Message ID | 20190409142009.GC15794@xps-13 |
---|---|
State | New |
Headers | show |
Series | [SRU,PULL,Bionic] powerpc: support software count cache flush | expand |
On 4/9/19 8:20 AM, Andrea Righi wrote: > This is the backport of the count cache flush by software on > context-switch capability for powerpc (Spectre v2 mitigation). > > All clean cherry picks, except few minor adjustments to apply some > patches, but no significant backport changes. > > The following changes since commit 5f1ee1100f874b50e5f53d8e772a447acdffe1af: > > openvswitch: fix flow actions reallocation (2019-04-08 17:22:37 +0200) > > are available in the Git repository at: > > git://git.launchpad.net/~arighi/+git/bionic-linux powerpc-count-cache-flush-spectre-v2 > > for you to fetch changes up to 7ad9e126e998defa1759181b54db7590bb2cf3bd: > > powerpc/security: Fix spectre_v2 reporting (2019-04-09 15:53:35 +0200) Hi Andrea, IBM has requested a few more patches on the bug report, so I'm NAK'ing this PR. Thanks, Kleber > > ---------------------------------------------------------------- > Diana Craciun (4): > powerpc/64: Disable the speculation barrier from the command line > powerpc/64: Make stf barrier PPC_BOOK3S_64 specific. > powerpc/64: Make meltdown reporting Book3S 64 specific > powerpc/fsl: Fix spectre_v2 mitigations reporting > > Michael Ellerman (11): > powerpc: Use barrier_nospec in copy_from_user() > powerpc/64: Use barrier_nospec in syscall entry > powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 > powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC > powerpc/64: Call setup_barrier_nospec() from setup_arch() > powerpc/asm: Add a patch_site macro & helpers for patching instructions > powerpc/64s: Add new security feature flags for count cache flush > powerpc/64s: Add support for software count cache flush > powerpc/pseries: Query hypervisor for count cache flush settings > powerpc/powernv: Query firmware for count cache flush settings > powerpc/security: Fix spectre_v2 reporting > > Michal Suchanek (4): > powerpc/64s: Add support for ori barrier_nospec patching > powerpc/64s: Patch barrier_nospec in modules > powerpc/64s: Enable barrier_nospec based on firmware settings > powerpc/64s: Enhance the information in cpu_show_spectre_v1() > > arch/powerpc/Kconfig | 7 +- > arch/powerpc/include/asm/asm-prototypes.h | 6 + > arch/powerpc/include/asm/barrier.h | 8 +- > arch/powerpc/include/asm/code-patching-asm.h | 18 +++ > arch/powerpc/include/asm/code-patching.h | 2 + > arch/powerpc/include/asm/feature-fixups.h | 9 ++ > arch/powerpc/include/asm/hvcall.h | 2 + > arch/powerpc/include/asm/security_features.h | 7 + > arch/powerpc/include/asm/setup.h | 13 ++ > arch/powerpc/include/asm/uaccess.h | 11 +- > arch/powerpc/kernel/Makefile | 3 +- > arch/powerpc/kernel/entry_64.S | 64 +++++++++ > arch/powerpc/kernel/module.c | 10 +- > arch/powerpc/kernel/security.c | 189 +++++++++++++++++++++++++-- > arch/powerpc/kernel/setup-common.c | 2 + > arch/powerpc/kernel/vmlinux.lds.S | 11 +- > arch/powerpc/lib/code-patching.c | 16 +++ > arch/powerpc/lib/feature-fixups.c | 39 ++++++ > arch/powerpc/platforms/powernv/setup.c | 7 + > arch/powerpc/platforms/pseries/setup.c | 7 + > 20 files changed, 414 insertions(+), 17 deletions(-) > create mode 100644 arch/powerpc/include/asm/code-patching-asm.h >