[SRU] [PULL] [Bionic] powerpc: support software count cache flush

Andrea Righi andrea.righi at canonical.com
Tue Apr 9 14:20:09 UTC 2019


This is the backport of the count cache flush by software on
context-switch capability for powerpc (Spectre v2 mitigation).

All clean cherry picks, except few minor adjustments to apply some
patches, but no significant backport changes.

The following changes since commit 5f1ee1100f874b50e5f53d8e772a447acdffe1af:

  openvswitch: fix flow actions reallocation (2019-04-08 17:22:37 +0200)

are available in the Git repository at:

  git://git.launchpad.net/~arighi/+git/bionic-linux powerpc-count-cache-flush-spectre-v2

for you to fetch changes up to 7ad9e126e998defa1759181b54db7590bb2cf3bd:

  powerpc/security: Fix spectre_v2 reporting (2019-04-09 15:53:35 +0200)

----------------------------------------------------------------
Diana Craciun (4):
      powerpc/64: Disable the speculation barrier from the command line
      powerpc/64: Make stf barrier PPC_BOOK3S_64 specific.
      powerpc/64: Make meltdown reporting Book3S 64 specific
      powerpc/fsl: Fix spectre_v2 mitigations reporting

Michael Ellerman (11):
      powerpc: Use barrier_nospec in copy_from_user()
      powerpc/64: Use barrier_nospec in syscall entry
      powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2
      powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC
      powerpc/64: Call setup_barrier_nospec() from setup_arch()
      powerpc/asm: Add a patch_site macro & helpers for patching instructions
      powerpc/64s: Add new security feature flags for count cache flush
      powerpc/64s: Add support for software count cache flush
      powerpc/pseries: Query hypervisor for count cache flush settings
      powerpc/powernv: Query firmware for count cache flush settings
      powerpc/security: Fix spectre_v2 reporting

Michal Suchanek (4):
      powerpc/64s: Add support for ori barrier_nospec patching
      powerpc/64s: Patch barrier_nospec in modules
      powerpc/64s: Enable barrier_nospec based on firmware settings
      powerpc/64s: Enhance the information in cpu_show_spectre_v1()

 arch/powerpc/Kconfig                         |   7 +-
 arch/powerpc/include/asm/asm-prototypes.h    |   6 +
 arch/powerpc/include/asm/barrier.h           |   8 +-
 arch/powerpc/include/asm/code-patching-asm.h |  18 +++
 arch/powerpc/include/asm/code-patching.h     |   2 +
 arch/powerpc/include/asm/feature-fixups.h    |   9 ++
 arch/powerpc/include/asm/hvcall.h            |   2 +
 arch/powerpc/include/asm/security_features.h |   7 +
 arch/powerpc/include/asm/setup.h             |  13 ++
 arch/powerpc/include/asm/uaccess.h           |  11 +-
 arch/powerpc/kernel/Makefile                 |   3 +-
 arch/powerpc/kernel/entry_64.S               |  64 +++++++++
 arch/powerpc/kernel/module.c                 |  10 +-
 arch/powerpc/kernel/security.c               | 189 +++++++++++++++++++++++++--
 arch/powerpc/kernel/setup-common.c           |   2 +
 arch/powerpc/kernel/vmlinux.lds.S            |  11 +-
 arch/powerpc/lib/code-patching.c             |  16 +++
 arch/powerpc/lib/feature-fixups.c            |  39 ++++++
 arch/powerpc/platforms/powernv/setup.c       |   7 +
 arch/powerpc/platforms/pseries/setup.c       |   7 +
 20 files changed, 414 insertions(+), 17 deletions(-)
 create mode 100644 arch/powerpc/include/asm/code-patching-asm.h



More information about the kernel-team mailing list