[SRU] [PULL] [Bionic] powerpc: support software count cache flush
Andrea Righi
andrea.righi at canonical.com
Tue Apr 9 14:20:09 UTC 2019
This is the backport of the count cache flush by software on
context-switch capability for powerpc (Spectre v2 mitigation).
All clean cherry picks, except few minor adjustments to apply some
patches, but no significant backport changes.
The following changes since commit 5f1ee1100f874b50e5f53d8e772a447acdffe1af:
openvswitch: fix flow actions reallocation (2019-04-08 17:22:37 +0200)
are available in the Git repository at:
git://git.launchpad.net/~arighi/+git/bionic-linux powerpc-count-cache-flush-spectre-v2
for you to fetch changes up to 7ad9e126e998defa1759181b54db7590bb2cf3bd:
powerpc/security: Fix spectre_v2 reporting (2019-04-09 15:53:35 +0200)
----------------------------------------------------------------
Diana Craciun (4):
powerpc/64: Disable the speculation barrier from the command line
powerpc/64: Make stf barrier PPC_BOOK3S_64 specific.
powerpc/64: Make meltdown reporting Book3S 64 specific
powerpc/fsl: Fix spectre_v2 mitigations reporting
Michael Ellerman (11):
powerpc: Use barrier_nospec in copy_from_user()
powerpc/64: Use barrier_nospec in syscall entry
powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2
powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC
powerpc/64: Call setup_barrier_nospec() from setup_arch()
powerpc/asm: Add a patch_site macro & helpers for patching instructions
powerpc/64s: Add new security feature flags for count cache flush
powerpc/64s: Add support for software count cache flush
powerpc/pseries: Query hypervisor for count cache flush settings
powerpc/powernv: Query firmware for count cache flush settings
powerpc/security: Fix spectre_v2 reporting
Michal Suchanek (4):
powerpc/64s: Add support for ori barrier_nospec patching
powerpc/64s: Patch barrier_nospec in modules
powerpc/64s: Enable barrier_nospec based on firmware settings
powerpc/64s: Enhance the information in cpu_show_spectre_v1()
arch/powerpc/Kconfig | 7 +-
arch/powerpc/include/asm/asm-prototypes.h | 6 +
arch/powerpc/include/asm/barrier.h | 8 +-
arch/powerpc/include/asm/code-patching-asm.h | 18 +++
arch/powerpc/include/asm/code-patching.h | 2 +
arch/powerpc/include/asm/feature-fixups.h | 9 ++
arch/powerpc/include/asm/hvcall.h | 2 +
arch/powerpc/include/asm/security_features.h | 7 +
arch/powerpc/include/asm/setup.h | 13 ++
arch/powerpc/include/asm/uaccess.h | 11 +-
arch/powerpc/kernel/Makefile | 3 +-
arch/powerpc/kernel/entry_64.S | 64 +++++++++
arch/powerpc/kernel/module.c | 10 +-
arch/powerpc/kernel/security.c | 189 +++++++++++++++++++++++++--
arch/powerpc/kernel/setup-common.c | 2 +
arch/powerpc/kernel/vmlinux.lds.S | 11 +-
arch/powerpc/lib/code-patching.c | 16 +++
arch/powerpc/lib/feature-fixups.c | 39 ++++++
arch/powerpc/platforms/powernv/setup.c | 7 +
arch/powerpc/platforms/pseries/setup.c | 7 +
20 files changed, 414 insertions(+), 17 deletions(-)
create mode 100644 arch/powerpc/include/asm/code-patching-asm.h
More information about the kernel-team
mailing list