From patchwork Thu Jan 3 00:49:14 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jeremy Linton X-Patchwork-Id: 154682 Delivered-To: patch@linaro.org Received: by 2002:a2e:299d:0:0:0:0:0 with SMTP id p29-v6csp127307ljp; Wed, 2 Jan 2019 16:49:26 -0800 (PST) X-Google-Smtp-Source: ALg8bN6GP0JgeWUXa9zIblA/BHcL7MWbhkmwulpEXoZXDhsoiOxnDfBozIPPyu+bcKlbqtO6yvzJ X-Received: by 2002:a63:bf0b:: with SMTP id v11mr15609334pgf.302.1546476566156; Wed, 02 Jan 2019 16:49:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546476566; cv=none; d=google.com; s=arc-20160816; b=SXbDLinG/ZFMBhg5es/QTSQsYN5si28Lh7PdLdnqdLnC8CJosAUgLbmlvML8fhPdNq TLjIn/9t1CeEIx5GMuVZyHz2VqnCXf+Ikgq3JJ1uftcEgixJ6d8nDFl8NvrhndEvH0jY TuNTAlb5m4AiQI5x6rKwf4Hrc180LN0EbGRLaicU2Cyf07AxhE2pyJn4Bt8ziik0bw91 vVkqVIjNhCY0XL9gpsm4kTIF7WaTFXcUQ0nXpwSSpGaF7tG3gNKWBqSMEwpyK7dUyCKM NSmEZ0NXqhPjszem1sWuXGAYUAAflJXIIdqKDwVb7YNcEpf1+EXB+KwSlq5fhDT8nzTS ToOA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=OqPkT1SUw+HuMOlEaguEgm5kOodI6c6ak7U5Mggtl8E=; b=lnQmXq7o14UJ1BYXAGhDeRtnpt4uOfgZsaznDbsyHwJd27JP9m4jmF1yMtppySUM1Z KSJpDwJ8kb2yr14FmDq+3gmFZLdzEnPd8zgneQz0TjxqznX+dQYb4jeuXfkHSymsHSdv pr1xwsAwDQ57bzp5dQMG+fHe4A0ch7c3O/vB+orX1ZIH04FaWwIU7uyew0Gj5xANC2mM hlY3ocMCzbiQggPs7JDk/SW/NSj/jA6cMW8M9VJKhy69KaCX0zcRgzMSOETzdTpnoAmc 1BvNOJ5AUhZGgmDrQW7Zm5hoCmVknnVMF4sIUHp3tae/DaTygmuLcSWHpigaoED9KHCX EZnw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f12si30416238pgd.68.2019.01.02.16.49.25; Wed, 02 Jan 2019 16:49:26 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730181AbfACAtZ (ORCPT + 31 others); Wed, 2 Jan 2019 19:49:25 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:39750 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726101AbfACAtY (ORCPT ); Wed, 2 Jan 2019 19:49:24 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 1A54B80D; Wed, 2 Jan 2019 16:49:24 -0800 (PST) Received: from beelzebub.austin.arm.com (beelzebub.austin.arm.com [10.118.12.119]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 425AC3F5AF; Wed, 2 Jan 2019 16:49:23 -0800 (PST) From: Jeremy Linton To: linux-arm-kernel@lists.infradead.org Cc: catalin.marinas@arm.com, will.deacon@arm.com, marc.zyngier@arm.com, suzuki.poulose@arm.com, dave.martin@arm.com, shankerd@codeaurora.org, mark.rutland@arm.com, linux-kernel@vger.kernel.org, ykaukab@suse.de, julien.thierry@arm.com, mlangsdo@redhat.com, steven.price@arm.com, Jeremy Linton Subject: [PATCH v2 0/7] add system vulnerability sysfs entries Date: Wed, 2 Jan 2019 18:49:14 -0600 Message-Id: <20190103004921.1928921-1-jeremy.linton@arm.com> X-Mailer: git-send-email 2.17.2 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This series was originally by Mian Yousaf Kaukab. Arm64 machines should be displaying a human readable vulnerability status to speculative execution attacks in /sys/devices/system/cpu/vulnerabilities This series enables that behavior by providing the expected functions. Those functions expose the cpu errata and feature states, as well as whether firmware is responding appropriately to display the overall machine status. This means that in a heterogeneous machine we will only claim the machine is mitigated or safe if we are confident all booted cores are safe or mitigated. Otherwise, we will display unknown or unsafe depending on how much of the machine configuration can be assured. v1->v2: Add "Unknown" state to ABI/testing docs. Minor tweaks. Jeremy Linton (3): sysfs/cpu: Add "Unknown" vulnerability state arm64: add sysfs vulnerability show for meltdown arm64: add sysfs vulnerability show for spectre v2 Mian Yousaf Kaukab (4): arm64: kpti: move check for non-vulnerable CPUs to a function arm64: add sysfs vulnerability show for spectre v1 arm64: add sysfs vulnerability show for speculative store bypass arm64: enable generic CPU vulnerabilites support .../ABI/testing/sysfs-devices-system-cpu | 1 + arch/arm64/Kconfig | 1 + arch/arm64/kernel/cpu_errata.c | 107 +++++++++++++++++- arch/arm64/kernel/cpufeature.c | 42 +++++-- 4 files changed, 138 insertions(+), 13 deletions(-) -- 2.17.2