NAK: [SRU] [PULL] [Bionic] powerpc: support software count cache flush
Kleber Souza
kleber.souza at canonical.com
Fri Apr 12 15:37:31 UTC 2019
On 4/9/19 8:20 AM, Andrea Righi wrote:
> This is the backport of the count cache flush by software on
> context-switch capability for powerpc (Spectre v2 mitigation).
>
> All clean cherry picks, except few minor adjustments to apply some
> patches, but no significant backport changes.
>
> The following changes since commit 5f1ee1100f874b50e5f53d8e772a447acdffe1af:
>
> openvswitch: fix flow actions reallocation (2019-04-08 17:22:37 +0200)
>
> are available in the Git repository at:
>
> git://git.launchpad.net/~arighi/+git/bionic-linux powerpc-count-cache-flush-spectre-v2
>
> for you to fetch changes up to 7ad9e126e998defa1759181b54db7590bb2cf3bd:
>
> powerpc/security: Fix spectre_v2 reporting (2019-04-09 15:53:35 +0200)
Hi Andrea,
IBM has requested a few more patches on the bug report, so I'm NAK'ing this PR.
Thanks,
Kleber
>
> ----------------------------------------------------------------
> Diana Craciun (4):
> powerpc/64: Disable the speculation barrier from the command line
> powerpc/64: Make stf barrier PPC_BOOK3S_64 specific.
> powerpc/64: Make meltdown reporting Book3S 64 specific
> powerpc/fsl: Fix spectre_v2 mitigations reporting
>
> Michael Ellerman (11):
> powerpc: Use barrier_nospec in copy_from_user()
> powerpc/64: Use barrier_nospec in syscall entry
> powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2
> powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC
> powerpc/64: Call setup_barrier_nospec() from setup_arch()
> powerpc/asm: Add a patch_site macro & helpers for patching instructions
> powerpc/64s: Add new security feature flags for count cache flush
> powerpc/64s: Add support for software count cache flush
> powerpc/pseries: Query hypervisor for count cache flush settings
> powerpc/powernv: Query firmware for count cache flush settings
> powerpc/security: Fix spectre_v2 reporting
>
> Michal Suchanek (4):
> powerpc/64s: Add support for ori barrier_nospec patching
> powerpc/64s: Patch barrier_nospec in modules
> powerpc/64s: Enable barrier_nospec based on firmware settings
> powerpc/64s: Enhance the information in cpu_show_spectre_v1()
>
> arch/powerpc/Kconfig | 7 +-
> arch/powerpc/include/asm/asm-prototypes.h | 6 +
> arch/powerpc/include/asm/barrier.h | 8 +-
> arch/powerpc/include/asm/code-patching-asm.h | 18 +++
> arch/powerpc/include/asm/code-patching.h | 2 +
> arch/powerpc/include/asm/feature-fixups.h | 9 ++
> arch/powerpc/include/asm/hvcall.h | 2 +
> arch/powerpc/include/asm/security_features.h | 7 +
> arch/powerpc/include/asm/setup.h | 13 ++
> arch/powerpc/include/asm/uaccess.h | 11 +-
> arch/powerpc/kernel/Makefile | 3 +-
> arch/powerpc/kernel/entry_64.S | 64 +++++++++
> arch/powerpc/kernel/module.c | 10 +-
> arch/powerpc/kernel/security.c | 189 +++++++++++++++++++++++++--
> arch/powerpc/kernel/setup-common.c | 2 +
> arch/powerpc/kernel/vmlinux.lds.S | 11 +-
> arch/powerpc/lib/code-patching.c | 16 +++
> arch/powerpc/lib/feature-fixups.c | 39 ++++++
> arch/powerpc/platforms/powernv/setup.c | 7 +
> arch/powerpc/platforms/pseries/setup.c | 7 +
> 20 files changed, 414 insertions(+), 17 deletions(-)
> create mode 100644 arch/powerpc/include/asm/code-patching-asm.h
>
More information about the kernel-team
mailing list