Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp7227122imu; Thu, 31 Jan 2019 07:02:40 -0800 (PST) X-Google-Smtp-Source: ALg8bN7GqKmdamsCO46WujfzXS0lcyPCwY/8sxQPjyJ/nenzB81DpEnNvkIg8uxj8C/lY6kVGNn4 X-Received: by 2002:a65:50c1:: with SMTP id s1mr31030860pgp.350.1548946960254; Thu, 31 Jan 2019 07:02:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548946960; cv=none; d=google.com; s=arc-20160816; b=Hy6FGIg3HcHtBUbOfCBrOeNj55fk8XZ8VqYmbMFmdS/uC9yJYHz+oulq1/AcR38vo3 RrcD09z9k4uo9EbjNItUdAwToEDq1m2ilAD99polmvOsJl3F32pC+q3EfP97D4uLTA3O d5LMBGH1XAg3yPgPWM3xNUsg0oZKXKv0jkgmEgMtbSSAf1mqJydrvT9wEtRk0kEtU9Bi WQZ5wIEPvvf74juVSD5jltEqlEo+fh6pYE9+dc3urC19aypGNxrS1ZlI+XSx4YRM4JRi +bfo6m5LXsreNzZgigH1n//wni9g6DimREmhUWMrOtVPC3sAOFXTzEDsODVwmnn5B5OO mDZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=8qUEIYkGyhiVq6owCRGYrc4jctBo293T6nBqPyahrOk=; b=PcVcfC+z8g6tseg7McKd1f0bKSz2nuEBQYRMZuu/XdlPlSLfHbH9ICNMl196ww8iL2 237HtqvEfUYnQUEY7jMFiQYqpUVCbY0zq6p2aONazg38DJYlJI0MnEXMT66FvxvjA4zI 4IzJJRCX+z2/P1XgLzwJcQcbyX+5xRprh1g9Y8cmLiDt04hc4OiAwA/zFF2si1ifSVA8 59ZYGKc1EzoWoAHznFFWCUhDcHjgaznZInOpElzO8EpQ+YrcFxowHXQEyAXWn/ha7DKC D5q9RDOUtgIYF/401mSfTdcAFPwPvTC4unfqRj311mMDE3lIOeyUZSczImc1SfMr45pY TPtw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p3si4747557plr.376.2019.01.31.07.02.21; Thu, 31 Jan 2019 07:02:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732948AbfAaO7t (ORCPT + 99 others); Thu, 31 Jan 2019 09:59:49 -0500 Received: from foss.arm.com ([217.140.101.70]:45616 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732917AbfAaO7r (ORCPT ); Thu, 31 Jan 2019 09:59:47 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id F350C80D; Thu, 31 Jan 2019 06:59:46 -0800 (PST) Received: from e112298-lin.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 062DE3F59C; Thu, 31 Jan 2019 06:59:44 -0800 (PST) From: Julien Thierry To: linux-arm-kernel@lists.infradead.org Cc: linux-kernel@vger.kernel.org, daniel.thompson@linaro.org, joel@joelfernandes.org, marc.zyngier@arm.com, christoffer.dall@arm.com, james.morse@arm.com, catalin.marinas@arm.com, will.deacon@arm.com, mark.rutland@arm.com, Julien Thierry Subject: [PATCH v10 13/25] arm64: daifflags: Include PMR in daifflags restore operations Date: Thu, 31 Jan 2019 14:58:51 +0000 Message-Id: <1548946743-38979-14-git-send-email-julien.thierry@arm.com> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1548946743-38979-1-git-send-email-julien.thierry@arm.com> References: <1548946743-38979-1-git-send-email-julien.thierry@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The addition of PMR should not bypass the semantics of daifflags. When DA_F are set, I bit is also set as no interrupts (even of higher priority) is allowed. When DA_F are cleared, I bit is cleared and interrupt enabling/disabling goes through ICC_PMR_EL1. Signed-off-by: Julien Thierry Reviewed-by: Catalin Marinas Reviewed-by: Marc Zyngier Cc: Catalin Marinas Cc: Will Deacon Cc: James Morse --- arch/arm64/include/asm/daifflags.h | 50 +++++++++++++++++++++++++++++++++++--- 1 file changed, 46 insertions(+), 4 deletions(-) diff --git a/arch/arm64/include/asm/daifflags.h b/arch/arm64/include/asm/daifflags.h index 546bc39..1dd3d7a 100644 --- a/arch/arm64/include/asm/daifflags.h +++ b/arch/arm64/include/asm/daifflags.h @@ -18,6 +18,8 @@ #include +#include + #define DAIF_PROCCTX 0 #define DAIF_PROCCTX_NOIRQ PSR_I_BIT @@ -36,7 +38,13 @@ static inline unsigned long local_daif_save(void) { unsigned long flags; - flags = arch_local_save_flags(); + flags = read_sysreg(daif); + + if (system_uses_irq_prio_masking()) { + /* If IRQs are masked with PMR, reflect it in the flags */ + if (read_sysreg_s(SYS_ICC_PMR_EL1) <= GIC_PRIO_IRQOFF) + flags |= PSR_I_BIT; + } local_daif_mask(); @@ -45,12 +53,46 @@ static inline unsigned long local_daif_save(void) static inline void local_daif_restore(unsigned long flags) { - if (!arch_irqs_disabled_flags(flags)) + bool irq_disabled = flags & PSR_I_BIT; + + if (!irq_disabled) { trace_hardirqs_on(); - arch_local_irq_restore(flags); + if (system_uses_irq_prio_masking()) + arch_local_irq_enable(); + } else if (!(flags & PSR_A_BIT)) { + /* + * If interrupts are disabled but we can take + * asynchronous errors, we can take NMIs + */ + if (system_uses_irq_prio_masking()) { + flags &= ~PSR_I_BIT; + /* + * There has been concern that the write to daif + * might be reordered before this write to PMR. + * From the ARM ARM DDI 0487D.a, section D1.7.1 + * "Accessing PSTATE fields": + * Writes to the PSTATE fields have side-effects on + * various aspects of the PE operation. All of these + * side-effects are guaranteed: + * - Not to be visible to earlier instructions in + * the execution stream. + * - To be visible to later instructions in the + * execution stream + * + * Also, writes to PMR are self-synchronizing, so no + * interrupts with a lower priority than PMR is signaled + * to the PE after the write. + * + * So we don't need additional synchronization here. + */ + arch_local_irq_disable(); + } + } + + write_sysreg(flags, daif); - if (arch_irqs_disabled_flags(flags)) + if (irq_disabled) trace_hardirqs_off(); } -- 1.9.1