[PATCH v2 7/9] arm64: entry: Reword comment about post_ttbr_update_workaround
Ard Biesheuvel
ard.biesheuvel at linaro.org
Sat Feb 3 03:15:59 PST 2018
On 29 January 2018 at 11:59, Will Deacon <will.deacon at arm.com> wrote:
> We don't fully understand the Cavium ThunderX erratum, but it appears
> that mapping the kernel as nG can lead to horrible consequences such as
> attempting to execute userspace from kernel context. Since kpti isn't
> enabled for these CPUs anyway, simplify the comment justifying the lack
> of post_ttbr_update_workaround in the exception trampoline.
>
> Signed-off-by: Will Deacon <will.deacon at arm.com>
> ---
> arch/arm64/kernel/entry.S | 12 ++----------
> 1 file changed, 2 insertions(+), 10 deletions(-)
>
> diff --git a/arch/arm64/kernel/entry.S b/arch/arm64/kernel/entry.S
> index b34e717d7597..fbe1444324b3 100644
> --- a/arch/arm64/kernel/entry.S
> +++ b/arch/arm64/kernel/entry.S
> @@ -1013,16 +1013,8 @@ alternative_else_nop_endif
> orr \tmp, \tmp, #USER_ASID_FLAG
> msr ttbr1_el1, \tmp
> /*
> - * We avoid running the post_ttbr_update_workaround here because the
> - * user and kernel ASIDs don't have conflicting mappings, so any
> - * "blessing" as described in:
> - *
> - * http://lkml.kernel.org/r/56BB848A.6060603@caviumnetworks.com
> - *
> - * will not hurt correctness. Whilst this may partially defeat the
> - * point of using split ASIDs in the first place, it avoids
> - * the hit of invalidating the entire I-cache on every return to
> - * userspace.
> + * We avoid running the post_ttbr_update_workaround here because
> + * it's only needed by Cavium ThunderX, which doesn't require kpti.
'requires KPTI to be disabled' sounds more accurate to me
More information about the linux-arm-kernel
mailing list