From patchwork Thu Jan 3 00:49:15 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jeremy Linton X-Patchwork-Id: 154683 Delivered-To: patch@linaro.org Received: by 2002:a2e:299d:0:0:0:0:0 with SMTP id p29-v6csp127370ljp; Wed, 2 Jan 2019 16:49:33 -0800 (PST) X-Google-Smtp-Source: AFSGD/Uxm4pUQqf7s/w5c9wE1rYSr7aKUiqsBZHFG/Bm3Jn7FTCbE8nlKWObKT2OaHd0DNK6Rcxm X-Received: by 2002:a62:dbc2:: with SMTP id f185mr46008357pfg.235.1546476573096; Wed, 02 Jan 2019 16:49:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546476573; cv=none; d=google.com; s=arc-20160816; b=QX6nIQpp+I59/bxfsdtS5RiTL0pb4zRrOG2AK8JEUrMxolITjoRhol1ksp0SSyoFhg DbJ1BGppI2NW+R25RkMst5gpgf1HnqARrj5VS0Cx2HCowYEjEKFZmrb9dAu6qdxiFMHG Og8fB1yMD595ClVWHcNo/mJfk1rmtmF1zAaXCned2raE1GjwKtaAjTOV6kHTATh3fRae CUUHkbFWiC3zIY1VmJE8XVB9oBlFdydOZ26u1eO0R7ynaHeaUosCqln+iKCGksyqvKx2 x9dSOWUrjTBN+AETd5AAxUgdva+nhSVTRm78KVOy3lmx4BFtAeojJnsg9aFbJSFjhILo 7dnQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=nujYigEZEYQvOo/px7JA187/vxmeSCVob1dF9n02g8k=; b=R5YV44uNXAemwy+2vjdMU321LbQeK8IeFLt2IBsG9/yxeKVtj+3h0x26Rbrss1CnYn Nt8vj+/sbqI6qODbI3epxLJ5shm7Vy1lZDPsPGj4VuKtkfGxXMb9tlMg8UfEPA3aGt4I 6X/OEDdakKMsAhVU5e2NUYKgZlgcURoa04vJuII0v9Zg5nFW/JCBWylVW3VshTTOW7iB tYgbaP0LK7R9AEgxgUh8y2cbRoQS9q3mChjQ2rIBvaXVNHt6o0Ctfg9T0EnSkEF2bNik AeGOfUTUUoz8IG9cO1Ly9OJuUBEkXdInWmD8fOxE6b70/kOSJOqXmnJ7jDlOUdTDCKs4 J54A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f12si30416238pgd.68.2019.01.02.16.49.32; Wed, 02 Jan 2019 16:49:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730204AbfACAtc (ORCPT + 31 others); Wed, 2 Jan 2019 19:49:32 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:39766 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726101AbfACAtb (ORCPT ); Wed, 2 Jan 2019 19:49:31 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 3E2C580D; Wed, 2 Jan 2019 16:49:31 -0800 (PST) Received: from beelzebub.austin.arm.com (beelzebub.austin.arm.com [10.118.12.119]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 090573F5AF; Wed, 2 Jan 2019 16:49:29 -0800 (PST) From: Jeremy Linton To: linux-arm-kernel@lists.infradead.org Cc: catalin.marinas@arm.com, will.deacon@arm.com, marc.zyngier@arm.com, suzuki.poulose@arm.com, dave.martin@arm.com, shankerd@codeaurora.org, mark.rutland@arm.com, linux-kernel@vger.kernel.org, ykaukab@suse.de, julien.thierry@arm.com, mlangsdo@redhat.com, steven.price@arm.com, Jeremy Linton , Thomas Gleixner , Greg Kroah-Hartman , "Rafael J . Wysocki" , Konrad Rzeszutek Wilk , Peter Zijlstra , Dave Hansen , Borislav Petkov , David Woodhouse Subject: [PATCH v2 1/7] sysfs/cpu: Add "Unknown" vulnerability state Date: Wed, 2 Jan 2019 18:49:15 -0600 Message-Id: <20190103004921.1928921-2-jeremy.linton@arm.com> X-Mailer: git-send-email 2.17.2 In-Reply-To: <20190103004921.1928921-1-jeremy.linton@arm.com> References: <20190103004921.1928921-1-jeremy.linton@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org There is a lot of variation in the Arm ecosystem. Because of this, there exist possible cases where the kernel cannot authoritatively determine if a machine is vulnerable. Rather than guess the vulnerability status in cases where the mitigation is disabled or the firmware isn't responding correctly, we need to display an "Unknown" state. Signed-off-by: Jeremy Linton Cc: Thomas Gleixner Cc: Greg Kroah-Hartman Cc: Rafael J. Wysocki Cc: Konrad Rzeszutek Wilk Cc: Peter Zijlstra Cc: Dave Hansen Cc: Borislav Petkov Cc: David Woodhouse --- Documentation/ABI/testing/sysfs-devices-system-cpu | 1 + 1 file changed, 1 insertion(+) -- 2.17.2 diff --git a/Documentation/ABI/testing/sysfs-devices-system-cpu b/Documentation/ABI/testing/sysfs-devices-system-cpu index 9605dbd4b5b5..876103fddfa4 100644 --- a/Documentation/ABI/testing/sysfs-devices-system-cpu +++ b/Documentation/ABI/testing/sysfs-devices-system-cpu @@ -495,6 +495,7 @@ Description: Information about CPU vulnerabilities "Not affected" CPU is not affected by the vulnerability "Vulnerable" CPU is affected and no mitigation in effect "Mitigation: $M" CPU is affected and mitigation $M is in effect + "Unknown" The kernel is unable to make a determination Details about the l1tf file can be found in Documentation/admin-guide/l1tf.rst