Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp134671ybc; Mon, 18 Nov 2019 21:55:57 -0800 (PST) X-Google-Smtp-Source: APXvYqxSJN3sJ7o6jZ7xZfss+lQf9DCCoXIYSYr/dSGNfuADf+4qvxSfmzJL0EnG2ce606G9l2wK X-Received: by 2002:a17:906:69cb:: with SMTP id g11mr32155141ejs.328.1574142957305; Mon, 18 Nov 2019 21:55:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574142957; cv=none; d=google.com; s=arc-20160816; b=ewnoMxijiVgW6DwYQpV0j5BkTn2wXhmLWPbAv+/2jPyI2mLYcWQYkYqoBWZZOFd+zJ 3yUAGyfrNIfcVGc2p4o+g32DSV1hBXoqUwvMrL12Lq/EEviWYgPb2GCiCjgE9nSb/5Th Tc2u6j9mB2AIXz8bHVVM4jPttKLRjhIykayjaLHMUiqd3CIE3hr3L2InHP7G71rOZbpB c6MH1cNn7055v1eyfbJROnI3/qDM2/1IfnVeIPBOxsjN8KlfcWNj+TaQn/3Molm+wyGX Vfsrz2MjWzn5du4bhEcEYgqrN5qgqmLBXeNw71BVtDAoeGvY+NpI89XZ0pp9HEHlcHW2 Wetg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=8UUmz+h4oBJ8XOHjIyaXwet9rsTNwAjcIbw5zT5Yozk=; b=SOkX39VrpxvaqlaiGvUxmf8gZ1JaKYzP/ld5/d/6OVsNJHJg3Lw4lbThYIA5tqTKZ4 OOihmXrqJm2thVqQJcGGlwL8kHT8Y6aokzo/DiEtXHevr/a9V4RPMSHDvw0ZhJPVlrFI iRswAigfSDK+y5IRgNUOAXrk5GQCFY+0mWQ+nmv4H5r8gU1B1zMrZJcAkNXAf9U346pE +658y9XbqaaHbhmtMzjIvKdHnTfh3SU7uvEYH0VZRfFB+j7FJBg7duYNsUubzSGq2PES n5szR+5Wk4gHfDWhlR2uULgShqV+w64JflbI4XoNdwA3qV7vNGgoyxecBdKYkOpqnP/J VkdA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tQ2VYrdX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p29si16530170eda.104.2019.11.18.21.55.32; Mon, 18 Nov 2019 21:55:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tQ2VYrdX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731536AbfKSFyE (ORCPT + 99 others); Tue, 19 Nov 2019 00:54:04 -0500 Received: from mail.kernel.org ([198.145.29.99]:52100 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729410AbfKSFyB (ORCPT ); Tue, 19 Nov 2019 00:54:01 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0F77B21850; Tue, 19 Nov 2019 05:54:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574142841; bh=YRs4s1sjG7eJRwKwYyVft9OLeY3xfnyFEOZciMSfYyk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tQ2VYrdXkm6OwoV+fbXQ/I7SQOsnmRrNGI+iOT6AwdCvcAkVqs9+hOCkqi8K8z2/R zyouo8RsGYR6LYrtwy8J1ok6yunHI9kJ/jpia9JoC3fxZ1bKCWDFZ8S1+cPYs+go8Y rMEc+aJEuGNV+NxTUBMJfw1ZbtNZlFZHmTRixooY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Borislav Petkov , Sasha Levin Subject: [PATCH 4.14 168/239] x86/mce-inject: Reset injection struct after injection Date: Tue, 19 Nov 2019 06:19:28 +0100 Message-Id: <20191119051333.812788327@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191119051255.850204959@linuxfoundation.org> References: <20191119051255.850204959@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Borislav Petkov [ Upstream commit 7401a633c34adc7aefd3edfec60074cb0475a3e8 ] Clear the MCE struct which is used for collecting the injection details after injection. Also, populate it with more details from the machine. Signed-off-by: Borislav Petkov Link: https://lkml.kernel.org/r/20180905081954.10391-1-bp@alien8.de Signed-off-by: Sasha Levin --- arch/x86/kernel/cpu/mcheck/mce-inject.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/arch/x86/kernel/cpu/mcheck/mce-inject.c b/arch/x86/kernel/cpu/mcheck/mce-inject.c index 8fec687b3e44e..f12141ba9a76d 100644 --- a/arch/x86/kernel/cpu/mcheck/mce-inject.c +++ b/arch/x86/kernel/cpu/mcheck/mce-inject.c @@ -108,6 +108,9 @@ static void setup_inj_struct(struct mce *m) memset(m, 0, sizeof(struct mce)); m->cpuvendor = boot_cpu_data.x86_vendor; + m->time = ktime_get_real_seconds(); + m->cpuid = cpuid_eax(1); + m->microcode = boot_cpu_data.microcode; } /* Update fake mce registers on current CPU. */ @@ -576,6 +579,9 @@ static int inj_bank_set(void *data, u64 val) m->bank = val; do_inject(); + /* Reset injection struct */ + setup_inj_struct(&i_mce); + return 0; } -- 2.20.1