Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932918AbcDYQDO (ORCPT ); Mon, 25 Apr 2016 12:03:14 -0400 Received: from mail-wm0-f53.google.com ([74.125.82.53]:37236 "EHLO mail-wm0-f53.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751197AbcDYQDM (ORCPT ); Mon, 25 Apr 2016 12:03:12 -0400 Date: Mon, 25 Apr 2016 17:03:09 +0100 From: Matt Fleming To: Mark Rutland Cc: linux-efi@vger.kernel.org, ard.biesheuvel@linaro.org, catalin.marinas@arm.com, hpa@zytor.com, leif.lindholm@linaro.org, linux-arm-kernel@lists.infradead.org, linux@arm.linux.org.uk, linux-kernel@vger.kernel.org, mingo@redhat.com, tglx@linutronix.de, will.deacon@arm.com, Robin Murphy Subject: Re: [PATCHv3 0/5] efi: detect erroneous firmware IRQ manipulation Message-ID: <20160425160309.GD2829@codeblueprint.co.uk> References: <1461591994-14918-1-git-send-email-mark.rutland@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1461591994-14918-1-git-send-email-mark.rutland@arm.com> User-Agent: Mutt/1.5.24+41 (02bc14ed1569) (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1696 Lines: 30 On Mon, 25 Apr, at 02:46:29PM, Mark Rutland wrote: > Note: this is largely a rework of the final patch from v2 [2], which now has a > per-arch component (and hence additional patches). The rest of v2 has already > been picked up, and hence dropped from this posting. > > Some firmware erroneously unmask IRQs (and potentially other architecture > specific exceptions) during runtime services functions, in violation of both > common sense and the UEFI specification. This can result in a number of issues > if said exceptions are taken when they are expected to be masked, and > additionally can confuse IRQ tracing if the original mask state is not > restored prior to returning from firmware. > > In practice it's difficult to check that firmware never unmasks exceptions, but > we can at least check that the IRQ flags are at least consistent upon entry to > and return from a runtime services function call. This series implements said > check in the shared EFI runtime wrappers code, after an initial round of > refactoring (patches 1-5 of [2]). > > I have left ia64 as-is, without this check, as ia64 doesn't currently use the > generic runtime wrappers, has many special cases for the runtime calls which > don't fit well with the generic code, and I don't expect a new, buggy ia64 > firmware to appear soon. > > The first time corruption of the IRQ flags is detected, we dump a stack trace, > and set TAINT_FIRMWARE_WORKAROUND. Additionally, and in all subsequent cases, > we log (with ratelimiting) the specific corruption of the flags, and restore > the expected flags to avoid redundant warnings elsewhere. Thanks Mark. I've picked up the series and applied it to the v4.7 queue.