Received: by 10.213.65.68 with SMTP id h4csp810089imn; Tue, 20 Mar 2018 16:21:00 -0700 (PDT) X-Google-Smtp-Source: AG47ELv59veZMBL2p0zsTg6VlBLi6sOq5tLANhMPPyDr1LY657HQjl1ce8kIAlgFPa3n06xBd8jD X-Received: by 10.99.3.144 with SMTP id 138mr13524674pgd.364.1521588060075; Tue, 20 Mar 2018 16:21:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521588060; cv=none; d=google.com; s=arc-20160816; b=LuqkeRK64JznzP06HZTnG8747VkCJJZbCoKWbYcMPD7JCQhiMYFx3n26h/tc2FibWU jLbOM6d2Mj/nHfUuHceqaahJtHp0C6tgkuCzQDodTEOV2NvsL7rODkzFcXGAkfFwNW+j 2n7yYkaRWcQ/p30qoV9kMOIbp+stF95T3lhv5sHWPUGY3SaYeFNO8Zpe0/gHn3MXw7ZG NfbLtulnXk2uL06bTSnAXclNq1Srov9jX5+HichhvTow6LTfHJGBJkP31/W9eH9Z+J3i 4cdswHnZtg3Wvg8fPiimYfXm6F76MffOvpBtHQ+cLdCwsqIS5P48mWRiJeH0iS1MLhPk o77g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:date:cc:to:from:subject :message-id:arc-authentication-results; bh=+iP2dJ96bXUqR/FqR1vGHIppLqAp/Pq9pguNKpllwpM=; b=ImA7LvXai/PrfXg2qgLj/WmPgqFo9cAt9W/InJmMvUIvrvO3rna/oIwbkck1k60MKL hHL93NX8qkc5HjTW64pa396VzfmByj9wJUAJZU+Sdb0HtnHcVb+DocydZsfsU65OZfOW ZYTStRrzNFaHT3CYjurnteFmNB6t6qk9lgzoVsGYSdslCI+86UmOxNX2eEVoH9S3MIPF 3ZYbN+YN+zIww4ZzOKZmtwX9/1/xsAabo8ZfYYCNaKlbsFGN9ayUmti7j1jyUsewWO33 459aj/lK7DT8AcrrrY5kG2JL0GqPdQT6zPj0AeqiTQPsLDSYwgkf+h0Kb2NMiajdZA9C IKFg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e74si2060653pfd.97.2018.03.20.16.20.46; Tue, 20 Mar 2018 16:21:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751833AbeCTXTq (ORCPT + 99 others); Tue, 20 Mar 2018 19:19:46 -0400 Received: from imap1.codethink.co.uk ([176.9.8.82]:46915 "EHLO imap1.codethink.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751343AbeCTXTo (ORCPT ); Tue, 20 Mar 2018 19:19:44 -0400 Received: from [167.98.27.229] (helo=xylophone) by imap1.codethink.co.uk with esmtpsa (Exim 4.84_2 #1 (Debian)) id 1eyQXg-0007lt-5q; Tue, 20 Mar 2018 23:19:44 +0000 Message-ID: <1521587979.23626.117.camel@codethink.co.uk> Subject: Re: [PATCH 4.4 29/63] watchdog: hpwdt: fix unused variable warning From: Ben Hutchings To: Greg Kroah-Hartman , Jerry Hoemann Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Arnd Bergmann , Guenter Roeck , Wim Van Sebroeck Date: Tue, 20 Mar 2018 23:19:39 +0000 In-Reply-To: <20180318101416.GD13276@kroah.com> References: <20180316152259.964532775@linuxfoundation.org> <20180316152303.262268098@linuxfoundation.org> <20180316225537.GA5989@anatevka.americas.hpqcorp.net> <20180318101416.GD13276@kroah.com> Organization: Codethink Ltd. Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.22.6-1+deb9u1 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 2018-03-18 at 11:14 +0100, Greg Kroah-Hartman wrote: > On Fri, Mar 16, 2018 at 04:55:37PM -0600, Jerry Hoemann wrote: > > > > Greg, > > > > Sorry, if I'm missing something, but I see 3 patches for > > hpwdt queued up for 4.4: > > > > queue-4.4/watchdog-hpwdt-fix-unused-variable-warning.patch > > queue-4.4/watchdog-hpwdt-smbios-check.patch > > queue-4.4/watchdog-hpwdt-check-source-of-nmi.patch > > > > > > Shouldn't there also be a 4.4 patch for > > > > commit 2b3d89b402b085b08498e896c65267a145bed486 > > watchdog: hpwdt: Remove legacy NMI sourcing. > > > > As there was for 4.15, 4.14, and 4.9? > > It does not apply to the 4.4.y kernel branch.  If you feel it should be > there, please provide a working backport. > > > commit 2b3d89b40 is the Spectre related patch. > > If you look closely, not many Spectre-related patches are merged into > 4.4.y as no one has taken the time to do the backporting.  I thought > someone was working on this, but odds are they just moved to 4.9.y or > 4.14.y as everyone really should if they care about these issues with > their platforms. > > So if you care about Spectre, I strongly recommend using 4.14.y or > newer. I think you have most of the Spectre stuff aside from microcode supported fixes. These are still missing on the 4.4 branch though: 8fa80c503b48 nospec: Move array_index_nospec() parameter checking into separate macro 1d91c1d2c80c nospec: Kill array_index_nospec_mask_check() I think there may also be some extra uaccess functions that didn't get the nospec treatment. I'll probably look into backporting the microcode stuff to the older branches (4.4, then 3.16 and 3.2) at some point. Ben. -- Ben Hutchings Software Developer, Codethink Ltd.