From patchwork Thu Dec 6 23:44:02 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jeremy Linton X-Patchwork-Id: 153073 Delivered-To: patch@linaro.org Received: by 2002:a2e:299d:0:0:0:0:0 with SMTP id p29-v6csp240ljp; Thu, 6 Dec 2018 15:44:26 -0800 (PST) X-Google-Smtp-Source: AFSGD/XLG/uG20NIRhKXMMcn+kkYAnewughVfyWNiQVLy2+OGMW7tb0+mCaXt26+NdCGCz/SZ2Lr X-Received: by 2002:a63:ba19:: with SMTP id k25mr25732137pgf.194.1544139866225; Thu, 06 Dec 2018 15:44:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544139866; cv=none; d=google.com; s=arc-20160816; b=rYDxgD2B5LLYdssgP80LUxElE9jfn1VPidG61NLaA/5EQDaH+aBk1BLKZwvKvZco6b nsCLLNNvf/jFihy4S0EilL3BWJnHhx3XsALLACaB/6/i1zlYFdurPsllDKVT11IJSGm9 Q/VlEmHNUxTd6tJhZuV9HVa6uJtBIcHVJzgOxKdzI+1DSeTFUxCYDstwwOiy1gLlzc+4 8hzslacJ8j3VhlZj/p1GfR0UxGhGoaUltPF2XNeTVHaCzwSqH+2cKuV3CumThReAuuZV jLCqolkuUaODvPo15SSw4K+T4A1riwhUgaCxpT8PCJc5uYKVnCXkvkfU7AZxihUOluuK +NIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=xR6HktuRJXorzVz1Wx1XDmeUgQI7G9+BHlN37SPltSA=; b=x91PYxxFFlNIwsfevCa8DAFPOCW+MZ+KpIK9W4XNd4+djBeMKs30x3tOi6YJlhfmYI m98rlu8bUEsYtmkspMRAdkiyWpMsM1ctyboFNrnzxNgPT123bsgDkhYR5yjDargDa198 U+tAb3advl9OwZPxhgnCfGPfS6xvY0/UyLhY8kmNYuufLmiC8JpkGfXTwXI5EOE4gZXA AGi4ZJn+Vx1yXXc5hXZeZGooTsw27AXIpr+MB56Jhvh3fUc+L1QlLf+PUJQrGezq2WOA s/QebP6Y1XClXp7Tih/BDQ5ExW1GTWy6SI28V9bAF81K8OB0FEIgxjYBvN6fCBK9ybmg wLNw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h3si1434279pgi.391.2018.12.06.15.44.24; Thu, 06 Dec 2018 15:44:26 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726328AbeLFXoW (ORCPT + 31 others); Thu, 6 Dec 2018 18:44:22 -0500 Received: from foss.arm.com ([217.140.101.70]:35884 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726173AbeLFXoW (ORCPT ); Thu, 6 Dec 2018 18:44:22 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0A6511596; Thu, 6 Dec 2018 15:44:22 -0800 (PST) Received: from beelzebub.austin.arm.com (beelzebub.austin.arm.com [10.118.12.119]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 7268E3F5AF; Thu, 6 Dec 2018 15:44:21 -0800 (PST) From: Jeremy Linton To: linux-arm-kernel@lists.infradead.org Cc: catalin.marinas@arm.com, will.deacon@arm.com, marc.zyngier@arm.com, suzuki.poulose@arm.com, dave.martin@arm.com, shankerd@codeaurora.org, mark.rutland@arm.com, linux-kernel@vger.kernel.org, ykaukab@suse.de, Jeremy Linton Subject: [PATCH 0/6] add system vulnerability sysfs entries Date: Thu, 6 Dec 2018 17:44:02 -0600 Message-Id: <20181206234408.1287689-1-jeremy.linton@arm.com> X-Mailer: git-send-email 2.17.2 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Part of this series was originally by Mian Yousaf Kaukab. Arm64 machines should be displaying a human readable vulnerability status to speculative execution attacks in /sys/devices/system/cpu/vulnerabilities This series enables that behavior by providing the expected functions. Those functions expose the cpu errata and feature states, as well as whether firmware is responding appropriately to display the overall machine status. This means that in a heterogeneous machine we will only claim the machine is mitigated or safe if we are confident all booted cores are safe or mitigated. Otherwise, we will display unknown or unsafe depending on how much of the machine configuration can be assured. Jeremy Linton (2): arm64: add sysfs vulnerability show for meltdown arm64: add sysfs vulnerability show for spectre v2 Mian Yousaf Kaukab (4): arm64: kpti: move check for non-vulnerable CPUs to a function arm64: add sysfs vulnerability show for spectre v1 arm64: add sysfs vulnerability show for speculative store bypass arm64: enable generic CPU vulnerabilites support arch/arm64/Kconfig | 1 + arch/arm64/kernel/cpu_errata.c | 110 +++++++++++++++++++++++++++++++-- arch/arm64/kernel/cpufeature.c | 45 +++++++++++--- 3 files changed, 143 insertions(+), 13 deletions(-) -- 2.17.2