Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp762706ybl; Wed, 4 Dec 2019 10:25:57 -0800 (PST) X-Google-Smtp-Source: APXvYqytB0BwcWGE8T3LYoL2Wf9agEJ5T8olaG0VoXLKUK2aE3kIRdwuqsz0MzuNlPcOdgVyE2t6 X-Received: by 2002:a9d:648f:: with SMTP id g15mr3592119otl.195.1575483957137; Wed, 04 Dec 2019 10:25:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575483957; cv=none; d=google.com; s=arc-20160816; b=Eamzp+s6o+cbTZ42q0vJplwFAZ7KV6QVr+89K4dqiD50tWC3GE1JgYP9nMza1h7bOo ZRTN56GlDEF2x5Uys+thwr6mqmQeDYMO0/94y2/2dPp4gKl/BRMisdh9cjTIRGWJk+EW 3ObFnKHGOuU37UUWWtKGzx20zD6UfwNdtH7fdVPx1cR6A/3hgN5cWA7LFIAD6Y4OMxdk DeyZm5ErvZ2YgdhZ4VV9VzvWuCfYTIbZPD97+l5vPknCsg0A1vbNGsWLbFjX0wOwdY3j 1a1V2PwcjBwZSidX2xrj9ULonQ2HON6FPsbWahS/vS9JgCGd+lUPIhD1xpQOTeWl0atY UQEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=LVrgQHZvT+o7zYOcstxfFuQGkt4Jaj+bjz8pK6/SoCo=; b=OaOX93uU1/GxTvmXsxImShw76iOY6Nkeh0QNzX9ZjbU67PcoJ3y7WUMSOLxUUKMDlj c3O/Mn/+JaOMkB7pQ5mTGiLeQJjRM18V1X01kUXdzu9xbgQOOh+3MS+JiqplXl/rF8qg 6Xe8BfFs4yutM1lub9aFai4l+pPF6Vby2EUMyXUtaHEEkikZt7abU+leCtbSfCdKJoSY AE/2DtmaycyJSv8tdKEpF7aLe8rYt4Y7RIjnkSy1LDUwIMGphnM5ycR0+NwFL3Oqakbz aOJ1XVh89vCznBT5lcw6s+rtULp37zJrynoEpplGoqI57vVgh8oEVe7LURFdj9u66E4s /r0Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=WUWtpkdC; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v145si952847oia.68.2019.12.04.10.25.45; Wed, 04 Dec 2019 10:25:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=WUWtpkdC; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729847AbfLDSC2 (ORCPT + 99 others); Wed, 4 Dec 2019 13:02:28 -0500 Received: from mail.kernel.org ([198.145.29.99]:44416 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729838AbfLDSC0 (ORCPT ); Wed, 4 Dec 2019 13:02:26 -0500 Received: from localhost (unknown [217.68.49.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9A67620659; Wed, 4 Dec 2019 18:02:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575482546; bh=cmKGOHgM7wHlc5kYMfA4o8dgcIF1tniR9eks2UIjlII=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=WUWtpkdCWGBRHVp76LG18vcHKm5kMugsxcmgYTsoKFzUkW85jNumL9NTTu+JKXTYb KZ6EKYeAHYmRZKvYYFnnYzyYuLSp5JDpFqsI47zPh7WgT7ViVBtcO3XGKl3imjqaFd K4gbkpss+/4dE+uu/onbzazhHjhynwixz9tMzV5o= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Steve Capper , Will Deacon , Suzuki K Poulose , Sasha Levin Subject: [PATCH 4.14 038/209] arm64: smp: Handle errors reported by the firmware Date: Wed, 4 Dec 2019 18:54:10 +0100 Message-Id: <20191204175324.047182044@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191204175321.609072813@linuxfoundation.org> References: <20191204175321.609072813@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Suzuki K Poulose [ Upstream commit f357b3a7e17af7736d67d8267edc1ed3d1dd9391 ] The __cpu_up() routine ignores the errors reported by the firmware for a CPU bringup operation and looks for the error status set by the booting CPU. If the CPU never entered the kernel, we could end up in assuming stale error status, which otherwise would have been set/cleared appropriately by the booting CPU. Reported-by: Steve Capper Cc: Will Deacon Signed-off-by: Suzuki K Poulose Signed-off-by: Will Deacon Signed-off-by: Sasha Levin --- arch/arm64/kernel/smp.c | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/arm64/kernel/smp.c b/arch/arm64/kernel/smp.c index 0881dfab10f8f..909bf3926fd23 100644 --- a/arch/arm64/kernel/smp.c +++ b/arch/arm64/kernel/smp.c @@ -144,6 +144,7 @@ int __cpu_up(unsigned int cpu, struct task_struct *idle) } } else { pr_err("CPU%u: failed to boot: %d\n", cpu, ret); + return ret; } secondary_data.task = NULL; -- 2.20.1