Received: by 2002:ac2:464d:0:0:0:0:0 with SMTP id s13csp3664798lfo; Mon, 23 May 2022 10:45:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwFnH4mK16XdE5KEPtSIooK+FeHQCYkqe+vf2OGS5GyITV4VCOC/yYlLmzB1+VPjDqSByhu X-Received: by 2002:a05:6a00:811:b0:518:b0eb:9132 with SMTP id m17-20020a056a00081100b00518b0eb9132mr3527514pfk.57.1653327927087; Mon, 23 May 2022 10:45:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653327927; cv=none; d=google.com; s=arc-20160816; b=I5ISAIsgsi6lANkMBMV5YNCP7OwbXOqcUWHiuA3Njj1+2Vhd7zPzr80bl91QeGoQbk ZNS+8aJuSfFpisUYITEbE74bR731aYAvGC4vsYUyiNttqmyFwu8G/B/jnQQJJCvo73Va JJp4FbhZv4PQ86hpn7MPg4aRgECJx11PdkBCYr5W7di8WCl9BNYygeBY9HiBgLVlEJkn o6WqBGujhUb/VAQPxxEFmiX6oFVeASU+tD2UHlEgen2nEtPr99qF2DLoFOudq2nkJTBc o/IXuDIPpQP/EihEFHIGUYzs1NaQ2TzfkY8JJv+riIu1DBvsrR+ipHqEwL8God71yMtP dMzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=PAN4e3JNb7qnwEiZs69GNfW0+Pn4tcyb+DPZ+tQ1QIg=; b=ABhRKGbFU6DzOxsFGu8GdU1M5bsFHpFK7UOqSW+lwHqSAazG08lKTByh23FsiMD7JG Q7p+NV5cApWH5YBq4tryZMKoDsYlIYU4o6GPqN/6VLm/KSA399FYEu6AvZo9ZOFmyR5w TVRTa2GIelDkfyaRf7LBjEnvXGpQcVsXdclM+R92uiD84Um471IXnnCJsBdh2gJbcYdF iUIxE5MK41t4QDgfaCz76K71c+OKucoApACg6XXBw7jbckFK+Z0ErZmybYd3L8rUx2JF OJ1kr3Z/xEnjYmTSmfeTP74f3mS/4TOT7cwuXzH53JaKDsHAmaVLz52N5uUMbpE5KBIt Psjg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=RCpRHU0D; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id rm14-20020a17090b3ece00b001e041b9c370si6560035pjb.55.2022.05.23.10.45.25 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 May 2022 10:45:27 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=RCpRHU0D; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id F3D89D9EA5; Mon, 23 May 2022 10:45:09 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241556AbiEWRkf (ORCPT + 99 others); Mon, 23 May 2022 13:40:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55522 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242407AbiEWR1n (ORCPT ); Mon, 23 May 2022 13:27:43 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 31FE87CB5C; Mon, 23 May 2022 10:23:08 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id CF4CF60919; Mon, 23 May 2022 17:23:07 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C10A7C385AA; Mon, 23 May 2022 17:23:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1653326587; bh=bmNDXt0dhhCHvZC50SZNQe0bZ4XDsvewzFJ1e8Dm0K0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RCpRHU0D2zoJKaB8Q4CY9MqZpiuB1/HSeqqAC9gxS0fnQiosYEdFzw6+ArFkAO7rT 5EIywzvamlL7OyNMV2B8LZGfhPc8Pl3bzhzPiCsGdhIdHHqDh9sGONJ7+uoeqPX4ZX VNWoRVITQbkAvomWEQ7ecoFY/ZMTJbI8Czm8mNzE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Shreyas K K , Sai Prakash Ranjan , Will Deacon , Sasha Levin Subject: [PATCH 5.15 127/132] arm64: Enable repeat tlbi workaround on KRYO4XX gold CPUs Date: Mon, 23 May 2022 19:05:36 +0200 Message-Id: <20220523165844.724849103@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220523165823.492309987@linuxfoundation.org> References: <20220523165823.492309987@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Shreyas K K [ Upstream commit 51f559d66527e238f9a5f82027bff499784d4eac ] Add KRYO4XX gold/big cores to the list of CPUs that need the repeat TLBI workaround. Apply this to the affected KRYO4XX cores (rcpe to rfpe). The variant and revision bits are implementation defined and are different from the their Cortex CPU counterparts on which they are based on, i.e., (r0p0 to r3p0) is equivalent to (rcpe to rfpe). Signed-off-by: Shreyas K K Reviewed-by: Sai Prakash Ranjan Link: https://lore.kernel.org/r/20220512110134.12179-1-quic_shrekk@quicinc.com Signed-off-by: Will Deacon Signed-off-by: Sasha Levin --- Documentation/arm64/silicon-errata.rst | 3 +++ arch/arm64/kernel/cpu_errata.c | 2 ++ 2 files changed, 5 insertions(+) diff --git a/Documentation/arm64/silicon-errata.rst b/Documentation/arm64/silicon-errata.rst index d410a47ffa57..7c1750bcc5bd 100644 --- a/Documentation/arm64/silicon-errata.rst +++ b/Documentation/arm64/silicon-errata.rst @@ -163,6 +163,9 @@ stable kernels. +----------------+-----------------+-----------------+-----------------------------+ | Qualcomm Tech. | Kryo4xx Silver | N/A | ARM64_ERRATUM_1024718 | +----------------+-----------------+-----------------+-----------------------------+ +| Qualcomm Tech. | Kryo4xx Gold | N/A | ARM64_ERRATUM_1286807 | ++----------------+-----------------+-----------------+-----------------------------+ + +----------------+-----------------+-----------------+-----------------------------+ | Fujitsu | A64FX | E#010001 | FUJITSU_ERRATUM_010001 | +----------------+-----------------+-----------------+-----------------------------+ diff --git a/arch/arm64/kernel/cpu_errata.c b/arch/arm64/kernel/cpu_errata.c index a33d7b8f3b93..c67c19d70159 100644 --- a/arch/arm64/kernel/cpu_errata.c +++ b/arch/arm64/kernel/cpu_errata.c @@ -208,6 +208,8 @@ static const struct arm64_cpu_capabilities arm64_repeat_tlbi_list[] = { #ifdef CONFIG_ARM64_ERRATUM_1286807 { ERRATA_MIDR_RANGE(MIDR_CORTEX_A76, 0, 0, 3, 0), + /* Kryo4xx Gold (rcpe to rfpe) => (r0p0 to r3p0) */ + ERRATA_MIDR_RANGE(MIDR_QCOM_KRYO_4XX_GOLD, 0xc, 0xe, 0xf, 0xe), }, #endif {}, -- 2.35.1