NAK: [SRU] [PULL] [Bionic] powerpc: support software count cache flush

Kleber Souza kleber.souza at canonical.com
Fri Apr 12 15:37:31 UTC 2019


On 4/9/19 8:20 AM, Andrea Righi wrote:
> This is the backport of the count cache flush by software on
> context-switch capability for powerpc (Spectre v2 mitigation).
> 
> All clean cherry picks, except few minor adjustments to apply some
> patches, but no significant backport changes.
> 
> The following changes since commit 5f1ee1100f874b50e5f53d8e772a447acdffe1af:
> 
>   openvswitch: fix flow actions reallocation (2019-04-08 17:22:37 +0200)
> 
> are available in the Git repository at:
> 
>   git://git.launchpad.net/~arighi/+git/bionic-linux powerpc-count-cache-flush-spectre-v2
> 
> for you to fetch changes up to 7ad9e126e998defa1759181b54db7590bb2cf3bd:
> 
>   powerpc/security: Fix spectre_v2 reporting (2019-04-09 15:53:35 +0200)

Hi Andrea,

IBM has requested a few more patches on the bug report, so I'm NAK'ing this PR.


Thanks,
Kleber


> 
> ----------------------------------------------------------------
> Diana Craciun (4):
>       powerpc/64: Disable the speculation barrier from the command line
>       powerpc/64: Make stf barrier PPC_BOOK3S_64 specific.
>       powerpc/64: Make meltdown reporting Book3S 64 specific
>       powerpc/fsl: Fix spectre_v2 mitigations reporting
> 
> Michael Ellerman (11):
>       powerpc: Use barrier_nospec in copy_from_user()
>       powerpc/64: Use barrier_nospec in syscall entry
>       powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2
>       powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC
>       powerpc/64: Call setup_barrier_nospec() from setup_arch()
>       powerpc/asm: Add a patch_site macro & helpers for patching instructions
>       powerpc/64s: Add new security feature flags for count cache flush
>       powerpc/64s: Add support for software count cache flush
>       powerpc/pseries: Query hypervisor for count cache flush settings
>       powerpc/powernv: Query firmware for count cache flush settings
>       powerpc/security: Fix spectre_v2 reporting
> 
> Michal Suchanek (4):
>       powerpc/64s: Add support for ori barrier_nospec patching
>       powerpc/64s: Patch barrier_nospec in modules
>       powerpc/64s: Enable barrier_nospec based on firmware settings
>       powerpc/64s: Enhance the information in cpu_show_spectre_v1()
> 
>  arch/powerpc/Kconfig                         |   7 +-
>  arch/powerpc/include/asm/asm-prototypes.h    |   6 +
>  arch/powerpc/include/asm/barrier.h           |   8 +-
>  arch/powerpc/include/asm/code-patching-asm.h |  18 +++
>  arch/powerpc/include/asm/code-patching.h     |   2 +
>  arch/powerpc/include/asm/feature-fixups.h    |   9 ++
>  arch/powerpc/include/asm/hvcall.h            |   2 +
>  arch/powerpc/include/asm/security_features.h |   7 +
>  arch/powerpc/include/asm/setup.h             |  13 ++
>  arch/powerpc/include/asm/uaccess.h           |  11 +-
>  arch/powerpc/kernel/Makefile                 |   3 +-
>  arch/powerpc/kernel/entry_64.S               |  64 +++++++++
>  arch/powerpc/kernel/module.c                 |  10 +-
>  arch/powerpc/kernel/security.c               | 189 +++++++++++++++++++++++++--
>  arch/powerpc/kernel/setup-common.c           |   2 +
>  arch/powerpc/kernel/vmlinux.lds.S            |  11 +-
>  arch/powerpc/lib/code-patching.c             |  16 +++
>  arch/powerpc/lib/feature-fixups.c            |  39 ++++++
>  arch/powerpc/platforms/powernv/setup.c       |   7 +
>  arch/powerpc/platforms/pseries/setup.c       |   7 +
>  20 files changed, 414 insertions(+), 17 deletions(-)
>  create mode 100644 arch/powerpc/include/asm/code-patching-asm.h
> 




More information about the kernel-team mailing list