Received: by 2002:ac0:aed5:0:0:0:0:0 with SMTP id t21csp701443imb; Fri, 1 Mar 2019 11:36:04 -0800 (PST) X-Google-Smtp-Source: APXvYqy56MjCUx8tuuxyHG/6N66hA2XhAOfq+A+hjc+2WqqHiheWzFtg6fIjng7zldoU+PPRyStc X-Received: by 2002:a17:902:241:: with SMTP id 59mr7060048plc.72.1551468964420; Fri, 01 Mar 2019 11:36:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551468964; cv=none; d=google.com; s=arc-20160816; b=d95n3M534/vbos8dFl6aL97htE5PUlEW9pk4sodyQ6Job78W3LlwZCJaXvzfPhcb6M 8IcPoRyzncE/+MHfF979K/Jf1iSvN3qHAdH7WbvQCkmpYAvEiaXONyfagbMCf7Yy4P0b Khk/nHjgWjmX9XZQyxgaPwvbRMjuTYR3EHmUgMajGEj0xo/GDSCXinXlIBcxWpdUqKhf 8W+T5AG3uh1SlY/OPpFwhva8nPYy3ZFK0tFkfwFFz+ISv3ecOz8o0Pw5VKW/PYC2DAOB Ce7NgnX69empuaPdIAsywFRQrbWLy79YsAVb435U7DKWKSRpZDILSFx7pB4HbUy2e2WR bAGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:importance:content-transfer-encoding :mime-version:subject:references:in-reply-to:message-id:cc:to:from :date; bh=ZWLNWP4QQefREGHQZt6YHk0YlCVDsUw/ofwzElUmNHg=; b=Pqbah1VZIYlKmZF75UEXBW+KMCPift8B97TB4Ey2rTd1usA61mrXF8Ohl07azmY2H4 OuewaXDuXyg03+m2wagSGUSPNQ5aSR5g44n+WsPCO8ZhIOEPqPfd7OKrFlafRClQlHW0 oYSG9Ulxeo9MCEWhrsdZhi1N7wWHa8qY+M0KPAehG2A8aD6T9ko/RtMwFL8AQfOejXgY /I8cPTwrgrjKnau3IQRuYxKPLn6nQf5gG1AMuN/m9OzjNu8amUH5E6757gZq8ackBYFH 7mgatUNyqLsIhuXKUGiz6GWdwop6dg0ZaRS4C3s/uZb8SXjc/KwqXQig6ZUWKcOMzj9t 3XBg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 43si21505670plb.299.2019.03.01.11.35.48; Fri, 01 Mar 2019 11:36:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726126AbfCATf2 (ORCPT + 99 others); Fri, 1 Mar 2019 14:35:28 -0500 Received: from mout.kundenserver.de ([212.227.17.13]:58753 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725944AbfCATf1 (ORCPT ); Fri, 1 Mar 2019 14:35:27 -0500 Received: from oxbaltgw03.schlund.de ([172.19.246.9]) by mrelayeu.kundenserver.de (mreue109 [213.165.67.113]) with ESMTPSA (Nemesis) id 1MQ5nK-1gdtKb2N4C-00M7AQ; Fri, 01 Mar 2019 20:35:13 +0100 Date: Fri, 1 Mar 2019 20:35:12 +0100 (CET) From: Stefan Wahren To: Jeremy Linton , linux-arm-kernel@lists.infradead.org Cc: mlangsdo@redhat.com, suzuki.poulose@arm.com, marc.zyngier@arm.com, catalin.marinas@arm.com, julien.thierry@arm.com, will.deacon@arm.com, linux-kernel@vger.kernel.org, Andre.Przywara@arm.com, Dave.Martin@arm.com, shankerd@codeaurora.org Message-ID: <1128468323.249298.1551468912168@email.ionos.de> In-Reply-To: <20190227010544.597579-1-jeremy.linton@arm.com> References: <20190227010544.597579-1-jeremy.linton@arm.com> Subject: Re: [PATCH v5 00/10] arm64: add system vulnerability sysfs entries MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Priority: 3 Importance: Medium X-Mailer: Open-Xchange Mailer v7.8.4-Rev51 X-Originating-Client: open-xchange-appsuite X-Provags-ID: V03:K1:cFZeMU6t0C89EyrHq1lpmK9AVdWLlKxLPmIJggD0nsae2UG4H+2 dR9SnoMJduGyv1mGA2VrvexjtPY/PA3Z/SgnttjYfGT98v8fTqhSWH+Ba71QfHHUsP6ZF1j OJ7JlpW2qREao43gCryhpz/iwkQrhD0l38M0hf5nexGwZvjnt2HQzWz1VS4msz1WeyLqzeM 1oov1i3k/h8GKnvbLuDqQ== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:vZY9wyvEh2Q=:Tqw/FQELb4IaUHqUNX8FJC L8RfmrUSxuZJzHQSawaH/V/PD7VZVJsAppr/UOTmmh1epfcsDyuoNEwNzY3rSgNnGvCw2BXQ8 9u5R8FMK+Bx6fPE3dulSalMBPe+pgoow1WHtRCJspc8L3eoqJK4RjtP32V6vMHYyuqt2r4P6+ YCC0FbWR7nj5aGLRg/5MmlqMr5LsIVjSx5LY84zyvqdvSMq/8sTPV3K8UjdaSZRigs6Kn2Zcb ZcbS5iN7YS4W6WUpfhoindLCw636JftjDTLq9zRnDURR0xxcoaFA48Zd1fVaeBeFYya7Z7pfc 5nin40VIdMgcMEM4qaEXic/omci9dtQX8mVWPwWlcMRUj8Xp2TRoJNeMsrzw2amSHppZgVaR7 lwUh2gliXP2paToKXa/d4LLgxhR8Fe6rNIo97FRGxH1+Dxsm9RiqD59aiAHDcVZkFLQveWAH/ 42CHp36i6s45rh/LMO9blQFy1vZJZRqj+ocw89SwpjHEhjXCuSB4eRcEIP+o4P9E2bRr5dtwb PqMzAhIxvKAdjq81VKvlZ+vzyAQoZ72aT49OIzQgqDXeu0Umhb/2DI9ghoFjCEJtShhaOYo98 JksCbcSmqSlo8wgTSqjAxo8Uwmp4B6la8h66mjfdkLcDRQ2517sdcuuhES6HqYRYjOQdIjtLq p20wFmZIgnQoGy7OVkLFGj38zPysBqnfm+0MunewjgvQKSb3fMjoLTmNP/qk2nd65ZaBI7GkH kgKxEAX4UCupmE2keIjPDDaSSOgPcQsWbyymi4sqoeivASvT0B64ALwDFtw= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Jeremy, > Jeremy Linton hat am 27. Februar 2019 um 02:05 geschrieben: > > > Arm64 machines should be displaying a human readable > vulnerability status to speculative execution attacks in > /sys/devices/system/cpu/vulnerabilities > > This series enables that behavior by providing the expected > functions. Those functions expose the cpu errata and feature > states, as well as whether firmware is responding appropriately > to display the overall machine status. This means that in a > heterogeneous machine we will only claim the machine is mitigated > or safe if we are confident all booted cores are safe or > mitigated. > here are the results for Raspberry Pi 3 B: l1tf:Not affected meltdown:Not affected spec_store_bypass:Not affected spectre_v1:Mitigation: __user pointer sanitization spectre_v2:Not affected Tested-by: Stefan Wahren