Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp463712imu; Mon, 5 Nov 2018 03:56:41 -0800 (PST) X-Google-Smtp-Source: AJdET5d/wSMeuxHKyR2iFvX6qDyX/tjDa6OnIJQr0lC34bkekVyXM+mNs7Z6zdjbUU/zmY1vPDnm X-Received: by 2002:a17:902:c01:: with SMTP id 1-v6mr21870821pls.15.1541419001401; Mon, 05 Nov 2018 03:56:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1541419001; cv=none; d=google.com; s=arc-20160816; b=qrjbTCLbZGqCKTPHnxIvR1ANYb5D3NuAX+xYjrx8yGA7MBznWICcZyCP/04qZw7XuH YtR3U5+8unvQRoLBbkKJI5LsxVtlVSzbV7kIfRR0nxQMWLPPg3RQRuEifjXtsdJXZI6i GL4iTWW5X29l1P3XVZ1HKyOs51RuprOAg9YwE1ZCrIiTPE0J1fBghzO+Q6JSh1yJwzxF wWAK+Q5zhHYq3YVlPrOIlEQsZsVkRDBlhHkqUIkAjHqtTHIi4vrcRhej9XMHhq0DER9F tTeua9AG6M9hIkbuOn74DC9vUNUynLF3Fp8sONmA/jQa3Qr84z3ZZePWTLDxjTN9TMzC PKdQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=DqTSx0FSRgYQ2Vcbk+wYn9JAyjvGx7P9iZ+3PKq4xYI=; b=cVaIW66YJjE1r5lERRccxpzCsrTf9jhtZgO/WdKaj3dZDmCgcjJB9P8VhWRDQucfil QHNqhBOz6+g23ASidT+3XyIHuKw9s2Mx8VId+9bCpgphNluaAkSnuYmc1Lj+DU+SnHBh XlIbVWe5lJSUIiMBovfKN7yE3zdJePHxGVDCsCC5lAN3hljwUXsugZjXrXU8oHmVgXI5 L+DLo9UZ1/RMCjUQCONRV+QPzKLDuOiENBATMKQC/gPWDUa2kwqEwBxC9L3PY6e+wnuB giEaFyokhFsWszwv7gwxIKAXQbfkZiuzfyNqoGzWCxx4bsK2DWXlbkHj6qEXI7Gnrlpa tmjA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c2-v6si41936491pgi.119.2018.11.05.03.56.26; Mon, 05 Nov 2018 03:56:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729438AbeKEVPP (ORCPT + 99 others); Mon, 5 Nov 2018 16:15:15 -0500 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:41804 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729416AbeKEVPP (ORCPT ); Mon, 5 Nov 2018 16:15:15 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id CA89C169E; Mon, 5 Nov 2018 03:55:52 -0800 (PST) Received: from en101.cambridge.arm.com (en101.cambridge.arm.com [10.1.196.93]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 75D803F5BD; Mon, 5 Nov 2018 03:55:51 -0800 (PST) From: Suzuki K Poulose To: linux-arm-kernel@lists.infradead.org Cc: linux-kernel@vger.kernel.org, vladimir.murzin@arm.com, will.deacon@arm.com, catalin.marinas@arm.com, mark.rutland@arm.com, Suzuki K Poulose Subject: [PATCH 6/7] arm64: capabilities: Use linear array for detection and verification Date: Mon, 5 Nov 2018 11:55:16 +0000 Message-Id: <1541418917-14219-7-git-send-email-suzuki.poulose@arm.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1541418917-14219-1-git-send-email-suzuki.poulose@arm.com> References: <1541418917-14219-1-git-send-email-suzuki.poulose@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Use the sorted list of capability entries for the detection and verification. Cc: Vladimir Murzin Signed-off-by: Suzuki K Poulose --- arch/arm64/kernel/cpufeature.c | 42 +++++++++++++++++------------------------- 1 file changed, 17 insertions(+), 25 deletions(-) diff --git a/arch/arm64/kernel/cpufeature.c b/arch/arm64/kernel/cpufeature.c index 96e687e..fff430d 100644 --- a/arch/arm64/kernel/cpufeature.c +++ b/arch/arm64/kernel/cpufeature.c @@ -1508,28 +1508,25 @@ static void __init setup_elf_hwcaps(const struct arm64_cpu_capabilities *hwcaps) cap_set_elf_hwcap(hwcaps); } -static void __update_cpu_capabilities(const struct arm64_cpu_capabilities *caps, - u16 scope_mask, const char *info) +static void update_cpu_capabilities(u16 scope_mask) { + int i; + const struct arm64_cpu_capabilities *caps; + scope_mask &= ARM64_CPUCAP_SCOPE_MASK; - for (; caps->matches; caps++) { - if (!(caps->type & scope_mask) || + for (i = 0; i < ARM64_NCAPS; i++) { + caps = cpu_hwcaps_ptrs[i]; + if (!caps || !(caps->type & scope_mask) || + cpus_have_cap(caps->capability) || !caps->matches(caps, cpucap_default_scope(caps))) continue; - if (!cpus_have_cap(caps->capability) && caps->desc) - pr_info("%s %s\n", info, caps->desc); + if (caps->desc) + pr_info("detected: %s\n", caps->desc); cpus_set_cap(caps->capability); } } -static void update_cpu_capabilities(u16 scope_mask) -{ - __update_cpu_capabilities(arm64_errata, scope_mask, - "enabling workaround for"); - __update_cpu_capabilities(arm64_features, scope_mask, "detected:"); -} - static int __enable_cpu_capability(void *arg) { const struct arm64_cpu_capabilities *cap = arg; @@ -1593,16 +1590,17 @@ static void __init enable_cpu_capabilities(u16 scope_mask) * * Returns "false" on conflicts. */ -static bool -__verify_local_cpu_caps(const struct arm64_cpu_capabilities *caps, - u16 scope_mask) +static bool verify_local_cpu_caps(u16 scope_mask) { + int i; bool cpu_has_cap, system_has_cap; + const struct arm64_cpu_capabilities *caps; scope_mask &= ARM64_CPUCAP_SCOPE_MASK; - for (; caps->matches; caps++) { - if (!(caps->type & scope_mask)) + for (i = 0; i < ARM64_NCAPS; i++) { + caps = cpu_hwcaps_ptrs[i]; + if (!caps || !(caps->type & scope_mask)) continue; cpu_has_cap = caps->matches(caps, SCOPE_LOCAL_CPU); @@ -1633,7 +1631,7 @@ __verify_local_cpu_caps(const struct arm64_cpu_capabilities *caps, } } - if (caps->matches) { + if (i < ARM64_NCAPS) { pr_crit("CPU%d: Detected conflict for capability %d (%s), System: %d, CPU: %d\n", smp_processor_id(), caps->capability, caps->desc, system_has_cap, cpu_has_cap); @@ -1643,12 +1641,6 @@ __verify_local_cpu_caps(const struct arm64_cpu_capabilities *caps, return true; } -static bool verify_local_cpu_caps(u16 scope_mask) -{ - return __verify_local_cpu_caps(arm64_errata, scope_mask) && - __verify_local_cpu_caps(arm64_features, scope_mask); -} - /* * Check for CPU features that are used in early boot * based on the Boot CPU value. -- 2.7.4