, linux-kernel@vger.kernel.org, steven.price@arm.com, ykaukab@suse.de, dave.martin@arm.com, shankerd@codeaurora.org Message-ID: <247598924.444809.1547898745403@email.ionos.de> In-Reply-To: <3af70b49-22e7-f394-1b35-ce3c86640bb7@arm.com> References: <20190109235544.2992426-1-jeremy.linton@arm.com> <884332236.499392.1547581848222@email.ionos.de> <575913854.422488.1547834735236@email.ionos.de> <3af70b49-22e7-f394-1b35-ce3c86640bb7@arm.com> Subject: Re: [PATCH v3 0/7] arm64: add system vulnerability sysfs entries MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Priority: 3 Importance: Medium X-Mailer: Open-Xchange Mailer v7.8.4-Rev47 X-Originating-Client: open-xchange-appsuite X-Provags-ID: V03:K1:CCXtxrzf1TbPqLsEu/M0bGh9ETIUU9N9SsbCEctrj3/5F7N+aZM +iO/2hGPcxNODcOq2d+7K+PPYueDvGVJEsfx560xC5f2VJIOOQa1atNDbQ7dyNXMXVNWGZG LlmidxhUiKocXLe9U/VoZJM3ckJ9EvobOSZDJZIC4GpQ+AMQ0Isl2yhyMNlHnZiMTr3gihB FzggT5aTXvQVSDc/e6vQA== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:Qt0HaB/TrSc=:L3y0w8w8P8Le3F6TGPpMJF zqjqB6SdBvax+nsmjUj6Kw+TXOXaXg12OZGl4OwEXig8suvQSy+eKNn+ZAkwpIi5PxLjkLNqZ Ur/f28AEaqKD8I6rkMRe8YHmmnOFPwtd/fwg3cZJS/K0Pr4Jyyi9JBruHHtchgre4iAr0CPry JaWwHpWLn06WLTX9Xa2xauQsAuu/P8PBDPUoUAWl/kBN7JcL2FDLyO2fuIjAqJYqNCEI/Nk6J dB8qjfxeqydnXwRr8CE2PckObw4ZYfBTL71rBJOHUc/FiRD3/5RC/B7qgLJwRSJrVj5iF8nPn WYqiImBmfHoH2yph9J9CKj57CHfdGQhKsuwrSSNWt3D1IxVzXx9vjxRpIpgkpTkHhrO/8U2y3 1PbH1Wf5kxCMSNhGlHffJZknKUGMxtCRM8+AXFPQH/pJouBkjbDNs2P0H+XTl2hYuesQnf2gf i/HoFc1Llpx81/EI2xbdxZUFp+piplC0s2EkWhhkrIRBNO5QitkrNJLmSF+bj9ff3ecaONhyn evgy9ycn2WQohqZUxMUzXh4NU/0mdwLbm8P+4gZHqoizsposdlxDpJOMAc+wJvOh72ME9Wqdu bsOeg+dpBAdeybn2nzN6Q+Z4b8Yhi8S+JE5bRiKfohoaD5a296VvcHZlRsETm3WCC01E6gBng 0p0TJH5NIx6Dv2EIgPIoRZJYZJawTEAb7guXAF/ZLbQMXd8apF4yhxZB+ky6sF9eYeVqj/NaE f1BiJsQmIkX7RqIghvB2ssO0ebPoCbKZYhg6zjS/rxYJwcJRbMgc9HWL1/U= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > Jeremy Linton hat am 18. Januar 2019 um 23:22 geschrieben: > > > On 01/18/2019 12:05 PM, Stefan Wahren wrote: > > Hi, > > > > ... > > > > a snippet or a new version would be nice > > Sure, I've got another version, to be posted soon (probably Tue of next > week). > > In the meantime, Marc's tree should work with the following fix: > > diff --git a/arch/arm64/kernel/cpu_errata.c b/arch/arm64/kernel/cpu_errata.c > index b44f87e7360d..7cfd34b2c0e5 100644 > --- a/arch/arm64/kernel/cpu_errata.c > +++ b/arch/arm64/kernel/cpu_errata.c > @@ -286,11 +286,15 @@ static int detect_harden_bp_fw(void) > } > #endif /* CONFIG_HARDEN_BRANCH_PREDICTOR */ > > +#if defined(CONFIG_ARM64_SSBD) || \ > + defined(CONFIG_GENERIC_CPU_VULNERABILITIES) > +static bool __ssb_safe = true; > +#endif > + > #ifdef CONFIG_ARM64_SSBD > DEFINE_PER_CPU_READ_MOSTLY(u64, arm64_ssbd_callback_required); > > int ssbd_state __read_mostly = ARM64_SSBD_KERNEL; > -static bool __ssb_safe = true; > > static const struct ssbd_options { > const char *str; > @@ -569,6 +573,8 @@ check_branch_predictor(const struct > arm64_cpu_capabilities *entry, int scope) > > WARN_ON(scope != SCOPE_LOCAL_CPU || preemptible()); > > + arm64_requested_vuln_attrs |= VULN_SPECTREV2; > + > /* If the CPU has CSV2 set, we're safe */ > if > (cpuid_feature_extract_unsigned_field(read_cpuid(ID_AA64PFR0_EL1), > ID_AA64PFR0_CSV2_SHIFT)) > @@ -578,17 +584,17 @@ check_branch_predictor(const struct > arm64_cpu_capabilities *entry, int scope) > if (is_midr_in_range_list(read_cpuid_id(), spectre_v2_safe_list)) > return false; > > + __spectrev2_safe = false; > + > /* Fallback to firmware detection */ > need_wa = detect_harden_bp_fw(); > if (!need_wa) > return false; > > - __spectrev2_safe = false; > - > if (need_wa < 0) > pr_warn_once("ARM_SMCCC_ARCH_WORKAROUND_1 missing from > firmware\n"); > > - arm64_requested_vuln_attrs |= VULN_SPECTREV2; > + > > return (need_wa > 0); > } > > fine with these changes i'm getting the following: meltdown:Not affected spec_store_bypass:Not affected spectre_v1:Mitigation: __user pointer sanitization spectre_v2:Not affected Thanks Stefan