Received: by 10.223.185.116 with SMTP id b49csp3814619wrg; Mon, 26 Feb 2018 06:34:02 -0800 (PST) X-Google-Smtp-Source: AH8x226VnCSfho7ECXTnNOer9e6kmGvR87vOmRU58obiekbdAV1Ypm1izw0ZdPhINLpcYSab6L+m X-Received: by 10.98.117.139 with SMTP id q133mr10693103pfc.64.1519655642517; Mon, 26 Feb 2018 06:34:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519655642; cv=none; d=google.com; s=arc-20160816; b=uucnNu/MXjPIN6YX2GsRBUTbxJJ/N4KPYeTq/RZM4DkJUjqTVCiyPBJ+nz+Ry1f1Wu j5CdInhix9sdjUJl4e0MIAVim7ICdAlJWtYw5BBS8Om71VzRruqateBNSps4jEGILDa1 4DiMhSHkDoK/Blg44RXmL+coJlOUsxU2lwAMauppEHUVrrgFBwUIX6Fxo7hN1w3h6/jV Wasfsaite8tXEwE80hbQJjyejYcTweQjLDyPnamJukxWsDETKw+uFi1Q2u8D2lmId3di 74pspcWwir8XUKmOsTObLCiUphqysaEL8If9IAqj7w9vyfu02KULvF/0ClxKytD27HPz KEow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=cw8VBtlOzXPm9WnYFF+KSICC9G5+kyHPrUKNWqrmg9k=; b=ckzeLsko+YQdtAWSQPMSGE+HcvnwWyNwD3/Dzl4OI+R6L21YOZBRglqn3n4hZPxPQk pM9/02gxTfwqqPDVHGjxUMTO1JEphQ5tMvLrc/o/b3MpIm1EK+4lxVnMau81DbuwGIfh 2Hk96/jbULRmX/uv48r+XDfMSQrz8S2vWCYYdquszYe6dNzQKxie+adD/GW0YDZO+6sp +Lozsw9NIdDSH1XGnDZi4eEncJ60hPBUNiDGU5+l9VPFW7QPIKKdNCOUIagobRxxpBFp y0KtNS3/cnYWYivCcAa14JkPfWsqXg6u+LSeKpOqroSyFKjqgwdEz47X/T0XmYfFu0J5 V2CQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=bY/6/6EM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e22-v6si5897142plj.432.2018.02.26.06.33.48; Mon, 26 Feb 2018 06:34:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=bY/6/6EM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753723AbeBZOcj (ORCPT + 99 others); Mon, 26 Feb 2018 09:32:39 -0500 Received: from mail-pf0-f193.google.com ([209.85.192.193]:43141 "EHLO mail-pf0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753277AbeBZOcg (ORCPT ); Mon, 26 Feb 2018 09:32:36 -0500 Received: by mail-pf0-f193.google.com with SMTP id z14so6562966pfe.10; Mon, 26 Feb 2018 06:32:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=cw8VBtlOzXPm9WnYFF+KSICC9G5+kyHPrUKNWqrmg9k=; b=bY/6/6EMI5TNxgec21kFlQeGiFB5E38bGH0EibRXPOu2i/LgpvQ0QU9GHbCBU+1sbh 1rMObP0Bec1yQltrxFkM5iaopIEP/CSZhUVI+x9Tf8fMWJZVbRlRmA6sfxMidnuj73ws E9T8IW4mTTNvwkmzq6CreCMhn6ZRBq0iz6GHO4iFuP3j4IIfOS9EN2iTTLrMVvEX6hpj 4Vd4RVsJ2ho5OyURqj+138MboyQqk/vwYsAG3uRQSP9UXaescduUqp4w/oOtdC2PSd72 5tPHZ1ZPXgMiXaJMIKwkZWFpfcV83hP3i2wmKheh3la6vKbDPIt9qi+CBp1FH4q05rlR VTFQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:subject:to:cc:references:from:message-id :date:user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=cw8VBtlOzXPm9WnYFF+KSICC9G5+kyHPrUKNWqrmg9k=; b=GLoDnNYx+fV65tj0g6AxI94oi73LMmU0ulfB9kgPQuETsBwFOOneMqEGZhbgu97uTP p2IEfpVavfuKnys5Leh+3VNbwUKXJ+wL1f66/9riEVEJx3pIZVO6FqLTNEFpugeXmCwB C1RV2O7UZ4fgPStqU4vu5HM+Ek4uAsCighzCS5sMpbK0HxUoGLyBOiZk9Ti1N0ozzroR MkAYYlZ1IhZqIX6kTxyALPD+nNfgkpak58Z/vRcn4tqCLXq4ecIF3zYQkPnMEMXKgJU+ RxTCwLhOV5Io40eFvV2AZOtS5K6FxjRTQdUXobbrg+8eO5gH1W65lmLLUtWNMP3zuLND MhMg== X-Gm-Message-State: APf1xPBpFt4eeUJoscZQxbxnuB1vX5cG8btOETNnA+SGhI6yRoP8Ylo5 3V+XSPfev5HNTHus85ZgFEPI5Q== X-Received: by 10.99.114.77 with SMTP id c13mr8585265pgn.286.1519655555266; Mon, 26 Feb 2018 06:32:35 -0800 (PST) Received: from server.roeck-us.net (108-223-40-66.lightspeed.sntcca.sbcglobal.net. [108.223.40.66]) by smtp.gmail.com with ESMTPSA id x5sm20561093pfm.49.2018.02.26.06.32.31 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 26 Feb 2018 06:32:32 -0800 (PST) Subject: Re: [PATCH v5 2/9] watchdog/hpwdt: Remove legacy NMI sourcing. To: Arnd Bergmann , Jerry Hoemann Cc: Wim Van Sebroeck , linux-watchdog@vger.kernel.org, Linux Kernel Mailing List , rwright@hpe.com, maurice.a.saldivar@hpe.com, Ingo Molnar , marcus.folkesson@gmail.com, Josh Poimboeuf , stable References: <20180226032227.14615-1-jerry.hoemann@hpe.com> <20180226032227.14615-3-jerry.hoemann@hpe.com> From: Guenter Roeck Message-ID: <03b13d44-9ce3-ead8-020d-4b1b8114079d@roeck-us.net> Date: Mon, 26 Feb 2018 06:32:30 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/26/2018 06:11 AM, Arnd Bergmann wrote: > On Mon, Feb 26, 2018 at 4:22 AM, Jerry Hoemann wrote: >> Gen8 and prior Proliant systems supported the "CRU" interface >> to firmware. This interfaces allows linux to "call back" into firmware >> to source the cause of an NMI. This feature isn't fully utilized >> as the actual source of the NMI isn't printed, the driver only >> indicates that the source couldn't be determined when the call >> fails. >> >> With the advent of Gen9, iCRU replaces the CRU. The call back >> feature is no longer available in firmware. To be compatible and >> not attempt to call back into firmware on system not supporting CRU, >> the SMBIOS table is consulted to determine if it is safe to >> make the call back or not. >> >> This results in about half of the driver code being devoted >> to either making CRU calls or determing if it is safe to make >> CRU calls. As noted, the driver isn't really using the results of >> the CRU calls. >> >> Furthermore, as a consequence of the Spectre security issue, the >> BIOS/EFI calls are being wrapped into Spectre-disabling section. >> Removing the call back in hpwdt_pretimeout assists in this effort. >> >> As the CRU sourcing of the NMI isn't required for handling the >> NMI and there are security concerns with making the call back, remove >> the legacy (pre Gen9) NMI sourcing and the DMI code to determine if >> the system had the CRU interface. >> >> Signed-off-by: Jerry Hoemann > > This avoids a warning in mainline kernels, so that's great: > > drivers/watchdog/hpwdt.o: warning: objtool: .text+0x24: indirect call > found in RETPOLINE build > > I wonder what we do about stable kernels. Are both this patch and the patch > that added the objtool warning message candidates for backports to > stable kernels? > Makes sense to me, but it is really a bit more than a bug fix, so I'll leave it up to Jerry/HPE to make the call in respect to hpwdt. Guenter