Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp5461975imm; Tue, 16 Oct 2018 10:34:58 -0700 (PDT) X-Google-Smtp-Source: ACcGV61A0URAfgH7xte2IgYdgwMWVBeCaTymkZKpp5ct7l1YEltaknYnKRFnuhLN98KFJhJfA+ur X-Received: by 2002:a17:902:6948:: with SMTP id k8-v6mr22594804plt.75.1539711298511; Tue, 16 Oct 2018 10:34:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539711298; cv=none; d=google.com; s=arc-20160816; b=QrK7N5a+bjDBj1pX33oMk/6rDVGza99KrDH7Eg8pRuF/FVvjClhPOcESLmP5BzHeRR A5s+99pGEo4LwblDtqlxEvjQyZYtWzdvpn37EoWuIevuImoJ3R2ujD3CieL/hU1Z3zUQ Q5EVDFKBVO7TFF3n+hloCc50AaEFxY4l4t2oHFbxaGmCN9FeRN7C+szx4aEzcyYGl0FW i5xpki5JG/GjAPqiP7lpUjdQkraBu/hoNuruCPKFrObB3lpLx+LEZm11QR6zK7TP1n3v TSQLom1HltkTyaNSQcfFHNHmMr+QAuxGWS3GR4SMCPQUDtxJgI5BlHaVqcmiLJ8+8NFv xhyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=on1fJZdl9uAZnRxOeBbxCR/ZtQDaErnmszqVgsNklX0=; b=D49ueo9jdmu8ERjU7ZhYwapaR26eu3BXcuw8PWJzbB0m4vqaO+znjuxZYM36a9ITEO 2lfXSVplxeiet/HZOv6pmgE2DuHV+gNo1qp137KOhcC4eSqhFyhU0n6zgmuygyWSxJSh eXFmbTI9Hq3woZRx5xnr2AygVyjLMCpr4d3Myz2uWgYEyOynveu/cttRiM0gsMyFwUhZ ZMD4jtD06TSauaGHn/rmTbyeY6MF9AfPyP6XYzxozLWqChVXuUQNyd5cF/aY3ScxGL2N Ugppyc0ET3S0SaDYIzS27BTRTFJ5DohuGwRu67DKyDlM7nrq7r6flNNB9ZiBNXzxivQ7 0Ryw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uGGA7+qM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x1-v6si14950387plb.132.2018.10.16.10.34.42; Tue, 16 Oct 2018 10:34:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uGGA7+qM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730778AbeJQBM1 (ORCPT + 99 others); Tue, 16 Oct 2018 21:12:27 -0400 Received: from mail.kernel.org ([198.145.29.99]:57944 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729296AbeJQBM0 (ORCPT ); Tue, 16 Oct 2018 21:12:26 -0400 Received: from localhost (ip-213-127-77-176.ip.prioritytelecom.net [213.127.77.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1066E2089E; Tue, 16 Oct 2018 17:21:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539710461; bh=KYlTcfLE6p0qfhYgXt1LLKdA4NlfFXcH2CVRH7s6X3w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uGGA7+qMf3nROOnqT77a4LZ79sVnt3x8O5RU/Hhw9kniTeecub20JTB5fM+Hpzuas Zb16e4cCUeeIuv6OsKQj37tqXsEGTwnHwcB9ZmbUG0SFt4C2bKAl5gUa6S+fVMvSLN /arTvYR400oNukCTogphddkxbAYbypA+UdfrEUvU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Russell King , Florian Fainelli , Tony Lindgren , Marc Zyngier , "David A. Long" Subject: [PATCH 4.14 087/109] ARM: bugs: hook processor bug checking into SMP and suspend paths Date: Tue, 16 Oct 2018 19:05:55 +0200 Message-Id: <20181016170529.741223925@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181016170524.530541524@linuxfoundation.org> References: <20181016170524.530541524@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Russell King Commit 26602161b5ba795928a5a719fe1d5d9f2ab5c3ef upstream. Check for CPU bugs when secondary processors are being brought online, and also when CPUs are resuming from a low power mode. This gives an opportunity to check that processor specific bug workarounds are correctly enabled for all paths that a CPU re-enters the kernel. Signed-off-by: Russell King Reviewed-by: Florian Fainelli Boot-tested-by: Tony Lindgren Reviewed-by: Tony Lindgren Acked-by: Marc Zyngier Signed-off-by: David A. Long Signed-off-by: Greg Kroah-Hartman --- arch/arm/include/asm/bugs.h | 2 ++ arch/arm/kernel/bugs.c | 5 +++++ arch/arm/kernel/smp.c | 4 ++++ arch/arm/kernel/suspend.c | 2 ++ 4 files changed, 13 insertions(+) --- a/arch/arm/include/asm/bugs.h +++ b/arch/arm/include/asm/bugs.h @@ -14,8 +14,10 @@ extern void check_writebuffer_bugs(void) #ifdef CONFIG_MMU extern void check_bugs(void); +extern void check_other_bugs(void); #else #define check_bugs() do { } while (0) +#define check_other_bugs() do { } while (0) #endif #endif --- a/arch/arm/kernel/bugs.c +++ b/arch/arm/kernel/bugs.c @@ -3,7 +3,12 @@ #include #include +void check_other_bugs(void) +{ +} + void __init check_bugs(void) { check_writebuffer_bugs(); + check_other_bugs(); } --- a/arch/arm/kernel/smp.c +++ b/arch/arm/kernel/smp.c @@ -31,6 +31,7 @@ #include #include +#include #include #include #include @@ -402,6 +403,9 @@ asmlinkage void secondary_start_kernel(v * before we continue - which happens after __cpu_up returns. */ set_cpu_online(cpu, true); + + check_other_bugs(); + complete(&cpu_running); local_irq_enable(); --- a/arch/arm/kernel/suspend.c +++ b/arch/arm/kernel/suspend.c @@ -3,6 +3,7 @@ #include #include +#include #include #include #include @@ -36,6 +37,7 @@ int cpu_suspend(unsigned long arg, int ( cpu_switch_mm(mm->pgd, mm); local_flush_bp_all(); local_flush_tlb_all(); + check_other_bugs(); } return ret;