Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp4479025ybx; Mon, 4 Nov 2019 14:06:40 -0800 (PST) X-Google-Smtp-Source: APXvYqx5SgLRrlIjdwItypsWJzc0L1f1RiegL5FSOoT2/kfvgllGWH/YtHhHMQrO2Wf913NpNdlN X-Received: by 2002:a17:906:3e41:: with SMTP id t1mr26285972eji.103.1572905200661; Mon, 04 Nov 2019 14:06:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572905200; cv=none; d=google.com; s=arc-20160816; b=TDXgIs0dTUsJmftvzolLreNsEkmG+d6AHM5Wm9vV2eZgHXSXV/l2YQ6l2mhmTWPad4 OqMSIgAr3u6k3lib2LIlSlsnhc+uEPyCVfliJNJopwCwUYKqtvrF+hu4RQ9JJMgdzdgU uwjF5yBoAqGrlnaAmtdDu1e2YKk/yzQi+BYVNKvcEO/EayuRCiCYd0b44dM7zQn3UWS3 cxufDn+1tw2PlpSwje7IWxC0j5ty1R6MYyPym91AKiwJWjEfJpq9Qfb75DpCQGih+yBD WwAAoXYCX5Cr8DF9hRbnx6rKHsAeTEpOfe0hxgVaWGoTS2Ui/NIPRjI4EEpcvz0yJLLp mOvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=wy4B1kJWmcnJJFNM06v83c39FlmZ0Ff3rmHHggFiTIY=; b=yCqExxGVbSOKlEpGFw08aauhbzf0H+LToEDjrmweCjrM8FM7yGzvmRIKBAS96q2BqT QV6THEYu/l/jibtX6ZCZ4DaWCU1Pf/Y7evAZplUo277DXpgpE27mSYlbPptCLQpPdKmB ssh6Vz4jdhYOHgKvoKAVun8MAxQZ3kOQ6YK2TqxLxez+DaP0/7J8pPTjsKhuIaDZuhaQ habZQWpdCxJIblxrdoa+Tw05dx3ZZWkmsPZkh1c+PvwGM/YwC0Y/JSAVPOnPUrhrYtzw MZM2hwE97NtAIYjFkKyzHpybSJ25DdnrJGzwTeNJcEd3n+SfdAJxqO+v/TAGBcUkBAqJ HKpw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fJgTmrPE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ck15si11166158ejb.358.2019.11.04.14.06.17; Mon, 04 Nov 2019 14:06:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fJgTmrPE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389788AbfKDWFG (ORCPT + 99 others); Mon, 4 Nov 2019 17:05:06 -0500 Received: from mail.kernel.org ([198.145.29.99]:36096 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389115AbfKDWFD (ORCPT ); Mon, 4 Nov 2019 17:05:03 -0500 Received: from localhost (6.204-14-84.ripe.coltfrance.com [84.14.204.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B2AD5205C9; Mon, 4 Nov 2019 22:05:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572905102; bh=7mNEQb4odMCK8DC3X0ofHK/HaZhcSp9aEhBH5SILLYY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fJgTmrPEwJToifcNIBFLXu9vgIcD/wgHjiB4DD/oQzc6mbAghlkF/OeLou3GFRsLT BMTcjLztcncPgaBFjqWpKxY4t32U1rHIlRVWDxjmoY6A6UEfqmi4OLSvbQgcQ95nkO LQ0sQHP6UBgTw7mhcl/p6agILb3/tJrYugoGcGU4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Julien Grall , mark.brown@arm.com, Will Deacon , Sasha Levin Subject: [PATCH 5.3 029/163] arm64: cpufeature: Effectively expose FRINT capability to userspace Date: Mon, 4 Nov 2019 22:43:39 +0100 Message-Id: <20191104212142.418176586@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191104212140.046021995@linuxfoundation.org> References: <20191104212140.046021995@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Julien Grall [ Upstream commit 7230f7e99fecc684180322b056fad3853d1029d3 ] The HWCAP framework will detect a new capability based on the sanitized version of the ID registers. Sanitization is based on a whitelist, so any field not described will end up to be zeroed. At the moment, ID_AA64ISAR1_EL1.FRINTTS is not described in ftr_id_aa64isar1. This means the field will be zeroed and therefore the userspace will not be able to see the HWCAP even if the hardware supports the feature. This can be fixed by describing the field in ftr_id_aa64isar1. Fixes: ca9503fc9e98 ("arm64: Expose FRINT capabilities to userspace") Signed-off-by: Julien Grall Cc: mark.brown@arm.com Signed-off-by: Will Deacon Signed-off-by: Sasha Levin --- arch/arm64/kernel/cpufeature.c | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/arm64/kernel/cpufeature.c b/arch/arm64/kernel/cpufeature.c index 9323bcc40a58a..cabebf1a79768 100644 --- a/arch/arm64/kernel/cpufeature.c +++ b/arch/arm64/kernel/cpufeature.c @@ -136,6 +136,7 @@ static const struct arm64_ftr_bits ftr_id_aa64isar0[] = { static const struct arm64_ftr_bits ftr_id_aa64isar1[] = { ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_SB_SHIFT, 4, 0), + ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_FRINTTS_SHIFT, 4, 0), ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_PTR_AUTH), FTR_STRICT, FTR_LOWER_SAFE, ID_AA64ISAR1_GPI_SHIFT, 4, 0), ARM64_FTR_BITS(FTR_VISIBLE_IF_IS_ENABLED(CONFIG_ARM64_PTR_AUTH), -- 2.20.1