Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp4381011ybf; Wed, 4 Mar 2020 02:53:12 -0800 (PST) X-Google-Smtp-Source: ADFU+vuifxMtjlvNg89UH3p8lwmLE7pIz7yWWKUG/cXy7QCNVMvQcMyb0peaAj67TXecZxqWyQjI X-Received: by 2002:a05:6830:186:: with SMTP id q6mr1775760ota.10.1583319192532; Wed, 04 Mar 2020 02:53:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583319192; cv=none; d=google.com; s=arc-20160816; b=TKjYUfdpOta556ZTf6BoyJ7FwLIBkszvQooWpeAS4TTJ5aWvPultOytZnF3XeEWYJA me7LA+C+1kAU2qp618W795d10MnUXl2mZRes17I1vbTNAaAV4g1gVGHD60/fzd4J8Br3 5mopClBu3VFyl0vx503I2bqyEISAgmyWwqU1SsOBv03eBytwnM4oXuBbgelLZPdWNCxv UiKyl2nwL3F0ARzg0ineGlNqyKzEn+bxe4kvUESGgt2le6fk16s2FFTWmVbRfXjC0dr+ XXbBmbYeRD40UVkflvknFI5xH1E3e3cxG39dpXwFQcFzMXC842hPo7FJKvAOgx4zGIe1 StqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=Dw8YXGE2I3jTmAJ66a5mJGk/pXkO5jiL6BxX0YlOF4A=; b=xpUHsrn2oaW5S8xF9pJBe+g5AzX7azyUFsVlyay232xraBeV+womOkZ80t9WojwlOx 7vmn0k4d8SP4+HNjMBaaUDYCu72LpPyNf2rr3hT/2/pwTcEeWTGyqC/2JGSP6QuR3KDP rvO/MI4IgX1hyAnQQdl1tTugr+RXXXWgQZykAVcWCfSyX5daDJ1iHdIU5XN6/f+CRus5 ChxwSd2ALV58V/+6jA/S/FliJFOKegsg3WEsEt367Ai/RzSTGxVXWK+m1XAUer8qqPjd lt7ijlbcQljszm8/Z5aPZkMDVk0n48AegGjyGwM0nBVjznrbMvor8ws+6zDSygKJTAOH 3J1g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=yev9FXld; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o18si956291otk.80.2020.03.04.02.53.00; Wed, 04 Mar 2020 02:53:12 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=yev9FXld; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729138AbgCDKwq (ORCPT + 99 others); Wed, 4 Mar 2020 05:52:46 -0500 Received: from mail-lf1-f67.google.com ([209.85.167.67]:45876 "EHLO mail-lf1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726583AbgCDKwq (ORCPT ); Wed, 4 Mar 2020 05:52:46 -0500 Received: by mail-lf1-f67.google.com with SMTP id b13so1090660lfb.12 for ; Wed, 04 Mar 2020 02:52:42 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=Dw8YXGE2I3jTmAJ66a5mJGk/pXkO5jiL6BxX0YlOF4A=; b=yev9FXldw7OF5QP1G/bgbhJF2dehFneq2luy5DcahhSoCsqjqCvbHLylb5nebRRUIb Q/zK2merHFYgvVuY4Moz2OVfTr+uvviniCiYviLhSlceL2IXf9sL4dwqfOX0OzqxbDtH U6bFqUE0tAiVizqSi/Y9mO2LCATsSNaJkuvmF0NuvEN+ahH4DfjluGlDdgZ6OkPpevuX auBnnUdeO0hGYmMgclX5uAZVf3N9C7JxxCAebctT+qSBUcIY86bq6vodeSasoq/a6AHh W+oGlC6ejs/XlesP8xaNTq8SpoFD9GxH9h2ZgEnSu4bj6y1bIVgOaua+gdtd5KPsvN6N oYxg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=Dw8YXGE2I3jTmAJ66a5mJGk/pXkO5jiL6BxX0YlOF4A=; b=k2Adwv4KQFDaVINOwq9o3nVs9cGcaG/dks7P7SHKfGsliYV753SfORVfQ5MEHn98wI t/zf7QVcGBaOxYPpZu6k94Z0Nad7qgfK+cwxFzIyRwN+wXcPmg4YPtAUctnGomK5lmEB w4aA93oQoNmE/LLztxXHRD9IBECLQtOPx6D7BiyfdX/o8JTJzshgim3yK5Cf0ZtaXdtK 8Jzs7gFWdSxNVPnocmvrxz6qaV0taP3g0TDE/hJUWlbkuEIRsKySkcOpUpRS8rnZHAtX //NlHEsWxDUskxrHidumGSx9PC6Vp5wQZVFVSgzpNzZPRkMzfz0Esc5MUo0OVzhi6XxR Wywg== X-Gm-Message-State: ANhLgQ0EHYeJLHJnvMem55iWyPT5pWxY8uZzbS4V/yyUVr3T0QNaeFLa x41iXS9sjU7EYkK3RAjsy9h/ibDkBi2ICAnBd8MT3w== X-Received: by 2002:a05:6512:3e5:: with SMTP id n5mr1658913lfq.55.1583319161751; Wed, 04 Mar 2020 02:52:41 -0800 (PST) MIME-Version: 1.0 References: <20200303174304.593872177@linuxfoundation.org> <20200304081128.GC1401372@kroah.com> <20200304084702.GA1416015@kroah.com> <20200304084946.GB1416015@kroah.com> In-Reply-To: <20200304084946.GB1416015@kroah.com> From: Naresh Kamboju Date: Wed, 4 Mar 2020 16:22:30 +0530 Message-ID: Subject: Re: [PATCH 5.5 000/176] 5.5.8-stable review To: Greg Kroah-Hartman Cc: open list , Shuah Khan , patches@kernelci.org, lkft-triage@lists.linaro.org, Ben Hutchings , linux- stable , Andrew Morton , Linus Torvalds , Guenter Roeck Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 4 Mar 2020 at 14:19, Greg Kroah-Hartman wrote: > > On Wed, Mar 04, 2020 at 09:47:02AM +0100, Greg Kroah-Hartman wrote: > > On Wed, Mar 04, 2020 at 09:11:28AM +0100, Greg Kroah-Hartman wrote: > > > On Wed, Mar 04, 2020 at 12:43:42PM +0530, Naresh Kamboju wrote: > > > > On Tue, 3 Mar 2020 at 23:16, Greg Kroah-Hartman > > > > wrote: > > > > > > > > > > This is the start of the stable review cycle for the 5.5.8 releas= e. > > > > > There are 176 patches in this series, all will be posted as a res= ponse > > > > > to this one. If anyone has any issues with these being applied, = please > > > > > let me know. > > > > > > > > > > Responses should be made by Thu, 05 Mar 2020 17:42:06 +0000. > > > > > Anything received after that time might be too late. > > > > > > > > > > The whole patch series can be found in one patch at: > > > > > https://www.kernel.org/pub/linux/kernel/v5.x/stable-revie= w/patch-5.5.8-rc1.gz > > > > > or in the git tree and branch at: > > > > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linu= x-stable-rc.git linux-5.5.y > > > > > and the diffstat can be found below. > > > > > > > > > > thanks, > > > > > > > > > > greg k-h > > > > > > > > > > > > > Results from Linaro=E2=80=99s test farm. > > > > Regressions detected on x86_64 and i386. > > > > > > > > Test failure output: > > > > CVE-2017-5715: VULN (IBRS+IBPB or retpoline+IBPB+RSB filling, is > > > > needed to mitigate the vulnerability) > > > > > > > > Test description: > > > > CVE-2017-5715 branch target injection (Spectre Variant 2) > > > > > > > > Impact: Kernel > > > > Mitigation 1: new opcode via microcode update that should be used b= y > > > > up to date compilers to protect the BTB (by flushing indirect branc= h > > > > predictors) > > > > Mitigation 2: introducing "retpoline" into compilers, and recompile > > > > software/OS with it > > > > Performance impact of the mitigation: high for mitigation 1, medium > > > > for mitigation 2, depending on your CPU > > > > > > So these are regressions or just new tests? > > > > > > If regressions, can you do 'git bisect' to find the offending commit? > > > > > > Also, are you sure you have an updated microcode on these machines an= d a > > > proper compiler for retpoline? > > > > As an example of just how crazy that script is, here's the output of my > > machine for that first CVE issue: > > > > CVE-2017-5715 aka 'Spectre Variant 2, branch target injection' > > * Mitigated according to the /sys interface: YES (Mitigation: Full ge= neric retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB fillin= g) > > * Mitigation 1 > > * Kernel is compiled with IBRS support: YES > > * IBRS enabled and active: YES (for firmware code only) > > * Kernel is compiled with IBPB support: YES > > * IBPB enabled and active: YES > > * Mitigation 2 > > * Kernel has branch predictor hardening (arm): NO > > * Kernel compiled with retpoline option: YES > > * Kernel compiled with a retpoline-aware compiler: YES (kernel re= ports full retpoline compilation) > > * Kernel supports RSB filling: UNKNOWN (couldn't check (couldn't fi= nd your kernel image in /boot, if you used netboot, this is normal)) > > > STATUS: VULNERABLE (IBRS+IBPB or retpoline+IBPB+RSB filling, is nee= ded to mitigate > > > > So why is this "Vulnerable"? Because it didn't think it could find my > > kernel image for some odd reason, despite it really being in /boot/ (I > > don't use netboot) Now I know the real reason why this test failed. With this note we can conclude this is not a regression. No regressions on arm64, arm, x86_64, and i386 for 4.19, 5.4 and 5.5 branch= es. Sorry for the noise. --=20 Linaro LKFT https://lkft.linaro.org