Received: by 10.223.185.116 with SMTP id b49csp8240361wrg; Thu, 1 Mar 2018 20:52:15 -0800 (PST) X-Google-Smtp-Source: AG47ELsLpg+K9mB6BUieCsfb8kFwVjUGtOqPzNDQFBj+2wGoYJ+Dis7ejlNKhJD3vCOKpioAo1hK X-Received: by 10.101.73.77 with SMTP id q13mr3510300pgs.336.1519966335269; Thu, 01 Mar 2018 20:52:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519966335; cv=none; d=google.com; s=arc-20160816; b=piV1/56V8IqF3j0CFcBXGpZjLcAMeDvb2CzQT2oP+bMUSawKfJkf/ThfQ5Rlc+VQN7 c3BzX8Ssk68W0uJAcH6Lx2zHYjZDiPSyHyaqPs9QfUX3fQy7nYm6mj8uamijr7u/IzW1 oTDstQ93bzXdUT10fvqXpffyEW7pHBqKBueyE87PsBNbYgUV6wpg1Mji94jhn7V+QS1u /wWltsXW4juhcD/wlqN7OCtxaVE5G8ECzzPoZi19hmoZYW7P6VZxZaG1IHXSLEl+xU1G zCTGUFfVZP8XqdgE8ZBHd0Ks5UAbnhmuG0Qkwu1UuLjMgfBNKNZamiXo7gbiuZdmX2kx ELcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=HQivaLxPpxita7Kh4Aew5K9DBC3Gkrw+N9FlaKYKq2Q=; b=o35omsXdIdSbuEoBJ9jcSavCIyHaiQL9hpi/+B2kk1RtIJkNQEBmbzgSDFc0nLJlvY GMcbwhcwNnA1gDpHGm1dkSnNkIGUHr4Qsyxw4L0n150rp+ImRWddPOIXJYexhRhE/6AS edQQ171y2qhrOvP3VIoiAsC8w187c+cYEKUi+HO8sgNqV2wmNpqKIsATsfopl6fhoxNs rne8h4/7op30muTQt/oOZ+iEhvFem/y+QsmPtKlTj8c95BDKt9bIbEixCQpg11q7hyG1 Y+Fx9Tc5EOIHrjklUXZ/WpztW4tbe84iqlW2m9yCq8hHhIrD4cgpV5VDsCKBwJ+afRhC 686w== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=Th4BAnn5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i5-v6si423517plr.393.2018.03.01.20.51.59; Thu, 01 Mar 2018 20:52:15 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=Th4BAnn5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1422809AbeCBEnB (ORCPT + 99 others); Thu, 1 Mar 2018 23:43:01 -0500 Received: from mail-pl0-f68.google.com ([209.85.160.68]:36753 "EHLO mail-pl0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1422796AbeCBEm6 (ORCPT ); Thu, 1 Mar 2018 23:42:58 -0500 Received: by mail-pl0-f68.google.com with SMTP id 61-v6so5009693plf.3; Thu, 01 Mar 2018 20:42:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=HQivaLxPpxita7Kh4Aew5K9DBC3Gkrw+N9FlaKYKq2Q=; b=Th4BAnn5ieL5FqdRrVE3YcAFjEF7nWDkDqpJnS+dmcbKjku0Sb4ryA1kIb4Mgdc3N6 BfY/XScGXeX0NQHfCxF+5sBtSXDs80QQvsbDNRiqMj7+TtLa3iLGh4AsKN6AzLc79ImH jNlVH3zqmgy6xmE0uHDppOBJa4Ot/bfaCJfOL8enaNTXwrDuFmGVHKP69fN4jIvDDrpp fAUhzE4DSxiizJVrwzPJKR7o1Cc9C8rOVUlB09NXA0a2MllvNnezDlxC2U8PTJJHc70L 4OJzMxg67ITEkDxQOXyt0urfycGyqhv1S7ztV60+p90YyooJmj0voy19x4PGt6KQ+Zqo jwNQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:subject:to:cc:references:from:message-id :date:user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=HQivaLxPpxita7Kh4Aew5K9DBC3Gkrw+N9FlaKYKq2Q=; b=Uu1c1re3UEVJbQcjYIsV9GtMb/kj6p8MLZTeSObm4BssjQ2yaUzUmOPCb/cVwHgxNG wpZIDSTYSzffw4f33VI9J4TD0Yahb8AdJnE4hxfBfLASy6kNlFaySBsGgkyjvOTvCLMr IXRQrTnJYdfIYqbjFcdRKZI76mzbw9NlHv6y8cc7VQBB1aQpySBECHpY4vvTZR4aHi7o EprUlMa1JZTRSdUvbDhU7J+ixk+rU8lhKSGcmJG1t8oSqtY/xaZoxyvT2gLsaEKQ5liM SWuqJ+/xDJRJ181qYwh48dTEbYw/XgrRt7DJn/8M05alWQ/FzbvW3SFM2oY//bFqLoMm TsXw== X-Gm-Message-State: APf1xPA3iFqohdEkpt8SuJHyhEASURXttazMuMM7+967TnRXwsdLyyFO h4QZilr0HSKdX4vYmgi+G/a/ow== X-Received: by 2002:a17:902:9042:: with SMTP id w2-v6mr4072193plz.156.1519965777919; Thu, 01 Mar 2018 20:42:57 -0800 (PST) Received: from server.roeck-us.net (108-223-40-66.lightspeed.sntcca.sbcglobal.net. [108.223.40.66]) by smtp.gmail.com with ESMTPSA id n67sm11116657pfh.150.2018.03.01.20.42.56 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 01 Mar 2018 20:42:57 -0800 (PST) Subject: Re: [PATCH v5 2/9] watchdog/hpwdt: Remove legacy NMI sourcing. To: Jerry.Hoemann@hpe.com Cc: Arnd Bergmann , Wim Van Sebroeck , linux-watchdog@vger.kernel.org, Linux Kernel Mailing List , rwright@hpe.com, maurice.a.saldivar@hpe.com, Ingo Molnar , marcus.folkesson@gmail.com, Josh Poimboeuf , stable References: <20180226032227.14615-1-jerry.hoemann@hpe.com> <20180226032227.14615-3-jerry.hoemann@hpe.com> <03b13d44-9ce3-ead8-020d-4b1b8114079d@roeck-us.net> <20180227010250.GC8244@anatevka.americas.hpqcorp.net> <8766f2ee-428a-d72f-b0c3-e5fe68fd0a33@roeck-us.net> <20180228194558.GB28906@anatevka.americas.hpqcorp.net> From: Guenter Roeck Message-ID: Date: Thu, 1 Mar 2018 20:42:55 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <20180228194558.GB28906@anatevka.americas.hpqcorp.net> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/28/2018 11:45 AM, Jerry Hoemann wrote: > On Mon, Feb 26, 2018 at 05:29:55PM -0800, Guenter Roeck wrote: >> On 02/26/2018 05:02 PM, Jerry Hoemann wrote: >>> On Mon, Feb 26, 2018 at 06:32:30AM -0800, Guenter Roeck wrote: >>>> On 02/26/2018 06:11 AM, Arnd Bergmann wrote: >>>>> On Mon, Feb 26, 2018 at 4:22 AM, Jerry Hoemann wrote: >>>>>> Gen8 and prior Proliant systems supported the "CRU" interface >>>>>> to firmware. This interfaces allows linux to "call back" into firmware >>>>>> to source the cause of an NMI. This feature isn't fully utilized >>>>>> as the actual source of the NMI isn't printed, the driver only >>>>>> indicates that the source couldn't be determined when the call >>>>>> fails. >>>>>> >>>>>> With the advent of Gen9, iCRU replaces the CRU. The call back >>>>>> feature is no longer available in firmware. To be compatible and >>>>>> not attempt to call back into firmware on system not supporting CRU, >>>>>> the SMBIOS table is consulted to determine if it is safe to >>>>>> make the call back or not. >>>>>> >>>>>> This results in about half of the driver code being devoted >>>>>> to either making CRU calls or determing if it is safe to make >>>>>> CRU calls. As noted, the driver isn't really using the results of >>>>>> the CRU calls. >>>>>> >>>>>> Furthermore, as a consequence of the Spectre security issue, the >>>>>> BIOS/EFI calls are being wrapped into Spectre-disabling section. >>>>>> Removing the call back in hpwdt_pretimeout assists in this effort. >>>>>> >>>>>> As the CRU sourcing of the NMI isn't required for handling the >>>>>> NMI and there are security concerns with making the call back, remove >>>>>> the legacy (pre Gen9) NMI sourcing and the DMI code to determine if >>>>>> the system had the CRU interface. >>>>>> >>>>>> Signed-off-by: Jerry Hoemann >>>>> >>>>> This avoids a warning in mainline kernels, so that's great: >>>>> >>>>> drivers/watchdog/hpwdt.o: warning: objtool: .text+0x24: indirect call >>>>> found in RETPOLINE build >>>>> >>>>> I wonder what we do about stable kernels. Are both this patch and the patch >>>>> that added the objtool warning message candidates for backports to >>>>> stable kernels? >>>>> >>>> >>>> Makes sense to me, but it is really a bit more than a bug fix, so I'll >>>> leave it up to Jerry/HPE to make the call in respect to hpwdt. >>>> >>> >>> Generally speaking, HPE customers who run linux do so through a distro >>> vendor and pick up patches from them. But I'm sure there are some >>> customers who do things differently. >>> >>> The distro vendor's have their own repos and we'll work with them >>> to back port patches to their code base. So, I typically don't do a lot >>> of kernel.org stable branch work. >>> >>> Looks like objtool has been enhanced to find Spectre vulnerable code. >>> Are the other kernel patches related to Spectre being back ported >>> to stable release lines? If yes, it probably make sense to do >>> the hpwdt change as well. >>> >> >> Spectre has been backported to v4.4 and later. I don't know about earlier kernels. >> >>> Is just the patch removing the firmware call back wanted/needed? Or the >>> whole driver rewrite? (The older baseline don't have all the watchdog >>> features that the patch set uses.) >>> >> >> We would only want to backport this patch. The rest is really out of scope. >> >>> Which stable baseline(s) would need to be patched? Priority? >>> >>> Who does it? (i.e. do you want me to submit patches to the stable baseline?) >>> >> We would tag the patch for stable (and submit it into v4.16-rc). Greg would >> take care of the rest unless there are conflicts, in which case we get a note >> telling us that a backport is needed. >> > > Guenter, > > Are you waiting for anything more from me on this patch, or are we > good for now until the back ports to v.15 etc.,? > We are good. I'll need to ask Wim to send a pull request to Linus. Guenter