Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp187890imj; Thu, 14 Feb 2019 18:15:55 -0800 (PST) X-Google-Smtp-Source: AHgI3IavcEPZf+HmTbEm0uoTfUhaz5x0bQSu8kJjeAjGbrML8fWDf5RWDN+/3iZ3ea84kw4p5gfw X-Received: by 2002:a17:902:a404:: with SMTP id p4mr7482607plq.148.1550196955524; Thu, 14 Feb 2019 18:15:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550196955; cv=none; d=google.com; s=arc-20160816; b=mT7WohMajkLDfamcGhPas11Kg1bMnaFw3A2VpiKwKiD3M9AxrSleRabPbPQRcdFoAj FKpo8Ic5PEqSllKlUkgtLRoVm7iSQZwm61dzU6mrkNUgXHdw001anCGUuqtvnAPjBvwG TDskXXKhxXztV1Kb28ILUJzb3zyQgNUWhGGivWNrXDTqpclN/1NkuWkNAsz2RWCOvTNX nIrgbogFEAWW9K9uTeLStd1xp9TAsU4zC1xgoqd6cL6bFGr6gx+81clZA9Qbi+VYbpK5 1BbMI03mjgfGhZluLeYzVfB2hw9bs5oYobTIfkvOL5smCHSYFBUnrfI3pEh3PueTjxU9 /znA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=2GqUAfyZm5ljjSp/2KrnDmIv0MAEcYcrBvvemcFv0Fw=; b=gQ1uTtCLqFwhQI24GjGizwIgVBoqvT7p6zAJ3LeUOPMurVM9/NMUk788/lUuQlgFPJ ru2D3QO/4jiHnHEmHQEkV7tSccVgzOR0TtnbgjHhXGM7iGdJzo+2sBCS+yGdizX6KTdD p31hHjb/ds/N3YWZAiePpZ6fSN+7DDjS05vDCEbDx/IXoYZbCvpwVkF5afNzjFDPzOQB J6Fo+2uXFKhjObB/qR32T0kcGITvW+AvTI0kRMICRrVvL0dRLNwkeHnvY/ccXhvNLWHp 2RbBcJpQC3Cp0xxNUNgEjfz+WI3AeJaeTVwmSjVjOtHjlYvJGE9oApMnm/2jD7f5V5l1 zakQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i33si4213870pld.329.2019.02.14.18.15.39; Thu, 14 Feb 2019 18:15:55 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2440218AbfBNVcJ (ORCPT + 99 others); Thu, 14 Feb 2019 16:32:09 -0500 Received: from mx0b-002e3701.pphosted.com ([148.163.143.35]:46044 "EHLO mx0b-002e3701.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2392871AbfBNVcI (ORCPT ); Thu, 14 Feb 2019 16:32:08 -0500 Received: from pps.filterd (m0134425.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x1ELQhpY005571; Thu, 14 Feb 2019 21:31:51 GMT Received: from g4t3426.houston.hpe.com (g4t3426.houston.hpe.com [15.241.140.75]) by mx0b-002e3701.pphosted.com with ESMTP id 2qnedr8uhj-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 14 Feb 2019 21:31:51 +0000 Received: from g9t2301.houston.hpecorp.net (g9t2301.houston.hpecorp.net [16.220.97.129]) by g4t3426.houston.hpe.com (Postfix) with ESMTP id 9A8B070; Thu, 14 Feb 2019 21:31:50 +0000 (UTC) Received: from [16.214.130.214] (unknown [16.214.130.214]) by g9t2301.houston.hpecorp.net (Postfix) with ESMTP id 094314B; Thu, 14 Feb 2019 21:31:48 +0000 (UTC) Subject: Re: [Patch v3 0/4] Protect against concurrent calls into UV BIOS To: Dimitri Sivanich , Hedi Berriche Cc: linux-kernel@vger.kernel.org, Ard Biesheuvel , Thomas Gleixner , Bhupesh Sharma , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , linux-efi@vger.kernel.org, x86@kernel.org, Russ Anderson , Steve Wahl , stable@vger.kernel.org References: <20190213193413.25560-1-hedi.berriche@hpe.com> <20190214212149.GB5073@hpe.com> From: Mike Travis Message-ID: <6d2c7655-a8f4-e2ef-1479-f43e707c6a86@hpe.com> Date: Thu, 14 Feb 2019 13:31:48 -0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0 MIME-Version: 1.0 In-Reply-To: <20190214212149.GB5073@hpe.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-HPE-SCL: -1 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-02-14_10:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1902140141 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/14/2019 1:21 PM, Dimitri Sivanich wrote: > For the series: > > Reviewed-by: Dimitri Sivanich As well as I: Reviewed-by: Mike Travis > > On Wed, Feb 13, 2019 at 07:34:09PM +0000, Hedi Berriche wrote: >> - Changes since v2 >> Addressed comments from Ard Biesheuvel: >> * expose efi_runtime_lock to UV platform only instead of globally >> * remove unnecessary #ifdef CONFIG_EFI from bios_uv.c >> >> - Changes since v1: >> Addressed comments from Bhupesh Sharma, Thomas Gleixner, and Ard Biesheuvel: >> * made __uv_bios_call() static >> * moved the efi_enabled() cleanup to its own patchlet >> * explained the reason for renaming the efi_runtime_lock semaphore >> * dropped the reviewed-bys as they should be given on the mailing list >> * Cc'ng stable@vger.kernel.org given the nature of the problem addressed by the patches >> >> --- >> >> Calls into UV BIOS were not being serialised which is wrong as it violates EFI >> runtime rules, and bad as it does result in all sorts of potentially hard to >> track down hangs and panics when efi_scratch.prev_mm gets clobbered whenever >> efi_switch_mm() gets called concurrently from two different CPUs. >> >> Patch #1 removes an unnecessary #ifdef CONFIG_EFI guard from bios_uv.c. >> >> Patch #2 removes uv_bios_call_reentrant() because it's dead code. >> >> Patch #3 is a cleanup that drops test_bit() in favour of the ad hoc efi_enabled(). >> >> Patch #4 makes uv_bios_call() variants use the efi_runtime_lock semaphore to >> protect against concurrency. >> >> Cc: Russ Anderson >> Cc: Mike Travis >> Cc: Dimitri Sivanich >> Cc: Steve Wahl >> Cc: stable@vger.kernel.org # v4.9+ >> >> Hedi Berriche (4): >> x86/platform/UV: remove unnecessary #ifdef CONFIG_EFI >> x86/platform/UV: kill uv_bios_call_reentrant() as it has no callers >> x86/platform/UV: use efi_enabled() instead of test_bit() >> x86/platform/UV: use efi_runtime_lock to serialise BIOS calls >> >> arch/x86/include/asm/uv/bios.h | 13 ++++----- >> arch/x86/platform/uv/bios_uv.c | 35 ++++++++++++++----------- >> drivers/firmware/efi/runtime-wrappers.c | 7 +++++ >> 3 files changed, 34 insertions(+), 21 deletions(-) >> >> -- >> 2.20.1 >>