From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.8 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C0957C388F7 for ; Fri, 13 Nov 2020 12:51:19 +0000 (UTC) Received: from merlin.infradead.org (merlin.infradead.org [205.233.59.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 51D03206D9 for ; Fri, 13 Nov 2020 12:51:19 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="UUcaiE0L" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 51D03206D9 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=arm.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:MIME-Version:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:Message-Id:Date:Subject:To:From:Reply-To:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:In-Reply-To:References:List-Owner; bh=3dHrwV4NSrBOis2ZgMaoHMakwmoGYmcvpmr7VU6FBOI=; b=UUcaiE0LTRCDDShYZ0zgWhsTX4 DamtLc1ny7VRp1v5cwnqtgsjUGcd14HJ3P8uiAodsDnv1uqCdfiCez/QTAosGhnihz9qf7hJhjWoK SZor5e8u+AG2It5KxZM9PTLSfu0qp2i/G6FqSYJPsC4zh8N/suOOf6w+Zb2uuExevpsewHEKNmP5R NQxCyEOTQIKSr4NGScVpihPj6ni8mcz/jflIzm597/4ihV/hZYxSYL74l+BfoH6KbmrLCj5/EBs2O wATlhLUJx/aUo8NOLgYXoX9nzdDsgP3pVVMr/8udgvZ7JFcSWyDBtvcCsC3rO6uQFPbfPOr5xoOM9 QPZl6CSQ==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1kdYWS-0006Ak-EM; Fri, 13 Nov 2020 12:49:48 +0000 Received: from foss.arm.com ([217.140.110.172]) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1kdYWP-00069v-U7 for linux-arm-kernel@lists.infradead.org; Fri, 13 Nov 2020 12:49:46 +0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 4661D142F; Fri, 13 Nov 2020 04:49:43 -0800 (PST) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 45FE73F6CF; Fri, 13 Nov 2020 04:49:42 -0800 (PST) From: Mark Rutland To: linux-arm-kernel@lists.infradead.org, catalin.marinas@arm.com, will@kernel.org Subject: [PATCHv4 00/17] arm64: remove set_fs() and friends Date: Fri, 13 Nov 2020 12:49:20 +0000 Message-Id: <20201113124937.20574-1-mark.rutland@arm.com> X-Mailer: git-send-email 2.11.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20201113_074946_083149_0800F0F8 X-CRM114-Status: GOOD ( 13.26 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: mark.rutland@arm.com, robin.murphy@arm.com, james.morse@arm.com, hch@lst.de MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Building atop Christoph's core rework now in v5.10-rc1, this series removes set_fs() from arm64. The series can be found in arm64/set_fs-removal branch [1]. Since v1 [2]: * Remove redundant kthread init code * Remove vestigal bit left by v1 * Rework SDEI entry * Comment head.S better * Fix commit message typos Since v2 [3]: * Rebase to v5.10-rc1 * Handle new MTE uaccess asm * Fix trivial conflict with spectre mitigation rework * Cleanup commit messages Since v3 [4]: * Rebase to v5.10-rc3 (trivial) * Fix __get_kernel_nofault / __put_kernel_nofault error handling * Fix include in mte asm * Fix which patches change includes * Fix typos I've given v4 light boot + userspace testing. As v2 had seen some light testing with LTP (both native and compat), and Syzkaller (native only) I'm not expecting any major issues, but I will be giving this some extended soak testing just in case. Catalin, Will, I'd like to get this into next ASAP so that it can soak for a while. There is a trivial conflict with for-next/lto that git doesn't seem smart enough to resolve automatically despite our attempts to make this easy. The right thing to do is take Will's version of asm/alternative.h (which deletes the macros that got moved elsewhere), and my version of asm/asm-uaccess.h (which leaves the trivial ldtr/sttr helpers). Thanks, Mark. [1] git://git.kernel.org/pub/scm/linux/kernel/git/mark/linux.git arm64/set_fs-removal [2] https://lore/kernel.org/r/20200925160722.27155-1-mark.rutland@arm.com [3] https://lore/kernel.org/r/20201006144642.12195-1-mark.rutland@arm.com [4] https://lore/kernel.org/r/20201026133156.44186-1-mark.rutland@arm.com Mark Rutland (17): arm64: ensure ERET from kthread is illegal arm64: add C wrappers for SET_PSTATE_*() arm64: head.S: rename el2_setup -> init_kernel_el arm64: head.S: cleanup SCTLR_ELx initialization arm64: head.S: always initialize PSTATE arm64: sdei: move uaccess logic to arch/arm64/ arm64: sdei: explicitly simulate PAN/UAO entry arm64: uaccess: move uao_* alternatives to asm-uaccess.h arm64: uaccess: rename privileged uaccess routines arm64: uaccess: simplify __copy_user_flushcache() arm64: uaccess: refactor __{get,put}_user arm64: uaccess: split user/kernel routines arm64: uaccess cleanup macro naming arm64: uaccess: remove set_fs() arm64: uaccess: remove addr_limit_user_check() arm64: uaccess: remove redundant PAN toggling arm64: uaccess: remove vestigal UAO support arch/arm64/Kconfig | 22 ----- arch/arm64/include/asm/alternative.h | 59 ------------ arch/arm64/include/asm/asm-uaccess.h | 29 ++++++ arch/arm64/include/asm/cpucaps.h | 2 - arch/arm64/include/asm/cpufeature.h | 22 ++++- arch/arm64/include/asm/exec.h | 1 - arch/arm64/include/asm/futex.h | 8 +- arch/arm64/include/asm/processor.h | 4 +- arch/arm64/include/asm/ptrace.h | 8 +- arch/arm64/include/asm/sysreg.h | 22 +++-- arch/arm64/include/asm/thread_info.h | 10 +- arch/arm64/include/asm/uaccess.h | 174 +++++++++++++++-------------------- arch/arm64/kernel/armv8_deprecated.c | 4 +- arch/arm64/kernel/asm-offsets.c | 3 +- arch/arm64/kernel/cpufeature.c | 34 +------ arch/arm64/kernel/entry.S | 19 +--- arch/arm64/kernel/head.S | 51 ++++++---- arch/arm64/kernel/process.c | 29 ++---- arch/arm64/kernel/proton-pack.c | 4 +- arch/arm64/kernel/sdei.c | 22 +++-- arch/arm64/kernel/signal.c | 3 - arch/arm64/kernel/sleep.S | 2 +- arch/arm64/kernel/suspend.c | 1 - arch/arm64/lib/clear_user.S | 8 +- arch/arm64/lib/copy_from_user.S | 8 +- arch/arm64/lib/copy_in_user.S | 16 ++-- arch/arm64/lib/copy_to_user.S | 8 +- arch/arm64/lib/mte.S | 6 +- arch/arm64/lib/uaccess_flushcache.c | 4 +- arch/arm64/mm/fault.c | 5 - arch/arm64/mm/proc.S | 2 +- drivers/firmware/arm_sdei.c | 14 --- 32 files changed, 242 insertions(+), 362 deletions(-) -- 2.11.0 _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel