Received: by 2002:a4a:311b:0:0:0:0:0 with SMTP id k27-v6csp4795979ooa; Tue, 14 Aug 2018 10:39:57 -0700 (PDT) X-Google-Smtp-Source: AA+uWPxr3Roaso6vlQDJ0aD6spvHW/HX/Hj19mSHX7Njx+DVt856/9oKgMk2jPs37PTkVgb0V2fd X-Received: by 2002:a65:4c87:: with SMTP id m7-v6mr21697957pgt.98.1534268397557; Tue, 14 Aug 2018 10:39:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534268397; cv=none; d=google.com; s=arc-20160816; b=u9MY8zdskEjHUrRPYBKSmb63QXr/QXdEPojsSPLjHJ+dTJ7b2QVjcFJNakxk2TJ+Ef r/zuyVHafDreWmDqeBF8C39zR0sLxH2tePYAeq4JirZknys/nE2/HFvEfWJjwjXcqBy9 vydzRAW3Nz7XrtlIH1nfNIyS14tRsR6Hxt1n55Qu+I35CGicLnzw7FhP1W6loQbEx+v7 WfC293Yr+Kf3t3qPBAd20se1bGWlyBEvXleyv9EpORboTAeNDdAGAciu4ms7tj1kE/IW GTpwYCTklCkSyCUzzKajQWhbLS2M9RwqGCi/1Tq3W5WMh9LlQGjRaQ0XgTVeHtalGAiF 4BDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=ujQJT2aBsdL43Rvr4ansLWBxYbOcr4Er2/N+HEPg6BM=; b=S68yOhoqw8LfA74DYZwHhpaHtoOB4JPNxtc23xQzHwgj8IaEWBL02onGBJQBrQrcMc YI89dkBb1qmNEYd+U2XB3vwU3IGKK9lNr1IQgEnV7b/V3n2+qPVW2aLU+gmALUuGZKbM /0fw7cOkQyAxs8PXvGpTValArQS5CEyvk3cEUEypRtW+tegoh+11ZMS93Z31N7bYVll4 JWlzaac87SpZDihTO9gVlEQCGJU70Vfirp5J5G4hgx3Z8dIrqktl9jRP2H3rC6IFfZWm a3zGvElQhkgAUPWgyqFMamH85SdyX9nyTiLxkOSJ4T7QsWmAqwYmBKEs1IbsbX0d/SVL 50tg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c25-v6si21603627pgm.523.2018.08.14.10.39.42; Tue, 14 Aug 2018 10:39:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732353AbeHNUZk (ORCPT + 99 others); Tue, 14 Aug 2018 16:25:40 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:58122 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728875AbeHNUZj (ORCPT ); Tue, 14 Aug 2018 16:25:39 -0400 Received: from localhost (unknown [194.244.16.108]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 68C8AD20; Tue, 14 Aug 2018 17:37:29 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thomas Gleixner , Jiri Kosina , Josh Poimboeuf Subject: [PATCH 4.14 075/104] cpu/hotplug: Set CPU_SMT_NOT_SUPPORTED early Date: Tue, 14 Aug 2018 19:17:29 +0200 Message-Id: <20180814171520.118923356@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180814171515.270692185@linuxfoundation.org> References: <20180814171515.270692185@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Thomas Gleixner commit fee0aede6f4739c87179eca76136f83210953b86 upstream The CPU_SMT_NOT_SUPPORTED state is set (if the processor does not support SMT) when the sysfs SMT control file is initialized. That was fine so far as this was only required to make the output of the control file correct and to prevent writes in that case. With the upcoming l1tf command line parameter, this needs to be set up before the L1TF mitigation selection and command line parsing happens. Signed-off-by: Thomas Gleixner Tested-by: Jiri Kosina Reviewed-by: Greg Kroah-Hartman Reviewed-by: Josh Poimboeuf Link: https://lkml.kernel.org/r/20180713142323.121795971@linutronix.de Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/cpu/bugs.c | 6 ++++++ include/linux/cpu.h | 2 ++ kernel/cpu.c | 13 ++++++++++--- 3 files changed, 18 insertions(+), 3 deletions(-) --- a/arch/x86/kernel/cpu/bugs.c +++ b/arch/x86/kernel/cpu/bugs.c @@ -58,6 +58,12 @@ void __init check_bugs(void) { identify_boot_cpu(); + /* + * identify_boot_cpu() initialized SMT support information, let the + * core code know. + */ + cpu_smt_check_topology(); + if (!IS_ENABLED(CONFIG_SMP)) { pr_info("CPU: "); print_cpu_info(&boot_cpu_data); --- a/include/linux/cpu.h +++ b/include/linux/cpu.h @@ -188,9 +188,11 @@ enum cpuhp_smt_control { #if defined(CONFIG_SMP) && defined(CONFIG_HOTPLUG_SMT) extern enum cpuhp_smt_control cpu_smt_control; extern void cpu_smt_disable(bool force); +extern void cpu_smt_check_topology(void); #else # define cpu_smt_control (CPU_SMT_ENABLED) static inline void cpu_smt_disable(bool force) { } +static inline void cpu_smt_check_topology(void) { } #endif #endif /* _LINUX_CPU_H_ */ --- a/kernel/cpu.c +++ b/kernel/cpu.c @@ -365,6 +365,16 @@ void __init cpu_smt_disable(bool force) } } +/* + * The decision whether SMT is supported can only be done after the full + * CPU identification. Called from architecture code. + */ +void __init cpu_smt_check_topology(void) +{ + if (!topology_smt_supported()) + cpu_smt_control = CPU_SMT_NOT_SUPPORTED; +} + static int __init smt_cmdline_disable(char *str) { cpu_smt_disable(str && !strcmp(str, "force")); @@ -2127,9 +2137,6 @@ static const struct attribute_group cpuh static int __init cpu_smt_state_init(void) { - if (!topology_smt_supported()) - cpu_smt_control = CPU_SMT_NOT_SUPPORTED; - return sysfs_create_group(&cpu_subsys.dev_root->kobj, &cpuhp_smt_attr_group); }