Received: by 10.223.185.116 with SMTP id b49csp2325882wrg; Thu, 15 Feb 2018 09:53:00 -0800 (PST) X-Google-Smtp-Source: AH8x226NYO0z3BWVHi0wYc98Wd1QtrPbthrPAiQpJfFRP5UhvYBPvGTMRFWW3K07LdoZEGaYw1jh X-Received: by 2002:a17:902:710e:: with SMTP id a14-v6mr3135110pll.291.1518717180658; Thu, 15 Feb 2018 09:53:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518717180; cv=none; d=google.com; s=arc-20160816; b=SWcVRdzY44HkrSs12PIfH1LMOegiG69VFSPyeVtyLrzAUVk2ztH3D78NpT0wRGix7B OZMqNo6zLbXvIu2O4ouFc6bFrcBqEK/S23B9azk6EvFqk9snd19+t+se9i2EWs8hkSS3 y5U/YJ0goBuMvZ8XCoEzgeRQQDMoMt+uU0YodNpg9bXomEMEwjUnvCuRvHsXfuJKPfby NmgnqZ2n0po908Qk/A+RUJxmiU2PX+yZP1Sx7VnYQoRq062oxEF86g0pIs72sgPmUpJ8 nh5vL+N5/EIjWg3BwEGbOJI/cfoIB47U8vTqYftxfnW60sp9Pd3TxH48QXpf4Q6vuPZt xuDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=XgJuODz3Uq+B+k3WR3ANUwBfdms0/6m9F9NFFmalHpA=; b=pUx5DS/AHaEgjwXRr6c5fbaqw4NEdblEwv7IbIknFTwgTg9beIMAPwOGFdSTZCwWlF hqsKCjQ1ZVnrjH+Xt2HclxABAwhXJFYdH640R6BnxRTruNN7rzhPcX7NGQ/IKb7JQK/Z fjQnZAvOlzU5r/b+IpUpXQKV05hfHRxXYe2HDyUleXWpfs4iqyZa8iFlRe/K+8W41OGK zgPDSL3dyeiR9o8PAOfloirYYKvxxUeTaE+46Y5XmnQFOpLABAV0mh0Yi1TlW9aKluAZ 1q3jWjGjMwqVeHrmEYzSpRB6rqa1IiIedzszncaEJzBo+vNjoBaV7PzcNvc9klnGArlI pNLw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o184si1689169pga.245.2018.02.15.09.52.45; Thu, 15 Feb 2018 09:53:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1165750AbeBORvW (ORCPT + 99 others); Thu, 15 Feb 2018 12:51:22 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:55146 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1164248AbeBOPah (ORCPT ); Thu, 15 Feb 2018 10:30:37 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id B6F881124; Thu, 15 Feb 2018 15:30:36 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mark Rutland , Laura Abbott , Shanker Donthineni , Will Deacon , Ard Biesheuvel Subject: [PATCH 4.14 026/195] [Variant 3/Meltdown] arm64: mm: Remove pre_ttbr0_update_workaround for Falkor erratum #E1003 Date: Thu, 15 Feb 2018 16:15:17 +0100 Message-Id: <20180215151707.062766548@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180215151705.738773577@linuxfoundation.org> References: <20180215151705.738773577@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Will Deacon Commit 85d13c001497 upstream. The pre_ttbr0_update_workaround hook is called prior to context-switching TTBR0 because Falkor erratum E1003 can cause TLB allocation with the wrong ASID if both the ASID and the base address of the TTBR are updated at the same time. With the ASID sitting safely in TTBR1, we no longer update things atomically, so we can remove the pre_ttbr0_update_workaround macro as it's no longer required. The erratum infrastructure and documentation is left around for #E1003, as it will be required by the entry trampoline code in a future patch. Reviewed-by: Mark Rutland Tested-by: Laura Abbott Tested-by: Shanker Donthineni Signed-off-by: Will Deacon Signed-off-by: Ard Biesheuvel Signed-off-by: Greg Kroah-Hartman --- arch/arm64/include/asm/assembler.h | 22 ---------------------- arch/arm64/include/asm/mmu_context.h | 2 -- arch/arm64/mm/context.c | 11 ----------- arch/arm64/mm/proc.S | 1 - 4 files changed, 36 deletions(-) --- a/arch/arm64/include/asm/assembler.h +++ b/arch/arm64/include/asm/assembler.h @@ -25,7 +25,6 @@ #include #include -#include #include #include #include @@ -465,27 +464,6 @@ alternative_endif .endm /* - * Errata workaround prior to TTBR0_EL1 update - * - * val: TTBR value with new BADDR, preserved - * tmp0: temporary register, clobbered - * tmp1: other temporary register, clobbered - */ - .macro pre_ttbr0_update_workaround, val, tmp0, tmp1 -#ifdef CONFIG_QCOM_FALKOR_ERRATUM_1003 -alternative_if ARM64_WORKAROUND_QCOM_FALKOR_E1003 - mrs \tmp0, ttbr0_el1 - mov \tmp1, #FALKOR_RESERVED_ASID - bfi \tmp0, \tmp1, #48, #16 // reserved ASID + old BADDR - msr ttbr0_el1, \tmp0 - isb - bfi \tmp0, \val, #0, #48 // reserved ASID + new BADDR - msr ttbr0_el1, \tmp0 - isb -alternative_else_nop_endif -#endif - .endm - /* * Errata workaround post TTBR0_EL1 update. */ --- a/arch/arm64/include/asm/mmu_context.h +++ b/arch/arm64/include/asm/mmu_context.h @@ -19,8 +19,6 @@ #ifndef __ASM_MMU_CONTEXT_H #define __ASM_MMU_CONTEXT_H -#define FALKOR_RESERVED_ASID 1 - #ifndef __ASSEMBLY__ #include --- a/arch/arm64/mm/context.c +++ b/arch/arm64/mm/context.c @@ -79,13 +79,6 @@ void verify_cpu_asid_bits(void) } } -static void set_reserved_asid_bits(void) -{ - if (IS_ENABLED(CONFIG_QCOM_FALKOR_ERRATUM_1003) && - cpus_have_const_cap(ARM64_WORKAROUND_QCOM_FALKOR_E1003)) - __set_bit(FALKOR_RESERVED_ASID, asid_map); -} - static void flush_context(unsigned int cpu) { int i; @@ -94,8 +87,6 @@ static void flush_context(unsigned int c /* Update the list of reserved ASIDs and the ASID bitmap. */ bitmap_clear(asid_map, 0, NUM_USER_ASIDS); - set_reserved_asid_bits(); - /* * Ensure the generation bump is observed before we xchg the * active_asids. @@ -250,8 +241,6 @@ static int asids_init(void) panic("Failed to allocate bitmap for %lu ASIDs\n", NUM_USER_ASIDS); - set_reserved_asid_bits(); - pr_info("ASID allocator initialised with %lu entries\n", NUM_USER_ASIDS); return 0; } --- a/arch/arm64/mm/proc.S +++ b/arch/arm64/mm/proc.S @@ -138,7 +138,6 @@ ENDPROC(cpu_do_resume) * - pgd_phys - physical address of new TTB */ ENTRY(cpu_do_switch_mm) - pre_ttbr0_update_workaround x0, x2, x3 mrs x2, ttbr1_el1 mmid x1, x1 // get mm->context.id bfi x2, x1, #48, #16 // set the ASID