From patchwork Fri Jun 1 17:12:08 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Rutland X-Patchwork-Id: 137570 Delivered-To: patch@linaro.org Received: by 2002:a2e:9706:0:0:0:0:0 with SMTP id r6-v6csp1198551lji; Fri, 1 Jun 2018 10:12:19 -0700 (PDT) X-Google-Smtp-Source: ADUXVKK102FCUQwSt7gWKLmlv3ZHAgMqnfXb8dvGyU5ZK2vi6XSNc/ha0ihl200/TRcV1lKTiv6J X-Received: by 2002:a62:f551:: with SMTP id n78-v6mr11779740pfh.200.1527873139637; Fri, 01 Jun 2018 10:12:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527873139; cv=none; d=google.com; s=arc-20160816; b=BNklWjY1pRaSrCpxAN+d7ENlTYX3fb67+Znoihe7/0sHk/N4r0tuRXjYaw3tYJmym7 h9wCErVzgrrCpuoFWzGR24sEJ3fTJE4tUj+0oW9Slp0ZuN9t2v2C/5O7qTFfjLJFn6YP 0viw6d9JShZ5mDl4mnSpL5yLPvTGsuGjiYF1CYSKl1xcL9Z8q1QjUJ3Vsnge/7KDjMd3 e6kVQm4mgIFWZavQ0xukbecbDb8Wm4ryqLMucOwcyf/QQAtnG7yWf5we4j3tcV7T47Rf EjSQhIniOEBmrIejp6RpfbVLisiIgUgx3ayC41cYyrKj9pTByVc3WNUhRFb+UnD8pzoo Qxhg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=wnqL9c4nma4IyyoU7X7fASoXH0SXJ1/kJ6adM4iJS6E=; b=YAfSsFoX4Uqe8IuZ0eonBQ0x6XEgjoAtg2Lucw2NI7i7vjWL9BOgsTSqPjVuWUOSU3 4lO4I8dtIsugqJsD0GU9O+a7uHA650J8SJ72QhzgMl6ISYY1p6pIzLmDNmVgLsbHA6QJ IzpinW2QcjcpJ9quscCcbm2jgYxZ21wBuHbLMxQxtXD49YkY6mrBGOLnvoKP5ftdaeaQ FP5t/JPmEvi+TCD2X0fPwWT4cOYpuckuGPO/LSc6s8Lxv/Ca/npNcvkKHUYWeXy8Ts+M hYgrncHYHWj4FurqH+ajRT5b3N4osZixQ0IdijBl3lfd/yCK4YhmljpAOAQssB5hxyu6 F1tg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of stable-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=stable-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 84-v6si4135003pfj.6.2018.06.01.10.12.19; Fri, 01 Jun 2018 10:12:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of stable-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of stable-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=stable-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752028AbeFARMS (ORCPT + 13 others); Fri, 1 Jun 2018 13:12:18 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:56092 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751964AbeFARMS (ORCPT ); Fri, 1 Jun 2018 13:12:18 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id C9A561529; Fri, 1 Jun 2018 10:12:17 -0700 (PDT) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 04D373F53D; Fri, 1 Jun 2018 10:12:16 -0700 (PDT) From: Mark Rutland To: stable@vger.kernel.org Cc: marc.zyngier@arm.com, mark.rutland@arm.com Subject: [PATCH v4.9.y 0/2] arm64: prevent boot-time crashes when detecting local features Date: Fri, 1 Jun 2018 18:12:08 +0100 Message-Id: <20180601171210.16870-1-mark.rutland@arm.com> X-Mailer: git-send-email 2.11.0 Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org Marc reported that v4.9.y hung at boot time on his GICv3 system, since the spectre backports. This is because the errata detection logic tries to enable a static key in the secondary bringup path, before the secondary CPU has configured its GICv3 CPU interface, causing it to blow up when it tries to IPI the other CPUs. This affects any local cpu feature detection in systems with heterogeneous CPUs. Some prior rework upstream moved this out of the secondary bringup path, which avoids the issue, so this series backports said rework. Thanks, Mark. Mark Rutland (1): arm64/cpufeature: don't use mutex in bringup path Suzuki K Poulose (1): arm64: Add hypervisor safe helper for checking constant capabilities arch/arm64/include/asm/cpufeature.h | 27 ++++++++++++++++++++------- arch/arm64/include/asm/kvm_host.h | 10 +++++++--- arch/arm64/include/asm/kvm_mmu.h | 2 +- arch/arm64/include/asm/mmu.h | 2 +- arch/arm64/kernel/cpufeature.c | 28 ++++++++++++++++++++++++---- arch/arm64/kernel/process.c | 2 +- drivers/irqchip/irq-gic-v3.c | 13 +------------ 7 files changed, 55 insertions(+), 29 deletions(-) -- 2.11.0