Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp313152pxx; Wed, 28 Oct 2020 05:41:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwznbGxNuTyw7LWS0DZVvmQHw8HO4PKV4VHJHJ9V4QWt6SB4UANndej4Aggemp9lrykQdbM X-Received: by 2002:aa7:c14a:: with SMTP id r10mr7698905edp.345.1603888915816; Wed, 28 Oct 2020 05:41:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603888915; cv=none; d=google.com; s=arc-20160816; b=GQ85vh9xSi/f1Nk6/XrgiMj9fpJ+1FAWeuHRdYOAc3YWJg9UXIwh6n0714eyQymgrO oMOWGOwrz5URdTqT/KEyZtc4Q4rE65L+aoPRDwOSZqdEutQKmdL196wG2DmLPTAMlIGz 5dJ/K66pzBMeR2EvRIfbL23Mdn46EuCsKCQYxQLJK+AzqyKhtckFL+R0TEWahBbuaH1H 84llQflkOqFjURYtDR75uGwtQaZb9bl0FQ1V4ReA4SwdE7aYwC9fDwTXEBVi7kUnoF2v HDDNk/A3KgyfkudFM2CMWlGM8PLzHcElZvbvKKnFafhwhevvPOehX/mpP2BURKNgrinX VIVw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=6GP4VbVHiRsVSzONtsiditAYM1pTJ/SfKtaSfMSk7S0=; b=TIMbosDpHr25pL7wVNAkpqZAd7cxSifOneYEUmVg/FHG3hsPI9n+rX8YqBKdJE0rF/ 9Nt2VhFLVXbayiNAvTghAHb0wxf120JaO4x+JbnOuDrV5PZGTvX+GWDG/4+doIXeHfwz I530u7FQxJOfNqR3uGUrlEqE56DqrfwYXcTpkpmaK8Kyh/sTzadi/UQ+bloQ75TbhvyL ekpAzORPAQtuLGi0aRLSGgnM9JvhjfAMHAzkTMzm0p1bykDOZQsdXLDKxS50lCurNmWj bRK0M5K2kYcK+XpJGjwnaTcx8tPB1Erlljer/UxAHnnkVm7VAakUljMjxn0QyRRVg3BE 9JqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="Q/5QchdV"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bt10si1135660edb.503.2020.10.28.05.41.33; Wed, 28 Oct 2020 05:41:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="Q/5QchdV"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1797551AbgJ0PYM (ORCPT + 99 others); Tue, 27 Oct 2020 11:24:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:37558 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1797282AbgJ0PWl (ORCPT ); Tue, 27 Oct 2020 11:22:41 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8477B2076D; Tue, 27 Oct 2020 15:22:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603812161; bh=WehOnmvMEltJu9ZF5Z1xoC8xUIS8r926y7Ds5a440hM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Q/5QchdVq2bD1qERrwKRziA5TT3SjQlnRf9T6v0oOt9+PX+B2KJ5Og84b6LfMdJQV Pjh6G9aIQblTivwsVUENAH5flIAE++H2UcVaX1K1Hk25efyeIl4Pbf3zBry8gEuLCt S3GK701KTkWQjN8+w5y6yb4W4EsCklSi1GRTjJV4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Marc Zyngier , Will Deacon Subject: [PATCH 5.9 072/757] arm64: Make use of ARCH_WORKAROUND_1 even when KVM is not enabled Date: Tue, 27 Oct 2020 14:45:22 +0100 Message-Id: <20201027135453.923355479@linuxfoundation.org> X-Mailer: git-send-email 2.29.1 In-Reply-To: <20201027135450.497324313@linuxfoundation.org> References: <20201027135450.497324313@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Marc Zyngier commit b11483ef5a502663732c6ca1b58d14ff9eedd6f7 upstream. We seem to be pretending that we don't have any firmware mitigation when KVM is not compiled in, which is not quite expected. Bring back the mitigation in this case. Fixes: 4db61fef16a1 ("arm64: kvm: Modernize __smccc_workaround_1_smc_start annotations") Cc: Signed-off-by: Marc Zyngier Signed-off-by: Will Deacon Signed-off-by: Greg Kroah-Hartman --- arch/arm64/kernel/cpu_errata.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) --- a/arch/arm64/kernel/cpu_errata.c +++ b/arch/arm64/kernel/cpu_errata.c @@ -234,14 +234,17 @@ static int detect_harden_bp_fw(void) smccc_end = NULL; break; -#if IS_ENABLED(CONFIG_KVM) case SMCCC_CONDUIT_SMC: cb = call_smc_arch_workaround_1; +#if IS_ENABLED(CONFIG_KVM) smccc_start = __smccc_workaround_1_smc; smccc_end = __smccc_workaround_1_smc + __SMCCC_WORKAROUND_1_SMC_SZ; - break; +#else + smccc_start = NULL; + smccc_end = NULL; #endif + break; default: return -1;