Received: by 10.223.185.116 with SMTP id b49csp3794398wrg; Mon, 26 Feb 2018 06:14:48 -0800 (PST) X-Google-Smtp-Source: AH8x225TYREyubhl4g7lUJTGt1QhtE8QKv8OIW/7C4Geb6hDxspOsmukzPxLXIRXqIuCYCY7nVgx X-Received: by 10.101.102.83 with SMTP id z19mr8364669pgv.75.1519654488457; Mon, 26 Feb 2018 06:14:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519654488; cv=none; d=google.com; s=arc-20160816; b=UqQ5/ApPzmNRTbdKA5NxTpeFwieJ3Wg6pOFjJj9R7sv898HYok2ErezdbZjoAVHY3H GIjJzRdQXTQA0bTOTp2G/9uHSogrceT5R3Na9p83LkyAaFVIv16AHAw6r9EFzDI2mDhN +h9+Bkk9YZVyYS0uZLq2jglcWA0rPlCr1RObqry2633RyqsRX5jUWo/GrvpTdQYtlsMc KgRBiNsMxSnAZYZ1DziGajAiJuCbTYIOmDPV3oVVThGRVUc5I6Ga721sKSF5gAnTgUyX AUaQZhosCR8tMdrX5Cp+X/sccS3m9RK5kK/t92UZHiwBivbMQgaZV7vVK/leTKVabIwz 2znQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=bK3/r1601mTdru1jOUQtcoZMebAchfcjWwrovLrJrzk=; b=SP3VgCeMhBIQ89d9zt2oRigHXlJIu3KHDFf8vuakAfwX2r42oMfWiYxbxQmdTkGIpQ e8A+KZY1AD3iP+33vYxfriCu/clwHNXzX0173cZlc8P6muxep2sfqkeT+B7R1mlbLMDo qK6FqeGrVs4EvVD73x8n8zmvkw4UuSRsgI9ub54rFt30B0Kg0L9BudqYEAZtKbvIU96V SQNpKctak6RoS24mrTM0OOFEUENOT04JNkcZ4HPKGSsZtcqrFYDfutDCaX2FZS4CLV8i zSTymYQgy4kovl4zXFcqqHgpaW/5x2W+iOFhYgVLqeKkAGdRMIQ82PUvjBoYUn3ZCx+b VAqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=aXY0nrY8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w3si5577156pgb.258.2018.02.26.06.14.33; Mon, 26 Feb 2018 06:14:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=aXY0nrY8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753760AbeBZONI (ORCPT + 99 others); Mon, 26 Feb 2018 09:13:08 -0500 Received: from mail-qt0-f195.google.com ([209.85.216.195]:46967 "EHLO mail-qt0-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753398AbeBZOLD (ORCPT ); Mon, 26 Feb 2018 09:11:03 -0500 Received: by mail-qt0-f195.google.com with SMTP id m13so14137697qtg.13; Mon, 26 Feb 2018 06:11:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=bK3/r1601mTdru1jOUQtcoZMebAchfcjWwrovLrJrzk=; b=aXY0nrY8LFbxIXRbMi3RD/6j8HFMAVOwqZsya+76N5CjEpFOby0Ye4X9Jo2Lhm/8oH cQrGWvBqdYd+A57Eyh6FW9fga/HzVfaBKKKYiDoOUrW+0CDC76ok+k+vyHefd2s1dr0S B5l3UIrZy9aLYBDSH57vnphCYOUxow2ndYsF/Lg7Dzogs8dbZShYZWkedO6cJs99WvPv DNg0pSuRkNd5CpaC3Cu52AqRaNrdl/OY9Q14yRgwOfjyT3p1jLBMFEdkQMuUvryukL+J XoAx5l8XBYRKOivMxHK+EPfm4CSZk+JWuh8MQGh2e97YOGPyo+nRg95pbNKKquMNMbZT zIRg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=bK3/r1601mTdru1jOUQtcoZMebAchfcjWwrovLrJrzk=; b=ZMpITxdhmcE2IemHbsEXIjB4gaxGMIUGL7THXGQZCMJobABtSkxouBbP0p6UTq39/r dFzm45ngzw2feOaFwIq0WCgr6MQSiyL3w3GZuKncyf0O+sUipg6Fn+tQi4rbF7FTbn7/ Zy0lVQvv1eyuxQN1TudytaiH8yWgOIAsCBfFrpRNQr+qILt53Y1tdcA4bmO4DfdG8CVn DvJu3tg+a7eS8l/SUlrbvxnCCTnCuUFaGuw1RgCjwaaYhI9Z2sD9/15OHa1AVOUh3ini Hc9UPcICQoZCgv/yDgmyrpcS9isaVEE/mBp/mL+xwIj7tSVzkWTrXKm4P0DT+rvaWdFC rbmQ== X-Gm-Message-State: APf1xPDA23jg4uU2vgufZ9QBM4exur+OjfGc4JTalrkqKfECi22k5g00 gup4LkTcRWZIeFlrA/AlEFkCX8sPAB3zuUUQLP0= X-Received: by 10.200.47.53 with SMTP id j50mr17417900qta.185.1519654262426; Mon, 26 Feb 2018 06:11:02 -0800 (PST) MIME-Version: 1.0 Received: by 10.12.198.17 with HTTP; Mon, 26 Feb 2018 06:11:01 -0800 (PST) In-Reply-To: <20180226032227.14615-3-jerry.hoemann@hpe.com> References: <20180226032227.14615-1-jerry.hoemann@hpe.com> <20180226032227.14615-3-jerry.hoemann@hpe.com> From: Arnd Bergmann Date: Mon, 26 Feb 2018 15:11:01 +0100 X-Google-Sender-Auth: tQbWS-F_QJM5lqPBdMmxSq3bmX0 Message-ID: Subject: Re: [PATCH v5 2/9] watchdog/hpwdt: Remove legacy NMI sourcing. To: Jerry Hoemann Cc: Wim Van Sebroeck , Guenter Roeck , linux-watchdog@vger.kernel.org, Linux Kernel Mailing List , rwright@hpe.com, maurice.a.saldivar@hpe.com, Ingo Molnar , marcus.folkesson@gmail.com, Josh Poimboeuf , stable Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Feb 26, 2018 at 4:22 AM, Jerry Hoemann wrote: > Gen8 and prior Proliant systems supported the "CRU" interface > to firmware. This interfaces allows linux to "call back" into firmware > to source the cause of an NMI. This feature isn't fully utilized > as the actual source of the NMI isn't printed, the driver only > indicates that the source couldn't be determined when the call > fails. > > With the advent of Gen9, iCRU replaces the CRU. The call back > feature is no longer available in firmware. To be compatible and > not attempt to call back into firmware on system not supporting CRU, > the SMBIOS table is consulted to determine if it is safe to > make the call back or not. > > This results in about half of the driver code being devoted > to either making CRU calls or determing if it is safe to make > CRU calls. As noted, the driver isn't really using the results of > the CRU calls. > > Furthermore, as a consequence of the Spectre security issue, the > BIOS/EFI calls are being wrapped into Spectre-disabling section. > Removing the call back in hpwdt_pretimeout assists in this effort. > > As the CRU sourcing of the NMI isn't required for handling the > NMI and there are security concerns with making the call back, remove > the legacy (pre Gen9) NMI sourcing and the DMI code to determine if > the system had the CRU interface. > > Signed-off-by: Jerry Hoemann This avoids a warning in mainline kernels, so that's great: drivers/watchdog/hpwdt.o: warning: objtool: .text+0x24: indirect call found in RETPOLINE build I wonder what we do about stable kernels. Are both this patch and the patch that added the objtool warning message candidates for backports to stable kernels? Arnd