Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754316AbcDYK20 (ORCPT ); Mon, 25 Apr 2016 06:28:26 -0400 Received: from mail-wm0-f47.google.com ([74.125.82.47]:35746 "EHLO mail-wm0-f47.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752299AbcDYK2Y (ORCPT ); Mon, 25 Apr 2016 06:28:24 -0400 Date: Mon, 25 Apr 2016 11:28:21 +0100 From: Matt Fleming To: Ard Biesheuvel Cc: Laszlo Ersek , Mark Rutland , "linux-efi@vger.kernel.org" , Catalin Marinas , "hpa@zytor.com" , Leif Lindholm , "linux-arm-kernel@lists.infradead.org" , Russell King - ARM Linux , "linux-kernel@vger.kernel.org" , "mingo@redhat.com" , "tglx@linutronix.de" , Will Deacon Subject: Re: [PATCHv2 0/6] efi: detect erroneous firmware IRQ manipulation Message-ID: <20160425102821.GQ2829@codeblueprint.co.uk> References: <1461333083-15529-1-git-send-email-mark.rutland@arm.com> <20160424212241.GO2829@codeblueprint.co.uk> <20160425101527.GP2829@codeblueprint.co.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.24+41 (02bc14ed1569) (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2721 Lines: 52 On Mon, 25 Apr, at 12:21:18PM, Ard Biesheuvel wrote: > (+ Laszlo) > > On 25 April 2016 at 12:15, Matt Fleming wrote: > > On Sun, 24 Apr, at 10:22:41PM, Matt Fleming wrote: > >> > >> I like this series a lot (well, ignoring the fact that the firmware is > >> trying to eat itself). The runtime call code is much cleaner now, and > >> this is a great precedent for any future multi-architecture quirks we > >> may need. > >> > >> Queued for v4.7, thanks everyone! > > > > Hmm... Booting this series with Qemu and OVMF results in lots of > > warnings, > > > > [ 0.102173] ------------[ cut here ]------------ > > [ 0.103000] WARNING: CPU: 0 PID: 0 at /dev/shm/mfleming/git/efi/drivers/firmware/efi/runtime-wrappers.c:30 efi_call_virt_check_flags+0x69/0x90 > > [ 0.103505] Modules linked in: > > [ 0.104519] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.6.0-rc4+ #1 > > [ 0.105000] 0000000000000000 ffffffff81e03e30 ffffffff8132206f 0000000000000000 > > [ 0.105000] 0000000000000000 ffffffff81e03e70 ffffffff8105a47c 0000001e0000000a > > [ 0.105000] 0000000000000246 0000000000000286 ffffffff81bed975 ffffffff81e03f10 > > [ 0.105000] Call Trace: > > [ 0.105000] [] dump_stack+0x4d/0x6e > > [ 0.105000] [] __warn+0xcc/0xf0 > > [ 0.105000] [] warn_slowpath_null+0x18/0x20 > > [ 0.105000] [] efi_call_virt_check_flags+0x69/0x90 > > [ 0.105000] [] virt_efi_set_variable+0x82/0x190 > > [ 0.105000] [] efi_delete_dummy_variable+0x75/0x80 > > [ 0.105000] [] efi_enter_virtual_mode+0x463/0x472 > > [ 0.105000] [] start_kernel+0x38f/0x415 > > [ 0.105000] [] ? set_init_arg+0x55/0x55 > > [ 0.105000] [] x86_64_start_reservations+0x2a/0x2c > > [ 0.105000] [] x86_64_start_kernel+0xea/0xed > > [ 0.107181] ---[ end trace 0081cc453369d969 ]--- > > [ 0.107499] Disabling lock debugging due to kernel taint > > [ 0.108226] [Firmware Bug]: IRQ flags corrupted (0x00000246=>0x00000286) by EFI set_variable > > > > Has anyone tested this series on x86 to ensure that this is a rare > > case? I'll go and test some physical x86 machines now. > > I suppose that it is quite likely that this issue occurs in the wild > if it is present in OVMF. Could anyone check which flag is actually > clobbered here? X86_EFLAGS_ZF (zero flag) gets turned off and X86_EFLAGS_SF (signed flag) gets turned on. Which is totally legitimate and isn't grounds for a warning... I think the function we want to use instead of local_save_flags() is irqs_disabled_flags().