Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2292226yba; Thu, 25 Apr 2019 13:56:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqzZWDV3b9OMqc5laUdSmpOgcBI2UszFNxPRiMayAcxnIVQrsDfbBtroUhi7P1s1knE+Q2gy X-Received: by 2002:a63:ff18:: with SMTP id k24mr40381660pgi.140.1556225807088; Thu, 25 Apr 2019 13:56:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556225807; cv=none; d=google.com; s=arc-20160816; b=scyj67cdCNe/UDukknsGZg62gigfsjElxv3ZozbCeOBGm0XqhK+osgDeUOkUjB+YqN eLoq/jREoeHK3piichg7sv9hvUbwZ4U6XFS74R8/yUj70dbryqwh0S3zRAXCeqqZVByf wQWlHeh2kv1eY0dj7LroegM3WMxlH+9bnoXdZImxPI9oApETDmEW/5Ee2kKz9pi3B4ux Y0gNnm+xObbitBLQksJ4YtqvupZLy2/sr02WmIVpb8BK4rjFt96U8PZysiQG8m5LDQgo BhlXn7OrPrlKRpNpq2Lnv2hJ2GBsf6GC/k6RV25dcgECSJ5XMJpN1ktL86rzzN76OqVE vIWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:importance:content-transfer-encoding :mime-version:subject:references:in-reply-to:message-id:cc:to:from :date; bh=hwTG/8Ex3VTCsH2ErKgnWhuyH1L7icfgpU3BL+kYw8k=; b=u7+BwF66Z5NU3PEJGrLq5eSPxaHGpANV3KiN0T3tIk2o7frBNVCrKpXgqHWLq8IDu8 3OKOq3xznWOZloE1hNU9maL2BmdC1Tdg0U++K7TyeCY5TEqN2noLnfSuvqEAji4EtLeq /YvfoQppKlzIDiMyP9of1XWx8PHNZXln4XL8Yrv4Lc8pbqmtrpYU1WDsEuaCjjxA91xb TXXsEap8lM9nfvyb1R7kvPPR8jqOLSr9Srcj9qQgPuAOuN0niQcLaYpHgGYx738N1CZk l4dvBwnQ6d+pfs9xh9ZfHYJy2sA7Oqfro7zFuPuQ5ZPk2GQ7JAsCwE4OeI25MBVoWM4M 5KVQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c12si21704990pgq.390.2019.04.25.13.56.31; Thu, 25 Apr 2019 13:56:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727580AbfDYRL3 (ORCPT + 99 others); Thu, 25 Apr 2019 13:11:29 -0400 Received: from mout.kundenserver.de ([212.227.17.24]:43263 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726026AbfDYRL3 (ORCPT ); Thu, 25 Apr 2019 13:11:29 -0400 Received: from oxbaltgw05.schlund.de ([172.19.246.11]) by mrelayeu.kundenserver.de (mreue108 [213.165.67.113]) with ESMTPSA (Nemesis) id 1MD9Ox-1hSCLR1rYP-009AJI; Thu, 25 Apr 2019 19:11:12 +0200 Date: Thu, 25 Apr 2019 19:11:11 +0200 (CEST) From: Stefan Wahren To: Jeremy Linton , linux-arm-kernel@lists.infradead.org Cc: mlangsdo@redhat.com, suzuki.poulose@arm.com, marc.zyngier@arm.com, catalin.marinas@arm.com, julien.thierry@arm.com, will.deacon@arm.com, linux-kernel@vger.kernel.org, Andre.Przywara@arm.com, Dave.Martin@arm.com, shankerd@codeaurora.org Message-ID: <1375455768.808427.1556212271639@email.ionos.de> In-Reply-To: <20190415212129.1112-10-jeremy.linton@arm.com> References: <20190415212129.1112-1-jeremy.linton@arm.com> <20190415212129.1112-10-jeremy.linton@arm.com> Subject: Re: [v8 09/10] arm64: add sysfs vulnerability show for speculative store bypass MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Priority: 3 Importance: Medium X-Mailer: Open-Xchange Mailer v7.8.4-Rev54 X-Originating-Client: open-xchange-appsuite X-Provags-ID: V03:K1:EiwVhB3XXpe5Oux+q614hCOdrvLuQGrnO8GGL3/xbZcxZB66jeP 2XUTmYwWTClu/ijBWkfrNG9zxOszrtmhgX6tooI+bv1jOIgOvGerroF0Nc/HUjAHBgcbY8b Gs9YLOy3WfZwhjyfueGlniJIoshi/IYxp1voAnZkVGVwnuK26T7SAY6c4lJq7nNpFK3Cq9z Z2s+fNc/AlZxykK+Y8DIg== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:1lppWUuFHUA=:PffeInm+yTx1FG9of4fjBs Av09yqD3QH6snduQEbdiil+BWZuOvSzOgIArXW32O1Hh/uOgyLUFXT18vJwv9RTPkslw7MAIQ x6FNU9zrq+/Lssc/+Be4nbBVq61W+mcdBWY3xkkM15/DPKEHvW9IlrXotvsccA0PcwkaGuwm9 l7enK/8pqG8dy+UptK5uvurJazcEWxIyhb0/rAwZK6o9bYO0vuzo9hDb+wI5boD1WHo3jOg03 Bo1smk0tMmXbwxjBrE4+BnpHor3rzDIWv0E7X0Y1Wjx3vqwxlgnNsiwdXkOsR9kieLNKzCplH 6ktRDM3Uy9+NdeiPoyPTxDAciJn9yfO+FqirhqjNZElcNIGQ6hrnKeY0xA26Kd10HTbBBAk80 iLXSmdzGGJ1fGGulVgeWOGzvVuqCeiZVkouJVaQWADrSFYbCe4C+sAo7wSoXC5H3H2GfAsDqk 2W3vbso7pLY2DVH52BpG7uWX0LJAbTBsZ9xq4KWbgpK9vjT/MyAM4dVlLI/sdu4BiavW9bHAb dKk695/QTNV96cP1M7ZomqzNc8AnMP6YQCtRd9omUw574/c78FkdX17HceyYVSjkDJ916Fs17 hzc7Yt5QJOgp67nlBsNVf+7J/NsoiUMhLN37vqzoqPjsD5zLP3ozKcmKnZGshSrCeL/5oApbm 5ArfqR1XsTCjZtRaIp4i3FCoZaf9NNQKPke5RUj3pkFaRfCrDcXyhPyo7X/tP5RzK1aP5WMKE 0iLIZYyYtbMV1PdAPvPXCV4mIsBbUZnrNv12C103RWpeTfPMB7aV7knZEi8= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > Jeremy Linton hat am 15. April 2019 um 23:21 geschrieben: > > > Return status based on ssbd_state and __ssb_safe. If the > mitigation is disabled, or the firmware isn't responding then > return the expected machine state based on a whitelist of known > good cores. > > Given a heterogeneous machine, the overall machine vulnerability > defaults to safe but is reset to unsafe when we miss the whitelist > and the firmware doesn't explicitly tell us the core is safe. > In order to make that work we delay transitioning to vulnerable > until we know the firmware isn't responding to avoid a case > where we miss the whitelist, but the firmware goes ahead and > reports the core is not vulnerable. If all the cores in the > machine have SSBS, then __ssb_safe will remain true. > > Signed-off-by: Jeremy Linton Tested-by: Stefan Wahren on a Raspberry Pi 3 B