Received: by 2002:ab2:710b:0:b0:1ef:a325:1205 with SMTP id z11csp1237509lql; Tue, 12 Mar 2024 11:00:56 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXd1QX/5VaXu1Lm6iGRxGJ4iHL0U4TEfK63345Qc5GsgVRg9M6S4V5KrfJhJR7cXyHnw4JNrHuO9f5tFfAmOt3fHgY2JWcQC3C+KFPxoQ== X-Google-Smtp-Source: AGHT+IEmdWskO/y8YuvVOTL8Uz3+NJm/8D3zZXbunegX4DYEVee1yLSKyNFWV8Q+3CMFCf3LJKjJ X-Received: by 2002:ac8:5f95:0:b0:42e:fcbd:d77a with SMTP id j21-20020ac85f95000000b0042efcbdd77amr13795132qta.22.1710266456059; Tue, 12 Mar 2024 11:00:56 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1710266456; cv=pass; d=google.com; s=arc-20160816; b=nYPHek8i3Oi5Y+o+V/rQhysZthVB1njamuJBKtkvxn2iD3HQA/xZMHaza01i7b1ten cODns1o8BxB06VTBLBzztVMqoINwYZAd8Clue0Yd0kZZPzaPQhG9hesWcrpm9PLogHms AaciglXS5RdtuWXj37xSd0+8jeOFYZzUfCZyxU0aYVl83YDk/Lk2YmDwOM7/GLv23cGt 0/mmqIZsCvNRLyzuyjZQcDLpyOEAWKlpA9IXij2Rzd2Lktly3o5qYkjTmk6gQy+gOF4D vogyZlmCBQbsKmgHu/wKHRCfaxUIreSolJjw+mZ2M8xd/Bat1AV+aNFPZwRh/ZtTzW+4 mZ/w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id:dkim-signature; bh=B8Wu/qrt+W2x49NppYSvgAqRWl6mCiZvCoTY1WpnFu8=; fh=gNomaQ9u3kbr7cs8qBI9E87zISMyOvZvq/MXmxoWHH0=; b=ftIF0VKSHAQyDvjRfnVTsR+Q2SbFAQMlAlhJGuk8XezM92x7T95GcBLb0/ZUEP4yrH DIS10Fxf42RMXHnfM1yNn5GKPSoW+izQ3nwF+7NPGD1F46H/4ASi4ovXzKQX7Rkx32sb /df5uMR1p0YwLTVYJ2WR9AFOHn5Gcv+k/8oolUdB/SrHZXJNwioVXaAaFrrRp2NPskPV +e8OC1TuFeeOcY/QgGhWy6f4dwBDvkBUeCMbGwDL5gPAKjqkTGZ/rgHVg66yT0lZe9l4 XuMFapq4nHfSN/qxFyzTN3Mxft+KkeUNXzQjhdtWDD6DiPws8m3IDMVk6LFvjyuZRzst 49TQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@sifive.com header.s=google header.b="bZz/n38Y"; arc=pass (i=1 spf=pass spfdomain=sifive.com dkim=pass dkdomain=sifive.com dmarc=pass fromdomain=sifive.com); spf=pass (google.com: domain of linux-kernel+bounces-100623-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-100623-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=sifive.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id c14-20020a05622a058e00b0042eee469474si7861459qtb.109.2024.03.12.11.00.55 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Mar 2024 11:00:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-100623-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@sifive.com header.s=google header.b="bZz/n38Y"; arc=pass (i=1 spf=pass spfdomain=sifive.com dkim=pass dkdomain=sifive.com dmarc=pass fromdomain=sifive.com); spf=pass (google.com: domain of linux-kernel+bounces-100623-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-100623-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=sifive.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id B14831C21DEE for ; Tue, 12 Mar 2024 18:00:55 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 751B71386D1; Tue, 12 Mar 2024 18:00:50 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=sifive.com header.i=@sifive.com header.b="bZz/n38Y" Received: from mail-oo1-f47.google.com (mail-oo1-f47.google.com [209.85.161.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3EE021386C1 for ; Tue, 12 Mar 2024 18:00:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.161.47 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710266449; cv=none; b=R6/LXHNdxq/SBRiREFF0GpOFUjwey76npiodJLptKPxZRtQkcePAicTXe/z3yxhYcnpbB5X6XLs8B53FUib6zwYIQ+HuCPBpSB+aGi0v8YdP/8PoFTJ9CKay5caYroKiePH/s0rOMLSx5EenSxRCVtp9QdDfXNTfysynaObs82I= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710266449; c=relaxed/simple; bh=bQ2GQ6bH9vSaoc4PfYAHwZGEEopsAK98Z/vaU5zQ0r8=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=Jdq2K2ywUNSl4jem60gZ2ltUTE1+8WeSml1WHQ/9RhNHOOOdu7h56gO3HQMTyM2bTWiNRRYhRYs5pIg3LK+lTuLDZ48STEGjZ8bpz2b1JE0cM2HhF30KSCEGcLY4qbf/bLWei9rfZXVWuTuloLeOgHq4irGpCXzvKTlYkNmHJVc= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=sifive.com; spf=pass smtp.mailfrom=sifive.com; dkim=pass (2048-bit key) header.d=sifive.com header.i=@sifive.com header.b=bZz/n38Y; arc=none smtp.client-ip=209.85.161.47 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=sifive.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=sifive.com Received: by mail-oo1-f47.google.com with SMTP id 006d021491bc7-5a222daa741so516271eaf.3 for ; Tue, 12 Mar 2024 11:00:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sifive.com; s=google; t=1710266446; x=1710871246; darn=vger.kernel.org; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=B8Wu/qrt+W2x49NppYSvgAqRWl6mCiZvCoTY1WpnFu8=; b=bZz/n38Y7yeGZ4Bor6wu5wl8hx1qJ3UtZfPDOkAT+E3JBubgmi5Uir3J63HaOc6YXj ZNLF0k4nzmA0wQeJ+s1TMmQ2pZ1YZeYZzY8tkaKrbc88tXIo9wk5cu01h4JQ50qn4nJP 6I+7/r3qys3a+AmpINfR3yDtVGOXVqkWaRcfNqpQJAd1E037Vz5rSAgRPZLbHHXHoVkc HK5+ZEdSRbikSw1D8lhLccjt1P9HvAxSMQFcUrW0buccFN0FzuBGPLeiL1I4odApjfVE uFNMSVup2+h0t2rumWj5iFC84HfMOOx7wVw5loq3BguC2k3mJGPUgtYAYv9C93TdXbO6 b0Gg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1710266446; x=1710871246; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=B8Wu/qrt+W2x49NppYSvgAqRWl6mCiZvCoTY1WpnFu8=; b=UAN26bLkb8RMk2M9qPJzmi+OUXvRW2TsQ1gd4AKrS6G8tY2KHZdcOFO9Mb1ScDBpb7 6HHKWzmrYuJsM/iXdv/abrEieU1DO6oeUs4feoLgyn08xMFAHK+6C8TJ14tbJIZb0r8v WqYVwqY1NLN8lDHcBBhvJp+E1EnPYjrXXNEbI3cXRjgbWwYo5cHqqpJBbmzxvo2oFYWr ibx+qa2CVZwj7pmMuEFfycPotxV5gwWnRfgvNI9JS0gIMUGMAs4Iz3ZKfrNxgF+yd839 JwksJpzU5feeDWlXiMTCwYbzGpbIJBXeLo6pkjtDUh0vnrfy3n7QRQupz+PyalSMkdLq lv5g== X-Forwarded-Encrypted: i=1; AJvYcCWpbhkPeMyS5wioa9ZEw2mvu6sgQsLx/AKZa5pq7QqHPQ9jIq3Cju4HRbiqQnevEesIebMehwf344I6sJYZBqCkJU5NEYKNpPy5sM0P X-Gm-Message-State: AOJu0Yw5sguFP6zaP5NrMDIs4WMVJi+M/VLjXvYqKDp2IMtNLiRM2+UZ e1YJ1G/HRvLaGs0+Mzt/KcJP5tBs/fTDUAZVds1bdt380dGmioReBVxThlGYqkU= X-Received: by 2002:a05:6870:1592:b0:221:ca43:604e with SMTP id j18-20020a056870159200b00221ca43604emr9052108oab.53.1710266445557; Tue, 12 Mar 2024 11:00:45 -0700 (PDT) Received: from [100.64.0.1] ([170.85.8.176]) by smtp.gmail.com with ESMTPSA id br42-20020a05620a462a00b0078852df9615sm3887166qkb.120.2024.03.12.11.00.44 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 12 Mar 2024 11:00:45 -0700 (PDT) Message-ID: <6cf4cb6b-86af-48c5-9301-de2499048240@sifive.com> Date: Tue, 12 Mar 2024 13:00:43 -0500 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v11 2/4] riscv: Include riscv_set_icache_flush_ctx prctl Content-Language: en-US To: Charlie Jenkins Cc: linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, Atish Patra , Alexandre Ghiti , Paul Walmsley , Palmer Dabbelt , Albert Ou , Jonathan Corbet , Conor Dooley , =?UTF-8?B?Q2zDqW1lbnQgTMOpZ2Vy?= , Atish Patra , Randy Dunlap , Alexandre Ghiti References: <20240212-fencei-v11-0-e1327f25fe10@rivosinc.com> <20240212-fencei-v11-2-e1327f25fe10@rivosinc.com> From: Samuel Holland In-Reply-To: <20240212-fencei-v11-2-e1327f25fe10@rivosinc.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit On 2024-02-12 5:36 PM, Charlie Jenkins wrote: > Support new prctl with key PR_RISCV_SET_ICACHE_FLUSH_CTX to enable > optimization of cross modifying code. This prctl enables userspace code > to use icache flushing instructions such as fence.i with the guarantee > that the icache will continue to be clean after thread migration. > > Signed-off-by: Charlie Jenkins > Reviewed-by: Atish Patra > Reviewed-by: Alexandre Ghiti > --- > arch/riscv/include/asm/mmu.h | 2 + > arch/riscv/include/asm/processor.h | 12 +++++ > arch/riscv/include/asm/switch_to.h | 23 ++++++++ > arch/riscv/mm/cacheflush.c | 105 +++++++++++++++++++++++++++++++++++++ > arch/riscv/mm/context.c | 18 +++++-- > include/uapi/linux/prctl.h | 6 +++ > kernel/sys.c | 6 +++ > 7 files changed, 167 insertions(+), 5 deletions(-) > > diff --git a/arch/riscv/include/asm/mmu.h b/arch/riscv/include/asm/mmu.h > index 355504b37f8e..60be458e94da 100644 > --- a/arch/riscv/include/asm/mmu.h > +++ b/arch/riscv/include/asm/mmu.h > @@ -19,6 +19,8 @@ typedef struct { > #ifdef CONFIG_SMP > /* A local icache flush is needed before user execution can resume. */ > cpumask_t icache_stale_mask; > + /* Force local icache flush on all migrations. */ > + bool force_icache_flush; > #endif > #ifdef CONFIG_BINFMT_ELF_FDPIC > unsigned long exec_fdpic_loadmap; > diff --git a/arch/riscv/include/asm/processor.h b/arch/riscv/include/asm/processor.h > index a8509cc31ab2..46c5c3b91165 100644 > --- a/arch/riscv/include/asm/processor.h > +++ b/arch/riscv/include/asm/processor.h > @@ -69,6 +69,7 @@ > #endif > > #ifndef __ASSEMBLY__ > +#include > > struct task_struct; > struct pt_regs; > @@ -123,6 +124,14 @@ struct thread_struct { > struct __riscv_v_ext_state vstate; > unsigned long align_ctl; > struct __riscv_v_ext_state kernel_vstate; > +#ifdef CONFIG_SMP > + /* A local icache flush is needed before user execution can resume on one of these cpus. */ > + cpumask_t icache_stale_mask; > + /* Regardless of the icache_stale_mask, flush the icache on migration */ > + bool force_icache_flush; > + /* A forced icache flush is not needed if migrating to the previous cpu. */ > + unsigned int prev_cpu; > +#endif > }; > > /* Whitelist the fstate from the task_struct for hardened usercopy */ > @@ -184,6 +193,9 @@ extern int set_unalign_ctl(struct task_struct *tsk, unsigned int val); > #define GET_UNALIGN_CTL(tsk, addr) get_unalign_ctl((tsk), (addr)) > #define SET_UNALIGN_CTL(tsk, val) set_unalign_ctl((tsk), (val)) > > +#define RISCV_SET_ICACHE_FLUSH_CTX(arg1, arg2) riscv_set_icache_flush_ctx(arg1, arg2) > +extern int riscv_set_icache_flush_ctx(unsigned long ctx, unsigned long per_thread); > + > #endif /* __ASSEMBLY__ */ > > #endif /* _ASM_RISCV_PROCESSOR_H */ > diff --git a/arch/riscv/include/asm/switch_to.h b/arch/riscv/include/asm/switch_to.h > index 7efdb0584d47..7594df37cc9f 100644 > --- a/arch/riscv/include/asm/switch_to.h > +++ b/arch/riscv/include/asm/switch_to.h > @@ -8,6 +8,7 @@ > > #include > #include > +#include > #include > #include > #include > @@ -72,14 +73,36 @@ static __always_inline bool has_fpu(void) { return false; } > extern struct task_struct *__switch_to(struct task_struct *, > struct task_struct *); > > +static inline bool switch_to_should_flush_icache(struct task_struct *task) > +{ > +#ifdef CONFIG_SMP > + bool stale_mm = task->mm && task->mm->context.force_icache_flush; > + bool stale_thread = task->thread.force_icache_flush; > + bool thread_migrated = smp_processor_id() != task->thread.prev_cpu; > + > + return thread_migrated && (stale_mm || stale_thread); > +#else > + return false; > +#endif > +} > + > +#ifdef CONFIG_SMP > +#define __set_prev_cpu(thread) ((thread).prev_cpu = smp_processor_id()) > +#else > +#define __set_prev_cpu(thread) > +#endif > + > #define switch_to(prev, next, last) \ > do { \ > struct task_struct *__prev = (prev); \ > struct task_struct *__next = (next); \ > + __set_prev_cpu(__prev->thread); \ > if (has_fpu()) \ > __switch_to_fpu(__prev, __next); \ > if (has_vector()) \ > __switch_to_vector(__prev, __next); \ > + if (switch_to_should_flush_icache(__next)) \ > + local_flush_icache_all(); \ > ((last) = __switch_to(__prev, __next)); \ > } while (0) > > diff --git a/arch/riscv/mm/cacheflush.c b/arch/riscv/mm/cacheflush.c > index 55a34f2020a8..6513a0ab8655 100644 > --- a/arch/riscv/mm/cacheflush.c > +++ b/arch/riscv/mm/cacheflush.c > @@ -5,6 +5,7 @@ > > #include > #include > +#include > #include > #include > > @@ -152,3 +153,107 @@ void __init riscv_init_cbo_blocksizes(void) > if (cboz_block_size) > riscv_cboz_block_size = cboz_block_size; > } > + > +/** > + * riscv_set_icache_flush_ctx() - Enable/disable icache flushing instructions in > + * userspace. > + * @ctx: Set the type of icache flushing instructions permitted/prohibited in > + * userspace. Supported values described below. > + * > + * Supported values for ctx: > + * > + * * %PR_RISCV_CTX_SW_FENCEI_ON: Allow fence.i in user space. > + * > + * * %PR_RISCV_CTX_SW_FENCEI_OFF: Disallow fence.i in user space. All threads in > + * a process will be affected when ``scope == PR_RISCV_SCOPE_PER_PROCESS``. > + * Therefore, caution must be taken; use this flag only when you can guarantee > + * that no thread in the process will emit fence.i from this point onward. > + * > + * @scope: Set scope of where icache flushing instructions are allowed to be > + * emitted. Supported values described below. > + * > + * Supported values for scope: > + * > + * * %PR_RISCV_SCOPE_PER_PROCESS: Ensure the icache of any thread in this process > + * is coherent with instruction storage upon > + * migration. > + * > + * * %PR_RISCV_SCOPE_PER_THREAD: Ensure the icache of the current thread is > + * coherent with instruction storage upon > + * migration. > + * > + * When ``scope == PR_RISCV_SCOPE_PER_PROCESS``, all threads in the process are > + * permitted to emit icache flushing instructions. Whenever any thread in the > + * process is migrated, the corresponding hart's icache will be guaranteed to be > + * consistent with instruction storage. This does not enforce any guarantees > + * outside of migration. If a thread modifies an instruction that another thread > + * may attempt to execute, the other thread must still emit an icache flushing > + * instruction before attempting to execute the potentially modified > + * instruction. This must be performed by the user-space program. > + * > + * In per-thread context (eg. ``scope == PR_RISCV_SCOPE_PER_THREAD``) only the > + * thread calling this function is permitted to emit icache flushing > + * instructions. When the thread is migrated, the corresponding hart's icache > + * will be guaranteed to be consistent with instruction storage. > + * > + * On kernels configured without SMP, this function is a nop as migrations > + * across harts will not occur. > + */ > +int riscv_set_icache_flush_ctx(unsigned long ctx, unsigned long scope) > +{ > +#ifdef CONFIG_SMP > + switch (ctx) { > + case PR_RISCV_CTX_SW_FENCEI_ON: > + switch (scope) { > + case PR_RISCV_SCOPE_PER_PROCESS: > + current->mm->context.force_icache_flush = true; > + break; > + case PR_RISCV_SCOPE_PER_THREAD: > + current->thread.force_icache_flush = true; > + break; > + default: > + return -EINVAL; > + } > + break; > + case PR_RISCV_CTX_SW_FENCEI_OFF: > + cpumask_t *mask; > + > + switch (scope) { > + case PR_RISCV_SCOPE_PER_PROCESS: > + bool stale_cpu; > + > + current->mm->context.force_icache_flush = false; > + > + /* > + * Mark every other hart's icache as needing a flush for > + * this MM. Maintain the previous value of the current > + * cpu to handle the case when this function is called > + * concurrently on different harts. > + */ > + mask = ¤t->mm->context.icache_stale_mask; > + stale_cpu = cpumask_test_cpu(smp_processor_id(), mask); > + > + cpumask_setall(mask); > + assign_bit(cpumask_check(smp_processor_id()), cpumask_bits(mask), stale_cpu); > + break; > + case PR_RISCV_SCOPE_PER_THREAD: > + current->thread.force_icache_flush = false; > + > + /* > + * Mark every other hart's icache as needing a flush for > + * this thread. > + */ > + mask = ¤t->thread.icache_stale_mask; > + cpumask_setall(mask); > + cpumask_clear_cpu(smp_processor_id(), mask); I don't think we need to maintain another cpumask for every thread (and check it at every mm switch) just to optimize this prctl() call. PR_RISCV_CTX_SW_FENCEI_OFF is unlikely to be in anything's hot path. It should be sufficient for both scopes to just do: cpumask_setall(¤t->mm->context.icache_stale_mask); and accept the extra one-time icache flushes. Otherwise this looks good to me. Regards, Samuel > + break; > + default: > + return -EINVAL; > + } > + break; > + default: > + return -EINVAL; > + } > +#endif > + return 0; > +} > diff --git a/arch/riscv/mm/context.c b/arch/riscv/mm/context.c > index 217fd4de6134..2eb13b89cced 100644 > --- a/arch/riscv/mm/context.c > +++ b/arch/riscv/mm/context.c > @@ -15,6 +15,7 @@ > #include > #include > #include > +#include > > #ifdef CONFIG_MMU > > @@ -297,21 +298,28 @@ static inline void set_mm(struct mm_struct *prev, > * > * The "cpu" argument must be the current local CPU number. > */ > -static inline void flush_icache_deferred(struct mm_struct *mm, unsigned int cpu) > +static inline void flush_icache_deferred(struct mm_struct *mm, unsigned int cpu, > + struct task_struct *task) > { > #ifdef CONFIG_SMP > cpumask_t *mask = &mm->context.icache_stale_mask; > > - if (cpumask_test_cpu(cpu, mask)) { > + if (cpumask_test_and_clear_cpu(cpu, mask) || > + (task && cpumask_test_and_clear_cpu(cpu, &task->thread.icache_stale_mask))) { > cpumask_clear_cpu(cpu, mask); > + > /* > * Ensure the remote hart's writes are visible to this hart. > * This pairs with a barrier in flush_icache_mm. > */ > smp_mb(); > - local_flush_icache_all(); > - } > > + /* > + * If cache will be flushed in switch_to, no need to flush here. > + */ > + if (!(task && switch_to_should_flush_icache(task))) > + local_flush_icache_all(); > + } > #endif > } > > @@ -332,5 +340,5 @@ void switch_mm(struct mm_struct *prev, struct mm_struct *next, > > set_mm(prev, next, cpu); > > - flush_icache_deferred(next, cpu); > + flush_icache_deferred(next, cpu, task); > } > diff --git a/include/uapi/linux/prctl.h b/include/uapi/linux/prctl.h > index 370ed14b1ae0..524d546d697b 100644 > --- a/include/uapi/linux/prctl.h > +++ b/include/uapi/linux/prctl.h > @@ -306,4 +306,10 @@ struct prctl_mm_map { > # define PR_RISCV_V_VSTATE_CTRL_NEXT_MASK 0xc > # define PR_RISCV_V_VSTATE_CTRL_MASK 0x1f > > +#define PR_RISCV_SET_ICACHE_FLUSH_CTX 71 > +# define PR_RISCV_CTX_SW_FENCEI_ON 0 > +# define PR_RISCV_CTX_SW_FENCEI_OFF 1 > +# define PR_RISCV_SCOPE_PER_PROCESS 0 > +# define PR_RISCV_SCOPE_PER_THREAD 1 > + > #endif /* _LINUX_PRCTL_H */ > diff --git a/kernel/sys.c b/kernel/sys.c > index e219fcfa112d..69afdd8b430f 100644 > --- a/kernel/sys.c > +++ b/kernel/sys.c > @@ -146,6 +146,9 @@ > #ifndef RISCV_V_GET_CONTROL > # define RISCV_V_GET_CONTROL() (-EINVAL) > #endif > +#ifndef RISCV_SET_ICACHE_FLUSH_CTX > +# define RISCV_SET_ICACHE_FLUSH_CTX(a, b) (-EINVAL) > +#endif > > /* > * this is where the system-wide overflow UID and GID are defined, for > @@ -2743,6 +2746,9 @@ SYSCALL_DEFINE5(prctl, int, option, unsigned long, arg2, unsigned long, arg3, > case PR_RISCV_V_GET_CONTROL: > error = RISCV_V_GET_CONTROL(); > break; > + case PR_RISCV_SET_ICACHE_FLUSH_CTX: > + error = RISCV_SET_ICACHE_FLUSH_CTX(arg2, arg3); > + break; > default: > error = -EINVAL; > break; >