Received: by 2002:a05:7413:382:b0:fc:d7cd:15c0 with SMTP id mm2csp716322rdb; Wed, 7 Feb 2024 18:27:28 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUIOsAyLc1hoxpkvhiZQlNvB48ssKEyrrWRyUKONvnvzQRmr8JIkALj7NRmsOsLxU1fZsdkOwKSHDg5yVVRXECFdwwCeECySd99UUQF3w== X-Google-Smtp-Source: AGHT+IGmrgvOceSLGmfz3cXXFuBsAv5tiH/J4eeGJtOZtobxGbt4ECuTQz+wHbx9qMbgKUjQ7kZ7 X-Received: by 2002:a05:620a:458b:b0:785:5b35:d64 with SMTP id bp11-20020a05620a458b00b007855b350d64mr9880618qkb.71.1707359248162; Wed, 07 Feb 2024 18:27:28 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707359248; cv=pass; d=google.com; s=arc-20160816; b=DYKtO+Zx5p7qqFMjC9Ng2frM9ykLnp8kuUQdwNx8gHydA/NjRv6TaejtKboT5sWFzD leNsJqGP9bonWUzyRMVMhOOyeLkh3L2Py9MmlYldtId0ftr8pvJf/imJrEiGgLvAOscz HOcFNaYJGu9ZyTaZamk5I9LC9afrpd8rIAUb1FhPlgBglZCSnmrKkPF8zrCkP4a6aHWt sCnj34CsFE2iguPv48vZ7nQtU/mxZVBUiPZukrHwagaa1vsbOc/xGbxmWzEvxHkASU6A /GwSCijH9Xuwrc5imeQW52rHmoQZAm5R1PKW1/POv06IyYwQ/WB9ruHnae6YBZkNLxrh 886g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=Hk7ZBu3HurWptK6Jqxv5pv5i6VPmY5c2Ebia9meKyH8=; fh=ikEZ6uVXTUqx7+llb/vMVvNITpuR+rCxvfPlfd494os=; b=WigOIJNIdNgk2yJtuQiOnBfdAckGrTOEb3OixR/5XBsAbDtQHk/V9zjuM+jA8cb3kH JypoIvcyFj1dvTQkBxaiCEKtcu2ejVxnXDcjP3FrpxDmuf8MN8HwPe5x5LwJ1IMhKMLK Ar1IQ67XewZ0tYas3srvLvM7Al88y4T2vgn3uDyDsfXdVj/XaCuQhUZAvQTX6pSxq/5q 7FaOzZotSzxLdC8ltdxcMwdxyPDxWKsRxUCNX4G+f6IW9IfID7T0b0tOCsAKqY+cKLIK qmQcwIMDcbxhDQoTezrfQc1aUdG1HxNAJhBuN8SGDcY/81uwNF8Pm4XmUdsCj1BGRY4g /vEg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@rivosinc-com.20230601.gappssmtp.com header.s=20230601 header.b=pIh3Vmnn; arc=pass (i=1 spf=pass spfdomain=rivosinc.com dkim=pass dkdomain=rivosinc-com.20230601.gappssmtp.com); spf=pass (google.com: domain of linux-kernel+bounces-57387-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-57387-linux.lists.archive=gmail.com@vger.kernel.org" X-Forwarded-Encrypted: i=2; AJvYcCURY57rDccOLFwKMRNJCuV+0BamSIVjouaHr4OOGaumsXMFsob7G9wxJdWFkOK64uI1ktwPyJkVd1gfbck4Hh41VJZjlX9+lVXewYp/bA== Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id bj32-20020a05620a192000b00783322de747si2782320qkb.339.2024.02.07.18.27.28 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 07 Feb 2024 18:27:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-57387-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@rivosinc-com.20230601.gappssmtp.com header.s=20230601 header.b=pIh3Vmnn; arc=pass (i=1 spf=pass spfdomain=rivosinc.com dkim=pass dkdomain=rivosinc-com.20230601.gappssmtp.com); spf=pass (google.com: domain of linux-kernel+bounces-57387-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-57387-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id C383C1C22394 for ; Thu, 8 Feb 2024 02:27:27 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 8EC5E1DFEB; Thu, 8 Feb 2024 02:27:23 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=rivosinc-com.20230601.gappssmtp.com header.i=@rivosinc-com.20230601.gappssmtp.com header.b="pIh3Vmnn" Received: from mail-pj1-f41.google.com (mail-pj1-f41.google.com [209.85.216.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 549331947E for ; Thu, 8 Feb 2024 02:27:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.41 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707359241; cv=none; b=ZzSOs9ROOm3QeLCXbz15XtovFnRPsgQ+zW9hRnIdX2WPcv9OZ8gU3Rn0d+bTWYqH8ilfQty1xZiQ4+C1MEB+h4cayru9XtSXoEd6cVzM6z82NU5ar6fCIj2QZ6xbddEESaFsTAfWt3wBZESxROzTq9zLPqbsJ8jv+fzaHGW1I84= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707359241; c=relaxed/simple; bh=XLk9g87izE0UlczcX4z1MdeykRfHBdsa8Y/ArIVV/Jc=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=XW5JbT+8YYzyLUsUdIEzYj9FcrqAbb5xcB1vyTMHGbzc1bvwlhNtmXG3+ueV+FoiexAFEmuDGVV/CBZwbn9XMrS2kAcAuNVNnydzDTt6SdwSEgya7HQFNu+taTjKnrg4dLngh+SeaIZEa/Bypq2fBBsgS//69goq/ztZcrmYGec= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=rivosinc.com; spf=pass smtp.mailfrom=rivosinc.com; dkim=pass (2048-bit key) header.d=rivosinc-com.20230601.gappssmtp.com header.i=@rivosinc-com.20230601.gappssmtp.com header.b=pIh3Vmnn; arc=none smtp.client-ip=209.85.216.41 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=rivosinc.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=rivosinc.com Received: by mail-pj1-f41.google.com with SMTP id 98e67ed59e1d1-296dcd75be7so970474a91.2 for ; Wed, 07 Feb 2024 18:27:18 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rivosinc-com.20230601.gappssmtp.com; s=20230601; t=1707359237; x=1707964037; darn=vger.kernel.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=Hk7ZBu3HurWptK6Jqxv5pv5i6VPmY5c2Ebia9meKyH8=; b=pIh3Vmnn4CkPwbJ9MdftES8ZudB4iMEGFd9YplNDBumwA4M5r2ofDDjo1UlYhpouSv 4g+67JwS5kIa7Ma5otYEjgKhmqCXCKAzsxO9xSZxRxfBH0Pk2hxOwezw1seAOEWd4dsm ZIN/401SmUTIaXXSOurFskgfJxvpsNNvKgGrMeBH8nRI7f6dBQZbkUChDOZapXhzd/3k ID2y3odL4RlLeajeZDoE8muSK1xGj50MbiOCmoVKKHsrOBcxhvYPRXzqo1VNrCvw1zY+ sHqi9mZyq3ao2XTC6o8CuPSk2ADmhhyOVYjLDNSvmNOx1/KiAScCYr1VUpgrfMKqVuzw tZVg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1707359237; x=1707964037; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=Hk7ZBu3HurWptK6Jqxv5pv5i6VPmY5c2Ebia9meKyH8=; b=mqo0+ZYwESX9tcT2dkeS0V28N1Yi7KLOriVz9yWLTRG27BRUfnsVGKsKrG3OlaSXtb bX+3lKf1eCv/0UI/9XrdcqpKr1sXcobLAluYsKP1pdOjpvvo22/QbPtSpz2QDpzMar+G AVvrdDzDnkshzGjgz9dTDST8GvAvBBc2zlQ+rAEmCDQG0YlBFYW6Q1hxnpmMSuEdmmPU yhks1LBH8GKkOd5+4XYCCAtd2HMymKp6ereRMd1wn9FBc50UKnQN+39Q8UbIragljx8L /zLDpc3TWmb/6wigWMWbogauc/zObBH5hiaW+Yo5piwcpIqBVOoatYPj2k0bdh/qDUcG T8sA== X-Forwarded-Encrypted: i=1; AJvYcCUQ0vq0XDHDEz8VfXejhVh8i7ExRwJTvGCU+rq10FKbBYDzXu3HeS/kjMF4qtJO3qrJIhihNbwHakKLgkKDZWkxg0xmF/FN2AGTeQmt X-Gm-Message-State: AOJu0YwSKI4QM8QmFuZVwy/fcVW63kxujrqtNr7Wh9hFqWMGLPkf3IBF FQMXb8ATrXbTmMHeYUapiwn741Bek7hbZ7oLCwSH9UYDlrKvEdPIIBsZpO3P2as= X-Received: by 2002:a17:90a:fb87:b0:290:9e9e:a87e with SMTP id cp7-20020a17090afb8700b002909e9ea87emr4541463pjb.42.1707359237452; Wed, 07 Feb 2024 18:27:17 -0800 (PST) X-Forwarded-Encrypted: i=1; AJvYcCWlp7aSq9sbJGvJI6PVa+3Owfz+xtwDZBKZm17mlbjNd98ImzfoRg4C0gMC1d7H9BXDynd2oTWJdBhN0oT9vaQ1qEA8YuzmnDfmuq6Llo2R6aZkNv3FULu0C5gPPeCWGgGSY4QaGEjU+SuzbOfheDOh+Lxdr8/9/hVed4F8xbG/5hIUiaqQOQe6DeWIIGpVqtUfG/XEQo4QkxWT/Dw5V17pnKJDXOzx428Xi016kaT4fbxr/6z3Q+pfMCdcwQRDoTwdCAx+Jr/n4HHkWbb6NIXLsczke01TYS9mib5Tz+X28KGicxU68dkIwCkWSuRkXLNucQGxcqq37IPTKwBgKvGmk49S1FrxMs25H6u/1mKFXAlPZuciZZ2dKnXYqIZg4+JHX3Lh//YSzOWK9PgN/i44X/GiU6w+g5+sOeSjcukB66zo5GT9+Z/AcbXvjBG3GIoO Received: from ghost ([12.44.203.122]) by smtp.gmail.com with ESMTPSA id nd7-20020a17090b4cc700b00296a265acbbsm167120pjb.25.2024.02.07.18.27.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 07 Feb 2024 18:27:17 -0800 (PST) Date: Wed, 7 Feb 2024 18:27:13 -0800 From: Charlie Jenkins To: Samuel Holland Cc: Alexandre Ghiti , linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, Atish Patra , Paul Walmsley , Palmer Dabbelt , Albert Ou , Jonathan Corbet , Conor Dooley , =?iso-8859-1?Q?Cl=E9ment_L=E9ger?= , Atish Patra , Randy Dunlap Subject: Re: [PATCH v10 1/2] riscv: Include riscv_set_icache_flush_ctx prctl Message-ID: References: <20240124-fencei-v10-0-a25971f4301d@rivosinc.com> <20240124-fencei-v10-1-a25971f4301d@rivosinc.com> <5849b66f-d7c4-4011-b556-10725ac0958e@sifive.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5849b66f-d7c4-4011-b556-10725ac0958e@sifive.com> On Wed, Feb 07, 2024 at 12:55:24PM -0600, Samuel Holland wrote: > Hi Charlie, > > On 2024-01-24 10:23 PM, Charlie Jenkins wrote: > > Support new prctl with key PR_RISCV_SET_ICACHE_FLUSH_CTX to enable > > optimization of cross modifying code. This prctl enables userspace code > > to use icache flushing instructions such as fence.i with the guarantee > > that the icache will continue to be clean after thread migration. > > > > Signed-off-by: Charlie Jenkins > > Reviewed-by: Atish Patra > > --- > > arch/riscv/include/asm/mmu.h | 2 ++ > > arch/riscv/include/asm/processor.h | 7 ++++ > > arch/riscv/include/asm/switch_to.h | 13 ++++++++ > > arch/riscv/mm/cacheflush.c | 67 ++++++++++++++++++++++++++++++++++++++ > > arch/riscv/mm/context.c | 13 ++++++-- > > include/uapi/linux/prctl.h | 6 ++++ > > kernel/sys.c | 6 ++++ > > 7 files changed, 111 insertions(+), 3 deletions(-) > > > > diff --git a/arch/riscv/include/asm/mmu.h b/arch/riscv/include/asm/mmu.h > > index 355504b37f8e..60be458e94da 100644 > > --- a/arch/riscv/include/asm/mmu.h > > +++ b/arch/riscv/include/asm/mmu.h > > @@ -19,6 +19,8 @@ typedef struct { > > #ifdef CONFIG_SMP > > /* A local icache flush is needed before user execution can resume. */ > > cpumask_t icache_stale_mask; > > + /* Force local icache flush on all migrations. */ > > + bool force_icache_flush; > > #endif > > #ifdef CONFIG_BINFMT_ELF_FDPIC > > unsigned long exec_fdpic_loadmap; > > diff --git a/arch/riscv/include/asm/processor.h b/arch/riscv/include/asm/processor.h > > index a8509cc31ab2..816cdc2395f4 100644 > > --- a/arch/riscv/include/asm/processor.h > > +++ b/arch/riscv/include/asm/processor.h > > @@ -123,6 +123,10 @@ struct thread_struct { > > struct __riscv_v_ext_state vstate; > > unsigned long align_ctl; > > struct __riscv_v_ext_state kernel_vstate; > > +#ifdef CONFIG_SMP > > + bool force_icache_flush; > > + unsigned int prev_cpu; > > +#endif > > }; > > > > /* Whitelist the fstate from the task_struct for hardened usercopy */ > > @@ -184,6 +188,9 @@ extern int set_unalign_ctl(struct task_struct *tsk, unsigned int val); > > #define GET_UNALIGN_CTL(tsk, addr) get_unalign_ctl((tsk), (addr)) > > #define SET_UNALIGN_CTL(tsk, val) set_unalign_ctl((tsk), (val)) > > > > +#define RISCV_SET_ICACHE_FLUSH_CTX(arg1, arg2) riscv_set_icache_flush_ctx(arg1, arg2) > > +extern int riscv_set_icache_flush_ctx(unsigned long ctx, unsigned long per_thread); > > + > > #endif /* __ASSEMBLY__ */ > > > > #endif /* _ASM_RISCV_PROCESSOR_H */ > > diff --git a/arch/riscv/include/asm/switch_to.h b/arch/riscv/include/asm/switch_to.h > > index 7efdb0584d47..ac99ab64499c 100644 > > --- a/arch/riscv/include/asm/switch_to.h > > +++ b/arch/riscv/include/asm/switch_to.h > > @@ -8,6 +8,7 @@ > > > > #include > > #include > > +#include > > #include > > #include > > #include > > @@ -72,14 +73,26 @@ static __always_inline bool has_fpu(void) { return false; } > > extern struct task_struct *__switch_to(struct task_struct *, > > struct task_struct *); > > > > +static inline bool switch_to_should_flush_icache(struct task_struct *task) > > +{ > > + bool stale_mm = task->mm && (task->mm->context.force_icache_flush); > > No parentheses needed here. > > > + bool stale_thread = task->thread.force_icache_flush; > > + bool thread_migrated = smp_processor_id() != task->thread.prev_cpu; > > This fails to compile when SMP is disabled: > > In file included from arch/riscv/kernel/ptrace.c:14: > ./arch/riscv/include/asm/switch_to.h:78:49: error: no member named > 'force_icache_flush' in 'mm_context_t' > bool stale_mm = task->mm && (task->mm->context.force_icache_flush); > ~~~~~~~~~~~~~~~~~ ^ > ./arch/riscv/include/asm/switch_to.h:79:35: error: no member named > 'force_icache_flush' in 'struct thread_struct' > bool stale_thread = task->thread.force_icache_flush; > ~~~~~~~~~~~~ ^ > ./arch/riscv/include/asm/switch_to.h:80:60: error: no member named 'prev_cpu' in > 'struct thread_struct' > bool thread_migrated = smp_processor_id() != task->thread.prev_cpu; > ~~~~~~~~~~~~ ^ > CC arch/riscv/kernel/sys_hwprobe.o > > > + > > + return thread_migrated && (stale_mm || stale_thread); > > +} > > + > > #define switch_to(prev, next, last) \ > > do { \ > > struct task_struct *__prev = (prev); \ > > struct task_struct *__next = (next); \ > > + __next->thread.prev_cpu = smp_processor_id(); \ > > Shouldn't this instead update __prev (the task being scheduled out)? Hmm, yes that makes sense. I shouldn't have moved this to above the switch_to_should_flush_icache call. If this is after switch_to_should_flush_icache, then setting __prev or __next will have the same effect but __prev probably makes more sense. > > > if (has_fpu()) \ > > __switch_to_fpu(__prev, __next); \ > > if (has_vector()) \ > > __switch_to_vector(__prev, __next); \ > > + if (switch_to_should_flush_icache(__next)) \ > > + local_flush_icache_all(); \ > > ((last) = __switch_to(__prev, __next)); \ > > } while (0) > > > > diff --git a/arch/riscv/mm/cacheflush.c b/arch/riscv/mm/cacheflush.c > > index 55a34f2020a8..2d5e1575f6c1 100644 > > --- a/arch/riscv/mm/cacheflush.c > > +++ b/arch/riscv/mm/cacheflush.c > > @@ -5,6 +5,7 @@ > > > > #include > > #include > > +#include > > #include > > #include > > > > @@ -152,3 +153,69 @@ void __init riscv_init_cbo_blocksizes(void) > > if (cboz_block_size) > > riscv_cboz_block_size = cboz_block_size; > > } > > + > > +/** > > + * riscv_set_icache_flush_ctx() - Enable/disable icache flushing instructions in > > + * userspace. > > + * @ctx: Set the type of icache flushing instructions permitted/prohibited in > > + * userspace. Supported values described below. > > + * > > + * Supported values for ctx: > > + * > > + * * %PR_RISCV_CTX_SW_FENCEI_ON: Allow fence.i in userspace. > > + * > > + * * %PR_RISCV_CTX_SW_FENCEI_OFF: Disallow fence.i in userspace. All threads in > > + * a process will be affected when ``scope == PR_RISCV_SCOPE_PER_PROCESS``. > > + * Therefore, caution must be taken -- only use this flag when you can > > + * guarantee that no thread in the process will emit fence.i from this point > > + * onward. > > + * > > + * @scope: Set scope of where icache flushing instructions are allowed to be > > + * emitted. Supported values described below. > > + * > > + * Supported values for scope: > > + * > > + * * %PR_RISCV_SCOPE_PER_PROCESS: Ensure the icache of any thread in this process > > + * is coherent with instruction storage upon > > + * migration. > > + * > > + * * %PR_RISCV_SCOPE_PER_THREAD: Ensure the icache of the current thread is > > + * coherent with instruction storage upon > > + * migration. > > + * > > + * When ``scope == PR_RISCV_SCOPE_PER_PROCESS``, all threads in the process are > > + * permitted to emit icache flushing instructions. Whenever any thread in the > > + * process is migrated, the corresponding hart's icache will be guaranteed to be > > + * consistent with instruction storage. Note this does not enforce any > > + * guarantees outside of migration. If a thread modifies an instruction that > > + * another thread may attempt to execute, the other thread must still emit an > > + * icache flushing instruction before attempting to execute the potentially > > + * modified instruction. This must be performed by the userspace program. > > + * > > + * In per-thread context (eg. ``scope == PR_RISCV_SCOPE_PER_THREAD``), only the > > + * thread calling this function is permitted to emit icache flushing > > + * instructions. When the thread is migrated, the corresponding hart's icache > > + * will be guaranteed to be consistent with instruction storage. > > + * > > + * On kernels configured without SMP, this function is a nop as migrations > > + * across harts will not occur. > > + */ > > +int riscv_set_icache_flush_ctx(unsigned long ctx, unsigned long scope) > > +{ > > +#ifdef CONFIG_SMP > > + switch (ctx) { > > + case PR_RISCV_CTX_SW_FENCEI_ON: > > + switch (scope) { > > + case PR_RISCV_SCOPE_PER_PROCESS: > > + current->mm->context.force_icache_flush = true; > > + break; > > + case PR_RISCV_SCOPE_PER_THREAD: > > + current->thread.force_icache_flush = true; > > + break; > > + default: > > + return -EINVAL; > > + } > > At some point you dropped the implementation for PR_RISCV_CTX_SW_FENCEI_OFF. > It's still documented, so I don't think that was intentional. > Yikes! > Also, PR_RISCV_CTX_SW_FENCEI_OFF needs to mark the icache on all other CPUs as > stale, as in flush_icache_mm(). Consider the following sequence: > 1. Migrate from CPU A to CPU B > 2. CMODX on CPU B > 3. fence.i in userspace on CPU B > 4. prctl(PR_RISCV_CTX_SW_FENCEI_OFF) on CPU B > 5. Migrate back to CPU A -- force_icache_flush is false, no flush happens > 6. Execute the modified code -- fails, because CPU A's I$ never got flushed > Oh good catch, thank you. > > + } > > +#endif > > + return 0; > > This makes the prtcl() call silently succeed for invalid ctx values, whereas it > should fail for those instead. > > Regards, > Samuel > > > +} > > diff --git a/arch/riscv/mm/context.c b/arch/riscv/mm/context.c > > index 217fd4de6134..5cabbc449080 100644 > > --- a/arch/riscv/mm/context.c > > +++ b/arch/riscv/mm/context.c > > @@ -15,6 +15,7 @@ > > #include > > #include > > #include > > +#include > > > > #ifdef CONFIG_MMU > > > > @@ -297,7 +298,8 @@ static inline void set_mm(struct mm_struct *prev, > > * > > * The "cpu" argument must be the current local CPU number. > > */ > > -static inline void flush_icache_deferred(struct mm_struct *mm, unsigned int cpu) > > +static inline void flush_icache_deferred(struct mm_struct *mm, unsigned int cpu, > > + struct task_struct *task) > > { > > #ifdef CONFIG_SMP > > cpumask_t *mask = &mm->context.icache_stale_mask; > > @@ -309,7 +311,12 @@ static inline void flush_icache_deferred(struct mm_struct *mm, unsigned int cpu) > > * This pairs with a barrier in flush_icache_mm. > > */ > > smp_mb(); > > - local_flush_icache_all(); > > + > > + /* > > + * If cache will be flushed in switch_to, no need to flush here. > > + */ > > + if (!(task && switch_to_should_flush_icache(task))) > > + local_flush_icache_all(); > > } > > > > #endif > > @@ -332,5 +339,5 @@ void switch_mm(struct mm_struct *prev, struct mm_struct *next, > > > > set_mm(prev, next, cpu); > > > > - flush_icache_deferred(next, cpu); > > + flush_icache_deferred(next, cpu, task); > > } > > diff --git a/include/uapi/linux/prctl.h b/include/uapi/linux/prctl.h > > index 370ed14b1ae0..524d546d697b 100644 > > --- a/include/uapi/linux/prctl.h > > +++ b/include/uapi/linux/prctl.h > > @@ -306,4 +306,10 @@ struct prctl_mm_map { > > # define PR_RISCV_V_VSTATE_CTRL_NEXT_MASK 0xc > > # define PR_RISCV_V_VSTATE_CTRL_MASK 0x1f > > > > +#define PR_RISCV_SET_ICACHE_FLUSH_CTX 71 > > +# define PR_RISCV_CTX_SW_FENCEI_ON 0 > > +# define PR_RISCV_CTX_SW_FENCEI_OFF 1 > > +# define PR_RISCV_SCOPE_PER_PROCESS 0 > > +# define PR_RISCV_SCOPE_PER_THREAD 1 > > + > > #endif /* _LINUX_PRCTL_H */ > > diff --git a/kernel/sys.c b/kernel/sys.c > > index e219fcfa112d..69afdd8b430f 100644 > > --- a/kernel/sys.c > > +++ b/kernel/sys.c > > @@ -146,6 +146,9 @@ > > #ifndef RISCV_V_GET_CONTROL > > # define RISCV_V_GET_CONTROL() (-EINVAL) > > #endif > > +#ifndef RISCV_SET_ICACHE_FLUSH_CTX > > +# define RISCV_SET_ICACHE_FLUSH_CTX(a, b) (-EINVAL) > > +#endif > > > > /* > > * this is where the system-wide overflow UID and GID are defined, for > > @@ -2743,6 +2746,9 @@ SYSCALL_DEFINE5(prctl, int, option, unsigned long, arg2, unsigned long, arg3, > > case PR_RISCV_V_GET_CONTROL: > > error = RISCV_V_GET_CONTROL(); > > break; > > + case PR_RISCV_SET_ICACHE_FLUSH_CTX: > > + error = RISCV_SET_ICACHE_FLUSH_CTX(arg2, arg3); > > + break; > > default: > > error = -EINVAL; > > break; > > > I will send out a new verson. - Charlie