Received: by 10.223.185.116 with SMTP id b49csp4385867wrg; Mon, 26 Feb 2018 17:03:47 -0800 (PST) X-Google-Smtp-Source: AH8x224cZSjRVk6Srcp3eLC86259gHyuy/E4u3YLKx3o6B9QvGvkXIcXh82y+kW3NfQndX6tAk2W X-Received: by 2002:a17:902:50e:: with SMTP id 14-v6mr12359496plf.360.1519693427843; Mon, 26 Feb 2018 17:03:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519693427; cv=none; d=google.com; s=arc-20160816; b=ADupp9jEQCGJtn+R1jZD45I78BaEVsa/1grmFrFftO8+soHbsDImO8rCXeqx+Vn4Qb CmeS6+OGR8o1ke28JOghknxE2+962iRh4Jrglvowre8/8jaciqVHpqPTTsWuLYlBJz0x xpgpFZhaLyoZ9kC0aEWWoUlEyTeTuGuQs4n/lVeas4YcYkp7fnTh9cuJEwpe+74/H4sY P2plroI7eQ5qDV7tYF958FgtASDlvBGypLRf2Dijkx0khcIC7Q70cbz4WhXFP4zYLZLg nvfe292V8hVbhrnn/Et8oytnwoN1wdTax6CF3jVh32T5Goy/v3UCsZypdGgRIeW6AIgQ 3MwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date:arc-authentication-results; bh=vmSsGsXBEsMfu8KLl93khwjefnkhtjNgHOIZcAK6hig=; b=Y0OzTWiS93LmYt2QDNMrfPRFaE8FiipYKW85Uq43cyyKDzj+MUQd9OTc8RAUZwBDUV Y2G9b8C6Agd7jWL0ckmbbhurPEOq68Vi6XSFc2mZvndsCusUcVGonhtUx8wZra4WJBl5 PInzD6Ux7afO/MxIxU3UlFr+4ZurYlju3mXb5w3cF9Aj2l/bEmOUyWKzsiVXf/ICsTY9 ncxMK1st+wYma5Dy2LEXMjYksQqu9I/gfkqPDC2q05HxVoGu0WseA76nqMfeBUHcG+Hl afkkniS7iRfG/5NnBusoE8Z5lMien8mxHVAd4LXuRpIGa7CA2EV8bEZ4gzUZ27wi3mZo 1Tgw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t10-v6si7517757plh.403.2018.02.26.17.03.33; Mon, 26 Feb 2018 17:03:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751554AbeB0BCy (ORCPT + 99 others); Mon, 26 Feb 2018 20:02:54 -0500 Received: from g2t2352.austin.hpe.com ([15.233.44.25]:45747 "EHLO g2t2352.austin.hpe.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751233AbeB0BCx (ORCPT ); Mon, 26 Feb 2018 20:02:53 -0500 Received: from g2t2360.austin.hpecorp.net (g2t2360.austin.hpecorp.net [16.196.225.135]) by g2t2352.austin.hpe.com (Postfix) with ESMTP id 27D19A1; Tue, 27 Feb 2018 01:02:51 +0000 (UTC) Received: from anatevka.americas.hpqcorp.net (anatevka.americas.hpqcorp.net [10.34.81.6]) by g2t2360.austin.hpecorp.net (Postfix) with ESMTP id EFCA539; Tue, 27 Feb 2018 01:02:50 +0000 (UTC) Date: Mon, 26 Feb 2018 18:02:50 -0700 From: Jerry Hoemann To: Guenter Roeck Cc: Arnd Bergmann , Wim Van Sebroeck , linux-watchdog@vger.kernel.org, Linux Kernel Mailing List , rwright@hpe.com, maurice.a.saldivar@hpe.com, Ingo Molnar , marcus.folkesson@gmail.com, Josh Poimboeuf , stable Subject: Re: [PATCH v5 2/9] watchdog/hpwdt: Remove legacy NMI sourcing. Message-ID: <20180227010250.GC8244@anatevka.americas.hpqcorp.net> Reply-To: Jerry.Hoemann@hpe.com References: <20180226032227.14615-1-jerry.hoemann@hpe.com> <20180226032227.14615-3-jerry.hoemann@hpe.com> <03b13d44-9ce3-ead8-020d-4b1b8114079d@roeck-us.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <03b13d44-9ce3-ead8-020d-4b1b8114079d@roeck-us.net> User-Agent: Mutt/1.9.1 (2017-09-22) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Feb 26, 2018 at 06:32:30AM -0800, Guenter Roeck wrote: > On 02/26/2018 06:11 AM, Arnd Bergmann wrote: > > On Mon, Feb 26, 2018 at 4:22 AM, Jerry Hoemann wrote: > > > Gen8 and prior Proliant systems supported the "CRU" interface > > > to firmware. This interfaces allows linux to "call back" into firmware > > > to source the cause of an NMI. This feature isn't fully utilized > > > as the actual source of the NMI isn't printed, the driver only > > > indicates that the source couldn't be determined when the call > > > fails. > > > > > > With the advent of Gen9, iCRU replaces the CRU. The call back > > > feature is no longer available in firmware. To be compatible and > > > not attempt to call back into firmware on system not supporting CRU, > > > the SMBIOS table is consulted to determine if it is safe to > > > make the call back or not. > > > > > > This results in about half of the driver code being devoted > > > to either making CRU calls or determing if it is safe to make > > > CRU calls. As noted, the driver isn't really using the results of > > > the CRU calls. > > > > > > Furthermore, as a consequence of the Spectre security issue, the > > > BIOS/EFI calls are being wrapped into Spectre-disabling section. > > > Removing the call back in hpwdt_pretimeout assists in this effort. > > > > > > As the CRU sourcing of the NMI isn't required for handling the > > > NMI and there are security concerns with making the call back, remove > > > the legacy (pre Gen9) NMI sourcing and the DMI code to determine if > > > the system had the CRU interface. > > > > > > Signed-off-by: Jerry Hoemann > > > > This avoids a warning in mainline kernels, so that's great: > > > > drivers/watchdog/hpwdt.o: warning: objtool: .text+0x24: indirect call > > found in RETPOLINE build > > > > I wonder what we do about stable kernels. Are both this patch and the patch > > that added the objtool warning message candidates for backports to > > stable kernels? > > > > Makes sense to me, but it is really a bit more than a bug fix, so I'll > leave it up to Jerry/HPE to make the call in respect to hpwdt. > Generally speaking, HPE customers who run linux do so through a distro vendor and pick up patches from them. But I'm sure there are some customers who do things differently. The distro vendor's have their own repos and we'll work with them to back port patches to their code base. So, I typically don't do a lot of kernel.org stable branch work. Looks like objtool has been enhanced to find Spectre vulnerable code. Are the other kernel patches related to Spectre being back ported to stable release lines? If yes, it probably make sense to do the hpwdt change as well. Is just the patch removing the firmware call back wanted/needed? Or the whole driver rewrite? (The older baseline don't have all the watchdog features that the patch set uses.) Which stable baseline(s) would need to be patched? Priority? Who does it? (i.e. do you want me to submit patches to the stable baseline?) Thanks -- ----------------------------------------------------------------------------- Jerry Hoemann Software Engineer Hewlett Packard Enterprise -----------------------------------------------------------------------------