From patchwork Thu Oct 10 17:15:16 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Suzuki K Poulose X-Patchwork-Id: 175792 Delivered-To: patch@linaro.org Received: by 2002:ac9:3c86:0:0:0:0:0 with SMTP id w6csp2583205ocf; Thu, 10 Oct 2019 10:15:42 -0700 (PDT) X-Google-Smtp-Source: APXvYqwgS1VBG0A4NCXDuOXjfdFntinzrWHTH4Lc5AQ26euBTbcfwP4U6D+1galozTH9bAQiYhd7 X-Received: by 2002:a17:906:4748:: with SMTP id j8mr9410362ejs.210.1570727742080; Thu, 10 Oct 2019 10:15:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570727742; cv=none; d=google.com; s=arc-20160816; b=D4P1Yf1wfNR73wp0yTCtceV8sTZYPdpgMXSZvLubTE9mfKgo46JojDdUhkN28Xu34Y cl67fErPwOZhqBESQpejgL9JHm0XO5OlIt7AlTe7aItAGJf84mr/6sYQLhKsVmWsYYsC wb7RqVPt3RDV1FRgbD7L3ZUncapmQvRxKR3VOICoRNck7EQmoXbXtYxG+BC9vHPfgRw7 6pU5x8JqTNoWUcWjkdNy5U2GUwYT2/xKatlW1O9x/HTXrL1kc0hH1z2HB1OuHB1V8ReA /auGBD+InhO/p6LPsSD++LGXyJaUVFp8QHTmlJtBGk5RthUYGz271wCPgE2juLkuNeKz Vi6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=+rM4zS/Onf5YiA3s+mqs5kRYJU1pQ4FreUmTpVyJX3U=; b=i+nBQMbN09U5MQ67g8OxSt6kHNZ+WQLfhGRbWm0WBP5S2J00juEC5FffjTe34QbHIZ QPQ/+kAJDU0yYOz1l0X1SNmJ4+novCCEOSIiij108UhFrz9eXSysaFZpJJr+c6Wd4tjI TwV0S1KNVLbcy6OV+lychXkJ/p9aVANATA0O6yWA51R9O8WNnx3a3uXJGupq6Tk1oT9C QPIQi/u2cSwE8/twKhal/835nfMoAnQwL3MLcJLlTBuTQk3YnMKBpjqCBvOQ2g07D15a D6eUtpHa/PDj49Cb5BYgBvwwWaU3kEVwOz/jt2wzgV+YwbTpT0hOSCugfkxzXpHj1Ssm Io3w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z26si3421168ejw.359.2019.10.10.10.15.41; Thu, 10 Oct 2019 10:15:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726824AbfJJRPj (ORCPT + 21 others); Thu, 10 Oct 2019 13:15:39 -0400 Received: from foss.arm.com ([217.140.110.172]:36356 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726796AbfJJRPh (ORCPT ); Thu, 10 Oct 2019 13:15:37 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id AC89C1570; Thu, 10 Oct 2019 10:15:36 -0700 (PDT) Received: from dawn-kernel.cambridge.arm.com (unknown [10.1.197.116]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id AA6B13F71A; Thu, 10 Oct 2019 10:15:35 -0700 (PDT) From: Suzuki K Poulose To: linux-arm-kernel@lists.infradead.org Cc: linux-kernel@vger.kernel.org, will@kernel.org, mark.rutland@arm.com, catalin.marinas@arm.com, dave.martin@arm.com, Suzuki K Poulose Subject: [PATCH 2/3] arm64: nofpsmid: Clear TIF_FOREIGN_FPSTATE flag for early tasks Date: Thu, 10 Oct 2019 18:15:16 +0100 Message-Id: <20191010171517.28782-3-suzuki.poulose@arm.com> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20191010171517.28782-1-suzuki.poulose@arm.com> References: <20191010171517.28782-1-suzuki.poulose@arm.com> MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We detect the absence of FP/SIMD after we boot the SMP CPUs, and by then we have kernel threads running already with TIF_FOREIGN_FPSTATE set which could be inherited by early userspace applications (e.g, modprobe triggered from initramfs). This could end up in the applications stuck in do_nofity_resume() as we never clear the TIF flag, once we now know that we don't support FP. Fix this by making sure that we clear the TIF_FOREIGN_FPSTATE flag for tasks which may have them set, as we would have done in the normal case, but avoiding touching the hardware state (since we don't support any). Fixes: 82e0191a1aa11abf ("arm64: Support systems without FP/ASIMD") Cc: Will Deacon Cc: Mark Rutland Cc: Catalin Marinas Signed-off-by: Suzuki K Poulose --- arch/arm64/kernel/fpsimd.c | 26 ++++++++++++++++---------- 1 file changed, 16 insertions(+), 10 deletions(-) -- 2.21.0 diff --git a/arch/arm64/kernel/fpsimd.c b/arch/arm64/kernel/fpsimd.c index 37d3912cfe06..dfcdd077aeca 100644 --- a/arch/arm64/kernel/fpsimd.c +++ b/arch/arm64/kernel/fpsimd.c @@ -1128,12 +1128,19 @@ void fpsimd_bind_state_to_cpu(struct user_fpsimd_state *st, void *sve_state, */ void fpsimd_restore_current_state(void) { - if (!system_supports_fpsimd()) - return; - get_cpu_fpsimd_context(); - - if (test_and_clear_thread_flag(TIF_FOREIGN_FPSTATE)) { + /* + * For the tasks that were created before we detected the absence of + * FP/SIMD, the TIF_FOREIGN_FPSTATE could be set via fpsimd_thread_switch() + * and/or could be inherited from the parent(init_task has this set). Even + * though userspace has not run yet, this could be inherited by the + * processes forked from one of those tasks (e.g, modprobe from initramfs). + * If the system doesn't support FP/SIMD, we must clear the flag for the + * tasks mentioned above, to indicate that the FPSTATE is clean (as we + * can't have one) to avoid looping for ever to clear the flag. + */ + if (test_and_clear_thread_flag(TIF_FOREIGN_FPSTATE) && + system_supports_fpsimd()) { task_fpsimd_load(); fpsimd_bind_task_to_cpu(); } @@ -1148,17 +1155,16 @@ void fpsimd_restore_current_state(void) */ void fpsimd_update_current_state(struct user_fpsimd_state const *state) { - if (!system_supports_fpsimd()) - return; - get_cpu_fpsimd_context(); current->thread.uw.fpsimd_state = *state; if (system_supports_sve() && test_thread_flag(TIF_SVE)) fpsimd_to_sve(current); - task_fpsimd_load(); - fpsimd_bind_task_to_cpu(); + if (system_supports_fpsimd()) { + task_fpsimd_load(); + fpsimd_bind_task_to_cpu(); + } clear_thread_flag(TIF_FOREIGN_FPSTATE);