Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4
On 4/28/2019 9:19 AM, Michael Ellerman wrote: > Diana Madalina Craciun writes: >> Hi Michael, >> >> There are some missing NXP Spectre v2 patches. I can send them >> separately if the series will be accepted. I have merged them, but I did >> not test them, I was sick today and incapable of doing that. > No worries, there's no rush :) > > Sorry I missed them, I thought I had a list that included everything. > Which commits was it I missed? > > I guess post them as a reply to this thread? That way whether the series > is merged by Greg or not, there's a record here of what the backports > look like. I have sent them as a separate series, but mentioning them here as well: Diana Craciun (8): powerpc/fsl: Enable runtime patching if nospectre_v2 boot arg is used powerpc/fsl: Flush branch predictor when entering KVM powerpc/fsl: Emulate SPRN_BUCSR register powerpc/fsl: Flush the branch predictor at each kernel entry (32 bit) powerpc/fsl: Sanitize the syscall table for NXP PowerPC 32 bit platforms powerpc/fsl: Fixed warning: orphan section `__btb_flush_fixup' powerpc/fsl: Add FSL_PPC_BOOK3E as supported arch for nospectre_v2 boot arg Documentation: Add nospectre_v1 parameter regards > cheers > >> On 4/21/2019 5:21 PM, Michael Ellerman wrote: >>> -BEGIN PGP SIGNED MESSAGE- >>> Hash: SHA1 >>> >>> Hi Greg/Sasha, >>> >>> Please queue up these powerpc patches for 4.4 if you have no objections. >>> >>> cheers >>> >>> >>> Christophe Leroy (1): >>> powerpc/fsl: Fix the flush of branch predictor. >>> >>> Diana Craciun (10): >>> powerpc/64: Disable the speculation barrier from the command line >>> powerpc/64: Make stf barrier PPC_BOOK3S_64 specific. >>> powerpc/64: Make meltdown reporting Book3S 64 specific >>> powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E >>> powerpc/fsl: Add infrastructure to fixup branch predictor flush >>> powerpc/fsl: Add macro to flush the branch predictor >>> powerpc/fsl: Fix spectre_v2 mitigations reporting >>> powerpc/fsl: Add nospectre_v2 command line argument >>> powerpc/fsl: Flush the branch predictor at each kernel entry (64bit) >>> powerpc/fsl: Update Spectre v2 reporting >>> >>> Mauricio Faria de Oliveira (4): >>> powerpc/rfi-flush: Differentiate enabled and patched flush types >>> powerpc/pseries: Fix clearing of security feature flags >>> powerpc: Move default security feature flags >>> powerpc/pseries: Restore default security feature flags on setup >>> >>> Michael Ellerman (29): >>> powerpc/xmon: Add RFI flush related fields to paca dump >>> powerpc/pseries: Support firmware disable of RFI flush >>> powerpc/powernv: Support firmware disable of RFI flush >>> powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs >>> code >>> powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again >>> powerpc/rfi-flush: Always enable fallback flush on pseries >>> powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags >>> powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration >>> powerpc: Add security feature flags for Spectre/Meltdown >>> powerpc/pseries: Set or clear security feature flags >>> powerpc/powernv: Set or clear security feature flags >>> powerpc/64s: Move cpu_show_meltdown() >>> powerpc/64s: Enhance the information in cpu_show_meltdown() >>> powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() >>> powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() >>> powerpc/64s: Wire up cpu_show_spectre_v1() >>> powerpc/64s: Wire up cpu_show_spectre_v2() >>> powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() >>> powerpc/64: Use barrier_nospec in syscall entry >>> powerpc: Use barrier_nospec in copy_from_user() >>> powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 >>> powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC >>> powerpc/64: Call setup_barrier_nospec() from setup_arch() >>> powerpc/asm: Add a patch_site macro & helpers for patching >>> instructions >>> powerpc/64s: Add new security feature flags for count cache flush >>> powerpc/64s: Add support for software count cache flush >>> powerpc/pseries: Query hypervisor for count cache flush settings >>> powerpc/powernv: Query firmware for count cache flush settings >>> powerpc/security: Fix spectre_v2 reporting >>> >>> Michael Neuling (1): >>> powerpc: Avoid code patching freed init sections >>> >>> Michal Suchanek (5): >>> powerpc/64s: Add barrier_nospec >>> powerpc/64s: Add support for ori barrier_nospec patching >>> powerpc/64s: Patch barrier_nospec in modules >>> powerpc/64s: Enable barrier_nospec based on firmware settings >>> powerpc/64s: Enhance the information in cpu_show_spectre_v1() >>> >>> Nicholas Piggin (2): >>> powerpc/64s: Improve RFI L1-D cache flush fallback >>> powerpc/64s: Add support for a store forwarding barrier at kernel >>> entry/exit >>> >>> arch/powerpc/Kconfig
Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4
Greg KH writes: > On Mon, Apr 29, 2019 at 04:26:45PM +1000, Michael Ellerman wrote: >> Michael Ellerman writes: >> > Greg KH writes: >> >> On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote: >> >>> -BEGIN PGP SIGNED MESSAGE- >> >>> Hash: SHA1 >> >>> >> >>> Hi Greg/Sasha, >> >>> >> >>> Please queue up these powerpc patches for 4.4 if you have no objections. >> >> >> >> why? Do you, or someone else, really care about spectre issues in 4.4? >> >> Who is using ppc for 4.4 becides a specific enterprise distro (and they >> >> don't seem to be pulling in my stable updates anyway...)? >> > >> > Someone asked for it, but TBH I can't remember who it was. I can chase >> > it up if you like. >> >> Yeah it was a request from one of the distros. They plan to take it once >> it lands in 4.4 stable. > > Ok, thanks for confirming, I'll work on this this afternoon. Thanks. If there's any problems let us know. cheers
Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4
On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Hi Greg/Sasha, > > Please queue up these powerpc patches for 4.4 if you have no objections. All now queued up, thanks. greg k-h
Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4
On Mon, Apr 29, 2019 at 04:26:45PM +1000, Michael Ellerman wrote: > Michael Ellerman writes: > > Greg KH writes: > >> On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote: > >>> -BEGIN PGP SIGNED MESSAGE- > >>> Hash: SHA1 > >>> > >>> Hi Greg/Sasha, > >>> > >>> Please queue up these powerpc patches for 4.4 if you have no objections. > >> > >> why? Do you, or someone else, really care about spectre issues in 4.4? > >> Who is using ppc for 4.4 becides a specific enterprise distro (and they > >> don't seem to be pulling in my stable updates anyway...)? > > > > Someone asked for it, but TBH I can't remember who it was. I can chase > > it up if you like. > > Yeah it was a request from one of the distros. They plan to take it once > it lands in 4.4 stable. Ok, thanks for confirming, I'll work on this this afternoon. greg k-h
Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4
Michael Ellerman writes: > Greg KH writes: >> On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote: >>> -BEGIN PGP SIGNED MESSAGE- >>> Hash: SHA1 >>> >>> Hi Greg/Sasha, >>> >>> Please queue up these powerpc patches for 4.4 if you have no objections. >> >> why? Do you, or someone else, really care about spectre issues in 4.4? >> Who is using ppc for 4.4 becides a specific enterprise distro (and they >> don't seem to be pulling in my stable updates anyway...)? > > Someone asked for it, but TBH I can't remember who it was. I can chase > it up if you like. Yeah it was a request from one of the distros. They plan to take it once it lands in 4.4 stable. cheers
Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4
Diana Madalina Craciun writes: > Hi Michael, > > There are some missing NXP Spectre v2 patches. I can send them > separately if the series will be accepted. I have merged them, but I did > not test them, I was sick today and incapable of doing that. No worries, there's no rush :) Sorry I missed them, I thought I had a list that included everything. Which commits was it I missed? I guess post them as a reply to this thread? That way whether the series is merged by Greg or not, there's a record here of what the backports look like. cheers > On 4/21/2019 5:21 PM, Michael Ellerman wrote: >> -BEGIN PGP SIGNED MESSAGE- >> Hash: SHA1 >> >> Hi Greg/Sasha, >> >> Please queue up these powerpc patches for 4.4 if you have no objections. >> >> cheers >> >> >> Christophe Leroy (1): >> powerpc/fsl: Fix the flush of branch predictor. >> >> Diana Craciun (10): >> powerpc/64: Disable the speculation barrier from the command line >> powerpc/64: Make stf barrier PPC_BOOK3S_64 specific. >> powerpc/64: Make meltdown reporting Book3S 64 specific >> powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E >> powerpc/fsl: Add infrastructure to fixup branch predictor flush >> powerpc/fsl: Add macro to flush the branch predictor >> powerpc/fsl: Fix spectre_v2 mitigations reporting >> powerpc/fsl: Add nospectre_v2 command line argument >> powerpc/fsl: Flush the branch predictor at each kernel entry (64bit) >> powerpc/fsl: Update Spectre v2 reporting >> >> Mauricio Faria de Oliveira (4): >> powerpc/rfi-flush: Differentiate enabled and patched flush types >> powerpc/pseries: Fix clearing of security feature flags >> powerpc: Move default security feature flags >> powerpc/pseries: Restore default security feature flags on setup >> >> Michael Ellerman (29): >> powerpc/xmon: Add RFI flush related fields to paca dump >> powerpc/pseries: Support firmware disable of RFI flush >> powerpc/powernv: Support firmware disable of RFI flush >> powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs >> code >> powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again >> powerpc/rfi-flush: Always enable fallback flush on pseries >> powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags >> powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration >> powerpc: Add security feature flags for Spectre/Meltdown >> powerpc/pseries: Set or clear security feature flags >> powerpc/powernv: Set or clear security feature flags >> powerpc/64s: Move cpu_show_meltdown() >> powerpc/64s: Enhance the information in cpu_show_meltdown() >> powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() >> powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() >> powerpc/64s: Wire up cpu_show_spectre_v1() >> powerpc/64s: Wire up cpu_show_spectre_v2() >> powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() >> powerpc/64: Use barrier_nospec in syscall entry >> powerpc: Use barrier_nospec in copy_from_user() >> powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 >> powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC >> powerpc/64: Call setup_barrier_nospec() from setup_arch() >> powerpc/asm: Add a patch_site macro & helpers for patching >> instructions >> powerpc/64s: Add new security feature flags for count cache flush >> powerpc/64s: Add support for software count cache flush >> powerpc/pseries: Query hypervisor for count cache flush settings >> powerpc/powernv: Query firmware for count cache flush settings >> powerpc/security: Fix spectre_v2 reporting >> >> Michael Neuling (1): >> powerpc: Avoid code patching freed init sections >> >> Michal Suchanek (5): >> powerpc/64s: Add barrier_nospec >> powerpc/64s: Add support for ori barrier_nospec patching >> powerpc/64s: Patch barrier_nospec in modules >> powerpc/64s: Enable barrier_nospec based on firmware settings >> powerpc/64s: Enhance the information in cpu_show_spectre_v1() >> >> Nicholas Piggin (2): >> powerpc/64s: Improve RFI L1-D cache flush fallback >> powerpc/64s: Add support for a store forwarding barrier at kernel >> entry/exit >> >> arch/powerpc/Kconfig | 7 +- >> arch/powerpc/include/asm/asm-prototypes.h| 21 + >> arch/powerpc/include/asm/barrier.h | 21 + >> arch/powerpc/include/asm/code-patching-asm.h | 18 + >> arch/powerpc/include/asm/code-patching.h | 2 + >> arch/powerpc/include/asm/exception-64s.h | 35 ++ >> arch/powerpc/include/asm/feature-fixups.h| 40 ++ >> arch/powerpc/include/asm/hvcall.h| 5 + >> arch/powerpc/include/asm/paca.h | 3 +- >> arch/powerpc/include/asm/ppc-opcode.h| 1 + >> arch/powerpc/include/asm/ppc_asm.h | 11 + >> arch/powerpc/include/asm/security_features.h | 92 >> arch/powerpc/include/asm/setup.h | 23 +- >> arch/powerpc/include/asm/uaccess.h |
Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4
Greg KH writes: > On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote: >> -BEGIN PGP SIGNED MESSAGE- >> Hash: SHA1 >> >> Hi Greg/Sasha, >> >> Please queue up these powerpc patches for 4.4 if you have no objections. > > why? Do you, or someone else, really care about spectre issues in 4.4? > Who is using ppc for 4.4 becides a specific enterprise distro (and they > don't seem to be pulling in my stable updates anyway...)? Someone asked for it, but TBH I can't remember who it was. I can chase it up if you like. cheers
Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4
On Mon, Apr 22, 2019 at 03:27:56PM +, Diana Madalina Craciun wrote: > On 4/21/2019 7:34 PM, Greg KH wrote: > > On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote: > >> -BEGIN PGP SIGNED MESSAGE- > >> Hash: SHA1 > >> > >> Hi Greg/Sasha, > >> > >> Please queue up these powerpc patches for 4.4 if you have no objections. > > why? Do you, or someone else, really care about spectre issues in 4.4? > > Who is using ppc for 4.4 becides a specific enterprise distro (and they > > don't seem to be pulling in my stable updates anyway...)? > > We (NXP) received questions from customers regarding Spectre mitigations > on kernel 4.4. Not sure if they really need them as some systems are > enclosed embedded ones, but they asked for them. "Asking about", and "actually needing them" are two different things, as you state. It would be good to get confirmation from someone that these are "actually needed". thanks, greg k-h
Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4
Hi Michael, There are some missing NXP Spectre v2 patches. I can send them separately if the series will be accepted. I have merged them, but I did not test them, I was sick today and incapable of doing that. Thanks, Diana On 4/21/2019 5:21 PM, Michael Ellerman wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Hi Greg/Sasha, > > Please queue up these powerpc patches for 4.4 if you have no objections. > > cheers > > > Christophe Leroy (1): > powerpc/fsl: Fix the flush of branch predictor. > > Diana Craciun (10): > powerpc/64: Disable the speculation barrier from the command line > powerpc/64: Make stf barrier PPC_BOOK3S_64 specific. > powerpc/64: Make meltdown reporting Book3S 64 specific > powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E > powerpc/fsl: Add infrastructure to fixup branch predictor flush > powerpc/fsl: Add macro to flush the branch predictor > powerpc/fsl: Fix spectre_v2 mitigations reporting > powerpc/fsl: Add nospectre_v2 command line argument > powerpc/fsl: Flush the branch predictor at each kernel entry (64bit) > powerpc/fsl: Update Spectre v2 reporting > > Mauricio Faria de Oliveira (4): > powerpc/rfi-flush: Differentiate enabled and patched flush types > powerpc/pseries: Fix clearing of security feature flags > powerpc: Move default security feature flags > powerpc/pseries: Restore default security feature flags on setup > > Michael Ellerman (29): > powerpc/xmon: Add RFI flush related fields to paca dump > powerpc/pseries: Support firmware disable of RFI flush > powerpc/powernv: Support firmware disable of RFI flush > powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs > code > powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again > powerpc/rfi-flush: Always enable fallback flush on pseries > powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags > powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration > powerpc: Add security feature flags for Spectre/Meltdown > powerpc/pseries: Set or clear security feature flags > powerpc/powernv: Set or clear security feature flags > powerpc/64s: Move cpu_show_meltdown() > powerpc/64s: Enhance the information in cpu_show_meltdown() > powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() > powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() > powerpc/64s: Wire up cpu_show_spectre_v1() > powerpc/64s: Wire up cpu_show_spectre_v2() > powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() > powerpc/64: Use barrier_nospec in syscall entry > powerpc: Use barrier_nospec in copy_from_user() > powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 > powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC > powerpc/64: Call setup_barrier_nospec() from setup_arch() > powerpc/asm: Add a patch_site macro & helpers for patching > instructions > powerpc/64s: Add new security feature flags for count cache flush > powerpc/64s: Add support for software count cache flush > powerpc/pseries: Query hypervisor for count cache flush settings > powerpc/powernv: Query firmware for count cache flush settings > powerpc/security: Fix spectre_v2 reporting > > Michael Neuling (1): > powerpc: Avoid code patching freed init sections > > Michal Suchanek (5): > powerpc/64s: Add barrier_nospec > powerpc/64s: Add support for ori barrier_nospec patching > powerpc/64s: Patch barrier_nospec in modules > powerpc/64s: Enable barrier_nospec based on firmware settings > powerpc/64s: Enhance the information in cpu_show_spectre_v1() > > Nicholas Piggin (2): > powerpc/64s: Improve RFI L1-D cache flush fallback > powerpc/64s: Add support for a store forwarding barrier at kernel > entry/exit > > arch/powerpc/Kconfig | 7 +- > arch/powerpc/include/asm/asm-prototypes.h| 21 + > arch/powerpc/include/asm/barrier.h | 21 + > arch/powerpc/include/asm/code-patching-asm.h | 18 + > arch/powerpc/include/asm/code-patching.h | 2 + > arch/powerpc/include/asm/exception-64s.h | 35 ++ > arch/powerpc/include/asm/feature-fixups.h| 40 ++ > arch/powerpc/include/asm/hvcall.h| 5 + > arch/powerpc/include/asm/paca.h | 3 +- > arch/powerpc/include/asm/ppc-opcode.h| 1 + > arch/powerpc/include/asm/ppc_asm.h | 11 + > arch/powerpc/include/asm/security_features.h | 92 > arch/powerpc/include/asm/setup.h | 23 +- > arch/powerpc/include/asm/uaccess.h | 18 +- > arch/powerpc/kernel/Makefile | 1 + > arch/powerpc/kernel/asm-offsets.c| 3 +- > arch/powerpc/kernel/entry_64.S | 69 +++ > arch/powerpc/kernel/exceptions-64e.S | 27 +- > arch/powerpc/kernel/exceptions-64s.S | 98 +++-- > arch/powerpc/kernel/module.c | 10 +- > arch/powerpc/kernel/security.c | 433
Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4
On 4/21/2019 7:34 PM, Greg KH wrote: > On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote: >> -BEGIN PGP SIGNED MESSAGE- >> Hash: SHA1 >> >> Hi Greg/Sasha, >> >> Please queue up these powerpc patches for 4.4 if you have no objections. > why? Do you, or someone else, really care about spectre issues in 4.4? > Who is using ppc for 4.4 becides a specific enterprise distro (and they > don't seem to be pulling in my stable updates anyway...)? We (NXP) received questions from customers regarding Spectre mitigations on kernel 4.4. Not sure if they really need them as some systems are enclosed embedded ones, but they asked for them. Thanks, Diana > I'll be glad to take these, just want to make sure that someone actually > will use them :) > > thanks, > > greg k-h >
Re: [PATCH stable v4.4 00/52] powerpc spectre backports for 4.4
On Mon, Apr 22, 2019 at 12:19:45AM +1000, Michael Ellerman wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Hi Greg/Sasha, > > Please queue up these powerpc patches for 4.4 if you have no objections. why? Do you, or someone else, really care about spectre issues in 4.4? Who is using ppc for 4.4 becides a specific enterprise distro (and they don't seem to be pulling in my stable updates anyway...)? I'll be glad to take these, just want to make sure that someone actually will use them :) thanks, greg k-h
[PATCH stable v4.4 00/52] powerpc spectre backports for 4.4
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Greg/Sasha, Please queue up these powerpc patches for 4.4 if you have no objections. cheers Christophe Leroy (1): powerpc/fsl: Fix the flush of branch predictor. Diana Craciun (10): powerpc/64: Disable the speculation barrier from the command line powerpc/64: Make stf barrier PPC_BOOK3S_64 specific. powerpc/64: Make meltdown reporting Book3S 64 specific powerpc/fsl: Add barrier_nospec implementation for NXP PowerPC Book3E powerpc/fsl: Add infrastructure to fixup branch predictor flush powerpc/fsl: Add macro to flush the branch predictor powerpc/fsl: Fix spectre_v2 mitigations reporting powerpc/fsl: Add nospectre_v2 command line argument powerpc/fsl: Flush the branch predictor at each kernel entry (64bit) powerpc/fsl: Update Spectre v2 reporting Mauricio Faria de Oliveira (4): powerpc/rfi-flush: Differentiate enabled and patched flush types powerpc/pseries: Fix clearing of security feature flags powerpc: Move default security feature flags powerpc/pseries: Restore default security feature flags on setup Michael Ellerman (29): powerpc/xmon: Add RFI flush related fields to paca dump powerpc/pseries: Support firmware disable of RFI flush powerpc/powernv: Support firmware disable of RFI flush powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs code powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again powerpc/rfi-flush: Always enable fallback flush on pseries powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration powerpc: Add security feature flags for Spectre/Meltdown powerpc/pseries: Set or clear security feature flags powerpc/powernv: Set or clear security feature flags powerpc/64s: Move cpu_show_meltdown() powerpc/64s: Enhance the information in cpu_show_meltdown() powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() powerpc/64s: Wire up cpu_show_spectre_v1() powerpc/64s: Wire up cpu_show_spectre_v2() powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() powerpc/64: Use barrier_nospec in syscall entry powerpc: Use barrier_nospec in copy_from_user() powerpc64s: Show ori31 availability in spectre_v1 sysfs file not v2 powerpc/64: Add CONFIG_PPC_BARRIER_NOSPEC powerpc/64: Call setup_barrier_nospec() from setup_arch() powerpc/asm: Add a patch_site macro & helpers for patching instructions powerpc/64s: Add new security feature flags for count cache flush powerpc/64s: Add support for software count cache flush powerpc/pseries: Query hypervisor for count cache flush settings powerpc/powernv: Query firmware for count cache flush settings powerpc/security: Fix spectre_v2 reporting Michael Neuling (1): powerpc: Avoid code patching freed init sections Michal Suchanek (5): powerpc/64s: Add barrier_nospec powerpc/64s: Add support for ori barrier_nospec patching powerpc/64s: Patch barrier_nospec in modules powerpc/64s: Enable barrier_nospec based on firmware settings powerpc/64s: Enhance the information in cpu_show_spectre_v1() Nicholas Piggin (2): powerpc/64s: Improve RFI L1-D cache flush fallback powerpc/64s: Add support for a store forwarding barrier at kernel entry/exit arch/powerpc/Kconfig | 7 +- arch/powerpc/include/asm/asm-prototypes.h| 21 + arch/powerpc/include/asm/barrier.h | 21 + arch/powerpc/include/asm/code-patching-asm.h | 18 + arch/powerpc/include/asm/code-patching.h | 2 + arch/powerpc/include/asm/exception-64s.h | 35 ++ arch/powerpc/include/asm/feature-fixups.h| 40 ++ arch/powerpc/include/asm/hvcall.h| 5 + arch/powerpc/include/asm/paca.h | 3 +- arch/powerpc/include/asm/ppc-opcode.h| 1 + arch/powerpc/include/asm/ppc_asm.h | 11 + arch/powerpc/include/asm/security_features.h | 92 arch/powerpc/include/asm/setup.h | 23 +- arch/powerpc/include/asm/uaccess.h | 18 +- arch/powerpc/kernel/Makefile | 1 + arch/powerpc/kernel/asm-offsets.c| 3 +- arch/powerpc/kernel/entry_64.S | 69 +++ arch/powerpc/kernel/exceptions-64e.S | 27 +- arch/powerpc/kernel/exceptions-64s.S | 98 +++-- arch/powerpc/kernel/module.c | 10 +- arch/powerpc/kernel/security.c | 433 +++ arch/powerpc/kernel/setup_32.c | 2 + arch/powerpc/kernel/setup_64.c | 50 +-- arch/powerpc/kernel/vmlinux.lds.S| 33 +- arch/powerpc/lib/code-patching.c | 29 ++ arch/powerpc/lib/feature-fixups.c| 218 +- arch/powerpc/mm/mem.c| 2 + arch/powerpc/mm/tlb_low_64e.S| 7 + arch/powerpc/platforms/powernv/setup.c | 99 +++-- arc