Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp623445pxv; Thu, 15 Jul 2021 11:48:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxc0a+4kew9XrOD+PNUquhbppORfyLEqCx/BolArf31WRcRUFPoX9PrQgS2FeEQdYuPP01k X-Received: by 2002:a05:6e02:1208:: with SMTP id a8mr3537360ilq.257.1626374919181; Thu, 15 Jul 2021 11:48:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626374919; cv=none; d=google.com; s=arc-20160816; b=NsJqTAWfaos+FPgrnJ/AMYxGMTdE70FDQKcNwBsRt38rK51yKgOe2Fusj1beGXThGW x7sR/fiJ5Yu9HN5Wc4GTY5MzQLJNA/B8Q3ClDtAfeQU1ZJPqlP0uKJoEmlCdboJ8Px3r U2zPtgIiT8dqkbvJyMETTTqLQekNQ6OXu54Ku/NR1IcQ1sOXBV6v8LmNQjkWNlpDCVK+ dgT54/uwyJcCaCxz7aLl1Q72T2BzHV2guSohXKjfc5YwaGO48Ej66VVQ9HrH/YYaJW7L HhV2y5KH/3Lb1ep3mizqYSqsZeJ0g7pwQ5rsZZBbYz3sx6AuU4F0rFbrSR7++VG9TWRI XThg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=rZ21REMp/83jJ5IpGviDv5RO2UatOka0BBDWI0v/K7Q=; b=jFsFbf98as78GOXTDXCuQj7VT+VEszY0WNTIe4f1sE3ikaadiz0Q8Ef2RFEu+ifOZt fEPXM4Jle7kv8JpLF8AnwjDHLYf3QDXLJtot3Vb86mHNVZNLESwCHzR5NUyMB6js8odW hzCi0Vl3CsxGwFyrMZ0Hq05LdWX3TOTAyFrSkDkxnUACDZeGZHf64m9X/Kc8pjjmglHt eXAboTe3nW7ow36VaKGgiziJfGb8EVCQP+u1T6XToM+zMH4Vzr7+9hx1+nQjSGadGRNa B6nZl13Ii+TzDMmezpUt/VPibMkOdZxZ/gc0n3bD+Xae23C1ndeRZSNe1iRF/Pw5xPU9 En7Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="SH9//T2v"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y11si6968208jaf.84.2021.07.15.11.48.26; Thu, 15 Jul 2021 11:48:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="SH9//T2v"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240498AbhGOSt3 (ORCPT + 99 others); Thu, 15 Jul 2021 14:49:29 -0400 Received: from mail.kernel.org ([198.145.29.99]:49282 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236817AbhGOSrU (ORCPT ); Thu, 15 Jul 2021 14:47:20 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 905A861158; Thu, 15 Jul 2021 18:44:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626374666; bh=hyCIWKKZjngvuEMe5c7TdZ6aQySOfdGzqdDSWh/eYEQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SH9//T2vn1JVT/EIn+2UBV4YEpdywQ/U1osyj78rev2BkPnJ6pyjBpv5eArvSc4Dc rz4xmsGcxpkZ4E3kLSaPCCIHv12CNj68hYHrRcQcsdAGBDtFEazL/Eha3AIM8EHm4F QHWN54QltFykNgSAGXQoK3O7FvT4GhqbODZtwl7Q= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Petr Pavlu , Corey Minyard Subject: [PATCH 5.4 096/122] ipmi/watchdog: Stop watchdog timer when the current action is none Date: Thu, 15 Jul 2021 20:39:03 +0200 Message-Id: <20210715182517.797164056@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210715182448.393443551@linuxfoundation.org> References: <20210715182448.393443551@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Petr Pavlu commit 2253042d86f57d90a621ac2513a7a7a13afcf809 upstream. When an IPMI watchdog timer is being stopped in ipmi_close() or ipmi_ioctl(WDIOS_DISABLECARD), the current watchdog action is updated to WDOG_TIMEOUT_NONE and _ipmi_set_timeout(IPMI_SET_TIMEOUT_NO_HB) is called to install this action. The latter function ends up invoking __ipmi_set_timeout() which makes the actual 'Set Watchdog Timer' IPMI request. For IPMI 1.0, this operation results in fully stopping the watchdog timer. For IPMI >= 1.5, function __ipmi_set_timeout() always specifies the "don't stop" flag in the prepared 'Set Watchdog Timer' IPMI request. This causes that the watchdog timer has its action correctly updated to 'none' but the timer continues to run. A problem is that IPMI firmware can then still log an expiration event when the configured timeout is reached, which is unexpected because the watchdog timer was requested to be stopped. The patch fixes this problem by not setting the "don't stop" flag in __ipmi_set_timeout() when the current action is WDOG_TIMEOUT_NONE which results in stopping the watchdog timer. This makes the behaviour for IPMI >= 1.5 consistent with IPMI 1.0. It also matches the logic in __ipmi_heartbeat() which does not allow to reset the watchdog if the current action is WDOG_TIMEOUT_NONE as that would start the timer. Signed-off-by: Petr Pavlu Message-Id: <10a41bdc-9c99-089c-8d89-fa98ce5ea080@suse.com> Cc: stable@vger.kernel.org Signed-off-by: Corey Minyard Signed-off-by: Greg Kroah-Hartman --- drivers/char/ipmi/ipmi_watchdog.c | 22 ++++++++++++---------- 1 file changed, 12 insertions(+), 10 deletions(-) --- a/drivers/char/ipmi/ipmi_watchdog.c +++ b/drivers/char/ipmi/ipmi_watchdog.c @@ -366,16 +366,18 @@ static int __ipmi_set_timeout(struct ipm data[0] = 0; WDOG_SET_TIMER_USE(data[0], WDOG_TIMER_USE_SMS_OS); - if ((ipmi_version_major > 1) - || ((ipmi_version_major == 1) && (ipmi_version_minor >= 5))) { - /* This is an IPMI 1.5-only feature. */ - data[0] |= WDOG_DONT_STOP_ON_SET; - } else if (ipmi_watchdog_state != WDOG_TIMEOUT_NONE) { - /* - * In ipmi 1.0, setting the timer stops the watchdog, we - * need to start it back up again. - */ - hbnow = 1; + if (ipmi_watchdog_state != WDOG_TIMEOUT_NONE) { + if ((ipmi_version_major > 1) || + ((ipmi_version_major == 1) && (ipmi_version_minor >= 5))) { + /* This is an IPMI 1.5-only feature. */ + data[0] |= WDOG_DONT_STOP_ON_SET; + } else { + /* + * In ipmi 1.0, setting the timer stops the watchdog, we + * need to start it back up again. + */ + hbnow = 1; + } } data[1] = 0;