Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4

2019-04-29 Thread Diana Madalina Craciun
On 4/28/2019 9:19 AM, Michael Ellerman wrote:
> Diana Madalina Craciun  writes:
>> Hi Michael,
>>
>> There are some missing NXP Spectre v2 patches. I can send them
>> separately if the series will be accepted. I have merged them, but I did
>> not test them, I was sick today and incapable of doing that.
> No worries, there's no rush :)
>
> Sorry I missed them, I thought I had a list that included everything.
> Which commits was it I missed?
>
> I guess post them as a reply to this thread? That way whether the series
> is merged by Greg or not, there's a record here of what the backports
> look like.

I have sent them as a separate series, but mentioning them here as well:

Diana Craciun (8):
  powerpc/fsl: Enable runtime patching if nospectre_v2 boot arg is used
  powerpc/fsl: Flush branch predictor when entering KVM
  powerpc/fsl: Emulate SPRN_BUCSR register
  powerpc/fsl: Flush the branch predictor at each kernel entry (32 bit)
  powerpc/fsl: Sanitize the syscall table for NXP PowerPC 32 bit
platforms
  powerpc/fsl: Fixed warning: orphan section `__btb_flush_fixup'
  powerpc/fsl: Add FSL_PPC_BOOK3E as supported arch for nospectre_v2
boot arg
  Documentation: Add nospectre_v1 parameter

regards

> cheers
>
>> On 4/21/2019 5:21 PM, Michael Ellerman wrote:
>>> -BEGIN PGP SIGNED MESSAGE-
>>> Hash: SHA1
>>>
>>> Hi Greg/Sasha,
>>>
>>> Please queue up these powerpc patches for 4.4 if you have no objections.
>>>
>>> cheers
>>>
>>>
>>> Christophe Leroy (1):
>>>   powerpc/fsl: Fix the flush of branch predictor.
>>>
>>> Diana Craciun (10):
>>>   powerpc/64: Disable the speculation barrier from the command line
>>>   powerpc/64: Make stf barrier PPC_BOOK3S_64 specific.
>>>   powerpc/64: Make meltdown reporting Book3S 64 specific
>>>   powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E
>>>   powerpc/fsl: Add infrastructure to fixup branch predictor flush
>>>   powerpc/fsl: Add macro to flush the branch predictor
>>>   powerpc/fsl: Fix spectre_v2 mitigations reporting
>>>   powerpc/fsl: Add nospectre_v2 command line argument
>>>   powerpc/fsl: Flush the branch predictor at each kernel entry (64bit)
>>>   powerpc/fsl: Update Spectre v2 reporting
>>>
>>> Mauricio Faria de Oliveira (4):
>>>   powerpc/rfi-flush: Differentiate enabled and patched flush types
>>>   powerpc/pseries: Fix clearing of security feature flags
>>>   powerpc: Move default security feature flags
>>>   powerpc/pseries: Restore default security feature flags on setup
>>>
>>> Michael Ellerman (29):
>>>   powerpc/xmon: Add RFI flush related fields to paca dump
>>>   powerpc/pseries: Support firmware disable of RFI flush
>>>   powerpc/powernv: Support firmware disable of RFI flush
>>>   powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs
>>> code
>>>   powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again
>>>   powerpc/rfi-flush: Always enable fallback flush on pseries
>>>   powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags
>>>   powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration
>>>   powerpc: Add security feature flags for Spectre/Meltdown
>>>   powerpc/pseries: Set or clear security feature flags
>>>   powerpc/powernv: Set or clear security feature flags
>>>   powerpc/64s: Move cpu_show_meltdown()
>>>   powerpc/64s: Enhance the information in cpu_show_meltdown()
>>>   powerpc/powernv: Use the security flags in pnv_setup_rfi_flush()
>>>   powerpc/pseries: Use the security flags in pseries_setup_rfi_flush()
>>>   powerpc/64s: Wire up cpu_show_spectre_v1()
>>>   powerpc/64s: Wire up cpu_show_spectre_v2()
>>>   powerpc/64s: Fix section mismatch warnings from setup_rfi_flush()
>>>   powerpc/64: Use barrier_nospec in syscall entry
>>>   powerpc: Use barrier_nospec in copy_from_user()
>>>   powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2
>>>   powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC
>>>   powerpc/64: Call setup_barrier_nospec() from setup_arch()
>>>   powerpc/asm: Add a patch_site macro & helpers for patching
>>> instructions
>>>   powerpc/64s: Add new security feature flags for count cache flush
>>>   powerpc/64s: Add support for software count cache flush
>>>   powerpc/pseries: Query hypervisor for count cache flush settings
>>>   powerpc/powernv: Query firmware for count cache flush settings
>>>   powerpc/security: Fix spectre_v2 reporting
>>>
>>> Michael Neuling (1):
>>>   powerpc: Avoid code patching freed init sections
>>>
>>> Michal Suchanek (5):
>>>   powerpc/64s: Add barrier_nospec
>>>   powerpc/64s: Add support for ori barrier_nospec patching
>>>   powerpc/64s: Patch barrier_nospec in modules
>>>   powerpc/64s: Enable barrier_nospec based on firmware settings
>>>   powerpc/64s: Enhance the information in cpu_show_spectre_v1()
>>>
>>> Nicholas Piggin (2):
>>>   powerpc/64s: Improve RFI L1-D cache flush fallback
>>>   powerpc/64s: Add support for a store forwarding barrier at kernel
>>> entry/exit
>>>
>>>  arch/powerpc/Kconfig   

Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4

2019-04-29 Thread Michael Ellerman
Greg KH  writes:
> On Mon, Apr 29, 2019 at 04:26:45PM +1000, Michael Ellerman wrote:
>> Michael Ellerman  writes:
>> > Greg KH  writes:
>> >> On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote:
>> >>> -BEGIN PGP SIGNED MESSAGE-
>> >>> Hash: SHA1
>> >>> 
>> >>> Hi Greg/Sasha,
>> >>> 
>> >>> Please queue up these powerpc patches for 4.4 if you have no objections.
>> >>
>> >> why?  Do you, or someone else, really care about spectre issues in 4.4?
>> >> Who is using ppc for 4.4 becides a specific enterprise distro (and they
>> >> don't seem to be pulling in my stable updates anyway...)?
>> >
>> > Someone asked for it, but TBH I can't remember who it was. I can chase
>> > it up if you like.
>> 
>> Yeah it was a request from one of the distros. They plan to take it once
>> it lands in 4.4 stable.
>
> Ok, thanks for confirming, I'll work on this this afternoon.

Thanks. If there's any problems let us know.

cheers


Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4

2019-04-29 Thread Greg KH
On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> Hi Greg/Sasha,
> 
> Please queue up these powerpc patches for 4.4 if you have no objections.

All now queued up, thanks.

greg k-h


Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4

2019-04-29 Thread Greg KH
On Mon, Apr 29, 2019 at 04:26:45PM +1000, Michael Ellerman wrote:
> Michael Ellerman  writes:
> > Greg KH  writes:
> >> On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote:
> >>> -BEGIN PGP SIGNED MESSAGE-
> >>> Hash: SHA1
> >>> 
> >>> Hi Greg/Sasha,
> >>> 
> >>> Please queue up these powerpc patches for 4.4 if you have no objections.
> >>
> >> why?  Do you, or someone else, really care about spectre issues in 4.4?
> >> Who is using ppc for 4.4 becides a specific enterprise distro (and they
> >> don't seem to be pulling in my stable updates anyway...)?
> >
> > Someone asked for it, but TBH I can't remember who it was. I can chase
> > it up if you like.
> 
> Yeah it was a request from one of the distros. They plan to take it once
> it lands in 4.4 stable.

Ok, thanks for confirming, I'll work on this this afternoon.

greg k-h


Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4

2019-04-28 Thread Michael Ellerman
Michael Ellerman  writes:
> Greg KH  writes:
>> On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote:
>>> -BEGIN PGP SIGNED MESSAGE-
>>> Hash: SHA1
>>> 
>>> Hi Greg/Sasha,
>>> 
>>> Please queue up these powerpc patches for 4.4 if you have no objections.
>>
>> why?  Do you, or someone else, really care about spectre issues in 4.4?
>> Who is using ppc for 4.4 becides a specific enterprise distro (and they
>> don't seem to be pulling in my stable updates anyway...)?
>
> Someone asked for it, but TBH I can't remember who it was. I can chase
> it up if you like.

Yeah it was a request from one of the distros. They plan to take it once
it lands in 4.4 stable.

cheers


Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4

2019-04-27 Thread Michael Ellerman
Diana Madalina Craciun  writes:
> Hi Michael,
>
> There are some missing NXP Spectre v2 patches. I can send them
> separately if the series will be accepted. I have merged them, but I did
> not test them, I was sick today and incapable of doing that.

No worries, there's no rush :)

Sorry I missed them, I thought I had a list that included everything.
Which commits was it I missed?

I guess post them as a reply to this thread? That way whether the series
is merged by Greg or not, there's a record here of what the backports
look like.

cheers

> On 4/21/2019 5:21 PM, Michael Ellerman wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>> Hi Greg/Sasha,
>>
>> Please queue up these powerpc patches for 4.4 if you have no objections.
>>
>> cheers
>>
>>
>> Christophe Leroy (1):
>>   powerpc/fsl: Fix the flush of branch predictor.
>>
>> Diana Craciun (10):
>>   powerpc/64: Disable the speculation barrier from the command line
>>   powerpc/64: Make stf barrier PPC_BOOK3S_64 specific.
>>   powerpc/64: Make meltdown reporting Book3S 64 specific
>>   powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E
>>   powerpc/fsl: Add infrastructure to fixup branch predictor flush
>>   powerpc/fsl: Add macro to flush the branch predictor
>>   powerpc/fsl: Fix spectre_v2 mitigations reporting
>>   powerpc/fsl: Add nospectre_v2 command line argument
>>   powerpc/fsl: Flush the branch predictor at each kernel entry (64bit)
>>   powerpc/fsl: Update Spectre v2 reporting
>>
>> Mauricio Faria de Oliveira (4):
>>   powerpc/rfi-flush: Differentiate enabled and patched flush types
>>   powerpc/pseries: Fix clearing of security feature flags
>>   powerpc: Move default security feature flags
>>   powerpc/pseries: Restore default security feature flags on setup
>>
>> Michael Ellerman (29):
>>   powerpc/xmon: Add RFI flush related fields to paca dump
>>   powerpc/pseries: Support firmware disable of RFI flush
>>   powerpc/powernv: Support firmware disable of RFI flush
>>   powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs
>> code
>>   powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again
>>   powerpc/rfi-flush: Always enable fallback flush on pseries
>>   powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags
>>   powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration
>>   powerpc: Add security feature flags for Spectre/Meltdown
>>   powerpc/pseries: Set or clear security feature flags
>>   powerpc/powernv: Set or clear security feature flags
>>   powerpc/64s: Move cpu_show_meltdown()
>>   powerpc/64s: Enhance the information in cpu_show_meltdown()
>>   powerpc/powernv: Use the security flags in pnv_setup_rfi_flush()
>>   powerpc/pseries: Use the security flags in pseries_setup_rfi_flush()
>>   powerpc/64s: Wire up cpu_show_spectre_v1()
>>   powerpc/64s: Wire up cpu_show_spectre_v2()
>>   powerpc/64s: Fix section mismatch warnings from setup_rfi_flush()
>>   powerpc/64: Use barrier_nospec in syscall entry
>>   powerpc: Use barrier_nospec in copy_from_user()
>>   powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2
>>   powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC
>>   powerpc/64: Call setup_barrier_nospec() from setup_arch()
>>   powerpc/asm: Add a patch_site macro & helpers for patching
>> instructions
>>   powerpc/64s: Add new security feature flags for count cache flush
>>   powerpc/64s: Add support for software count cache flush
>>   powerpc/pseries: Query hypervisor for count cache flush settings
>>   powerpc/powernv: Query firmware for count cache flush settings
>>   powerpc/security: Fix spectre_v2 reporting
>>
>> Michael Neuling (1):
>>   powerpc: Avoid code patching freed init sections
>>
>> Michal Suchanek (5):
>>   powerpc/64s: Add barrier_nospec
>>   powerpc/64s: Add support for ori barrier_nospec patching
>>   powerpc/64s: Patch barrier_nospec in modules
>>   powerpc/64s: Enable barrier_nospec based on firmware settings
>>   powerpc/64s: Enhance the information in cpu_show_spectre_v1()
>>
>> Nicholas Piggin (2):
>>   powerpc/64s: Improve RFI L1-D cache flush fallback
>>   powerpc/64s: Add support for a store forwarding barrier at kernel
>> entry/exit
>>
>>  arch/powerpc/Kconfig |   7 +-
>>  arch/powerpc/include/asm/asm-prototypes.h|  21 +
>>  arch/powerpc/include/asm/barrier.h   |  21 +
>>  arch/powerpc/include/asm/code-patching-asm.h |  18 +
>>  arch/powerpc/include/asm/code-patching.h |   2 +
>>  arch/powerpc/include/asm/exception-64s.h |  35 ++
>>  arch/powerpc/include/asm/feature-fixups.h|  40 ++
>>  arch/powerpc/include/asm/hvcall.h|   5 +
>>  arch/powerpc/include/asm/paca.h  |   3 +-
>>  arch/powerpc/include/asm/ppc-opcode.h|   1 +
>>  arch/powerpc/include/asm/ppc_asm.h   |  11 +
>>  arch/powerpc/include/asm/security_features.h |  92 
>>  arch/powerpc/include/asm/setup.h |  23 +-
>>  arch/powerpc/include/asm/uaccess.h   |  

Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4

2019-04-27 Thread Michael Ellerman
Greg KH  writes:

> On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>> 
>> Hi Greg/Sasha,
>> 
>> Please queue up these powerpc patches for 4.4 if you have no objections.
>
> why?  Do you, or someone else, really care about spectre issues in 4.4?
> Who is using ppc for 4.4 becides a specific enterprise distro (and they
> don't seem to be pulling in my stable updates anyway...)?

Someone asked for it, but TBH I can't remember who it was. I can chase
it up if you like.

cheers


Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4

2019-04-24 Thread Greg KH
On Mon, Apr 22, 2019 at 03:27:56PM +, Diana Madalina Craciun wrote:
> On 4/21/2019 7:34 PM, Greg KH wrote:
> > On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote:
> >> -BEGIN PGP SIGNED MESSAGE-
> >> Hash: SHA1
> >>
> >> Hi Greg/Sasha,
> >>
> >> Please queue up these powerpc patches for 4.4 if you have no objections.
> > why?  Do you, or someone else, really care about spectre issues in 4.4?
> > Who is using ppc for 4.4 becides a specific enterprise distro (and they
> > don't seem to be pulling in my stable updates anyway...)?
> 
> We (NXP) received questions from customers regarding Spectre mitigations
> on kernel 4.4. Not sure if they really need them as some systems are
> enclosed embedded ones, but they asked for them.

"Asking about", and "actually needing them" are two different things, as
you state.  It would be good to get confirmation from someone that these
are "actually needed".

thanks,

greg k-h


Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4

2019-04-22 Thread Diana Madalina Craciun
Hi Michael,

There are some missing NXP Spectre v2 patches. I can send them
separately if the series will be accepted. I have merged them, but I did
not test them, I was sick today and incapable of doing that.

Thanks,
Diana


On 4/21/2019 5:21 PM, Michael Ellerman wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Hi Greg/Sasha,
>
> Please queue up these powerpc patches for 4.4 if you have no objections.
>
> cheers
>
>
> Christophe Leroy (1):
>   powerpc/fsl: Fix the flush of branch predictor.
>
> Diana Craciun (10):
>   powerpc/64: Disable the speculation barrier from the command line
>   powerpc/64: Make stf barrier PPC_BOOK3S_64 specific.
>   powerpc/64: Make meltdown reporting Book3S 64 specific
>   powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E
>   powerpc/fsl: Add infrastructure to fixup branch predictor flush
>   powerpc/fsl: Add macro to flush the branch predictor
>   powerpc/fsl: Fix spectre_v2 mitigations reporting
>   powerpc/fsl: Add nospectre_v2 command line argument
>   powerpc/fsl: Flush the branch predictor at each kernel entry (64bit)
>   powerpc/fsl: Update Spectre v2 reporting
>
> Mauricio Faria de Oliveira (4):
>   powerpc/rfi-flush: Differentiate enabled and patched flush types
>   powerpc/pseries: Fix clearing of security feature flags
>   powerpc: Move default security feature flags
>   powerpc/pseries: Restore default security feature flags on setup
>
> Michael Ellerman (29):
>   powerpc/xmon: Add RFI flush related fields to paca dump
>   powerpc/pseries: Support firmware disable of RFI flush
>   powerpc/powernv: Support firmware disable of RFI flush
>   powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs
> code
>   powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again
>   powerpc/rfi-flush: Always enable fallback flush on pseries
>   powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags
>   powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration
>   powerpc: Add security feature flags for Spectre/Meltdown
>   powerpc/pseries: Set or clear security feature flags
>   powerpc/powernv: Set or clear security feature flags
>   powerpc/64s: Move cpu_show_meltdown()
>   powerpc/64s: Enhance the information in cpu_show_meltdown()
>   powerpc/powernv: Use the security flags in pnv_setup_rfi_flush()
>   powerpc/pseries: Use the security flags in pseries_setup_rfi_flush()
>   powerpc/64s: Wire up cpu_show_spectre_v1()
>   powerpc/64s: Wire up cpu_show_spectre_v2()
>   powerpc/64s: Fix section mismatch warnings from setup_rfi_flush()
>   powerpc/64: Use barrier_nospec in syscall entry
>   powerpc: Use barrier_nospec in copy_from_user()
>   powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2
>   powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC
>   powerpc/64: Call setup_barrier_nospec() from setup_arch()
>   powerpc/asm: Add a patch_site macro & helpers for patching
> instructions
>   powerpc/64s: Add new security feature flags for count cache flush
>   powerpc/64s: Add support for software count cache flush
>   powerpc/pseries: Query hypervisor for count cache flush settings
>   powerpc/powernv: Query firmware for count cache flush settings
>   powerpc/security: Fix spectre_v2 reporting
>
> Michael Neuling (1):
>   powerpc: Avoid code patching freed init sections
>
> Michal Suchanek (5):
>   powerpc/64s: Add barrier_nospec
>   powerpc/64s: Add support for ori barrier_nospec patching
>   powerpc/64s: Patch barrier_nospec in modules
>   powerpc/64s: Enable barrier_nospec based on firmware settings
>   powerpc/64s: Enhance the information in cpu_show_spectre_v1()
>
> Nicholas Piggin (2):
>   powerpc/64s: Improve RFI L1-D cache flush fallback
>   powerpc/64s: Add support for a store forwarding barrier at kernel
> entry/exit
>
>  arch/powerpc/Kconfig |   7 +-
>  arch/powerpc/include/asm/asm-prototypes.h|  21 +
>  arch/powerpc/include/asm/barrier.h   |  21 +
>  arch/powerpc/include/asm/code-patching-asm.h |  18 +
>  arch/powerpc/include/asm/code-patching.h |   2 +
>  arch/powerpc/include/asm/exception-64s.h |  35 ++
>  arch/powerpc/include/asm/feature-fixups.h|  40 ++
>  arch/powerpc/include/asm/hvcall.h|   5 +
>  arch/powerpc/include/asm/paca.h  |   3 +-
>  arch/powerpc/include/asm/ppc-opcode.h|   1 +
>  arch/powerpc/include/asm/ppc_asm.h   |  11 +
>  arch/powerpc/include/asm/security_features.h |  92 
>  arch/powerpc/include/asm/setup.h |  23 +-
>  arch/powerpc/include/asm/uaccess.h   |  18 +-
>  arch/powerpc/kernel/Makefile |   1 +
>  arch/powerpc/kernel/asm-offsets.c|   3 +-
>  arch/powerpc/kernel/entry_64.S   |  69 +++
>  arch/powerpc/kernel/exceptions-64e.S |  27 +-
>  arch/powerpc/kernel/exceptions-64s.S |  98 +++--
>  arch/powerpc/kernel/module.c |  10 +-
>  arch/powerpc/kernel/security.c   | 433 

Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4

2019-04-22 Thread Diana Madalina Craciun
On 4/21/2019 7:34 PM, Greg KH wrote:
> On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>> Hi Greg/Sasha,
>>
>> Please queue up these powerpc patches for 4.4 if you have no objections.
> why?  Do you, or someone else, really care about spectre issues in 4.4?
> Who is using ppc for 4.4 becides a specific enterprise distro (and they
> don't seem to be pulling in my stable updates anyway...)?

We (NXP) received questions from customers regarding Spectre mitigations
on kernel 4.4. Not sure if they really need them as some systems are
enclosed embedded ones, but they asked for them.

Thanks,
Diana

> I'll be glad to take these, just want to make sure that someone actually
> will use them :)
>
> thanks,
>
> greg k-h
>



Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4

2019-04-21 Thread Greg KH
On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> Hi Greg/Sasha,
> 
> Please queue up these powerpc patches for 4.4 if you have no objections.

why?  Do you, or someone else, really care about spectre issues in 4.4?
Who is using ppc for 4.4 becides a specific enterprise distro (and they
don't seem to be pulling in my stable updates anyway...)?

I'll be glad to take these, just want to make sure that someone actually
will use them :)

thanks,

greg k-h


[PATCH stable v4.4 00/52] powerpc spectre backports for 4.4

2019-04-21 Thread Michael Ellerman
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Greg/Sasha,

Please queue up these powerpc patches for 4.4 if you have no objections.

cheers


Christophe Leroy (1):
  powerpc/fsl: Fix the flush of branch predictor.

Diana Craciun (10):
  powerpc/64: Disable the speculation barrier from the command line
  powerpc/64: Make stf barrier PPC_BOOK3S_64 specific.
  powerpc/64: Make meltdown reporting Book3S 64 specific
  powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E
  powerpc/fsl: Add infrastructure to fixup branch predictor flush
  powerpc/fsl: Add macro to flush the branch predictor
  powerpc/fsl: Fix spectre_v2 mitigations reporting
  powerpc/fsl: Add nospectre_v2 command line argument
  powerpc/fsl: Flush the branch predictor at each kernel entry (64bit)
  powerpc/fsl: Update Spectre v2 reporting

Mauricio Faria de Oliveira (4):
  powerpc/rfi-flush: Differentiate enabled and patched flush types
  powerpc/pseries: Fix clearing of security feature flags
  powerpc: Move default security feature flags
  powerpc/pseries: Restore default security feature flags on setup

Michael Ellerman (29):
  powerpc/xmon: Add RFI flush related fields to paca dump
  powerpc/pseries: Support firmware disable of RFI flush
  powerpc/powernv: Support firmware disable of RFI flush
  powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs
code
  powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again
  powerpc/rfi-flush: Always enable fallback flush on pseries
  powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags
  powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration
  powerpc: Add security feature flags for Spectre/Meltdown
  powerpc/pseries: Set or clear security feature flags
  powerpc/powernv: Set or clear security feature flags
  powerpc/64s: Move cpu_show_meltdown()
  powerpc/64s: Enhance the information in cpu_show_meltdown()
  powerpc/powernv: Use the security flags in pnv_setup_rfi_flush()
  powerpc/pseries: Use the security flags in pseries_setup_rfi_flush()
  powerpc/64s: Wire up cpu_show_spectre_v1()
  powerpc/64s: Wire up cpu_show_spectre_v2()
  powerpc/64s: Fix section mismatch warnings from setup_rfi_flush()
  powerpc/64: Use barrier_nospec in syscall entry
  powerpc: Use barrier_nospec in copy_from_user()
  powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2
  powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC
  powerpc/64: Call setup_barrier_nospec() from setup_arch()
  powerpc/asm: Add a patch_site macro & helpers for patching
instructions
  powerpc/64s: Add new security feature flags for count cache flush
  powerpc/64s: Add support for software count cache flush
  powerpc/pseries: Query hypervisor for count cache flush settings
  powerpc/powernv: Query firmware for count cache flush settings
  powerpc/security: Fix spectre_v2 reporting

Michael Neuling (1):
  powerpc: Avoid code patching freed init sections

Michal Suchanek (5):
  powerpc/64s: Add barrier_nospec
  powerpc/64s: Add support for ori barrier_nospec patching
  powerpc/64s: Patch barrier_nospec in modules
  powerpc/64s: Enable barrier_nospec based on firmware settings
  powerpc/64s: Enhance the information in cpu_show_spectre_v1()

Nicholas Piggin (2):
  powerpc/64s: Improve RFI L1-D cache flush fallback
  powerpc/64s: Add support for a store forwarding barrier at kernel
entry/exit

 arch/powerpc/Kconfig |   7 +-
 arch/powerpc/include/asm/asm-prototypes.h|  21 +
 arch/powerpc/include/asm/barrier.h   |  21 +
 arch/powerpc/include/asm/code-patching-asm.h |  18 +
 arch/powerpc/include/asm/code-patching.h |   2 +
 arch/powerpc/include/asm/exception-64s.h |  35 ++
 arch/powerpc/include/asm/feature-fixups.h|  40 ++
 arch/powerpc/include/asm/hvcall.h|   5 +
 arch/powerpc/include/asm/paca.h  |   3 +-
 arch/powerpc/include/asm/ppc-opcode.h|   1 +
 arch/powerpc/include/asm/ppc_asm.h   |  11 +
 arch/powerpc/include/asm/security_features.h |  92 
 arch/powerpc/include/asm/setup.h |  23 +-
 arch/powerpc/include/asm/uaccess.h   |  18 +-
 arch/powerpc/kernel/Makefile |   1 +
 arch/powerpc/kernel/asm-offsets.c|   3 +-
 arch/powerpc/kernel/entry_64.S   |  69 +++
 arch/powerpc/kernel/exceptions-64e.S |  27 +-
 arch/powerpc/kernel/exceptions-64s.S |  98 +++--
 arch/powerpc/kernel/module.c |  10 +-
 arch/powerpc/kernel/security.c   | 433 +++
 arch/powerpc/kernel/setup_32.c   |   2 +
 arch/powerpc/kernel/setup_64.c   |  50 +--
 arch/powerpc/kernel/vmlinux.lds.S|  33 +-
 arch/powerpc/lib/code-patching.c |  29 ++
 arch/powerpc/lib/feature-fixups.c| 218 +-
 arch/powerpc/mm/mem.c|   2 +
 arch/powerpc/mm/tlb_low_64e.S|   7 +
 arch/powerpc/platforms/powernv/setup.c   |  99 +++--
 arc