From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.8 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_NEOMUTT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C0E79C31E51 for ; Tue, 18 Jun 2019 10:21:31 +0000 (UTC) Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 9A2872085A for ; Tue, 18 Jun 2019 10:21:31 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="SHf8GY1p"; dkim=fail reason="signature verification failed" (2048-bit key) header.d=linaro.org header.i=@linaro.org header.b="KJ1/t/bh" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 9A2872085A Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linaro.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References: Message-ID:Subject:To:From:Date:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=Kjebl9mnJbM3K6RKjANNiHjOK35BGql2Vo/yDMShCqI=; b=SHf8GY1pF6XPkC E0MPSnmSjr2Ykanb7WLbHGETohEtiiMUiZows3Fg1z2IQrGAvGgSwZupO9ozE5glbmND3d8Fvv4EP Fl5nbl5pIkLG1FRHpHUxLtpLwcUfJ3TnpS0Pkjz1vlz1Esi1wQ5GgqnIf4iPUXd8xdBK3fFqp8uq2 YX4UmihClSfFwT5YbCfxfV21HN1TAD3KQdTUjlFBcULm2592JzD5F4xfJPfsXon+4q/3hiOtSUZUB dA54TSmtb6GvczUGFLZhe9YbHFQy+7nuIWkLVpEoMjQu4gCuAjHsKIrGJp2q8xKng8sWOyRL4WNRb e97eSnkZeOMAfbhKD0EA==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.92 #3 (Red Hat Linux)) id 1hdBF4-0006Fn-Gc; Tue, 18 Jun 2019 10:21:30 +0000 Received: from mail-pl1-x644.google.com ([2607:f8b0:4864:20::644]) by bombadil.infradead.org with esmtps (Exim 4.92 #3 (Red Hat Linux)) id 1hdBF1-0006FO-6g for linux-arm-kernel@lists.infradead.org; Tue, 18 Jun 2019 10:21:28 +0000 Received: by mail-pl1-x644.google.com with SMTP id c14so5541307plo.0 for ; Tue, 18 Jun 2019 03:21:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=AkjQ8u0Q3m/SzCvMdM2EUOK1pzB6kGaGnwLoVIN3KQM=; b=KJ1/t/bhwcsT1nteaM2wvu8LoWKMXSPLrUGfybLH37/Xa0uqZBUG6S3Bjsc2jJAup2 N2DO/9PNBnR5CBG1sMxFiScbGgpnqZ5xpe9oZhQ48pIeps3MTv0TSRPVxrmlv0c6s32f 2gpmTsGr/iJfH3R8N25AFnUqYCAt7b+foUG+2xLsu1/Zp6dfDv9mvuC4DedKF9M5IDJK mLuilfbjEmFxMSMKqNS+1dU35mvQtOZD3R1qCJXmdKVbBX7pZYUbZ52XWUpf4WD+Kgdb bKSObQgqfR3XnrGPQSFuHnFfOILGJonhw9mYVLWhSx5g3FaKguIM2ZydSlG/Tx8Dg03g uZgQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=AkjQ8u0Q3m/SzCvMdM2EUOK1pzB6kGaGnwLoVIN3KQM=; b=CrHAhHb5o/oy/FE7IdiNSKRyf7DGzoARelQdoMz8UmkflT1TsWq/HdjfJfjV91Si6e W7YVfMzWLWhSVXyIsRHU1+vCuwqy0WtE4QabtcJI6q3FknnCGzSp3yqlAr9fWsq7AYcB o4aQJUNliWIE2X3q26c96JRmK1GKpsYXXzsg3SX9bfUQfeUZrDpAepCCMeD9MrJthb4x 379chgEH+nG7kmi2CV3C8oiL4ncoc5PiLQ3mf1nJ8b4YaaV24GymdKGza8voVje+1Y+7 GkWSAPdci2i2qtVZZhaMl42QfiVhG0RCt8Q/rW0fv3DmAnNiCnIZ1cqnP5q3AuhyxQp8 KZWw== X-Gm-Message-State: APjAAAUKx6fm8IMzSDOZR62DPQtJfjmhG4lB/pg636JFnZufKhuNGaNv NB8IfZtPRjLaKz9rAK65wXkNhQ== X-Google-Smtp-Source: APXvYqzfJHrp9HZA7Ao8ku14aFEpKvPoTVvW1PkWmPKrJEaI1JDGAocXVduGyLaEtQ1vXj/fDxe6Og== X-Received: by 2002:a17:902:20e2:: with SMTP id v31mr112731954plg.138.1560853286460; Tue, 18 Jun 2019 03:21:26 -0700 (PDT) Received: from localhost ([122.172.66.84]) by smtp.gmail.com with ESMTPSA id h6sm2062381pjs.2.2019.06.18.03.21.24 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 18 Jun 2019 03:21:24 -0700 (PDT) Date: Tue, 18 Jun 2019 15:51:22 +0530 From: Viresh Kumar To: Julien Thierry Subject: Re: [PATCH v4.4 00/45] V4.4 backport of arm64 Spectre patches Message-ID: <20190618102122.z52oi37pp3wigqxx@vireshk-i7> References: <7329e6d9-140d-59bc-c835-5f6300cf60e0@arm.com> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <7329e6d9-140d-59bc-c835-5f6300cf60e0@arm.com> User-Agent: NeoMutt/20180716-391-311a52 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20190618_032127_310246_A50AD275 X-CRM114-Status: GOOD ( 24.17 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Mark Rutland , Marc Zyngier , Catalin Marinas , Will Deacon , stable@vger.kernel.org, mark.brown@arm.com, Russell King , linux-arm-kernel@lists.infradead.org Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org On 17-06-19, 17:03, Julien Thierry wrote: > On 14/06/2019 04:07, Viresh Kumar wrote: > > Hello, > > > > Here is an attempt to backport arm64 spectre patches to v4.4 stable > > tree. > > > > I have started this backport with Mark Rutland's backport of Spectre to > > 4.9 [1] and tried applying the upstream version of them over 4.4 and > > resolved conflicts by checking how they have been resolved in 4.9. > > > > I had to pick few extra upstream patches to avoid unnecessary conflicts > > (upstream commit ids mentioned): > > > > a842789837c0 arm64: remove duplicate macro __KERNEL__ check > > I'm a bit unfamiliar with what gets or doesn't get backported. My > understanding is that we try to backport only what's necessary to reduce > the noise and potential introduction of issues in stable releases. > > This commit is just a cleanup and (while valid) doesn't really seem > necessary (and potential conflicts from its absence would easily be > resolved IMO). So I'm just concerned that this doesn't constitute a > candidate for back porting (someone can correct me if I'm wrong). Dropped now. > > 64f8ebaf115b mm/kasan: add API to check memory regions > > bffe1baff5d5 arm64: kasan: instrument user memory access API > > 92406f0cc9e3 arm64: cpufeature: Add scope for capability check > > 9eb8a2cdf65c arm64: cputype info for Broadcom Vulcan > > 0d90718871fe arm64: cputype: Add MIDR values for Cavium ThunderX2 CPUs > > 98dd64f34f47 ARM: 8478/2: arm/arm64: add arm-smccc > > > > > > I had to drop few patches as well as they weren't getting applied > > properly due to missing files/features (upstream commit id mentioned): > > > > 93f339ef4175 arm64: cpufeature: __this_cpu_has_cap() shouldn't stop early > > 3c31fa5a06b4 arm64: Run enable method for errata work arounds on late CPUs > > Looking at this and at the patches that implement the BP callbacks, we > need that patch or an equivalent, otherwise we won't be using the > correct vectors for late CPUs... > > I appreciate the code has changed, but it might be worth considering > 6a6efbb45b7d95c84840010095367eb06a64f342 as a needed dependency for BP > hardening. Okay, I had to pick two more patches for a clean rebase. d4a7e845dab5 arm64: Introduce cpu_die_early 7242dbf2e4da arm64: Move cpu_die_early to smp.c 545fe20330c3 arm64: Verify CPU errata work arounds on hotplugged CPU 0365babc6c1f arm64: Run enable method for errata work arounds on late CPUs (You can fetch my tree again to get these commit ids) > > 6840bdd73d07 arm64: KVM: Use per-CPU vector when BP hardening is enabled > > I don't believe we can do without this patch. Otherwise we're only using > the vector that has no mitigation for kvm guests. > > In v4.4, it looks like the contents of virt/kvm/arm/arm.c were contained > in arch/arm/kvm/arm.c (yes, even for amr64). Are there other reasons > this patch was not applying? It was something other than this I believe, I have already used these paths for many other patches. Anyway, KVM stuff is mostly dropped now, just that I had to keep the changes to arm-smccc.h from those patches. I have updated the stable/v4.4.y/spectre branch with all the changes you suggested and pushed the earlier version to stable/v4.4.y/spectre-v1 branch. Will it be possible for you to have a look at stable/v4.4.y/spectre branch to see if it is okay, so I can send the v2 version ? Don't want to spam list unnecessary with so many patches :) Thanks for your help Julien, really appreciate it. -- viresh _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel