Received: by 10.223.185.116 with SMTP id b49csp7390839wrg; Thu, 1 Mar 2018 04:56:23 -0800 (PST) X-Google-Smtp-Source: AG47ELt/3WxXWt1ubAfir9uF/P7xYwyyrDdLs9kyIY1uMXnEuT/9J3kp4ukUuWEUWkqYaMzzq6wZ X-Received: by 2002:a17:902:501:: with SMTP id 1-v6mr1833384plf.283.1519908983420; Thu, 01 Mar 2018 04:56:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519908983; cv=none; d=google.com; s=arc-20160816; b=Ltru4xHmrRk1DU+VH5bBv+uT1G/Uk2C7pdGqCBfzB2aOSazaQaaUOuP0ZFgBCQMiMW D1KXAoBOj7KM2Kw1pCpJn/glDETssBHUZN9RKrs08unsoHvCBMPxASfcFF3tXLzuoneH Iy7AHPPrP/AmyXC9n/OoPy5TCY22K9nb2iaM8EBpOTSlzMc2esvuzRHlCeQV/utsimJS IExf4ysP4WspfzcxTxTQSU0d1dCXZ6k7OShseOPAa9RvzoXaNKdlWEU9+EMPHgQR7fUU icn1yzv8UjofPir7psbcNlXF5VMZNlqKTC7iKxbeJ+SpU6Fx958Mmh7zoGbkTDHOu+ri z+cA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:to:from :dkim-signature:arc-authentication-results; bh=mitfTljWIPDyOANkhOaMnkqv3Tv0lfyZA+SaI0FwpK8=; b=q4Ap0L7cXjLL+PH+eCRJkZmMlir4zxyzcsmzJp1w/07L2JhYrNhxVZQQ74bMj6X4a3 zDKfIhJqW7YVu9JkznOlqm1YcMxCXQ5m8149vbHxWWYD+WCtv4392gYmVdwcjDsC0EaZ /YdSu8rGT1TowO2wDXGb9HGsMLvfLBOYYbREiDARKMJfE4uPfvV/QpmdNrODRrsQLBl5 rYuIIwC3PSYzwuww09s4iCq+DVGhMxZeN4CRseagGAa1MY6Du7oYjQarXOV7Yl2aiWTO f9qYJovQ+KqzCg2xLsVoAmA31/BHEkgaKiLc6o8Kakdvndn8vk+lpRjeOd1W1JnLhEvW YoUw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=UrY7ovEm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 11-v6si3008017plc.376.2018.03.01.04.56.08; Thu, 01 Mar 2018 04:56:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=UrY7ovEm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1030545AbeCAMzJ (ORCPT + 99 others); Thu, 1 Mar 2018 07:55:09 -0500 Received: from mail-pg0-f65.google.com ([74.125.83.65]:35478 "EHLO mail-pg0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1030486AbeCAMzH (ORCPT ); Thu, 1 Mar 2018 07:55:07 -0500 Received: by mail-pg0-f65.google.com with SMTP id l131so2271432pga.2 for ; Thu, 01 Mar 2018 04:55:07 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:subject:date:message-id; bh=mitfTljWIPDyOANkhOaMnkqv3Tv0lfyZA+SaI0FwpK8=; b=UrY7ovEmhLOKRho261f0tC1NHN0TcN0jq6X0BErezezDx3RKaIgc02wqmwatbH8PUV IONBN+0h+Mskx+y4nmNMguQqkFBJbeADHBR/2bEtXE2d8b2rmywsupJeAqlAlsss6yJU ADsFjfpECLiwxt8Aau0QQhHkmsK/PmNNfhOio= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id; bh=mitfTljWIPDyOANkhOaMnkqv3Tv0lfyZA+SaI0FwpK8=; b=bI+WpJcMF2boFiTQNPIK0xQvVreE7x48zKrG13RzRaiXb2bc3pfYRTsh/7s8VeH/yC uoLNUBhKC//M7WdDT9vNDRvHa2oRVazU7izqEoFwOX5sLTVXU43uMJfvPqs1S9cQQfSv PiTn6GPByP0UT6vrQChiPYgGub2+BELOoaDx8i6Z0HU/3riwK1ZS2BGRWyWbZdjrM/Hk xLN2BA7boCP/Nzpt+gMQz/i7qlP18jqfV575sedZE0+04X79Jidm1o9Qr2y7H1U74DR9 HQAPPqNQnej6yeQE49tR7jEa69ru+gk2li3TPAkjVwtH37W8nfbRivJRWuFloOTCf9E/ LHSQ== X-Gm-Message-State: APf1xPARGd650reku4wj+MK+5yXcrFSVbt30SeXTPDN+bnU1KXmIXPka rVFdHc/9YqazPmQuAXpMEWIOCgAsXQY= X-Received: by 10.101.69.4 with SMTP id n4mr1506020pgq.184.1519908907259; Thu, 01 Mar 2018 04:55:07 -0800 (PST) Received: from localhost.localdomain (176.122.172.82.16clouds.com. [176.122.172.82]) by smtp.gmail.com with ESMTPSA id x4sm2289655pfb.46.2018.03.01.04.55.00 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 01 Mar 2018 04:55:06 -0800 (PST) From: Alex Shi To: Marc Zyngier , Will Deacon , Ard Biesheuvel , Catalin Marinas , stable@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [PATCH 00/45] arm Spectre fix backport review for LTS 4.9 Date: Thu, 1 Mar 2018 20:53:37 +0800 Message-Id: <1519908862-11425-1-git-send-email-alex.shi@linaro.org> X-Mailer: git-send-email 2.7.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi All, Resent without non-upstream patches. This backport patchset fixed the spectre issue, it's original branch: https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/log/?h=kpti A few dependency or fixingpatches are also picked up, if they are necessary and no functional changes. No bug found from kernelci.org and lkft testing. It also could be gotten from: git://git.linaro.org/kernel/linux-linaro-stable.git v4.9-spectre-upstream-only Comments are appreciated! Regards Alex [PATCH 01/45] mm: Introduce lm_alias [PATCH 02/45] arm64: alternatives: apply boot time fixups via the [PATCH 03/45] arm64: barrier: Add CSDB macros to control data-value [PATCH 04/45] arm64: Implement array_index_mask_nospec() [PATCH 05/45] arm64: move TASK_* definitions to [PATCH 06/45] arm64: Factor out PAN enabling/disabling into separate [PATCH 07/45] arm64: Factor out TTBR0_EL1 post-update workaround into [PATCH 08/45] arm64: uaccess: consistently check object sizes [PATCH 09/45] arm64: Make USER_DS an inclusive limit [PATCH 10/45] arm64: Use pointer masking to limit uaccess speculation [PATCH 11/45] arm64: syscallno is secretly an int, make it official [PATCH 12/45] arm64: entry: Ensure branch through syscall table is [PATCH 13/45] arm64: uaccess: Prevent speculative use of the current [PATCH 14/45] arm64: uaccess: Don't bother eliding access_ok checks [PATCH 15/45] arm64: uaccess: Mask __user pointers for __arch_{clear, [PATCH 16/45] arm64: futex: Mask __user pointers prior to dereference [PATCH 17/45] drivers/firmware: Expose psci_get_version through [PATCH 18/45] arm64: cpufeature: __this_cpu_has_cap() shouldn't stop [PATCH 19/45] arm64: cpu_errata: Allow an erratum to be match for all [PATCH 20/45] arm64: Run enable method for errata work arounds on [PATCH 21/45] arm64: cpufeature: Pass capability structure to [PATCH 22/45] arm64: Move post_ttbr_update_workaround to C code [PATCH 23/45] arm64: Add skeleton to harden the branch predictor [PATCH 24/45] arm64: Move BP hardening to check_and_switch_context [PATCH 25/45] arm64: KVM: Use per-CPU vector when BP hardening is [PATCH 26/45] arm64: entry: Apply BP hardening for high-priority [PATCH 27/45] arm64: entry: Apply BP hardening for suspicious [PATCH 28/45] arm64: cputype: Add missing MIDR values for Cortex-A72 [PATCH 29/45] arm64: Implement branch predictor hardening for [PATCH 30/45] arm64: KVM: Increment PC after handling an SMC trap [PATCH 31/45] arm/arm64: KVM: Consolidate the PSCI include files [PATCH 32/45] arm/arm64: KVM: Add PSCI_VERSION helper [PATCH 33/45] arm/arm64: KVM: Add smccc accessors to PSCI code [PATCH 34/45] arm/arm64: KVM: Implement PSCI 1.0 support [PATCH 35/45] arm/arm64: KVM: Advertise SMCCC v1.1 [PATCH 36/45] arm64: KVM: Make PSCI_VERSION a fast path [PATCH 37/45] arm/arm64: KVM: Turn kvm_psci_version into a static [PATCH 38/45] arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening [PATCH 39/45] arm64: KVM: Add SMCCC_ARCH_WORKAROUND_1 fast handling [PATCH 40/45] firmware/psci: Expose PSCI conduit [PATCH 41/45] firmware/psci: Expose SMCCC version through psci_ops [PATCH 42/45] arm/arm64: smccc: Make function identifiers an unsigned [PATCH 43/45] arm/arm64: smccc: Implement SMCCC v1.1 inline primitive [PATCH 44/45] arm64: Add ARM_SMCCC_ARCH_WORKAROUND_1 BP hardening [PATCH 45/45] arm64: Kill PSCI_GET_VERSION as a variant-2 workaround