Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp2928697ybx; Fri, 8 Nov 2019 11:23:41 -0800 (PST) X-Google-Smtp-Source: APXvYqyOC1wbWMAdn939kj6qEKdFSYebxQ5t59uGsF7IWD3iPRskY4p1WVRuWvNyxgnqiVryliTm X-Received: by 2002:a50:f7cb:: with SMTP id i11mr1154204edn.194.1573241021464; Fri, 08 Nov 2019 11:23:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573241021; cv=none; d=google.com; s=arc-20160816; b=txqB166uw3fQwNeOmPCfvG314O293SpoXFzGVaZAXdA4VRPjvVb3S9PS7fyUWQXOya S+u8ljdgSo1CRqnJZkN8HqXOCJEYzSHKyI6frNQAMgo0QbKRlyaV2Ee3OJe0CUOWPKto vWJIsYwCWcEZaU5reG2FBcveTatYg3FXx2GwHY/tXKXhkhUuGRmefAa+d/mdgES9x45o xkU7l40P4Rjn84/mnOEgc+cBmvHIBfTq1prdU2acywjd4N9cM1WrttMKgKVGO70uhBUv fO2BQfSUC5UAv3l9x5rvn9e0uHCPdNMjaGjOARCOgkKBGq5vn7wOzousuYXmElW06IvQ baWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=IZZZoQ82lqls5iSU8h+xPObjYOi5Kcm6J+wijFyzc1g=; b=IdeCipJD0ZTEPfdI8DtaONkpaKkjfKGhD9bXnxe7Tx2aE3OOXgWgZ3vNEEGfEMDxvc 3Ciolj7kVh71xHds2i6caTbC6zZLGAgG6mE16nw77ExUCzg5nWxRob7dPdssNlMbZ+5r mduRhiDjEkJwU+PCGAjJiQqL33cHNxJ8vAUD7rvYhuskVm7jPHoxrbysp0OTHA4Fwxzc Srz/t6T/YFaxyRma7q29BiKfZZsHTgIE5Xd2/gqicEy4DN8GRQD9Cc1WHH5fgPdedgUo Lk0E8vZYHdUwguOBnXEpEPEAqg1AEYuAMHiYfRBFyUEx8wqJwpDpTu0DDXdHZqEGS42C uGEg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=aRcq235k; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d34si5078212eda.268.2019.11.08.11.23.18; Fri, 08 Nov 2019 11:23:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=aRcq235k; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390022AbfKHTWs (ORCPT + 99 others); Fri, 8 Nov 2019 14:22:48 -0500 Received: from mail.kernel.org ([198.145.29.99]:52942 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387616AbfKHSze (ORCPT ); Fri, 8 Nov 2019 13:55:34 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EA0A6218AE; Fri, 8 Nov 2019 18:55:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573239333; bh=+5huyMqjI7fgVldVohQ+1GuXRgw/Bu4hD6O9RL07Dpo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=aRcq235kkGrjl2sC/x1R0FO+EL0XXg4LAbngkIYJPVEJkpJwPtkxdE/Zk2joy3Fqa Cj8EhreRNJplriE13ERp04cpqw8b/EAFM0wf9jpHU1Nq7pg/SKjq18c5Aiy6CM7Ux7 q3J/WvA6IFRnByseBAg8XXXDcq0vxYMfWyrYV3wk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Greg Kroah-Hartman , "linus.walleij@linaro.org, rmk+kernel@armlinux.org.uk, Ard Biesheuvel" , Russell King , Florian Fainelli , Tony Lindgren , Marc Zyngier , "David A. Long" , Ard Biesheuvel Subject: [PATCH 4.4 42/75] ARM: bugs: hook processor bug checking into SMP and suspend paths Date: Fri, 8 Nov 2019 19:49:59 +0100 Message-Id: <20191108174749.313487476@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191108174708.135680837@linuxfoundation.org> References: <20191108174708.135680837@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Russell King Commit 26602161b5ba795928a5a719fe1d5d9f2ab5c3ef upstream. Check for CPU bugs when secondary processors are being brought online, and also when CPUs are resuming from a low power mode. This gives an opportunity to check that processor specific bug workarounds are correctly enabled for all paths that a CPU re-enters the kernel. Signed-off-by: Russell King Reviewed-by: Florian Fainelli Boot-tested-by: Tony Lindgren Reviewed-by: Tony Lindgren Acked-by: Marc Zyngier Signed-off-by: David A. Long Signed-off-by: Greg Kroah-Hartman Signed-off-by: Ard Biesheuvel Signed-off-by: Greg Kroah-Hartman --- arch/arm/include/asm/bugs.h | 2 ++ arch/arm/kernel/bugs.c | 5 +++++ arch/arm/kernel/smp.c | 4 ++++ arch/arm/kernel/suspend.c | 2 ++ 4 files changed, 13 insertions(+) --- a/arch/arm/include/asm/bugs.h +++ b/arch/arm/include/asm/bugs.h @@ -14,8 +14,10 @@ extern void check_writebuffer_bugs(void) #ifdef CONFIG_MMU extern void check_bugs(void); +extern void check_other_bugs(void); #else #define check_bugs() do { } while (0) +#define check_other_bugs() do { } while (0) #endif #endif --- a/arch/arm/kernel/bugs.c +++ b/arch/arm/kernel/bugs.c @@ -3,7 +3,12 @@ #include #include +void check_other_bugs(void) +{ +} + void __init check_bugs(void) { check_writebuffer_bugs(); + check_other_bugs(); } --- a/arch/arm/kernel/smp.c +++ b/arch/arm/kernel/smp.c @@ -29,6 +29,7 @@ #include #include +#include #include #include #include @@ -396,6 +397,9 @@ asmlinkage void secondary_start_kernel(v * before we continue - which happens after __cpu_up returns. */ set_cpu_online(cpu, true); + + check_other_bugs(); + complete(&cpu_running); local_irq_enable(); --- a/arch/arm/kernel/suspend.c +++ b/arch/arm/kernel/suspend.c @@ -1,6 +1,7 @@ #include #include +#include #include #include #include @@ -34,6 +35,7 @@ int cpu_suspend(unsigned long arg, int ( cpu_switch_mm(mm->pgd, mm); local_flush_bp_all(); local_flush_tlb_all(); + check_other_bugs(); } return ret;