From: Mark Rutland <mark.rutl...@arm.com>

commit 515d5c8a1374b307225e41b3e66b0aad08585f53 upstream

To make callsites easier to read, add trivial C wrappers for the
SET_PSTATE_*() helpers, and convert trivial uses over to these. The new
wrappers will be used further in subsequent patches.

There should be no functional change as a result of this patch.

Signed-off-by: Mark Rutland <mark.rutl...@arm.com>
Cc: Christoph Hellwig <h...@lst.de>
Cc: James Morse <james.mo...@arm.com>
Cc: Will Deacon <w...@kernel.org>
Link: https://lore.kernel.org/r/20201113124937.20574-3-mark.rutl...@arm.com
Signed-off-by: Catalin Marinas <catalin.mari...@arm.com>
Signed-off-by: Li Wang <li.w...@windriver.com>
---
 arch/arm64/include/asm/sysreg.h | 4 ++++
 arch/arm64/kernel/cpufeature.c  | 2 +-
 arch/arm64/kernel/proton-pack.c | 4 ++--
 3 files changed, 7 insertions(+), 3 deletions(-)

diff --git a/arch/arm64/include/asm/sysreg.h b/arch/arm64/include/asm/sysreg.h
index 06755fad3830..2978fe26d4ff 100644
--- a/arch/arm64/include/asm/sysreg.h
+++ b/arch/arm64/include/asm/sysreg.h
@@ -98,6 +98,10 @@
 #define SET_PSTATE_SSBS(x)             __emit_inst(0xd500401f | PSTATE_SSBS | 
((!!x) << PSTATE_Imm_shift))
 #define SET_PSTATE_TCO(x)              __emit_inst(0xd500401f | PSTATE_TCO | 
((!!x) << PSTATE_Imm_shift))
 
+#define set_pstate_pan(x)              asm volatile(SET_PSTATE_PAN(x))
+#define set_pstate_uao(x)              asm volatile(SET_PSTATE_UAO(x))
+#define set_pstate_ssbs(x)             asm volatile(SET_PSTATE_SSBS(x))
+
 #define __SYS_BARRIER_INSN(CRm, op2, Rt) \
        __emit_inst(0xd5000000 | sys_insn(0, 3, 3, (CRm), (op2)) | ((Rt) & 
0x1f))
 
diff --git a/arch/arm64/kernel/cpufeature.c b/arch/arm64/kernel/cpufeature.c
index f3767c144593..52acabc52523 100644
--- a/arch/arm64/kernel/cpufeature.c
+++ b/arch/arm64/kernel/cpufeature.c
@@ -1626,7 +1626,7 @@ static void cpu_enable_pan(const struct 
arm64_cpu_capabilities *__unused)
        WARN_ON_ONCE(in_interrupt());
 
        sysreg_clear_set(sctlr_el1, SCTLR_EL1_SPAN, 0);
-       asm(SET_PSTATE_PAN(1));
+       set_pstate_pan(1);
 }
 #endif /* CONFIG_ARM64_PAN */
 
diff --git a/arch/arm64/kernel/proton-pack.c b/arch/arm64/kernel/proton-pack.c
index faa8a6bf2376..4a9d52ecd6ce 100644
--- a/arch/arm64/kernel/proton-pack.c
+++ b/arch/arm64/kernel/proton-pack.c
@@ -580,12 +580,12 @@ static enum mitigation_state 
spectre_v4_enable_hw_mitigation(void)
 
        if (spectre_v4_mitigations_off()) {
                sysreg_clear_set(sctlr_el1, 0, SCTLR_ELx_DSSBS);
-               asm volatile(SET_PSTATE_SSBS(1));
+               set_pstate_ssbs(1);
                return SPECTRE_VULNERABLE;
        }
 
        /* SCTLR_EL1.DSSBS was initialised to 0 during boot */
-       asm volatile(SET_PSTATE_SSBS(0));
+       set_pstate_ssbs(0);
        return SPECTRE_MITIGATED;
 }
 
-- 
2.31.1

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#12073): 
https://lists.yoctoproject.org/g/linux-yocto/message/12073
Mute This Topic: https://lists.yoctoproject.org/mt/96211642/21656
Group Owner: linux-yocto+ow...@lists.yoctoproject.org
Unsubscribe: https://lists.yoctoproject.org/g/linux-yocto/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to